networking kevin, ray, kelvin, stephan, norman, phil

36
Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Upload: ethel-holmes

Post on 23-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Networking

Kevin, Ray, Kelvin, Stephan, Norman, Phil

Page 2: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

History- ARPANET (Advanced Research Projects Agency

Network)- World's first operational packet-switching

network- Became the core network of what composes

the global Internet- Originally consisted of terminals in UCLA,

Standford, UCSB, and the University of Utah

Page 3: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

History

- DoD was concerned about our ability to survive a nuclear strike due to lack of a reliable communications network

- Paul Baran and Rand corp. say that most reliable would be a computer network which broke the message into units (packets) and sent them along to the destination

Page 4: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Networks As We Know Them Today

• A collection of computers and devices interconnected by communications channels that facilitate communications among users and allows user to share resources

• Source: http://en.wikipedia.org/wiki/Computer_network

Page 5: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Purposes of a Modern Network

• Facilitates communications– E-mail, IM’s, chat rooms

• Sharing hardware– A set of printers to be used by a whole office

• Sharing data• Sharing software– Running programs via a remote connection

Page 6: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Outline

• Kevin – Network• Ray – IP'S and Packets• Kelvin – Sockets• Stephan – Security • Norman – Hardware• Phil - Conclusion

Page 7: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

IP addressesAnd

Packets

Page 8: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

IP’S And Macs

• NIC has unique Mac address(physical address)

• IP address is logical

• IPv4 and IPv6

Page 9: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Packets

• All info on networks travel in packets

• Data is broken up and sent

• Each packet can take a different path

• Allows for best path

• Put back together when received

Page 10: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

EXAMPLE

Page 11: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Packet structure

• Fixed length and varying length

• Three main partso Header(most important)

o Data

o Trailer

• Have error checking

Page 12: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Header

• Contains all information about data being sent– Packet length

– Packet number

– Destination and origin

• Every packet contains header

• Can vary in size

Page 13: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Other parts

• Data section contains the data

• Trailer identifies end

• Check sum error checking– All words in the message are XOR

– Receiving end performs same operation and includes original XOR

– If not all zeros error occurred

Page 14: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Sockets

Page 15: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

What are sockets?

- Used for client/server interaction

- Mechanism for transfer of data

- Socket API is provided by the OS

- Interface between applications and networking and transfer protocols

Page 16: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

How do sockets work?

- Server process waits for client

- Server accepts and binds client

- Server waits for client request

- Server replies to request

- Close

Page 17: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

How do sockets work? (Diagram)

Link:

http://publib.boulder.ibm.com/infocenter/iseries/v5r4/topic/rzab6/rxab6500.gif

Page 18: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Accepting connections

- Usually threaded to listen on many ports

- Client sends a connection request

- Server binds the client using IP and port number- Analogous to telephone/ext

Page 19: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Transferring Data

- Sockets are identified by socket identifier, aka socket number

- OS decodes packets to determine socket number, then forwards payload to application

- Sockets are bidirectional

- Different kinds of sockets use different protocols (TCP/UDP/etc.)

Page 20: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Security

Page 21: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

What is it? Protection Layers of security Administrator privileges

Page 22: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

How does it work Authentication of user Firewall enforced policies What about worms and viruses? Need IPS or IDS Encryption

Page 23: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

IPS and IDS Intrusion Detection System(IDS)

Network Intrusion Detection System Host-based Intrusion Detection System NIDS HIDS

Page 24: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

IPS and IDS cont... Intrusion Prevention System(IPS) Improvement of IDS Classifications

NIPS – Network-based Intrusion Prevention WIPS – Wireless-based Intrusion Prevention NBA – Network Behavior Analysis HIPS – Host-based Intrusion Prevention

Page 25: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Detection Methods Signature-based Detection Statistical Anomaly-Based Detection Stateful Protocol Analysis Detection

Page 26: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Hardware

Page 27: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Network Interface Card

• Simply an I/O device• Sends and receives data to the network in the

form of packets• Will do DMA reads/writes directly to/from

main memory• Can generate headers, but this is usually done

by the CPU

Page 28: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Network Interface Card

• After creating the frame or packet, the OS will create a buffer descriptor which will tell where and how large the data is

• After creating the buffer descriptor, the OS will notify the NIC that it is ready

• The NIC will then do a DMA read for the descriptor and then for the actual frame

• The frame is then sent out to the network

Page 29: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Network Interface Card

• OS will also have the NIC keep buffer descriptors pointing to free space in main memory

• When a frame is received, it will do a DMA write to main memory

• It will then modify the descriptor to reflect the received data, DMA write it to memory, and notify the OS that a frame is ready

Page 30: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Drivers

• Handles the translation from standard I/O function calls to the hardware’s specific required software in order to run

• Can run in both kernel and user mode• Kernel mode used mainly for speed• User mode used mainly for stability

Page 31: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Hub

• Sends all packets to all other systems connected to it

• High tendency to cause data collisions– Collisions refer to when two or more systems send

data over the network, requiring the now-fragmented data to be retransmitted

Page 32: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Switch

• Like a hub, connects multiple systems together to form a new network

• Operates by forwarding data to specific systems on the network

• May be able to be piggy-backed, but may also require crossover cables

• Have unmanaged and managed modes where unmanaged refers to plug-and-play

Page 33: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Switch

• Avoids data collisions by sending data only to its intended destination as a full-duplex machine

• Keeps track of MAC addresses of each connected system (nodes) in a table

Page 34: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Router

• Connects networks together and forwards traffic between them

• Most have built-in switches• Performs the job of a computer which acts as

a gateway (much cheaper than the computer)

Page 35: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Router

ComputerInternet Switch

Computer

Computer

Computer

RouterInternet Switch

Computer

Computer

Computer

Internet Modern Router

Computer

Computer

Computer

Page 36: Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

Conclusion

What did we learn?