Introduction To CN-Parte-4
Introduction To CN-Parte-4
If you use these slides (e.g., in a class) that you mention their
source (after all, we’d like people to use our book!)
If you post any slides on a www site, that you note that they are
adapted from (or perhaps identical to) our slides, and note our
copyright of this material.
Computer
For a revision history, see the slide note for this page.
Networking: A Top-
Thanks and enjoy! JFK/KWR
Down Approach
All material copyright 1996-2020 8th edition
J.F Kurose and K.W. Ross, All Rights Reserved
Jim Kurose, Keith Ross
Pearson, 2020
Introduction: 1-1
Network security
field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to
attacks
Internet not originally designed with (much)
security in mind
• original vision: “a group of mutually trusting users
attached to a transparent network”
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Introduction: 1-99
Bad guys: malware
malware can get in host from:
• virus: self-replicating infection by
receiving/executing object (e.g., e-mail attachment)
• worm: self-replicating infection by passively
receiving object that gets itself executed
spyware malware can record keystrokes, web sites
visited, upload info to collection site
infected host can be enrolled in botnet, used for spam
or distributed denial of service (DDoS) attacks
Introduction: 1-100
Bad guys: denial of service
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate
traffic by overwhelming resource with bogus traffic
1. select target
2. break into hosts
around the
network (see
botnet) target
3. send packets to
target from
compromised hosts
Introduction: 1-101
Bad guys: packet interception
packet “sniffing”:
broadcast media (shared Ethernet, wireless)
promiscuous network interface reads/records all
packets (e.g., including passwords!) passing by
A C
A C
source destination
Introduction: 1-111
Services, Layering and Encapsulation
M
application application
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) from
one process to another, using services of network layer
transport
Hn Ht M
network Network-layer protocol transfers transport-layer
network
segment [Ht | M] from one host to another,
using link layer services
link link
§ network-layer protocol encapsulates
transport-layer segment [Ht | M] with
physical network layer-layer header Hn to create a physical
network-layer datagram
• Hn used by network layer protocol to
source implement its service destination
Introduction: 1-112
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
Hn Ht M
network Network-layer protocol transfers transport-layer segment [H t
network
| M] from one host to another, using link layer services
Hl Hn Ht
link M
link
Link-layer protocol transfers datagram [H n| [Ht
|M] from host to neighboring host, using
network-layer services physical
physical
§ link-layer protocol encapsulates network
datagram [Hn| [Ht |M], with link-layer
source header Hl to create a link-layer frame destination
Introduction: 1-113
Encapsulation
Matryoshka dolls (stacking dolls)
switch
destination Hn Ht M network
M application
Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-115
Chapter 1: roadmap
What is the Internet?
What is a protocol?
Network edge: hosts, access
network, physical media
Network core: packet/circuit
switching, internet structure
Performance: loss, delay,
throughput
Security
Protocol layers, service models
History
Introduction: 1-116
Internet history
1961-1972: Early packet-switching principles
1961: Kleinrock - queueing 1972:
theory shows effectiveness • ARPAnet public demo
of packet-switching
• NCP (Network Control
1964: Baran - packet- Protocol) first host-host
switching in military nets protocol
1967: ARPAnet conceived • first e-mail program
by Advanced Research
Projects Agency
• ARPAnet has 15 nodes
1969: first ARPAnet node
operational
Introduction: 1-117
Oct 29 1969:
un día histórico!
Internet history
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite
network in Hawaii Cerf and Kahn’s
1974: Cerf and Kahn - internetworking principles:
minimalism, autonomy - no
architecture for interconnecting
networks internal changes required
to interconnect networks
1976: Ethernet at Xerox PARC
best-effort service model
late70’s: proprietary stateless routing
architectures: DECnet, SNA, XNA
decentralized control
late 70’s: switching fixed length
packets (ATM precursor) define today’s Internet
architecture
1979: ARPAnet has 200 nodes
Introduction: 1-119
Internet history
1980-1990: new protocols, a proliferation of networks
1983: deployment of new national networks:
TCP/IP CSnet, BITnet, NSFnet,
1982: smtp e-mail Minitel
protocol defined 100,000 hosts connected to
1983: DNS defined for confederation of networks
name-to-IP-address
translation
1985: ftp protocol defined
1988: TCP congestion
control
Introduction: 1-120
Internet history
1990, 2000s: commercialization, the Web, new applications
Introduction: 1-122
Summary
We’ve covered a “ton” of
material!
Internet overview
what’s a protocol? You now have:
network edge, access network, core context,
• packet-switching versus circuit- overview,
switching vocabulary,
• Internet structure “feel” of
performance: loss, delay, networking
throughput more depth,
layering, service models
detail, and fun to
security follow!
history
Introduction: 1-123
Wireshark
application
(www browser,
packet
email client)
analyzer
application
OS
packet Transport (TCP/UDP)
capture copy of all Network (IP)
Ethernet frames Link (Ethernet)
(pcap) sent/received
Physical
Introduction: 1-124