Networking
Networking
PROJECT ON
NETWORKING
Networking Page 1
DECLARATION
Networking Page 2
INDEX
1. Introduction to Networking
2. Type of Networking
3. Network Topology
Networking Page 3
Abstract
Computer networks are a system of interconnected computers for
the purpose of sharing digital information. The concept of a
network began in 1962 when a server at the Massachusetts
Institute of Technology was connected to a server in Santa
Monica, California. Since that time the proliferation of computers
and computer networks has increased significantly. One of the
most significant challenges to networks is attacks on their
resources caused by inadequate network security. The purpose of
this research project was to evaluate open source, free, intrusion
detection systems and how easily they can integrate into an
existing network. Research was conducted for this study through
a review of existing literature pertaining to intrusion detection
systems and how they function. The literature also highlighted
previous studies conducted on intrusion detection systems, both
commercial and open source. In addition to the review of existing
Networking Page 4
literature, the author conducted independent testing on three
open source intrusion detection systems. The open source
programs, Snort, OSSEC, and Prelude, were selected due to being
highly rated in professional publications. The author created a
secure simulated computer network, to ensure that each of the
programs was tested in a controlled and equitable manner. The
findings of this study determined that the three open source
intrusion detection systems tested are as capable as commercial
programs in securing a computer network.
Networking Page 5
Introduction to Networking
Networking Page 6
dependent on the mainframe for hard disk and processor. Initially,
computers from different manufacturers were unable to communicate
with each other. In the US, the ARPANET developed by DARPA of the
United States Departments of defense, was the world’s first operational
packet switching network, and predecessor of the global internet
TYPE OF NETWORK
Networking Page 7
Local Area Networking (LAN)
Network Topology
Networking Page 8
Topology means Physical and logical network layout. The physical
topology means actual layout of the computer cables and other
network devices. The logical topology means way in which the network
appears to the devices that use it. Common topologies are BUS, RING,
MESH, and STAR
Bus topology
Ring Topology
• Ring meaning that data travels in circular fashion from one computer
to another on the network. Typically FDDI, SONET or Token Ring
Networking Page 9
technology are used to implement a ring network. Ring networks are
most commonly wired in a star configuration.
Star Topology
Networking Page 10
Mesh Topology
Networking Page 11
Network connecting device
Hub
A hub works in the physical layer of the OSI model. It is basically a non-
intelligent device, and has no decision making capability. What a Hub
basically does is take the input data from one of the ports and
broadcast the information to all the other ports connected to the
network.
Repeater
A repeater is a device similar to the Hub, but has additional features. It
also works in the Physical layer. The repeaters are used in places where
amplification of input signal is necessary. But, the kind of amplification
done by the repeater is different from the regular amplification by
Networking Page 12
amplifiers. The regular amplifies everything fed into it. That means, if
the input signal has noise induced into it, both the desired signal and
noise signal are together amplified. But, in the case of a repeater, it
regenerates the input signal, and amplifies only the desirable signal.
Hence, the noise component of the signal is eliminated.
Switch
A switch is an intelligent device that works in the data link layer. The
term intelligent refers to the decision making capacity of the Switch.
Since it works in the Data link layer, it has knowledge of the MAC
addresses of the ports in the network.
Bridge
A bridge is also a device which works in the Data Link Layer, but is more
primitive when compared to a switch. Initial bridges were used to
Networking Page 13
connect only 2 LAN’s, but the most recent ones perform similar
operation as the switches. It also works on the principle of transfer of
information using the MAC addresses of the ports.
Router
Any Internet Service Provider (ISP) provides a single IP, and especially
for personal use, the IP address is assigned dynamically. This is done
because, suppose, an ISP has 1000 IP addresses, it does not mean that
it has 1000 customers. An ISP assumes that not all devices will be
Networking Page 14
connected to the internet at the same time. Hence, when a user wants
to access the internet, any IP address from the pool of IP addresses
from the ISP will be assigned to connect the user to the internet.
Gateway
The Gateway devices work in the Transport layer and above, where the
different network technologies are implemented. A gateway is
necessary when there are different technologies implemented by the
different LAN’s which are to be connected together.
Connecting cables
Networking Page 15
1. RJ45/ RJ 11 Connectors: The RJ45 (Registered Jack 45) cable or the Cat 5
cable, is used to connect the two different LAN’s together. This is
normally confused with the RJ11 cable, which is used in the
interconnections in the telephone network.
2. Crossover cables: Crossover cables are generally used when 2 different
computers are to be connected together. They get the name because,
in these cables, a crossover is made between the Transmitter and
Receiver ports, i.e., Transmitter of one end of the cable is connected to
the Receiver port at the other end and vice versa.
3. Null Modem Cables: The null modem cables are also those which are
used in connecting 2 different computers to form a network. They also
have a crossover, but generally, the term null modem cables are used
for RS232 standard cables.
4. Optical Fibres: The optical fibres are used when gigabit Ethernet is
used, and very high rates of data transmission is necessary.
Mainly ether net cables divided in Ethernet (10 mbps), Fast Ethernet,
Gigabit Ethernet
Fast Ethernet
Networking Page 17
and are commonly referred to as 10/100 switches. These switches will
autonegotiate both port speed and duplex.
Gigabit Ethernet
Twisted-Pair Cabling
Networking Page 19
roll-over cable is used to connect a PC into a Cisco router’s console or
auxiliary port.
Networking Page 20
OSI Reference Model
The OSI model was the first true network model, and consisted of
seven layers. However, the OSI model has become deprecated over
Networking Page 21
time, replaced with more practical models like the TCP/IP (or DoD)
reference model.
Networking Page 22
The Application layer (Layer 7) provides the actual interface between
the user application and the network. The user directly interacts with
this layer Examples of application layer protocols include:
• FTP (via an FTP client)
• HTTP (via a web-browser)
• SMTP (via an email client)
• Telnet
Networking Page 23
The Session layer (Layer 5) establishes, maintains, and ultimately
terminates connections between devices. Sessions can be full-duplex
(send and receive simultaneously), or half-duplex (send or receive, but
not simultaneously).
The Network layer (Layer 3) has two key responsibilities. First, this
layer controls the logical addressing of devices. Logical addresses are
organized as a hierarchy, and are not hard-coded on devices. Second,
the network layer determines the best path to a particular destination
network, and routes the data appropriately
Networking Page 25
Instead of a transport layer protocol (such as UDP). The MAC sub-layer
controls access to the physical medium, serving as mediator if multiple
devices are competing for the same physical link. Specific technologies
have various methods of accomplishing this (for example: Ethernet
uses CSMA/CD, Token Ring utilizes a token).
The Physical layer (Layer 1) controls the transferring of bits onto the
Physical wire. Devices such as network cards, hubs, and cabling are all
considered physical layer equipment.
The following illustrates the OSI model in more practical terms, using a
webbrowser as an example:
Networking Page 26
• The format of the data being accessed is a Presentation layer
function. Common data formats on the Internet include HTML, XML,
PHP, GIF, JPG, etc. Additionally, any encryption or compression
mechanisms used on a webpage are a function of this layer.
•The Session layer establishes the connection between the requesting
computer and the web server. It determines whether the
communication is half-duplex or full-duplex.
• The TCP protocol ensures the reliable delivery of data from the web
server to the client. These are functions of the Transport layer.
• The logical (in this case, IP) addresses configured on the client and
web server are a Network Layer function. Additionally, the routers that
determine the best path from the client to the web server operate at
this layer.
• The actual cabling, network cards, hubs, and other devices that
provide the physical connection between the client and the web server
Networking Page 27
operate at the Physical layer.
The Transport layer of the OSI model (or, the Host-to-Host layer of the
DoD model) is concerned with the reliable transfer of data between
devices. It ensures (or in some cases, does not ensure) that a packet
arrives at its destination without corruption or data loss.
However, protocols at the transport layer do not actually send or route
packets. Network layer protocols, such as IP, route packets from one
network to another. In the TCP/IP protocol suite, TCP and UDP are
transport layer protocols.
Networking Page 28
User Datagram Protocol (UDP
TCP/UDP Ports
TCP and UDP ports identify services that run on a specific logical
address. Otherwise, there would be no way to distinguish data destined
for one service or another on a device. For example, port numbers
allow both a web and email server to operate simultaneously on the
same address.
An IP address combined with a TCP or UDP port forms a socket. A
socket is written out as follows: 10.50.1.1:80 Specific ports (1-1024)
have been reserved for specific services, and are recognized as well-
known ports. Below is a table of several common TCP/UDP ports:
Networking Page 29
25 TCP SMTP
53 UDP DNS
80 TCP HTTP
110 TCP POP3
443 TCP HTTPS
Networking Page 30
IPv4 Addressing
158.80.164.3
Part of the above IP address identifies the network. The other part of
the address identifies the host
Networking Page 31
IP Address Classes
The IPv4 address space has been structured into several classes. The
value of the first octet of an address determines the class of the
network:
Address: 64.32.254.100
Class B networks range from 128 to 191. The default subnet mask is
255.255.0.0; thus, by default, the first two octets define the network,
and the last two octets define the host. This results in a maximum of
16,384 Class B networks, with 65,534 hosts per network.
Networking Page 32
Example of a Class B address:
Address: 152.4.12.195
Class C networks range from 192 to 223. The default subnet mask is
255.255.255.0; thus, by default, the first three octets define the
network, and the last octet defines the host. This results in a maximum
of 2,097,152 Class C networks, with 254 hosts per network.
Address: 207.79.233.6
Networking Page 33
A private address is only intended for use within an organization, and
can never be routed on the internet. Three private addressing ranges
were allocated, one for each IPv4 class:
• Class A - 10.x.x.x
• Class B - 172.16-31.x.x
• Class C - 192.168.x.x
Two other ranges, while not considered “private,” have been reserved
for specific use:
Networking Page 34
• 169.254.x.x - reserved for Automatic Private IP Addressing
Type ncpa.cpl in the box, and then press OK. Select the local
area connection, right click it and select Properties. Select
Internet Protocol Version 4(TCP/IPv4), double click it or click
Properties. There are two ways to configure the
TCP/IP Properties, Assigned by DHCP server automatically or
manually.
Networking Page 35
Assigned by DHCP server
Networking Page 36
Static IP address assign
Networking Page 37
Networking Page 38
Objectives
Networking Page 39
Conclusion
Networking Page 40
Bibliography
1, MSC IT Book
2, Online help
3, Aaron Balchunas
THANK YOU FOR YOUR VALUABLE TIME SPENT TO VIEW THIS PROJECT.
Networking Page 41