Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Size: px
Start display at page:

Download "Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017"

Transcription

1 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017

2 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware Memory volatile (RAM) and non-volatile (ROM, NVRAM, flash, solid-state) Processor Peripheral devices keyboard, monitor, etc. Software instructions that can be stored and run by hardware Virtual Machine emulation of a computer run on virtualized hardware

3 Computer vs Network The value of computing has nearly been tapped out. Value in the information economy is driven by the networked connection of computers. Computers enabled us to more efficiently store, retrieve, and process data. Networked connections enable the efficient sharing of information between billions of devices. VS.

4 How does data travel between sources? Open Systems Interconnect () Model Internet Protocol Suite () Conceptual models for communication systems Standard protocols that enable communication between diverse computing functions Partitions systems into abstraction layers Each layer serves the needs of the layers directly above and below it Data from each layer needs not be aware of those layers not directly above or below

5 How does data travel between sources? User computer has data to be sent. Data is processed through protocol stack layers. Binary data is converted to electrical signals on a wire.

6 Network Interface Physical Layer Physical media connection between devices (e.g. ethernet, wifi) Data is transformed into binary values (1 s and 0 s) that correspond to electrical signals

7 Digital Signaling Electrical signal that represents a sequence of discrete values Binary 0 and 1 digits (aka bits ) represented by alternation of discrete waveforms Alternations occur in amplitude, frequency, or phase of waves Binary Data Amplitude-Shift Keying Frequency-Shift Keying Phase-Shift Keying

8 Binary Addressing Binary numbers are represented by 0 s and 1 s Decimal numbers represented by digits 0 through 9 IPv4 Addresses are 32 bits and are represented in four blocks of 8 bits in decimal notation, e.g., (note maximum 8 bit number is 255)* Hexadecimal numbers represented by 16 digits (0-9, a-e) MAC Addresses use 8 bit hexadecimal octet notation (e.g. a0:99:9b:1b:87:33) Addresses are used to determine traffic destinations across networks *Maximum number of addresses = 2 32 = 4,294,967,296

9 Decimal Notation Each bit represents a different decimal value 8 bits in each dotted decimal byte Each byte sums to a decimal value 0 through

10 Hexadecimal Notation 8 bits in each hexadecimal octet byte Each byte represents two hexadecimal digits a0:99:9b:1b:87:

11 Network Interface Data Link Layer Media Access Control (MAC) Unique identification address of a computer s network interface 48 bit address divided into 6 groups of 2 hexadecimal digits e.g. a0:99:9b:1b:87:33 = Determines destination of traffic on local network Each host on a segment has a unique MAC address and knows its neighbors addresses Traffic destined for local neighbors addressed directly to that neighbor Traffic destined outside local segment is sent to default gateway router 6 - Presentation 4 - Application

12 Network Interface Data Link Layer

13 Network Internet Layer Host Addressing and Identification IPv4 32 bit addresses (e.g., ) 4.3 billion usable addresses 32 possible binary values = 2 32 Less reserved addresses private, link-local, loopback, multicast, and testing Public IP addressing exhausted in 2011 Private IP addressing IPv6 128 bit addresses (e.g. 2001:db8:85a3:8d3:1319:8a2e:370:7348) Solution to exhaustion of IPv4 public address space 42 undecillion* usable addresses (4.2 x ) 128 possible binary values = Less reserved addresses private, link-local, loopback, multicast, and testing *Trillion, Quadrillion, Quintillion, Sextillion, Septillion, Octillion, Nonillion, Decillion, Undecillion

14 Network Internet Layer Packet Routing Various routing protocols used to route packets across best possible path from source to destination

15 Routing Protocols Specify how routers communicate with each other to determine best path for traffic between any two nodes on a network Each router has only knowledge of its directly connected neighbors Routing protocol shares network topology first among immediate neighbors then throughout the entire network Interior Gateway Protocols Share routing information within a local network Examples Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), Routing Information Protocol (RIP) Exterior Gateway Protocols 6 - Presentation Share routing information between local networks, i.e. across internet Border Gateway Protocol (BGP) 4 - Application

16 Transport Layer Basic channel for data exchange Type of traffic protocol is defined and marked with a port number by upper layers. A virtual channel is created between two hosts based off of this protocol marking. Traffic marked with a protocol is considered interesting to each session channel. Uninteresting traffic can be ignored by that channel. Most familiar protocols have a TCP or UDP port # SMTP (25), POP3 (110), IMAP (143) Domain Name Service (53) HTTP (80), HTTPS (443) 6 - Presentation 4 - Application

17 Application Layer Application layer protocols are sets of standards for diverse communication systems to exchange data and provide user services Applications are unaware of and indifferent to lower or layers other than the transport layer connection (i.e. network, data link, and physical layers). All that is necessary for applications to communicate is a session established by transport layer. Examples of Protocols Domain Name Service (DNS) Hypertext Transfer Protocol (HTTP) Virtual Private Network (VPN) 6 - Presentation 4 - Application

18 Composition and Transfer of Information A single message is broken down into many digestible size pieces of application data and encapsulated at each protocol stack layer to be passed along to the next layer then forwarded to its destination. Application Layer Data Segment Transport Layer Data Header Packet Network Layer Segment Header Data Link Layer Physical Layer Frame Packet Header Presentation 4 - Application

19 Public Key Infrastructure (PKI) Set of roles, policies and procedures to manage the use of public-key encryption and digital certificates Almost all secure internet services use PKI (e.g., , HTTPS, TLS, VPN) Authentication public key used to verify identity of message sender Confidentiality only holder of the private key can decrypt message encrypted with public key, once encrypted message can not be tampered with Non-repudiation recipient is not able to deny the receipt 6 - Presentation of message 4 - Application

20 Public Key Infrastructure (PKI) Public-Key Encryption Unique public-private key pair created by each user Private key encrypts and public key decrypts Private key is held only by its creator Public key is held by a trusted certificate authority to be used by those communicating with the owner of the key pair Digital Certificate Certificate authority verifies the identity of the owner of the certificate Certificate is signed by private key, so only its legitimate owner can use it 6 - Presentation 4 - Application

21 Public Key Infrastructure (PKI) Source:

22 Public Key Infrastructure (PKI) Source:

23 Domain Name Service (DNS) Phonebook for the internet, translates human-friendly domain names into computer-friendly IP addresses Plays a role in just about every internet service we use

24 Domain Name Service (DNS) DNS Servers exist in a hierarchy with root servers controlling each type of top-level domain (e.g.,.com,.edu,.gov) Subordinate publicly and privately controlled resolvers accept requests from hosts for internet addresses

25 Simple Mail Transfer Protocol (SMTP) used to send from host to local mail server and between mail servers Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP) used to deliver from mail server to destination host POP3 delivers message and deletes from server IMAP stores message on server, as used in webmail Public Key Infrastructure (PKI) provides authentication via digital signatures and confidentiality via encryption

26 1. Bob generates SMTP format message to Alice and sends to his local mail server.

27 2. Local mail server resolves destination domain name (unc.edu) and sends to remote mail server using SMTP.

28 3. Remote server stores message in Alice s mailbox.

29 4. Alice picks up message from mail server when she logs on using POP3 or IMAP.

30 Hypertext Transfer Protocol (HTTP) Request-response protocol in client-server computing model Client identifies website host using DNS then requests resources from host IP address Foundation protocol for data transmission over the worldwide web

31 Virtual Private Network (VPN) Provides confidentiality, integrity, and authentication of information exchanged over network Point-to-point VPN Secure connection ( tunnel ) established between two network appliances, often using IPSec Tunnel serves similar to transport layer connection Client-Based VPN (SSL/TLS/HTTPS) Terms often used synonymously Secure Sockets Layer Predecessor to current protocols, less secure due to support for only older key exchange algorithms (e.g., RSA) Transport Layer Security Tunnel serves as connection similar to transport layer channel Accessed via client-based application such as AnyConnect Supports modern key exchange algorithms (e.g., elliptic curve cryptography) HTTPS HTTP over SSL/TLS Traditional HTTP communication takes place over a secure channel created by TLS Clientless application accessed via web browser 6 - Presentation 4 - Application

32 Virtual Private Network (VPN) TLS Handshake

Networking Theory CSCI 201 Principles of Software Development

Networking Theory CSCI 201 Principles of Software Development Networking Theory CSCI 201 Principles of Software Development Jeffrey Miller, Ph.D. jeffrey.miller@usc.edu Networking Overview IP Addressing DNS Ports NAT Subnets DHCP Test Yourself Outline USC CSCI 201L

More information

Module 13. IPv6 Addressing

Module 13. IPv6 Addressing Module 13 IPv6 Addressing Objectives 1. 2.3 Explain the Properties and characteristics of TCP/IP IPv6 2 INTRODUCTION TO IPV6 3 IPv4 Addresses: 32 Bits 4 1.IPv4 address: 192.168.1.10 A.Four bytes or octets

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

Network Layer, Link Layer, and Network Security Summary

Network Layer, Link Layer, and Network Security Summary CPSC 826 Internetworking, Link Layer, and Network Security Summary http://www.cs.clemson.edu/~mweigle/courses/cpsc826 1 Chapter 4, 5, 8 Topics» Forwarding and Routing» Router Architecture» Internet Protocol

More information

Chapter 6: Security of higher layers. (network security)

Chapter 6: Security of higher layers. (network security) Chapter 6: Security of higher layers (network security) Outline TLS SET 1. TLS History of TLS SSL = Secure Socket Layer defined by Netscape normalized as TLS TLS = Transport Layer Security between TCP

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁 I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality

More information

Cisco Interconnecting Cisco Networking Devices Part 2

Cisco Interconnecting Cisco Networking Devices Part 2 Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 R1# show running-config description ***Loopback*** ip address 192.168.1.1 255.255.255.255 Question: 374 description **Connected to R1-LAN**

More information

Internet Routing Protocols Part II

Internet Routing Protocols Part II Indian Institute of Technology Kharagpur Internet Routing Protocols Part II Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 8: Internet routing protocols Part

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 640-911 Exam Questions & Answers Number: 640-911 Passing Score: 825 Time Limit: 120 min File Version: 24.8 http://www.gratisexam.com/ Cisco 640-911 Exam Questions & Answers Exam Name: Introducing

More information

Size of Storage Number of Bits Decimal Range Range, From 0 to 2 n 1. Short Description Hard Disk USB Flash Drive Optical Disc

Size of Storage Number of Bits Decimal Range Range, From 0 to 2 n 1. Short Description Hard Disk USB Flash Drive Optical Disc 12 Appendix Memory Tables Answer Key hapter 1 TABLE 1-1 Kilobyte, Megabyte, Gigabyte, Terabyte Term Size (Bytes) Size (2 n Bytes) Rounded Size (Bytes) Kilobyte 1024 2 10 1000 Megabyte 1,048,576 2 20 1,000,000

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

Networking Background

Networking Background Networking Background CMSC 414 October 30, 2017 General Overview We are going to take a quick look at What a network protocol is The abstract design of the network The 7-Layer network stack Protocols We

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Introduction to Computer Science 2017 Networking. Sören Schwertfeger

Introduction to Computer Science 2017 Networking. Sören Schwertfeger Sören Schwertfeger Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network of networks

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Domain 1.0 Network Technologies

Domain 1.0 Network Technologies ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 1.0 Network Technologies Chapter 1 1.1 Explain the function of common networking protocols TCP TCP is a connection oriented protocol that provides

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

ICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics

ICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics ICS 351: Today's plan OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics OSPF OSPF generally used within a single Autonomous System (AS), i.e. within an organization

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure

More information

CSE 461 Midterm Winter 2018

CSE 461 Midterm Winter 2018 CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at

More information

Networking and TCP/IP. John Kalbach November 8, 2004

Networking and TCP/IP. John Kalbach November 8, 2004 Networking and TCP/IP John Kalbach kalbach@psu.edu November 8, 2004 Topology Bus Ethernet, Wireless Star ATM, Switched Ethernet, Gigabit Ethernet Ring Token Ring, FDDI DS Digital Signals Speeds DS 0 64Kbs

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Chapter 4: Routing Concepts. Routing & Switching

Chapter 4: Routing Concepts. Routing & Switching Chapter 4: Routing Concepts Routing & Switching Routers are Computers Routers are specialized computers containing the following required components to operate: Central processing unit (CPU) Operating

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model [Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) 2. What is the purpose of Layer-3-Switches

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet

More information

CSE543 Computer and Network Security Module: Network Security

CSE543 Computer and Network Security Module: Network Security CSE543 Computer and Network Security Module: Network Security Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Communication Security Want to establish a secure channel

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Networking 101 By: Stefan Jagroop

Networking 101 By: Stefan Jagroop Networking 101 By: Stefan Jagroop The Internet The Internet is governed by a series of protocols that form the rules for how communications should happen The Internet is a network of networks. There is

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

01/17/08 TDC /17/08 TDC363-03

01/17/08 TDC /17/08 TDC363-03 Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

Fundamentals of Computer Networking AE6382

Fundamentals of Computer Networking AE6382 Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually

More information

IPv6 migration challenges and Security

IPv6 migration challenges and Security IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int

More information

University of Southern California EE450: Introduction to Computer Networks

University of Southern California EE450: Introduction to Computer Networks University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

BTEC Level 3 Extended Diploma

BTEC Level 3 Extended Diploma BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information