1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS.

Slides:



Advertisements
Similar presentations
Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Advertisements

A Complete End-to-End View. Laptop Wifi AP BERKELEY DHCP Server/ Gateway Router DNS Server ( ) AT&T GOOGLE.
Lecture 5: TCP/IP OSI layers 3 (IP) and 4 (TCP/UDP) IPv4 – addresses and routing, “best-effort” service Ethernet, Appletalk, etc wrap IP packets with their.
International Standards Organization Open Systems Interconnect (OSI) Reference Model Advanced Computer Networks.
Chapter 5 – Big Picture Dr. V.T. Raja Oregon State University.
Networks: OSI Reference Model 1 International Standards Organization Open Systems Interconnect (OSI) Reference Model.
Networks: OSI Reference Model1 International Standards Organization Open Systems Interconnect (OSI) Reference Model.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies The user clicks on a link to indicate which document is to be retrieved.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Networks: OSI Model1 International Standards Organization Open Systems Interconnect (OSI) Reference Model.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 24 TCP/IP.
Chapter Overview TCP/IP Protocols IP Addressing.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture 8 Modeling & Simulation of Communication Networks.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
TCP/IP Networking sections 13.2,3,4,5 Road map: TCP, provide connection-oriented service IP, route data packets from one machine to another (RFC 791) ICMP,
1 TCP/IP introduction ผศ. ดร. อนันต์ ผลเพิ่ม Anan Phonphoem, Ph.D. Computer Engineering Department Kasetsart.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Five 1 Business Data Communications Chapter Five Network, Transport,
Networking for server IT specialists Zdeněk Filipec Network Engineer.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 12 TCP/IP Protocol BY Dr.Sukchatri Prasomsuk.
Layer Architecture of Network Protocols
 Ping - Transmits four 32 byte packets to target computer ◦ Measures response time ◦ Returns IP address of target computer ◦ Example: ping uottawa.ca.
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
CIM 2465 Intro to TCP/IP1 Introduction to TCP/IP (Topic 5) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking Academy Program,
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
COMT 429 The Internet Protocols COMT 429. History 1969First version of a 4 node store and forward network, the ARPAnet 1972Formal demonstration of ARPAnet.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Chapter 9 & 10 TCP/IP. TCP/IP Model Application Transport Internet Internet Access.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Computer Networks Chapter 2: Applications and Layered Architectures.
TCP/IP Protocols Contains Five Layers
Basic IP Protocol Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Linux Networking #1 Dr. Michael L. Collard 1.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Hands-On Ethical Hacking and Network Defense
1 DETAILS OF PROTOCOLS The Zoo Protocol - TCP - IP.
Chapter 2. Network Models
Chapter 8 The TCP/IP Protocols Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Network protocles (TCP), (UDP), (DHCP), (DNS) DR:abd alrauoof alshtawi
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Help Desk Working at a Small-to-Medium Business or ISP – Chapter.
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 14 INTERNETWORKING 1 The first section 2 Exercises.
Chapter 5 Network and Transport Layers
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
PART IV Network Layer.
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
בדיקת התקשרות עם מחשב ברשת
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Networks: OSI Reference Model
Review of Important Networking Concepts
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Networks: OSI Reference Model
Networking for Home and Small Businesses – Chapter 6
Computer Networks Protocols
The OSI Layers Surasak Sanguanpong
Presentation transcript:

1 Tracking an Offender

2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS Physical Presentation Session Transport Network Data link Application Physical Presentation Session Transport Network Data link Application

3 TCP/IP Family

4 Network Class

5 IP Address

6 Subnetting Add another level to address/routing hierarchy: subnet Subnet masks define variable partition of host part Subnets visible only within site

7 Basic Concepts and Tools Media Access Control ARP TCP/IP, UDP DHCP DNS ping, traceroute, dig, nslookup, ipconfig/ifconfig whois

8 Investigating s Increasing volume of fraudulent Virus propagation Spam in the workplace Increased successful prosecution of spammers Deleting

9 System One example open source system: –

10 Analyzing Message Headers Envelope header information –Added by sender –Often forged Message header –Added by receiver –Use these for analysis Sample message header – Abuse -> headerhttp://

11 Spam Tools Robomail: mass mailer – harvester – CAN-SPAM Act: Requirements for Commercial ers

12 Phishing Serious threat of financial loss Newest, most damaging type of spam Rely on “Social Engineering”

13 URL Obfuscation What is the format of a URL? If we are accessing a web site… –Protocol is http –User is blank and port number is blank (defaults to 80) Therefore, we get something like: – Hide real destination inside the URL: rg

14 Fighting Spam Spam Filter

15 CAN-SPAM Do’s Accurate Header –From –Subject –Origin, routing, destination Include Opt-Out Method Include real business address Clearly note that the is advertisement