CYBV 301 Week 4 Lecture Network Fundamentals - Updated
CYBV 301 Week 4 Lecture Network Fundamentals - Updated
Week 4
Network Fundamentals
Agenda
➢ Network Overview
➢ Types of Networks
➢ The OSI Model
➢ The TCP/IP Model
➢ Network Transmission Media
➢ Network Devices
➢ Putting it all together
➢ References
Network Overview
Types of Networks
Physical vs Logical Topologies
Physical Topology
➢ How network devices are arranged and how they communicate
➢The actual physical cabling and network connections
➢How the data actually flows through the physical network
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
OSI Model (2 of 10)
OSI Model (3 of 10)
OSI Model (4 of 10)
Layer 7 - Application Layer
➢ The Application layer supplies
network services to end-user
applications
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
OSI Model (5 of 10)
Layer 6 - Presentation Layer
➢ The Presentation layer is the
simplest in function of any piece of
the OSI model
➢ It handles syntax processing of
message data such as format
conversions and encryption /
decryption needed to support the
Application layer above it
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
OSI Model (6 of 10)
Layer 5 - Session Layer
➢ The Session Layer manages the
sequence and flow of events that
initiate and tear down network
connections
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
OSI Model (7 of 10)
Layer 4 – Transport Layer
➢ The Transport Layer delivers data
across network connections
➢ TCP is the most common example of
a Transport Layer 4 network
protocol
➢ UDP is another very common
Transport Layer 4 network protocol
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
OSI Model (8 of 10)
Layer 3 – Network Layer
➢ The Network layer adds the concept of routing
above the Data Link layer. When data arrives at
the Network layer, the source and destination
addresses contained inside each frame are
examined to determine if the data has reached
its final destination. If the data has reached the
final destination, this Layer 3 formats the data
into packets delivered up to the Transport
layer. Otherwise, the Network layer updates the
destination address and pushes the frame back
down to the lower layers.
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
OSI Model (10 of 10)
Layer 1 – Physical Layer
➢ The Physical layer of the OSI model
is responsible for ultimate
transmission of digital data bits from
the Physical layer of the sending
(source) device over network
communications media to the
Physical layer of the receiving
(destination) device
➢ At the Physical layer, data are
transmitted using the type of
signaling supported by the physical
medium: electric voltages, radio
frequencies, or pulses of infrared or
ordinary light
- Lifewire: https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
TCP/IP Model
TCP/IP Model (1 of 5)
➢ The TCP/IP model was initially
developed by DARPA
➢ The TCP/IP model is layered and is
used in the same fashion as the OSI
model but with fewer layers
➢ The layers within the TCP/IP model are
considered less rigid then that of the
OSI model, which basically means that
many protocols implemented can be
considered in grey areas between one
area and another.
➢ The TCP/IP protocol suite contains the
same protocols referenced in the earlier
OSI model sections
- Pearson: http://www.pearsonitcertification.com/articles/article.aspx?p=1804869
TCP/IP Model (2 of 5)
The Application Layer
➢ The Application layer is the highest layer in the TCP/IP
model and is related to the session, presentation and
application layers of the OSI model
➢ Functions include:
➢ Session establishment, maintenance and termination
➢ Character code translations
➢ Data conversion, compression and encryption
➢ Remote access
➢ Network management
➢ Electronic messaging
- Pearson: http://www.pearsonitcertification.com/articles/article.aspx?p=1804869
TCP/IP Model (4 of 5)
The Internet Layer
➢ The Internet layer is the next layer up
from the link layer and is associated with
the network layer of the OSI model
➢ Functions include:
➢ Traffic routing
➢ Traffic control
➢ Fragmentation
➢ Logical addressing
- Pearson: http://www.pearsonitcertification.com/articles/article.aspx?p=1804869
TCP/IP Model (5 of 5)
The Link Layer
➢ The link layer is the lowest layer of the TCP/IP
model
➢ Also referred to as the Network Interface Layer
- Pearson: http://www.pearsonitcertification.com/articles/article.aspx?p=1804869
OSI vs. TCP/IP Model
OSI Model
OSI Model TCP/IP Model
3. OSI model has a problem of fitting 3. TCP/IP model does not try fit any TCP/IP Model
the protocols into the model protocol
Wireless Networks
➢ Satellite
➢ Microwave
➢ Cellular
➢ WiMAX
➢ WiFi
➢ Bluetooth
➢ Zigbee/Zwave
Wired Networks – Twisted Pair
➢ Copper wire
➢ Reduce crosstalk or electromagnetic induction between wires
➢ Offset external Electromagnetic Interference (EMI)
➢ Packet Filtering
➢ Stateful Inspection
➢ Circuit-Level Gateway
NextGen Firewall
➢ Most advanced – Most complicated
➢ Integrated network device that provides integrated
functionality
➢ Traditional Packet Filtering/Stateful Inspection Firewall
➢ Network and Port Address Translation (NAT)
➢ Application firewall
➢ Deep Packet Inspection
➢ Intrusion Prevention System (IPS)
➢ Encrypted traffic inspection
➢ Web filtering
➢ Quality of Service (QoS) management
➢ Antivirus inspection
➢ Identity Management Integration
➢ Virtual Private Network (VPN) support
➢ Still not a perfect solution
➢ Limited by its configuration and rules
➢ Can be mapped, spoofed, and bypassed by attackers
Intrusion Detection Systems (IDS)
➢ Server based network application
➢ Single or multi-vector threat identification
➢ Predefined Rule sets
➢ False positives
➢ False negatives
➢ Organizationally configured – only as good as you are!
➢ Will only detect known threats
➢ Some systems only provide alerts – someone has to read, analyze and act!