Computer Networking Revision Dr Sandra I. Woolley.

Slides:



Advertisements
Similar presentations
IPSec.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Instructor & Todd Lammle
Security at the Network Layer: IPSec
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
The OSI Model and the TCP/IP Protocol Suite
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Data Communication and Networks Lecture 0 Administrivia September 7, 2006.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
CMPSCI 453/653 Department of Computer Science
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Chapter Overview TCP/IP Protocols IP Addressing.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Five 1 Business Data Communications Chapter Five Network, Transport,
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Computer Networks Ivan Marsic Rutgers University Chapter 7 – Network Security Chapter 8 – Network Monitoring Chapter 9 – Internet Protocols APPENDIX: Probability.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Computer Networking Course Introduction Dr Sandra I. Woolley.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Networking A few notes on reading Dr Sandra I. Woolley.
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
NET 221D: NETWORKS FUNDAMENTALS Lecture 1: Introduction to Protocols and Layers Networks and Communication Department 1.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
Chapter 7: Cryptographic Systems
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CMPSCI 653/453 Professor Don Towsley Department of Computer Science Department of Computer Science University of Massachusetts University of Massachusetts.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Chapter 2 Network Models
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Chapter 2 Network Models
IPSec Detailed Description and VPN
Internet Protocol Version4
Network Security (contd.)
Introduction to the course
Unit 8 Network Security.
Presentation transcript:

Computer Networking Revision Dr Sandra I. Woolley

2 Recommended Text  Communication Networks  A. Leon-Garcia & I. Widjaja  McGraw-Hill  (2 nd Edition printed Aug 2003)

3 Cryptography Text  Relevant as background to the cryptography covered in the course.  Not required for revision.

4 Course Content (and location in course text)  Introduction to the course and computer networks - Chapter 1  Layered architectures - Chapter 2  LANs and medium access control: Chapter 6  Error control coding - Chapter 3 - section 8  Packet switching - Chapter 7  TCP/IP - Chapter 8  Network Quality-of-Service (QoS)  Queueing - Appendix A  Cryptography - Chapter 11 and (optionally) Simon Singh's, “The Code Book”. The 3 page handout is available on the course web page.  Network management and security- An overview of Appendix B and sections of Chapter 11 plus security case study examples (from Stallings). Chapter 11 contains more details on security protocols such as IPsec and secure sockets which are not covered and are not part of the assessed material.

5 Revision Pointers  Lecture slide material is assessable.  Working through past exam paper questions is good exam practice. Please see questions and solutions on the course web page (not hardcopy handouts).  Additional example questions, in the form of exam questions, are provided on the following slides.

6 Examples 1. (a) Briefly explain the differences between TCP and UDP and their different roles in the Internet. (b) With reference to packet header contents and router treatment of packets, summarise important differences between IPv4 and IPv6. (c) Describe how PGP public-key encryption employs RSA and IDEA algorithms and how keys can be used to ensure both privacy and authentication. (d) Using the RSA algorithm and showing your working, encrypt and decrypt the message M=8 with p=5, q=9, e=3.

7 Examples - continued 2. (a) Provide a brief definition and description for each of the following i) SNMP ii) Dijkstra's algorithm (b) Explain how the Bellman-Ford algorithm works. Explain the problems this algorithm can have when a break between network nodes occurs and describe the modifications which avoid this problem. (b) Briefly compare and contrast ALOHA and slotted ALOHA. (c) Briefly describe and contrast differentiated service and integrated service approaches to network quality of service.

8 Examples - continued 3. (a) i) With the aid of suitable diagrams, describe the OSI and TCP/IP layer models. Summarise the function of each layer. ii) Briefly comment on why the TCP/IP and not the OSI architecture was employed on the Internet. (b) i) Explain the limitations inherent in the original classful IP addressing scheme. ii) A class B network on the Internet has a subnet mask of What is the maximum number of hosts per subnet? (c) Use the generator polynomial, G(x)=x 4 +x+1, to encode the data sequence, , and show your working clearly.

9 Examples - continued 4. (a) Provide a brief definition and description for each of the following i) IGP and EGP ii) ARP iii) Little's formula (b) Summarise how traceroute works. (c) Alice and Bob agree a one-way function, Y x (mod P), for Diffie- Hellman-Merkle key exchange, with Y=5 and P=11. Alice privately selects the value A=3 and Bob privately selects the value B=4. Compute the values a and b which they exchange and use them to generate the secret key, showing that they both arrive at the same value.

10 Numerical Solutions to Examples Numerical solutions to questions: 1 d) C=17 and d=11 As shown in the handout... 17^11 (mod45) can be written as (17^8x17^2x17^1)(mod45)... remember to ignore zeroes... =(19x17)(mod45) = 8. I have added a note below about this question. 3 b) iii) bits available - 2 hosts (all 0's and all 1's addresses are reserved) 3 c) The check bits are “1110” so the encoded data is The check bits are appended to the data bits to produce the protected codeword. 4 check bits were expected because the generator polynomial has power 4. An aside (i.e., interesting but not necessary for revision)... question 1 d) is a flawed example. q is not prime (which it should be for RSA). We discuss this briefly in class. The question works fine as a simple example for us to work through BUT when our values are not prime we get non- unique solutions for d. d is the private key and it should be very difficult to extract, so multiple solutions are undesirable in practice. An example of another solution for d in this example is 43 since 3x43 (mod32) = 129 (mod32) = 1.

Thank you and good luck