CS526: Information Security Chris Clifton

Size: px
Start display at page:

Download "CS526: Information Security Chris Clifton"

Transcription

1 CS526: Information Security Chris Clifton November 13, 2003 Network Security Network Security: What is the Problem? Name examples of security breaches Morris Worm viruses (many) CS526, Fall

2 Network Security: What is it? What is the purpose of a network? Move bits from A to B Securely A Network B CS526, Fall Securely means Confidentiality Only A and B see bits Integrity Message intact Really from A Order? Availability B gets it in time A Network B CS526, Fall

3 Network Security: What is the Problem? Were our examples Network security failures? Morris Worm viruses (many) CS526, Fall Confidentiality Encryption Integrity Digital Signatures Retransmission Order? Availability Quality of Service Network Security: Mostly Solved! CS526, Fall

4 Network Security: What s all the fuss? Firewalls Solve poor internal security using the network Intrusion Detection Detect non-network security breaches accomplished via the network Early start on forensics CS526, Fall Network Security: What is interesting? Distributed Authentication Scaling issues Autonomy Distributed Cooperation Commit Fault tolerance Availability Denial of service But first: State of practice CS526, Fall

5 Typical corporate network Intranet Firewall Mail forwarding Demilitarized Zone (DMZ) File Server Web Server Web Server DNS (DMZ) Mail server DNS (internal) Firewall User machines User machines User machines Internet CS526, Fall Network Regions Internet Intranet DMZ Network Boundaries Firewall Typical network: Terms Filtering firewall: Based on packet headers Audit mechanism Proxy Proxy firewall: Gives external view that hides intranet CS526, Fall

6 Issues IP: Intranet hidden from outside world Internal addresses can be real Proxy maps between real address and firewall Fake addresses: 10.b.c.d, 172.[16-31].c.d, c.d Network Address Translation Protocol maps internal to assigned address Mail Forwarding Hide internal addresses Map incoming mail to real server Additional incoming/outgoing checks CS526, Fall Firewalls: Configuration External Firewall What traffic allowed External source: IP restrictions What type of traffic: Ports (e.g., SMTP, HTTP) Proxy between DMZ servers and internet Proxy between inner and outer firewall Internal Firewall Traffic restrictions: Ports, From/to IP Proxy between intranet and outside CS526, Fall

7 DMZ Administration Direct console access required? Real hassle Special access SSH connections allowed from internal to DMZ administration connections Only from specified internal IPs Only through internal firewall CS526, Fall Distributed Authentication Authentication has been covered But does it scale? Scaling Issues: Repeat authentication Multiple administrators CS526, Fall

8 Repeat authentication: Kerberos Kerberos developed at MIT in the 1980s Project Athena: clusters of publicly available computers for student/faculty use Shared file service log in anywhere Problem: how to ensure user logging in at A authorized to use resources at B? Solution: ticket as credential Ticket server Client Client address Valid time Session key Encrypted with ticket server s key CS526, Fall Kerberos Authentication Example Client sends to Authentication Server Client name, Ticket server name Authentication Server returns Client: {k client,ticket server } k client password, ticket client, ticket server Client performs similar exchange with ticket server Ticket contains session key, only ticket server can decrypt Now client has session key and ticket for service Message includes ticket and encrypted generation time as signature CS526, Fall

9 Kerberos: Problems Subject to replay attacks Relies on clock synchronization Window of opportunity based on maximum message delay Standard password attacks Password used to decrypt initial authenticator ticket Some fixed fields enable verifying if password broken CS526, Fall The Next Problem: Multiple Administration Domains Problem: Many users We know how to authenticate But how to administer? Solution: Hierarchical directories X.500, LDAP, Active Directory CS526, Fall

10 X.500: What is it? Goal: Global white pages Lookup anyone, anywhere Developed by Telecommunications Industry ISO standard directory for OSI networks Idea: Distributed Directory Application uses Directory User Agent to access a Directory Access Point CS526, Fall Issues How is name used? Access resource given the name Build a name to find a resource Information about resource Do humans need to use name? Construct and Recall Is resource static? Resource may move Change in location may change name Performance requirements Human-scale CS526, Fall

11 Directory Information Base (X.501) Tree structure Root is entire directory Levels are groups Country Organization Individual Entry structure Unique name Build from tree Attributes: Type/value pairs Schema enforces type rules Alias entries CS526, Fall Directory Entry Organization level CN=Purdue University L=West Lafayette Person level CN=Chris Clifton SN=Clifton TITLE=Associate Professor CS526, Fall

12 Query: Directory Operations (X.511) Read get selected attributes of an entry Compare does an entry match a set of attributes List children of an entry Search portion of directory for matching entries Abandon request Modification add, remove, modify entry Modify distinguished name CS526, Fall Distributed Directory (X.518) Directory System Agent May have local data Can forward requests to other system agents Can process requests from user agents and other system agents Referrals If DSA can t handle request, can make request to other DSA Or tell DUA to ask other DSA CS526, Fall

13 Access Control Directory information can be protected Two issues: Authentication (X.509) Access control (X.501) Standards specify basic access control Individual DSA s can define their own CS526, Fall Replication (X.525) Single entries can be replicated to multiple DSAs One is master for that entry Two replication schemes: Cache copies On demand Shadow copies Agreed in advance Copies required to enforce access control When entry sent, policy must be sent as well Modifications at Master only Copy can be out of date Each entry must be internally consistent DSA giving copy must identify as copy CS526, Fall

14 Protocols (X.519) Directory Access Protocol Request/response from DUA to DSA Directory System Protocol Request/response between DSAs Directory Information Shadowing Protocol DSA-DSA with shadowing agreement Directory Operational binding management Protocol Administrative information between DSAs CS526, Fall Uses Look-up Attributes, not just Distinguished Name Context Humans can construct likely names Browsing Yellow pages Aliases Search restriction/relaxation Groups Multi-valued member attribute Authentication information contained in directory E.g., password attribute CS526, Fall

15 LDAP vs. X.500 Lightweight Directory Access Protocol Supports X.500 interface Doesn t require OSI protocol IETF RFC 2251, 2256 X.500 for the internet crowd Useful as generic addressing interface Netscape address book System logon identification/authentication CS526, Fall The Next Problem: Multiple Administration Domains Problem: Many users We know how to authenticate But how to administer? Solution: Hierarchical directories X.500, LDAP, Active Directory Still not enough Is every administrator in the hierarchy enforcing our policy? Think this is an interesting area of research? Talk to Prof. Ninghui Li CS526, Fall

16 CS526: Information Security Chris Clifton November 18, 2003 Network Security Attacks and Defense Confidentiality on the network manageable Encryption to protect transmission Public key cryptography / key management to verify recipient Integrity reducible to single system Digital signatures verify source Commit protocols handle network failure What about Availability? CS526, Fall

17 Network Attacks Flooding Overwhelm TCP stack on target machine Prevents legitimate connections Routing Misdirect traffic Spoofing Imitate legitimate source But we know how to handle this! CS526, Fall What is a Flood attack? Limit availability by Overwhelming service by following service s protocol Perhaps not exactly Examples SYN flood Overwhelms TCP stack attacks CS526, Fall

18 Syn Flood TCP connection multistep SYN to initiate SYN+ACK to respond ACK gets agreement Sequence numbers then incremented for future messages Ensures message order Retransmit if lost Verifies party really initiated connection We ll get back to this CS526, Fall Syn Flood Implementation Receive SYN Allocate connection Acknowledge Wait for response See the problem? What if no response And many SYNs All space for connections allocated None for legitimate ones Time? CS526, Fall

19 Solution Ideas Limit connections from one source? But source is in packet, can be faked Ignore connections from illegitimate sources If you know who is legitimate Can figure it quickly And the attacker doesn t know this Drop oldest connection attempts Adaptive timeout CS526, Fall Network Solutions TCP intercept Router establishes connection to client When connected establish with server Synkill Monitor machine as firewall Good addresses: history of successful connections Bad addresses: previous timeout attempt Block and terminate attempts from bad addresses CS526, Fall

20 Protocol solutions Problem: Server maintaining state Runs out of space Solution: Don t maintain state on server How does it know sequence numbers? Encrypt in SYN response h(source,destination,random)+sequence+time Client increments this and ACKs Server subtracts h(), time to get sequence Knows if this is in valid range CS526, Fall Service-Level Flooding Overload server Processing Storage Typically garbage requests using legitimate protocol Large s to victim Many http connections Heavy use of scripts Often exploit flaws in service implementation Self-replicating attacks CS526, Fall

21 Solutions Limit traffic from any source Still open to distributed attacks Quality of Service Guarantee service to known good sites Careful Programming Don t allow service to defeat itself Throttling Limit traffic to any service Protects other services on same host CS526, Fall IP-Spoofing Start with SYN flood to spoofed client Open connection from spoofing client to server Real client fails to respond Should terminate Spoofing client sends ACK Must guess Sequence Number S CS526, Fall

22 CS526: Information Security Chris Clifton November 18, 2003 Network Security (slides courtesy Wenke Lee) Note to 1 st year SFS students (only) Interested in Summer internship? Independent study or thesis next year? Did the ITSEC/Common Criteria lectures interest you? If so, please talk to me after class CS526, Fall

23 Routing Routers/ Switches SRC I want to know the shortest path DST So, the routers must exchange local information! CS526, Fall IP Routing Routing is based on network addresses Routers use forwarding table Destination, next hop, network interface, metric Table look-up for each packet Need to recognize address structure Routing information exchange allows computation of new routes, which is used to update the forwarding table CS526, Fall

24 Routing Protocol Framework - Information Model OSPF RIB RIPv2 RIB BGP4 RIB Forwarding Information Base FIB FIB (Dest, NextHop, Routing Metrics) Forwarding Algorithm NPDU Header (Network Protocol Data Unit) Forwarding Decision CS526, Fall Routing Information Link State: I have these links to XYZ (routers or networks); their current status is (e.g., delay) Distance Vector: I can get to XYZ (networks) in m hops CS526, Fall

25 Every node sends its neighbor a vector: the # of hops of reaching each B other node. A Distribution of Routes - Distance Vector C CS526, Fall Link State A node sends to its neighbors the state of its directly connected links: up/down and costs. Each node that receives the information forwards it to all its neighbors. CS526, Fall

26 Routing Security Routing Information Exchange correctness of Routing Information Base Interface between RIB and FIB configuration, FIB update etc. Kernel-Level (IP): Packet Forwarding Is the packet forwarded according to the FIB? CS526, Fall RIP Routing information protocol is a simple distance vector protocol Initialization: When the routing daemon is initialized, it sends requests through each network interface Neighboring routers will reply with routing table information Updates: Routers advertise tables with neighbors periodically (~30 seconds); or triggered by route changes. CS526, Fall

27 RIP - Cont d To prevent route oscillation, existing routes are retained until a new one is discovered with strictly lower cost Split-Horizon Update Routers do not advertise a route on an interface from which it learned of the route in the first place! CS526, Fall Properties: RIP Good news travels fast; Bad news travels slowly Routing loop, routing inconsistency, and slow convergence Security: Ripv2 provides simple password authentication Black hole routers possible CS526, Fall

28 Route Convergence - good news A: 0 A: 1 A: 2 A: 3 A: 4 A: G1 G2 G3 G4 G5 G1 happily advertises route to network A with distance 1 G2-G5 G5 quickly learns the good news and install the routes CS526, Fall A: 0 A: 3 A: 2 A: 3 A: 4 A: Route Convergence - bad news G1 G2 G3 G4 G5 G1 s s link to A goes down G1 learns a better route via G2 Packets going to A through G2 will loop between G2 and G1 G1 and G2 will find the cost of their routes to A slowly count to infinity Use a number, e.g., 16, to approximate infinity Split horizon only prevents loops involving two nodes CS526, Fall

29 A B Black DHole E A: 3 hops B: 2 hops C: 2 hops You: G F Who won t t jump on a better route? C Your Neighbor: H A: 1 hop C C lies easily about routes to A Your neighbor and you look into the routes CS526, Fall Food for Thought... RIP implicitly assumes: every router is trusted and so are routing information packets Every router is entitled to tell others I have a short cut to Pluto that is just one hop Is it possible to prevent RIP black hole attacks? Is is possible to detect RIP black routers? CS526, Fall

30 One possible improvement Predecessor is the second-to-last network is the path from the source to the destination Inclusion of predecessor allows implicit reconstruction of the whole path Helps to validate the integrity of distance CS526, Fall Predecessor A: B B A D E A: B A: B You: G A: F A: B F A: B C A: 1 hop A: B Your Neighbor: H A: B 4 B: D 3 C: C 1 D: G 2 E: G 2 F: B 4 G: G 1 CS526, Fall

31 OSPF Link State routing protocol (RFC1583) Routers are organized in domains and areas Hello message for neighbor acquisition Link State information are flooded through the whole area A topology database is maintained by every router CS526, Fall Important LSA Fields Advertising router ID (originator) Advertised link or network ID Sequence number [0x ,0x7fffffff] Age [0, 60 minutes] CS526, Fall

32 When to Originate a LSA? Upon link state changes, or Upon timer expiration CS526, Fall Questions to Ask: How do you know one LSA is fresher than the other? An LSA originated by you will be received by every router; will you receive the LSA originated by you? Will the sequence number wrap-around around cause any problem? (i.e., == 0x7fffffff) Age ==> 1 hour CS526, Fall

33 Sequence #: old vs. new LSAs 0x ATM Next: 0x Only accept LSAs with newer/larger Seq#. CS526, Fall Sequence# & Self-Stabilization (2). router crashes. (3). 0x (1). 0x up (5). 0x ATM up (4). 0x an old copy still exists! CS526, Fall

34 Flushing via Premature Aging Specified behavior when Seq# # wraps around: (1),(2),(3) (1) 0x7FFFFFFF MaxSeq# ATM (2) 0x7FFFFFF with MaxAge to purge this entry. (3) 0x CS526, Fall Attack the Routing Infrastructure (Vicious Advertising Routers) Flooding up up EVIL! 1. up ==> down 2. not exist ==> up up up Impact varies depending on how critical the link is to the world! CS526, Fall

35 Attack the Routing Infrastructure (Vicious Intermediate Routers) Flooding up down All the links can be attacked EVIL! up down Authentication, please come to the rescue! CS526, Fall Exchanging without LSA Signature? If attackers can just change the content of LSAs without being detected, the routers must use all LSAs with care! Seq# ATM CS526, Fall

36 Fight-Back - Originator Reaction Seq# (1) 0x ATM (3) 0x fight-back (2) 0x seq++ attack CS526, Fall Signature - How Critical? Observations: Prolonged fight-back will not happen in real attacks What s preventing the attacker from using LS_seq=MaxSeq? Can you prevent false LSA without signature? Can you determine who did it after you realize that you ve been fooled without signature? What needs to be signed by whom anyway? CS526, Fall

37 OSPF Security Strength In most benign cases, if something goes wrong, the advertising router will detect it and try to correct it by generating new LSAs The attackers have to persistently inject bad LSAs in order for it to stick Self-Stabilization Protocols: force the attackers to perform persistent attacks CS526, Fall Detection of Hit-and-Run vs. Persistent Attacks Hit-and-Run Attacks: Hard to Detect/Isolate Inject one (or very few) bad packet but cause lasting damaging effect Persistent Attacks: Attackers have to continuously inject attack packets in order to inflict significant damages OSPF type of Link State protocols are resilient to hit-and-run attacks CS526, Fall

38 Secure Protocol/system Design? If we can force the attackers to launch persistent attacks, we have a better chance to detect and isolate the attack sources OSPF flooding coupled with periodic LSA does a fairly good job because it is refreshing link state persistently! What other implications do flooding have on security? CS526, Fall

Routing Protocol Framework Information Model. Operation Model Routing Information Exchange

Routing Protocol Framework Information Model. Operation Model Routing Information Exchange Routing Protocol Framework Information Model OSPF RIPv2 BGP4 Routing Information Base Forwarding Information Base RIB FIB FIB RIB (Dest, NextHop, Routing Metrics) Forwarding Algorithm NPDU Header (Network

More information

Internet Routing Security Issues

Internet Routing Security Issues Internet Routing Security Issues Z. Morley Mao Lecture 3 Jan 13, 2005 Z. Morley Mao, Winter 2005, CS589 1 Lecture outline Recap of last lecture, any questions? Existing routing security mechanisms - SBGP

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

(Refer Slide Time: 01:08 to 01:25min)

(Refer Slide Time: 01:08 to 01:25min) COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

CompSci 356: Computer Network Architectures. Lecture 12: Dynamic routing protocols: Link State Chapter Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 12: Dynamic routing protocols: Link State Chapter Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 12: Dynamic routing protocols: Link State Chapter 3.3.3 Xiaowei Yang xwy@cs.duke.edu Today Routing Information Protocol Link-state routing Algorithm

More information

Lecture 12: Link-state Routing. Lecture 12 Overview. Router Tasks. CSE 123: Computer Networks Chris Kanich. Routing overview

Lecture 12: Link-state Routing. Lecture 12 Overview. Router Tasks. CSE 123: Computer Networks Chris Kanich. Routing overview Lecture : Link-state Routing CSE 3: Computer Networks Chris Kanich Lecture Overview Routing overview Intra vs. Inter-domain routing Link-state routing protocols CSE 3 Lecture : Link-state Routing Router

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

Closed book. Closed notes. No electronic device.

Closed book. Closed notes. No electronic device. 414-S17 (Shankar) Exam 3 PRACTICE PROBLEMS Page 1/6 Closed book. Closed notes. No electronic device. 1. Anonymity Sender k-anonymity Receiver k-anonymity Authoritative nameserver Autonomous system BGP

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 20: Intrusion Prevention Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Firewalls purpose types locations Network perimeter

More information

Internet Protocol and Transmission Control Protocol

Internet Protocol and Transmission Control Protocol Internet Protocol and Transmission Control Protocol CMSC 414 November 13, 2017 Internet Protcol Recall: 4-bit version 4-bit hdr len 8-bit type of service 16-bit total length (bytes) 8-bit TTL 16-bit identification

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Routing Protocols. Autonomous System (AS)

Routing Protocols. Autonomous System (AS) Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?

More information

Distance vector and RIP

Distance vector and RIP DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4

More information

CSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes

CSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes CSE 46 Routing Routing Focus: How to find and set up paths through a network Distance-vector and link-state Shortest path routing Key properties of schemes Application Transport Network Link Physical Forwarding

More information

CompSci 356: Computer Network Architectures. Lecture 13: Dynamic routing protocols: Link State Chapter 3.3.3, Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 13: Dynamic routing protocols: Link State Chapter 3.3.3, Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 13: Dynamic routing protocols: Link State Chapter 3.3.3, 3.2.9 Xiaowei Yang xwy@cs.duke.edu Today Clarification on RIP Link-state routing Algorithm Protocol:

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities Flashback.. Internet design goals Security Part One: Attacks and Countermeasures 15-441 With slides from: Debabrata Dash,Nick Feamster, Vyas Sekar 15-411: F08 security 1 1. Interconnection 2. Failure resilience

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Topology. Youki Kadobayashi NAIST. Outline. Routing system: its function. Gateway Model Revisited. Routing system: its structure

Topology. Youki Kadobayashi NAIST. Outline. Routing system: its function. Gateway Model Revisited. Routing system: its structure Information Network 1 Routing (1) Topology Topology 1: 2a (1): a branch of mathematics concerned with those properties of geometric configurations (as point sets) which are unaltered by elastic deformations

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

CSc 466/566. Computer Security. 18 : Network Security Introduction

CSc 466/566. Computer Security. 18 : Network Security Introduction 1/81 CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:57:28 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source

More information

Computer Security and Privacy

Computer Security and Privacy CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC D* (DNS, and DNSSEC and DDOS) Geoff Huston APNIC How to be bad 2 How to be bad Host and application-based exploits abound And are not going away anytime soon! And there are attacks on the Internet infrastructure

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015 Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2630 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

ETSF05/ETSF10 Internet Protocols Routing on the Internet

ETSF05/ETSF10 Internet Protocols Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source

More information

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture Lecture outline Internet Routing Security Issues Z. Morley Mao Lecture 3 Jan 14, 2003 Recap of last lecture, any questions? Existing routing security mechanisms - SBGP General threats to routing protocols

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Network Control, Con t

Network Control, Con t Network Control, Con t CS 161 - Computer Security Profs. Vern Paxson & David Wagner TAs: John Bethencourt, Erika Chin, Matthew Finifter, Cynthia Sturton, Joel Weinberger http://inst.eecs.berkeley.edu/~cs161/

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Lecture 06 2016/2017 IPv4 routeing. Static routeing and dynamic routeing. Routeing protocols: RIP, RIPv2, EIGRP and OSPF. Autonomous systems and route redistribution Instituto

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Securing BGP. Geoff Huston November 2007

Securing BGP. Geoff Huston November 2007 Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture

More information

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013 Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,

More information

Data Plane Protection. The googles they do nothing.

Data Plane Protection. The googles they do nothing. Data Plane Protection The googles they do nothing. Types of DoS Single Source. Multiple Sources. Reflection attacks, DoS and DDoS. Spoofed addressing. Can be, ICMP (smurf, POD), SYN, Application attacks.

More information

Integrating WX WAN Optimization with Netscreen Firewall/VPN

Integrating WX WAN Optimization with Netscreen Firewall/VPN Application Note Integrating WX WAN Optimization with Netscreen Firewall/VPN Joint Solution for Firewall/VPN and WX Platforms Alan Sardella Portfolio Marketing Choh Mun Kok and Jaymin Patel Lab Configuration

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 156-210 Title : Check Point CCSA NG Vendors : CheckPoint Version : DEMO

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

EE 122: Network Security

EE 122: Network Security Motivation EE 122: Network Security Kevin Lai December 2, 2002 Internet currently used for important services - financial transactions, medical records Could be used in the future for critical services

More information

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Determine relevance of

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

RIP Version 2. The Classless Brother

RIP Version 2. The Classless Brother RIP Version 2 The Classless Brother (C) Herbert Haas 2005/03/11 1 Why RIPv2 Need for subnet information and VLSM Need for Next Hop addresses for each route entry Need for external route tags Need for multicast

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100 You should worry if you are below this point Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /0 * 100 o Optimistic: (Your

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

COSC 301 Network Management

COSC 301 Network Management COSC 301 Network Management Lecture 21: Firewalls & NAT Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 21: Firewalls & NAT 1 Today s Focus How to protect an intranet? -- Firewall --

More information

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 11 October 2018 Midterm on Tues Announcements 1 HW#4 Review maine.edu created? What is a

More information

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS : Computer Networks Lecture 6: Apr 5, 2004 Naming and DNS Any problem in computer science can be solved with another layer of indirection David Wheeler Naming is a layer of indirection What problems does

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

Network Security. Tadayoshi Kohno

Network Security. Tadayoshi Kohno CSE 484 (Winter 2011) Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 1 AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 2 Introduction (1/2) TCP provides a full duplex reliable stream connection between two end points A connection is uniquely defined by the quadruple

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 4.1.1 What are the three distance vector routing protocols? What are the key characteristics of RIP? What are the key characteristics of IGRP?

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

Finding Feature Information

Finding Feature Information This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

ICMP, ARP, RARP, IGMP

ICMP, ARP, RARP, IGMP Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

CS603: Distributed Systems

CS603: Distributed Systems CS603: Distributed Systems Lecture 2: Client-Server Architecture, RPC, Corba Cristina Nita-Rotaru Lecture 2/ Spring 2006 1 ATC Architecture NETWORK INFRASTRUCTURE DATABASE HOW WOULD YOU START BUILDING

More information