AS2 - Communication
AS2 - Communication
Networks
Section 1
Introduction
• Networks and topologies
• LANs and WANs
• Performance
• Client-server and peer-to-peer, thick and thin clients
• Network hardware and Ethernet
• The internet and WWW (and DNS)
• Cloud Computing
• Bus, star, mesh and hybrid topologies
• Wired and wireless networks, protocols, and layers
• Wired and wireless
• Encryption
• Addressing (IP and MAC)
• CIDR and Subnets
• Bitstreaming
What is a network?
• Two or more computers…
or other devices
• … connected together…
• … via a shared 'medium'…
which could be wired or wireless
• … for the purpose of communication
Benefits
• Allow the sharing of files/data.
• Allow communication between devices.
• Allow the sharing of resources e.g. hardware / software
(applications).
• Allow central management / backup, security, etc.
Computer Computer Computer Computer Computer Computer Computer Computer
Shared Medium
A set of rules on a specific subject is called a protocol. TCP, HTTP, IP, FTP, SMTP are all Internet protocols.
Standards are required to ensure that systems can work together, even if they are built by different teams or companies.
A protocol is a particular kind of standard, others standards relate to hardware (e.g., the USB connector) and software
(e.g., the language C#).
These standards and protocols apply across networks of networks….
R R
R
C C C R
R C C C S
LAN – Edinburgh Office
C Computer S Server
Internet – the World's biggest WAN?
Autonomous System
(AS)
B
Autonomous System
Autonomous System (AS)
(AS) C
A
Autonomous System
Autonomous System
(AS)
E (AS)
D
C C C S
C C C C
"Physical" layout
LAN – Birmingham Office
LAN – Edinburgh Office
Client-Server Peer-to-Peer
S C C
"Logical" layout
C C
C C
C
Client-Server and Peer-to-Peer
Client-Server Peer-to-Peer
• Server has more resources • All computers are of equal status
(processing power, storage) • Each computer provides access to
than clients resources and data
• Server provides clients with • Data is distributed
services
• Computers communicate and
• Data is centralised (and share resources
managed centrally)
• Each computer is responsible for
• Server provides security its own security
• Server is a single point of failure
Thick and Thin Clients
Thick Clients Thin Clients
• More capable (local storage and • Simple (limited local storage and
processing) processing)
• Can operate without Server to • Send requests to Server and display
some degree the returned results
• More expensive • Dependant on Server
• Cheap
Exercises on OneNote
• Past Paper Questions on the topics covered
• Plus… What can we do for extension? Possibly give them a
complete Paper 1 to work through?
Network Hardware
• Network Interface Controllers and Cards (and Wireless NIC)
• Switches and Hubs
• Routers
• Modems
• Wireless Access Points
• Transmission Media
Network Interface Cards
• Many years ago, personal computers (PCs) were built to work on
their own
• When networks were introduced, Network Interface Cards or NICs
were necessary – you installed a NIC in your PC in order to connect
to the Local Area Network
• NICs are still available, but the vast majority of desktop, laptop,
tablet computers, phones, TVs, and other devices have built-in
network interface controllers
• These built-in controllers perform the same function as Network
Interface Cards
NIC Functions
• Provide the physical connection to a network (wired or wireless)
• Provide a low-level Medium Access Control (MAC) address*
• Implement some network protocols (usually the physical link layer)*
Application Application
Transport Transport
Desktop
PC Wired connections
Smart
fridge
NAS Smart TV
Network Hardware - Bridge
User Service
Application Application
Transport Transport
Application Application
Relay
Client
Server
(Browser)
Responses
Request Responses
GET (read) URL 1xx: Information (100 – Continue, 101 – Switching Protocols)
PUT (write) URL + Content 2xx: Successful (200 – OK, 201 - Created)
DELETE URL 4xx: Client Error (401 – Unauthorised, 404 – Not Found)
1 2 3 4
3 Host (server)
4 Path
GET https://www.example.com/path/subpath/doc.html
Client
(Browser)
HTTP/1.1 200 OK
Server
Date: Wed, 27 Nov 2019 15:28:53 GMT
Server: Apache/2.2.14 (Win32)
Last-Modified: Wed, 20 Nov 2019 19:15:56 GMT
Content-Length: 104
Content-Type: text/html
Connection: Closed
<!DOCTYPE html>
<html>
<body>
<h1>Hello World!</h1>
</body>
</html>
URLs – what are they really?
• On a static website, each URL will correspond to a file held by
the website server.
• Any URL which is not known to the website server will cause a 404
error to be generated (although a custom page may be returned)
• On a dynamic website, some URLs may correspond to files,
but others will be more general resource addresses.
• For example: https://www.example.com/members/12734
• This URL may refer to a particular member's record. When the website
server receives this request it may retrieve information from a database
and then create an HTML page which describes/defines the member,
and which contains links which will modify the member's details.
URLs – what are they really?
• In general terms, a URL is an address that we can use to
access a resource held on a web server.
Domain Name System (DNS)
• A way of turning Internet Protocol names (such as www.bbc.co.uk)
into Internet Protocol addresses (such as 171.124.23.12)
• All routing is carried out on the basis of IP addresses
• The process of turning names into addresses is called ‘resolving’
Examples of domains
Root Level
www.google.com.
mail.google.com. www news Fourth Level Domains
www.bbc.co.uk.
news.bbc.co.uk.
DNS Resolution
• Resolution can be a recursive process.
• Computers have local DNS resolvers which maintain a small database
of information. If an address is not present (or the information is
stale), then the configured DNS server will be consulted. This server
may in turn consult other DNS servers higher in the 'hierarchy'.
Cloud Computing
• Cloud Computing is the remote provision of servers and services,
accessed over the internet
• Instead of buying and operating servers and services locally,
businesses and individuals ‘rent’ servers and services that are
running in data centres
• Examples include Microsoft Azure and 365, Google Cloud Platform,
IBM Cloud Services, Amazon Web Services
• Cloud Computing may be provided on a 'private' or 'public' basis –
we will discuss this in a moment…
Cloud – Advantages and Disadvantages
Advantages Disadvantages
Services can be accessed from anywhere in No internet, no service
the world (as long as you have an internet Locations with poor connections cannot make
connection) full use of cloud computing
Temporary interruptions to network access can
cause problems
Easier to share services and information Security concerns
Lower maintenance Higher ongoing costs
Lower upfront costs Reduced control over data and services
Automatic backups/redundancy
Public and Private Cloud Computing
• Public Cloud - Computing services offered by 3rd party provider
over the public Internet
• Public Cloud is open/available to anyone with the appropriate
equipment/software/credentials
• Private Cloud - Computing services offered either over the Internet
or a private internal network
• Only available to select users not the general public
• Private Cloud is a dedicated/bespoke system only accessible
for/from the organisation
Cloud Storage - Pros
• Cloud storage can be free (for small quantities )
• No need for separate (high capacity) storage devices // saves storage
on existing devices
• Can access data from anywhere/any computer with internet access
• Most cloud data services will have in-built backup/disaster recovery
• Security managed by provider, normally very reliable
• Capacity can easily be increased/decreased
• Data can be easily shared
• Multiple people can work on the same data/document/app at the
same time
Cloud Storage - Cons
• Can only access (the cloud) with internet access
• Relies on the providing company for security
• Relies on the providing company for backups
• It can take a long time to upload/download the data
• It can be more expensive in the long term
• There could be a limit to the amount of storage unless paid for
• There could be compatibility/access issues
• There could be issues with the company offering cloud services
Bus, Star and Mesh Topologies
• Networks can use a variety of approaches to connecting computers
and devices (nodes)
• The different arrangements of nodes are called 'topologies' – logical
maps
• There are many different topologies in use, but in A level we
examine three; the bus topology, the star topology and the mesh
topology
• It is possible to combine topologies in a single network – termed
'hybrid' topologies
Bus Topology Server Device Device Device
or switch
• Failure of one device or cable Device Device
does not affect the rest of the Device
network
• Failure of the central hub or
switch will affect the whole
Internet
network
• Performs well under load
Mesh Topology Device
networks
• Faster routing of traffic within the
network
• Each device/node can send, receive, and
Device Device Router
relay messages
• Failure of one node does not affect the Device
• … high latency / lag / slow to connect (for geostationary, not for LEO
systems such as Starlink)
• … more expensive than wired methods, as we need extra equipment
• … signal is affected by bad weather
• … the transmission speed is slower than fixed line broadband (although
not so much of a problem for LEO)
• … direct line of sight needed (ditto)
Internet Protocol Addresses
• We have already encountered IP addresses, when we looked at DNS
• In the early days of the internet, the structure of IP addresses was
changed rapidly as the scale of the internet ballooned
• Version 4 of the IP address standard was designed to deal with
significant network growth, and we still use IPv4 today in some parts
of the internet
IP Addresses - General
• Public IP addresses are visible to all devices on the internet
• Private IP addresses are only visible to devices within the LAN
• Static IP addresses remain the same each time a device is connected
to the internet
• Dynamic IP addresses are allocated / reallocated each time a device
connects to the internet
IPv4 Addresses
• An IPv4 address consists of 4 bytes, normally written as four denary
numbers, separated by dots:
192.168.4.20
• With this structure, we had 232 addresses available – almost 4.3
billion addresses
• IPv4 worked well for around 20 years, but by the mid 1990s we were
running out of addresses, so we needed another approach
IPv6 Addresses
• The IPv6 address is 16 bytes long (four times the size of IPv4)
fd1c:47a9:1305:0:8a94:64bb:a24f:bd7e
• (We do not mention IPv5 – it did not work very well…)
• The size of an IPv6 addresses gives us many trillions of unique
addresses; more than we can feasibly use
• However, one of the best things about IPv6 is that we can use it
alongside IPv4 (many of your devices will have both an IPv6 and an
IPv4 address)
IP Addresses – V4 and V6
An IPv4 address contains 4 groups of digits. Each group is represented in 8
bits and the groups are separated by full stops. Size: 32 bits
Example: 192.168.1.1
Example: 127.0.0.1 (special address 'home'/loopback)
1 0 1 0 1 1 0 0 1 1 0 1 1 0 0 1 1 0 1 0 1 0 0 1 0 0 0 0 0 1 0 0
Class A
0 N N N N N N N H H H H H H H H H H H H H H H H H H H H H H H H
Class B
1 0 N N N N N N N N N N N N N N H H H H H H H H H H H H H H H H
Class C
1 1 0 N N N N N N N N N N N N N N N N N N N N N H H H H H H H H
Old school IPv4. The concept of 'classes' of networks has been replaced by a more flexible approach to using
the address space, coupled with network address translation.
CIDR and Subnets
• Classless Internet Domain Routing (CIDR) did away with the fixed
structure of Class A, B, C
• CIDR introduced the concept of a 'network mask', splitting the IPv4
32-bit address space into a network part and a host part.
• For example, a network mask of 255.255.255.0 (equivalent to a
suffix of /24, meaning 24 bits of network id, 8 bits of host id) would
correspond to the Class C structure
• But CIDR allows us to have any split – for example 255.255.240
(equal to /22, meaning 22 bits of network id, 10 bits of host id).
Subnets
• Reduce amount of traffic in a network // improve network speed //
performance // reduce congestion
• Data stays in its subnet so it does not travel as far
• Improve network security
• .. so that not all devices can access all areas of the network
• Allow for easier maintenance // day-to-day management
• ... because only one subnetwork may need taking down/changing
while the rest of the network can continue
• Allow extension of the network / devices attached
Introduction
• Networks and topologies
• LANs and WANs
• Performance
• Client-server and peer-to-peer, thick and thin clients
• Network hardware and Ethernet
• The internet and WWW (and DNS)
• Cloud Computing
• Bus, star, mesh and hybrid topologies
• Wired and wireless networks, protocols, and layers
• Wired and wireless
• Encryption
• Addressing (IP and MAC)
• CIDR and Subnets
• Bitstreaming
Bitstreaming
• Much of the information sent over the internet does not have strict
timing information – emails, documents, still images
• This information can be sent successfully even at relatively low rates, and
with variable delays
• However, information such as audio and video has very strict timing
information – if we fail to deliver the packets on time, our music or video
will have lags and freezes which the user will be very aware of
• BitTorrent is one of the most commonly used peer-to-peer bitstreaming
technologies, but has been associated with piracy.
• Commercial services such as Netflix and Spotify use other protocols
layered on TCP/IP for bitstreaming.
Bitstreaming – On-Demand/Real-Time
• Bitstreams may be transmitted in real-time (live) or pre-recorded
(on-demand)
Bitstreaming - Compression
• Video and audio information contains significant amounts of
redundancy; data which is repeated, or which changes only
maginally between successive samples
• Compression can therefore be used to significantly reduce the
volume of information that we need to send, even for high-quality
transmissions
Bitstreaming - Buffering
• Packet-switched, public networks such as the internet cannot
provided guaranteed end-to-end bandwidth
• To deal with variations in the rate at which packets are received
bitstreaming uses buffering
• This allows us to play the video/audio stream at a constant rate,
evening out variations in arrival rate
• Only if the buffer is completely emptied will playing of the
video/audio have to pause
Bitstreaming Pros and Cons
• Do not need to wait for the • Streaming depends on internet
whole track/movie to connection – if this is poor or
download unavailable, then the bitstream
• Do not need to store large will be affected
audio/video files • Requires significant bandwidth
• Better piracy protection as it is and a reliable, low latency
more difficult to intercept and connection
copy bitstreams • Some association with
streaming of pirated content
Exercises on OneNote
Older Material – may be useful for A2
Networking Addressing, Layers and Protocols
*as well as TCP, other protocols such as UDP and DHCP use the Network Layer
**OCR sometimes call the Network layer the "Internet" layer.
OneNote Exercises
• Open Section "1.3 Networks Connections and Protocols"
• Work through the "Lesson 3 Exercises" page
• These lesson slides are available on the "Lesson 3 Slides" page if you
need to refresh your memory
Introduction
• Networks and topologies
• LANs and WANs
• Performance
• Client-server and peer-to-peer
• Network hardware
• The internet and WWW (including DNS)
• Cloud Computing
• Star and mesh topologies
• Wired and wireless networks, protocols, and layers
• Wired and wireless
• Encryption
• Addressing (IP and MAC)
• Standards
• Protocols
• Layers (Remove these and replace with bitstreaming?)
Introduction
• Networks and topologies
• LANs and WANs
• Performance
• Client-server and peer-to-peer
• Network hardware
• The internet and WWW (including DNS)
• Cloud Computing
• Star and mesh topologies
• Wired and wireless networks, protocols, and layers
• Wired and wireless
• Encryption
• Addressing (IP and MAC)
• Standards
• Protocols
• Layers
Standards
• Without Standards, the network systems built by one company
would not work with those built by another company
• In IT1, you use a computer built by Hewlett-Packard, with a
processor built by Intel, running an operating system from
Microsoft, with a NIC from Realtek, and possibly using a browser
built by Google.
• And we have not even mentioned the cables, network switches,
routers and all of the rest of the internet…
• We have Standards for connectors, cables, software, hardware, and
then a particular set of Standards for communication over networks
Protocols – Standards for Communication
• A Protocol is a set of rules which define how two or more devices
communicate
• These rules will define:
• The set of messages that can be used
• Ordering of messages
• Message formats
• What to do when things go wrong
HyperText Transfer Protocol (http)
Request
The set of messages that can be used
Client
Server Ordering of messages
(Browser)
Message formats
Response
What to do when things go wrong
Request Responses
GET (read) URL 1xx: Information (100 – Continue, 101 – Switching Protocols)
PUT (write) URL + Content 2xx: Successful (200 – OK, 201 - Created)
DELETE URL 4xx: Client Error (401 – Unauthorised, 404 – Not Found)
SMTP SMTP
SMTP
Web Protocol
Web Server
HTTP
Web Client
Layered Model of Networking - standards
+
HTTP/HTTPS FTP/SFTP SMTP POP IMAP DNS +
+
TCP (UDP)
IP
+
(ATM) WiFi Ethernet Fibre (P2P) (X-25) +
+
Layered Model of Networking – logical view
*as well as TCP, other protocols such as UDP and DHCP use the Network Layer
**OCR sometimes call the Network layer the "Internet" layer.
Layering - Simplified
Application Application
Data
Application Header Footer
Transport Transport
Data
Transport Header Footer
Network Network
Network Data
Header Footer
Link Link
Link Data
Header Footer
Purpose of Layers in Networks
• Separating network functions into layers makes it easier to focus on
specific concerns
• Layering also supports standardisation – we can combine layers
from different manufacturers
• We can also incorporate new hardware rapidly – we only need to
change one layer of the 'stack'
Ethernet – CSMA/CD
• Ethernet is a large set of standards covering low-level protocols,
connectors, and cables
• A protocol (suite)
• For data transmission over standard / universal wired / cabled network
connections
• Uses Carrier Sense Multiple Access / Collision Detection (CSMA/CD) –
see next slide
• Data is transmitted in frames
• ... each frame has a source and destination address (usually MAC)
• ... and error checking data (so damaged frames can be resent)
Ethernet – CSMA/CD
• A significant part of Ethernet is the CSMA/CD standard:
• Carrier Sense, Multiple Access, Collision Detect
• A computer listens to the communication channel. If the channel is busy, it
will detect a signal (carrier sense)
• ...data is only sent when the channel is free (when no carrier is sensed)
• Because there is more than one computer connected to the same
transmission medium (multiple access)
• ... two computers can start to transmit at the same time, causing a collision
• If a collision happens, the computers abort transmission (collision detect)
• ...and each waits a random amount of time before attempting to resend
OneNote Exercises
• Open Section "1.3 Networks Connections and Protocols"
• Work through the "Lesson 4 Exercises" page
• These lesson slides are available on the "Lesson 4 Slides" page if you
need to refresh your memory
• If you finish everything, start working on Practice Paper 1 in the new
"Practice Papers" section.
Older Material based on OCR A level
From basic communication to networking
• Simple point-to-point communications form the basis for networking
• Access to a shared medium (wired or wireless)
• Need for protocols to govern shared access and communication
• Layered model of networking
• General description
• Multiple models; focus on the TCP/IP layered model
• Packet switching vs circuit switching
• Peer to Peer vs Client-Server
Rules are required to govern access to the shared medium:
How do we ensure that all of the computers have a 'fair' share of access?
How do we resolve conflicts?
A set of rules on a specific subject is called a protocol. TCP, HTTP, IP, FTP, SMTP are all Internet protocols.
Standards are required to ensure that systems can work together, even if they are built by different teams or companies.
A protocol is a particular kind of standard, others standards relate to hardware (e.g., the USB connector) and software
(e.g., the language C#).
Shared Medium
These standards and protocols apply across networks of networks….
Deals with application-specific data – text, graphics, video, audio, email, files…
Application
Works end-to-end
Deals with streams of data, segments and reassembles data, deals with missing, out-of-order and
Transport
damaged data. Works end-to-end.
Deals with packets of data, routes packets between networks, discards damaged packets.
Network
Each packet may take a different route. Works end-to-end.
Deals with units (frames, packets) of data, transmits and receives over a single physical medium.
Link Works within a single network.
More on Protocols…
• A protocol is a set of rules governing communication between two or
more devices.
• TCP and UDP
• Point to point vs point to multipoint; connection-oriented vs connection-free;
reliable vs unreliable
• Concept of streams and packetisation
• Internet protocols managed by the IETF, specified in RFC (Request for
Comments) documents.
• TCP is specified in RFC 793 (with multiple updates in other RFCs).
• Just under 100 pages.
• Defines addressing, messages and their exchange
• Defines security, precedence and robustness approaches.
Layered Model of Networking
Application Application
Transport Transport
*as well as TCP, other protocols such as UDP and DHCP use the Network Layer
**OCR sometimes call the Network layer the "Internet" layer.
Layered Model of Networking - standards
+
http ftp smtp pop dns tftp rtp +
+
TCP UDP
IP
+
ATM WiFi Ethernet Fibre P2P X-25 +
+
Peer-to-peer vs Client Server
• In a Peer-to-peer network, each node is equally privileged and acts as
both a supplier and consumer of resources. These shared resources
could be processing power, storage, bandwidth or services such as
printing.
• In a Client-server network, nodes are identified as either Servers
(which provide resources) or Clients (which consume resources).
Peer-to-peer networks
• Many home and small offices networks operate to some degree as
P2P networks, through folder sharing and similar arrangements.
• P2P networking has attracted a reputation for piracy and copyright
infringement through services such as Napster and Web/BitTorrent,
however much of the Internet was P2P in earlier days, and there are
many positive applications of P2P, particularly in trading.
Client-server networks
• Largely as a result of services such as email and the WWW, a
significant amount of internet traffic is now client-server in nature.
• Clients vary in power from very simple (thin) clients, through to
computers of similar capabilities to many servers.
Client-server networks
• Questions?
LAN/WAN
• Local Area Network – all of the connected devices are within a single,
relatively small area. Often associated with an organisation such as a
small business, a school, or a home. Usually owned and administered
by a single organisation.
• Wide Area Network – a network of networks covering a large
geographical area, possibly across countries and continents. Owned
and administered by several cooperating organisations.
Layering
Application Application
Data
Application Header Footer
Transport Transport
Data
Transport Header Footer
Network Network
Network Data
Header Footer
Link Link
Link Data
Header Footer
IPv4 Packet Structure
4 bits 4 bits 6 bits 2 bits 16 bits 16 bits 3 bits 13 bits 8 bits 8 bits
1 0 1 0 1 1 0 0 1 1 0 1 1 0 0 1 1 0 1 0 1 0 0 1 0 0 0 0 0 1 0 0
172 217 169 4
1 0 1 0 1 1 0 0 1 1 0 1 1 0 0 1 1 0 1 0 1 0 0 1 0 0 0 0 0 1 0 0
Class A
0 N N N N N N N H H H H H H H H H H H H H H H H H H H H H H H H
Class B
1 0 N N N N N N N N N N N N N N H H H H H H H H H H H H H H H H
Class C
1 1 0 N N N N N N N N N N N N N N N N N N N N N H H H H H H H H
Old school IPv4. The concept of 'classes' of networks has been replaced by a more flexible approach to using
the address space, coupled with network address translation.
IPv6
• Introduced to tackle the problem of IPv4 address exhaustion
• Uses a 16 byte address in comparison to IPv4's 4 byte address
• In theory, allows an address space of 2 to the power 96.
• However, the address space is used inefficiently (intentionally) to
make it easier to route packets
• For example: 2001:0000:4136:e378:80000:63bf:3fff:fdd2
• (Actually contains an IPv4 address encoded to IPv6 – 65.54.227.120)
• facebook.com = 2a03:2880:f164:81:face:b00c:0:25de
Organisationally Unique Identifier (OUI) NIC Specific Identifier
b b b b b b b b
7 6 5 4 3 2 1 0
0: Unicast
1: Multicast
0: Globally unique
1: Locally managed
4 bytes 6 bytes 6 bytes 6 bytes 2 bytes Variable number of bytes 4 bytes
Application Application
Transport Transport
Application Application
Transport Transport
The Internet
Transport Transport
Application Application
Transport Transport
Application Application
Relay
Desktop
PC Wired connections
Smart
fridge
NAS Smart TV
Protocol Example: DHCP
• How do the devices on a network get their IP addresses (and other
configuration)?
• Impossible to configure by hand on an internet scale
• Dynamic Host Configuration Protocol (DHCP)
• Consists of four messages exchanged between a 'client' and 'server'
DHCP DISCOVER
Broadcast by a client which needs an address/has just booted
Broadcast at IP level and at MAC level.
Header:
• IP Source = 0.0.0.0
• IP Destination = 255.255.255.255
• MAC Source = device’s MAC address
• MAC Destination = FF:FF:FF:FF:FF:FF
DHCP OFFER
Sent by a server (such as your WiFi router), offering to supply an IP address and
other configuration.
Header:
• IP Source = DHCP Server’s IP Address
• IP Destination = 255.255.255.255
• MAC Source = DHCP Server’s MAC address
• MAC Destination = device’s MAC address
Note that the request, although intended for just one server, is actually broadcast at the IP
and MAC level, so that any other servers that made offers can withdraw those offers. The
offer messages all have unique identifiers; the request message includes the identifier of
the offer it is accepting, so that other servers know that their offer has been declined.
DHCP ACKNOWLEDGE
Sent by the server
Header:
• IP Source = DHCP Server’s IP Address
• IP Destination = 255.255.255.255
• MAC Source = DHCP Server’s MAC address
• MAC Destination = device’s MAC address
www.google.com.
mail.google.com. www news Fourth Level Domains
www.bbc.co.uk.
news.bbc.co.uk.
DNS Resolution
• Resolving names (e.g., news.bbc.co.uk) to IP addresses.
• Resolution is/can be a recursive process.
• Computers have local DNS resolvers which maintain a small database
of information. If an address is not present (or the information is
stale), then the configured DNS server will be consulted. This server
may in turn consult other DNS servers higher in the 'hierarchy'.
Internet
Society Manages namespaces and numerical spaces
Runs the root name servers
IETF Internet Corporation for Manages .org
Assigned Names and Manages IPv4 and IPv6 address allocations
Numbers Manages internet protocol identifiers
IAB (ICANN)
Delegates some responsibilities to the five
Regional Internet Registries (RIRs)
Manage regional
allocations
AfriNIC ARIN APNIC LACNIC RIPE NCC Delegate some
responsibilities to (1000s
of) Local Internet
Registries, including
Internet Service
Providers, DNS registrars
People are both the largest threat and the largest vulnerability
Worms
• Malicious software programs that are standalone, and can self-
replicate (often via email).
• They spread via security failures within networks of computers.
• Worms cause damage by themselves (slowing computers and
networks, sometimes to large degrees), but can also carry 'payloads'
such as ransomware, keyloggers, or programs designed to steal data.
Viruses
• Malicious software programs that rely on other programs in order to
spread.
• For example, a computer game could be 'infected' with a virus; when the
computer game runs, the virus also runs and can then infect other programs.
• Viruses can also be attached to 'macro' files used by common office tools.
• Viruses are created to self-replicate (copying themselves into other
host programs) in order to cause widespread damage.
Trojans
• Malicious software programs that masquerade as useful games or
utilities.
• Once downloaded and run, the Trojan releases its malicious payload,
which will then attempt to steal data, encrypt files, run malicious
services, or make the computer vulnerable to other attacks.
• Trojans do not attempt to replicate themselves further. They rely on
user actions to spread.
Security Measures
• Firewalls
• Proxies
• Encryption
• Anti-virus software
• Regular updates – operating system and virus protection
• Security testing
Rules
Accept, reject, drop
Firewall Server Layer 3 device, with additional checks
DMZs
Firewall Server
Internet
Internal
Network NIC NIC
Privacy
Monitoring/filtering
Proxy Server Caching
"Application-level NAT"
Internet
Internal
Network
Virtual Private Networks
C
C
LAN C
WAN
WAN
WAN
S S
C C
WAN
LAN LAN
C C
C C C
C Encrypted
connection
"Onion" Routing
C
C
S
LAN C
WAN
WAN
WAN
S S
C C
WAN
LAN LAN
C C
C C C
C
Circuit Switching vs Packet Switching
• Overview
Circuit Switching
A B
Circuit Switching
A B
Packet Switching
A 32
1 B
Circuit Switching vs Packet Switching
• Circuit switching was the basis for many early communications networks.
• A dedicated circuit is established between the two communicating
devices (this circuit may be real or virtual).
• As long as the devices need the circuit, it is reserved for their use.
• Circuit switching gives a guaranteed service – speed, order of delivery,
quality.
• Circuit-switching is wasteful however, as fixed resources are allocated to
a circuit whether information is flowing or not. Bandwidth is typically
fixed, and setting up and tearing down circuits adds some overhead.
Circuit switching also degrades poorly, denying any new connections.
Circuit Switching vs Packet Switching
• Packet switching works by separating a stream of information into
packets, and then routing each of these packets individually between
two communicating devices.
• Packet switching is highly efficient, and degrades in a controlled
fashion.
• The big disadvantages of packet switching are that the order of
delivery is not guaranteed, and that quality (particularly latency) can
be highly variable. Packets can be delayed or even lost.
Circuit Switching vs Packet Switching
• Although circuit switching has a number of advantages, packet
switching is the dominant approach.
• Even for time-critical services such as audio (interactive) and video
(higher bandwidth), packet switching can provide a suitable service
with some additional techniques.
Circuit Switching vs Packet Switching
• Questions?
• TCP?
Internet – Large Scale Structure
Autonomous System
(AS)
B
Autonomous System
Autonomous System (AS)
(AS) C
A
Autonomous System
Autonomous System
(AS)
E (AS)
D
Organisation Peering Organisation Peering Organisation
"Backbone" Mainly IPv6
(Multiple AS) (Multiple AS) (Multiple AS)
Tier 1 - Local