1 / 28

Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian -Rad

Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian -Rad. University of California at Riverside and Texas Tech University July 14- 18, 2014 Supported by National Science Foundation. Overview of Computer Networks. mobile network.

takara
Download Presentation

Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian -Rad

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Summer Workshop on Cyber SecurityComputer Networks Security (Part 1)Dr. HamedMohsenian-Rad University of California at Riverside and Texas Tech University July 14- 18, 2014 Supported by National Science Foundation

  2. Overview of Computer Networks mobile network • Internet: Millions of • connected computing devices: • End systems / Hosts • (Running Net Apps) • Communication Links • (Wired or Wireless) • Routers and Switches • (Forward “Packets”) global ISP home network regional ISP institutional network Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  3. Overview of Computer Networks mobile network • Network of Networks • ISPs • Institutional Networks • Home Networks • Mobile Networks • Internet Protocols: • Control Sending & • Receiving of Messages • E.g.: TCP, IP, HTTP, 802.11 global ISP home network regional ISP institutional network Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  4. What is a Protocol? • Human Protocol: • “What time is it?”, “I have a question.”, … • Network Protocols: • Machines instead of humans. Protocolsdefine formatand orderof messages sent and receivedamong network entities, and actions taken on message transmission and message receipt. Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  5. Get http://www.awl.com/kurose-ross Got the time? 2:00 What is a Protocol? • Protocols define the interaction sequences over time: Hi TCP connection request Hi TCP connection response <file> Time Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  6. Protocol Layers • Networks are complex with many “pieces”: • Hosts • Routers • Wired Links • Wireless Links • Applications • Protocols • Hardware • Software • … Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  7. Protocol Layers • Networks are complex with many “pieces”: • Hosts • Routers • Wired Links • Wireless Links • Applications • Protocols • Hardware • Software • … Q: How can we organize the structure of networks? Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  8. ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Example: Organization of Air Travel • A series of steps are taken at different “layers”: Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  9. airplane routing airplane routing Example: Organization of Air Travel • Each layer implements a “service”: • Via its own “internal-layer” actions. ticket ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing baggage gate takeoff/landing airplane routing departure airport intermediate air-traffic control centers arrival airport Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  10. Internet Protocol Stack Application Transport Network Link Physical There are five layers in Internet Protocol Stack with different functionalities and protocols. Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  11. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  12. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  13. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  14. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  15. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP Application Transport Network Link Physical They all use TCP Protocol for “reliable” data transmission. (Socket Programming) (Each socket has a port #) Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  16. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP • Network: Routing from source to destination • IP, Routing Protocols Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  17. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP • Network: Routing from source to destination • IP, Routing Protocols Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  18. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP • Network: Routing from source to destination • IP, Routing Protocols Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  19. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP • Network: Routing from source to destination • IP, Routing Protocols • Link: Routing from source to destination • Ethernet, IEEE 802.11 (WiFi) Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  20. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP • Network: Routing from source to destination • IP, Routing Protocols • Link: Routing from source to destination • Ethernet, IEEE 802.11 (WiFi) Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  21. Internet Protocol Stack • Application: Supporting network apps • FTP, HTTP, SMTP, Skype • Transport: Process-to-process data transfer • TCP, UDP • Network: Routing from source to destination • IP, Routing Protocols • Link: Routing from source to destination • Ethernet, IEEE 802.11 (WiFi) • Physical: Bit-by-bit transmission Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  22. Packets • Network communications are essentially 0-1 bit streams: • But we break down bit streams to small bit chunks = packets. • The packet at each layer: • Can have different names (frame, segment, etc.) • Can have different sizes Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  23. Packets Message Application Transport Network Link Physical Application Transport Network Link Physical Segment Datagram Frame Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  24. Packet Headers • Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  25. Packet Headers • Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  26. Packet Headers • Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Segment Message HT Used by TCP and UDP Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  27. Packet Headers • Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Datagram Message HT HN Used by IP, Routing Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

  28. Packet Headers • Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Used by Ethernet, … HN HL Message HT Frame Summer Workshop on Cyber Security July 14 - 18 , 2014 – Network Security, UCR & TTU

More Related