March 2005 1R. Smith - University of St Thomas - Minnesota CISC 210 - Class Today Going over the Exam AnswersGoing over the Exam Answers Intro NetworkingIntro.

Slides:



Advertisements
Similar presentations
Networks Unit 3 & 4 IP&M JEOPARDY Acknowledgements: VITTA for the jeopardy pro-forma Mark Kelly’s Network slideshow.
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Chapter 3 Internet. Physical Components of the Internet Servers Networks Routers.
March R. Smith - University of St Thomas - Minnesota CISC Class Today Return Homework; grading recapReturn Homework; grading recap “Enigma”
6/22/2015 1R. Smith - University of St Thomas - Minnesota QMCS Class Today St. Lukes Case StudySt. Lukes Case Study.
Chapter 1 Read (again) chapter 1.
March R. Smith - University of St Thomas - Minnesota QMCS Class Today Cryptography – introductory termsCryptography – introductory terms “Enigma”
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Bob Baker Communications Bob Baker September 1999.
Review on Networking Technologies Linda Wu (CMPT )
Chapter 15 Networks.
Hardware & Software Needed For LAN and WAN
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Lecturer: Tamanna Haque Nipa
Network Topologies.
Chapter 15 Networks. Chapter Goals Types of networks Topologies Open Systems Home Internet connections 15-2.
Overview, Circuit & Packet Switching, Addressing
Laudon & Laudon: Canadian Edition
9/4/2015 1R. Smith - University of St Thomas - Minnesota CISC Class Today RecapRecap Project TopicsProject Topics Quality of ServiceQuality of Service.
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
NETWORK.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Chapter 4 Computer Networks – Part 1
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
NETWORKS.
PPTTEST 10/6/ :29 1 IT Ron Williams Business Innovation Through Information Technology Networking.
1 Next Few Classes Networking basics Protection & Security.
March R. Smith - University of St Thomas - Minnesota CISC Class Today Project ScheduleProject Schedule Upcoming LabUpcoming Lab RecapRecap.
The OSI Model.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
10/27/2015 1R. Smith - University of St Thomas - Minnesota CISC Class Today Structured WiringStructured Wiring A wiring closetA wiring closet Ethernet.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Telecommunications, the Internet, and Wireless Technology.
WHAT IS NETWORKING?. Networking is … How computers talk to each other.
"Networking 101: Basics" Jim Gogan INLS184. Introduction - Why network? l Communicate with others close by l Communicate with others far away l Gain access.
INFS 361 Chapter 1 Notes UTM Bob Bradley Fall 2005.
William Stallings Data and Computer Communications
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Network media, protocols and networking standards, networking hardware.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Unit Communication Hardware
NETWORK Unit 1 Module: 2 Objective: 7.
INTRODUCTION TO COMPUTER NETWORKS
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Basics of Networking TYPES OF NETWORKS
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Computer Technology Notes #4
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Client-Server and Peer to Peer networks
NETWORK Unit 1 Module: 2 Objective: 7.
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
COMPUTER NETWORKING Presented by Pushpanjali Associate professor
Presentation transcript:

March R. Smith - University of St Thomas - Minnesota CISC Class Today Going over the Exam AnswersGoing over the Exam Answers Intro NetworkingIntro Networking

Question 1 Assets: A, NAssets: A, N Risks: D, E, K, MRisks: D, E, K, M Policy: G, LPolicy: G, L –Optional: B, H, I Defenses (optional): O, B, H, JDefenses (optional): O, B, H, J Monitor: C, F, PMonitor: C, F, P –Optional: O, J Recover (optional): IRecover (optional): I March R. Smith - University of St Thomas - Minnesota

Questions 2-6 Desktop: 1 – KNOWDesktop: 1 – KNOW Desktop + Fingerprint Reader: 2 – KNOW, AREDesktop + Fingerprint Reader: 2 – KNOW, ARE ATM: 2 – HAVE, KNOWATM: 2 – HAVE, KNOW Web site: 1 – KNOWWeb site: 1 – KNOW Charlie’s Angels: 1 – ARECharlie’s Angels: 1 – ARE March R. Smith - University of St Thomas - Minnesota

Access Permissions Question 7 – YESQuestion 7 – YES Question 8:Question 8: –Owner – Bob or Tina –Group – any name –Members – Bob and Tina –Owner Access – RW –Group Access – RW –World Access – -- March R. Smith - University of St Thomas - Minnesota

Web Browser Secret Keys 128-bit key with 88 bits published128-bit key with 88 bits published Question 9: 40 bits, 10 12Question 9: 40 bits, Question 10Question 10 –Doubles 8 times over 12 years –Doubling = 1 bit, so size increases by 8 bits –= 48 bits Question 11Question 11 –40 bits in the browser secret + 16 bits = 56 bits in DES NOT 144 bits ( )NOT 144 bits ( ) –If we double 8 times over 12 years, then 16 times over 24 years – = 2019 March R. Smith - University of St Thomas - Minnesota

Question 12 1 bit broken in first ciphertext block1 bit broken in first ciphertext block –Xored with encrypted IV = 1 bit broken in 1 st plaintext block First ciphertext block is block encryptedFirst ciphertext block is block encrypted –Encrypted result is ALL GARBAGE –Result XORed with second ciphertext block –Second plaintext block = ALL GARBAGE Second ciphertext block is block encryptedSecond ciphertext block is block encrypted –Ciphertext is clean -> plaintext is undamaged March R. Smith - University of St Thomas - Minnesota

Questions 13 and 14 Question 13Question 13 –32000 / (2 *.25) = 64,000 Question 14Question 14 –Provide inputs from the ciphertext file Ciphertext AND NonceCiphertext AND Nonce Create the key with the one-way hashCreate the key with the one-way hash –Mistakes Not showing the right source for the nonceNot showing the right source for the nonce Not showing all the functionsNot showing all the functions Not giving all inputs to the functionsNot giving all inputs to the functions March R. Smith - University of St Thomas - Minnesota

Networking Intro for Security Types of network connectionsTypes of network connections March R. Smith - University of St Thomas - Minnesota

Types of network connections –Point-to-point – a raw set of wires Connects point A to point B, and that’s allConnects point A to point B, and that’s all Classic phone system = sets of point to point wiresClassic phone system = sets of point to point wires –Wired broadcast – like digital cable TV signals Everyone on the wire hears the signalEveryone on the wire hears the signal Classic Ethernet was like thisClassic Ethernet was like this baseT uses ‘star’ hubs, switches to do this baseT uses ‘star’ hubs, switches to do this –Wireless broadcast – everyone hears it Alohanet – the grandad of EthernetAlohanet – the grandad of Ethernet Modern satellite TV is a digital broadcastModern satellite TV is a digital broadcast –Directed wireless “line of sight” transmission Classic microwave towersClassic microwave towers Satellite – to some extentSatellite – to some extent March R. Smith - University of St Thomas - Minnesota

Network Topologies Goal is “everyone talks to everyone”Goal is “everyone talks to everyone” Here are the ‘real’ topologiesHere are the ‘real’ topologies –Bus or “Star Hub” Everyone links on and hears everythingEveryone links on and hears everything –Switched Star Everyone connects to everyone, linked through a switchEveryone connects to everyone, linked through a switch Can’t eavesdrop as easilyCan’t eavesdrop as easily –Daisy Chain or Ring Like a game of ‘hot potato’ = pass messages alongLike a game of ‘hot potato’ = pass messages along Appears in some metropolitan optical networksAppears in some metropolitan optical networks –Distributed Links Phone system, Internet = lots of ‘hops’ as data travelsPhone system, Internet = lots of ‘hops’ as data travels March R. Smith - University of St Thomas - Minnesota

Connection implications Can attacker hear the messages?Can attacker hear the messages? –“Passive” attack Can attacker produce messages?Can attacker produce messages? –“Active” attack If so, what must the attacker do to ‘hook up’?If so, what must the attacker do to ‘hook up’? –Consider each type of network connection Defense questionsDefense questions –Can we shield our messages from eavesdropping? –Can we block outsiders from joining our network? –Can we detect/discard traffic from outsiders? March R. Smith - University of St Thomas - Minnesota

Other technical nits Digital versus analog transmissionDigital versus analog transmission –Computers don’t ‘do’ analog by themselves Need D/A and A/D converters handle analog signalsNeed D/A and A/D converters handle analog signals –Modems – for systematic transmission over analog lines Converts digital to analog for transmission, then back againConverts digital to analog for transmission, then back again Synchronous vs AsynchronousSynchronous vs Asynchronous –“Synchronous” digital data is supposedly more efficient A bit or byte of data is sent EVERY time periodA bit or byte of data is sent EVERY time period Whether data is available or notWhether data is available or not –A tradition from the days of IBM mainframe ‘terminals’ –Asynchronous is more flexible Start or stop according to data availabilityStart or stop according to data availability March R. Smith - University of St Thomas - Minnesota

Local Nets and the Internet Local nets (LANs) connect machines with a single technology, and one set of reachable addressesLocal nets (LANs) connect machines with a single technology, and one set of reachable addresses –Usually you can easily broadcast on your local net –It’s a ‘wiring’ question to join your LAN The Internet allows us to ‘hop across’ LANs to get from one computer to anotherThe Internet allows us to ‘hop across’ LANs to get from one computer to another –Internet provides globally recognized addresses for computers –Internet routers send packets between LANs Directs them to the right LAN to get closer to the destinationDirects them to the right LAN to get closer to the destination March R. Smith - University of St Thomas - Minnesota

Networking and “Layers” Modern networking is built in layersModern networking is built in layers –Network software is called the “protocol stack” –Different software layers for different levels of protocol The layersThe layers –Application layer – programs and services like Web or –Socket interface – between application and TCP/IP –TCP/UDP – provides reliability or process addressing TCP = reliable, orderly data delivery to a specific processTCP = reliable, orderly data delivery to a specific process UDP = unverified data delivery to a specific processUDP = unverified data delivery to a specific process –IP – provides addressing ACROSS local networks –Link – provides addressing on a LAN March R. Smith - University of St Thomas - Minnesota

Addressing and Connecting Modern computers connect at 4 levelsModern computers connect at 4 levels Physical – wireless or a wirePhysical – wireless or a wire Node-node – connecting on a LANNode-node – connecting on a LAN Host-host – Internet addressingHost-host – Internet addressing Socket-socket – applications and processesSocket-socket – applications and processes March R. Smith - University of St Thomas - Minnesota

March R. Smith - University of St Thomas - Minnesota Creative Commons License This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit sa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.