Final Network Protocols
Final Network Protocols
Final Network Protocols
Archie Bianes Liezl Marie Lagrimas Irish Mae Lirio Karen Joy Samera
network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.
is use to retrieve emails from the remote server over the TCP/IP connection.
is used to access the emails on the remote servers. The email messages are generally stored on the email server and the users generally retrieve these message whether by the web browser or email clients
is a protocol that is used to send the email messages between the servers.
is used to transfer (upload/download) data from one computer to another over the internet or through computer network.
is a most important protocol of the TCP/IP suite and is used to send the short messages known as datagram.
An Internet protocol and distributed database, provides more English like names for IP addresses.
TELNET
Is a protocol that allows for one machine to connect to another computer on the Internet.
links
and
approaches (standard)
Reference Model
OSI
Protocol Suite
Developed
layered model
Seven layers seven has been presented as the optimal number of layer
Delivered
Although
no OSI-based protocol survived, the model is still valid (in the textbooks)
Physical Physical interface between devices Characteristics Mechanical - interface specs Electrical - voltage levels for bits, transmission rate Data Link Basic services: error detection and control, flow control at the link level (point to point) Higher layers may assume error free transmission Later a sub layer is added to Data Link Layer MAC (Medium Access Control) sub layer to deal with broadcast networks
Network
Network nodes (relays/routers) should perform switching and routing functions QoS (Quality of Service) and congestion control are also addressed in this layer Several other internetworking issues
Higher layers do not need to know about underlying networking technology Not needed on direct links
End to end exchange of data In sequence, no losses, no duplicates If needed, upper layer data are split into smaller units
Control of dialogues
whose turn to talk? Dialogue discipline (full-duplex, half-duplex)
Session
Application
RISKS
Availability Integrity Confidentiality
CONTROLS
Ensuring the confidentiality of data through the application of a cryptographic algorithm or a secret key. Assuring the integrity of data through the application of a message authentication code (MAC), checksum is sent with the data. Providing peer authentication to ensure that network traffic and data are sent from the expected host. Providing replay protection to assure that the same data is not delivered multiple times and that the data is delivered in an acceptable order. Providing traffic analysis protection by obscuring the identities of the endpoints and the size of the data. Providing access control by assuring that only authorized users can access particular network resources.
Network
Bandwidth Use When assessing the application's network bandwidth use, the auditor should conduct a network traffic analysis that identifies:
The average amount of data flowing within the network (i.e., overall bandwidth use). The data's packet size distribution. The type of data flow within the network. The data's error rate.
1.
2. 3. 4.
Check for routes that cause bandwidth choking or clogging of network traffic due to the use of only one gateway. Identify all network users and their level of network access. Determine if access control lists configured properly and are enabled. (ACLs) are
Identify whether network administrators are monitoring and tracking changes made to ACLs. Determine whether the company uses a switch port analyser or remote network monitoring specification. Identify if network administrators are tracking and limiting changes to the overall network.
First understand the importance and role of the network device within the organization's network topology. Be aware of best practices for network devices in general.
2.
3.
Identify whether each component and subcomponent of the network are missing, applied incorrectly, or used inappropriately.