Introduction - Eastern Illinois University

Download Report

Transcript Introduction - Eastern Illinois University

School of Business
Eastern Illinois University
Review for Exam 4
© Abdou Illia, Spring 2006
School of Business
Eastern Illinois University
The Internet
3
Host name

Host Names
eiu.edu
–
The other network addressing system on the Internet
–
Easy to remember
 microsoft.com
 eiu.edu
Two or more text “labels” separated by dots
–
4
Host name

Host Names
–
eiu.edu
Like nicknames
 Not official addresses
 Each host must have an IP address
 But only some hosts have host names
 If you give it a host name, your browser must look
up IP address of host
Domain Name System (DNS)
5
6
Domain Name System (DNS)

User’s computer sends a DNS host the target
host’s host name in a DNS Request message

DNS host returns the target host’s IP address in
DNS Response message
eiu.edu
Originating
Host
139.67.8.3
DNS
Host
7
Domain Name System (DNS)

Organizations or ISPs have local DNS hosts

These hosts must know only local host names and
IP addresses

For other host names, local DNS host passes
request to another DNS host
Originating
Host
Local
DNS
Host
Remote
DNS
Host
8
Domain Name System (DNS)

Remote DNS host passes information back to the
local DNS host

Local DNS host passes information back to user
PC
Originating
Host
Local
DNS
Host
Remote
DNS
Host
Domain Name System (DNS)
9
Autoconfiguration

Every computer attached to the Internet is a host
–
Including desktop PCs

Every host must have an IP address

Some hosts, such as routers and webservers, get
permanent IP addresses
–
So that they can be found easily
10
Autoconfiguration

11
User PCs do not need permanent IP addresses
– They only need to be found within a use session
– They usually are given temporary IP addresses
each time they use the Internet
– They may get a different IP address each time
they use the Internet
Autoconfiguration

12
Request-Response Cycle
–
User software requests IP address for the user PC in
Autoconfiguration Request message
–
Autoconfiguration Response message contains temporary IP address
to use in current session
Autoconfiguration

Most popular autoconfiguration protocol is
DHCP
–
–
–

Dynamic Host Configuration Protocol
Built into Windows after Win 3.1
Supplies host with temporary IP address
DHCP can give more information too
–
–
–
Usually gives IP address of a default gateway
(Microsoft terminology for router)
Can give IP address of a local DNS host
Can give other information as well
13
14
Summary Questions
1) a) When do we need DNS? b) What information do
you send in a DNS request message? c) What
information do you receive in a DNS response
message?
2) a) What is autoconfiguration? b) What information
do we get back, at a minimum, in an
autoconfiguration response message? c) What other
information may we get back?
School of Business
Eastern Illinois University
Security
Quiz

Check Quiz 3 (Part 1) questions
16
17
Summary Questions

Name a few kinds of systems attacks
Answer (Security, Slide #3): Denial of Service attacks, Malicious
content attacks and Intercepting messages.

Distinguish between Denial-of-Service (DoS) attack and Distributed
Denial-of-Service (DDoS) attack
Answer (Security, Slides #4, 5): In DoS attack, the attacker sends a
stream of messages or an oversized message to the victim (usually a
server) from a single computer connected to the network. In DDoS, the
attacker hacks into multiple clients and plants Zombie programs on
them. Then, he/she sends commands to Zombie programs which
execute the attacks.

Name some techniques usually used to protect a communication
against Intercepting messages.
Answer: Symmetric key encryption/decryption methods, and Public key
encryption/decryption methods
Summary Questions

18
Jason sends a message to Kristin using public key encryption. (a) What
key will Jason use to encrypt the message? (b) What key will Kristin
use to decrypt the message? (c) What key will Kristin use to encrypt
the reply? (d) What key will Jason use to decrypt the reply? (e) Can the
message and reply be long messages? Explain.
Answer:
a) Jason will encrypt the message with Kristin’s public key.
b) Kristin will use her own private key to decrypt the message.
c) Kristin will use Jason’s public key to encrypt the reply.
d) Jason will use his own private key to decrypt the reply.
e) No, public key encryption can only encrypt short messages.

Does public key encryption have a problem with secure key exchange
for the public key? Explain.
Answer: There is no problem distributing the public key, because it does
not have to be distributed securely. You can even find companies’
public keys on their website.
19
Summary Questions
1.
Briefly describe the various types of malicious content
attacks
Answer: See slide #6 in class notes
2.
What headers and messages do Packet filter firewalls
examine?
Answer:
3.
See slide #10 in class notes
a) What part of a packet do Application firewalls examine?
b) What do they look for?
Answer: a) Application layer messages.
b) They look for illicit content.
Network Management 2
Quiz

Check Quiz 3 (Part 2) questions
21
Summary Questions (Part 1)
22
1) List the main elements in centralized network
management
2) Does the Manager communicate directly with the
managed devices? Explain.
3) Explain the difference between a managed device
and objects.
4) Where is the MIB (database) stored?
Summary Questions (Part 2)
1) In Manager-Agent communications, which
device creates commands? Responses? Traps?
2) Explain the two types of commands.
3) What is a trap?
23