Networks+Safety Chapter

Download as pdf or txt
Download as pdf or txt
You are on page 1of 57

 Computer networks first saw the light of

day in the late 1960s. It was with the


ARPANET project that the first network
was launched in the USA by DARPA.

 Today, computer networks have


become a necessity. This course covers
the basics of computer networking.
 A computer network is a set of computer
systems connected together to provide a
data communication service.

 Computer networks are the result of


bringing together two fields: information
technology and telecommunication. In
fact, telecommunication covers all
techniques (wired, radio, optical, etc.) for
transferring information, whatever its nature
(symbols, writing, still or moving images,
sound, etc.).
 Despite the deep similarities between
computer networks and distributed systems,
it's important to note the difference
between these two concepts. A distributed
system is a set of independent computer
systems presented to the user as a single
coherent system.
 A computer network is made up of a set of
nodes linked by physical paths. A node is a
machine or any entity that can be
addressed by a unique number.
 There are two types of node:
 1. Terminals (Hosts): are interconnected
computer systems capable of exchanging
data, on which user applications run. In
client/server architecture, these terminals
can be either clients or servers.
 2. Intermediate nodes: This is the set of
equipment that ensures communication
within the network. These are sometimes
called switches or routers.
 The individual nodes are connected to
the communication channels by special
equipment called MAUs (Medium
Access Units).
 The set of intermediate nodes and the
communication channels form a
communication subnetwork.
 The components of a computer network:

Terminal (client)

Intermediate nodes

Terminal (server)

Communication
sub-network
 Telecomputing is the combination of
information processing, which is the
domain of the computer, and information
transport, which is the domain of
telecommunications. A system made up
of computer equipment linked together
by communication channels is called a
telecomputing system.
 The term network refers to the
organization of connections, called
communication channels, between the
various nodes of a telecomputing
system.
 There are 2 main categories of nodes:
› -Computers in the broadest sense.
› -equipment performing specific functions in
the network.
node client

Transmission
channels

server

client

client
 Network topology, i.e. the location of
nodes and the arrangement of links
between them, can be highly varied.

 The physical connection of a machine to


a local network requires an electronic
card, also known as a coupler (NIC:
Network Interface Card) or network
card.
 At network level, two architectures can be
distinguished:

 Client-server architecture: one machine in the


network (the server) plays a specific role in
managing communication. It is possible to have
several servers on the same network.

 Serverless architecture: all network stations have


the same role. They can all communicate directly
with each other. This can only be envisaged for
small networks: beyond a dozen stations,
communication in all directions, without a central
point, becomes difficult to manage.
 The main hardware devices used in local networks
are :
 Repeaters: to regenerate a signal.
 Hubs: To connect several hosts together.
 Bridges: To link local networks of the same type.
 Switches: Allows various elements to be connected,
while segmenting the network.
 Gateways: Linking different types of local networks.
 Routers: Connecting multiple LANs in such a way as
to enable the optimal flow of data from one network
to another.
 B-router: combining the functions of a router and a
gateway.
 Computer networks were created to
enable remote terminals to
communicate with a central computer.
 In fact, the evolution of needs has gone
beyond the desire to connect the
equipment of large laboratories and
firms to the desire to connect all our
simple devices via computer networks
(notably the Internet).
 A computer network offers a number of
advantages, such as:
 Resource sharing (hardware: printer..., or
software: file...).
 Data transfer (files, speech, video, etc.).
 Interaction with connected users: e-mail,
electronic conferencing, etc.
 Reliability (by duplicating resources).
 Price-quality ratio (economic challenge):
achieve computing or processing power
comparable to a multiprocessor at reduced
cost.
 There are several units for measuring data
rates, i.e. the quantity of digital data
transmitted per second.
 They are expressed in bits per second (bit/s or
bps), kilobits per second (Kbit/s), megabits per
second (Mbit/s or Mb/s), gigabits per second
(Gb/s) or even terabits per second (Tb/s) on
specialized or experimental networks.
 Speeds of 100 Mb/s or 1 Gb/s are
commonplace on local networks.
 Please note: 1 Kbyte =1024 x 8 bits = 8192 bits,
i.e. approximately 8 Kbit.
 Several criteria can be used to classify
networks, such as size, topology or
transmission technique.
 Computer networks can be divided into
four classes according to their scope.
These are :
 -PAN (Personal Area Network): this is a
computer network centered on the user.
It refers to the interconnection of several
meters around the user. Wireless links are
often used in this type of network.
 -LAN (Local Area Network): can extend
from a few meters to a few kilometers, and
corresponds to a company's network. It can
extend over several buildings and can
satisfy all the company's internal needs.
LANs are distinguished from other network
classes by their size, transmission
technology, transmission speed and
topology. With speeds of a few Mb/s on a
shared medium.
 -MAN (Metropolitan Area Network):
interconnects several locations in the
same city, e.g. the various sites of a
university or administration, each with its
own local network. Their topology is
similar to that of LANs, but with different
standards. Data rates range from a few
hundred Kbits/s to a few Mbits/s.
 -WAN (Wide Area Network): enables
communication on a national or global
scale, with physical infrastructures on
land or in space, using
telecommunications satellites.
 Classification of computer networks
according to their scope

PAN MAN WAN


personnal LAN metropolit extended
network local network -an network
cluster network
 A topology refers to the way in which
network equipment is organized. Two
types of topology can be distinguished:
logical topology and physical topology.
 Logical topology is concerned with the
flow of information between different
network elements. Aspects of media
sharing and access methods are
essential elements in this type of
topology.
 Physical topology, on the other hand, is
concerned with the spatial arrangement of
equipment. This topology is chosen according
to the company's environment, architecture
and technical throughput requirements.
 It also has a major impact on the evolution of
the network, its administration and the skills of
the personnel who will be required to use it.
 There are several possible topologies.
Moreover, different topologies can be
combined to form a hybrid topology.
 The main topologies are :
 -Bus topology: in this type of network, the
various stations are linked via the same cable,
using specialized connectors. Because the
cable has been shared by all stations, only one
can transmit data at any given time. Bus
networks are simple, inexpensive and easy to
set up and maintain. If a machine fails on a bus
network, then the network still works, but if the
cable is faulty, then the whole network no
longer works. Increasing the number of stations
connected to the network degrades its
performance.
 Star topology: in this type, several cables
are centered around a central node. Star
networks are easy to administer because
resources are managed centrally.
Moreover, star networks always work, even
if a station fails or a link is cut, as long as the
central node is functional. If the central
node fails, the entire network goes out of
service. In economic terms, star networks
are costly, especially for WAN networks.
 Ring topology: This is a closed bus
topology. The network's direction of
transmission is determined - thus avoiding
conflicts. In general, the ring is located
inside a box called a MAU (Multistation
Access Unit). All stations are connected
to the MAU. The access time is
determined (a machine knows when it
can send information).
 Mesh topology: this network is made up
of a set of stations linked by paths.
Depending on the number of links
established, a distinction is made
between fully meshed and irregularly
meshed networks.
 Different network topologies
Star topology Regular Mesh

Bus topology

Ring topology
Tree mesh
 Networks operate in two possible modes:
 - Infrastructure mode refers to a network based
on one or more access points. Stations link up
with access points to exchange data. Up to
100 stations can be associated with an access
point. Access points are interconnected.
 The size of the network depends on the access
point's coverage area.The transmission medium
and the (theoretical) data rate of 11 Mbit/s (or
54 Mbit/s) are shared by all stations. In
practice, data rate degrades automatically
according to distance and environment.
Coverage
Access point
area

Network size
 • In ad-hoc mode, there is no access
point, and the stations themselves enter
into communication.
 The advantage of this topology is its ease
of implementation, since all that's
needed are stations equipped with Wi-Fi
cards.
 We distinguish two classes of networks according to
the criterion of transmission technique:
 Broadcast mode: One transmitter Several
receivers
 The first operating mode involves sharing a single
transmission medium. Each message sent by one
piece of equipment on the network is received by all
the others. It is the specific destination address in the
message that enables each device to determine
whether the message is addressed to it or not. If the
message is intended for all machines, this is known as
broadcasting. Some systems also allow a packet to
be transmitted to a subset of machines: this is called
multicasting.
 At any given time, only one piece of equipment has
the right to send a message on the medium. It must
therefore first "listen" to see if the channel is free; if
not, it waits according to a protocol specific to each
architecture. Generally speaking, this mode is
adopted for small networks.
 Point-to-point mode: One transmitter One receiver
 In this mode, the physical medium (cable) connects
only one pair of devices. When two elements not
directly connected to each other want to
communicate, they do so via the other nodes in the
network. It is possible to find several routes of different
lengths to reach the same destination. Choosing the
best path is essential. This mode is generally used in
extended networks.
 Any computer connected to a
computer network is potentially
vulnerable to attack, so a secure
network is needed to transfer data both
between the company's own machines
and with external machines.

 IT security is concerned with protecting


against IT-related risks, and to this end
there are several defense mechanisms.
 An Internet connection enables a
network to connect to several hundred
thousand other networks.
 ⇒ considerable advantages each of
these hundreds of thousands of other
networks can connect to this network.
 ⇒ how many of them are people with
evil and potentially dangerous
intentions?
 There's no such thing as a 100% secure
computer system, unless it's completely
isolated!
 A computer system accessible by
several users or connected to a network
(whether local or wide-area) becomes
at risk.
 To understand and manage IT security,
you need to be aware of the different
entities involved in it.
 Today, the information system is a central
element in the functioning of an organization. It
can be defined as a set of resources
(personnel, software, processes, data,
hardware, IT and telecommunications
equipment, etc.) enabling information to be
collected, stored, structured, modeled,
managed, manipulated, analyzed,
transported, exchanged and disseminated.

 IT resources include data files, databases,


customer management tools, collaborative
working tools, application servers and network
infrastructures.
 Threat: Potential source of danger that may
cause damage to the system or
unauthorized access to data.
 Vulnerability: A security flaw that makes a
system vulnerable. A system without
vulnerabilities is a reliable system. There is no
such thing as a 100% reliable system.
 Attack: The act of exploiting vulnerabilities
to gain illicit access to data or prevent the
system from functioning properly.
 Protect against unauthorized use:
› Machines (computers, servers, tablets,
smartphones, ....)
› Stored information
› Network equipment (routers, hubs, etc.)
› Data exchanges on the network

 To ensure the proper operation of the


system, the objectives are to
› prevent unauthorized disclosure of data
› prevent unauthorized modification of data
› prevent unauthorized use of resources
 Different categories of security problems, each
with its own context and solutions. Securing an
IT environment means considering each of
these cases.
 Categories of security problems
 Human error: accidental destruction of
important files
 ⇒ Users education
 Software problem: An operating system or
software that crashes and corrupts important
data
 ⇒ Software updates
 Hardware problem: disk crash, fire, flood
 ⇒ Equipment maintenance, equipment
redundancy, dispersal over several sites

 Piracy: The theft, misappropriation or


destruction of data by malicious persons.
 ⇒ System and network security
 A security mechanism is a set of
strategies designed to detect, prevent
and combat a security attack.

 As systems and networks evolve, so do


the range of security mechanisms used
to protect them and the services they
provide. In the following, we will discuss
the main mechanisms used:
 Antivirus
 software designed to protect the
computer against harmful software (or
potentially executable files).
 It looks for malicious code in infected
software.
 Does not protect against an intruder
using legitimate software, or a legitimate
user accessing a resource when not
authorized to do so.
 Firewall
 A firewall is a program or piece of hardware
designed to protect you from the outside world
by controlling everything that passes between
the Internet and the local network, and
especially everything that must not pass.
 A firewall is a device designed to examine and
possibly block data exchanges between
networks. It is therefore a security element in a
network, controlling communications that pass
through it.
 Its function is to enforce the network's security
policy, which defines which communications
are authorized and which are prohibited.
internal External
network network

Firewall
 1) A domain to protect: an 'internal' network.
 ■ A corporate/personal network to be protected
 ■ Against an 'external' network from which intruders
are likely to carry out attacks.
 2) A firewall
 ■ Installed at a obligatory point of passage between
the network to be protected (internal) and an
insecure network (external).
 ■ This is a set of different hardware and software
components that control internal/external traffic
according to a security policy.
 ■ A firewall is often a single piece of software, but it
can also be a complex system comprising several
filters, several gateways and several subnetworks ....
 In practical terms, it's a gateway that filters
incoming and outgoing packets based on
one interface for the network to be
protected, and another for the external
network (often the Internet).
 However, the firewall doesn't protect the
network against an attack from the internal
network (i.e. the one that doesn't cross it),
and it doesn't prevent an attacker from
using an authorized connection to attack
the system.
 Control: Manage outgoing connections
from the local network.

 Security: Protect the internal network


from external intrusions.

 Vigilance: Monitor/trace traffic between


LAN and Internet.
 Avoid connecting to suspicious sites

 Avoid downloading software whose


safety cannot be guaranteed

 Change your password regularly


 Pay attention to length
 Choose wisely
 Not in the dictionary
 Password different from login
 Use exotic characters +;()
 Anti-virus software with automatic
updates
 Regular data backups
 System cloning
 Use of personal USB keys
 Don't blindly trust the sender's name
 Beware of attachments
 Never respond to a request for confidential
information
 Hover your mouse over links, pay attention to
accented characters in the text and to the
quality of the French in the text or the
language spoken by your interlocutor.
 Set up your e-mail software correctly
 never accept messages in HTML or XML format
 prohibit the automatic execution of ActiveX
and plug-ins
 Unsolicited e-mail, usually advertising.
They clog up the network, and waste the
recipient's time. Most are sent
automatically to a list of recipients. Some
try to exploit the recipient's credulity.

You might also like