Computer Networks and Information Security (99)[detail]
Show Answer
Next Card
OSI 7 layerAPSTNDLP communication basicsmedium, energy form, way to represent energy as data PSTNPublic Switched Telephone Network PSTN StructureLocal loops, trunks and switching offices synch commdepends on timing signals provided by the sender asynch commno timing signals required simplexcomm only in one direction always half duplexcomm in one direction at a time, can be reversed full duplexcomm in both directions at a time RS-232-C-15V to 15V, start bit, idle period Nyquist equationmaxD = 2.(bw).log2(num volt levsls) Shannon-Hartley theoremD = B log2(1 + S/N) S/NdB = 10log10(S/N) Why nyquistfinite transmission capacity of perfect channel why shannon-hartleyrandom noise greatly reduces max data rate Attenuationsignal on wire becoming weaker with distance, resistance converts energy to heat amplitude modulationchange strength/alter height of sine wave freq modulationchange wavelength/speed of sine wave phase shift modulationchange phase/restart sine wave multiplexingmultiple signals sent over a medium without interferences freq div multiplexdivides spectrum into freq bands time div multiplexusers take turns in round robin code div multiplexextract desired signal, rejecting else Packetsmall blocks of data send and received individually Packets benefitsallow efficient error detection/recovery and fair sharing of comm links Framesencapsulates frames for transmission on on physical layer frame contentsheader, payload, trailer unack connless serviceethernet ack connless servicewifi ack conn-oriented serviceATM sender data link layerbreak bit stream into discrete frames, compute checksum, send w/ frame receiver data link layerrecomputes checksum, if does not match an error occurrerrrd byte stuffingadd special byte to beginning and end of each frame bit stuffingsimilar to byte stuffing but no requirement for 8 bits, helps physical layer maintain serialisation transmission error typesinterference causing received incorrectly, and interference causing data to be received when none sent two basic strats for errorserror correcting codes and error detecting codes error detectioncheck if error occurs and if so, request frame be resubmitted, no need for error correcting data parityeven or odd number of 1s in message checksumsender calculates complement of sum and sends with message, receiver checks if total is zero Cyclic redundancy checkA polynomial code, sender and receiver agree on G(x) Error correctionRedundancy to sent information, most useful on noisy channels where retrans likely to error hamming distancegiven 2 valid codewords, count number of corresponding bits that differ hamming error detecting hrequires code with hamming distance h+1 hamming error correcting hrequires code with hamming distance 2h+1 stop and waitsender waits for ack before sending more sliding windowsender and receiver maintain set of seq numbers for frames they can send/receive broadcast channelsshared medium, used by LANs, reduces cost but adds coord overhead and high bandwidth req. LAN topologiesstar, ring, bus medium access controlsublayer that determines who goes next on multiaccess channel static channel allocationsplit channel by multiplexing, works well with small constant users dynamical channel allocation assumptionsindependent traffic, single channel, observable collisions, continuous or slotted time, carrier sense or no carrier sense ALOHAUsers transmit whenever they have data, central computer broadcasts each frame it receives, if frame not heard wait a random time and retransmit Slotted ALOHAALOHA synced with clock to improve performance CSMA/CDCarrier Sense Multple Access w/ Collision Detection CSMAdetect when stations are transmitting and wait for idle, wait random time, or use slots Bridgeconnects multiple LANs VLANvirtual LANs based on organisational structure rather than geography Network layerDeals with end to end transmission/choosing route a message should take/connecting networks connectionlesspreferred by internet community, routers just move packets, network inherently unreliable, hosts manage error and flow control connection orientednetwork should be reliable, quality of service vital, preferred by telephone companies Routing tablemanaged by routing algorithm to determine where packets should go Virtual circuitpath established between sender and receiver, packets carry identifier Routing when?datagram: for each packet, VC network: when new VC set up Forwardinglooking up table to see where to send packet Poutingfilling in and updating routing table routing goalscorrectness, simplicity, robustness, stability, fairness, efficiency non adaptive routingstatic routes, decisions made offline, downloaded to routers when booting adaptive routingdynamic routing, changes based on topology, traffic, etc, optimise for some measure Sink treeShows optimal routes from all sources to a destination Floodingsimple technique to send incoming packet out all outgoing links except the one it arrived on Distance vector routingeach router maintains table, tables shared with each other until no change dijkstras algostart at one point and move along tree working out best path Link state routingcomplete topology distributed to every router Load sheddingWhen a router has too many packets to handle it must drop some: drop new packets for file transfer and old packets for real time media InternetworkingConnecting multiple networks together Network differencesService offered, addressing, broadcasting, packet size, ordering, QoS, Reliability, security, parameters, accounting MTUmaximum transmission unit TunnelingUsed when source and destination networks are the same but there is a different network between internet principlesmake sure it works, simple, clear choices, modularity, heterogeneity, avoid statis, good design not perfrect, strict sending but tolerent receiving, scalaiblity, performance and cost IPv432bit addresses containing network prefix and host address CIDR notation/16 /24 notation Classless InterDomain Routingcombines smaler networks into a supernet for easier routing IPv6128bit addresses, solves running out of IPv4 addresses, not directly compatible DHCPA host can broadcast a DHCP request, a server can respond to the data link layer address (MAC) UDPconnectionless protocol, sending packets between applications, apps can build own protocols TCPconnection oriented protocol, adds reliability, flow control, congestion control RPCremote procedure call, similar to calling a function in programming language AuthenticityIs a person who they claim to be? using something you know/have/are AccountabilityCan it be proven you did or didn't do something ConfidentialityEnsuring that private information is not disclosed to unauthorised individuals IntegrityEnsuring information and programs are only changed in an authorised person AvailabilityEnsuring systems work promptly and that authorised users are not denied service. Threata possible danger that might exploit a vulnerability Attacka deliberate attempt to evade security services and violate the security polity of a system Passive attackseavesdropping, traffic analysis (contents or properties) Active attacksModification of data stream or creating false one Authenticationassures communication is authentic, typically implemented by having secret information the other party can verify Access controllimit and controls access to a host system and application, requires authentication Message Authentication CodeA code generated with a key and original message passed with the message to be verified on the receiving end