Network Layer, Link Layer, and Network Security Summary

Similar documents
b. Suppose the two packets are to be forwarded to two different output ports. Is it

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Position of IP and other network-layer protocols in TCP/IP protocol suite

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Problem Set 8 Due: Start of Class, November 16

CPSC 424/624 Exam 2 Solutions closed book, notes, computer Spring 2015 (Note: there are no questions that are just for 624 students)

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Internet Protocol (IP)

cs144 Midterm Review Fall 2010

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

EE-311 Data Communication & Networks

Lecture 8. Network Layer (cont d) Network Layer 1-1

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

End-to-End Communication

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

CS 458 Internet Engineering Spring First Exam

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

CSCI Computer Networks Fall 2016

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Chapter 8 Network Security

First Semester Examinations 2015/16 (Model Solution) INTERNET PRINCIPLES

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

IP : Internet Protocol

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

ECE 461 Internetworking Fall Quiz 1

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

IPv4. Christian Grothoff.

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

Router Architecture Overview

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

14. Internet Security (J. Kurose)

Chapter 20 Network Layer: Internet Protocol 20.1

Networks Homework # 2

The Internet Protocol (IP)

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Network Layer/IP Protocols

TSIN02 - Internetworking

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

HY 335 Φροντιστήριο 8 ο

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science and Engineering

Chapter 5. The Network Layer

COSC4377. Chapter 8 roadmap

Chapter 7. Local Area Network Communications Protocols

Networking Fundamentals

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 09 Network Protocols

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Network Layer. Chapter 5 Section 5.1, 5.3, 5.5, 5.6. CS 360 Spring 2012 Pacific University

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Networking Background

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Chapter 4: Network Layer

Network layer: Overview. Network Layer Functions

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. Cohort: BIS/16B/FT & BCNS/16B/FT

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CSC 4900 Computer Networks: Security Protocols (2)

Topics for This Week

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES

Networking: Network Layer

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

The Internet. The Internet is an interconnected collection of netw orks.

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers

IP Routing & Bridging

CS 3516: Advanced Computer Networks

NETWORK LAYER: IP Addressing

Networking: Network layer

EEC-484/584 Computer Networks

TCP/IP Protocol Suite

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga

Internetworking Part 2

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

Review of Important Networking Concepts

ECE 4450:427/527 - Computer Networks Spring 2017

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP).

Transcription:

CPSC 826 Internetworking, Link Layer, and Network Security Summary http://www.cs.clemson.edu/~mweigle/courses/cpsc826 1 Chapter 4, 5, 8 Topics» Forwarding and Routing» Router Architecture» Internet Protocol (IP)» Routing Algorithms» Routing in the Internet Link Layer» Addressing» Hubs vs. Switches vs. Routers Network Security» Cryptography» Authentication» Key Distribution and Certification 2

Forwarding and Routing» What is the main difference between forwarding and routing?» What routers are involved in forwarding? routing?» How does the routing algorithm interact with the forwarding table? Router Architecture» What are the four main parts of every router?» Where can queuing occur in a router? What is the cause of the queuing?» Where does queuing due to network congestion occur in a router?» Where are AQM techniques applied in a router? 3 IP How many bytes of IP header (assuming no options are used) are appended to each IP datagram? How many bytes of TCP header (again, assuming no options) are appended to each TCP segment? What causes datagram fragmentation? Where is fragmentation and reassembly done (at endpoints, at routers, at both endpoints and routers)? Given a large datagram that will be fragmented and the MTU, give the values of the flag, offset, and size IP header fields. Why do many TCP implementations try to avoid IP fragmentation by setting the MSS to 536 (and why does this value work)? 4

IP Given an IP address in binary, convert it to dotteddecimal notation. What is a subnet? Given a network diagram and IP addresses, identify the subnets. What are the valid IP host addresses for a given CIDR address? What are the advantages of NAT? Given a network and a list of connections, fill in the NAT table. 5 Routing Algorithms What is the goal of a routing algorithm? Give an example of a global routing algorithm and of a decentralized routing algorithm. Given a network, compute the link-state algorithm table. Can the link-state algorithm result in a routing loop? Can the distance-vector algorithm? What causes the count-to-infinity problem in the distance vector algorithm? What mechanism can avoid the count-to-infinity problem in the distance-vector algorithm? What s the main idea behind it? What are the main differences between the link-state algorithm and the distance-vector algorithm? 6

Routing in the Internet What is an AS? Can a gateway router run multiple routing algorithms? If so, what types of routing algorithms do gateway routers run? What are the two major intra-as routing protocols? Is RIP a link-state or distance-vector algorithm? Is OSPF a link-state or distance-vector algorithm? What is the main inter-as routing protocol? Do all gateway/backbone routers in the Internet have to run the same routing protocol? Do all interior routers in the Internet have to run the same routing protocol? Do all interior routers in the same AS have to run the same routing protocol? 7 Link Layer What is a MAC address? How are MAC addresses assigned? How can a host find the MAC address for an interface if it knows its IP address? Why does a host need to know another host s MAC address? Given a network with two subnets, show the IP and MAC level source and destination addresses for a packet traveling between the subnets. Can a machine on a LAN connected with a hub snoop packets from other machines on the LAN? Can a machine on a LAN connected with a switch snoop packets from other machines on the LAN? 8

Network Security Cryptography What is the main difference between symmetric key and public key cryptography? Given the key to a Caesar cipher and ciphertext, decrypt the message. What is the difference between a Caesar cipher and a monoalphabetic cipher? Given a monoalphabetic cipher and a plaintext message, encrypt the message. What algorithm standard is a symmetric key encryption algorithm? 9 Network Security Cryptography Describe how public key encryption and decryption work. What is the main public key encryption standard algorithm? Given values for p, q, e and plaintext, use RSA to encrypt the plaintext. Can public key encryption work in reverse? What could that be used for? 10

Network Security Authentication / Key Distribution and Certification Given a data transfer scenario between Alice and Bob, show how Trudy could interfere. What is the purpose of a key distribution center (KDC)? What is the purpose of a certification authority (CA)? 11