Netsec
Netsec
Netsec
e
s
s
o
n
1
OBJECTIVES:
At the end of the lesson, the student will be able to:
Presentation Outline:
• Evolution of Computer Networks
• Data Communications
• Network
• Types of Connection, Topologies, and Categories of
Networks
• Switching Types
• www and Internet
• Protocol
• Trends in the Internet and Telecommunications
Evolution of Computer Networks
Evolution of Computer Networks
• Computer networks, also known as Datacom, or
Datatransmission networks, represent a logical result
of the evolution of two of the most important scientific
and technical branches of modern civilization…
•Computing and
•Telecommunication technologies.
Data Communications
• Data Communications – exchange of data between two
devices via some form of transmission media.
Five Components of Data Communication
• Message/
Information
• Sender
• Receiver
• Transmission
Medium
• Protocol
• Information can be in a form of text, numbers, images,
audio, and video
types)
• Communication can be simplex, half-duplex, or full duplex.
(Data flow
Network Criteria
Performance
• Depends on network elements
• Measured in terms of delay and throughput Reliability
• Failure rate of network components
• Measured in terms of availability/robustness Security
• Data protection against corruption/loss of data due to error
or malicious users.
Networks
• A network is the interconnection of a set of devices capable of
communication.
• A device can be a host such as a large computer, desktop,
laptop, workstation, cellular phone, or security system.
• A device can also be a connecting device such as a router,
switch or modem that changes the form of data.
Types of Connection
• Point to point – single transmitter and receiver
• Multipoint – multiple recipients of single transmission
Physical Topology
Bus
Topology
Ring
Topology
Types of Transmission
• Unicast – packet is sent from a single source to a specific
destination.
• Broadcast – information is sent from one point to all other
points.
• Multicast – information is sent from one or more points to a set
of other points.
Categories of Networks
Local Area Network (LAN)
• Short distances
• Designed to provide local interconnectivity Wide
Area Network (WAN)
• Long distances
• Provide connectivity over large areas Metropolitan
Area Network (MAN)
• Provide connectivity over areas such as a city or a
campus.
LAN
MAN
WAN
Switching
• Switching refers to choosing the route the data will go through.
• A switch needs to forward data from a network to another
network when required.
• An internet is a switched network in which a switch connects at
least two links together.
Protocols
• Set of rules that governs data communications.
Elements of Protocol
1. Syntax
• Structure or format of the data
• Indicates how to read the bits
2. Semantics
• Interprets the meaning of the bits
• Knows which fields define the actions
3. Timing
• When data should be sent
• Speed at which data should be sent or received
Lesson 2
LESSON 2
Engr. Rodrigo D. Gutierrez
OBJECTIVES:
At the end of the lesson, the student will be able to:
Features of Layering
• Decomposes the problem of building a network into more
manageable components.
• Modular design
• The above layered system
having two layers of
abstraction sandwiched
between the underlying
hardware and the application
program.
• The above layered system
having multiple abstractions provided at any level of the system
• Two types of channel.
- Request/reply channel -
Message stream channel
Protocol
• The protocol defines the format of the data being
exchanged and the control and timing for the
handshake between layers.
• It defines the interfaces between the layers in the same
system and with the layers of peer system.
Protocol defines two interfaces:
1. Service interfaces - Interface between objects in the
same machine.
2. Peer interfaces – messages exchanged with peer.
Protocol Specification
• Combination of prose, pseudo code, state transition diagrams,
packet formats and abstract notations.
Encapsulation
• Defined as the wrapping up of data under a single unit. (adding
information to the data).
Header
• A small piece of information used among peers to communicate
each other.
Payload
• Data being transmitted by the application.
Functions of the 7 OSI Layers
1. Physical Layer
• Characteristics of the interface between the devices.
• Type of transmission medium
• Representation of bits (1’s or 0’s)
• Transmission rate (bps)
• Clock Synchronization (sender and receiver sync)
2. Data Link Layer
• Framing (frames)
• Physical Addressing (MAC Address)
• Flow Control (avoid overwhelming the receiver)
• Error Control (detect and retransmit damaged or lost frames,
trailer added to the end of the frame)
• Access Control (control over the same link when two or more
devices are connected)
3. Network Layer
• Source to destination delivery of the packets.
• Logical Addressing (IP)
• Routing (router, internetworks)
4. Transport Layer
• Process-to-process delivery (process – running program)
• Service point Addressing (port address)
• Segmentation and Reassembly (segments)
• Connection Control (TCP – connection-oriented, UDP-
connectionless – oriented)
• Flow Control (end-to-end flow control)
• Error Control (assures no damage or loss – retransmission)
5. Session Layer
• Opening, closing and managing session between end-user
application processes
• Inter-host communication
• Controlling ports and sessions
6. Presentation Layer
• Syntax (formats) and semantics
• Encryption and compression
7. Application Layer
• User interface services (e-mail, file transfer)
TCP/IP Model (Internet
Architecture)
Functions of the TCP/IP Layers
1. Application Layer
• Application protocols
• FTP, TFTP, SMTP, Telnet, HTTP
2. Transport Layer
• TCP-reliable/connection-oriented , UDP-
unreliable/connectionlessoriented
3. Internet Layer
• IP (supports interconnection of multiple networking
technologies)
• Supporting protocols (ARP, RARP, ICMP-querying and error
reporting protocol)
LESSON 3
OBJECTIVES:
At the end of the lesson, the student will be able to:
➢Describe the different networking devices.
➢Identify the role and contribution of some
governing bodies in computer networking.
➢Understand the multiple access techniques
used in a network.
➢Describe the various LAN technologies.
Presentation Outline:
➢Different Networking Devices
➢Standard Organizations
➢Multiple Access Schemes
➢LAN technologies
Networking Devices
What are different networking
devices?
• Networking devices include all computers,
peripherals, interface cards and other
equipment needed to perform data-processing
and communications within the network.
Different
Networking
Devices
✓Network Interface
Card (NIC)
✓Hubs
✓Switches
✓Repeaters
✓Bridge
✓Router
✓Modem
Network
Interface card
(NIC)
• Provides the physical
connection between
the network and the
computer workstation.
• Also referred to as Ethernet adapters, network
adapters, LAN cards, or
LAN adapters.
Hub
• Sometimes referred to as a
concentrator
• Acts as a convergence point of a
network, allowing the transfer of data packets
• Works by duplicating the data packets received via one
port, and making it available to all ports, therefore
allowing data sharing between all devices connected to
the hub.
• Works at physical layer of the OSI model.
Switch
• Joins multiple computers together within one
local area network.
• Capable of inspecting data packets as they
are received, determining the
source and destination device
of each packet, and forwarding
them appropriately.
• Works at data link layer and
network layer (for multi-layer
switch).
• Hub works by sending the data to all ports on
the device whereas a switch transfers it only to
that port which is connected to the destination
device
Repeater
• Electrically amplifies the signal it
receives and rebroadcasts it.
• Can be a separate device or it
can be incorporated into a
concentrator.
• Used when the total length of your network cable
exceeds the standards set for the type of cable being
used.
Difference between Bridge and
Switch in Networking
Bridge Switch
• works in data link layer
• Works in data link layer of and network layer of OSI
OSI model model.
• Has multiple numbers of
• Has only two ports ports.
• Used to connect two LAN
segment using the same • Used to connect devices
topology. to the same network.
• Can operate in both half
• Can operate only in duplex and full duplex
halfduplex mode mode.
• Performance of bridge is • Performance of Switch is
slower than switch faster than a bridge.
Router
• Connects at least two
networks.
• Forwards and routes data
packets along networks.
• The router makes sure that information does make
it to the intended destination.
• Operate in the network layer of the OSI model.
Modem
• A communication device that
is used to provide the
connectivity with the internet.
• Works in the physical and
data link layers of the OSI
model.
Modem vs. Router
Modem Router
• Device which performs both • Networking device which associates
modulation and demodulation of various networks with each other
signals. for LAN and WAN networks.
• It works on the data-link layer of the • It works on the physical, data-link
OSI model and doesn’t have any and network layer of the OSI model
inbuilt intelligence. and maintains the routing table to
forward and route the data packet
to the desired destination path.
• It is an essential part of the • It routes the data packets among
networking system for connecting the networking devices and the
any device to the ISP. different networking systems.
• Limited to only LAN connectivity • Used for LAN as well as WAN
communication networking.
Gateway
• A device which connects
multiple networks.
• Acts as an entrance to another
network.
• It allows the computer
programs, either on the same
computer or different computers to share information
across the network through protocols.
• A router is also a gateway.
• Operate in all seven layers of the OSI model.
Firewall
• A firewall is a system designed to prevent unauthorized access
to or from a private network.
• A firewall is a network security device that monitors incoming
and outgoing network traffic and decides whether to allow or
block specific
traffic based on a
defined set of
security rules.
• You can implement a firewall in either hardware or software
form, or a combination of both.
Network Standards
Standards
• Allow different computers to communicate.
• Increase the market for products adhering to the standard, resulting
in mass production and cheaper prices.
Standard Organizations
1.ITU-T (International Telecommunication Union-
Telecommunication)
• promote the development of telecommunication networks and access
to telecommunication services
2.ISO (International Organization for Standardization)
• OSI Layer
3.IETF (Internet Engineering Task Force)
• Responsible for publishing RFCs (Request For Comments)
4.IEEE (Institute of Electrical and Electronic Engineers)
• The world’s largest technical professional organization dedicated to
advancing technology for the benefit of humanity.
Communication Protocols
• A communication protocol is the set of rules that
determines how and when stations are allowed to
transmit or receive data, how the data is formatted, and
how error checking is performed, etc.
• MAC (Media Access Control) protocol is a set of rules
to control access to a shared communication medium
among various users.
• One station transmit at a time.
PURE ALOHA
• Whenever a station has a frame to send, station listens
for a round-trip propagation time, if no
acknowledgment, then retransmits.
• Collision occurs if two frames interfere each other
during increased of load/data.
CSMA
• A station wishing to transmit first listens to the
medium if another transmission is in progress
(carrier sense).
- If the medium is in use – station waits.
- If the medium is idle – station may transmit.
• Collisions can occur only when more than one
user begins transmitting within the period of
propagation delay.
Fast Ethernet
• a low-cost, Ethernet compatible LAN operating at 100
Mbps
• 100BASE-T options use the IEEE 802.3 MAC protocol
and frame format
• 100BASE-X options use the physical medium
specifications originally defined for FDDI.
• All of the 100BASE-X schemes use two physical links
between nodes: one for transmission and one for
reception.
• 100BASE-TX make use of shielded twisted pair (STP)
or high-quality unshielded twisted pair (UTP).
Token Bus
• Physically, the token bus is a linear cable onto
which stations are attached. Logically, stations
are organized into a ring.
• A special control frame called token is
transmitted from one station to the next, with
each station knowing the address of the station
to its “left’’ and “right’’.
• Token bus defines four priority classes: 0, 2, 4,
and 6 for traffic, with 0 the lowest priority and 6
the highest priority.
Token Ring
• IEEE 802.5 standard.
• The token ring technique is based on the use of a
small frame, called a token that circulates.
• A station wishing to transmit must wait until it detects a
token passing by.
• It then seizes the token by changing one bit in the
token which transforms it from a token into a start-of-
frame sequence for a data frame.
• The station then appends and transmits the remainder
of the fields needed to construct a data frame.
FDDI (Fiber Distributed Data
Interface)
• The FDDI standard specifies a ring topology operating
at 100 Mbps.
• Optical fiber or twisted pair are used for medium.
• Optical fiber uses 4B/5B NRZI encoding. Maximum
length between repeaters is 2 km. Maximum number of
repeaters is 100.
• Two twisted pair media are specified: 100-ohm
Category 5 unshielded twisted pair and 150-ohm
shielded twisted pair. Maximum length between
repeaters is 100m . Maximum number of repeaters is
100.
100VG-AnyLAN
• It is intended to be a 100 Mbps extension to the
10 Mbps Ethernet and to support IEEE 802.3
frame types.
• Uses a MAC scheme known as demand priority;
• It has been standardized under IEEE 802.12.
• Its MAC algorithm is a round-robin scheme with
two priority levels.
Single-Hub Network
• When a station wishes to transmit a frame, it first
issues a request to the central hub and then
awaits permission from the hub to transmit.
• A station must designate each request as
normal-priority or highpriority.
Hierarchical Network
• All of the end-system ports on all hubs are
treated as a single set of ports for purposes of
round-robin.
• Port ordering is done preorder traversal
LESSON 4
• Internetworking Definition
• Requirements for Internetworking
• Networking Equipment
• Define Tunneling and Tunneling Protocols
• IP Addressing
• Internet Protocols
• Internet Routing
OBJECTIVES:
At the end of the lesson, the student will be able to:
• Define the term internetworking.
• Name the requirements for internetworking.
• List down the different networking equipment.
• Define tunneling and cite examples of tunneling
protocols.
• Learn the process of IP Addressing.
• Understand the role of different internet protocols.
• Learn the concept of routing protocols.
Internetworking
• The term “internetworking”
describes the connecting of
separate networks possibly
based on different networking
technologies and possibly
belonging to different
organizations together.
• We will begin by qualifying what is required to support
this capability.
Internetworking Equipment
• Many pieces of standard networking equipment and
networking strategies have been developed to support the
network requirements. Among them are the following:
• Repeaters
• Hubs
• Switches
• Bridges
• Routers
• Tunnels
What is
Tunneling?
• In networking, tunnels are a method for transporting
data across a network using protocols that are not
supported by that network.
• Tunneling works by encapsulating packets:
wrapping packets inside of other packets.
• Tunneling is often used in virtual private networks
(VPNs).
• It can also set up efficient and secure connections
between networks, enable the usage of
unsupported network protocols, and in some cases
allow users to bypass firewalls.
UDP
• User Datagram Protocol
• Provides a connectionless service over IP
• Has no session or transport layer
• Talks directly to the network layer (IP)
• Allows messages to be sent from client to server with
no guaranteed delivery and without any
acknowledgement of receipt by the recipient.
TCP
• Transmission Control Protocol
• Provides a connection oriented service over IP
• Fits into the transport and session layers of the OSI
model.
• Talks to the network layer (IP).
• Allows a client and server process to establish a “virtual
circuit” between them which they can use as a bi-
directional communications channel with guaranteed
error free delivery.
Internet Routing
• At the network layer routing is a non-issue. IP packets are
delivered directly from host to host if they are on the same
network.
• If the destination host is on a different network (subnet), the
sender will send the packet to the local router (gateway) for
routing.
• RIP (Router Information Protocol) keeps all such routers
updated regarding paths and congestion towards the
destination.
• Default Route: Only routes to known networks are specifically
held by each router.
Packets destined for other destinations will be sent towards the
nearest backbone via a “default route.”
• Other routing protocols include IGRP, EIGRP, BGP, and OSPF
CIDR (pronounced ‘cider’)
• Classless Internet Domain Routing
• In the past, the network and host bits were defined strictly on
the basis of the class of the IP address, and routing could only
take place on that basis.
• Two changes occur in CIDR
- routers are aware of netmasks and subnetting
- netmasks can not only redefine host bits as network
bits, but can also redefine network bits as host bits.
IPv6
• Address space is expanded from 32 bits to 128 bits.
• represented in 8 groups of 16 bits each. Each group is
written as four hexadecimal digits (sometimes called
hextets) • No checksums since integrity can be handled
elsewhere.
• No fragmentation.
• Support of real-time and special services.
• Introduction of “anycast” mode (at least one of a
group).
• Support of authentication and encryption at the
network layer.