上海交通大学:网络安全 Network Security(PPT讲稿,朱浩瑾)

Networking Overview: Everything " you need to know, in 50 minutes Network Security Prof Haojin Zhu Adopted from David Wagner Uc Berkeley May8,2019
Networking Overview: “Everything” you need to know, in 50 minutes Network Security Prof. Haojin Zhu Adopted from David Wagner @ UC Berkeley May 8, 2019

Local-Area networks A point-to-point hared How does computer Send a message to computer C? 2
Local-Area Networks point-to-point shared How does computerAsend a message to computer C? 2 A C

Local-Area networks: Packets From: A To: C Message: Hello world! A Hello world! A Hello world!
Local-Area Networks: Packets 3 From: A To: C Message: Hello world! A C Hello world! A C Hello world!

Wide Area networks 旦马 router How do we connect two lans 马马马
Wide-Area Networks router How do we connect two LANs? C 4 A

Wide Area networks R C. com Hello world! router R A. com C. com 马马 Hello world A. com C. com Hello world!
Wide-Area Networks 5 router • How do we connect two LANs? C A.com C.com Hello world! A A R R C A.com C.com Hello world! A.com C.com Hello world!

Key Concept #1: Protocols A protocol is an agreement on how to communicate Includes syntax and semantics How a communication is specified structured o Format order messages are sent and received What a communication means o Actions taken when transmitting, receiving, or timer expires EXample: making a comment in lecture? 1. Raise your hand 2. Wait to be called on 3. Or: wait for speaker to pause and vocalize 4. If unrecognized (after timeout): say"excuse me
6 Key Concept #1: Protocols • A protocol is an agreement on how to communicate • Includes syntax and semantics – How a communication is specified & structured o Format, order messages are sent and received – What a communication means o Actions taken when transmitting, receiving, or timer expires • Example: making a comment in lecture? 1.Raise your hand. 2.Wait to be called on. 3.Or: wait for speaker to pause and vocalize 4.If unrecognized (after timeout): say “excuse me

Key Concept #2: Dumb Network Original Internet design interior nodes (routers)have no knowledge* of ongoing connections going through them Not how you picture the telephone system works Which internally tracks all of the active voice calls Instead: the postal system Each Internet message("packet")self-contained Today's Internet is full of hacks that violate this
7 Key Concept #2: Dumb Network • Original Internet design: interior nodes (“ r o u ters” ) h a v e no knowledge* of ongoing connections going through them • Not how you picture the telephone system works – Which internally tracks all of the active voice calls • Instead: the postal system! – Each Internet message (“packet”) self-contained * Today’s Internet is full of hacks that violate this

Self-Contained P Packet format IP= nternet protocol 4-bit4-bit 8-bit Version Header Type of Service 16-bit Total Length(Bytes) Length (TOs) 3-bit 16-bit Identification Flags 13-bit Fragment Offset Header is like a letter envelope 8-bit Time to Live(TTL)8-bit Protocol 16-bit Header Checksum contains all info needed for 32-bit Source P address delivery 32-bit Destination P Address Payload (remainder of message)
Self-Contained IP Packet Format 4-bit Version 4-bit Header Length 8-bit Typeof Service (TOS) 16-bit Total Length (Bytes) 16-bit Identification 3-bit Flags 13-bit Fragment Offset 8-bit Time to Live (TTL) 8-bit Protocol 16-bit Header Checksum 32-bit Source IP Address 32-bit Destination IP Address Payload (remainder of message) . . . . . Header is like a letter envelope: contains all info needed for delivery IP = InternetProtocol

Key Concept #2: Dumb Network Original Internet design interior nodes (routers)have no knowledge* of ongoing connections going through them Not: how you picture the telephone system works Which internally tracks all of the active voice calls Instead the postal system Each Internet message ("packet" ) self-contained Interior routers look at destination address to forward If you want smarts, build it"end-to-end, not hop-by-hop Buys simplicity robustness at the cost of shifting complexity into end systems Today's Internet is full of hacks that violate this
9 Key Concept #2: Dumb Network • Original Internet design: interior nodes (“ r o u ters” ) h a v e no knowledge* of ongoing connections going through them • Not: how you picture the telephone system works – Which internally tracks all of the active voice calls • Instead: the postal system! – Each Internet message (“packet”) self-contained – Interior routers look at destination address to forward – If you want smarts, build it “end-to-end” , not “hop-by-hop” – Buys simplicity & robustness at the cost of shifting complexity into end systems * Today’s Internet is full of hacks that violate this

Key Concept #3 Layering Internet design is strongly partitioned into layers Each layer relies on services provided by next layer below and provides services to layer above it Analogy Code You write Consider structure of an application you've written Run-Time Library and the“ services”each System Calls layer relies on/ provides Device Drivers Fully isolated Voltage Levels/ from user Magnetic Domains programs
Key Concept #3: Layering • Internet design is strongly partitioned into layers – Each layer relies on services provided by next layer below … – … and provides services to layer above it • Analogy: – Consider structure of an application you’ve written and the “services” each layer relies on / provides System Calls Device Drivers VoltageLevels / Magnetic Domains 10 } Fully isolated from user programs CodeYou Write Run-Time Library
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《单片机原理及应用》课程教学资源_本科教学大纲汇编(电子信息工程专业).doc
- 广西外国语学院:《计算机网络》课程教学资源(PPT课件讲稿)第10章 应用层协议.ppt
- 《计算机网络》课程教学资源(PPT课件讲稿)第三章 局域网与校园网设计(网络方案设计).ppt
- 上海交通大学:人工智能的历史和启示——人机对弈作为案例.ppt
- 南京大学:《编译原理》课程教学资源(PPT课件讲稿)第三章 词法分析.pptx
- 自动语音识别(PPT讲稿)Automatic Speaker Recognition.pptx
- 中国铁道出版社:《局域网技术与组网工程》课程教学资源(PPT课件讲稿)第2章 网络工程系统.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第九章 无线网络.ppt
- 香港浸会大学:MPI - Communicators(PPT讲稿).ppt
- 《单片机应用系统设计技术》课程教学资源(PPT课件讲稿)第7章 单片机外部扩展资源及应用.ppt
- 北京航空航天大学:《数据挖掘——概念和技术(Data Mining - Concepts and Techniques)》课程教学资源(PPT课件讲稿)Chapter 01 Introduction.ppt
- 《单片机原理及应用》课程教学资源(PPT课件讲稿)第14章 单片机应用系统抗干扰与可靠性设计.ppt
- 河南中医药大学(河南中医学院):《计算机文化》课程教学资源(PPT课件讲稿)第七章 数据库技术(主讲:王哲).pptx
- 三维计算机视觉 3D computer vision(基于卡尔曼滤波的运动结构).pptx
- 《计算机网络与因特网》课程教学资源(PPT课件)Part VII 广域网(简称WAN), 路由, 和最短路径.ppt
- The Art of Function Design -Measure and RKHS.ppt
- 大庆职业学院:《计算机网络技术基础》课程教学资源(PPT课件讲稿)第2章 数据通信的基础知识.ppt
- 香港浸会大学:C++ as a Better C; Introducing Object Technology.ppt
- 清华大学:《高级计算机网络 Advanced Computer Network》课程教学资源(PPT课件讲稿)Lecture 1 Introduction.pptx
- 《TCP/IP协议及其应用》课程教学资源(PPT课件)第1章 TCP/IP协议基础.ppt
- 清华大学:Top-k String Similarity Search with Edit-Distance Constraints.pptx
- 普林斯顿大学:平衡查找树(PPT讲稿)New Balanced Search Trees.pptx
- 《MATLAB程序设计》课程教学资源(教学大纲)Matlab programming.doc
- 计算机硬件维护(PPT课件讲稿).ppt
- 南京大学:移动Agent系统支撑(PPT讲稿)Agent Mobility Software Agent.pptx
- 《程序设计语言》课程教学资源(PPT课件讲稿)第5章 函数式程序设计语言.ppt
- 《C++程序设计》教学资源(PPT课件讲稿)构造函数和析构函数.ppt
- 《计算机应用基础》工学结合配套课件(PPT讲稿)模块二系统软件操作技术(Windows XP的实用工具).ppt
- 河南中医药大学:《网络技术实训》课程教学资源(PPT课件讲稿)第7讲 网络安全实训(主讲:许成刚).pptx
- 《电子商务实用教程》课程教学资源(PPT课件讲稿)第三章 网络营销.ppt
- 广西医科大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Chapter 03 Network Management and Operation(Network Architetures and Standarts).pptx
- 中国科学技术大学:《信号与图像处理基础 Signal and Image Processing》课程教学资源(PPT课件讲稿)空域滤波 Spatial Filtering.pptx
- 安徽理工大学:《汇编语言》课程教学资源(PPT课件讲稿)第八章 输入输出程序设计.ppt
- 构建互联互通的单位局域网(PPT讲稿).ppt
- 中国科学技术大学:《计算机网络 Computer Networks(计算机通信网)》课程教学资源(PPT课件讲稿)Chapter 06 Internet Protocol.ppt
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 5 互斥与同步(Mutual Exclusion and Synchronization)5.1 Principles of Concurrency 5.2 Mutual Exclusion.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第五章 运输层.ppt
- 电子科技大学:《计算机操作系统》课程教学资源(PPT课件)第一章 操作系统引论.ppt
- 南京大学:《编译原理》课程教学资源(PPT课件讲稿)第三章 词法分析.ppt
- 同济大学:FWA for Noisy Optimization Problems(张军旗).pptx