You are on page 1of 10

15MC3FreeResponse

*INPROGRESS

**
veryimportant,makesureyouknowallofit**

TheInternetandData&Information

InternetArchitecture

TheInternetisadecentralizednetwork,asithasmanycentralpoints,andnoonemainpoint.

EndtoendArchitecture
Theideathattheonlyimportantpointsorsmartpointsonaconnectionareontheends
(eachcomputerinvolvedintheconnection),andthereisnomiddleman.Thisstructure
allowstheInternettogrowveryquickly.
Consideredadumbnetworkonly2computersneedtoknowbetweenthe
transmission,everythinginbetweendoesnthavetointerpretorunderstandwhatsbeing
sent

**HierarchicalandRedundantStructure**
12:10AM(notindepthenough)

Redundancyistheideathatsomething(message,filebeingsent,etc.)cantakemultiple
pathstogettothereceiverofthething.Ifonepathisdown,itcanjusttakeanotherpath.
IPaddresses

OSILayers
TheOpenSystemInterconnectionModelisamodelthatstandardizeshowcomputers
arebuilt,fromaphysicallevel(thebottomlayer)wheretherearestandardsforUSBport
sizes,etc.,allthewaytoanabstractlevel,onewhereyoucanwriteprograms.
Moreinfo
here
l
Itsconsideredarulebookfortheinterconnectivityofcomputers

MACAddress
TheMediaAccessControladdressisanaddressthatneverchanges.Itisnativetoa
computersnetworkcard.Whileitcanbewrittendifferentways,ithasacoupleofnotable
formatsincluding:
6groupsof2hexadecimaldigits,separatedbyhyphens
1234567890ab
6groupsof2hexadecimaldigits,separatedbycolons
12:34:56:78:90:ab
Thereare255^6possibleMACaddresses.Thisisbecausethereare255possiblechoicesin
eachchunkandthereare6chunks.thehighestcombinationforeachchunkifFF,whichis
1516^0s(15)and1516^1s,whichis240.240+15=255
**Bandwidth**
Bandwidthisthehowmuchdataiscomingthroughaconnection.Itsthenumberofbitspassing
persecond.Itdeterminesthequalityofdatathatistransferred.
Example:alackofbandwidthcausesbufferingonNetflix.Lowqualitypictures.Loadingofstuff.

**Latency**

Anexpressionofhowmuchtimeittakesforapacketofdatatogetfromonepointtoanother.
Latencyismeasuredbyspendingapacketthatisreturnedtothesenderroundtriptimeis
consideredlatencyorms.Ifthattimeislong,therewillbeadelay.
Example:itsaproblemforanykindofrealtimecommunications(multiplayervideogames,
videochat,etc)causeslackofsyncingbetweenwhatsoncomputerandwhatsactually
happeningalag

(Note:forcalculatingthenumberofpossibleIPaddressesinIPv4,IPv6,oraversionthatis
customandmadeforthetest,mostlikelytocomparetoarealone,add1toyouroutcome,as
thereisalsothepossibilityofallofthenumbersbeing0)
**IPv4**
Localhost: 192.168.0.1
Minimum:
0.0.0.0
Maximum:
255.255.255.255
NotenoughuniqueIPaddresseswiththisformat
TemporarySolutiontotheIPAddressissue
Approximately4.3billionIPaddressesusingthisformat
Thereare8bitsperchunk(0256),andthereare4chunks,so256^4
**IPv6**
MoreUniqueIPaddressesthangrainsofsandontheearth
8chunksinsteadoftheoriginal4inIPv4
Currentlyweareonlyusingthefirst4,butthisprotocolallowsustohavemoreshould
weneedthem(whichwewill)
Eachchunkconsistsof4hexadecimaldigits,with8chunkstotal
ThehighestnumberyoucanhaveineachchunkisFFFF,or65535.65535^8,
whichequals3.4024083e+38(340undecillion,3.4*10^38)

TCP/IP
TCP=TransmissionControlProtocol
TheTCPisastandardsetofsequences.Itisusedtosendamessageofanysort,and
doessobybreakingitdownintopieces.Thatway,ifthecomputerismissingapiece,it
canaskthesendertosendonlythatspecificpieceofthemessage.
Itcontrolstransmissionbetweencomputers
Itcontainsthesenderandthereceiverofthemessage(sender/recipient),thesizeofthe
message
Themessageisbrokendownintopackets,andeachpackethasaheader.Theheader
containstherecipient,thesequencenumber(packet45outof500packets),thetotal
numberofpackets,hasanerrorcorrectionbuiltin,aswellasachecksum.
ThechecksumisakeypartoftheTCP.Thechecksumactsasahash,similartowhen
wemadeourown(orusedProcessings)inSpellCheck.Thepacketissentinthrougha
hash,andoutpopsanumber.Nowwhenthereceivergetsthepacket,anditputsthe
packetthroughahash,itbetterreceivethesamenumber,otherwiseitsanerror,and
somethingwentwrongalongtheway.

Basicallyitsatwolayerprogram.Thehigherlayer,theTransmissionControlProtocolmanages
theassemblingofamessageorafileintoasmallerpacketsthataretransmittedoverthe
InternetandreceivedbyaTCPlayerthatreassemblesthepacketsintotheoriginalmessage.
Thelowerlayer,internetprotocol,handlestheaddresspartofeachpacketsoitgetstotheright
place,EachgatewaycomputeronthenetworkcheckstheIPtoshewheretoforwarda
message.

UDP
UDP=UserDatagramProtocol
NoredundancybuiltinlikeTCP
Noerrorchecking
Nobackandforthbetweensenderandreceiver
Faster,butrunsriskofnotsendingfullandcompletemessage
BettertouseUDPwhendoingsomethinglikestreammusic,asitdoesntmatterifone
noteoronebeatismissingfromasong.Itseasiertojustmoveonthantogoand
retrievethatonebeat.
AlternatecommunicationprotocoltoTCP.Providesportnumberstohelpdistinguishdifferent
userrequests.Idealforgaming,voiceandvideocommunicationswhichcansuffersomedata
losswithoutadverselyaffectingperceivedquality.
Port

**DNS(DomainNameServer)**
ConvertslettersofURLtoI.P.
Not1server
www.cnn.com=IPaddresstocomputer

Decentralizedsystemforstoringnamesforcomputersoranydeviceconnectedtothe
Internet
ConversionProcess(throughoutthisprocess,thecomputerisbasicallyaskingHasanyone
everbeenhere?):
1. Checkslocallyifthecomputerhastheaddressalreadystored
2. Ifitdoesnt,itchecksthenexthigherlevelcomputer,suchastherouter
3. Itthencommunicateswiththeoutsideworldandcontactsservers
Example:
politics.cnn.com
.comisthemostbasicpartoftheaddress,thencnnisthenextlevel,followedbypolitics.This
tellsyouhowtogettothenextlevel,anditisahierarchyofwhoknowswhatIPnumber.This
communicationbetweenlevelstakesmicroseconds.
DNSistheinternet'sphonebook,

**HTTPandTheWorldWideWeb**
12:10AM(notindepthenough)

OpenstandardsandtheIETF
12:10AM(notindepthenough)

SymmetricEncryption
PrivatekeyPrivatekey
ExampleisaCaesarShift
WithamundaneshiftlikeCaesar,boththepersonsendingthemessageandtheperson
receivingthemessagebothmustknowtheshift.Ifoneweretoshiftanumberbya
certainamount,noonewouldknowwhattodowithitinordertofindouttheencoded
number.
Bothpeopleneedtoknowthekeyfortheencryptiontoworksuccessfully
BadforInternetencryptionbecauseitsnotpractical.Youhaveto
precommunicate/agreeupontheencryptionbeforeexecuting

AsymmetricEncryption(needmoreelaborationon)
PublickeyPrivatekey
Publickeyisabignumber,generallycomprisedof2bigprimenumbers
Thepublickeyisbroadcastedtoeveryone,butthetwoprimenumbersthatareusedto
composeitareonlyknowntothemakerofthebignumber/key.

SSL,CertificateAuthorities,andPublicKeyCryptography

**PublicKeyCryptography**
12:10AM(notindepthenough)
Asymmetricencryption,lockispublic,keyisprivate.

ImportanceofPrimes

Primesisimportanttomoderncomputercryptography.Largenumbersareusedtoencryptafile
canbepubliclyknownandavailable.Theencryptionworkssoonlytheprimenumbersofthat
largenumbercanbeusedtodecryptalargenumberagain.UsedinPublickeycryptography**.
ThepublickeyisaMASSIVEnumberthatisdecryptedby2largeprimenumberswhichis
private.Thiswaytheprivatecodeholderscandecryptmessagessendtohim/herandeveryone
elsewouldhavetofactorthenumberwhichtakestoolongpractically.

SSL,HTTPS,CertificateAuthorities
SSL=SecureSocketLayer
Secureconnectiontoawebserver
ProcessofSSL(correctifwrong):
1. Useraccesseswebsite(example:amazon.com)
2. Amazonsendsyouacertificate(basicallyaformsayingitsactuallyAmazon)anda
publickey,akeythateveryoneknows
3. ContacttheCertificateAuthoritytomakesureitsfromAmazon
4. Onceyouknowitslegit,yousendasymmetrickeytoAmazon,andyouusethepublic
keytoencryptit
5. Amazonunlocksyourkeywiththeirkey.Thereisnowasecure2wayconnection
betweenyouandAmazon,andyoucandowhateveryouwantandnowyouhavea
secureconnection
CertificateAuthorities:
Wheneveryouaccessawebsite,theserversendsyouacertificatewhichischecked
withtheCertificateAuthority,effectivelyconfirmingifthesiteislegitorifitisshadyand
isnottherealwebsite,beitAmazonorwhatever.

CyberSecurity

Phishing(FakeWebsite,FakeWifi,FakeTechHelp)
Theideaisthatsomeoneisfakingawebsite,wifi,orhelptogetinformationcanbeused
togetsomeonespasswordiffakinghelp.
Exampleofphishingforhelp


Malware(Viruses&worms,TrojanHorses,Rootkits,Backdoors)
Virus=Userhastoinitiateit(receiveafile,installsomething,etc.)Whenexecuted,
replicatesbyinsertingcopiesofitselfintocomputerprograms,datafiles,orharddrive.
Whenthereplicationsucceeds,affectedareasareinfected.Viruscandomanythings
suchasstealhardwarespace,takeCPUtime,accessprivateinformation,corruptdata,
spamcontacts,logkeystrokes,etc.Cancausebilliondollarsworthofdamage.
Worm=propagatesitselfandgoesthroughtheentireInternetexampleisStuxnet.Itisa
programthatreplicatesitselfandusesacomputernetwork,relyingonsecurityfailures
ontospread.Unlikeacomputervirus,itdoesnotneedtoattacktoanexistingprogram.
Itconsumesbandwidth.Manywormswerecreatedtospread.
TrojanHorse=aprogramthatpretendstobesomethingitsnot,dosomethingelsethat
isnotnormallyassociatedwiththedisguisesomethingishiddenontheinside(thinkof
theactualTrojanHorse)(thewordingoftheanswerwasbadbutyes,basicallya
programthatpretendstobeonethingorcouldbethatsomething,butcarriesanother
pieceofprogram,thatcouldbemalicious.)

Rootkit=Apieceofmalwarethatgivesanattackerrootoradministratoraccess.Its
designedtoaccessareasofcomputersoftwarethatwouldotherwisebeunallowed.It
hidesitselfaspartsomethingthatthecomputernormallyruns,soeverytimethe
computerruns,thispieceofmalwarerunsaswell.
Backdoor=Awayofaccessingthesystemwithoutbeingknowngoingthroughdoors
normallynotaccessible/notthefrontdoorsofasystem.(asecretmethodofbypassing
normalauthentication.Canbepartofaprogram,createdjustincase.Ifpasswordshave
problemsyouhaveabackdoor.Imageifyourkeyforthefrontdoorisntworking,you
usethebackdoor)**FBIwantsappletocreateabackdoortoiphonesotheycanaccess
ittocheckfiles.
ZeroDaySoftwareVulnerabilities(BufferOverflow,Injection)
ZeroDay=exploitofsoftwarethathasneverbeenfixed
Verysevere.Onceprogrammerlearnsofthistheyhave0daystofixit.When
newsoftwareisreleased,itisvulnerabletoattackbyhackers.Thedeveloper
releasesapatchwhichfixesthevulnerability.
BufferOverflow=changewhatsstoredinthecomputersmemory.(aprogramwhile
writingdataoverrunsthebuffersboundaryandwritesonunauthenticatedmemory
locations.)
Example:Arrayofsize10,insertaStringofsize11.The11thcharacterinthe
nameisoverflowingfromthearray,soitgetsstoredsomewhereitsnotmeantto
beasaresultofthecomputernotknowingwhattodowithit.Thisusuallyresults
inunintendedsideeffects.
Injection=Usuallyhappenswithwebforms(userlogin,etc.),whereyouinjectJavascript
intotheformmasqueradingasaname.Whenthecomputerreadsit,itdoesthingsits
notmeanttodo.//AnothercommonformofinjectionisSQLinjection,inwhichattackers
formatinputstringsinsuchawaythatthelanguageendsupexecutingcommands
specifiedbytheattacker,allowingattackerstodeleteentiredatabasesorperformother
undesiredactions
DDoS&Botnets

DDoS=DistributedDenialofServicehavingmultipledistributedsourcessendrequests
to1webserver,overflowingitwithrequests.FloodinganIPaddresswiththousandsof
requestsblockingitoff.Thegoalistomakearesourceunavailabletointendedusers.
**Connect,allthedoorsofanIPaddressisblockedbyjunk.

Botnets
(knownasazombiearmy):itsanumberofcomputersontheinternetthathave
virusesorspamandhavebeensetuptoforwardtransmissionofvirusesandspam,like
azombieapocalypse.Thenumbersofcomputersaffectedgrowsexponentially.
**Remember,theguywith1millionmyspacefriendswithhisfriendaddingbot,whichis
abotnet.

You might also like