38
Networking Overview 1 Networking Overview

Networking Overview 1 Networking Overview. Networking Overview 2 Network Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Embed Size (px)

Citation preview

Page 1: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 1

Networking Overview

Page 2: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 2

Network Includes

o Computerso Serverso Routerso Wireless deviceso Etc., etc.

Purpose is to transmit data

Page 3: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 3

Network Edge

Network edge includes

Hostso Computerso Laptopso Serverso Cell phoneso Toasters, etc.

Page 4: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 4

Network Core

Network core consists ofo Interconnected

mesh of routers Purpose of core

is to move data from host to host

Page 5: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 5

Packet Switched Network Usual telephone network is circuit

switchedo For each call, a circuit is establishedo Dedicated bandwidth

Modern data networks are packet switchedo Data is chopped up into discrete packetso Packets are transmitted independentlyo No real circuit is establishedo More efficient bandwidth usageo But more complex than circuit switched

Page 6: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 6

Network Protocols Study of networking focused on

protocols Networking protocols precisely specify

the communication rules Details are given in RFCs

o RFC is essentially an Internet standard Stateless protocols don’t remember Stateful protocols do remember Many security problems related to state E.g., DoS easier against stateful

protocols

Page 7: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 7

Protocol Stack Application layer

protocolso HTTP, FTP, SMTP, SNMP,…

Transport layer protocolso TCP, UDP

Network layer protocolso IP, routing protocols

Link layer protocolso Ethernet, PPP

Physical layer

application

transport

network

link

physical

userspace

OS

NICcard

Page 8: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 8

Layering in Action

application

transport

network

link

physical

application

transport

network

link

physical

network

link

physical

data data

At source, data goes down the protocol stack Each router processes packet up to network layer

o That’s where routing info lives Router then passes packet down the protocol stack Destination processes up to application layer

o That’s where the data lives

host host

router

Page 9: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 9

Encapsulation X = application data at the source As X goes down protocol stack,

each layer adds header information:o Application layer: (H, X)o Transport layer: (H, (H, X))o Network layer: (H, (H, (H, X)))o Link layer: (H, (H, (H, (H, X))))

Header has info required by layer Note that app header is on the

inside

application

transport

network

link

physical

data X

packet (H,(H,(H,(H,X))))

Page 10: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 10

Application Layer Applications

o Web browsing, email, P2P, Network mgmt, etc.

o Applications run on hostso Hosts want transparent network

Application layer protocolso HTTP, SMTP, IMAP, Gnutella, SNMP, etc.

Protocol is one part of an applicationo For example, HTTP only a part of web

browsing

Page 11: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 11

Client-Server Model Client “speaks first” Server tries to respond to request Hosts are clients and/or servers Example: Web browsing

o You are the client (request web page)o Web server is the server

Page 12: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 12

Peer-to-Peer Model Hosts act as clients and servers For example, when sharing music

o You are client when requesting a fileo You are a server when someone downloads

a file from you In P2P model, more difficult for client to

find a server Many different P2P models

Page 13: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 13

HTTP Example

HTTP --- HyperText Transfer Protocol Client (you) request a web page Server responds to your request

HTTP request

HTTP response

Page 14: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 14

Web Cookies

HTTP is stateless --- cookies used to add state Initially, cookie sent from server to browser Browser manages cookie, sends it to server Server looks in cookie database to “remember”

HTTP requestHTTP response, cookie

initialsession

latersession

cookie

cookie HTTP request, cookie

HTTP response

Cookiedatabase

Page 15: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 15

Web Cookies Web cookies can be used for

o Shopping cartso Recommendations, etc.o A weak form of authentication

Privacy concernso Web site can learn a lot about youo Multiple web sites could learn even

more

Page 16: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 16

SMTP SMTP used to send email from

sender to recipient’s mail server Then use POP3, IMAP or HTTP (Web

mail) to get messages from server SMTP commands are human

readable

SMTPPOP3

Sender Recipient

SMTP

Page 17: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 17

Spoofed email with SMTPUser types the red lines:> telnet eniac.cs.sjsu.edu 25220 eniac.sjsu.edu HELO ca.gov 250 Hello ca.gov, pleased to meet you MAIL FROM: <[email protected]> 250 [email protected]... Sender ok RCPT TO: <[email protected]> 250 [email protected] ... Recipient ok DATA 354 Enter mail, end with "." on a line by itself It is my pleasure to inform you that you are terminated . 250 Message accepted for delivery QUIT 221 eniac.sjsu.edu closing connection

Page 18: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 18

Application Layer DNS --- Domain Name Service

o Convert human-friendly names such as www.google.com into 32-bit IP address

o A distributed hierarchical database Only 13 “root” DNS servers worldwide

o A single point of failure for Interneto Attacks on root servers have succeededo Attacks have not lasted long enough (yet…)

Page 19: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 19

Transport Layer The network layer offers unreliable,

“best effort” delivery of packets Any improved service must be provided

by the hosts Transport layer has two protocols

o TCP more services, more overheado UDP minimal services, minimal overhead

TCP and UDP run on hosts, not routers

Page 20: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 20

TCP TCP assures that packets

o Arrive at destinationo Are processed in ordero Are not sent too fast for receiver (flow control)

TCP also provideso Network-wide congestion control

TCP is “connection-oriented”o TCP contacts server before sending datao Orderly setup and take down of “connection”o But no true connection, only a logical

connection

Page 21: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 21

TCP Header

Source and destination port Sequence number Flags (ACK, SYN, RST, etc.) 20 bytes (if no options)

Page 22: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 22

TCP Three Way Handshake

SYN: synchronization requested SYN-ACK: acknowledge SYN request ACK: acknowledge msg 2 and send data Then TCP “connection” established

o Connection terminated by FIN or RST packet

SYN request

SYN-ACK

ACK (and data)

Page 23: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 23

Denial of Service Attack The TCP 3-way handshake makes denial

of service (DoS) attacks possible Whenever SYN packet is received, server

must remember “half-open” connectiono Remembering consumes resourceso Too many half-open connections and server

resources will be exhaustedo Then server can’t respond to new

connections

Page 24: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 24

UDP UDP is minimalist, “no frills” service

o No assurance that packets arriveo No assurance packets are in order, and so on

Why does UDP exist?o More efficient (smaller header)o No flow control to slow down sendero No congestion control to slow down sender

Packets sent too fast, they will be droppedo Either at intermediate router or at destinationo But in some apps this is OK (audio/video)

Page 25: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 25

Network Layer Core of network/Internet

o Interconnected mesh of routers Purpose of network layer

o Route packets through this mesh Network layer protocol is IP

o Follows a “best effort” approach IP runs in every host and every router Routers also run routing protocols

o Used to determine the path to send packetso Routing protocols: RIP, OSPF, BGP, etc.

Page 26: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 26

IP Addresses IP address is 32 bits Every host has an IP address Not enough IP addresses!

o Lots of tricks to extend address space IP addresses given in dotted decimal

notationo For example: 195.72.180.27o Each number is between 0 and 255

Host’s IP address can change

Page 27: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 27

Socket Each host has a 32 bit IP address But many processes on one host

o You can browse web, send email at same time How to distinguish processes on a host? Each process has a 16 bit port number

o Port numbers < 1024 are “well-known” ports (HTTP port 80, POP3 port 110, etc.)

o Port numbers above 1024 are dynamic (as needed)

IP address and port number define a socketo Socket uniquely identifies a process

Page 28: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 28

IP Header

IP header used by routerso Note source and destination IP addresses

Time to live (TTL) limits number of “hops”o So packets can’t circulate forever

Fragmentation information (see next slide)

Page 29: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 29

IP Fragmentation

Each link limits maximum size of packets

If packet is too big, router fragments it Re-assembly occurs at destination

re-assembled

fragmented

Page 30: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 30

IP Fragmentation One packet becomes multiple packets Packets reassembled at destination

o Prevents multiple fragment/re-assemble Fragmentation is a security issue!

o Fragments may obscure real purpose of packet

o Fragments can overlap when re-assembledo Must re-assemble packet to fully understand

ito Lots of work for firewalls, for example

Page 31: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 31

IPv6 Current version of IP is IPv4 IPv6 is a new-and-improved version IPv6 provides

o Longer addresses: 128 bitso Real security (IPSec)

But difficult to migrate from v4 to v6o IPv6 not backward compatible with IPv4

So IPv6 has not taken hold yet

Page 32: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 32

Link Layer Link layer

sends packet from one node to next

Each link can be differento Wiredo Wirelesso Etherneto Point-to-point…

Page 33: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 33

Link Layer Implemented in adapter known as

network interface card, or NICo Ethernet cardo Wireless 802.11 card, etc.

NIC is (mostly) out of host’s controlo Implements both link and physical

layers

Page 34: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 34

Ethernet Ethernet is a multiple access protocol Many hosts access a shared media

o On a local area network, or LAN In ethernet, two packets can collide

o Then data is corruptedo Packets must be resent

How to handle collisions efficient?o Many possibilities, ethernet is most popular

We won’t discuss details here

Page 35: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 35

Link Layer Addressing IP addresses live at network layer Link layer also requires addresses

o MAC address (LAN address, physical address)

MAC addresso 48 bits, globally uniqueo Used to forward packets over one link

Analogyo IP address is like home addresso MAC address is like social security number

Page 36: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 36

ARP Address resolution protocol, ARP Used at link layer to find MAC address

that corresponds to a given IP address Each host has ARP table

o Generated automaticallyo Entries expire after some time (20 min)o ARP used to find ARP table entrieso ARP table also known as ARP cache

Page 37: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 37

ARP ARP is stateless ARP sends request and receives ARP reply Replies used to fill ARP cache

IP: 111.111.111.001 IP: 111.111.111.002

MAC: AA-AA-AA-AA-AA-AA MAC: BB-BB-BB-BB-BB-BB

111.111.111.002 BB-BB-BB-BB-BB-BB 111.111.111.001 AA-AA-AA-AA-AA-AA

ARP cache ARP cache

LAN

Page 38: Networking Overview 1 Networking Overview. Networking Overview 2 Network  Includes o Computers o Servers o Routers o Wireless devices o Etc., etc

Networking Overview 38

ARP Cache Poisoning

Host CC-CC-CC-CC-CC-CC is “man-in-the-middle”

111.111.111.003

111.111.111.002

AA-AA-AA-AA-AA-AA BB-BB-BB-BB-BB-BB

111.111.111.001

CC-CC-CC-CC-CC-CC

LAN

ARP “reply”111.111.111.002

CC-CC-CC-CC-CC-CC

ARP “reply”111.111.111.001CC-CC-CC-CC-CC-CC

111.111.111.002 CC-CC-CC-CC-CC-CC111.111.111.002 BB-BB-BB-BB-BB-BB 111.111.111.001 AA-AA-AA-AA-AA-AA111.111.111.001 CC-CC-CC-CC-CC-CC

ARP cacheARP cache

ARP is stateless Accepts any reply, even if no request sent!