Top Banner
Group Presentation Group 1 Internet and its Protocols Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering 2015
59

Group Presentation Group 1 Internet and its Protocols Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering 2015.

Jan 19, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

Group Presentation

Group PresentationGroup 1

Internet and its Protocols Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering20151Students:NiklasLensing (Introduction and History of Internet)Mi Zao Yu (Introduction and History of Internet)Sampa Nkonde(TCP/IP, OSI, Presenter)Hanif Khushk(TCP/IP and OSI comparison)Ahmed Mikaeil (Data exchange example)Bilal Korir(Security, Moderator)Mohammed Abdullah (IoTs protocols)

2Group 1 Members:Lecturer: Professor Yanmin Zhu

Presentation OutlineIntroduction and History of InternetInternet Protocols- Open System Interconnection model (OSI)- Transport Control Protocol/Internet Protocol (TCP/IP)- Comparative analysis between OSI/TCP/IPInternet SecurityInternet Protocols related to IoTsConclusionQ & A3

IntroductionThe Internet in a nutshellA worldwide network of connected networksA data network allows nodes to exchange information with each other4

Home networkInstitutional networkMobile networkGlobal ISPRegional ISProuter

wiredlinksaccess pointsIntroductionThe Internet A revolutionInvention of the Internet is sometimes said to be comparable to the invention of printing booksChanged the way we live our lifesCommunication, Access to information, Day to Day Life, etcHelpes to the development of completely new economic branches5

IntroductionBrief historic overviewEarly phase (1960s to 1970s) Military use: Advanced Research Projects Agency Network(ARPANET)Basic idea: develop a network infrastructure without a single point of failure Wild Phase (1970s to 1990s) Change from military to academic useMostly used for research and exchange of informationCommercialization (from 1990s) Shutdown of ARPANETExpansion of the Internet over the whole world6

TheAdvanced Research Projects Agency Network(ARPANET) was an earlypacket switchingnetwork and the first network to implement the protocol suiteTCP/IP. Both technologies became the technical foundation of theInternet. ARPANET was initially funded by the Advanced Research Projects Agency (ARPA) of theUnited States Department of Defense.

6INTRODUCTIONRecent trends in the InternetWeb 2.0 User generated content (Facebook, Twitter, Youtube )

Cloud Computing Make your data accessible from everywhere!

Internet of Things Enable Things to communicate with each otherConnect Things to the Internet7

PROTOCOLSCooperative action is necessarycomputer networking is not only to exchange byteshuge system with several utilities and functions. For exampleserror detectionEncryptionRoutingetc.

For proper communication, entities in different systems must speak the same languagethere must be mutually acceptable conventions and rules about the content, timing and underlying mechanismsThose conventions and associated rules are referred as PROTOCOLS8

Simplified File Transfer Architecture9

File Transfer Application Layer: Application specific commands, passwords and the actual file(s) high level data.Communications Service Module: Reliable transfer of those data error detection, ordered delivery of data packets, etc.Network Module: Actual transfer of data and dealing with the network if the network changes, only this module is affected, not the whole system.A General Three Layer ModelGeneralize the previous example for a generic applicationwe can have different applications (e-mail, file transfer, )

Network Access Layer Transport LayerApplication Layer10

Transport Layer:Reliable data exchange to make sure that all the data packets arrived in the same order in which they are sent outPackets not received or received in error are retransmitted

Application layerSupport for different user applicationse.g. e-mail, file transfer

10OSI Reference ModelOpen Systems InterconnectionReference modelprovides a general framework for standardizationdefines a set of layers and services provided by each layerone or more protocols can be developed for each layerDeveloped by the International Organization for Standardization (ISO)also published by ITU-T (International Telecommunications Union)

11OSI Reference Model"Please Do Not Tell Secret Passwords Anytime" "Please Do Not Throw Salami Pizza Away" Shh! bottom-to-top phrase. 12

OSI Layers (1) - PhysicalPhysicalPhysical interface between devicesCharacteristicsMechanical - interface specsElectrical - voltage levels for bits, transmission rate

13

OSI Layers (2) Data LinkData Link - Basic services: error detection and control, flow control at the link level (p to p)Higher layers may assume error free transmission Later a sublayer is added to Data Link LayerMAC (Medium Access Control) sublayer to deal with broadcast networks(MAC) protocol is used to provide the data link layerThe MAC protocol encapsulates a (payload data) by adding a 14 byte header (Protocol Control Information (PCI)) before the data and appending an integrity checksumThe checksum is a 4-byte (32-bit) Cyclic Redundancy Check (CRC) after the data.

14

OSI Layers (3) - NetworkNetworkThis layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control, QoS (Quality of Service) and packet sequencing.Several other internetworking issuese.g. differences in addressing, max. data length, etc.

15OSI Layers (3) Network contTypical protocols:IP Internet Protocol i.e IPv4 or IPv6Provide packet deliveryICMP Internet Control Message ProtocolDefine the procedures of error message transfer

16OSI Layers (4) - TransportTransportThis layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. End to end exchange of dataIn sequence, no losses, no duplicatesIf needed, upper layer data are split into smaller unitsTransport Protocols examples - TCP, SPX and UDP

17IPX and SPX are derived from Xerox Network Systems' IDP and SPP protocols, respectively. IPX is a network layer protocol (layer 3 of the OSI Model), while SPX is a transport layer protocol (layer 4 of the OSI Model). The SPX layer sits on top of the IPX layer and provides connection-oriented services between two nodes on the network. SPX is used primarily by clientserver applications.

IPX and SPX both provide connection services similar to TCP/IP, with the IPX protocol having similarities to IP, and SPX having similarities to TCP. IPX/SPX was primarily designed for local area networks (LANs), and is a very efficient protocol for this purpose (typically its performance exceeds that of TCP/IP on a LAN[citation needed]). TCP/IP has, however, become the de facto standard protocol. This is in part due to its superior performance over wide area networks and the Internet (which uses TCP/IP exclusively), and also because TCP/IP is a more mature protocol[citation needed], designed specifically with this purpose in mind.17OSI Layers (5) - SessionSessionControl of dialogueswhose turn to talk?Dialogue discipline (full-duplex, half-duplex)This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

18

OSI Layers (6) - PresentationThis layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.Typical Protocols examples - SSL, WEP, WPA, etc.19

19OSI Layers (7) - ApplicationApplication layer protocols define the rules when implementing specific network applications Rely on the underlying layers to provide accurate and efficient data deliveryTypical Protocols:FTP File Transfer ProtocolFor file transferDNS Domain Name SystemTranslates domain names into IP addresses. SMTP Simple Mail Transfer ProtocolFor mail transferHTTP Hypertext Transfer ProtocolFor Web browsing

20TCP/IP Protocol SuiteMost widely used interoperable network protocol architectureSpecified and extensively used before OSIOSI was slow to take place in the marketFunded by the US Defense Advanced Research Project Agency (DARPA) for its packet switched network (ARPANET)DoD automatically created an enormous market for TCP/IPUsed by the Internet21What is TCP/IP?TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network

TCP stands for Transmission Control Protocol

IP stands for Internet Protocol

They are Transport layer and Network layer protocols respectively of the protocol suite

The most well known network that adopted TCP/IP is Internet the biggest WAN in the world

22TCP/IP Protocol SuiteTCP/IP does not have an official layer structureBut protocols imply oneApplication layerTransport (host to host) layerInternet layerNetwork access layerPhysical layer

Actually TCP/IP reference model has been built on its protocolsThat is why that reference model is only for TCP/IP protocol suiteand this is why it is not so important to assign roles to each layer in TCP/IP; understanding TCP, IP and the application protocols would be enough23

Network Access and Physical LayersTCP/IP reference model does not discuss these layers too muchthe node should connect to the network with a protocol such that it can send IP packetsthis protocol is not defined by TCP/IPmostly in hardwarea well known example is Ethernet

24Internet LayerConnectionless, point to point internetworking protocol (uses the datagram approach)takes care of routing across multiple networks each packet travels in the network independently of each otherthey may not arrive (if there is a problem in the network)they may arrive out of ordera design decision enforced to make the system more flexible and responsive to loss of some subnet devicesImplemented in end systems and routers as the Internet Protocol (IP)

25Transport LayerEnd-to-end data transferTransmission Control Protocol (TCP)connection orientedreliable delivery of data ordering of deliveryUser Datagram Protocol (UDP)connectionless servicedelivery is not guaranteedCan you give example applications that use TCP and UDP? 26TCP-Web, Telnet, SMTP, POP UDP- Media Streaming, Games26Application LayerSupport for user applicationsA separate module for each different applicatione.g. HTTP, SMTP, telnet

27OSI vs. TCP/IP28

OSI vs. TCP/IP contThere are two basic types of networking models: Protocol models Provides a model that closely matches the structure of a particular protocol suite. Reference modelsProvides a common reference for maintaining consistency within all types of network protocols and services.TCP/IP model is a network protocol model Because it describes the functions that occur at each layer of protocols within the TCP/IP suite. OSI mode is a network reference model. It is used for network design, operation specifications, and troubleshooting.

29But how does the Internet actually work?30Communicating Over the NetworkA networking model (OSI or TCP/IP) is only a representations of network operation . The model is not the actual network.

However TCP/IP model describes the protocols implemented on both the sending and receiving hosts, that interact to provide end-to-end delivery of applications over a network.31Data Exchange Example

32INTERNET SECURITY

Internet Security - History 1960, the term Hacker was introduced in MIT

1973, invention of TCP/IP protocol without security constrains

1983, the 414s group broke into top-secret systems

1986, Morris worm, first worm distributed over the Internet

1988, Kevin Mitnick, accessed unauthorized network and stole intellectual properties. Caused $ 80 million damage

2000, ILOVEYOU worm, caused about 5.5~8.7 billon $ damage worldwide

Whats the Problem?

Information over the Internet is Free, Available, Unencrypted, and Untrusted.Not desirable for many Applications Electronic Commerce Software Products Financial Services Corporate Data Healthcare Subscriptions Legal Information

Internet Security Attack MethodsEavesdropping Interception of communications.

Internet Security Attack MethodsViruses

Once a file is opened, the virus will be activated within the system.

Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.

Internet Security Attack MethodsWorm Selfreplicating, propagate through emailing list, and connected computers in the same network.

Internet Security Attack MethodsTrojanLooks like normal programs, but it is not. Usually Carries a virus.

Internet Security Attack MethodsPhishing Trick users into writing private information on a fake website that looks like the original one.

Internet Security Attack MethodsSpoofing Hide the real identity by using different IP address

Internet Security Attack MethodsDenial of ServiceSend too many requests to a system, eventually the system cannot respond to any request any more.

Internet Security Protection MethodsCryptography: use of codes and ciphers to transform information into unintelligible data

Antivirus: used to detect them and cure an infected system.

Firewall: border control mechanism

Intrusion Detection Systems: can be software and hardware devices used to detect an attack

Security Protocols: suite of protocols, create a secure channel between a sender and receiver (Examples: SSL, IPsec,etc.)

Transition!

From connected computerstoconnected thingsIntroduction to IoTsIoT: Internet Of ThingsConnect all devices, systems and servicesIoT is coming to users daily lifeHuge amount of IP addresses is needed

45

MI smart switchMI smart bulbMI smart cameraMI smart bandIoT in 2010

IoT in 2015

EXAMPLES OF IoT PROTOCOLS

MQTT: Message Queue Telemetry Transport5Used for Collecting Device DataReleased by IBM and targets lightweight M2M communicationsAn asynchronous publish/subscribe protocol that runs on top of the TCP stack.In MQTT there is a broker (server) that contains topics.MQTT: Message Queue Telemetry Transport contd

The publish/subscribe patternThe publish/subscribe pattern (pub/sub) is an alternative to the traditional client-server model, where a client communicates directly with an endpoint. However, Pub/Sub decouples a client, who is sending a particular message (called publisher) from another client (or more clients), who is receiving the message (called subscriber). This means that the publisher and subscriber dont know about the existence of one another. There is a third component, called broker, which is known by both the publisher and subscriber, which filters all incoming messages and distributes them accordingly.506LoWPAN :IPv6 over Low power Wireless Personal Area Networks5Formulated by devices that are compatible with the IEEE 802.15.4 standard.6LowPAN uses an adaptation layer between the network (IPv6) and data link layer (IEEE802.15.4 MAC) to fragment and reassemble IPv6 packets. 6LoWPAN provides a WSN node with IP communication capabilities by putting an adaptation layer above the IEEE 802.15.4 link layer for the packet fragmentation and reassembly purpose ZIGBEEZigBee is a technological standard designed for control and sensor networksBased on the IEEE 802.15.4 Standard Created by the ZigBee AllianceOperates in Personal Area Networks (PANs) and device-to-device networksConnectivity between small packet devicesControl of lights, switches, thermostats, appliances, etc.

ZIGBEE CharacteristicsLow costLow power consumptionLow data rateRelatively short transmission rangeScalabilityReliabilityFlexible protocol design suitable for many applications

53ZigBeeZigBee15ms30msZigBeeZigBee62

ZigBeeMACtalk-when-readyZigBee255ZigBeeMasterSlaveNetwork Coordinator6500ZigBeeNetwork CoordinatorZigBeeZIGBEE ApplicationsPERSONAL HEALTH CAREZigBeeLOW DATA-RATE RADIO DEVICESHOME AUTOMATION

CONSUMER ELECTRONICS

TV VCRDVD/CDRemote control

securityHVAClightingclosures

PC & PERIPHERALS

consolesportableseducational

TOYS & GAMES

INDUSTRIAL & COMMERCIAL

monitorssensorsautomationcontrol

mousekeyboardjoystickmonitorsdiagnosticssensors

54HVAC---Heating, ventilating, and air conditioning (,,)

ZigBee1. 2. 3. 4. 5. 6. 55XMPP: Extensible Messaging and Presence Protocol The base protocol used for XMPP is RFC 2779 (Instant Messaging /Presence Protocol Requirements). There are 2 drafts namely XMPP Core and XMPP Instant Messaging currently on XMPP.Presence and Instant Messaging Presence Presence is a means for finding, retrieving, and subscribing to changes in the presence information (e.g. "online" or "offline") of other users. Instant Messaging It is a means for sending small, simple messages that are delivered immediately to online users. XMPP: Extensible Messaging and Presence Protocol8Designed for chatting and message exchanging.Standardized by the IETF.Lately XMPP has re-gained a lot of attention as a communication protocol suitable for the IoT.XMPP runs over TCP and provides publish/subscribe (asynchronous) and also request/ response (synchronous) messaging systems.Designed for near real-time communications and thus, it supports small message footprint and low latency message exchange.XMPP has TLS/SSL security built in the core of the specicationChina Mobile released I0T open platform OneNet

The internet has changed the face of communications, commerce, and indeed the world and over time the internet itself has changed too. Conclusion

Xie`xieQ & A