Copy of Topic 5 Networks Revision Notes
Copy of Topic 5 Networks Revision Notes
Topic 5 Networks
companies
- WANs used by many organisations including:
- Computers can be stand alone or connected to a - Universities with campuses
network - Branches of a bank
- A network consists of 2 or more connected - Government organisations
devices that exchange & share resources
The Internet is the biggest known WAN in the
Network Advantages world, but uses mesh topology
Resources can be shared:
- Files & Data --------------------------------------------------------------------
- Peripherals (hardware ie printers)
- Software licences PAN (Personal Area Network)
Communication - A PAN connects electronic devices within a
- Email / calendars user's immediate area.
- Collaborative working - The size of a PAN ranges from a few
Centralisation centimeters to a few meters.
- Storage & Back up (cloud/server)
- Security (ie deployment of new software updates
- Access to the internet / www / broadband
Network Disadvantages
Impacting the network organisation wide:
Can be vulnerable to:
- Malware
- Network outages
- Dependency on server/cloud
- Need for skilled maintenance
- Purchasing hardware is expensive
--------------------------------------------------------------------
Disadvantages:
- Server failure - all users affected
- Require specialist IT staff to administer the
network
- Expensive to set up
--------------------------------------------------------------------
IP Addressing
The unique identifier when sending /
receiving data packets over the internet
is an IP address
- Switches connect each node (computer) in a
network
IPv4 Addressing
- They know the MAC address of all connected
32 bits / four 8-bit denary numbers (0-255)
computers and devices
separated by dots 72.129.214.16
- When a packet of data arrives, they can send it to
the correct computer
IPv6 Addressing
- Hubs, by comparison will send the data to all
128-bit represented in hex, separated by colons
connected computers
1023:0ef1:0000:0000:34dd:00fe:0189:2233
--------------------------------------------------------------------
Why IPv6 addressing was introduced:
- Running out of IPv4 addresses/the number of
Internet / www
(internet) connected devices has grown
- IPv6 addresses are long/longer than IPv4
The internet is a (global) network of networks of
- The number of possible addresses is large/will
connected devices
last much longer
- The Internet is the largest Wide Area
Network (WAN) in the world
--------------------------------------------------------------------
The www is the collection of web pages/service
Packet switching
accessed using the internet
>> A file is broken up into data ‘packets’
- the www is resources located via URLs
>> Each packet is given a header containing
/domain names
- The sender's IP address
- The receivers IP address
The internet is the infrastructure and the www is a
- The Packet sequence number
service that runs on that infrastructure
- The Checksum
A DNS server translates a web address (URL) into
an IP address
- google.com translates to 216.58.204.35
>> The packets may flow through the Internet via
different routes Processes used to find the IP address of a web
>> Routers forward data packets between server & download a page.
networks & select the best routes
>> Receiver's IP address is needed so the router
can forward on
>> Sender's IP address is needed in case there is
an error in transmission
Checksum
>> Checksum algorithm applied to the packet
before it leaves sources computer
>> The source calculated checksum is added to
--------------------------------------------------------------------
the header
>> At the receiving end the checksum algorithm is
Wired Vs Wireless transmissions
reapplied
>> The newly calculated checksum is compared to
Benefits of Wired connection
the sent checksum
- It has greater bandwidth / more bits per second
>> If they don't match a resend request is issued
- The connection does not get worse the further
you are from the router / more reliable
--------------------------------------------------------------------
- Connection does not get obstructed by walls,
ceilings, and furniture
Uniform Resource Locator (URL)
- More secure
Copper cable
Domain Name Service (DNS) - Widely used in ethernet
- Flexible/ Durable
- Unlikely to have interference
Fibre- optic cable
- More secure
- Less signal degradation
- Greater bandwidth
--------------------------------------------------------------------
Bluetooth
Bluetooth is common in most homes and offices to Expression to calculate minimum transmission rate
connect devices such as headphones, controllers required to transmit a 250 MiB file in exactly one
- Bluetooth is used typically for a direct hour. There are 3600 seconds in an hour.
connection between two devices
Zigbee
Used for two-way communication between sensors
& control systems
- Short range (10-100m)
- Only used for sending simple data Expression to calculating transfer time
- Ideal for devices with: low cost/power/data A user wishes to download an album of music
usage which is 150 Megabytes in size.
NFC (near Field communication)
How long will this take with a 70 Mbps connection
NFC is used for wireless data transfer between 2 150 MB = 150*8 Mb
devices in very close proximity (<10cm) 150*8 Mb / 70 Mbps = 17 seconds
- No pairing code needed
- NFC chip inside one device activated by a
How long will this take with 300 Mbps connection?
chip in another device
- Small amounts of data can be transferred
150*8 Mb / 300 Mbps = 4 seconds
when held close to each other
- Used in mobile phones/devices to allow --------------------------------------------------------------------
wireless payment methods like apple pay
Transmission over the Internet
-------------------------------------------------------------------- Data is broken into packets & sent across the
internet using different routes
Range
Range is the maximum distance that a signal is
able to reach
Latency
Latency is delay between a signal being sent &
received measured in milliseconds
>> Packets can arrive out of order, so are
Wi-Fi will add slightly more delay than a wired sequenced using the packet number.
- as there is interference >> The checksum ensures all packets have arrived
- also an amount of time to encrypt & decrypt data
Each packet consists of:
Speed
The actual rate of data transfer in a given time, Header Payload Footer
measured in bits per second
- Sender/receiver IP Data Signals the
address end of a
A network has a speed of 19.08 megabits per
- Packet number packet
second. The equivalent speed in bits per second:
19.08 megabits - Checksum
19 080 x1000 kilobits
19 080 000 x 1000 bits (already in bits, so no *8) --------------------------------------------------------------------
Protocols
Bandwidth The set of rules is called a protocol
Measure of the capacity of a network - the amount
of data that can be transferred in a given time, Communication protocols are a set of rules
measured in bits per second governing data transmission between devices:
HTTP (hypertext transfer protocol) is used for
Transmission Rates expressions accessing and receiving web pages via the Internet
- Resends lost messages
HTTPS (secure HTTP) encrypts the information so - IP (Internet Protocol)
that it cannot be understood by an eavesdropper - Routes the individual packets from one IP
address to another
FTP
File Transfer Protocol (FTP) is used for sending or --------------------------------------------------------------------
retrieving files to or from a FTP server
TCP/IP protocol stack
How email works Defines 4 layer stack that enable exchange of data
>> When an email is sent from a computer it will over the Internet
first be sent to a mail server using the SMTP
protocol
>> It is then forwarded on by other SMTP servers
>> When reaches destination mail server its stored
>> The user’s computer uses POP or IMAP to
access the email
SMTP
This is an email protocol used for sending email
Email software Application:
- Interacts with the user
POP & IMAP - Selects & uses the correct protocol to transmit
These email retrieval protocols fetch message data, interacts with the user
data & attachments from your remote mail server ● SMTP,
● IMAP, POP3,
POP (Post-Office Protocol) downloads new ● FTP
message to your local device ● HTTP / HTTPS
- Then delete them from the server
- Useful when limited server storage The Application layer uses the correct protocol to
- Resoves privacy issues correctly display the data, web page or email for
- No CPU issues with synching large amounts of the user
messages
Transport:
IMAP (Internet Message Access Protocol) Splits data into packets, identifies ports,
- Messages reside on the server numbers packets, adds total of packets,
- good if there is limited space on a device checks packet transmission has been achieved
- Messages can be accessed by multiple devices
- Messages are only are removed if the user Transport layer (sending)
deletes them The Transport layer creates the connection
- synced with the mail server in realtime between two computers, or ‘hosts’ using:
TCP (Transmission Control Protocol)
TCP/IP (Transmission Control Protocol)
- Breaks up messages sent over the Internet into - Identifies server & client port to use
small chunks called packets - Divides the data into packets
- Reassembles the packets at the other end - Numbers the packets
- Detects errors (checksum) - Adds the total number of packets
- Sets up communication between hosts - Senders and receivers using different software
/ Establishes end to end comms and hardware can communicate using the same
- Passes the packets to the network layer layer protocols
Advantages of layers
- Layers are self-contained
- Functionality of one layer can be changed without
affecting the functionality of other layers
In a bus topology, computers and other devices are
all connected to a central coaxial cable
Ring Disadvantages
Terminators are placed at each end of the cable to ● if any of the nodes fail, the ring is broken
absorb signals and prevent them reflecting down and data cannot be transmitted
the cable ● it is difficult to troubleshoot a ring network
topology
Bus Advantages ● because all nodes are wired together, the
● Less cable so cheaper to install the network network must be temporarily stopped to add
● Easier to plan/set/maintain additional nodes
● Easier to add / remove devices
--------------------------------------------------------------------
Bus Disadvantages
● The single cable is shared by many devices Mesh
so there will be many ‘collisions’ of data if Nodes act as routers for data in order to relay &
data is sent at the same time send data in the network
● Network performance degrades as more
devices are added
● If the main cable is damaged, the whole
network fails
● Any device can view all data on the cable
creating a security risk
--------------------------------------------------------------------
Ring topology
Data is sent around the ring, passed from one node
to the next until it reaches its destination.
A partial mesh network is usually used, often in
conjunction with star topologies to create larger
networks
--------------------------------------------------------------------
--------------------------------------------------------------------
Benefits of Ethical hacking
• Ethical hackers are white hat hackers Modular Testing
• Attempt to access the network as a hacker does Testing individual sections of code to ensure that
• Don’t attempt to change or steal data they work as expected & don’t contain security
• Looking for weaknesses in the network issues before they are added to the rest of the
• Weakness pointed out system
• Weaknesses fixed
• Could be employed by the business --------------------------------------------------------------------
• Could work for another specialist company
• Can include penetration testing Commercial analysis tools
Software is used to find weaknesses in a network
-------------------------------------------------------------------- Can be configured to check for a range of
weaknesses
Audit trails - Results/reports generated identifying faults
Audit trails are a record of activities that have taken Weaknesses fixed
place on a computer system
- Automatic record of who changed what and --------------------------------------------------------------------
when
- Identifies suspicious/malicious User policies
activity/changes Collection of rules & guidelines that govern the
- Identifies the point at which errors /security behaviours of network devices / users. Typically
issues occurred covers:
- Enables programs to be rolled back to ● Access controls
previous state ● Password requirements
- Improves accountability ● Info on audit trail requirements
-------------------------------------------------------------------- ● Info on how/when patches should be
applied
Design Stages: ● How security is set up and maintained
Protecting Systems when writing Code ● Review scheduling
It is important to think about security at the design ● Need reviewing because:
stage of a software package as this may stop some - Changes in new laws & regulations
cyber attacks being possible. - changes in requirements means
security is compromised
● What threats is the software likely to face?
● Does the software need security features --------------------------------------------------------------------
like usernames / passwords, or will security
be provided by the network in some other Firewalls
way? Separate a trusted network from an untrusted
● How will patches be installed? network (normally the Internet)
● Should the software use encryption? - Data is sent around a network in small
● Does the system need to create an audit packets of information
trail? - These packets are checked to see where
they are coming from and going to
-------------------------------------------------------------------- - Packets that don’t match filtering rules are
dropped, known as a packet filter
Code review - Firewalls can be run on dedicated hardware or as
Carried out by programmers /software specialist software
Can identify/remove code security vulnerability
- Can highlight where there is unpatched Firewall features:
software ● Monitors in / out traffic using a set of rule:
- Checks efficiency of code / bad ● authorised/unauthorised: computers,
programming practices addresses, protocols
● Can block certain malicious computers by
-------------------------------------------------------------------- filtering
packets from a certain IP (Internet Protocol) User access levels
address Access rights may be set on disks, folders and
● Can prevent access to certain ports on the even individual files
network.
This is known as port blocking 1. Read: allows user to open the file and read
● Malicious or inappropriate websites can be the contents.
blocked 2. Write: allows user to modify contents, write
● Dedicated hardware firewalls are expensive data to the file or delete the file.
● Software firewalls will slow down a 3. Execute: allows user to execute the
computer instructions in a file (such as a .exe file).
-------------------------------------------------------------------- --------------------------------------------------------------------
Usernames & passwords are one of the most Biometrics measure a person’s physical
important ways of protecting computers/servers characteristics to verify their identity
- They prevent unauthorised people from
using the system Biometric methods include:
- They also apply the correct access ● Facial recognition
permissions to the user’s account ● Finger print scanning
● Retinal scans
-------------------------------------------------------------------- ● Voice recognition
-------------------------------------------------------------------- --------------------------------------------------------------------
--------------------------------------------------------------------
Users should:
1. Choose strong authentication credentials
(username/password)
2. Not share credentials
3. Not have automatic login to cloud / leaving
machine unattended
4. Changing password regularly
5. Password protect documents