Lecture 6 - Introduction To Networking Concepts
Lecture 6 - Introduction To Networking Concepts
Importance of Networking
Networking of computers provides a communication link between the users, and provides access
to information. Networking of computers has several uses, described as follows:
1|P ag e
Introduction to Computer Networks DIT - 080
Transmission technology
Broadly speaking, there are two types of transmission technology that are in widespread use:
1) Broadcast links
2) Point-to-Point links
Point-to-point
Point-to-point links connect individual pairs of machines. To go from the source to the
destination on a network made up of point-to-point links, short messages, called packets in
certain contexts, may have to first visit one or more intermediate machines.
Often multiple routes, of different lengths, are possible, so finding good ones is important in
point-to-point networks. Point-to-point transmission with exactly one sender and exactly one
receiver is sometimes called unicasting.
2|P ag e
Introduction to Computer Networks DIT - 080
Broadcast
On a broadcast network, the communication channel is shared by all the machines on the
network; packets sent by any machine are received by all the others. An address field within each
packet specifies the intended recipient.
Upon receiving a packet, a machine checks the address field. If the packet is intended for the
receiving machine, that machine processes the packet; if the packet is intended for some other
machine, it is just ignored. Example broadcast network is wireless network.
Scale
An alternative criterion for classifying networks is by scale. Distance is important as a
classification metric because different technologies are used at different scales.
In Figure 3a.1 we classify multiple processor systems by their rough physical size. At the top
are the personal area networks, networks that are meant for one person. Beyond these come
longer-range networks. These can be divided into local, metropolitan, and wide area networks,
each with increasing scale. Finally, the connection of two or more networks is called an
internetwork. The worldwide Internet is certainly the best-known (but not the only) example of
an internetwork.
1) Personal Area Networks
2) Local Area Networks
3) Metropolitan Area Networks
4) Wide Area Networks
3|P ag e
Introduction to Computer Networks DIT - 080
Bluetooth can be used in other settings, too. It is often used to connect a headset to a mobile
phone without cords and it can allow your digital music player to connect to your car merely
being brought within range.
A completely different kind of PAN is formed when an embedded medical device such as a
pacemaker, insulin pump, or hearing aid talks to a user-operated remote control.
PANs can also be built with other technologies that communicate over short ranges, such as
RFID on smartcards and library books.
3|
4|P ag e
Introduction to Computer Networks DIT - 080
5|P ag e
Introduction to Computer Networks DIT - 080
NETWORK TOPOLOGIES
A packet is one unit of binary data capable of being routed through a computer network. To
improve communication performance and reliability, each message sent between two network
devices is often subdivided into packets by the underlying hardware and software.
6|P ag e
Introduction to Computer Networks DIT - 080
LAN TOPOLOGIES
Local area network topologies can be described using either a physical or a logical perspective.
A physical topology describes the geometric arrangement of components that make up the LAN.
The topology is not a map of the network. Its a theoretical construct that graphically conveys the
shape and structure of the LAN.
A logical topology describes the possible connections between pairs of networked end-points that
can communicate.
We however discuss here physical topologies.
The LAN physical topologies can be further classified as:
1. Bus topology
A bus topology is a type of network setup where each computer and network device is
connected to a single cable or backbone.
2. Ring topology
7|P ag e
Introduction to Computer Networks DIT - 080
its final destination. Today, the ring topology is seldom used. Below is a visual example of
a simple computer setup on a network using a ring topology.
8|P ag e
Introduction to Computer Networks DIT - 080
3. Star topology
Alternatively referred to as a star network, a star topology is one of the most common
network setups where each of the devices and computers on a network connect to a
central hub. A major disadvantage of this network topology is that if the central hub fails,
all computers connected to that hub would be disconnected
WIRELESS LANS (WLANS)
WLANS are a closely grouped system of devices that communicate through radio waves instead
of wires. They are basically an alternative to a wired LAN. WLANS transmits and receives data
over the air. They minimize the need for wired connections.
Advantages of WLANS
Installation is fast and easy
No cables are needed
9|P ag e
Introduction to Computer Networks DIT - 080
THREATS TO WLANS
One method that is often used by attackers targeting wireless LANS is to setup a rogue
access point that is within the range of the existing wireless LAN. The idea is to fool
some of the legitimate devices into associating to this access point over the legitimate
access points.
It is one of the simplest network attacks to perpetrate because it only requires limiting
access to services. This can be done by simply sending a large amount of traffic at a
specific target. Of course, the amount of traffic required to affect a target device can be
much higher than the capabilities of a single machine.
10 | P a g e
Introduction to Computer Networks DIT - 080
Passive Capturing
Passive capturing is performed by simply getting within range of a target wireless LAN and then
listening and capturing data. This information can be used for a number of things including
attempting to break existing security settings and analyzing non-secured traffic. It is almost
impossible to really prevent this type of attack because of the nature of a wireless network; what
can be done is to implement high security standards using complex parameters.
Fraudulent APs can easily advertise the same network name (SSID) as a legitimate hotspot or
business WLAN, causing nearby Wi-Fi clients to connect to them. Evil Twins are not new, but
easier-to-use hacker tools have increased your risk of running into one. Tools like Karmetasploit
can now listen to nearby clients, discover SSIDs theyre willing to connect to, and automatically
start advertising those SSIDs. Once clients connect, the client traffic is routed through the Evil
Twin, will execute attacks.
Access Point: An access point is a device , that allows wireless devices to connect to a network.
OSI MODEL
Over the past couple of decades many of the networks that were built used different hardware
and software implementations, as a result they were incompatible and it became difficult for
networks using different specifications to communicate with each other.
To address the problem of networks being incompatible and unable to communicate with each
other, the International Organization for Standardization (ISO) researched various network
schemes.
The ISO recognized there was a need to create a NETWORK MODEL that would help
vendors create interoperable network implementations.
11 | P a g e
Introduction to Computer Networks DIT - 080
Advantages of using the layered model include, but are not limited to, the following:
It divides the network communication process into smaller and simpler components, thus
aiding component development, design and troubleshooting.
It allows multiple-vendor development through standardization of network components.
It encourages Industry standardization by defining what functions occur at each layer of the
model.
This layer makes sure packets are delivered reliably and in the right order.
Session Layer
Responsible for starting, ending and maintaining a data conversation.
Presentation layer
This is the layer that the OS resides on. For e.g., when you type anything on your computer, your
computer doesnt understand that, it understands ASCII-
The OS converts the letters and numbers to formats the computer can understand .
Application Layer
This enables the user to access the network. It does this by providing user interfaces and support
for services such as electronic mail e.t.c.
13 | P a g e
Introduction to Computer Networks DIT - 080
14 | P a g e