NCS315/TEL550 Networking of Information Systems & Advanced - - PowerPoint PPT Presentation

ncs315 tel550 networking of information systems advanced
SMART_READER_LITE
LIVE PREVIEW

NCS315/TEL550 Networking of Information Systems & Advanced - - PowerPoint PPT Presentation

NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols Ronny L. Bull, MS Lecturer Computer Science Department Spring 2014 Wireless Review 2 types of networks Infrastructure Ad-Hoc


slide-1
SLIDE 1

NCS315/TEL550 Networking of Information Systems & Advanced Networking Standards & Protocols Ronny L. Bull, MS Lecturer Computer Science Department Spring 2014

slide-2
SLIDE 2

Wireless Review

  • 2 types of networks

– Infrastructure – Ad-Hoc

  • What are the characteristics of each?
  • Why would you use one over the other?
slide-3
SLIDE 3

Wireless Review

  • Hidden Terminal Problem

A B C

slide-4
SLIDE 4

Wireless Review

  • Signal Attenuation

A B C

A’s signal strength

space

C’s signal strength

slide-5
SLIDE 5

Wireless Review

  • Basic Service Set

– Infrastructure mode:

  • Contains wireless hosts and AP's

– Ad-Hoc mode:

  • Hosts only
slide-6
SLIDE 6

Wireless Review

  • 802.11b

– 2.4GHz – 2.485GHz – Divided into 11 channels – Channel set by AP admin – Interference with other nearby AP's on same channel

  • Solution: stagger channels!
  • 1 – 5 – 11
slide-7
SLIDE 7

Wireless Review

  • Host must associate with AP

– Scans channels, listening for beacon frames

  • Contain AP's name (SSID) and MAC
  • Selects AP to associate with
  • Authenticates if necessary
  • Pull DHCP address (if configured)
slide-8
SLIDE 8

Wireless Review

AP 2 AP 1 H1 BBS 2 BBS 1

1 2 3 1

passive scanning:

(1)beacon frames sent from APs (2)association Request frame sent: H1 to selected AP (3)association Response frame sent from selected AP to H1

AP 2 AP 1 H1 BBS 2 BBS 1

1 2 2 3 4

active scanning:

(1) Probe Request frame broadcast from H1 (2) Probe Response frames sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent from selected AP to H1

slide-9
SLIDE 9

Wireless Review

  • CSMA/CA

– Sender

  • Senses channel to see if idle
  • Transmits entire frame
  • If busy back off

– Start random timer – If idle after timer expires transmit – Else set new random timer

slide-10
SLIDE 10

Wireless Review

  • CSMA/CA

– Receiver

  • Receives frame
  • Sends ACK to sender

– Helps with hidden terminal problem

slide-11
SLIDE 11

Wireless Review

  • RTS (Request To Send)

– Sender transmits small RTS packet to reserve channel – May collide with other RTS packets

  • CTS (Clear To Send)

– BS broadcasts CTS in response to RTS – Heard by all nodes

slide-12
SLIDE 12

Wireless Review

AP A B time R T S ( A ) R T S ( A ) CTS(A) CTS(A) DATA (A) ACK(A) ACK(A) reservation collision defer

slide-13
SLIDE 13

Wireless Review

frame control duration address 1 address 2 address 4 address 3 payload CRC

2 2 6 6 6 2 6 0 - 2312 4

seq control

Address 2: MAC address

  • f wireless host or AP

transmitting this frame Address 1: MAC address

  • f wireless host or AP

to receive this frame Address 3: MAC address

  • f router interface to

which AP is attached Address 4: used

  • nly in ad hoc

mode

slide-14
SLIDE 14

Wireless Review

frame control duration address 1 address 2 address 4 address 3 payload CRC

2 2 6 6 6 2 6 0 - 2312 4

seq control Type From AP Subtype To AP More frag WEP More data Power mgt Retry Rsvd Protocol version

2 2 4 1 1 1 1 1 1 1 1 duration of reserved transmission time (RTS/CTS) frame seq # (for RDT) frame type (RTS, CTS, ACK, data)

slide-15
SLIDE 15

Wireless Review

  • 802.15 (Bluetooth)

– Less than 10m diameter – Replacement for cables (mouse, keyboard) – Ad-hoc – Master/slaves – 2.4-2.5 GHz – Up to 721 kbps

slide-16
SLIDE 16

Multimedia Review

time audio signal amplitude analog signal quantized value of analog value quantization error sampling rate (N sample/sec)

slide-17
SLIDE 17

Multimedia Review

  • If a sample of audio is taken from a stereo source at

44,100 samples per second for 1 hour what is the amount of disk space required to store the resulting file?

  • Formula

– Samples per second * bits per sample * number of channels = total bps required for storage – Total bps required / 8 = total bytes per second – Total Bps required * 60 = total Bpm – Total Bpm * 60 = total Bph – Bph/1000 = KBph/1000 = MBph

slide-18
SLIDE 18

Multimedia Review

  • If a sample of audio is taken from a stereo source at

44,100 samples per second for 1 hour what is the amount of disk space required to store the resulting file?

  • Using a resolution of 16 bits per sample

– 44,100 * 16 * 2 = 1,411,200 bits required per second

– 1,411,200/8 = 176400 bytes required per second – 176400 * 60 = 10584000 bytes required per minute

slide-19
SLIDE 19

Multimedia Review

– 10584000 * 60 = 635040000 bytes required per hour – 635040000/1000 = 635040 Kilobits per hour – 635040/1000 = 635.04 Megabytes per hour – To store 1 hour of stereo audio would take up 635.04 Mb of disk space.

slide-20
SLIDE 20

Multimedia Review

  • Audio / Video applications

– Streaming: can begin playout before downloading entire file – Stored (at server): Can transmit faster than audio/video will be rendered. – Conversational

  • Voice/video over IP
  • Low delay requirement

– Live streaming

slide-21
SLIDE 21

Multimedia Review

  • 1. video

recorded (e.g., 30 frames/sec )

  • 2. video

sent Cumulative data streaming: at this time, client playing out early part of video, while server still sending later part of video network delay (fixed in this example) time

  • 3. video received,

played out at client (30 frames/sec)

slide-22
SLIDE 22

Multimedia Review

  • Once client playout begins, playback must match
  • riginal timing

– Network delays are variable

  • Jitter
  • Latency

– Need client side buffer to match playout requirements

slide-23
SLIDE 23

Multimedia Review

constant bit rate video transmission Cumulative data time variable network delay client video reception constant bit rate video playout at client client playout delay

buffered video

slide-24
SLIDE 24

Multimedia Review

1

  • 1. Bob manages

Netflix account Netflix registration, accounting servers Amazon cloud Akamai CDN Limelight CDN Level-3 CDN 2

  • 2. Bob browses

Netflix video 3

  • 3. Manifest file

returned for requested video

  • 4. DASH

streaming upload copies of multiple versions

  • f video to CDNs
slide-25
SLIDE 25

VoIP Review

  • Terms you should be familiar with:

– Voice over IP – Video over IP – Convergence – Codecs – ATA – IP-PBX – Hosted PBX

slide-26
SLIDE 26

VoIP Review

  • More Terms

– IP Telephone

  • Softphones
  • Hardphones

– Video conferencing

  • Video bridge

– Voice conferencing

  • Voice bridge
slide-27
SLIDE 27

VoIP Review

  • H.323

– H.323 terminal – H.323 gateway – H.323 gatekeeper – MCU (multipoint control unit) – H.323 zone

slide-28
SLIDE 28

VoIP Review

slide-29
SLIDE 29

VoIP Review

  • H.225 and H.245 signaling protocols

– Operate at Session layer – H.225 → call or video conferencing signal – H.245 → ensures correct information type formatting

  • H.323 standard

– Specifies protocol interoperability

slide-30
SLIDE 30

VoIP Review

  • SIP (Session Initiation Protocol)

– Similar to H.323 – Modeled on HTTP (Clear text) – Components

  • User agent
  • User agent client
  • User agent server
  • Registrar server
  • Proxy server
  • Redirect server
slide-31
SLIDE 31

VoIP Review

slide-32
SLIDE 32

VoIP Review

  • RTP

– Application layer protocol – Relies on UDP at transport layer – Applies sequence numbers

  • Destination packet assembly order
  • Packet loss during transmission

– Assigns packet timestamp

  • Receiving node
  • Compensates for delay
  • Signal sync
slide-33
SLIDE 33

VoIP Review

  • RTCP

– Provides quality feedback to participants – Not mandatory on RTP networks – RTP and RTCP

  • Provide information about packet order, loss,

delay

  • Cannot correct transmission flaws
slide-34
SLIDE 34

VoIP Review

  • QoS (Quality of Service)

– Helps to prevent delays, disorder, and distortion – RSVP & Diffserv

slide-35
SLIDE 35

VoIP Review

  • RSVP (Resource Reservation Protocol)

– Transport layer protocol

  • Reserves network resources prior to

transmission – Creates path between sender & receiver

  • Provides sufficient bandwidth
  • Same path followed in reverse

– Two types of service

  • Guaranteed service
  • Controlled-load service
slide-36
SLIDE 36

VoIP Review

  • RSVP

– Emulates circuit-switched path

  • Provides excellent QoS

– Drawback: high overhead

  • Good for small networks
  • Bad for large networks
slide-37
SLIDE 37

VoIP Review

  • DiffServ

– Prioritizes traffic

  • Different streams can get different priorities

– Modifies actual datagram – Accounts for all network traffic

slide-38
SLIDE 38

VoIP Review

  • EF (Expedited Forwarding)
  • Data stream assigned minimum departure rate
  • Circumvents delays
  • AF (Assured Forwarding)
  • Data streams assigned different router

resource levels

  • Prioritizes data handling
  • No guarantee of on time, in sequence arrival
slide-39
SLIDE 39

Network Security Review

  • Terms you should know

– Security Assessment

  • Posture assessment

– Hacker – Cracker – Vulnerability – Exploit

  • 0-day
slide-40
SLIDE 40

Network Security Review

  • Human Risks

– Social engineering – Error – Ignorance – Omissions

  • Easiest way to circumvent network security

– Take advantage of human error

slide-41
SLIDE 41

Network Security Review

  • What are some other risks associated with the

security of a network?

  • How can one find and exploit these?
  • Where do most network security compromises occur

from?

  • What is a security policy? Why is it important?
  • What does not belong in a security policy?
slide-42
SLIDE 42

Network Security Review

  • Physical security
  • Secure network design
  • ACL's
  • IDS/IPS
  • Firewalls
  • DMZ
  • Honeypots
  • NIPS/HIPS
  • Proxy Servers
  • Network Scanners
slide-43
SLIDE 43

Network Security Review

  • Network Operating System Security

– What are some things we can do to lock it down?

  • Login restrictions
  • Password rules
  • Group Policy
  • Access restrictions
slide-44
SLIDE 44

Network Security Review

  • Encryption

– Symmetric

  • Shared Key

– Asymmetric

  • Private/Public Key
  • Digital Certificates
  • SSL
  • SSH
  • IPSec
slide-45
SLIDE 45

Network Security Review

  • Authentication

– Radius – TACACUS+ – PAP – CHAP / MS-CHAP – EAP (802.1x EAPoL) – Kerberos

slide-46
SLIDE 46

Network Security Review

  • Wireless

– WEP – WPA – 802.11i (802.1x (EAPoL)

slide-47
SLIDE 47

Integrity & Availability Review

  • Terms

– Integrity – Availability – Uptime – Malware – Virus – Trojan – Polymorphism

slide-48
SLIDE 48

Integrity & Availability Review

  • Failures and faults

– How do we cope with them?

  • Environment

– Heating and cooling

  • Power

– Blackout – Brownout – Surge – Noise

slide-49
SLIDE 49

Integrity & Availability Review

  • Redundancy

– Power – Data

  • RAID
  • NAS/SAN

– Network

  • Physical topology

– Service redundancy & load balancing

  • DNS tricks
  • Clustering
  • Mirroring
slide-50
SLIDE 50

Integrity & Availability Review

  • Data backup

– Media types – Incremental – Full – Differential – Grandfather-Father-Son

  • Disaster recovery planning

– Cold site – Warm site – Hot site

slide-51
SLIDE 51

Network Management Review

  • Documentation

– Topology – Devices – Configurations – Changes!

  • Baselining
  • Policies, Proceedures & Regulations

– HIPPA – CALEA – FERPA

slide-52
SLIDE 52

Network Management Review

  • Network Monitoring

– SNMP – MIB – Alerts & Alarms – Nagios & Cacti

  • System and Event Logging

– Event Viewer – Syslog & Journald

slide-53
SLIDE 53

Network Management Review

  • Traffic shaping

– Limiting – Prioritization

  • Delay less important traffic
  • Base on protocol, IP, groups, etc..

– Block traffic

  • Caching

– DNS – Web

slide-54
SLIDE 54

Network Management Review

  • Asset management

– Documentation – Asset tracking – Inventory

  • Software/NOS changes

– Steps to update or upgrade – Reversing changes – Backleveling

  • Physical network changes
slide-55
SLIDE 55

Network Management Review

  • DOCUMENT EVERYTHING!!!!!
slide-56
SLIDE 56

Network Troubleshooting Review

  • Is it broke?
  • Is it plugged in?
  • Is it turned on?
  • Who touched it last?
  • Point finger
  • Fix it... fix it... fix it... fix it... NOW!!!!
slide-57
SLIDE 57

Network Troubleshooting Review

  • Troubleshooting steps

– Identify problem – Establish theory of probable cause – Test theory to determine cause – Establish action plan – Implement solution or escalate – Verify full functionality – Implement preventative measures – Document findings, actions, and

  • utcomes
slide-58
SLIDE 58

Subnetting Review

  • Practice questions from review sheets
  • Look at http://subnettingquestions.com for more

practice questions

slide-59
SLIDE 59

Other Tidbits

  • Final exam will only cover material from after the

midterm

  • Review quizzes 5, 6&7
  • Final exam date

– Mon 5/5 12:45p – 2:45p in A115 – Online students must come to campus at that time

  • r arrange for a proctor.