The Diffie-Hellman Key Exchange

Similar documents
Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

Multimedia networking: outline

of-service Support on the Internet

Improving QOS in IP Networks. Principles for QOS Guarantees

Mohammad Hossein Manshaei 1393

Network Layer Enhancements

Quality of Service (QoS)

Real-Time Protocol (RTP)

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097

Real-Time Control Protocol (RTCP)

Introduction to computer networking

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data

Multimedia networking: outline

Mul$media Networking. #10 QoS Semester Ganjil 2012 PTIIK Universitas Brawijaya

Internet Services & Protocols. Quality of Service Architecture

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Network and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015

Network Protocols and Architectures

CSEN 503 Introduction to Communication Networks

Week 7: Traffic Models and QoS

Part 1: Introduction. Goal: Review of how the Internet works Overview

CS 204: Advanced Computer Networks

Network Support for Multimedia

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time

Common network/protocol functions

ECE 4400:427/527 - Computer Networks Spring 2017

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources)

Chapter 1. Computer Networks and the Internet

Chapter 1 Introduction

Multicast and Quality of Service. Internet Technologies and Applications

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.

Lecture 2: Internet Structure

Advanced Computer Networks

CS 471G Friday, 11 January Introduction 2-1

Telematics 2 & Performance Evaluation

Internet Routing. Review of Networking Principles. What s the Internet: nuts and bolts view. Communication links

Internet Routing. Review of Networking Principles

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking Introduction

Chapter I: Introduction

Computer Communication Networks

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Fundamentals of Information Systems

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

CSCI Spring Final Exam Solution

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

Computer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks

CSC 401 Data and Computer Communications Networks

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:

Chapter 1: Introduction

Lecture 16: Network Layer Overview, Internet Protocol

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSE3213 Computer Network I

Packet Scheduling and QoS

Web Protocols and Practice

Multimedia Networking

JAMES F. KUROSE AND KEITH W. ROSS

Lecture Outline. Bag of Tricks

Network Programming I Computer Network Design

RSC Part I: Introduction

Multimedia Networking. Protocols for Real-Time Interactive Applications

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Computer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols. Assignments INTERNET CONTROL MESSAGE PROTOCOL

COMP 431 Internet Services & Protocols. A Whirlwind Introduction to the Internet ( Networking Nouns and Verbs ) Jasleen Kaur

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Computer Networking Introduction

Review for Internet Introduction

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

LAN Interconnection and Other Link Layer Protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

end systems, access networks, links 1.3 network core

Tema 0: Transmisión de Datos Multimedia

Multimedia Networking. Network Support for Multimedia Applications

QoS: Per-Session Shaping and Queuing on LNS

Course Introduction. Off script lecturing on whiteboard Just as important towards exams, etc.

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Networking: Network layer

Part1: Lecture 4 QoS

Transport Layer Overview

Quality of Service (QoS)

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

end systems, access networks, links circuit switching, packet switching, network structure

Need For Protocol Architecture

CSCE 463/612 Networks and Distributed Processing Spring 2018

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

Lecture 24: Scheduling and QoS

Congestion Control and Resource Allocation

QUALITY of SERVICE. Introduction

Transcription:

ISC: SECURITY AND QOS The Diffie-Hellman Key Exchange A mechanism to establish secret keys without the need for CAs Based on the difficulty of computing discrete logarithms of large numbers Public (or exchanged) information p (prime number) as modulus, g (primitive root modulo p) Private to one person a for Alice, b for Bob (integer from 0 to p-1) Computed and exchanged (therefore public) A=g a mod p, B=g b mod p Alice computes S=B a mod p Bob computes S=A b mod p Network support for multimedia https://shyamapadabatabyal.files.wordpress.com/2014/07/diffiehellman.png?w=618 ultimedia Networking 9-4 1

Dimensioning best effort s approach: deploy enough capacity so that congestion doesn t occur, multimedia traffic flows without delay or loss low complexity of mechanisms (use current best effort ) high bandwidth costs challenges: dimensioning: how much bandwidth is enough? estimating traffic demand: needed to determine how much bandwidth is enough (for that much traffic) Providing multiple classes of service thus far: making the best of best effort service one-size fits all service model alternative: multiple classes of service partition traffic into classes treats different classes of traffic differently (analogy: VIP service versus regular service) granularity: differential service among multiple classes, not among individual connections history: ToS bits 0111 ultimedia Networking 9-5 ultimedia Networking 9-6 ultiple classes of service: scenario H1 H3 Scenario 1: mixed HTTP and VoIP example: 1bps VoIP, HTTP share 1.5 bps. HTTP bursts can congest router, cause audio loss want to give priority to audio over HTTP H2 output interface queue 1.5 bps H4 Principle 1 packet marking needed for router to distinguish between different classes; and new router policy to treat packets accordingly ultimedia Networking 9-7 ultimedia Networking 9-8 2

Principles for QOS guarantees (more) what if s misbehave (VoIP sends higher than declared rate) policing: force source adherence to bandwidth allocations marking, policing at edge 1 bps phone 1.5 bps packet marking and policing Principle 2 provide protection (isolation) for one class from others ultimedia Networking 9-9 Principles for QOS guarantees (more) allocating fixed (non-sharable) bandwidth to flow: inefficient use of bandwidth if flow doesn t use its allocation 1 bps phone 1 bps logical 1.5 bps 0.5 bps logical Principle 3 while providing isolation, it is desirable to use resources as efficiently as possible ultimedia Networking 9-10 Scheduling and policing mechanisms packet scheduling: choose next queued packet to send on outgoing packet arrivals queue (waiting area) (server) previously covered in Chapter 4: FCFS: first come first served simply multi-class priority round robin weighted fair queueing (WFQ) packet departures Policing mechanisms goal: limit traffic to not exceed declared parameters Three common-used criteria: (long term) average rate: how many pkts can be sent per unit time (in the long run) crucial question: what is the interval length: 100 packets per sec or 6000 packets per min have same average! peak rate: e.g., 6000 pkts per min (ppm) avg.; 1500 packets per sec peak rate (max.) burst size: max number of pkts sent consecutively (with no intervening idle) ultimedia Networking 9-11 ultimedia Networking 9-12 3

Policing mechanisms: implementation token bucket: limit input to specified burst size and average rate Policing and QoS guarantees token bucket, WFQ combine to provide guaranteed upper bound on delay, i.e., QoS guarantee! bucket can hold b tokens tokens generated at rate r token/sec unless bucket full over interval of length t: number of packets admitted less than or equal to (r t + b) ultimedia Networking 9-13 arriving traffic arriving traffic token rate, r bucket size, b WFQ D = b/r max per-flow rate, R ultimedia Networking 9-14 Computer Networks Wrap Up Sandhya Dwarkadas Department of Computer Science University of Rochester What is the Internet? A nuts and bolts view PC server wireless laptop smartphone router wireless s wired s billions of connected computing devices: hosts = end systems running apps communication s fiber, copper, radio, satellite transmission rate: bandwidth packet switches: forward packets (chunks of data) routers and switches mobile home institutional global ISP regional ISP 1-16 4

Internet-connected devices Web-enabled toaster + weather forecaster IP picture frame http://www.ceiva.com/ Internet refrigerator Slingbox: watch, control cable TV remotely sensorized, bed mattress Tweet-a-watt: monitor energy use Internet phones NETWORK INTERFACE: HOW DOES THE HOST CONNECT TO THE COUNICATION LINK? 1-17 Abstract View of achine Network Interface Card (NIC) PROTOCOL/ABSTRACTION LAYERS 5

Computer Networks: Principles and Architecture Network Architecture: Design and Implementation Guide Principle of Abstraction layering of protocols A protocol provides a communication service to the next higher-level layer Service interface e.g., send and receive Peer interface form and meaning of messages exchanged between peers Why layering? dealing with complex systems: explicit structure allows identification, relationship of complex system s pieces layered reference model for discussion modularization eases maintenance, updating of system change of implementation of layer s service transparent to rest of system e.g., change in gate procedure doesn t affect rest of system layering considered harmful? 1-22 Internet protocol stack : supporting s FTP, STP, HTTP : process-process data transfer TCP, UDP : routing of datagrams from source to destination IP, routing protocols : data transfer between neighboring elements Ethernet, 802.111 (WiFi), PPP : bits on the wire ISO/OSI reference model presentation: allow s to interpret meaning of data, e.g., encryption, compression, machine-specific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack missing these layers! these services, if needed, must be implemented in needed? 1-23 presentation session 1-24 6

segment H t datagram H n H t frame H l H n H t H t H n H t H l H n H t message destination source H n H t H l H n H t Encapsulation H n H t switch router Course Overview Network architectures (protocols, layering, interfaces, encapsulation) Network technologies (e.g., Ethernet, FDDI, AT, ISDN, wireless, HIPPI) Intering (addressing, routing, subnetting, autonomous systems) Resource allocation (fair queuing, virtual clocks, congestion avoidance) End-to-end issues (data representation, compression, authentication, encryption) Interprocess communication (datagrams, virtual circuits, request/reply, multicast, reliable broadcast, mobility) ultimedia ing Security in computer s Wireless and mobile s 1-25 Disclaimer Parts of the lecture slides are adapted from and copyrighted by James Kurose and Keith Ross. The slides are intended for the sole purpose of instruction of computer s at the University of Rochester. All copyrighted materials belong to their original owner(s). What Why Trends architecture Issues 7