5-Sep-154/598N: Computer Networks Recap UDP: IP with port abstraction TCP: Reliable, in order, at most once semantics –Sliding Windows –Flow control: ensure.

Slides:



Advertisements
Similar presentations
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Advertisements

Spring 2003CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Integrated Services and Differentiated Services Xiaowei Yang
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 25 Multimedia.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
Copyright: RSVP The ReSerVation Protocol by Sujay koduri.
15-441: Computer Networking Lecture 18: QoS Thanks to David Anderson and Srini Seshan.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
CS Summer 2003 Lecture 8. CS Summer 2003 Populating LFIB with LDP Assigned/Learned Labels Changes in the LFIB may be triggered routing or.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
School of Information Technologies IP Quality of Service NETS3303/3603 Weeks
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 3. QoS.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Internet Quality of Service. Quality of Service (QoS) The best-effort model, in which the network tries to deliver data from source to destination but.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
Ch 7. Multimedia Networking Myungchul Kim
CIS679: Scheduling, Resource Configuration and Admission Control r Review of Last lecture r Scheduling r Resource configuration r Admission control.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
1 Integrated and Differentiated Services Multimedia Systems(Module 5 Lesson 4) Summary: r Intserv Architecture RSVP signaling protocol r Diffserv Architecture.
CSE679: QoS Infrastructure to Support Multimedia Communications r Principles r Policing r Scheduling r RSVP r Integrated and Differentiated Services.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
Computer Networking Intserv, Diffserv, RSVP.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Quality of Service (QoS)
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 21 – Case Studies for Multimedia Network Support (Layer 3) Klara Nahrstedt Spring 2009.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet Integrated Services (IntServ)
Spring 2001CS Multimedia, QoS Multimedia (7.2, 9.3) Compression RTP Realtime Applications Integrated Services Differentiated Services Quality.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet.
CS640: Introduction to Computer Networks Aditya Akella Lecture 21 – QoS.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Ch 6. Multimedia Networking Myungchul Kim
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
EE 122: Integrated Services Ion Stoica November 13, 2002.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Spring 2002CS 3321 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10. Mai 20061INF-3190: Multimedia Protocols Quality-of-Service Foreleser: Carsten Griwodz
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Chapter 25 Multimedia TCP/IP Protocol Suite
Taxonomy of network applications
Advanced Computer Networks
Message Digest Cryptographic checksum One-way function Relevance
Security Outline Homework 1, selected solutions Encryption Algorithms
Review: Network link technologies
Taxonomy of real time applications
Advanced Computer Networks
University of Houston Quality of Service Datacom II Lecture 3
Presentation transcript:

5-Sep-154/598N: Computer Networks Recap UDP: IP with port abstraction TCP: Reliable, in order, at most once semantics –Sliding Windows –Flow control: ensure client is not overwhelmed Advertised window from receiver end –Congestion control: ensure network is not overwhelmed Congestion window from sender end TCP friendly flows –TCP has no timing requirements

5-Sep-154/598N: Computer Networks Quality of Service Outline –Realtime Applications Networking with specified delay components –Integrated Services Per flow QoS –Differentiated Services QoS for aggregated traffic

5-Sep-154/598N: Computer Networks Streaming Audio The media player buffers input from the media server and plays from the buffer rather than directly from the network.

5-Sep-154/598N: Computer Networks Realtime Applications Require “deliver on time” assurances –must come from inside the network Example application (audio) –sample voice once every 125µs –each sample has a playback time –packets experience variable delay in network –add constant factor to playback time: playback point Similar to skip protection in portable CD players Microphone Speaker Sampler, A D converter Buffer, D A

5-Sep-154/598N: Computer Networks Sequence number Packet generation Network delay Buffer Playback Time Packet arrival Playback Buffer Playback point as insurance against Internet delays Multimedia care about delay and jitter (variability within delay)

5-Sep-154/598N: Computer Networks %97%98%99% Delay (milliseconds) Example Distribution of Delays What is a good delay? 200 msec Not acceptable for chat application

5-Sep-154/598N: Computer Networks Video transmission Frame Time sender receiver Network delayPlayback delay

5-Sep-154/598N: Computer Networks Applications Elastic (tcp, udp) Download mp3 Intolerant (remote surgery) Real time Tolerant NonadaptiveAdaptive Delay adaptive (add delay) Rate adaptive (change video b/w) Taxonomy of real time applications

5-Sep-154/598N: Computer Networks QoS Approaches Fine grained - individual application or flows –Intserv –E.g. for my video chat application Coarse grained - aggregated traffic –Diffserv –E.g. All traffic from CSE (costs $$)

5-Sep-154/598N: Computer Networks Integrated Services IETF time frame Service Classes –guaranteed –controlled-load (tolerant, adaptive applications) Simulates lightly loaded link Mechanisms –signaling protocol: signals required service –admission control: rejects traffic that cannot be serviced –Policing: make sure that senders stick to agreement –packet scheduling: manage how packets are queued

5-Sep-154/598N: Computer Networks Flowspec Rspec: describes service requested from network –controlled-load: none –guaranteed: delay target Tspec: describes flow’s traffic characteristics –average bandwidth + burstiness: token bucket filter token rate r and bucket depth B –must have a token to send a byte –must have n tokens to send n bytes –start with no tokens –accumulate tokens at rate of r per second –can accumulate no more than B tokens

5-Sep-154/598N: Computer Networks Per-Router Mechanisms Admission Control –decide if a new flow can be supported –answer depends on service class –not the same as policing Packet Processing –classification: associate each packet with the appropriate reservation –scheduling: manage queues so each packet receives the requested service

5-Sep-154/598N: Computer Networks Reservation Protocol Called signaling in ATM Proposed Internet standard: RSVP Consistent with robustness of today’s connectionless model Uses soft state (refresh periodically) Designed to support multicast Receiver-oriented Two messages: PATH and RESV Source transmits PATH messages every 30 seconds Destination responds with RESV message Merge requirements in case of multicast Can specify number of speakers

5-Sep-154/598N: Computer Networks Sender 1 Sender 2 PATH RESV (merged) RESV Receiver B Receiver A R R R R R RSVP Example (multicast)

5-Sep-154/598N: Computer Networks RSVP versus ATM (Q.2931) RSVP –receiver generates reservation –soft state (refresh/timeout) –separate from route establishment –QoS can change dynamically –receiver heterogeneity ATM –sender generates connection request –hard state (explicit delete) –concurrent with route establishment –QoS is static for life of connection –uniform QoS to all receivers

5-Sep-154/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g., premium vs best-effort Packets marked according to class at edge of network Core routers implement some per-hop-behavior (PHB) Example: Expedited Forwarding (EF) –rate-limit EF packets at the edges –PHB implemented with class-based priority queues or Weighted Fair Queue (WFQ)

5-Sep-154/598N: Computer Networks DiffServ (cont) Assured Forwarding (AF) –customers sign service agreements with ISPs –edge routers mark packets as being “in” or “out” of profile –core routers run RIO: RED with in/out

5-Sep-154/598N: Computer Networks Chapter 8: Security Outline –Encryption Algorithms –Authentication Protocols –Message Integrity Protocols –Key Distribution –Firewalls

5-Sep-154/598N: Computer Networks Overview Cryptography functions –Secret key (e.g., DES) –Public key (e.g., RSA) –Message digest (e.g., MD5) Security services –Privacy: preventing unauthorized release of information –Authentication: verifying identity of the remote participant –Integrity: making sure message has not been altered

5-Sep-154/598N: Computer Networks Secret Key (DES)

5-Sep-154/598N: Computer Networks Each Round + F L i─ 1 R i─ 1 R i K i L i 64-bit key (56-bits + 8-bit parity) 16 rounds

5-Sep-154/598N: Computer Networks Repeat for larger messages

5-Sep-154/598N: Computer Networks Public Key (RSA) Encryption & Decryption c = m e mod n m = c d mod n

5-Sep-154/598N: Computer Networks RSA (cont) Choose two large prime numbers p and q (each 256 bits) Multiply p and q together to get n Choose the encryption key e, such that e and (p - 1) x (q - 1) are relatively prime. Two numbers are relatively prime if they have no common factor greater than one Compute decryption key d such that –d = e-1mod ((p - 1) x (q - 1)) Construct public key as (e, n) Construct public key as (d, n) Discard (do not disclose) original primes p and q

5-Sep-154/598N: Computer Networks Message Digest Cryptographic checksum –just as a regular checksum protects the receiver from accidental changes to the message, a cryptographic checksum protects the receiver from malicious changes to the message. One-way function –given a cryptographic checksum for a message, it is virtually impossible to figure out what message produced that checksum; it is not computationally feasible to find two messages that hash to the same cryptographic checksum. Relevance –if you are given a checksum for a message and you are able to compute exactly the same checksum for that message, then it is highly likely this message produced the checksum you were given.

5-Sep-154/598N: Computer Networks ClientServer ClientId, E (, CHK) E( y +, CHK) E(SK, SHK) Y Authentication Protocols Three-way handshake

5-Sep-154/598N: Computer Networks Trusted third party (Kerberos)

5-Sep-154/598N: Computer Networks AB E ( x, Public B ) x Public key authentication

5-Sep-154/598N: Computer Networks Message Integrity Protocols Digital signature using RSA –special case of a message integrity where the code can only have been generated by one participant –compute signature with private key and verify with public key Keyed MD5 –sender: m + MD5(m + k) + E(k, private) –receiver recovers random key using the sender’s public key applies MD5 to the concatenation of this random key message MD5 with RSA signature –sender: m + E(MD5(m), private) –receiver decrypts signature with sender’s public key compares result with MD5 checksum sent with message

5-Sep-154/598N: Computer Networks Message Integrity Protocols Digital signature using RSA –special case of a message integrity where the code can only have been generated by one participant –compute signature with private key and verify with public key Keyed MD5 –sender: m + MD5(m + k) + E(E(k, rcv-pub), private) –receiver recovers random key using the sender’s public key applies MD5 to the concatenation of this random key message MD5 with RSA signature –sender: m + E(MD5(m), private) –receiver decrypts signature with sender’s public key compares result with MD5 checksum sent with message

5-Sep-154/598N: Computer Networks Key Distribution Certificate –special type of digitally signed document: “I certify that the public key in this document belongs to the entity named in this document, signed X.” –the name of the entity being certified –the public key of the entity –the name of the certified authority –a digital signature Certified Authority (CA) –administrative entity that issues certificates –useful only to someone that already holds the CA’s public key.

5-Sep-154/598N: Computer Networks Key Distribution (cont) Chain of Trust –if X certifies that a certain public key belongs to Y, and Y certifies that another public key belongs to Z, then there exists a chain of certificates from X to Z –someone that wants to verify Z’s public key has to know X’s public key and follow the chain Certificate Revocation List

5-Sep-154/598N: Computer Networks Firewalls Filter-Based Solution –example ( , 1234, , 80 ) (*,*, , 80 ) –default: forward or not forward? –how dynamic? –stateful

5-Sep-154/598N: Computer Networks Proxy-Based Firewalls Problem: complex policy Example: web server Solution: proxy Design: transparent vs. classical Limitations: attacks from within

5-Sep-154/598N: Computer Networks Denial of Service Attacks on end hosts –SYN attack Attacks on routers –Christmas tree packets –pollute route cache Authentication attacks Distributed DoS attacks