1 / 36

Networking

Networking. Kevin, Ray, Kelvin, Stephan, Norman, Phil . History. - ARPANET (Advanced Research Projects Agency Network) - World's first operational packet-switching network - Became the core network of what composes the global Internet

foy
Download Presentation

Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil

  2. History - ARPANET (Advanced Research Projects Agency Network) - World's first operational packet-switching network - Became the core network of what composes the global Internet - Originally consisted of terminals in UCLA, Standford, UCSB, and the University of Utah

  3. History - DoD was concerned about our ability to survive a nuclear strike due to lack of a reliable communications network - Paul Baran and Rand corp. say that most reliable would be a computer network which broke the message into units (packets) and sent them along to the destination

  4. Networks As We Know Them Today • A collection of computers and devices interconnected by communications channels that facilitate communications among users and allows user to share resources • Source: http://en.wikipedia.org/wiki/Computer_network

  5. Purposes of a Modern Network • Facilitates communications • E-mail, IM’s, chat rooms • Sharing hardware • A set of printers to be used by a whole office • Sharing data • Sharing software • Running programs via a remote connection

  6. Outline Kevin – Network Ray – IP'S and Packets Kelvin – Sockets Stephan – Security Norman – Hardware Phil - Conclusion

  7. IP addressesAndPackets

  8. IP’S And Macs • NIC has unique Mac address(physical address) • IP address is logical • IPv4 and IPv6

  9. Packets • All info on networks travel in packets • Data is broken up and sent • Each packet can take a different path • Allows for best path • Put back together when received

  10. EXAMPLE

  11. Packet structure • Fixed length and varying length • Three main parts • Header(most important) • Data • Trailer • Have error checking

  12. Header • Contains all information about data being sent • Packet length • Packet number • Destination and origin • Every packet contains header • Can vary in size

  13. Other parts • Data section contains the data • Trailer identifies end • Check sum error checking • All words in the message are XOR • Receiving end performs same operation and includes original XOR • If not all zeros error occurred

  14. Sockets

  15. What are sockets? - Used for client/server interaction - Mechanism for transfer of data - Socket API is provided by the OS - Interface between applications and networking and transfer protocols

  16. How do sockets work? - Server process waits for client - Server accepts and binds client - Server waits for client request - Server replies to request - Close

  17. How do sockets work? (Diagram) Link: http://publib.boulder.ibm.com/infocenter/iseries/v5r4/topic/rzab6/rxab6500.gif

  18. Accepting connections - Usually threaded to listen on many ports - Client sends a connection request - Server binds the client using IP and port number - Analogous to telephone/ext

  19. Transferring Data - Sockets are identified by socket identifier, aka socket number - OS decodes packets to determine socket number, then forwards payload to application - Sockets are bidirectional - Different kinds of sockets use different protocols (TCP/UDP/etc.)

  20. Security

  21. What is it? Protection Layers of security Administrator privileges

  22. How does it work Authentication of user Firewall enforced policies What about worms and viruses? Need IPS or IDS Encryption

  23. IPS and IDS Intrusion Detection System(IDS) Network Intrusion Detection System Host-based Intrusion Detection System NIDS HIDS

  24. IPS and IDS cont... Intrusion Prevention System(IPS) Improvement of IDS Classifications NIPS – Network-based Intrusion Prevention WIPS – Wireless-based Intrusion Prevention NBA – Network Behavior Analysis HIPS – Host-based Intrusion Prevention

  25. Detection Methods Signature-based Detection Statistical Anomaly-Based Detection Stateful Protocol Analysis Detection

  26. Hardware

  27. Network Interface Card • Simply an I/O device • Sends and receives data to the network in the form of packets • Will do DMA reads/writes directly to/from main memory • Can generate headers, but this is usually done by the CPU

  28. Network Interface Card • After creating the frame or packet, the OS will create a buffer descriptor which will tell where and how large the data is • After creating the buffer descriptor, the OS will notify the NIC that it is ready • The NIC will then do a DMA read for the descriptor and then for the actual frame • The frame is then sent out to the network

  29. Network Interface Card • OS will also have the NIC keep buffer descriptors pointing to free space in main memory • When a frame is received, it will do a DMA write to main memory • It will then modify the descriptor to reflect the received data, DMA write it to memory, and notify the OS that a frame is ready

  30. Drivers • Handles the translation from standard I/O function calls to the hardware’s specific required software in order to run • Can run in both kernel and user mode • Kernel mode used mainly for speed • User mode used mainly for stability

  31. Hub • Sends all packets to all other systems connected to it • High tendency to cause data collisions • Collisions refer to when two or more systems send data over the network, requiring the now-fragmented data to be retransmitted

  32. Switch • Like a hub, connects multiple systems together to form a new network • Operates by forwarding data to specific systems on the network • May be able to be piggy-backed, but may also require crossover cables • Have unmanaged and managed modes where unmanaged refers to plug-and-play

  33. Switch • Avoids data collisions by sending data only to its intended destination as a full-duplex machine • Keeps track of MAC addresses of each connected system (nodes) in a table

  34. Router • Connects networks together and forwards traffic between them • Most have built-in switches • Performs the job of a computer which acts as a gateway (much cheaper than the computer)

  35. Router Computer Internet Computer Switch Computer Computer Computer Internet Router Switch Computer Computer Computer Internet Modern Router Computer Computer

  36. Conclusion What did we learn?

More Related