0% found this document useful (0 votes)
29 views22 pages

CCN Lecture 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views22 pages

CCN Lecture 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Computer Communication

Networks
Lecture 3
Protocol “layers” and reference models

• Networks are complex, with many “pieces”


▪ hosts
▪ routers
▪ links of various media
▪ applications
▪ protocols
▪ hardware, software
Example: organization of air travel
Layered Internet protocol stack
• Network hardware and software implement the
protocols in layers

*Application and transport layers are typically implemented in software


*Network layer is often a mixed implementation of software and hardware
*Link and Physical layers are implemented in network interface cards
Application Layer
• Includes:
HTTP – Hypertext Transfer Protocol
Web document request and transfer
IMAP – Internet Message Access Protocol
To access emails
SMTP – Simple Mail Transfer Protocol
To send emails
DNS – Domain Name Systems
Internet’s directory
www.chess.com -> 32 bit network address
Transport Layer
• Transport protocols
1. TCP – Transmission Control Protocol
- connection oriented service
- guaranteed delivery of application-layer
messages
2. UDP – User Datagram Protocol
- connectionless service
- no reliability, no flow control, no congestion
control
3. QUIC – designed by Jim Roskind at Google
Network Layer, Link Layer, Physical Layer

• Network Layer: host-host data transfer


- IP protocol
- many routing protocol
• Link Layer: used for data transfer between
neighboring network elements
- Ethernet
- WiFi or IEEE 802.11
PPP – Point to point protocol
• Physical Layer:
- protocol for moving bits through the layer
Services, Layering and Encapsulation
Services, Layering and Encapsulation
Services, Layering and Encapsulation
Services, Layering and Encapsulation
Encapsulation: an end-end view
Hosts implement all the layer

Link-layer switches implement bottom 2 layers

Routers implement bottom 3 layers


Networks under attack
packet “sniffing”:
▪ broadcast media (shared Ethernet LAN, wireless)
▪ Bad actor could read/record all packets (e.g.,
including passwords!) passing by

Wireshark software used for our end-of-chapter labs


is a (free) packet-sniffer
Bad guys: fake identity
IP spoofing: bad actor could inject
packet with false source address
A C

src:B dest:A payload

We need end-point authentication


to solve this problem
Denial of Service (DoS) attack
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic

1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target
from compromised
hosts
Real time attack map
• To find real time internet attack map please visit
the following website

https://livethreatmap.radware.com/
Lines of defense
▪ authentication: proving you are who you say you are
• cellular networks provides hardware identity via SIM
card; no such hardware assist in traditional Internet
▪ confidentiality: via encryption
▪ integrity checks: digital signatures prevent/detect
tampering
▪ access restrictions: password-protected VPNs
▪ firewalls: specialized “middleboxes” in access and core
networks:
▪ off-by-default: filter incoming packets to restrict
senders, receivers, applications
▪ detecting/reacting to DOS attacks
Internet Engineering Task Force (www.ietf.org)
▪ multiple stakeholders: “ ... a large
open international community of
network designers, operators,
vendors, and researchers
concerned with the evolution of
the Internet architecture and the 32 bits

smooth operation of the Internet.” ver head. type of


len service length
fragment

▪ process: working groups, twice a


16-bit identifier flgs
offset
time to upper header
live layer checksum
year open IETF meetings source IP address

• “rough consensus and running destination IP address

options (if any)


code”
▪ Requests for Comments (RFCs)
payload data
(variable length,
typically a TCP
• “technical standards” defining Internet or UDP segment)

protocols (e.g., IP, TCP, UDP, HTTP)


IP datagram format (RFC 791)
• > 9000 RFCs to date
3rd Generation Partnership Project (www.3gpp.org)

▪ alliance of 7 global
telecommunications standards
groups
• 745 member companies
▪ 16 working groups, in three technical
areas:
• radio access network
• service/systems aspects
• core network, terminals
▪ technical specifications:3G, 4G (LTE),
5G cellular networks
▪ 18 “releases” (like OS “release”), over
three “generations”: 3G, 4G, 5G
IEEE standards
▪ IEEE: professional organization for
electrical engineers
• standards subgroup manages standards
process, industry typically participates
▪ wired Ethernet standard (802.3)
▪ wireless WiFi standard (802.11)
Source: https://www.statista.com/
• See the youtube video:
- Explore a Google data center with street view
• Find the speed of your internet connection
- www.speedtest.net
• Wireshark Lab:
- Download and install the software from
www.wireshark.org

You might also like