DIT 711 Network and Security
DIT 711 Network and Security
By
ENOCH, Joseph Diema
June, 2023
Presentation Outline
Computer Network and
Network Security
Computer Networks
Introduction to Computer Network
The first computers were stand-alone machines and later,
timesharing computers were invented that allowed more than one
person to use the machine concurrently.
Today, most computers are networked. They can communicate with
one another, share resources, and access the Internet.
Network today, has no boundary and supports the way we:
Learn
Communicate
Work
Play
What is Computer Network ? Computer network is the connection of
multiple devices (or hosts) that communicate with one another to share
data and resources
Computer Networks
Introduction to Computer Network
We define a computer network from two perspectives:
physically (hardware infrastructure interconnecting end-
devices) and logically (software and data: a system facilitating
information exchange between applications).
The basic structure of most computer networks consists of the following:
• Network edge: end devices (e.g. Laptop, smart phone , IoT devices etc)
• Network core – network devices (e.g. Router, Switches etc)
• Access networks, physical media (e.g. Wired: cable, Wireless: radio waves etc )
• The data: (e.g. text, images, videos, audio and others)
• Resources: (e.g. printer, an internet connection, applications, etc)
Computer Networks
Uses of Computer Networks
Computer Networks
Network Topology
• A Network Topology is the arrangement with which computer
systems or network devices are connected to each other.
• Point-to-Point
• Point-to-point networks contains exactly two hosts such as computer,
switches or routers, servers connected back to back using a single
piece of cable.
Computer Networks
Network Topology
• Bus Topology
• In case of Bus topology, all devices share single communication
line or cable.
• Both ends of the shared channel have line terminator. The data is
sent in only one direction and as soon as it reaches the extreme,
the terminator removes the data from the line.
Computer Networks
Network Topology
• Star Topology
• All hosts in Star topology are connected to a central device. Every
communication between hosts, takes place through the central device.
• Ring Topology
• In ring topology, each host machine connects to exactly two other
machines, creating a circular network structure.
•
Computer Networks
Network Topology
• Mesh Topology
• In this type of topology, a host is connected to one or multiple hosts. This
topology has hosts in point-to-point connection with every other host or
may also have hosts which are in point-to-point connection to few hosts
only.
• Tree Topology
• Also known as Hierarchical Topology, this is the most common form of
network topology in use presently. This topology imitates as extended Star
topology and inherits properties of bus topology.
Computer Networks
Network Topology
• Daisy Chain
• This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts
are connected to two hosts only, except the end hosts. Means, if the end hosts in daisy
chain are connected then it represents Ring topology.
• Hybrid Topology
• A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating
topologies.
Computer Networks
Network Media
1. Network media is the actual path over which an electrical signal travels as it moves
from one component to another.
• Twisted-Pair Cable
• Twisted-pair cable is a type of cabling that is used for telephone communications and
most modern Ethernet networks.
• Two basic types of twisted-pair cable exist: unshielded twisted pair (UTP) and shielded twisted pair
(STP).
• Commonly used types of UTP cabling are as follows:
• Category 1—Used for telephone communications. Not suitable for transmitting data.
• Category 2—Capable of transmitting data at speeds up to 4 megabits per second (Mbps).
• Category 3—Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps.
• Category 4—Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps.
• Category 5—Can transmit data at speeds up to 100 Mbps.
• Category 5e —Used in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps]).
• Category 6—Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge (AWG)
copper wires. Category 6 cable is currently the fastest standard for UTP.
Computer Networks
Network Media
• Shielded Twisted-Pair Cable
• Shielded twisted-pair (STP) cable combines the techniques of
shielding, cancellation, and wire twisting. Although STP
prevents interference better than UTP, it is more expensive
and difficult to install.
• The following summarizes the features of STP cable:
• Speed and throughput—10 to 100 Mbps
• Average cost per node—Moderately expensive
• Media and connector size—Medium to large
• Maximum cable length—100 m (short)
Computer Networks
Network Media
• Coaxial Cable
• Coaxial cable consists of a hollow outer cylindrical conductor that
surrounds a single inner wire made of two conducting elements. One of
these elements, located in the center of the cable, is a copper
conductor.
• Wireless Communication
• Wireless communication uses radio frequencies (RF) or
infrared (IR) waves to transmit data between devices on a
LAN.
• Wireless frequencies range from 3 kilohertz (kHz) to 300
gigahertz (GHz). The data-transmission rates range from 9
kilobits per second (kbps) to as high as 54 Mbps.
Computer Networks
Comparing Media Types
Media Type Maximum Speed Cost Advantages Disadvantages
Segment Length
UTP 100 m 10 Mbps to 1000 Least Easy to install; widely available Susceptible to interference; can cover only a
Mbps expensive and widely used limited distance
STP 100 m 10 Mbps to 100 More Reduced crosstalk; more Difficult to work with; can cover only a
Mbps expensive than resistant to EMI than Thinnet or limited distance
UTP UTP
Coaxial 500 m (Thicknet) 10 Mbps to 100 Relatively Less susceptible to EMI Difficult to work with (Thicknet); limited
185 m (Thinnet) Mbps inexpensive, interference than other types of bandwidth; limited application (Thinnet);
but more copper media damage to cable can bring down entire
costly than network
UTP
Fiber-Optic 10 km and 100 Mbps to 100 Expensive Cannot be tapped, so security is Difficult to terminate
farther (single- Gbps (single better; can be used over great
mode) mode) distances; is not susceptible to
2 km and farther 100 Mbps to 9.92 EMI; has a higher data rate than
(multimode) Gbps (multimode) coaxial and twisted-pair cable
Computer Networks
Making LAN Connections
UTP cabling connections are specified by the Electronics Industry
Alliance/Telecommunications Industry Association (EIA/TIA).
Computer Networks
Making LAN Connections
• Straight-through UTP Cables
• A straight-through cable has connectors on each end that are
terminated the same in accordance with either the T568A or T568B
standards.
• Use straight-through cables for the following connections:
• Switch to a router Ethernet port
• Computer to switch
• Computer to hub
Computer Networks
Making LAN Connections
• Crossover UTP Cables
• For two devices to communicate through a cable that is directly
connected between the two, the transmit terminal of one device
needs to be connected to the receive terminal of the other device.
• To summarize, crossover cables directly connect the following devices on a
LAN:
• Switch to switch
• Switch to hub
• Hub to hub
• Router to router Ethernet port connection
• Computer to computer
• Computer to a router Ethernet port
Computer Networks
Making LAN Connections
• Crossover UTP Cables
• For two devices to communicate through a cable that is directly
connected between the two, the transmit terminal of one device
needs to be connected to the receive terminal of the other device.
• To summarize, crossover cables directly connect the following devices on a
LAN:
• Switch to switch
• Switch to hub
• Hub to hub
• Router to router Ethernet port connection
• Computer to computer
• Computer to a router Ethernet port
Computer Networks
Network Devices
• Hardware devices that are used to connect computers, printers, fax machines
and other electronic devices to a network are called network devices.
• Modem
• Modem is a device that enables a computer to send or receive data over
telephone or cable lines.
• Types of Modem
• Modem can be categorized in several ways like direction in which it can transmit
data, type of connection to the transmission line, transmission mode, etc.
• Depending on direc on of data transmission, modem can be of these types −
• Simplex − A simplex modem can transfer data in only one direc on, from digital device to
network (modulator) or network to digital device (demodulator).
• Half duplex − A half-duplex modem has the capacity to transfer data in both the directions but
only one at a time.
• Full duplex − A full duplex modem can transmit data in both the direc ons simultaneously.
Computer Networks
Network Devices
• RJ45 Connector
• RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack
used by devices to physically connect to Ethernet based local area
networks (LANs).
• Ethernet card, also known as network interface card (NIC),
is a hardware component used by computers to connect to
Ethernet LAN and communicate with other devices on the
LAN.
• A router is a network layer hardware device that transmits
data from one LAN to another if both networks support
the same set of protocols.
Computer Networks
Network Devices
• Routing Table
• A router reads its routing table to decide the best available route the packet can take to
reach its destination quickly and accurately. The routing table may be of these two types
• Static − In a sta c rou ng table the routes are fed manually. So it is suitable only for very small
networks that have maximum two to three routers.
• Dynamic − In a dynamic rou ng table, the router communicates with other routers through
protocols to determine which routes are free. This is suited for larger networks where manual
feeding may not be feasible due to large number of routers.
• Switch is a network device that connects other devices to Ethernet networks through
twisted pair cables. It uses packet switching technique to receive, store and forward
data packets on the network.
• Gateway: is a network device used to connect two or more dissimilar
networks.
• Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve
wireless connection to any network.
Computer Networks
Different Types of Network
• PAN (Personal Area Network):
• Example: Wireless Sensor Network; wireless network that connects a computer with
its peripherals like monitor, keyboard, mouse, printer, etc.
• LAN (Local Area Network):
• Example: an office network like CITE network
• MAN (Metropolitan Area Network):
• Example: Military network, Campus network
• WAN (Wide Area Network):
• Example: The Internet, network used by international organizations
• Wireless LAN (WLAN) - Similar to a LAN but wirelessly interconnects users
and end points in a small geographical area.
• Storage Area Network (SAN) - A network infrastructure designed to
support file servers and provide data storage, retrieval, and replication.
Computer Networks
IP addressing
• Address - The unique number ID assigned to one host or interface in a
network.
• Subnet - A portion of a network that shares a particular subnet address.
• Subnet mask - A 32-bit combination used to describe which portion of an
address refers to the subnet and which part refers to the host.
• Interface - A network connection.
Understand IP Addresses
• An IP address is an address used in order to uniquely identify a device on
an IP network. The address is made up of 32 binary bits, which can be
divisible into a network portion and host portion with the help of a subnet
mask.
Computer Networks
IP addressing
• And this sample shows an IP address represented in both binary and
decimal. 10. 1. 23. 19 (decimal)
00001010.00000001.00010111.00010011 (binary)
• There are five different classes of networks, A to E. This document
focuses on classes A to C, since classes D and E are reserved. These
terms are rarely used in the industry anymore because of the
introduction of classless interdomain routing (CIDR).
•
Computer Networks
IP addressing
Computer Networks
IP addressing
• Network Masks
• A network mask helps you know which portion of the address identifies the
network and which portion of the address identifies the node. Class A, B, and
C networks have default masks
• Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0
• An IP address on a Class A network that has not been subnetted would have
an address/mask pair similar to
• 8.20.15.1/24 = 00001000.00010100.00001111.0000000
• 255.0.0.0 = 11111111.00000000.00000000.00000000
• Once you have the address and the mask represented in binary, then
identification of the network and host ID is easier.
Computer Networks
IP addressing
• Understand Subnetting
• Subnetting allows you to create multiple logical networks that exist
within a single Class A, B, or C network. In order to subnet a network,
extend the natural mask with some of the bits from the host ID
portion of the address in order to create a subnetwork ID. For
example, 204.17.5.32/27
• 204.17.5.0 204.17.5.31 255.255.255.224 host address range 1 to 30
• 204.17.5.32 204.17.5.63 255.255.255.224 host address range 33 to 62
• 204.17.5.64 255.255.255.224 host address range 65 to 94
• 204.17.5.96 255.255.255.224 host address range 97 to 126
• 204.17.5.128 255.255.255.224 host address range 129 to 158
• 204.17.5.160 255.255.255.224 host address range 161 to 190
• 204.17.5.193 255.255.255.224 host address range 193 to 222
• 204.17.5.224 255.255.255.224 host address range 225 to 254
Computer Networks
IP addressing
• Sample Exercise 1
• In this example, you are given two address / mask combinations, written with the prefix/length
notation, which have been assigned to two devices. Your task is to determine if these devices are on
the same subnet or different subnets.
• Determine the Subnet for DeviceA:
• 172.16.17.30 - 10101100.00010000.00010001.00011110
• 255.255.240.0 - 11111111.11111111.11110000.00000000
• -----------------| sub|------------
• subnet = 10101100.00010000.00010000.00000000 = 172.16.16.0
• Determine the Subnet for DeviceB:
• 172.16.28.15 - 10101100.00010000.00011100.00001111
• 255.255.240.0 - 11111111.11111111.11110000.00000000
• -----------------| sub|------------
• subnet = 10101100.00010000.00010000.00000000 = 172.16.16.0
• From these determinations, DeviceA and DeviceB have addresses that are part of the same subnet.
Computer Networks
IP addressing
• Sample Exercise 2
• Given the Class C network of 204.15.5.0/24, subnet the network in order to create the network in Figure
below with the host requirements shown.
• Functionality of Data-link Layer: Data link layer does many tasks on behalf of upper layer. These are:
• Framing: Data-link layer takes packets from Network Layer and encapsulates them into Frames. Then, it sends
each frame bit-by-bit on the hardware. At receiver’ end, data link layer picks up signals from hardware and
assembles them into frames.
• Addressing: Data-link layer provides layer-2 hardware addressing mechanism. Hardware address is assumed to
be unique on the link. It is encoded into hardware at the time of manufacturing.
• Synchronization: When data frames are sent on the link, both machines must be synchronized in order to
transfer to take place.
• Error Control: Sometimes signals may have encountered problem in transition and the bits are flipped. These
errors are detected and attempted to recover actual data bits. It also provides error reporting mechanism to the
sender.
• Flow Control: Stations on same link may have different speed or capacity. Data-link layer ensures flow control
that enables both machine to exchange data on same speed.
• Multi-Access: When host on the shared link tries to transfer the data, it has a high probability of collision. Data-
link layer provides mechanism such as CSMA/CD to equip capability of accessing a shared media among multiple
Systems.
Computer Networks
Network Model
• Types of Errors
• There may be three types of errors:
• Single bit error
• In a frame, there is only one bit, anywhere though, which is corrupt.
• Multiple bits error
• Frame is received with more than one bits in corrupted state.
• Burst error
• Frame contains more than1 consecutive bits corrupted.
TCP is used by HTTP, HTTPs, FTP, SMTP and Telnet. UDP is used by DNS, DHCP, TFTP, SNMP, RIP, and VoIP.
Network Security
Network Security
• Security is the most important and unavoidable parameter in the computer
system in today’s world. With increase in dependency on online systems
today, there is an increase in the demand of the system’s security.
• There are 4 types of computing security that are used interchangeably.
However, there is slight different between them.
• Information Security: protective measures to guard and prevent the information
(both physical and digital data) from unauthorized access.
• Cybersecurity (also called Internet Security): protective measures to guard
networked systems and data connected to the Internet from harm or unauthorized
use. Cybersecurity protects only digital data.
• Network Security: Planning and implementing network security measures to protect
the integrity of networks and programs against hacking and unauthorized access.
• Computer Security: protection of computer systems (usually standalone systems)
and their information from harm, theft, and unauthorized access/use
Network Security
Network Security
• Security Goals/Requirements: There are three main primary objectives in any security
service, namely: confidentiality, integrity and authority usually called C-I-A Triad or
security Triad
• Confidentiality: computer-related assets must be accessed only by authorised parties. --
-Synonyms: secrecy, privacy
• Integrity: computer-related assets must be maintained in a correct state and nobody
should be able to improperly modify it, either accidentally or maliciously. ---Purpose:
accuracy, consistency, and trustworthiness of assets.
• Integrity covers the following
• Data Integrity - Data has not been modified by unauthorised parties.
• Authentication (Origin Integrity) – proof about origin of a message(e.g.Something you know, Something you
have, Something you are, etc.)
• Non-Repudiation - Sender cannot deny having sent a message
• Availability: computer-related assets must be accessible to authorised parties at
appropriate times (whenever they need to do so). It describes the services and data
being well maintained and able to be accessed all the time
• Access control:This refers to the ability to control the level of access that individuals or entities have to a
network or system and how much information they can receive. The right parties should have access
permission at the right time
Network Security
Network Security
• Other attacks include the following:
• Brute force attackis an activity which involves repetitive successive attempts of
trying various password combinations to break into any website.
• Virus is malware which requires some form of user’s interaction to infect the
user’s device.
• Worm is malware which can enter a device without any explicit user interaction.
• Trojan horse is a type of malicious code or program that developed by hackers to
disguise as legitimate software to gain access to victim’s systems.
• Botnet is a network of private computers infected with malicious software and
controlled as a group without the owners’ knowledge, e.g. to send spam.
• DoS (Denial of Service) attack renders a network, host, or other pieces of
infrastructure unusable by legitimate users. Most Internet DoS attacks fall into
one of three categories:
Network Security
Network Security
• Packet sniffer is a passive receiver that records a copy of every packet that flies by is
called a packet sniffer. By placing a passive receiver in the vicinity of the wireless
transmitter, that receiver can obtain a copy of every packet that is transmitted. One
defence against packet sniffing involve cryptography.
• IP Spoofing is the ability to inject packets into the Internet with a false source address is
known as IP spoofing, and is but one of many ways in which one user can masquerade as
another user. End-point authentication can help.
• Compromised-Key Attack – A key is a secret code or number necessary to interpret
secured information. An attacker uses the compromised key to gain access to a secured
communication without the sender or receiver being aware of the attack.
• DNS spoofing – Also referred to as DNS cache poisoning, is a form of computer security
hacking in which corrupt Domain Name System data is introduced into the DNS resolver’s
cache, causing the name server to return an incorrect IP address.
• Rootkits are stealthy packages designed to benefit administrative rights and get the right
of entry to a community tool. Once installed, hackers have complete and unrestricted get
right of entry to the tool and can, therefore, execute any movement including spying on
customers or stealing exclusive data with no hindrance.
Network Security
Network Security
Four types of network security required
• Physical Security
• User Security
• File Security
• Intruder Security
You will need to address all 4