NETWORK SECURITY
NETWORK SECURITY
Network topology defines how devices in a network are connected and how they can interact.
Physical Topology
Bus Topology: All devices are connected to a center cable
Ring Topology: Nodes are connected in a closed ring
Star Topology: All nodes are connected to a centralized device (switch, router, etc.)
Mesh Topology:
Full mesh topology: All nodes are connected to every nodes in the network
Partial mesh topology: Few nodes are connected to every nodes in the network
Tree Topology: This is a combination of a Bus and Star Topology. There is a root (switch) where
other branches (sub-hubs) are attached to which then carries other nodes.
Assignment:
Study on Network Protocols, Port Numbers, Sockets, and the relationship between Network
Protocols and Port Numbers.
LOGICAL TOPOLOGY
FTP (File Transfer Protocol):
Secure Shell (SSH): allows to join a network remotely
Telnet: also used for remote services, it gives us access to infrastructures remotely. It allows a
user in a location to access a particular network without leaving his/her location.
Remote Desktop Protocol: It provides users graphical interface that allows us to have access to
infrastructure.
Simple Mail Transfer Protocol (SMTP): SMTP is the protocols that work on our email services. It
is a communication protocol that is used to transmit email messages over the internet to the
destination server.
Domain Name System (DNS): DNS is like a telephone directory to convert IP address to a
domain name
Hyper Text Transfer Protocol (HTTP): It is a kind of
Dynamic Host Configuration Protocol (DHCP):
Ping means packet internet grouper, it is used to check for connectivity between two (2)
devices.
INTERNETWORKING MODEL
Internetworking models are the standard put in place for 2 or more devices to interact and
communicate with each other.
There are 2 major models in networking:
- Open System Network Standard: a standard that is openly accessible and usable by
anyone.
- Vendor Propeitory Network Standard: These are standards that work majorly on a single
network vendor.
1. Open System Interconnection (OSI) Model
OSI LAYERS
7 - Application: They are the starting point of every communication in a network. This layer is
also known as the Desktop layer.
6 - Presentation: Data input on the application layer cannot be translated or processed raw.
The data will be converted to a usable format and that is done on the presentation layer. The
presentation layer is more or less like the interpreter that translates, encrypts, and compresses
the data.
5 - Session: This layer is responsible for setting up sessions. It defines the path
4 - Transport: The transport layer handles data delivery. It ensures that the data gets to the
right destination. It provides end-to-end data delivery. The transport layer will always ensure
error
3 - Network:
2 - Data Link:
1 - Physical Layer:
Application Layer, Presentation Layer, Session Layer (Software Layers)
Transport Layer (Heart of OSI)
Network Layer, Data Link Layer, Physical Layer (Hardware Layers)
TCP - Transmission Control Protocol, this protocol ensures that devices are connected with
each other before they start transmitting data. TCP makes use of flow control to ensure
delivery.
TCP layers
4 - Application Layer: This is the topmost layer and defines the interface of host programs with
the transport layer services. THis layer includes all high-level protocols like Telnet, DNS, HTTP,
FTP, SMTP, etc.
3 - Transport Layer: It is responsible for error-free end-to-end data delivery. The protocols
defined here are Transmission COntrol Protocol (TCP) and User Datagram Protocol (UDP).
2 - Internet Layer/Network: It defines the protocols for logical transmission of data over the
network. The main protocol in this layer is Internet Protocol (IP) and is supported by ICMP,
IGMP, RAMP, and ARP.
1 - Host-to-Network Layer: It is the lowest layer that is concerned with the physical
transmission of data. TCP/IP does not specifically define any protocol here but supports all the
standard protocols. This layer entails the data link and the physical layer of the OSI. This layer
defines the physical connection between 2 devices.
Neighbor table: All the devices directly connected to the router have their information stored on
the neighbor table.
Topology table: Stores all the information of all the connections within our internetwork.
For every device to be on a network, each device must carry an IP address. This is the means
of communication within the network.
INTERNET
IP ADDRESSING
Important Terminologies
Bits (Binary): 0 or 1
Byte: a combination of 8-bits
Octet: 8 bits
Digits: values within 0-9
Nibbles: Combination of 4 bits
Network Address: A network address is an IP address assigned to a network. (They are like
surname/last/family name)
Host Address: A host address is an address that is assigned to any device that joins a network.
Two (2) devices cannot use similar host addresses. A valid host address will be picked within
the network address. (They are like first names).
Broadcast Address: They are the address being used in internetwork to reach out to every
device connected.
Binary Coded Decimal (BCD) is a method of converting decimal numbers into their binary
equivalents.
4 BITS: 8 4 2 1
200.100.50.35
11001000.01100100.00110010.00100011
IP ADDRESSING
An IP Address is a unique numeric identifier assigned to each machines (nodes) in a network.
Two devices in a network cannot be given same IP addresses.
IP address is designed to allow host to communicate with other devices on the network.
IP Addresses are assigned by the use of DHCP (Dynamic Host Configuration Protocol) or
manually (static).
Internetwork is the connection of 2 or more networks and it is the router that assigns IP address
to nodes of the network. The router is at the internet layer of OSI model. The router is also
responsible for packet (data sent over network) switching.
NETWORK ADDRESSING
Network addresses are unique identifiers assigned to each network.
The IP address that is assigned to any device that joins a network is called the host address.
Host address is being picked within the range of a valid network address.
CLASS A NETWORK
Rule: The first bit of the first byte/segment will be turned off while the remaining bits will either
be turned off or on.
Addresses that start with 0 or 127 are used for special purposes (wildcard). These IP Addresses
will be exempted from the list of IP Addresses under Class A Network.
Addresses within 1-126 are Class A addresses
CLASS B NETWORK
Rule: The first bit of the first byte/segment is turned on while the second bit of the first
byte/segment will be turned off permanently while the remaining six bits can either be off or on.
Any IP Address within the range of 128 - 191 is a Class B Network Address.
CLASS C NETWORK
Rule: The first two bits of the first byte/segment is turned on while the third bit is turned off
permanently while the remaining five bits can be turned off/on.
11011111 = 223
1100000 = 192
Any IP Address that starts within the range of 192 - 223 is a Class C Network Address.
SUBNETTING IP ADDRESS
This is the principle/act of breaking a large block/network address into smaller IP addresses.
Benefits:
1. It reduces network traffic
2. It optimizes network performance
3. No limits to where network can cover
Subnet Mask: Subnet mask is like a pointer that tells which path is for the network and which
one is for the host.
- Subnet determines the numbers of required id(network)/ip for each subnet
- It determines the number of hosts that can be on each id/ip (network)
255.0.0.0 - Class A
11111111.00000000.00000000.00000000
N H H H
255.255.0.0 - Class B
11111111.11111111.00000000.00000000
N N H H
255.255.255.. - Class C
11111111.11111111.11111111.00000000
N N N H
CIDR - Classless Interdomain Routing: This determines the number of IP Addresses allocated
to individuals or companies.
11111111.100000000.00000000.00000000 255.128.0.0 /9
Block Size are the values that is being used to determine the increment of our subnet (the rate
at which subnet increases)
How do we subnet?
a. How many subnets can the chosen subnet mask produce?
b. How many hosts per subnets are available?
c. What are the valid subnet addresses?
d. What are the broadcast address for each subnets?
e. What are the valid hosts for each subnets?
Example 2: 172.16.0.0/29
11111111.11111111.11111111.11111000
255.255.255.248 - Subnet Mask
a. Subnet = 2x = 213 = 8192 Subnets/Networks
b. Host = 2y - 2 = 23 - 2 = 8 - 2 = 6 Hosts
c. Block Size = 256 - 248 = 8
0, 8, 16, 24, 32, 40, 48, 56, 64, 72, 80, 88, 96, 104, 112, 120, 128, 136, 144, 152, 160 …
172.16.0.0 || 172.168.0.8 || 172.162.0.16 || 172.168.0.24 …. 172.168.1.0|| 172.168.1.8
…
d. Broadcast Address
Subnet Address Broadcast Address
172.16.0.0 172.16.0.7
172.16.0.8 172.16.0.15
172.16.0.16 172.16.0.31
…
172.16.255.248 172.16.255.255
e. Host Address
Subnet Address Host Address
172.16.0.0 172.16.0.1 - 172.16.0.6
172.16.0.8 172.16.0.7 - 172.16.0.14
172.16.0.16 172.16.0.17 - 172.16.0.30
…
172.16.255.248 172.16.255.249 - 172.16.255.254
Example 2: 10.0.0.0/18
11111111.11111111.11000000.00000000
255.255.192.0 - Subnet Mask
a. Subnet = 2x = 210 = 1024
b. Host = 2y - 2 = 214 - 2 = 16,384 - 2 = 16,382
c. Block Size = 256 - 192 = 64
0, 64, 128, 192
10.0.0.0 || 10.0.64.0 || 10.0.128.0 || 10.0.192.0 || 10.1.0.0 || 10.1.64.0 || 10.1.128.0
…10.192.255.0
d. Broadcast Address
Subnet Address Broadcast Address
10.0.0.0 10.0.63.255
10.0.64.0 10.0.127.255
10.0.128.0 10.0.191.255
10.0.192.0 10.1.255.255 ???
10.1.0.0 10
e. Host Address
Subnet Address Host Address
10.0.0.0 10.0.0.1 - 10.0.63.254
10.0.64.0 10.0.64.1 - 10.0.127.254
10.0.128.0 10.0.128.1 - 10.0.191.254
NSS LEVEL 2
Memory Hierarchy
- Memory hierarchy is a computer architecture technique that organizes a computer’s
storage based on response time, access speed, cost, and size.
-