4. Consumer Market
First, Let us look at the Evolution of Communications
4
Extracted from : Next Generation Home Networks: Driving a New Society?
5. Consumer Market
80-90s: A New World Called Internet
•
•
The start of the Internet
for masses using dial-up:
Phone line is shared
between the PC and the
phone
– Emergence of the ISP
concept with AOL,…
New concept:
Content available to
everybody
•
•
Modem
•
•
First Internet boom:
“New economy concept”
Phone Line
28 – 56kbps
5
Extracted from : Next Generation Home Networks: Driving a New Society?
6. Consumer Market
2000 – 2003: The Beginning of the Always-On Concept
•
Emergence of the ADSL
technology:
– Higher bandwidth than
dial-up: typically 64k to
384kbps
– “Always on” concept; i.e.,
no busy signal
•
Device per service
– One phone
– One PC
ADSL
64 – 384 kbps
6
Extracted from : Next Generation Home Networks: Driving a New Society?
7. Consumer Market
2003 – 2005: Emergence of Basic Home Networks and Triple Play Services
•
•
xDSL
20+ Mbps
Emergence of the new
DSL and xPON
technologies:
– Higher bandwidth than
ADSL: typically 20Mbps
per home
First signs of home
networks with the
digitalization of the Home:
– Digital Camera,
Camcorder, Playstation,
DVD, iPOD…
7
Extracted from : Next Generation Home Networks: Driving a New Society?
8. Consumer Market
2005 – 2015: The Digital Connected Home
•
Many multi-service devices
in the home:
– All using IP as a
foundation
•
Virtualization of Content:
– Access content
anywhere/anytime,
whether it is home-based
(Personal) or networkbased (Public)
•
Communications and
Entertainment
8
Extracted from : Next Generation Home Networks: Driving a New Society?
9. Example of Network Infrastructure
BTU
Residential Gateway (RG)
Broadband Termination Unit (BTU)
9
20. Let me share with you on OSI layers
and
Internet layers
20
21. Seventh layers OSI Model
Application
Application
OSI Model
Network process to application
Presentation
Data Unit
Layer
Function
Application
Application
Application
Network process to application
Presentation
Host
Layers
Session
Presentation
Data
Presentation
Data representation and encryption
Session
Interhost communication
Segments
Transport
End-to-end communications and
reliability (TCP)
Network
Packets
Network
Path determination and logical
addressing (IP)
Media
Data Link
Layers
Frames
Data Link
Physical addressing (MAC & LLC)
Bits
Physical
Media, Signal and binary
transmission
21
24. Before I explain to you on security layer
Let review back the slides that presenting on
“security use in daily basis”
24
25. What is behind of these applications?
What is a mechanism that make it secure?
25
26. Security Layer *
Applications
Protocol
Cryptography
Applications:
Web, email, any application use security
mechanism
Protocol:
SSL, TLS
Algorithm:
Symmetric, Asymmetric (i.e.:Cipher, DES, AES)
* This approach is totally under my knowledge and experience, is not a standard, just to understand
26
the layer concept.
27. Security versus OSI & TCP/IP Model
OSI
TCP/IP
Application
Application
Presentation
Application
Presentation
Security
Applications
Session
Transport
Transport
Network
Internet
Data Link
Data Link
Physical
Physical
Protocol
Cryptography
27
31. Why We Need Security
Privacy
The protection of data from unauthorized disclosure.
Integrity
The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion,
deletion.
Authentication
The assurance that the communicating entity is the one that it
claims to be.
Provides protection against denial by one of the entities
Nonrepudation involved in a communication of having participated in all
or part of the communication.
Security Services (X.800)
31
35. Type of Attacks
Passive
Active
Passive attacks are in the nature of eavesdropping on,
or monitoring of, transmissions. The goal of the opponent
is to obtain information that is being transmitted. Two types
of passive attacks are release of message contents and
traffic analysis.
Active attacks involve some modification of the data stream
or the creation of a false stream and can be subdivided into
four categories: masquerade, replay, modification of
messages, and denial of service.
35
36. Passive Attack
Release of Message Contents
Read contents of
message from Bob
to Alice
Traffic Analysis
Observe pattern of
messages from Bob
to Alice
36
37. Active Attack - 1
Masquerade
Message from Hacker
that appears to be from Bob
Replay*
Capture message from
Bob to Alice; later
replay message to Alice
* An attack in which a service already authorized and completed is forged by
another "duplicate request" in an attempt to repeat authorized commands.
37
38. Active Attack - 2
Modification of messages
Modifies message from Bob to Alice
Denial of Service
disrupts service provided by server
38
39. How Do You Want Protect Your Network System
Thank You
See You Next Week
39
Hinweis der Redaktion
Liberation : Kebebasan
Membebaskan diri dari terikat kepada ASTRO, RTM. Customer boleh download mana2 pun
AOL – American Online. Founded in 1983. Bought over by Time Warner (media company) in 2001
AOL began as a short-lived venture called Quantum Computer Services (or QCS), founded by William von Meister. Its sole product was an online service called Gameline for the Atari 2600 video game console after von Meister's idea of buying music on demand was rejected by Warner Brothers. (Klein, 2003) Subscribers bought a modem from the company for $49.95 and paid a one-time $15 setup fee. Gameline permitted subscribers to temporarily download games and keep track of high scores, at a cost of approximately $1 per hour.
iPOD – portable media player
Explain about having several gadgets connecting all this services, stress on the security part.