the beauty and joy of computingcs10/fa13/lec/16/2013fa-cs10-l16-gf-internet2.pdfcomputing lecture...
TRANSCRIPT
![Page 1: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/1.jpg)
The Beauty and Joy of Computing
Lecture #16 Internet II
UC Berkeley EECS Lecturer
Gerald Friedland
http://www.usatoday.com/story/tech/personal/2013/10/29/motorola-project-ara/3296887/!
Motorola aims at Smartphones with interchangeable parts Good: See IBM PC 1980s Bad: See IBM PC 1980s
![Page 2: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/2.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (2)
Friedland
Components of the Internet: Physical
Server
Router
Client
![Page 3: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/3.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (3)
Friedland
Question
Which of the following is wrong: a) A server sends and receives data upon request from a client b) Servers must be huge computers c) A client can be a server at the same time d) Routing is more than forwarding bits and can take significant computational resources e) Public servers need a public IP unless behind a router that is reachable by a public IP and forwards
![Page 4: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/4.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (4)
Friedland
Virtual Components: Proxy
Proxy
![Page 5: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/5.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (5)
Friedland
Virtual Components: VPN
Virtual Private Networks
![Page 6: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/6.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (6)
Friedland
Virtual Components: Firewall
Firewall
![Page 7: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/7.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (7)
Friedland
Virtual Components: DMZ
Demilitarized Zone
![Page 8: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/8.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (8)
Friedland
Question
Which of the following is wrong: a) VPNs provide reasonable safety against people eavesdropping packets, even on WiFi b) Proxies anonymize web requests c) Firewalls are often part of routers d) A DMZ always needs at least two firewalls e) I don’t usually need a DMZ if I don’t serve content in some way
![Page 9: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/9.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (9)
Friedland
Protocol = Language of the Internet Examples: Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Transfer Control Protocol (TCP)
Protocols
![Page 10: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/10.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (10)
Friedland
Protocols
![Page 11: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/11.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (11)
Friedland
Protocol stack: Open Systems Interconnection
![Page 12: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/12.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (12)
Friedland
Encryption is the essential security component of the Internet. Common protocols: PGP for e-mail https:// for http:// SSH for remote shells (instead of telnet) SCP and SFTP for file transfer (replaces rcp and
ftp) DES for passwords Adds itself into OSI layer.
Encryption
![Page 13: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/13.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (13)
Friedland
Have you ever used encryption for your e-mails? a) No b) Yes, using PGP c) Yes, using other than PGP
Question
![Page 14: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/14.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (14)
Friedland
Two types of encryption: Symmetric (Shared Key)
Issue: Key needs to be send over Internet… (not a solution)
Asymmetric Used by secure protocols today
Encryption: How it works
![Page 15: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/15.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (15)
Friedland
Encryption: How to not send keys
http://www.youtube.com/watch?v=3QnD2c4Xovk
![Page 16: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/16.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (16)
Friedland
Does encryption help with privacy issues?
Question
![Page 17: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/17.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (17)
Friedland
Latency = Time to establish connection Also called ping time Usually in ms range Additive with route length Hardware dependent
Throughput = Information per second transferred Measured in bits/sec Slowest connection in route dictates throughput Hardware dependent
Speed Metrics
![Page 18: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/18.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (18)
Friedland
Internet is vulnerable at bottlenecks
Computers are vulnerable and attackable Malware (Virus, Worms, etc) Denial of Service (DOS) Attacks
Internet is vulnerable to monopolization (e.g. switch from E-mail to Facebook)
Threats to the Internet
![Page 19: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/19.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (19)
Friedland
Dependence on the Internet by Individuals Economy Governments
creates possibility for Cyberwar (see discussion) Uncontrollable availability of information creates
threats to some individuals, societies, governments
Data-driven economy changes privacy configuration of society
Threats to Society
![Page 20: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/20.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (20)
Friedland
Internet Economy impacts Privacy
http://www.tacma.net
![Page 21: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge](https://reader034.vdocument.in/reader034/viewer/2022052002/601581397d6f367c5e69f09b/html5/thumbnails/21.jpg)
UC Berkeley “The Beauty and Joy of Computing” : Internet II (21)
Friedland
The Internet has physical and virtual building pieces and uses protocols
Encryption schemes allow safer point-to-point communication
The Internet is vulnerable as is society
Summary
http://commons.wikimedia.org/wiki/File:Internet_map_1024.jpg