0% found this document useful (0 votes)
7 views

02-Exploring Network Fundamentals I

Uploaded by

Zeeshan Ahmad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

02-Exploring Network Fundamentals I

Uploaded by

Zeeshan Ahmad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

EXPLORING NETWORK FUNDAMENTALS - I

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Trainer Guidelines for Conducting Class

• Solve questions live by creating virtual/online labs (Practical demonstrations, if any labs used for solving or
penetration purposes) during the session, rather than sharing completed solutions.

• Review teaching materials and solutions beforehand, and prepare additional examples to reinforce
learning.

• Ensure online students can hear you and see the screen clearly at all times.

• Test your computer and necessary software before class begins.

• Check with online students every 15-20 minutes to see if they understand the material and have any
questions.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
INDEX
• How the Internet Operates
• Understanding Internet Protocol & its Types
• OSI Model vs TCP / IP Model
• Internet Protocol Standards
• TCP vs UDP
• IP Header Structures
• Exploring the Modern Internet – Deep & Dark Web

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What is Internet?

• The Internet is the backbone of the Web, the


technical infrastructure that makes the Web possible
• Computers connect to each other and to the Internet
via wires, cables, radio waves, and other types of
How The Internet networking infrastructure.
Operates • All data sent over the Internet is translated into
pulses of light or electricity, also called "bits," and
then interpreted by the receiving computer.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Working of the Internet
• Generally, two main components uphold the functionality of the Internet, they are:
• Packets
• Protocols
• In networking, the data which is being transmitted through the internet is sent via small
segments/chunks which are later translated into bits, and the packets get routed to their
endpoint (destination) through different networking devices.
• Later, once the packet arrives at the receiver’s end, that small chunks of data get
reassembled in order to utilize or check the data that was requested

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What is Internet Protocol?
• The Internet Protocol (IP) is a protocol, or set of rules,
for routing and addressing packets of data so that
they can travel across networks and arrive at the
correct destination.
Understanding the • Data traversing the Internet is divided into smaller
Internet Protocol pieces, called packets.
• IP information is attached to each packet, and this
information helps routers to send packets to the right
place.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Types of Internet Protocols
• TCP/IP(Transmission Control Protocol/ Internet Protocol)
• These are a set of standard rules that allows different types of computers to communicate with each other.
The IP protocol ensures that each computer that is connected to the Internet is having a specific serial
number called the IP address.

• SMTP(Simple Mail Transfer Protocol)


• These protocols are important for sending and distributing outgoing emails. This protocol uses the header
of the mail to get the email id of the receiver and enters the mail into the queue of outgoing mail

• FTP (File Transfer Protocol)


• This protocol is used for transferring files from one system to the other. This works on a client-server
model.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Types of Internet Protocols
• HTTP (Hyper Text Transfer Protocol)
• This protocol is used to transfer hypertexts over the internet and it is defined by the www(world wide web)
for information transfer. This protocol defines how the information needs to be formatted and transmitted.
Whenever a user opens their web browser, the user will indirectly use HTTP as this is the protocol that is
being used to share text, images, and other multimedia files on the World Wide Web.

• HTTPS (Hyper Text Transfer Protocol Secure)


• HTTPS is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a
computer network with the SSL/TLS protocol for encryption and authentication.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Types of Internet Protocols
• Stream Control Transmission Protocol (SCTP)
• It is a connection-oriented network protocol for transmitting multiple streams of data simultaneously
between two endpoints that have established a connection in a computer network.
• It ensures reliable and in-sequence data transmission so that data units sent over the network arrive
completely, and in the right sequence, to the application or user at the endpoint. For some transmissions,
such as a file or record, this sequence preservation is essential.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding OSI & TCP/IP Models

• The OSI Model (Open Systems Interconnection


Model) is a conceptual framework used to describe
the functions of a networking system.
• The TCP/IP model sets out how packets exchange
OSI Model vs information through the web. This set of
TCP / IP Model communication protocols determines how data is to
be broken, addressed, transferred, routed and
received for sharing.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Difference between OSI & TCP/IP Model
• Data communication is a process or act in which
we can send or receive data. For data
communication two models are available.

• OSI Model
• OSI stands for Open Systems Interconnection.
• It has 7 layers as shown
• Each layer performs its task independently.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Difference between OSI & TCP/IP Model
• TCP/IP Model
• TCP/IP stands for Transmission Control Protocol/Internet
Protocol.
• It has 4 layers as shown
• It also can be used as a communications protocol in a private
computer network

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What are the IP Standards?

• The three key standards used by the World Wide Web


are Hypertext Transfer Protocol, HTML, and URL.
• Respectively, they specify the transfer of data
between a browser and a web server, the content
Internet Protocol and layout of a web page, and what web page
Standards identifiers mean.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding HTTP, HTML & URL
• HTTP
• The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, and is used to load
webpages using hypertext links.
• HTTP is an application layer protocol designed to transfer information between networked devices and runs
on top of other layers of the network protocol stack.
• A typical flow over HTTP involves a client machine making a request to a server, which then sends a
response message.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding HTTP, HTML & URL
• HTML
• HTML, or Hypertext Markup Language, is a markup language for the web that defines the structure of web
pages.
• Hypertext: text (often with embeds such as images, too) that is organized in order to connect related items
• Markup: a style guide for typesetting anything to be printed in hardcopy or soft copy format
• Language: a language that a computer system understands and uses to interpret commands.
• HTML determines the structure of web pages.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding HTTP, HTML & URL
• URL
• URL stands for Uniform Resource Locator.
• A URL is nothing more than the address of a given unique resource on the Web. In theory, each valid URL
points to a unique resource.
• Such resources can be an HTML page, a CSS document, an image, etc.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding TCP & UDP

• Transmission Control Protocol (TCP) is a


communications standard that enables application
programs and computing devices to exchange
messages over a network.
TCP vs UDP • The User Datagram Protocol (UDP) is a
communication protocol used across the Internet for
especially time-sensitive transmissions such as video
playback or DNS lookups.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Difference Between TCP & UDP

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What are IP Header Structures

• IP Header is meta information at the beginning of an


IP packet.
• It displays information such as the IP version, the
packet’s length, the source, and the destination.
IP Header
• It provides essential data need to transmit the data
Structures

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
IP Header Structures
• An IP packet envelopes the data unit received from the network layer and adds it to its
header. All the information the header contains helps the datagram to reach its destination.
• The IPv4 packet header contains a fixed mandatory part, which is made of 13 fields.
• Data transmission in the computing network is a crucial element that enables the exchange
of information. IPv4 is the most widely used version of the Internet Protocol on the internet,
and it is responsible for the rules of data transmission between the computing machines.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
IP Header Structures
• Each IPv4 address includes an IPv4 header, which has a central role in IP addressing.
• A detailed description of the IP header fields above reveals how the header is constructed
and what lies underneath every tiny bit (and byte) so that digital messages can reach the
destination host quickly and efficiently.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Introduction to Dark & Deep Web

• The dark web is only a small fraction (0.01%) of the


deep web, which contains Internet content that is not
searchable by your standard search engines.
Exploring the • In other words, if Google can't find what you're
Modern Internet : looking for, it's probably still out there in the World
Wide Web; it's just in the harder-to-access deep web.
Dark & Deep Web

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding the Dark Web
• The dark web is the World Wide Web content that exists on darknets: overlay networks that
use the Internet but require specific software, configurations, or authorization to access.
• Through the dark web, private computer networks can communicate and conduct business
anonymously without divulging identifying information, such as a user's location.
• The dark web forms a small part of the deep web, the part of the web not indexed by web
search engines.
• Dark web sites are accessible only through networks such as Tor ("The Onion Routing"
project) that are created specifically for the dark web. Tor browser and Tor-accessible sites
are widely used among the darknet users and can be identified by the domain ".onion".

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding the Deep Web
• The deep web refers to parts of the internet not fully accessible through standard search
engines like Google, Yahoo, and Bing.
• The deep web includes pages that were not indexed, fee-for-service sites, private databases,
and the dark web.
• The deep web gives users access to far more information than would otherwise be available
on the internet, and it also increases privacy.
• Perhaps the most serious criticism of the deep web is that it undermines the openness and
equality of the internet.
• The dark web creates another set of issues for the deep web. Those with advantages in
knowledge rather than money can use it to commit crimes. In some cases, people hiding
behind the dark web attack legitimate users on the surface web, reducing the quality of the
Internet for everyone.

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Questions ?

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
THANK YOU !!!

CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.

You might also like