CS 468: Advanced UNIX Class 7

Preview:

DESCRIPTION

CS 468: Advanced UNIX Class 7. Dr. Jesús Borrego Regis University. Topics. IA Lab visit was scheduled for last week; rescheduled for next week Review of Homework 5 Networking Homework 6 Review for final Q&A. Networking. Computers connecting to other computers - PowerPoint PPT Presentation

Citation preview

scis.regis.edu ● scis@regis.edu

CS 468: Advanced UNIXClass 7

Dr. Jesús BorregoRegis University

1

Topics

•IA Lab visit was scheduled for last week; rescheduled for next week

•Review of Homework 5•Networking•Homework 6•Review for final•Q&A

2

Networking

•Computers connecting to other computers•Computers connecting to the Internet•Network Topologies•Network Devices•Internetworking•Communicating with Users•Data distribution•NFS

3

Communication model

4

CommunicationsInfrastructure

Source

Transmitter

Transmission System

Receiver

Destination

OSI Model

5

Physical

Data Link

Network

Transport

Session

Presentation

Application

Internet Protocol Stack

6

Transport

Physical

Data Link Control

Network/ Internet

Transport

Application

OSI vs. IP

7

Physical

Data Link

Network

Transport

Session

Presentation

Application

Physical

Data Link Control

Network/ Internet

Transport

Application

Ethernet

8

100 Mbps

100 Mbps

100 Mbps

1 Gbps

server

Ethernetswitch

institutionalrouter

to institution’sISP

typically used in companies, universities, etc▫ 10 Mbps, 100Mbps, 1Gbps, 10Gbps Ethernet▫ today, end systems typically connect into

Ethernet switch

Bridges

•Connects separate networks▫One Ethernet network to another one▫“Bridges” two network segments together▫Makes it appear as if the two segments

were a single one•Wire length is limited due to degradation

of signal•Bridges allow extension of physical

limitation of wire

9

Routers

•Bridges cannot accommodate large networks

•Routers connect two or more networks▫“Routes” incoming messages to

appropriate network•Can be used to connect a LAN to an ISP

(Internet Service Provider)•Can be used to link the different networks

in the global Internet

10

Gateway

•Used to connect remote LANs to a WAN (Wide Area Network)

11

Topologies

Typical LAN topologies include:•Bus

▫Single link for all computers•Ring (Token)

▫Each computer connected to at least 2 other computers

•Star▫Central server

12

Internetworking – Packet Switching

13

sequence of A & B packets has no fixed timing pattern

Time Division Multiplexing (TDM)

A

B

C100 Mb/sEthernet

1.5 Mb/s

D E

statistical multiplexing

queue of packetswaiting for output

link

Internet Address

IPv4 – 4 Octets•Class A: 0*.*.*.* (two reserved, all 0’s and all 1’s)•Class B: 10*.*.*.*•Class C: 110*.*.*.*•Class D: 111*.*.*.*•Class E: 1111*.*.*.*Many subnet calculators available online

14

Ports and common services

15

Users in your system

•users – local host users•rusers - users on local network•who – more info than users•rwho – more info than rusers•w – more information than who•whois – information about major internet

sites•hostname – displays local host name•finger – lists information about a user

16

Finger utility

17

User communication on a network•write – send individual lines to user•talk – interactive split screen two-way chat

•wall – send messages to all users on local host

•mail – send email messages•mesg – disables incoming messages to your terminal

18

File transfer on network

•Rcp (remote copy) – copy files from one host to another

•uucp (unix-to-unix copy) – like rcp, copies files between two hosts

•ftp (file transfer protocol/program) – copy files between local host and other hosts

•Commands for ftp: UPU page 338

19

Distributed access commands

•rlogin – provides login to remote servers

•rsh – execute shell commands on remote Unix hosts

•telnet – executes commands on remote telnet hosts

20

Network File System (NFS)

•Public domain specification developed by Sun Microsystems

•Allows you to mount several local file systems into a single network file hierarchy

•Provides remote mount capability•Uses RPC to mount a file system on

remote machine

21

Internet control

•ICANN – Internet Corporation for Assigned Names and Numbers – allocates names and domains

•ISOC – Internet Society – represents Internet users, technical advisory society

•IGF – Internet Governance Forum, global forum established by the United Nations in 2005

23

Network Standards

RFC: Request for Comments•RFC 114/959: A File Transfer Protocol •RFC 791: Internet Protocol•RFC 793: Transmission Control Protocol•RFC 1945: Hypertext Transfer Protocol HTTP 1.0•RFC 2251: Lightweight Directory Access Protocol•RFC 2460: Internet Protocol v6 (IPv6)•RFC 4251: Secure Shell (SSH) Protocol Architecture

24

Internet Protocols

26

Internet Protocols

27

BGP - Border Gateway Protocol

FTP - File Transfer Protocol

HTTP - Hypertext Transfer Protocol

ICMP - Internet Control Message Protocol

IGMP - Internet Group Management Protocol

IP - Internet Protocol

MIME - Multipurpose Internet Mail Extension

Source: Stallings, W. (2007). Data and computer communications (8th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

Internet Protocols (Cont’d)

28

OSPF – Open Shortest Path FirstRSVP – Resource ReSerVation

ProtocolSMTP – Simple Mail Transfer

ProtocolSNMP – Simple Network

Management ProtocolTCP – Transmission Control

ProtocolUDP – User Datagram Protocol

Source: Stallings, W. (2007). Data and computer communications (8th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

Sample Flow

31

Server

Application

Presentation

Session

Transport

Network

Data Link

Physical

Data

Data

Data

Data

Data

Data

Data

Server

Application

Presentation

Session

Transport

Network

Data Link

Physical Data

Data

Data

Data

Data

Data

Data

IPv4

32

IPv6

33

Internet Addressing•Media Access Control (MAC): used by

hardware•IPv4 and IPv6 used by software to

determine source, destination, and component location (NIC, not computers)

•Hostnames used by people•Data link layer maps IPs to hardware•Hostnames can map names to IPs

34

Sample subnet calculator

35

Source:http://www.subnetonline.com/pages/subnet-calculators/ip-subnet-calculator.php

CIDRClassless Inter-Domain Routing•Netmasks that do not end in a byte boundary•Each byte has 8 bits•To subnet 128.138.243.0 with 26 bits – not a byte boundary (8, 16, 24), we use the convention 128.138.243.0/26

37

26 bits 6 bits

CIDR Calculator

39Source: http://www.subnet-calculator.com/cidr.php

NAT•Private addresses can be used

internally by an organization•NAT captures internal addresses and

prevents them from exiting the corporate environment

•NAT maintains a table of internal versus external addresses to ensure that no internal addresses escape to the global Internet

42

Routing•The process of determining the

output path for an incoming packet•Routing tables are maintained in the

kernel and also in routers throughout the Internet

•If the server does not know where to send it next, it uses the Address Resolution Protocol to determine next action

44

Routing

45

1

23

0111

value in arrivingpacket’s header

routing algorithm

local forwarding table

header value output link

0100010101111001

3221

ARP•ARP discovers the hardware address

associated with an IP address•If the destination address is not in the

same network, ARP determines the next hop router

•If address is not known, it send a broadcast message “Does anybody know where X is?”

•Response is received and then the protocol uses the response

46

DHCP•Dynamic Host Configuration Protocol

(RFC 2131)•When a host connects to a network, it

obtains a ‘lease’ on an IP address, gateways, DNS name servers, Syslog hosts, and others.

•If the lease is not renewed, it expires

47

DHCP interaction

48

DHCP server: 223.1.2.5 arriving client

time

DHCP discover

src : 0.0.0.0, 68 dest.: 255.255.255.255,67yiaddr: 0.0.0.0transaction ID: 654

DHCP offer

src: 223.1.2.5, 67 dest: 255.255.255.255, 68yiaddrr: 223.1.2.4transaction ID: 654Lifetime: 3600 secs

DHCP request

src: 0.0.0.0, 68 dest:: 255.255.255.255, 67yiaddrr: 223.1.2.4transaction ID: 655Lifetime: 3600 secs

DHCP ACK

src: 223.1.2.5, 67 dest: 255.255.255.255, 68yiaddrr: 223.1.2.4transaction ID: 655Lifetime: 3600 secs

Security Issues•Default IP forwarding on a server

should be disabled to prevent the server to act as a router

•ICMP redirect (you should not send packet to me, send to XYZ) can compromise system

•Source routing can slip through firewalls▫Do not want to accept or forward

source-routed packets

49

Security Issues (Cont’d)•IP spoofing means changing source or

destination in packet header▫Receiver may believe source and reply

to a malicious server (man-in-the-middle attack)

•Host-based firewalls are preferred to client-based firewalls

•VPN – allow remote uses to create ‘tunnels’ to the private network▫Requires encryption

50

Virtual Private Network (VPN)•IP spoofing means changing source or

destination in packet header▫Receiver may believe source and reply

to a malicious server (man-in-the-middle attack)

•Host-based firewalls are preferred to client-based firewalls

•VPN – allow remote uses to create ‘tunnels’ to the private network▫Requires encryption

51

52

VPN

Routing•Routing has different meanings:

▫Actual forwarding packets▫Management of routing tables

•Routing consists of determining the ‘next hop’ in the route towards the destination

63

Routing Daemons•Routing daemons collect information

from three sources:▫Configuration files▫Existing routing tables▫Routing daemons on other systems

•Daemons collect this information to determine optimal route and new routes are added to routing tables

65

Homework 6 (last)1. What is the difference between a bridge, a

router, and a gateway?2. Describe 3 Internet Protocols and provide

examples of where they can be used.3. What are the differences between ftp and rcp?

Which one is better and why?4. Explain how ICMP redirection can cause

vulnerabilities in a network.5. Using an IP subnet calculator of your choice,

answer the questions in E14.3 found in the USAH book. Capture the calculator screen.

68

Review for Final

•Same format as Midterm▫2 hour, take home▫8 questions▫Email to jborrego@regis.edu by midnight

4/26▫All material from week 4-7

•Week 8: 2 hour class, 2 hour take home final

69

Questions?

70

Recommended