02-Exploring Network Fundamentals I
02-Exploring Network Fundamentals I
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Trainer Guidelines for Conducting Class
• Solve questions live by creating virtual/online labs (Practical demonstrations, if any labs used for solving or
penetration purposes) during the session, rather than sharing completed solutions.
• Review teaching materials and solutions beforehand, and prepare additional examples to reinforce
learning.
• Ensure online students can hear you and see the screen clearly at all times.
• Check with online students every 15-20 minutes to see if they understand the material and have any
questions.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
INDEX
• How the Internet Operates
• Understanding Internet Protocol & its Types
• OSI Model vs TCP / IP Model
• Internet Protocol Standards
• TCP vs UDP
• IP Header Structures
• Exploring the Modern Internet – Deep & Dark Web
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What is Internet?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Working of the Internet
• Generally, two main components uphold the functionality of the Internet, they are:
• Packets
• Protocols
• In networking, the data which is being transmitted through the internet is sent via small
segments/chunks which are later translated into bits, and the packets get routed to their
endpoint (destination) through different networking devices.
• Later, once the packet arrives at the receiver’s end, that small chunks of data get
reassembled in order to utilize or check the data that was requested
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What is Internet Protocol?
• The Internet Protocol (IP) is a protocol, or set of rules,
for routing and addressing packets of data so that
they can travel across networks and arrive at the
correct destination.
Understanding the • Data traversing the Internet is divided into smaller
Internet Protocol pieces, called packets.
• IP information is attached to each packet, and this
information helps routers to send packets to the right
place.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Types of Internet Protocols
• TCP/IP(Transmission Control Protocol/ Internet Protocol)
• These are a set of standard rules that allows different types of computers to communicate with each other.
The IP protocol ensures that each computer that is connected to the Internet is having a specific serial
number called the IP address.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Types of Internet Protocols
• HTTP (Hyper Text Transfer Protocol)
• This protocol is used to transfer hypertexts over the internet and it is defined by the www(world wide web)
for information transfer. This protocol defines how the information needs to be formatted and transmitted.
Whenever a user opens their web browser, the user will indirectly use HTTP as this is the protocol that is
being used to share text, images, and other multimedia files on the World Wide Web.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Types of Internet Protocols
• Stream Control Transmission Protocol (SCTP)
• It is a connection-oriented network protocol for transmitting multiple streams of data simultaneously
between two endpoints that have established a connection in a computer network.
• It ensures reliable and in-sequence data transmission so that data units sent over the network arrive
completely, and in the right sequence, to the application or user at the endpoint. For some transmissions,
such as a file or record, this sequence preservation is essential.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding OSI & TCP/IP Models
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Difference between OSI & TCP/IP Model
• Data communication is a process or act in which
we can send or receive data. For data
communication two models are available.
• OSI Model
• OSI stands for Open Systems Interconnection.
• It has 7 layers as shown
• Each layer performs its task independently.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Difference between OSI & TCP/IP Model
• TCP/IP Model
• TCP/IP stands for Transmission Control Protocol/Internet
Protocol.
• It has 4 layers as shown
• It also can be used as a communications protocol in a private
computer network
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What are the IP Standards?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding HTTP, HTML & URL
• HTTP
• The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, and is used to load
webpages using hypertext links.
• HTTP is an application layer protocol designed to transfer information between networked devices and runs
on top of other layers of the network protocol stack.
• A typical flow over HTTP involves a client machine making a request to a server, which then sends a
response message.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding HTTP, HTML & URL
• HTML
• HTML, or Hypertext Markup Language, is a markup language for the web that defines the structure of web
pages.
• Hypertext: text (often with embeds such as images, too) that is organized in order to connect related items
• Markup: a style guide for typesetting anything to be printed in hardcopy or soft copy format
• Language: a language that a computer system understands and uses to interpret commands.
• HTML determines the structure of web pages.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding HTTP, HTML & URL
• URL
• URL stands for Uniform Resource Locator.
• A URL is nothing more than the address of a given unique resource on the Web. In theory, each valid URL
points to a unique resource.
• Such resources can be an HTML page, a CSS document, an image, etc.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding TCP & UDP
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Difference Between TCP & UDP
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What are IP Header Structures
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
IP Header Structures
• An IP packet envelopes the data unit received from the network layer and adds it to its
header. All the information the header contains helps the datagram to reach its destination.
• The IPv4 packet header contains a fixed mandatory part, which is made of 13 fields.
• Data transmission in the computing network is a crucial element that enables the exchange
of information. IPv4 is the most widely used version of the Internet Protocol on the internet,
and it is responsible for the rules of data transmission between the computing machines.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
IP Header Structures
• Each IPv4 address includes an IPv4 header, which has a central role in IP addressing.
• A detailed description of the IP header fields above reveals how the header is constructed
and what lies underneath every tiny bit (and byte) so that digital messages can reach the
destination host quickly and efficiently.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Introduction to Dark & Deep Web
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding the Dark Web
• The dark web is the World Wide Web content that exists on darknets: overlay networks that
use the Internet but require specific software, configurations, or authorization to access.
• Through the dark web, private computer networks can communicate and conduct business
anonymously without divulging identifying information, such as a user's location.
• The dark web forms a small part of the deep web, the part of the web not indexed by web
search engines.
• Dark web sites are accessible only through networks such as Tor ("The Onion Routing"
project) that are created specifically for the dark web. Tor browser and Tor-accessible sites
are widely used among the darknet users and can be identified by the domain ".onion".
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Understanding the Deep Web
• The deep web refers to parts of the internet not fully accessible through standard search
engines like Google, Yahoo, and Bing.
• The deep web includes pages that were not indexed, fee-for-service sites, private databases,
and the dark web.
• The deep web gives users access to far more information than would otherwise be available
on the internet, and it also increases privacy.
• Perhaps the most serious criticism of the deep web is that it undermines the openness and
equality of the internet.
• The dark web creates another set of issues for the deep web. Those with advantages in
knowledge rather than money can use it to commit crimes. In some cases, people hiding
behind the dark web attack legitimate users on the surface web, reducing the quality of the
Internet for everyone.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Questions ?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
THANK YOU !!!
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.