Lecture2
Lecture2
M. Z. Siddiqi
Computer communications & Networks
• Computers and networks only work with binary digits, i.e. “0” and “1”
• All of our data is stored and transmitted as a series of bits.
• The term bit is an abbreviation of “binary digit”
• Humans interpret words and pictures, computers interpret only patterns of
bits.
• A bit is stored and transmitted as one of two possible discrete states.
• Examples: two distinct voltage or current levels, two distinct levels of light
intensity, or any other physical system of two discrete states.
• A light switch can be either On or Off; in binary representation, these
states would correspond to 1 and 0 respectively.
Data communications
• Data communications are the exchange of data between two devices via some form
of transmission medium such as a wire cable. For data communications to occur, the
communicating devices made up of hardware (physical equipment) and software
(programs).
Fundamentals characteristics
Simplex
Half Duplex
Full Duplex
Networks
• Network criteria
• Performance: can be measured in transmit time and response time
• Transmit time: Time required for a message to travel from one device to another
• Response time: is the elapsed time between an inquiry and a response
• Common metrics: throughput and delay (both are contradictory why?)
• Reliability:
• The frequency of failure, the time it takes a link to recover from a failure
• Data transmitted should be received as it is
• Security
• Protecting data from unauthorized access
• protecting data from damage and development,
• implementing policies and procedures for recovery from breaches and data
losses.
Network Criteria
• A network layout/design
• Relationship of links and devices
• Goal: high throughput, high network energy efficiency, and low latency
• Throughput: maximum amount of information (bits/second) that can be
transmitted along a channel
• Energy efficiency: is the ratio of high spectral efficiency to total power
consumption
• Latency: trans maximum amount of information (bits/second) that can be
transmitted along a channel mission time from one point to another
Network Criteria
• What is the propagation time and the transmission time for a 2.5 KB message (email) if
the bandwidth of the network is 1 Gbps? Assume that the distance between the sender
and receiver is 12,000 km, and the light travels at 2.4 x 108 m/s.
Solution: Given: distance: 12000 km, message size = 2.5 KB = 2500 Byte
a) Propagation speed: 2.4 x 108 m/s
Propagation time: = distance / speed
12000×1000 12×106 12
= = =
2⋅4×108 2⋅4×108 2⋅4×102
12
= = 50 msec
240
b) transmission time = message size/ bandwidth
= (2500 x 8)/1 x 109
= 0.020 msec
Example
• Solution:
Given: Bw = 10 Mbps, frames = 15000 pminute
and one frame = 8000 bits,
This implies that Bits data = 15000 x 8000 = 120 x 10 ^6 bits per minute
And bits data = 120 x 10^6 / 60 = 2 Mbps
Example:
• A line has a signal-to-noise ratio of 1000 and a bandwidth of 4000 KHz. What is the maximum data rate
supported by this line?
• Categories
Network configurations
Bus
Mesh
Star Ring
Network types
• Two entities cannot simply send bit streams to each other and expect to be understood. For
communication to occur, the entities must agree on a protocol.
• A protocol is a set of rules to govern communications, it defines what is communicated, how it is
communicated, and when it is communicated.
• Key elements of a protocol are syntax, semantics, and timing.
• Syntax
• Refers to the structure or format of the data (order in which they are presented)
• For example, the first 8 bits of data represents the address of the sender, the second 8 bits to
be the address of the receiver, and the rest of the stream to be the message itself
• Semantics
• Refers to the meaning of each section of bits
• How is a particular pattern to be interpreted, and what action is to be taken based on that
interpretation?
• For example, does an address identify the route to be taken or the final destination of the
message?
Protocols and Standards
• Timing
• Refers to two characteristics: when data should be sent and how fast they can be sent.
• For example, if a sender produces data at 100 Mbps but the receiver can process data at
only 1 Mbps, the transmission will overload the receiver and some data will be lost
• Standards
• Essential in creating and maintaining an open and competitive market for equipment
manufacturers
• Guaranteeing national & international interoperability of data & telecommunication technology
& process.
• Standards committees: IEEE, ITU-T, ISO, ANSI
• Regulatory agency/ies
• Purpose of these agencies is to protect the public interest by regulating radio,
television, and wire/cable communications.
• FCC (Federal communications commissions)
Network Operations
Protocol Layering
Hierarchi
cal y?
Layered Tasks
• Error correction
• Flow control
• Addressing
• Multiplexing
• Naming
• Congestion control
• Mobility
• Routing
• Fragmentation
• Security
Exchange of Data Communication
Exchange of Data Communication
• Physical Layer
• Bits transmission from one node to another
• type of the transmission media (twisted-pair, coax, optical fiber, air)
• bit representation (voltage levels of logical values)
- data rate (speed)
- synchronization of bits (time synchronization)
OSI Layers
• Network Layer
• Network addressing
• IP tagging
• Source and destination IP addressing
• Transforms segments in packets
OSI Layer
• Transport layer
• Data converted in segments
• Reliable/unreliable delivery
• TCP / UDP
• Process to process delivery
• Congestion control
• Error control
• Delivery of message from
One process to another
OSI Layer
• Confidentiality
• Packet sniffing
• Integrity
• Session hijacking
• Availability
• Denial of services
• Common
• Address translation poisoning attack
• Routing attacks
Concrete Security Problems
• Defenses
• Static ARP table
• DHCP snooping ((security feature at layer 2 devices, prevents unauthorized
DHCP server to access the network)
• Detection: Arpwatch (sending email when updates occur),
• Legitimate use
• Redirect a user to a registration page before
allow usage of the network
Internet Protocol
• IP packet format
• Additional information included in TCP/IP format
IP Traffic
• Sequence number
• If the SYN flag is set, then this is the initial sequence number. The sequence number
of the actual first data byte is this sequence number plus 1.
• If the SYN flag is clear, then this is the accumulated sequence number of the first data
byte of this packet for the current session.
• Acknowledgement number
• If the ACK flag is set then this the next sequence number that the receiver is
expecting.
• This acknowledges receipt of all prior bytes (if any).
TCP Hand Shake
TCP Sequence Prediction Attack
• A, B trusted connection
• Send packets with predictable seq numbers
• E impersonates B to A
• Open connection to A to get initial sequence number
• DoS B’s queue
• Sends packets to A that resemble B’s transmission
• E cannot receive, but may execute commands on A
Prevention: Firewall
Risk from Session Hijacking
• Reflection
• Find big sites with lots of resources, send packets with spoofed source address,
response to victim
• PING => PING response
• SYN => SYN-ACK
• Pulsing zombie floods
• Each zombie active briefly, then goes dormant
• Zombies taking turns attacking
• Making tracing difficult
Hiding DDoS attack solution