Download presentation
Presentation is loading. Please wait.
1
Network & Internet
2
Networks ? The need to share information and resources among different computers has lead to linked computer system, call “networks”
3
Network classifications Local area network (LAN) Metropolitan area network (MAN) Network for intermediate size Wide area network (WAN) Neighboring cities Open, Closed, Proprietary network.
4
Network topology The study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes
5
Network topology
6
Industrial Ethernet
7
Network data transfer In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints.
8
Ring: Token ring protocol Possession of the token gives a machine the authority to transmit its own message. Without Token, a machine is only allowed to forward messages
9
Bus: CSMA/CD Carrier Sense, Multiple Access with Collision Detection The protocol dictates the each message be broadcast to all the machine on the bus. Each machine monitors all the messages but keep only those addressed to itself To transmit a msg, a machine waits until the bus is silent. Transmit a msg and continue to monitor the bus.
10
Bus: CSMA/CD When the clash is detected, machines pause for a brief random period of time before trying to transmit again.
12
Combining Networks Repeater: passes signals back and forth between two original buses w/o considering the meaning of the signals Bridge: looks at the destination address that accompanies each msg and forwards a msg only for the area Switch: essential a bridge with multiple connections
13
Communication issues Incompatible characteristics Ring: Token ring Bus: CSMA/CD An internet (Not the Internet): original networks maintain their individuality and continue to function as independent networks. Router: Switch + protocol conversion
14
Interprocess Communication The various activities executing on the different computers within a network must often communicate with each other to coordinate the actions and perform the tasks. Client/Server: involves one process communicating with numerous clients Client makes request of other processes Server satisfies the request made by clients Ex. Print Server, ATM, eShopping
16
Interprocess Communication Peer to Peer (P2P) Involves two processes communicating as equals Communicates with a temporary basis Ex. MSN, Data sharing (BitTorrent)
17
The Internet The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a “network of networks”, carries various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web.
19
Internet Architecture A collection of domains Domain: an autonomous system configured as the local authority desires (a single computer, LANs, MANs, and WANs. Internet Corporation for Assigned Names and Numbers (ICANN) Domain must first registered via one of the companies called registrars.
20
Connecting to the Internet Internet service provider (ISP) allows customers to become a part of the domain to the Internet. dial-up, cable, wireless connection
21
Internet addressing IP (Protocol) address IPv4 32 bits IPv6 128 bits Each 32-bit address consists of 2 parts Network identifier: identify in which the computer resides Host address: identify a particular computer within a domain
22
Internet addressing Domain name: the Internet address in bit-pattern form (unique name) Ex. The domain name of CNN is cnn.comcnn.com The com suffix (domain classification) called top-level domain (TLD) Ex. com (commercial) gov (government) edu (educational purpose)
23
Internet addressing To be more specific about the address, newsserver.cnn.comnewsserver.cnn.com : indicate the computer known as newsserver within cnn within the class (TLD) of the commercial domains com.
24
Internet addressing domain name system (DNS): used to convert address in name form into their equivalent IP address. DNS : name address IP address (to be compatible with the Internet software) The process of extracting information from DNS called “DNS lookup”
27
Internet Applications Voice over Internet (VoIP): transmission of telephone data over the Internet rather than traditional telephone networks Email File Transfer Protocol (FTP): client/server protocol for transfering files across the Internet anonymous FTP: to provide unrestricted access to files under FTP server auspices Telnet
28
How messages are transferred over the Internet? The Layered Approach to Internet Software A principle task of networking software is to provide the infrastructure required for transferring msg from one machine to another.
29
The Layered Approach to Internet Software Internet has four layers for controlling communication over the Internet Application layer: original message Transport layer: prepare for transmission Network layer: prepare for transmission Link layer: start the transmission
30
OSI Model The Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model for short) is a layered, abstract description for communications and computer network protocol design, developed as part of Open Systems Interconnection initiative. It is also called the OSI seven layer model.
31
Layer 7: Application This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network- related activities. Ex. HTTP, SMTP, SMPP, SNMP, FTP, Telnet, NFS, NTP, RTP,DHCP, DNS
32
Layer 6: Presentation Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand. Ex. MIME, XDR, SSL, TLS
33
Layer 5: Session Layer 5 establishes, maintains and ends communication with the receiving device. The Session layer controls the dialogues/connections (sessions) between computers. It establishes, manages and terminates the connections between the local and remote application. Ex. SIP
34
Layer 4: Transport This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network. Ex. TCP, UDP, SCTP
35
Layer 3: Network The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. Ex. IP, ICMP, IPsec, ARP, RIP, OSPF
36
Layer 2: Data In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined. Ex. PPP, SLIP, PPTP, L2TP
37
Layer 1: Physical layer The Physical layer defines all the electrical and physical specifications for devices. This includes the layout of pins, voltages, and cable specifications.
38
Router a computer networking device that buffers and forwards data packets across an internetwork toward their destinations, through a process known as routing. Routing occurs at layer 3 (the Network layer e.g. IP) of the OSI seven-layer protocol stack.
40
Routing protocols Allow different computer networks to communicate. Routing protocols specify the set of rules that help layer 3(OSI model) devices pass information among themselves on the topology of the network. It helps the Layer 3 device decide on the best available path to send network traffic.
41
TCP The Internet protocol suite is the set of communications protocols that implements the protocol stack on which the Internet and many commercial networks run. It is part of the TCP/IP protocol suite, which is named after two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two networking protocols defined.
42
TCP
43
Using TCP, applications on networked hosts can create connections to one another, over which they can exchange streams of data using Stream Sockets. The protocol guarantees reliable and in- order delivery of data from sender to receiver. TCP also distinguishes data for multiple connections by concurrent applications (e.g., Web server and e-mail server) running on the same host.
44
TCP service reliable, in-order byte-stream data transfer loss: acknowledgements and retransmissions (Eat up part of the communication time) flow control: sender won’t overwhelm receiver Disabling this part is the way some hackers bring down the receiving computer. congestion control: senders “slow down sending rate” when network congested Ex. HTTP (Web), FTP (file transfer), Telnet (remote login), SMTP (email)
45
User Datagram Protocol (UDP) one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal Datagram Protocol or Unreliable Datagram Protocol.
46
UDP UDP does not provide the reliability and ordering that TCP does. Datagrams may arrive out of order, appear duplicated, or go missing without notice. Without the overhead of checking whether every packet actually arrived, UDP is faster and more efficient for many lightweight or time-sensitive purposes.
47
UDP
48
UDP service connectionless unreliable data transfer no flow control no congestion control Ex. Domain Name System (DNS), streaming media applications such as IPTV, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and online games.
49
TCP/IP
50
IP (Internet Protocol) Locate sender and receiver location by using IP routing mechanism ICMP (Internet Control Message Protocol) Control message transferring errors and send messages to IP IGMP (Internet Group Management Protocol) Send UPD datagram to a group of hosts or multiple hosts simultaneously ARP (Address Resolution Protocol) Convert IP address into MAC address RARP : (Reverse ARP) Convert MAC address into IP address
51
ICMP: Error Report ICMP Error report is sent back by a router to a target host identifying the target host is unreachable.
53
Trojan Port 31 : Master Paradise 121 : BO jammerkillahV 456 : HackersParadise 555 : Phase Zero 666 : Attack FTP 1001 : Silencer 1001 : WebEx 1010 : Doly Trojan 1.30 (Subm.Cronco) 1011 : Doly Trojan 1.1+1.2 1015 : Doly Trojan 1.5 (Subm.Cronco) 1033 : Netspy 1042 : Bla1.1 1170 : Streaming Audio Trojan 1207 : SoftWar 1243 : SubSeven 1245 : Vodoo 1269 : Maverick's Matrix 1492 : FTP99CMP 1509 : PsyberStreamingServer Nikhil G. 1600 : Shiva Burka 1807 : SpySender 1981 : ShockRave 1999 : Backdoor 1999 : Transcout 1.1 + 1.2 2001 : DerSpaeher 3 2001 : TrojanCow 2023 : Pass Ripper 2140 : The Invasor Nikhil G. 2283 : HVL Rat5 2565 : Striker 2583 : Wincrash2 2801 : Phineas Nikhil G. 3791 : Total Eclypse (FTP) 4567 : FileNail Danny 4950 : IcqTrojan 4950 : IcqTrojen 5000 : Socket23 5011 : OOTLT 5031 : NetMetro1.0 5400 : BladeRunner 5400 : BackConstruction1.2 5521 : IllusionMailer 5550 : XTCP 2.0 + 2.01 5569 : RoboHack 5742 : Wincrash 6400 : The tHing 6669 : Vampire 1.0 6670 : Deep Throat 6883 : DeltaSource (DarkStar) 6912 : Shitheep 6939 : Indoctrination 7306 : NetMonitor 7789 : iCkiller 9872 : PortalOfDoom 9875 : Portal of Doom 9989 : iNi-Killer 9989 : InIkiller 10607 : Coma Danny 11000 : SennaSpyTrojans 11223 : ProgenicTrojan 12076 : Gjamer 12223 : Hack ด 99 KeyLogger 12346 : NetBus 1.x (avoiding Netbuster) 12701 : Eclipse 2000 16969 : Priotrity 20000 : Millenium 20034 : NetBus Pro 20203 : Logged! 20203 : Chupacabra 20331 : Bla 21544 : GirlFriend 21554 : GirlFriend 22222 : Prosiak 0.47 23456 : EvilFtp 27374 : Sub-7 2.1 29891 : The Unexplained 30029 : AOLTrojan1.1 30100 : NetSphere 30303 : Socket25 30999 : Kuang 31787 : Hack'a'tack 33911 : Trojan Spirit 2001 a 34324 : Tiny Telnet Server 34324 : BigGluck TN 40412 : TheSpy 40423 : Master Paradise 50766 : Fore 53001 : RemoteWindowsShutdown 54320 : Back Orifice 2000 (default port)
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.