Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.

Slides:



Advertisements
Similar presentations
CS 4244: Internet Programming Dr. Eli Tilevich
Advertisements

TA: Xifan Zheng Welcome to CPSC 441!
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Introduction to Security Computer Networks Computer Networks Term B10.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Introduction1-1 Communication Systems Lecturer Dr. Marina Kopeetsky Lecture 1: Introduction Computer Networking: A Top Down Approach Featuring the Internet,
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
CS 325 Computer Networks Sami Rollins Fall 2003.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
Introduction 1 Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Computer Networking Introduction, Part II.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 5 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
1: Introduction1 Internet History r 1961: Kleinrock - queueing theory shows effectiveness of packet- switching r 1964: Baran - packet- switching in military.
Course info1 1 st Semester 2007 MI305 Computer Networks  Instructor: Jen-Liang Cheng   Office: H501-1( 福田樓 )  Lectures:
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware, software Question:
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516:
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
CPSC 411 Tutorial TA: Fang Wang. Fang Wang 9:00am-5:00pm, Mon-Fri.
Prof. Younghee Lee 1 1 Computer Networks u Lecture 1: Introduction Prof. Younghee Lee u Some part of this teaching materials are prepared referencing the.
TCP/IP Network.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
Introduction 1-1 Networking Admin  1 to 4 lectures a week for 11 weeks for a total of 23 lectures  Interleaves with Functional Programming  First prac.
Lecture 1: Overview of Internet Architecture Communication Networks ELEN E6761 Instructor: Javad Ghaderi Lecture Slides adapted from “Computer Networking:
Welcome to CS 340 Introduction to Computer Networking.
Internet History CS 4244: Internet Programming Dr. Eli Tilevich.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
COMP 562: “Advanced Topics in Networking” Qian Zhang Spring 2009 HKUST Introduction 1-1.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Welcome to CS 340 Introduction to Computer Networking.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Lecture 1: Facts of network technologies developments
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
1 Ram Dantu University of North Texas, Practical Networking.
Graciela Perera Introduction Graciela Perera
Day 01 - The Internet.
Slides taken from: Computer Networking by Kurose and Ross
An Aleksandar,   Accounts have been created for any students in EECS 340 who did not already have one.  Physical access to the labs has.
Introduction 1 1: Introduction.
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Chapter 1: Introduction
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Presentation transcript:

Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks

Introduction 1-2 Lecture 1: roadmap 1.1 What is the Internet? 1.6 Networks security 1.7 Internet History

Introduction 1-3 What’s the Internet: “nuts and bolts” view  millions of connected computing devices: hosts = end systems  running network apps Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular handheld wired links access points  communication links  fiber, copper, radio, satellite  transmission rate = bandwidth  routers: forward packets (chunks of data)

Introduction 1-4 “Cool” internet appliances World’s smallest web server IP picture frame Web-enabled toaster + weather forecaster Internet phones

Introduction 1-5 What’s the Internet: “nuts and bolts” view  protocols control sending, receiving of msgs  e.g., TCP, IP, HTTP, Skype, Ethernet  Internet: “network of networks”  loosely hierarchical  public Internet versus private intranet  Internet standards  RFC: Request for comments  IETF: Internet Engineering Task Force Home network Institutional network Mobile network Global ISP Regional ISP

Introduction 1-6 What’s the Internet: a service view  communication infrastructure enables distributed applications:  Web, VoIP, , games, e-commerce, file sharing  communication services provided to apps:  reliable data delivery from source to destination  “best effort” (unreliable) data delivery

Introduction 1-7 What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt

Introduction 1-8 What’s a protocol? a human protocol and a computer network protocol: Q: Other human protocols? Hi Got the time? 2:00 TCP connection request TCP connection response Get time

Introduction 1-9 Lecture 1: roadmap 1.1 What is the Internet? 1.6 Network security 1.7 Internet History

Introduction 1-10 Network Security  attacks on Internet infrastructure:  infecting/attacking hosts: malware, spyware, worms, unauthorized access (data stealing, user accounts)  denial of service: deny access to resources (servers, link bandwidth)  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”  Internet protocol designers playing “catch-up”  Security considerations in all layers!

Introduction 1-11 What can bad guys do: malware?  Spyware:  infection by downloading web page with spyware  records keystrokes, web sites visited, upload info to collection site  Virus  infection by receiving object (e.g., attachment), actively executing  self-replicating: propagate itself to other hosts, users  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)

Introduction 1-12 Denial of service attacks  attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see malware) 3. send packets toward target from compromised hosts target

Introduction 1-13 Sniff, modify, delete your packets Packet sniffing:  broadcast media (shared Ethernet, wireless)  promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload  Ethereal software used for end-of-chapter labs is a (free) packet-sniffer  more on modification, deletion later

Introduction 1-14 Masquerade as you  IP spoofing: send packet with false source address A B C src:B dest:A payload

Introduction 1-15 Masquerade as you  IP spoofing: send packet with false source address  record-and-playback : sniff sensitive info (e.g., password), and use later  password holder is that user from system point of view A B C src:B dest:A user: B; password: foo

Introduction 1-16 Masquerade as you  IP spoofing: send packet with false source address  record-and-playback : sniff sensitive info (e.g., password), and use later  password holder is that user from system point of view A B later ….. C src:B dest:A user: B; password: foo

Introduction 1-17 Lecture 1: roadmap 1.1 What is the Internet? 1.6 Network security 1.7 Internet History by Peter Steiner, New York, July 5, 1993

Introduction 1-18 Internet History  1961: Kleinrock - queueing theory shows effectiveness of packet- switching  1964: Baran - packet- switching in military nets  1967: ARPAnet conceived by Advanced Research Projects Agency  1969: first ARPAnet node operational  1972:  ARPAnet public demonstration  NCP (Network Control Protocol) first host-host protocol  first program  ARPAnet has 15 nodes : Early packet-switching principles

Introduction 1-19 Internet History  1970: ALOHAnet satellite network in Hawaii  1974: Cerf and Kahn - architecture for interconnecting networks  1976: Ethernet at Xerox PARC  ate70’s: proprietary architectures: DECnet, SNA, XNA  late 70’s: switching fixed length packets (ATM precursor)  1979: ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles:  minimalism, autonomy - no internal changes required to interconnect networks  best effort service model  stateless routers  decentralized control define today’s Internet architecture : Internetworking, new and proprietary nets

Introduction 1-20 Internet History  1983: deployment of TCP/IP  1982: smtp protocol defined  1983: DNS defined for name-to-IP- address translation  1985: ftp protocol defined  1988: TCP congestion control  new national networks: Csnet, BITnet, NSFnet, Minitel  100,000 hosts connected to confederation of networks : new protocols, a proliferation of networks

Introduction 1-21 Internet History  Early 1990’s: ARPAnet decommissioned  1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)  early 1990s: Web  hypertext [Bush 1945, Nelson 1960’s]  HTML, HTTP: Berners-Lee  1994: Mosaic, later Netscape  late 1990’s: commercialization of the Web Late 1990’s – 2000’s:  more killer apps: instant messaging, P2P file sharing  network security to forefront  est. 50 million host, 100 million+ users  backbone links running at Gbps 1990, 2000’s: commercialization, the Web, new apps

Introduction 1-22 Internet History Today  ~500 million hosts  Voice, Video over IP  P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video)  more applications: YouTube, gaming  wireless, mobility

Introduction 1-23 Lecture 1: Summary Covered  Internet overview  what’s a protocol?  network security  Internet history