Top Banner
Introduction 1 Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department Fall 2011 CPE 400 / 600 Computer Communication Networks
34

Lecture 4 Networking Concepts ( cont )

Feb 24, 2016

Download

Documents

Fritz

University of Nevada – Reno Computer Science & Engineering Department Fall 2011 CPE 400 / 600 Computer Communication Networks. Lecture 4 Networking Concepts ( cont ). slides are modified from J. Kurose & K. Ross. Chapter 1: roadmap. 1.1 What is the Internet? 1.2 Network edge - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lecture  4 Networking Concepts ( cont )

Introduction 1

Lecture 4Networking Concepts (cont)

slides are modified from J. Kurose & K. Ross

University of Nevada – RenoComputer Science & Engineering Department

Fall 2011

CPE 400 / 600Computer Communication Networks

Page 2: Lecture  4 Networking Concepts ( cont )

Chapter 1: roadmap

1.1 What is the Internet?1.2 Network edge

end systems, access networks, links1.3 Network core

circuit switching, packet switching, network structure1.4 Delay, loss and throughput in packet-

switched networks1.5 Protocol layers, service models1.6 Networks under attack: security1.7 History

Introduction 2

Page 3: Lecture  4 Networking Concepts ( cont )

Why layering?Dealing with complex systems: explicit structure allows identification,

relationship of complex system’s pieces layered reference model for discussion

modularization eases maintenance, updating of system change of implementation of layer’s service

transparent to rest of system e.g., change in gate procedure doesn’t

affect rest of system layering considered harmful?

Introduction 3

Page 4: Lecture  4 Networking Concepts ( cont )

Internet protocol stack application: supporting network

applications FTP, SMTP, HTTP

transport: process-process data transfer TCP, UDP

network: routing of datagrams from source to destination IP, routing protocols

link: data transfer between neighboring network elements Ethernet, 802.111 (WiFi), PPP

physical: bits “on the wire”

application

transport

network

link

physical

Introduction 4

Page 5: Lecture  4 Networking Concepts ( cont )

ISO/OSI reference model presentation: allow applications

to interpret meaning of data, e.g., encryption, compression, machine-specific conventions

session: synchronization, checkpointing, recovery of data exchange

Internet stack “missing” these layers! these services, if needed, must

be implemented in application needed?

applicationpresentation

sessiontransportnetwork

linkphysical

Introduction 5

Page 6: Lecture  4 Networking Concepts ( cont )

sourceapplicatio

ntransportnetwork

linkphysical

HtHn Msegment Ht

datagram

destinationapplicatio

ntransportnetwork

linkphysical

HtHnHl MHtHn MHt M

Mnetwork

linkphysical

linkphysical

HtHnHl MHtHn M

HtHn M

HtHnHl M

router

switch

Encapsulationmessage MHt M

Hnframe

Introduction 6

Page 7: Lecture  4 Networking Concepts ( cont )

Chapter 1: roadmap

1.1 What is the Internet?1.2 Network edge

end systems, access networks, links1.3 Network core

circuit switching, packet switching, network structure1.4 Delay, loss and throughput in packet-

switched networks1.5 Protocol layers, service models1.6 Networks under attack: security1.7 History

Introduction 7

Page 8: Lecture  4 Networking Concepts ( cont )

Network Security field of network security:

how bad guys can attack computer networks

how we can defend networks against attacks

how to design architectures that are immune to attacks

Internet not originally designed with (much) security in mind original vision: “a group of mutually trusting

users attached to a transparent network” Internet protocol designers playing “catch-

up” security considerations in all layers!

Introduction 8

Page 9: Lecture  4 Networking Concepts ( cont )

Alice and Bob are the good guys

Trudy is the bad guy Trudy is our generic “intruder” Who might Alice, Bob be?

… well, real-life Alices and Bobs Web browser/server for electronic transactions on-line banking client/server DNS servers routers exchanging routing table updates

The Cast of Characters

Page 10: Lecture  4 Networking Concepts ( cont )

Alice opens Alice’s Online Bank (AOB)

AOB must prevent Trudy from learning Bob’s balance Confidentiality (prevent unauthorized reading of information)

Trudy must not be able to change Bob’s balance

Bob must not be able to improperly change his own account balance Integrity (prevent unauthorized writing of information)

Alice’s Online Bank

Page 11: Lecture  4 Networking Concepts ( cont )

AOB’s information must be available when needed Availability (data is available in a timely manner when needed)

How does Bob’s computer know that “Bob” is really Bob and not Trudy?

When Bob logs into AOB, how does AOB know that “Bob” is really Bob? Authentication (assurance that other party is the claimed one)

Bob can’t view someone else’s account info Bob can’t install new software, etc.

Authorization (allowing access only to permitted resources)

Alice’s Online Bank

Page 12: Lecture  4 Networking Concepts ( cont )

Good guys must think like bad guys! A police detective

Must study and understand criminals

In network security We must try to think like Trudy We must study Trudy’s methods We can admire Trudy’s cleverness Often, we can’t help but laugh at Alice and Bob’s

carelessness But, we cannot act like Trudy

Think Like Trudy

Page 13: Lecture  4 Networking Concepts ( cont )

Security Services Enhance the security of data processing systems

and information transfers of an organization. Counter security attacks.

Security Attack Action that compromises the security of

information owned by an organization.

Security Mechanisms Designed to prevent, detect or recover from a

security attack.

Aspects of Security

Page 14: Lecture  4 Networking Concepts ( cont )

Enhance security of data processing systems and information transfers

Authentication Assurance that the communicating entity is the

one claimed

Authorization Prevention of the unauthorized use of a resource

Availability Data is available in a timely manner when needed

Security Services

Page 15: Lecture  4 Networking Concepts ( cont )

Confidentiality Protection of data from unauthorized disclosure

Integrity Assurance that data received is as sent by an

authorized entity

Non-Repudiation Protection against denial by one of the parties in a

communication

Security Services

Page 16: Lecture  4 Networking Concepts ( cont )

Bad guys: put malware into hosts via Internet

malware can get in host from a virus, worm, or trojan horse.

spyware malware can record keystrokes, web sites visited, upload info to collection site.

infected host can be enrolled in botnet, used for spam and DDoS attacks.

malware often self-replicating: from one infected host, seeks entry into other hosts

Introduction 16

Page 17: Lecture  4 Networking Concepts ( cont )

Trojan horse hidden part of some

otherwise useful software

today often in Web page (Active-X, plugin)

virus infection by receiving

object (e.g., e-mail attachment), actively executing

self-replicating: propagate itself to other hosts, users

worm: infection by passively

receiving object that gets itself executed

self- replicating: propagates to other hosts, users

Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)

Introduction 17

Bad guys: put malware into hosts via Internet

Page 18: Lecture  4 Networking Concepts ( cont )

Denial of Dervice (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic

1. select target2. break into hosts

around the network (see botnet)

3. send packets to target from compromised hosts

target

Introduction 18

Bad guys: attack server, network infrastructure

Page 19: Lecture  4 Networking Concepts ( cont )

The bad guys can sniff packets

Packet sniffing: broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records

all packets (e.g., including passwords!) passing by

A

B

C

src:B dest:A payload

Wireshark software used for end-of-chapter labs is a (free) packet-sniffer

Introduction 19

Page 20: Lecture  4 Networking Concepts ( cont )

The bad guys can use false source addressesIP spoofing: send packet with false source

addressA

B

C

src:B dest:A payload

Introduction 20

Page 21: Lecture  4 Networking Concepts ( cont )

The bad guys can record and playbackrecord-and-playback: sniff sensitive info (e.g.,

password), and use later password holder is that user from system point

of view

A

B

C

src:B dest:A user: B; password: foo

Introduction 21

… lots more on security (throughout, Chapter 8)

Page 22: Lecture  4 Networking Concepts ( cont )

In1957, a blind seven-year old, Joe Engressia Joybubbles, discovered a whistling tone that resets trunk lines Blow into receiver – free phone calls

Early Hacking – Phreaking

Cap’n Crunch cereal prizeGiveaway whistle produces 2600 MHz tone

Page 23: Lecture  4 Networking Concepts ( cont )

Robert Morris worm - 1988 Developed to measure the size of the Internet

• However, a computer could be infected multiple times Brought down a large fraction of the Internet

• ~ 6K computers

Academic interest in network security

The Eighties

Page 24: Lecture  4 Networking Concepts ( cont )

Kevin Mitnick First hacker on FBI’s Most Wanted list Hacked into many networks

• including FBI Stole intellectual property

• including 20K credit card numbers In 1995, caught 2nd time

• served five years in prison

The Nineties

Page 25: Lecture  4 Networking Concepts ( cont )

Code Red worm Jul 19, 2001: infected more than 359K computers

in less than 14 hours Sapphire worm

Jan 31, 2003: infected more than 75K computers (most in 10 minutes)

DoS attack on sco.com Dec 11, 2003: SYN flood of 50K packet-per-

second Nyxem/Blackworm virus

Jan 15, 2006: infected about 1M computers within two weeks

The Twenties

Page 26: Lecture  4 Networking Concepts ( cont )

Security Trends

www.cert.org (Computer Emergency Readiness Team)

Page 27: Lecture  4 Networking Concepts ( cont )

It is about secure communication Everything is connected by the Internet

There are eavesdroppers that can listen on the communication channels

Information is forwarded through packet switches which can be reprogrammed to listen to or modify data in transit

Tradeoff between security and performance

What is network security about ?

Page 28: Lecture  4 Networking Concepts ( cont )

Chapter 1: roadmap1.1 What is the Internet?1.2 Network edge

end systems, access networks, links1.3 Network core

circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks

1.5 Protocol layers, service models1.6 Networks under attack: security1.7 History

Introduction 28

Page 29: Lecture  4 Networking Concepts ( cont )

Internet History

1961: Kleinrock - queueing theory shows effectiveness of packet-switching

1964: Baran - packet-switching in military nets

1967: ARPAnet conceived by Advanced Research Projects Agency

1969: first ARPAnet node operational

1972: ARPAnet public

demonstration NCP (Network Control

Protocol) first host-host protocol

first e-mail program ARPAnet has 15 nodes

1961-1972: Early packet-switching principles

Introduction 29

Page 30: Lecture  4 Networking Concepts ( cont )

Internet History

1970: ALOHAnet satellite network in Hawaii

1974: Cerf and Kahn - architecture for interconnecting networks

1976: Ethernet at Xerox PARC

late70’s: proprietary architectures: DECnet, SNA, XNA

late 70’s: switching fixed length packets (ATM precursor)

1979: ARPAnet has 200 nodes

Cerf and Kahn’s internetworking principles: minimalism,

autonomy - no internal changes required to interconnect networks

best effort service model

stateless routers decentralized control

define today’s Internet architecture

1972-1980: Internetworking, new and proprietary nets

Introduction 30

Page 31: Lecture  4 Networking Concepts ( cont )

Internet History

1983: deployment of TCP/IP

1982: smtp e-mail protocol defined

1983: DNS defined for name-to-IP-address translation

1985: ftp protocol defined

1988: TCP congestion control

new national networks: Csnet, BITnet, NSFnet, Minitel

100,000 hosts connected to confederation of networks

1980-1990: new protocols, a proliferation of networks

Introduction 31

Page 32: Lecture  4 Networking Concepts ( cont )

Internet History

early 1990’s: ARPAnet decommissioned

1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)

early 1990s: Web hypertext [Bush 1945,

Nelson 1960’s] HTML, HTTP: Berners-Lee 1994: Mosaic, later Netscape late 1990’s:

commercialization of the Web

late 1990’s – 2000’s: more killer apps: instant

messaging, P2P file sharing

network security to forefront

est. 50 million host, 100 million+ users

backbone links running at Gbps

1990, 2000’s: commercialization, the Web, new apps

Introduction 32

Page 33: Lecture  4 Networking Concepts ( cont )

Internet History

2010: ~750 million hosts voice, video over IP P2P applications: BitTorrent (file sharing)

Skype (VoIP), PPLive (video) more applications: YouTube, gaming, Twitter wireless, mobility

Introduction 33

Page 34: Lecture  4 Networking Concepts ( cont )

Introduction: SummaryCovered a “ton” of

material! Internet overview what’s a protocol? network edge, core,

access network packet-switching

versus circuit-switching

Internet structure performance: loss,

delay, throughput layering, service models security history

You now have: context, overview,

“feel” of networking more depth, detail

to follow!

Introduction 34