Introduction To The Internet: No Single Organization Controls It
Introduction To The Internet: No Single Organization Controls It
The Internet is the global network of interconnected networks that enables communication
among millions of devices worldwide . It uses the Internet Protocol suite (TCP/IP) to move data
in packets from sources to destinations across diverse networks. For example, a typical Local
Area Network (LAN) may connect several computers and devices via switches and a router; that
router then links the LAN to the Internet. Each device on the Internet has a unique IP address,
and routers direct packets based on these addresses. Importantly, the Internet is decentralized –
no single organization controls it. Its architecture and naming/addressing conventions are
managed collaboratively: bodies like the Internet Engineering Task Force (IETF) define protocol
standards, and organizations such as ICANN/IANA coordinate global IP address and DNS
assignment.
The Internet carries a vast range of information resources and services (e.g. email, the Web,
streaming, etc.), but fundamentally it is a network-of-networks: each participating network
(private, public, academic, business, government) follows common protocols so data can flow
end-to-end. Its design relies on packet-switching and layered protocols. The core Internet
protocols were developed (largely by DARPA and later the IETF) to provide reliable, scalable
end-to-end communication. In summary, the Internet is a global, public interconnection of
networks (physical cables, routers, switches, wireless links, etc.) bound by the TCP/IP protocol
Internet History
The Internet’s origins trace to U.S. Defense research in the 1960s. In 1962 J.C.R. Licklider
envisioned a global “Galactic Network” of computers. Soon after, ARPA (later DARPA)
launched the ARPANET project to link research institutions. ARPANET development began in
1969 when two nodes (at UCLA and SRI) were connected on October 29, 1969This packet-
switched network pioneered distributed routing and robust communication. By 1971, ARPANET
supported email – the first network email was sent that year– and research expanded on
internetworking concepts. In 1973 the first TCP (Transmission Control Protocol) was specified,
and by the early 1980s ARPANET had grown significantly.
In 1983 a turning point occurred: the ARPANET replaced its earlier NCP protocol with the
TCP/IP suite (a date known as “Flag Day”) This unified all military and civilian networks under
a common protocol. Around the same time, the Domain Name System (DNS) was introduced
(1983) to map human-readable names to IP addresses. Also in 1983 the network was split into
ARPANET (military) and MILNET (military) – effectively separating military traffic. In 1986
the National Science Foundation created NSFNET to link supercomputing centers, which
became the new core backbone connecting universities and research organization By the late
1980s, national research networks in other countries were being created (e.g. UK’s JANET,
France’s RENATER) and the modern Internet was forming.
The Internet opened to non-governmental use in the early 1990s. In 1990 Tim Berners-Lee
invented the World Wide Web at CERN, introducing HTML, URLs, and HTTP for linking
documents. NSFNET was privatized in 1991, ARPANET was retired in 1990, and commercial
Internet service providers (ISPs) began operating. By 1993 the Web was put in the public
domain, sparking explosive growth of the Internet into business and public life The final
unassigned IPv4 address blocks were allocated by 2011. Over this period, Internet governance
and infrastructure also evolved (e.g. formation of ICANN in 1998 for domain names). In
summary, the Internet history spans ARPANET’s 1960s inception, TCP/IP adoption in the
1980s, Web development in the 1990s, and continuing globalization and commercialization
thereafter.
Internet Administration
Internet administration is distributed across several organizations rather than centralized.
Protocol standards are developed by the Internet Engineering Task Force (IETF) – an open
standards body that publishes specifications in RFCs. For example, the IETF publishes the core
TCP/IP protocols as RFC1122/1123 and others Addressing and naming are coordinated globally
by ICANN (Internet Corporation for Assigned Names and Numbers), which oversees IANA (the
Internet Assigned Numbers Authority). IANA, now a function of ICANN, allocates blocks of
IPv4/IPv6 addresses and DNS root zone management . Those blocks are further delegated to
Regional Internet Registries (RIRs) (ARIN, RIPE NCC, APNIC, LACNIC, AFRINIC) for
distribution to ISPs and organizations.
Despite differences in scope and access, the technologies are the same: intranets use the same
packet formats, addressing, and application protocols (HTTP, SMTP, etc.) as the Internet. In
practical terms, an intranet is effectively a private slice of the Internet technology stack.
Organizations may also use extranets to extend intranet access to business partners. In summary,
an intranet is simply an internal-use network built on Internet protocols, whereas the Internet
itself is worldwide and public
Internet Services
Key application-layer services on the Internet include:
Email: An essential service for messaging. Email uses SMTP (Simple Mail Transfer
Protocol) for sending messages between mail servers, and POP3 or IMAP for receiving
mail to clients. SMTP pushes email from a sender’s mail server to the recipient’s server
. POP3 (Post Office Protocol v3) and IMAP (Internet Message Access Protocol) allow a
client to retrieve mail from a server; POP3 typically downloads new mail (often deleting
it on the server), whereas IMAP synchronizes mailbox contents and allows mail to
remain on the server . Email messages include headers (To, From, Subject, etc.)
and use encodings like MIME for attachments. (Historical note: the first ARPANET
email was sent in 1971 , and by the mid-1970s email comprised the majority of network
traffic.)
WWW (World Wide Web): The Web is an information system of interlinked hypertext
documents accessed via browsers. Web resources are identified by URLs and transferred
using HTTP (Hypertext Transfer Protocol). Web pages are written in HTML (Hypertext
Markup Language). For example, a web browser sends an HTTP GET request to a web
server to retrieve a page. The Web was invented by Tim Berners-Lee in 1989 (released to
the public domain in 1993) , revolutionizing Internet use. In essence, WWW is an
Internet service for sharing documents, where HTTP is the underlying protocol .
FTP (File Transfer Protocol): A standard protocol for transferring files over IP
networks . FTP operates in a client-server model; a user runs an FTP client to connect to
an FTP server, authenticates (user/password or anonymous), and can then navigate
directories to upload or download files. It uses separate TCP connections (port 21 for
commands and a data port for transfers). (Because FTP normally sends credentials in
clear text, secure variants like FTPS or the SSH-based SFTP are often preferred today .)
Telnet / SSH: These services allow remote command-line login. Telnet is a simple text-
based protocol (port
23) that provides terminal access to a remote host. However, Telnet transmits data
(including passwords) in plain text, so it is insecure. SSH (Secure Shell) has superseded
Telnet for remote access. SSH is a cryptographic protocol that encrypts the session and
provides secure login and file transfer (via SCP/SFTP) . By default SSH uses TCP port
22. (In short: Telnet is legacy and unencrypted; SSH provides the same functionality but
with security .)
Link (Network Access) Layer: This bottom layer handles communication on the
physical network link (e.g. Ethernet, Wi-Fi). It defines how packets are framed and
transmitted over a local network segment. Protocols here include Ethernet (IEEE 802.3),
Wi-Fi (802.11), ARP (Address Resolution Protocol, for mapping IP to MAC), PPP, and
others .
Internet (Network) Layer: This layer provides inter-network addressing and routing. Its
core protocol is IP (Internet Protocol) – IPv4 or IPv6 – which encapsulates data into IP
packets and routes them between networks. This layer also includes ICMP (Internet
Control Message Protocol, for diagnostics like ping) and possibly IGMP (for IPv4
multicast). IP defines the format of packet headers, addressing, and fragmentation (in
IPv4) .
Transport Layer: This layer provides end-to-end communication between hosts. The
principal protocols are TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol). TCP is connection-oriented and reliable: it establishes a session,
sequences bytes, retransmits lost packets, and provides flow control. UDP is
connectionless and lightweight: it sends independent packets (“datagrams”) without
guaranteed delivery. Well-known port numbers in TCP/UDP identify applications (e.g.
port 80 for HTTP, 25 for SMTP). TCP and UDP are among the foundational protocols of
the suite .
Application Layer: This top layer includes all high-level protocols that applications use.
Examples are HTTP/HTTPS (web), SMTP/IMAP/POP3 (email), FTP/Telnet, DNS
(domain name service), DHCP (dynamic address assignment), and many more.
Essentially, any protocol that directly supports user or process communication resides
here. Application protocols assume the underlying transport (TCP/UDP) and network
layers provide delivery.
In summary, the TCP/IP model layers match roughly to: (1) local link hardware (Link), (2)
internetwork routing (IP layer), (3) end-to-end host-to-host (TCP/UDP), and (4) end-user
applications. The IETF has standardized these layers and their protocols . For example, IPv4’s IP
protocol is the Internet layer, while TCP and UDP comprise the Transport layer .
IP Addressing: IPv4
An IPv4 address is a 32-bit numeric label assigned to each device interface on an IPv4 network .
It uniquely identifies a host and its location in the network (the two roles of an IP address ).
Addresses are usually written in dotted-decimal format as four octets (e.g. 192.168.1.10),
though computers use binary internally . CIDR notation appends a slash and a prefix length to
indicate the network mask (e.g. 192.168.1.0/24 means a 24-bit network prefix, mask
255.255.255.0) .
Originally IPv4 used classful addressing: a fixed separation of network and host bits depending
on class A/B/C, but this is now obsolete. Today Classless Inter-Domain Routing (CIDR) is
used, where any contiguous mask length can define the network portion. Within any IPv4
network, a network administrator can assign addresses either statically (fixed in config) or
dynamically (e.g. via DHCP) . Each IPv4 address serves as the source or destination in packet
headers; routers use these addresses to forward packets. (The term “IP address” originated in
ARPANET; IPv4 addresses have been in use since 1983 and are nearing exhaustion .)
Subnetting
Subnetting is the process of dividing a larger IP network into smaller sub-networks (subnets). In
practice, an organization takes an allocated IP address block and “borrows” bits from the host
portion to create multiple subnets. A subnet mask (32-bit for IPv4) is used to distinguish the
network part from the host part of an address. In the mask, consecutive 1 bits mark the network
prefix and 0 bits mark the host suffix . For example, splitting a /24 network into two /25
networks would use mask 255.255.255.128 (making the first 25 bits “1”), creating two subnets
each half the size.
Subnetting increases the number of subnets and decreases the number of hosts per subnet . This
allows more efficient use of address space and better traffic management. For instance, separate
subnets can isolate different departments or types of traffic. To create subnets, one calculates
how many host bits are needed and sets those mask bits to 0 (all others to 1) . Each resulting
subnet functions like its own smaller network, with its own network ID and broadcast address.
By using subnet masks, network administrators can tailor IP allocations to their needs (e.g.,
many small subnets instead of one large one) .
In summary, IPv4 addressing includes the network/host hierarchy, plus reserved ranges for
special purposes (private networks, multicast, loopback, etc.). Addresses are either permanently
assigned (static) or leased (e.g. via DHCP) for dynamic use.
Besides larger addresses, IPv6 introduces new features: simplified header format for faster
processing, mandatory support for IPsec (security), stateless address autoconfiguration, and
hierarchical address allocation. The protocol is not directly interoperable with IPv4, so transition
mechanisms (dual-stack, tunneling, translation) are used during migration. In summary, IPv6 is
the next-generation Internet protocol, engineered for scale and flexibility beyond what IPv4
can provide .
With 128-bit addresses, IPv6 provides roughly 340 undecillion (3.4×10^38) addresses . This
huge space not only avoids scarcity but also enables hierarchical addressing and allocation
(facilitating routing aggregation) and eliminates the need for NAT. In addition, IPv6’s design
incorporates modern needs (e.g. built-in security, mobility). Thus, IPv6 is essential for continued
Internet growth and connectivity of the “Internet of Things.”
Notable differences from IPv4 include the absence of a header checksum and a simplified layout.
In IPv6, there is no header checksum (error checking is left to link-layer and transport) . Also,
fragmentation fields are not in the fixed header but instead use a Fragment extension header if
needed. The Next Header field serves a similar role to IPv4’s “Protocol” field: it tells the
receiving stack what to expect next (e.g. value 6 for TCP, 17 for UDP, or a special value for an
extension header). The Hop Limit byte replaces IPv4’s TTL: each router decreases it by one .
The 128-bit source/destination fields allow the vast address space. In summary, the IPv6 header
is lean (40 bytes) and optimized for fast forwarding, with most optional features handled by
separate extension headers .
IPv6 Addresses
IPv6 addresses are 128 bits long. They are typically written in hexadecimal as eight groups of
four hex digits, separated by colons (for example,
2001:0db8:0000:0000:0000:8a2e:0370:7334) . To make addresses shorter, leading zeros in a
group can be omitted, and any contiguous run of all-zero 16-bit groups can be collapsed to a
double-colon :: (only once per address). For instance,
2001:0db8:0000:0000:0000:8a2e:0370:7334 can be written as 2001:db8::8a2e:370:7334 .
By design, IPv6 addresses have a 64-bit subnet (network) prefix and a 64-bit interface identifier
(host) portion . Typically, an IPv6 subnet is a /64 (fixed host size 64 bits). The interface identifier
is often derived from a device’s MAC address (modified EUI-64) or generated randomly for
privacy.
IPv6 defines three basic address types: Unicast, Anycast, and Multicast . - Unicast addresses
identify a single interface; packets to a unicast address reach only that interface. - Anycast
addresses are assigned to a set of interfaces (typically one per node in a group); a packet to an
anycast address is delivered to the nearest one (by routing distance). - Multicast addresses (prefix
ff00::/8) identify a group of interfaces and support one-to-many delivery (replacing IPv4
broadcast, which does not exist in IPv6).
Each IPv6 interface automatically has a link-local unicast address (prefix fe80::/10) for
communication on the local link . Additionally, networks use unique-local addresses
(fc00::/7) for private internal purposes (analogous to IPv4 private addresses). Publicly routable
global unicast addresses typically start with 2000::/3. In all cases, IPv6 addressing is
hierarchical, and the Internet Assigned Numbers Authority (IANA) and RIRs allocate large
prefixes to providers for distribution.
In summary, an IPv6 address uniquely identifies an interface on the IPv6 network, is written in
hex colon notation, and can be abbreviated using standard rules . The space of IPv6 addresses
and their types (unicast/anycast/multicast) is defined in detail by the IETF standards.
IPv6 Extension Headers
IPv6 uses extension headers to carry optional Internet-layer information beyond the fixed
header . The fixed header is always 40 bytes; any additional fields (options) appear in extension
headers chained after it. This design keeps the core header simple and allows future extensibility.
For example, there are extension headers for Hop-by-Hop Options (to be processed by every
router in the path), Routing (to specify a list of intermediate nodes), Fragment (for fragmentation
by the source), and others (such as Destination Options, Authentication Header, and
Encapsulating Security Payload for IPsec). When the Next Header field in the IPv6 header
indicates an extension, the receiver processes that extension and then continues to the next, and
so on, until reaching the transport layer header. In effect, extension headers provide optional
features (routing, fragmentation, mobility, security) without requiring every packet to carry extra
data in the main header .
Unit 2
TCP/IP’s Transport and Network Layer Protocols (Detailed
Explanation)
The TCP/IP protocol suite is a cornerstone of modern internetworking. It defines how data should be
formatted, addressed, transmitted, routed, and received across diverse networks. The Transport and
Network (Internet) layers are particularly essential in ensuring that data is transmitted reliably,
efficiently, and correctly across multiple nodes. This section delves deep into the protocols and services
at these layers.
TCP is a connection-oriented, reliable, and byte-stream based protocol. It is formally defined in RFC 793
and is one of the core protocols of the Internet protocol suite.
Key Characteristics:
Use Cases:
Key Characteristics:
Use Cases:
IP is the fundamental protocol at the Network Layer. It provides logical addressing and enables routing
of packets across network boundaries. IP is connectionless and best-effort, meaning it does not ensure
delivery or error checking.
Responsibilities:
ICMP is used for error messaging and diagnostics. It works closely with IP to report transmission
problems.
IGMP Versions:
Port numbers allow multiple applications to use the network simultaneously by multiplexing and
demultiplexing data at the Transport Layer.
Connection Teardown:
1. FIN → ACK
2. FIN ← ACK
Networking
A Remote Procedure Call (RPC) is a communication mechanism that allows a program to cause a
procedure (subroutine) to execute on another address space, commonly on another computer on a
shared network, without the programmer having to explicitly code the details of the remote
interaction.
RPC abstracts the details of the network communication so that calling a remote function feels just like
calling a local one.
It allows distributed systems to function as if they were a single system by hiding the complexity of data
transmission over the network.
DNS Structure:
Root Servers
Top-Level Domains (TLDs): .com, , .edu
Second-Level Domains: google.com
Subdomains: mail.google.com
Resolution Types:
Recursive Resolution: DNS server fetches the full answer on behalf of the client.
Iterative Resolution: Client queries each DNS server in the hierarchy.
A: IPv4 Address
AAAA: IPv6 Address
MX: Mail Exchange
NS: Name Server
CNAME: Canonical Name
Predecessor of DHCP.
Used for bootstrapping diskless systems.
ICMP Types:
IGMP Operation:
Unit 3
1. Electronic Mail: Architecture and Protocols
1.1. Architecture of Email Systems
User Agent (UA): This is the application used by the end-user to compose, send, and read
emails. Examples include Microsoft Outlook, Mozilla Thunderbird, and web-based interfaces like
Gmail.
Message Transfer Agent (MTA): These are server-side programs responsible for transferring
emails from the sender's server to the recipient's server. They use protocols like SMTP for this
purpose.
Mailbox: A storage location on the recipient's server where incoming emails are stored until
accessed by the user.
Message Access Agent (MAA): These agents allow users to retrieve and manage their emails
from the mailbox. Protocols like POP3 and IMAP are used here.
Purpose: SMTP is used for sending emails from a client to a server or between servers.
Operation:
o Connection Establishment: The client establishes a TCP connection to the server on port
25.
o Mail Transfer: The client sends commands like HELO, MAIL FROM, RCPT TO, and DATA
to transmit the email.
o Connection Termination: The session ends with the QUIT command.
Limitations: SMTP is limited to 7-bit ASCII text, making it unsuitable for transmitting binary data
or non-English characters directly.
1.3. Multipurpose Internet Mail Extensions (MIME)
Purpose: MIME extends the capabilities of SMTP to support multimedia content and non-ASCII
text.
Features:
o Content-Type Header: Specifies the type of data (e.g., text/plain, image/jpeg).
o Content-Transfer-Encoding: Indicates the encoding used (e.g., Base64) to represent
binary data in ASCII format.
o Multipart Messages: Allows combining different types of content (e.g., text and images)
in a single email.
Purpose: POP3 enables users to retrieve emails from the server to their local machine.
Operation:
o Connection: The client connects to the server on TCP port 110.
o Authentication: The user provides credentials using USER and PASS commands.
o Transaction: Emails are listed, retrieved, or deleted using commands like LIST, RETR,
and DELE.
o Update: The session ends with the QUIT command, applying any deletions.
Limitations: POP3 typically downloads emails and removes them from the server, making it less
suitable for accessing emails from multiple devices.
Purpose: IMAP allows users to access and manage their emails directly on the server, facilitating
synchronization across multiple devices.
Features:
o Selective Download: Users can view email headers and download specific messages.
o Folder Management: Supports multiple folders and subfolders on the server.
o Flags: Emails can be marked as read, unread, flagged, etc., with these statuses
maintained on the server.
Operation: IMAP operates over TCP port 143.
Overview: Webmail services like Gmail and Yahoo Mail provide email access through web
browsers.
Architecture:
o Client: A web browser serves as the user interface.
o Server: Handles HTTP requests, interfaces with the email storage, and uses SMTP for
sending and IMAP/POP3 for retrieving emails.
Advantages: Accessible from any device with internet connectivity; no need for dedicated email
client software.
2. File Access and Transfer Protocols
2.1. File Transfer Protocol (FTP)
Purpose: FTP is used for transferring files between a client and a server over a network.
Operation:
o Control Connection: Established on TCP port 21 for sending commands.
o Data Connection: Established on TCP port 20 for transferring files.
Modes:
o Active Mode: The client opens a port and waits for the server to connect for data
transfer.
o Passive Mode: The server opens a port and waits for the client to connect, useful when
clients are behind firewalls.
Features: Supports authentication, directory listing, file upload/download, and file deletion.
Purpose: Allows users to access public files on an FTP server without a personal account.
Operation: Users log in with the username anonymous and use their email address as the
password.
Use Cases: Distributing software, documents, and other public resources.
Purpose: Allows users to access files over a network as if they were on the local disk.
Operation:
o Protocol: Uses Remote Procedure Calls (RPC) over TCP or UDP, typically on port 2049.
o Features: Supports file locking, authentication, and access control.
Use Cases: Sharing files in UNIX/Linux environments, centralizing data storage.
3. Remote Login: TELNET
3.1. TELNET Protocol
Purpose: Enables users to log into remote systems and execute commands as if they were local
terminals.
Operation:
o Protocol: Operates over TCP port 23.
o Features: Provides a bidirectional interactive text-oriented communication facility.
Limitations: Transmits data, including passwords, in plaintext, making it insecure over untrusted
networks.
Purpose: Facilitates the delivery of real-time audio and video over IP networks.
Features:
o Sequence Numbers: Helps in packet loss detection and reordering.
o Timestamps: Assists in synchronizing playback.
o Payload Type Identification: Indicates the format of the payload (e.g., audio codec).
Operation: Typically runs over UDP to minimize latency.
Purpose: Works alongside RTP to monitor transmission statistics and quality of service (QoS).
Features:
o Sender Reports: Provide transmission and reception statistics.
o Receiver Reports: Offer feedback on the quality of the received data.
o Source Description Items: Convey information about the participants.
Purpose: Manages the setup, control, and termination of voice calls over IP networks.
Protocols:
o Session Initiation Protocol (SIP): Used for initiating, maintaining, and terminating real-
time sessions.
o H.323: An older protocol suite for voice, video, and data conferencing.
Unit 4
RIP is a distance-vector routing protocol used in interior networks to exchange routing information
based on hop count.
Distance Vector: Each router maintains a table with the best-known distance (in hops) to reach
every other router.
Hop Count: Metric used to measure distance. Maximum allowed hop count = 15 (16 = infinity →
unreachable).
Routing Updates: Sent every 30 seconds to neighbors (UDP port 520).
Algorithm: Based on Bellman-Ford Algorithm.
Slow convergence
Routing loops (count-to-infinity problem)
Limited scalability (not suitable for large networks)
🚫 Solutions Introduced:
Split Horizon
Poison Reverse
Hold-Down Timers
OSPF is a link-state routing protocol used as an IGP. It uses Dijkstra’s shortest path first (SPF) algorithm
to determine the best route.
Link-State Advertisement (LSA): Routers advertise link status to all others in the area.
Link-State Database (LSDB): All routers maintain identical LSDBs.
Area Concept: OSPF divides a network into areas. One backbone area (Area 0) connects all
others.
Metric Used: Cost = 10⁸ / bandwidth (higher bandwidth = lower cost).
Authentication: OSPF supports plain-text and cryptographic authentication.
Faster convergence
No hop-count limit
Efficient use of bandwidth
Supports Classless Inter-Domain Routing (CIDR) and VLSM
Better scalability
BGP is the standard EGP used for routing between autonomous systems (AS) in the Internet. Current
version is BGP-4.
Path Vector Protocol: Maintains path information (AS numbers) for loop prevention.
AS-PATH: Main attribute to prevent routing loops.
Policies: BGP allows policy-based routing (routes chosen based on rules).
TCP-based: BGP runs over TCP (port 179) ensuring reliable delivery.
✅ Advantages of BGP:
📘 2. Internet Multicasting
📖 Definition:
Multicasting is a method of communication where data is sent from one source to multiple selected
destinations simultaneously in a single transmission, using the most efficient route possible.
It lies between unicasting (one-to-one) and broadcasting (one-to-all), and is fundamental for
applications such as video conferencing, IPTV, live streaming, and stock exchange data distribution.
🔹 Multicast IP Addresses:
📈 Applications of Multicasting:
Live Video Streaming (e.g., sports)
Internet Radio
Stock Market Updates
Online Multiplayer Games
Distributed Databases & Replication
⚠️Challenges in Multicasting:
Scalability: Multicast must scale to thousands/millions of users.
Security: Harder to secure a dynamic group of users.
Reliable Delivery: IP multicast is unreliable; no built-in ACK.
Deployment: Many ISPs still don’t support multicast routing.
📘 3. Mobile IP
📖 Definition:
Mobile IP allows mobile devices to maintain a constant IP address while moving across different
networks, ensuring uninterrupted connectivity. This concept is crucial for devices such as smartphones,
laptops, and IoT devices that move across wireless networks.
🧠 Key Concepts:
1. The mobile node registers with the home agent when it connects to a new foreign network.
2. The home agent tunnels packets destined for the mobile node to the current care-of address.
3. The foreign agent receives these packets and delivers them to the mobile node.
✅ Advantages:
⚠️Challenges:
NAT is a method used by routers to translate private IP addresses to public ones, allowing multiple
devices in a private network to access the Internet with a single public IP address.
🧠 Key Concepts:
✅ Types of NAT:
A VPN creates a secure, encrypted tunnel over the internet for private communication, enabling remote
users to access internal networks as if they were physically present.
🧠 Key Concepts:
✅ Types of VPN:
Remote Access VPN: Allows individual users to connect to a private network remotely.
Site-to-Site VPN: Connects two or more networks (e.g., branch offices) over the internet.
MPLS VPN: Uses Multiprotocol Label Switching to route VPN traffic.
⚠️Challenges:
SNMP is a protocol used for network management and monitoring, allowing administrators to remotely
manage network devices such as routers, switches, and servers.
🧠 Key Concepts:
Managed Devices: Devices that are monitored using SNMP (e.g., routers).
SNMP Agents: Software running on managed devices that collect and store management
information.
SNMP Manager: A central system that retrieves and processes information from SNMP agents.
✅ SNMP Versions:
📘 7. Internet Security
📖 Definition:
Internet security encompasses measures to protect the data, applications, and infrastructure of the
internet from threats such as unauthorized access, data breaches, malware, and cyberattacks.
Definition: IPSec is a suite of protocols used to secure Internet Protocol (IP) communications by
authenticating and encrypting each IP packet.
Key Concepts:
o AH (Authentication Header): Ensures the integrity and authenticity of data.
o ESP (Encapsulating Security Payload): Provides confidentiality (encryption) and
integrity.
Modes of Operation:
o Transport Mode: Encrypts only the payload of the IP packet.
o Tunnel Mode: Encrypts the entire IP packet, useful for VPNs.
🔹 7.2 Email Security (PGP, S/MIME)
PGP (Pretty Good Privacy): Encrypts and signs email messages, ensuring confidentiality and
authenticity.
S/MIME (Secure/Multipurpose Internet Mail Extensions): A standard for public key encryption
and digital signatures in emails.
SSL (Secure Sockets Layer): A protocol to secure communication between web browsers and
servers, now largely replaced by TLS (Transport Layer Security).
HTTPS: HTTP over SSL/TLS for secure web transactions.
🔹 7.4 Firewalls
Definition: A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
Types:
o Packet Filtering: Inspects packets against a set of rules.
o Stateful Inspection: Tracks the state of active connections.
o Proxy Firewalls: Act as intermediaries between users and the destination.
Digital Signatures: Provide proof of the origin and integrity of the data.
Certificates: Public key certificates issued by a trusted Certificate Authority (CA), used for
encryption and verifying identity.
Datagrams
Domain Name Space refers to the hierarchical structure of domain names used in the
Domain Name System (DNS). DNS translates human-readable domain names (like
www.example.com) into machine-readable IP addresses (like 192.0.2.1) that are necessary
for routing packets on the Internet.
The domain name space defines the structure and organization of all possible domain names,
ensuring they are unique, scalable, and easily managed globally.
MIB, or Management Information Base, is a virtual database used for network management. It stores
information about the objects in a network device that can be monitored or controlled using SNMP
(Simple Network Management Protocol).
It acts as the dictionary or schema for all the data that SNMP can retrieve or manipulate.
FTP (File Transfer Protocol) 21 (Control), 20 (Data) TCP Transfers files between systems
SSH (Secure Shell) 22 TCP Secure remote login and command execution
Telnet 23 TCP Remote terminal access (insecure)
SMTP (Simple Mail Transfer Protocol) 25 TCP Sending emails between servers
DNS (Domain Name System) 53 UDP/TCP Resolving domain names to IP addresses
DHCP (Dynamic Host Configuration 67 (Server), 68 Assigns IP addresses
Protocol) UDP
(Client) dynamically
TFTP (Trivial File Transfer Protocol) 69 UDP Simple, insecure file transfer
HTTP (HyperText Transfer Protocol) 80 TCP Web communication (insecure)
POP3 (Post Office Protocol v3) 110 TCP Receiving emails (stores locally)
📖 Definition:
SSL (Secure Sockets Layer) is a security protocol developed to ensure secure communication over the
Internet. It operates between the application and transport layers of the TCP/IP model and provides:
Encryption (confidentiality),
Authentication (identity verification),
Data Integrity (ensuring data isn't altered in transit).
SSL is the foundation for HTTPS and other secure services, though it has been replaced by TLS
(Transport Layer Security) in modern implementations.
🛠️Purpose of SSL:
SSL was designed to address three major security problems on the Internet:
TLS is used primarily to secure communication over the Internet – for example, securing:
Websites (HTTPS)
Email
VoIP
Messaging apps
VPN tunnels