Introduction to Network Security
Chapter 1 Network Architecture
1
- Dr. Doug Jacobson - Introduction to
Network Security - 2009
Introduction to Network Security Chapter 1 Network Architecture - - PowerPoint PPT Presentation
Introduction to Network Security Chapter 1 Network Architecture Dr. Doug Jacobson - Introduction to 1 Network Security - 2009 Chapter Topics Introduction Layered architecture Key terms Protocol Functions OSI model
1
Network Security - 2009
2
Network Security - 2009
3
Network Security - 2009
4
1950s 1960 1970 1980 1990 2000 Point-to-point network to main frames 1969 ARPA NET (4 nodes) 1973 TCP/IP development 1973 Ethernet was proposal in a Ph.D. Dissertation 1977 TCP/IP test bed 1979 UUCPnet 1983 TCP/IP becomes the protocol for ARPANET 1986 NSFNET is started 1995 First ISPs started 1971 15 nodes in APRANET 1980 ARPANET virus (accidental) 1984 over 1000 hosts 1987 over 10,000 hosts 1988 Internet worm infects over 6,000 hosts 1989 over 100,000 hosts 1992 over 1,000,000 hosts 1991 WWW released by CERN 1996 over 10,000,000 hosts 1844 First Telegraph line 1861 Over 2200 telegraph offices 1866 First transatlantic cable 1875 First words on a telephone 1880 over 30,000 phones 1900 over 600,000 phones 1910 over 5,000,000 phones 1920 over 11,000,000 phones 1968 300 baud modem 1840 1900
Network Security - 2009
5
Network Security - 2009
6
Network Security - 2009
7
– take information from above (layer N-1) – and pass information below (layer N+1)
Network Security - 2009
8
Network Security - 2009
9
Layer A Layer B Send_packet Rcv_packet Send_data Rcv_data Layer A Layer B Send_packet Rcv_packet Send_data Rcv_data Protocol A Protocol B
Network Security - 2009
10
to layer N communication.
– example: saying “hello” on the telephone is a protocol
– what protocol it uses – what it expects as input (SAPs) – what functions it provides
functionality.
– (ie: different ethernet card brands)
Network Security - 2009
11
Network Security - 2009
12
Layer A Layer B Layer A Layer B Data Data Data Data Data Data Data Data Data Data Protocol A Protocol B AH BH AH AH AH AH AH AH AH BH BH BH
Network Security - 2009
13
Network Security - 2009
14
Network Security - 2009
15
Network Security - 2009
16
Network Security - 2009
17
Network Security - 2009
18
Network Security - 2009
19
Network Security - 2009
20
Network Security - 2009
21
Network Security - 2009
22
Layer A2 Layer B Layer A3 A1 Data Protocol B A3 A2 A1 BH BH BH A2 Data A3 Data Layer A1 A2 Data A3 Protocol A1 Protocol A2 Protocol A3 Data A1
Network Security - 2009
23
Pickup Receiver Busy Signal Dial Tone Dial Number Caller Phone System Central Offices Ring the phone Called Party Pickup Receiver Ring tone Stop ring tone Called party says something Calling party Answers Either party can hang up Either party can hang up Dial Tone Dial Tone Dial Number Time Conversion (see diagram below)
Network Security - 2009
24
Hello Is John there? Yes, this is John Conversation Good bye, John Good Bye
Network Security - 2009
25
Network Security - 2009
26
across the physical interconnection of systems
– Point-to-point – Multipoint
to identify the end point.
they were offered for transmission by the Data Link Layer.
Network Security - 2009
27
Network Security - 2009
28
Network Security - 2009
29
Network Security - 2009
30
Network Security - 2009
31
Network Security - 2009
32
Network Security - 2009
33
Network Security - 2009
34
Network Security - 2009
35
Network Security - 2009
36
Network Security - 2009
37
Application TCP IP Physical Network Application TCP IP Physical Network IP Physical Network IP Physical Network End System End System Intermediate System Intermediate System
Network Security - 2009
38
TCP/IP 4 layer model Application TCP IP Network Network Control and Management Applications
Network Security - 2009