the beauty and joy of computingcs10/fa13/lec/16/2013fa-cs10-l16-gf-internet2.pdfcomputing lecture...

21
The Beauty and Joy of Computing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland http://www.usatoday.com/story/tech/personal/ 2013/10/29/motorola-project-ara/3296887/ Motorola aims at Smartphones with interchangeable parts Good: See IBM PC 1980s Bad: See IBM PC 1980s

Upload: others

Post on 28-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

The Beauty and Joy of Computing

Lecture #16 Internet II

UC Berkeley EECS Lecturer

Gerald Friedland

http://www.usatoday.com/story/tech/personal/2013/10/29/motorola-project-ara/3296887/!

Motorola aims at Smartphones with interchangeable parts Good: See IBM PC 1980s Bad: See IBM PC 1980s

Page 2: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (2)

Friedland

Components of the Internet: Physical

Server

Router

Client

Page 3: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (3)

Friedland

Question

Which of the following is wrong: a) A server sends and receives data upon request from a client b) Servers must be huge computers c) A client can be a server at the same time d) Routing is more than forwarding bits and can take significant computational resources e) Public servers need a public IP unless behind a router that is reachable by a public IP and forwards

Page 4: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (4)

Friedland

Virtual Components: Proxy

Proxy

Page 5: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (5)

Friedland

Virtual Components: VPN

Virtual Private Networks

Page 6: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (6)

Friedland

Virtual Components: Firewall

Firewall

Page 7: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (7)

Friedland

Virtual Components: DMZ

Demilitarized Zone

Page 8: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (8)

Friedland

Question

Which of the following is wrong: a) VPNs provide reasonable safety against people eavesdropping packets, even on WiFi b) Proxies anonymize web requests c) Firewalls are often part of routers d) A DMZ always needs at least two firewalls e) I don’t usually need a DMZ if I don’t serve content in some way

Page 9: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (9)

Friedland

Protocol = Language of the Internet Examples:   Hypertext Transfer Protocol (HTTP)   File Transfer Protocol (FTP)   Simple Mail Transfer Protocol (SMTP)   Transfer Control Protocol (TCP)

Protocols

Page 10: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (10)

Friedland

Protocols

Page 11: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (11)

Friedland

Protocol stack: Open Systems Interconnection

Page 12: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (12)

Friedland

Encryption is the essential security component of the Internet. Common protocols:   PGP for e-mail   https:// for http://   SSH for remote shells (instead of telnet)   SCP and SFTP for file transfer (replaces rcp and

ftp)   DES for passwords Adds itself into OSI layer.

Encryption

Page 13: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (13)

Friedland

Have you ever used encryption for your e-mails? a)  No b)  Yes, using PGP c)  Yes, using other than PGP

Question

Page 14: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (14)

Friedland

Two types of encryption:   Symmetric (Shared Key)

  Issue: Key needs to be send over Internet… (not a solution)

  Asymmetric   Used by secure protocols today

Encryption: How it works

Page 15: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (15)

Friedland

Encryption: How to not send keys

http://www.youtube.com/watch?v=3QnD2c4Xovk

Page 16: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (16)

Friedland

Does encryption help with privacy issues?

Question

Page 17: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (17)

Friedland

  Latency = Time to establish connection   Also called ping time   Usually in ms range   Additive with route length   Hardware dependent

  Throughput = Information per second transferred   Measured in bits/sec   Slowest connection in route dictates throughput   Hardware dependent

Speed Metrics

Page 18: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (18)

Friedland

  Internet is vulnerable at bottlenecks

  Computers are vulnerable and attackable   Malware (Virus, Worms, etc)   Denial of Service (DOS) Attacks

  Internet is vulnerable to monopolization (e.g. switch from E-mail to Facebook)

Threats to the Internet

Page 19: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (19)

Friedland

  Dependence on the Internet by   Individuals   Economy   Governments

creates possibility for Cyberwar (see discussion)   Uncontrollable availability of information creates

threats to some individuals, societies, governments

  Data-driven economy changes privacy configuration of society

Threats to Society

Page 20: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (20)

Friedland

Internet Economy impacts Privacy

http://www.tacma.net

Page 21: The Beauty and Joy of Computingcs10/fa13/lec/16/2013fa-CS10-L16-GF-Internet2.pdfComputing Lecture #16 Internet II UC Berkeley EECS Lecturer Gerald Friedland ... Servers must be huge

UC Berkeley “The Beauty and Joy of Computing” : Internet II (21)

Friedland

  The Internet has physical and virtual building pieces and uses protocols

  Encryption schemes allow safer point-to-point communication

  The Internet is vulnerable as is society

Summary

http://commons.wikimedia.org/wiki/File:Internet_map_1024.jpg