CCN Lecture 3
CCN Lecture 3
Networks
Lecture 3
Protocol “layers” and reference models
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target
from compromised
hosts
Real time attack map
• To find real time internet attack map please visit
the following website
https://livethreatmap.radware.com/
Lines of defense
▪ authentication: proving you are who you say you are
• cellular networks provides hardware identity via SIM
card; no such hardware assist in traditional Internet
▪ confidentiality: via encryption
▪ integrity checks: digital signatures prevent/detect
tampering
▪ access restrictions: password-protected VPNs
▪ firewalls: specialized “middleboxes” in access and core
networks:
▪ off-by-default: filter incoming packets to restrict
senders, receivers, applications
▪ detecting/reacting to DOS attacks
Internet Engineering Task Force (www.ietf.org)
▪ multiple stakeholders: “ ... a large
open international community of
network designers, operators,
vendors, and researchers
concerned with the evolution of
the Internet architecture and the 32 bits
▪ alliance of 7 global
telecommunications standards
groups
• 745 member companies
▪ 16 working groups, in three technical
areas:
• radio access network
• service/systems aspects
• core network, terminals
▪ technical specifications:3G, 4G (LTE),
5G cellular networks
▪ 18 “releases” (like OS “release”), over
three “generations”: 3G, 4G, 5G
IEEE standards
▪ IEEE: professional organization for
electrical engineers
• standards subgroup manages standards
process, industry typically participates
▪ wired Ethernet standard (802.3)
▪ wireless WiFi standard (802.11)
Source: https://www.statista.com/
• See the youtube video:
- Explore a Google data center with street view
• Find the speed of your internet connection
- www.speedtest.net
• Wireshark Lab:
- Download and install the software from
www.wireshark.org