1 / 11

ECE-3600 Topics to Review for the Final Exam csc.gatech/copeland/jac/3600/slides/

ECE-3600 Topics to Review for the Final Exam www.csc.gatech.edu/copeland/jac/3600/slides/. 12 /3/2015. Chapter 1 - The Internet Autonomous Systems (AS) - connected by ISPs (tiers) Block(s) of IP addresses assigned (subnets) by IANA

restabrook
Download Presentation

ECE-3600 Topics to Review for the Final Exam csc.gatech/copeland/jac/3600/slides/

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ECE-3600 Topics to Review for the Final Exam www.csc.gatech.edu/copeland/jac/3600/slides/ 12/3/2015

  2. Chapter 1 - The Internet Autonomous Systems (AS) - connected by ISPs (tiers) Block(s) of IP addresses assigned (subnets) by IANA Domain Names - assigned by Registrars (Verisign, Two Cows, …) to AS's, Companies, Individuals. Used in Universal Resource Locators (URLs) Authoritative DNS servers (names -> 32 bit no.s) Edge Routers and Firewalls Domain Name System Root, Top Level (.com), Authoritative (AS's), Local DNS servers Recursive, Non-recursive lookups Domain Name Registrars ("whois", "nslookup") Parts of URL like www.csc.gatech.edu (host,subnet, domain) Dynamic DNS, reverse lookups, mx lookups

  3. Chapter 2 - Applications and Application Layer HTTP (Web) - get command, "objects", Browser Simultaneous TCP connections, (non-)persistent FTP - separate (out of band) control on TCP port 22 original (non-passive) data on TCP 21 with client listening passive - data on high-port/high-port TCP, normal establishment Email - role that email servers play (messages not host to host) SMTP - for sending mail to server, and server to server POP - post office protocol, to check and download email IMAP - ditto plus store mail in many folders on server Web Mail - uses browser as interface to Email Server. (HTML formatted email can bear malicious applications) Peer-to-Peer Network - no central server, or limited function server. "Socket" - the OS interface between the Application Layer and the Transport Layer (TCP, UDP, etc.). Defined by Source and Destination IP addresses and S&D Port numbers (4 items, and TCP or UDP). TCP Servers also have a "Listening Socket" to receive initial contacts from new IP,Port combinations.

  4. Chapter 3 - Transport Layer UDP, TCP port numbers, server and client Sockets, "Listening Socket" for server Connections - how defined (IPs and Ports) TCP - reliable connections Flow control - Receiver Window size in every TCP header. Congestion control, Congestion Window variation due to ? Time out, slow start # Duplicate Acks, fast recovery Flag bits, sequence and ack numbers in header Slow Start, Exponential Decrease + Additive Increase Rapid retransmission (3 dup.s), RTO (-> slow start) Receiver Window (size), Congestion Window (size) TCP, UDP, ICMP, IC - 1's checksums for error detection File Transmission Time - when Window Limited, and when not Round-trip packet propagation time thru multiple routers, including 1) cache delay, 2) transmission time, and 3) link propagation time.

  5. Chapter 4a - IP Addresses network address, network mask CIDR notation - a.b.c.d/n sub-nets, no. hosts, reserved addresses network address, broadcast address routing choice, longest prefix rule dividing a block of IP addresses into sub-nets aggregating Subnets to shorten Routing Table "Longest Prefix Rule" Network Address Translation, "private address blocks", how NAT capability changes IP addresses and Ports (single outside IP, many private IPs inside). IP Header Fragmentation - Datagram ID Offset, Flags: "Frag. Flag" (mf), "Do Not Frag. (DNF) Time to Live (TTL), 1's Checksum IPv6 - 128-bit addresses, Flow ID (future use), Frag. info in option

  6. Chapter 4b - Routing Routers forward IP datagrams toward recipient Parts of a router (input queue, output queue, switching fabric, routing processor [forwarding table]) OSPF Dykstra algorithm, forwarding table from tree. Broadcast to all, link costs to neighbors RIP Bellman-Ford algorithm, lowest route in forwarding table from nearest neighbors tables (+1) Reverse path poisoning to prevent loops Limited to small sub-nets. BGP Used on backbone to connect AS’s.

  7. Chapter 5 -Local Area Networks - Ethernet Ethernet can transport many Network Layer protocols besides IP. LAN connects hosts to other hosts on that LAN or to the gateway router (to connect worldwide) Hubs - collision domains, exponential backoff Switches - "forwarding table" self learning How are addresses assigned -Manufacturer ID Virtual LAN (VLAN) – what? why? CDMA/CD - what is “CD”, “MA”, “CD” Collisions, Exponential Backoff Full or Half Duplex Address Resolution Protocol (ARP), uses broadcast addresses (MAC and IP) - (as does DHCP when looking for IP, netmask, DNS IP) [Dynamic Host Configuration Protocol]

  8. Chapter 6 - Wireless Networks Wireless - WiFi - IEEE 802.11 CDMA/CA - what is “CD”, “MA”, “CA” ARQ - acknowledgement, retransmission CDMA - 1 spreading chip, only for robustness Security: WEP is weak, WPA needs 22 character passphase WiMAX (4G) - IEEE802.16 - longer distance point to point - last mile to home, metro area coverage Cellular Freq. Division - different freq. sets used by near cells FM modulation - used by AMPS (obsolete), T(ime)DMA (GSM - AT&T), C(ode)DMA (Verizon) Cells -> frequency reuse, many more users. Data - EDGE, 3G, 4G

  9. Chapter 7 - Multimedia Problems to overcome: Timing jitter - use Playback Buffer (adds delay) Delay - problem for interactive (phone, videoconf.) - Future, may see "flow switching" in IPv6 network. - Today, higher-bandwidth links minimize congestion Dropped Packets (with UDP streaming) - Application must mitigate (interpolate to fill in) - Forward Error Correction (add parity bits, interleave) TCP - slows down if packets dropped (congestion control) RTSP - Real Time Streaming Protocol (vs. TCP, UDP) Adds serial numbers, time stamps, no retransmission. Web Browser - link to Video or Audio - link downloads "metafile," uses it to start player ("Media Player", QuickTime, "Real Player", …) Broadcast - Flooding (like Multicast Tree) Session Initiation Protocol (SIP) and H.323 - Voice and Video call setup

  10. Chapter 8 - Security Services: Privacy, Authentication (& Authorization), Access, Integrity Encryption plaintext -> [ Encryption ] -> ciphertext ciphertext -> [ Decryption ] -> plaintext Symmetric Encryption uses same key for both operations (KDC) Asymmetric Encryption uses two keys, Public and Private Bob uses his Private Key to: Decrypt messages to him, encrypted with his Public Key Sign messages by encrypting the Message Digest (hash) Others use Bob's Public Key to: Encrypt messages for him, decrypt his digital signature. SSL with HTTP makes HTTPS: Web sites have "Certificate" signed by a Certificate Authority (CA) Browser will warn Certificate is invalid, if the signing CA's Cert is not on file. If on file, Browser uses CA Public Key to verify Web Certificate Certificate sent to Browser, which uses the enclosed "Public Key" to encrypt "Session Key" and send it back to Web site. Public Key Infrastructure (PKI) requires CA have a database of valid and revoked Certificates that it has signed.

  11. Transport Layer Security (TLS) - like SSL, used for secure email connections. New versions of SSL are same as TLS. PGP and GnuPG - used with individual's Public/Private Keys to encrypt and sign email messages. Bot Nets - up to 200,000 computers infected with Bot (from robot) software, connected in a Peer-to-Peer network, controlled by a Bot Master who steals information (IDs), contracts to send SPAM and malware, DDOS competitor's servers, operate Phishing Sites, … . Classic Hacker attacks by five steps: 1. Reconnaissance - scans IP addresses to find hosts with "open" ports. 2. Exploit - gain access to computer through server software known to have a "vulnerability" 3. Escalate Privilege - to root or "admin" with another technique. 4. "Root Kit" - install a root kit or bot program to hide presence and open a permanent back door. 5. Utilize - steal information, add to bot net, use as evil server, …

More Related