Group 1

advertisement
Group Presentation
Group 1
Internet and its Protocols
Shanghai Jiao Tong University
School of Electronic Information and Electrical Engineering
2015
Group 1 Members:
Students:
Niklas Lensing
(Introduction and History of Internet)
Mi ZaoYu
(Introduction and History of Internet)
Sampa Nkonde
(TCP/IP, OSI, Presenter)
Hanif Khushk
(TCP/IP and OSI comparison)
Ahmed Mikaeil
(Data exchange example)
Bilal Korir
(Security, Moderator)
Mohammed Abdullah (IoTs protocols)
Lecturer: Professor Yanmin Zhu
2
Presentation Outline
• Introduction and History of Internet
• Internet Protocols
- Open System Interconnection model (OSI)
- Transport Control Protocol/Internet Protocol (TCP/IP)
- Comparative analysis between OSI/TCP/IP
• Internet Security
• Internet Protocols related to IoTs
• Conclusion
• Q&A
3
Introduction
The Internet in a nutshell
• A worldwide network of connected networks
• A data network allows nodes to exchange information with each other
Mobile network
Global ISP
Home network
access
points
wired
links
Regional ISP
Institutional network
router
4
Introduction
The Internet – A revolution
• Invention of the Internet is sometimes said to be comparable to the invention of
printing books
• Changed the way we live our lifes
 Communication, Access to information, Day to Day Life, etc
• Helpes to the development of completely new economic branches
5
Introduction
Brief historic overview
• Early phase (1960s to 1970s)
– Military use: Advanced Research Projects Agency Network (ARPANET)
– Basic idea: develop a network infrastructure without a single point of failure
• Wild Phase (1970s to 1990s)
– Change from military to academic use
– Mostly used for research and exchange of information
• Commercialization (from 1990s)
– Shutdown of ARPANET
– Expansion of the Internet over the whole world
6
INTRODUCTION
Recent trends in the Internet
• Web 2.0
– User generated content (Facebook, Twitter, Youtube …)
• Cloud Computing
– Make your data accessible from everywhere!
• Internet of Things
– Enable “Things“ to communicate with each other
– Connect “Things“ to the Internet
7
PROTOCOLS
• Cooperative action is necessary
– computer networking is not only to exchange bytes
– huge system with several utilities and functions. For examples
• error detection
• Encryption
• Routing
• etc.
• For proper communication, entities in different systems must speak
the same language
– there must be mutually acceptable conventions and rules about the content, timing and
underlying mechanisms
• Those conventions and associated rules are referred as
“PROTOCOLS”
8
Simplified File Transfer Architecture
File Transfer Application Layer: Application specific commands, passwords
and the actual file(s) – high level data.
Communications Service Module: Reliable transfer of those data – error
detection, ordered delivery of data packets, etc.
Network Module: Actual transfer of data and dealing with the network – if the
network changes, only this module is affected, not the whole system.
9
A General Three Layer Model
• Generalize the previous example for a generic application
– we can have different applications (e-mail, file transfer, …)
• Network Access Layer
• Transport Layer
• Application Layer
10
OSI Reference Model
• Open Systems Interconnection
• Reference model
– provides a general framework for standardization
– defines a set of layers and services provided by each layer
– one or more protocols can be developed for each layer
• Developed by the International Organization for Standardization
(ISO)
– also published by ITU-T (International Telecommunications Union)
11
OSI Reference Model
• "Please Do Not Tell Secret Passwords Anytime"
• "Please Do Not Throw Salami Pizza Away"
• — Shh! bottom-to-top phrase.
12
OSI Layers (1) - Physical
• Physical
– Physical interface between devices
– Characteristics
• Mechanical - interface specs
• Electrical - voltage levels for bits, transmission rate
13
OSI Layers (2) – Data Link
• Data Link - Basic services: error detection and control, flow control at the link
level (p to p)
• Higher layers may assume error free transmission
– Later a sublayer is added to Data Link Layer
• MAC (Medium Access Control) sublayer to deal with broadcast
networks
• (MAC) protocol is used to provide the data link layer
• The MAC protocol encapsulates a (payload data) by adding a 14 byte header
(Protocol Control Information (PCI)) before the data and appending an
integrity checksum
• The checksum is a 4-byte (32-bit) Cyclic Redundancy Check (CRC) after the
data.
14
OSI Layers (3) - Network
• Network
– This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data
from node to node.
– Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion
control, QoS (Quality of Service) and packet sequencing.
– Several other internetworking issues
• e.g. differences in addressing, max. data length, etc.
15
OSI Layers (3) – Network con’t
• Typical protocols:
• IP – Internet Protocol i.e IPv4 or IPv6
• Provide packet delivery
• ICMP – Internet Control Message Protocol
• Define the procedures of error message transfer
16
OSI Layers (4) - Transport
• Transport
– This layer provides transparent transfer of data between end
systems, or hosts, and is responsible for end-to-end error recovery
and flow control.
– End to end exchange of data
– In sequence, no losses, no duplicates
– If needed, upper layer data are split into smaller units
– Transport Protocols examples - TCP, SPX and UDP
17
OSI Layers (5) - Session
• Session
– Control of dialogues
• whose turn to talk?
• Dialogue discipline (full-duplex, half-duplex)
– This layer establishes, manages and terminates connections
between applications.
– The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications
at each end.
– It deals with session and connection coordination.
18
OSI Layers (6) - Presentation
– This layer provides independence from differences in data representation
(e.g., encryption) by translating from application to network format, and
vice versa.
– This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems.
– It is sometimes called the syntax layer.
– Typical Protocols examples - SSL, WEP, WPA, etc.
19
OSI Layers (7) - Application
• Application layer protocols define the rules when implementing
specific network applications
• Rely on the underlying layers to provide accurate and efficient data
delivery
• Typical Protocols:
• FTP – File Transfer Protocol
• For file transfer
• DNS – Domain Name System
• Translates domain names into IP addresses.
• SMTP – Simple Mail Transfer Protocol
• For mail transfer
• HTTP – Hypertext Transfer Protocol
• For Web browsing
20
TCP/IP Protocol Suite
• Most widely used interoperable network protocol
architecture
• Specified and extensively used before OSI
– OSI was slow to take place in the market
• Funded by the US Defense Advanced Research Project
Agency (DARPA) for its packet switched network
(ARPANET)
– DoD automatically created an enormous market for TCP/IP
• Used by the Internet
21
What is TCP/IP?
• TCP/IP is a set of protocols developed to allow cooperating computers to share
resources across a network
• TCP stands for “Transmission Control Protocol”
• IP stands for “Internet Protocol”
• They are Transport layer and Network layer protocols respectively of the protocol
suite
• The most well known network that adopted TCP/IP is Internet – the biggest WAN
in the world
22
TCP/IP Protocol Suite
• TCP/IP does not have an official layer structure
• But protocols imply one
–
–
–
–
–
Application layer
Transport (host to host) layer
Internet layer
Network access layer
Physical layer
• Actually TCP/IP reference model has been built on its protocols
– That is why that reference model is only for TCP/IP protocol suite
– and this is why it is not so important to assign roles to each layer in TCP/IP; understanding TCP,
IP and the application protocols would be enough
23
Network Access and Physical Layers
• TCP/IP reference model does not discuss these layers
too much
– the node should connect to the network with a protocol
such that it can send IP packets
– this protocol is not defined by TCP/IP
– mostly in hardware
– a well known example is Ethernet
24
Internet Layer
• Connectionless, point to point internetworking protocol
(uses the datagram approach)
– takes care of routing across multiple networks
– each packet travels in the network independently of each other
• they may not arrive (if there is a problem in the network)
• they may arrive out of order
– a design decision enforced to make the system more flexible and
responsive to loss of some subnet devices
• Implemented in end systems and routers as the Internet
Protocol (IP)
25
Transport Layer
• End-to-end data transfer
• Transmission Control Protocol (TCP)
– connection oriented
– reliable delivery of data
– ordering of delivery
• User Datagram Protocol (UDP)
– connectionless service
– delivery is not guaranteed
• Can you give example applications that use TCP and UDP?
26
Application Layer
• Support for user applications
• A separate module for each different application
– e.g. HTTP, SMTP, telnet
27
OSI vs. TCP/IP
28
OSI vs. TCP/IP con’t
• There are two basic types of networking models:
– Protocol models
• Provides a model that closely matches the structure of a particular protocol
suite.
– Reference models
• Provides a common reference for maintaining consistency within all types of
network protocols and services.
– TCP/IP model is a network protocol model
• Because it describes the functions that occur at each layer of protocols
within the TCP/IP suite.
– OSI mode is a network reference model.
• It is used for network design, operation specifications, and troubleshooting.
29
But
how does the Internet actually
work?
30
Communicating Over the Network
• A networking model (OSI or TCP/IP) is only a representations
of network operation . The model is not the actual network.
• However TCP/IP model describes the protocols implemented
on both the sending and receiving hosts, that interact to
provide end-to-end delivery of applications over a network.
31
Data Exchange Example
32
INTERNET SECURITY
Internet Security - History
•
1960, the term “Hacker” was introduced in MIT
•
1973, invention of TCP/IP protocol without security constrains
•
1983, the 414s group broke into top-secret systems
•
•
•
1986, Morris worm, first worm distributed over the Internet
1988, Kevin Mitnick, accessed unauthorized network and stole intellectual
properties. Caused $ 80 million damage
2000, ILOVEYOU worm, caused about 5.5~8.7 billon $ damage worldwide
What’s the Problem?
•
•
Information over the Internet is Free, Available,
Unencrypted, and Untrusted.
Not desirable for many Applications
•
•
•
•
•
•
•
Electronic Commerce
Software Products
Financial Services
Corporate Data
Healthcare
Subscriptions
Legal Information
Internet Security – Attack Methods
Eavesdropping
Interception of communications.
Internet Security – Attack Methods
•
Viruses
Once a file is opened, the virus will be
activated within the system.
• Almost all viruses are attached to an executable
file, which means the virus may exist on your
computer but it actually cannot infect your
computer unless you run or open the malicious
program.
Internet Security – Attack Methods
Worm
Self‐replicating, propagate through emailing list, and connected
computers in the same network.
Internet Security – Attack Methods
Trojan
Looks like normal programs, but it is not. Usually Carries a virus.
Internet Security – Attack Methods
Phishing
Trick users into writing private information on a fake website that looks
like the original one.
Internet Security – Attack Methods
Spoofing
Hide the real identity by using different IP address
Internet Security – Attack Methods
Denial of Service
Send too many requests to a system, eventually the system cannot respond to
any request any more.
Internet Security – Protection Methods
•
Cryptography: use of codes and ciphers to transform information into unintelligible data
•
Antivirus: used to detect them and cure an infected system.
•
Firewall: border control mechanism
•
Intrusion Detection Systems: can be software and hardware devices used to detect an
attack
•
Security Protocols: suite of protocols, create a secure channel between a sender and
receiver (Examples: SSL, IPsec,etc.)
Transition!
From connected computers
to
connected things
Introduction to IoTs
• IoT: Internet Of Things
– Connect all devices, systems and services
– IoT is coming to user’s daily life
– Huge amount of IP addresses is needed
MI smart bulb
MI smart switch
MI smart camera
45
MI smart band
IoT in 2010
IoT in 2015
EXAMPLES OF IoT PROTOCOLS
MQTT: Message Queue Telemetry Transport
• Used for Collecting Device Data。
• Released by IBM and targets lightweight M2M
communications。
• An asynchronous publish/subscribe protocol that runs
on top of the TCP stack.
• In MQTT there is a broker (server) that contains topics.
5
MQTT: Message Queue Telemetry Transport cont’d
6LoWPAN :IPv6 over Low power Wireless Personal Area Networks
• Formulated by devices that are compatible with the IEEE 802.15.4
standard.
• 6LowPAN uses an adaptation layer between the network (IPv6) and
data link layer (IEEE802.15.4 MAC) to fragment and reassemble IPv6
packets.
• 6LoWPAN provides a WSN node with IP communication capabilities
by putting an adaptation layer above the IEEE 802.15.4 link layer for
the packet fragmentation and reassembly purpose
5
ZIGBEE
• ZigBee is a technological standard designed for control and
sensor networks
• Based on the IEEE 802.15.4 Standard
• Created by the ZigBee Alliance
• Operates in Personal Area Networks (PAN’s) and device-todevice networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats, appliances, etc.
ZIGBEE Characteristics
•
•
•
•
•
•
•
Low cost
Low power consumption
Low data rate
Relatively short transmission range
Scalability
Reliability
Flexible protocol design suitable for many
applications
ZIGBEE Applications
monitors
sensors
automation
control
monitors
diagnostics
sensors
INDUSTRIAL
&
COMMERCIAL
CONSUMER
ELECTRONIC
S
TV VCR
DVD/CD
Remote
control
ZigBee
PERSONAL
HEALTH
CARE
consoles
portables
educational
LOW DATA-RATE
RADIO DEVICES
TOYS &
GAMES
HOME
AUTOMATION
PC &
PERIPHERAL
S
security
HVAC
lighting
closures
mouse
keyboard
joystick
XMPP: Extensible Messaging and
Presence Protocol

The base protocol used for XMPP is RFC 2779 (Instant Messaging /Presence
Protocol Requirements).

There are 2 drafts namely XMPP Core and XMPP Instant Messaging
currently on XMPP.
Presence and Instant Messaging
• Presence – Presence is a means for finding, retrieving, and subscribing to
changes in the presence information (e.g. "online" or "offline") of other users.
• Instant Messaging – It is a means for sending small, simple messages that
are delivered immediately to online users.
55
XMPP: Extensible Messaging and Presence Protocol
• Designed for chatting and message exchanging.
• Standardized by the IETF.
• Lately XMPP has re-gained a lot of attention as a communication protocol suitable
for the IoT.
• XMPP runs over TCP and provides publish/subscribe (asynchronous) and also
request/ response (synchronous) messaging systems.
• Designed for near real-time communications and thus, it supports small message
footprint and low latency message exchange.
• XMPP has TLS/SSL security built in the core of the specification
8
China Mobile released I0T open platform OneNet
Conclusion
The internet has changed the face of
communications, commerce, and indeed
the world and over time the internet itself
has changed too.
Xie`xie
Q&A
Download