Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.

Similar presentations


Presentation on theme: "Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks."— Presentation transcript:

1 Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks

2 Introduction 1-2 Lecture 1: roadmap 1.1 What is the Internet? 1.6 Networks security 1.7 Internet History

3 Introduction 1-3 What’s the Internet: “nuts and bolts” view  millions of connected computing devices: hosts = end systems  running network apps Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular handheld wired links access points  communication links  fiber, copper, radio, satellite  transmission rate = bandwidth  routers: forward packets (chunks of data)

4 Introduction 1-4 “Cool” internet appliances World’s smallest web server http://research.sun.com/spotlight/2004-12-20_vgupta.html IP picture frame http://www.ceiva.com/ Web-enabled toaster + weather forecaster Internet phones

5 Introduction 1-5 What’s the Internet: “nuts and bolts” view  protocols control sending, receiving of msgs  e.g., TCP, IP, HTTP, Skype, Ethernet  Internet: “network of networks”  loosely hierarchical  public Internet versus private intranet  Internet standards  RFC: Request for comments  IETF: Internet Engineering Task Force Home network Institutional network Mobile network Global ISP Regional ISP

6 Introduction 1-6 What’s the Internet: a service view  communication infrastructure enables distributed applications:  Web, VoIP, email, games, e-commerce, file sharing  communication services provided to apps:  reliable data delivery from source to destination  “best effort” (unreliable) data delivery

7 Introduction 1-7 What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt

8 Introduction 1-8 What’s a protocol? a human protocol and a computer network protocol: Q: Other human protocols? Hi Got the time? 2:00 TCP connection request TCP connection response Get http://www.awl.com/kurose-ross time

9 Introduction 1-9 Lecture 1: roadmap 1.1 What is the Internet? 1.6 Network security 1.7 Internet History

10 Introduction 1-10 Network Security  attacks on Internet infrastructure:  infecting/attacking hosts: malware, spyware, worms, unauthorized access (data stealing, user accounts)  denial of service: deny access to resources (servers, link bandwidth)  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”  Internet protocol designers playing “catch-up”  Security considerations in all layers!

11 Introduction 1-11 What can bad guys do: malware?  Spyware:  infection by downloading web page with spyware  records keystrokes, web sites visited, upload info to collection site  Virus  infection by receiving object (e.g., e-mail attachment), actively executing  self-replicating: propagate itself to other hosts, users  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)

12 Introduction 1-12 Denial of service attacks  attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see malware) 3. send packets toward target from compromised hosts target

13 Introduction 1-13 Sniff, modify, delete your packets Packet sniffing:  broadcast media (shared Ethernet, wireless)  promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload  Ethereal software used for end-of-chapter labs is a (free) packet-sniffer  more on modification, deletion later

14 Introduction 1-14 Masquerade as you  IP spoofing: send packet with false source address A B C src:B dest:A payload

15 Introduction 1-15 Masquerade as you  IP spoofing: send packet with false source address  record-and-playback : sniff sensitive info (e.g., password), and use later  password holder is that user from system point of view A B C src:B dest:A user: B; password: foo

16 Introduction 1-16 Masquerade as you  IP spoofing: send packet with false source address  record-and-playback : sniff sensitive info (e.g., password), and use later  password holder is that user from system point of view A B later ….. C src:B dest:A user: B; password: foo

17 Introduction 1-17 Lecture 1: roadmap 1.1 What is the Internet? 1.6 Network security 1.7 Internet History by Peter Steiner, New York, July 5, 1993

18 Introduction 1-18 Internet History  1961: Kleinrock - queueing theory shows effectiveness of packet- switching  1964: Baran - packet- switching in military nets  1967: ARPAnet conceived by Advanced Research Projects Agency  1969: first ARPAnet node operational  1972:  ARPAnet public demonstration  NCP (Network Control Protocol) first host-host protocol  first e-mail program  ARPAnet has 15 nodes 1961-1972: Early packet-switching principles

19 Introduction 1-19 Internet History  1970: ALOHAnet satellite network in Hawaii  1974: Cerf and Kahn - architecture for interconnecting networks  1976: Ethernet at Xerox PARC  ate70’s: proprietary architectures: DECnet, SNA, XNA  late 70’s: switching fixed length packets (ATM precursor)  1979: ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles:  minimalism, autonomy - no internal changes required to interconnect networks  best effort service model  stateless routers  decentralized control define today’s Internet architecture 1972-1980: Internetworking, new and proprietary nets

20 Introduction 1-20 Internet History  1983: deployment of TCP/IP  1982: smtp e-mail protocol defined  1983: DNS defined for name-to-IP- address translation  1985: ftp protocol defined  1988: TCP congestion control  new national networks: Csnet, BITnet, NSFnet, Minitel  100,000 hosts connected to confederation of networks 1980-1990: new protocols, a proliferation of networks

21 Introduction 1-21 Internet History  Early 1990’s: ARPAnet decommissioned  1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)  early 1990s: Web  hypertext [Bush 1945, Nelson 1960’s]  HTML, HTTP: Berners-Lee  1994: Mosaic, later Netscape  late 1990’s: commercialization of the Web Late 1990’s – 2000’s:  more killer apps: instant messaging, P2P file sharing  network security to forefront  est. 50 million host, 100 million+ users  backbone links running at Gbps 1990, 2000’s: commercialization, the Web, new apps

22 Introduction 1-22 Internet History Today  ~500 million hosts  Voice, Video over IP  P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video)  more applications: YouTube, gaming  wireless, mobility

23 Introduction 1-23 Lecture 1: Summary Covered  Internet overview  what’s a protocol?  network security  Internet history


Download ppt "Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks."

Similar presentations


Ads by Google