Domain4: (Chapter 11,12)
Domain4: (Chapter 11,12)
(Chapter 11,12)
Communications & Network Security
1
What is a Network
It is defined as a group of two or more computers linked together in order to share information
LAN
MAN
WAN
2
Network types
Network type Local Area Network Metropolitan Area Wide Area Network
Network
Cost Low High Highest
Transmission media Twisted pair Twisted and fiber optic Fiber optic and satellite
3
OSI Model
TCP-IP Model
4
5
HTTP/FTP/SMTP/Telnet
ASCII/TIFF/JPEG/MPEG
NFS/SQL/RPC
TCP/UDP/SSL/TLS
IP/IPSEC/NAT
SLIP/PPP/ARP/L2TP/PPTP
NICs
6
TCP/IP Model
• Transmission Control Protocol/Internet Protocol
• Consists of only 4 layers
• Application layer, Transport layer (also known as Host-to-Host), Internet layer, and Link layer
• TCP/IP protocol suite was developed before the OSI Reference Model was created
7
Ethernet(IEEE 802.3),
Token Ring(IEEE 802.5),
ATM, FDDI, CDDI
8
Common Port numbers
Name Port No.
Telnet 23
FTP 20, 21
TFTP (Trivial file transfer protocol) 69
SMTP 25
POP3 110
IMAP (Internet message access protocol) 143
DHCP (Dynamic host configuration protocol) 67, 68
HTTP 80
SSL (Secure socket layer) 443
SSH (Secure Shell) 22
HTTPS 443
DNS 53
9
Three way handshake - TCP
• Host A sends a TCP SYNchronize packet to Host B
• Host B receives A's SYN
• Host B sends a SYNchronize-ACKnowledgement
• Host A receives B's SYN-ACK
• Host A sends ACKnowledge
• Host B receives ACK.
TCP socket connection is ESTABLISHED.
10
TCP and UDP
TCP UDP
Reliable (Guarantees delivery of data) Unreliable
It is connection oriented (follows 3-way handshake) It is connection less (no need to set up connection)
Packet size is big (Header size is 20 bytes) Packet size is small (Header size is 8 bytes)
Better for text comm. as it does re-transmission Better for multimedia streaming
11
Network address
Parts
IP Address
Host address
Types IPv4
IPv6
A numeric address
12
IPv4 and IPv6
IPv4 IPv6
Does not supports auto-configuration Includes auto-configuration (removes the need for both DHCP
and NAT)
13
IP Classes
CLASS DECIMAL RANGE Default Subnet Mask Supports Usage
14
IPv4 – 8 bit value of one octet
15
Common Abbreviations
ARP Address Resolution Protocol Resolves IP to MAC address
RARP Reverse Address Resolution Protocol Resolves MAC to IP address
MAC Media Access Control
IGMP Internet Group Management Protocol
ICMP Internet Control Message Protocol
CIDR Classless Inter-Domain Routing
DNP3 Distributed Network Protocol
IEDs Intelligent Electronic Devices
RTUs Remote terminal units
SSID Service set identifier
ESSID Extended service set identifier
BSSID Basic service set identifier
OSA Open system authentication
SKA Shared key authentication
16
IP Address Range
Private IPs are free Public IPs are paid and very costly
17
MAC Address
• It uniquely identifies each device on
a network
18
What is VoIP
• It is Voice over Internet Protocol
• It is a tunneling mechanism used to transport voice/data over a TCP/IP network
• VoIP is less expensive as compared to its competitors
• It offers a wider variety of options and features
• VoIP can be used as a direct telephone replacement on computer networks as well as mobile devices
• It is able to support video and data transmission to allow videoconferencing
• VoIP is available in both commercial and open-source options
• Skype is an example of VoIP
19
Wireless Network – IEEE 802.11
Amendment Speed Frequency
20
What is Network Access Control
• It is a concept of controlling access to an environment through strict adherence to and implementation of
security policy
• NAC acts as an automated detection and response system
21
Firewall
• Can be either hardware or software
22
Firewall types
23
Access Control List
• It is a list of rules on what can access the
network
24
Collisions vs. Broadcasts
Collisions Broadcasts
Collision occurs when two systems transmit data at Broadcast occurs when a single system transmits data
the same time onto a connection medium that to all possible recipients
supports only a single transmission path
Collisions should be avoided and prevent They have useful purposes from time to time
A collision domain is a group of networked systems A broadcast domain is a group of networked systems
that could cause a collision if any two (or more) of the in which all other members receive a broadcast signal
systems in that group transmitted simultaneously when one of the members of the group transmits it
Collision domains are divided by using any layer Broadcast domains are divided by using any layer 3 or
2 or higher device higher device
25
26
Types of Network Cabling
Twisted Pair cable Coaxial cable Optical fiber cable
Low bandwidth Moderately high bandwidth Very high bandwidth
Cheapest medium Moderately expensive Expensive
Installation is easy Fairly easy Difficult
Attenuation is very high Low (rate at which the signal light decreases Very low
in intensity)
Noise immunity is low More than twisted pair Highest noise immunity among all
27
Network Topologies
Ring, Bus, Star, Mesh
Hybrid
Point-to-Point, Client-Server, Point-to-Multipoint, Peer-to-Peer
28
Ring Topology
29
Bus Topology
30
Star Topology
31
Mesh Topology
32
Hybrid Topologies
33
Star Bus Network
34
Star Ring Network
Three networks following a Star
topology and connected through a
Ring network to each other
35
Point to Point Topology
• Two hosts connected to each other using a single
cable
• Simplest form of topology
36
Client Server Topology
37
Point to Multipoint Topology
38
Peer to Peer Topology
• All clients talk to each other sharing resources among
them
39
Different Cable Standards used on Network
Depending upon their …….. Speed ……. Type …….. Media
40
Cable Standard Speed (max.) Media Maximum length
10 Base – T 10 Mbps Twisted pair 15 mtrs
10 Base – 2 (thin ethernet) 10 Mbps Coaxial cable 200 mtrs
100 Base – T (fast ethernet) 100 Mbps UTP Cat 5 or > 100 mtrs
100 Base – FX 100 Mbps Fiber optic 400 mtrs (half duplex)
2 kms (full duplex)
1000 Base – T 1000 Mbps UTP Cat 5 or > 100 mtrs
10G Base – T 10 Gbps Shielded & Unshielded Twisted pair 100 mtrs
10G Base – SR Fiber optic 300 mtrs
10G Base – ER Fiber optic 40 kms
10G Base – SW Fiber optic 300 mtrs
41
LAN technologies
Ethernet Token ring FDDI (fiber distributed data
interface)
Deployed on Star or Bus topologies Used in Ring or Star N/w topologies Uses ring N/w topology
42
Some common Terminologies
Repeaters, Concentrators, and Amplifiers
• Used to strengthen the communication signal over a cable segment as well as connect network segments
that use the same protocol
• All operate at OSI layer 1
• Systems on either side of the above three are part of collision and broadcast domain
Hubs
• They are used to connect multiple systems and connect network segments that use the same protocol
• A hub is a multiport repeater
• Hubs operate at OSI layer 1
• Used to create network
43
Some common Terminologies (contd.)
Bridges
• A bridge is used to connect two networks together (even N/w of different topology, speed, cabling type)
• It forwards traffic from one network to another. Used to create network.
• Bridges operate at OSI layer 2
Switches
• Switches operate primarily at OSI layer 2
• Switches offer greater efficiency for traffic delivery
• They used to connect network segments that use the same protocol
44
Some common Terminologies (contd.)
Routers
• Routers are used to control traffic flow on networks
• They can function using statically defined routing tables, or they can employ a dynamic routing system
• Routers operate at OSI layer 3
• Routers are used to connect networks
Gateways
• A gateway connects networks that are using different network protocols
• A gateway is responsible for transferring traffic from one network to another by transforming the format of
that traffic into a form compatible with the protocol
• Gateways typically operate at OSI layer 7
45
Some common Terminologies (contd.)
Proxies
• A proxy is a form of gateway that does not translate across protocols
• Proxies serve as mediators and filters for a network
• A proxy accepts requests from clients, alters the source address of the requester, maintains a mapping of
requests to clients, and sends the altered request packets out
46
Network technologies
Baseband technology Broadband technology
It supports only a single communication channel Can support multiple simultaneous signals
It uses a direct current applied to the cable Uses frequency modulation to support numerous
channels, each supporting a distinct communication
session
47
Authentication Protocols
Used for securing logon credentials while accessing a server remotely
• PAP
• CHAP
• EAP
• RADIUS
• TACACS+
• DIAMETER
48
PAP
Password Authentication Protocol
• PAP transmits usernames and passwords in the clear text
• It offers no form of encryption
• It simply provides a means to transport the logon credentials from the client to the authentication server
49
CHAP
Challenge Handshake Authentication Protocol
• CHAP encrypts usernames and passwords
• It performs authentication using a challenge-response dialogue
• It also periodically re-authenticates the remote system throughout an established communication session to
verify a persistent identity of the remote client
50
EAP
Extensible Authentication Protocol
51
Dial-up Protocols
SLIP
PPP
52
SLIP
• Used to connect two computer
systems using a serial connection
such as a telephone line
• Not a secure protocol as it sends
all data in clear text during the
dial up process
• Does not provide error checking
• Uses only TCP/IP protocol
• This is an older technology and is
hardly used nowadays
53
PPP
• Good replacement for SLIP
54
55
Virtual Private Network
• It is a private communication network that uses
a public network (Internet) to establish a
remote connection
56
Site-to-Site • Good alternative for internet leased lines
VPN
• Cost effective
• Data can be shared very easily between different location office for an
organization
57
Host-to-Site
VPN
• No additional hardware is needed at Host side to establish a connection
58
Host-to-Host
VPN
59
Some Common VPN Protocols
60
L2TP
• L2TP is a combination of Cisco’s
layer2 forwarding and PPTP
• Prevents ‘Man-in-the-middle’
attack
61
SSL
• Protocol used to provide security
on the internet
• Uses public key encryption
• Commonly used with HTTP
62
TLS
• It is the latest industry standard SSL
protocol
• Successor to SSL
• Authenticates the server and the
client
• Plus encrypts the data
• Goal is to make SSL more safe and
secure
Made of 2 layers:
1. TLS Record protocol
2. TLS Handshake protocol
63
64
What is Network Address Translation (NAT)
• Translates Private IP address into Public IP address and
vice versa
65
What is a Loopback Address
• It is an IP address used to create a software interface that connects to itself via TCP/IP
66
WAN – Switching technologies
Packet Switching
Circuit Switching
67
Packet Switching
• All internet services use this
method
• Data packets take different routes
to their destination
• Once all packets reach their end
point they recompile themselves
• Also known as connectionless
communicating method
• Preferred for high volume network
• Not a good choice for voice
communication
68
Circuit
Switching
• All data packets take the same
route to reach their destination
69
1. What is layer 4 of the OSI model?
A. Presentation
B. Network
C. Data Link
D. Transport
3. Which OSI model layer manages communications in simplex, half-duplex, and fullduplex modes?
A. Application
B. Session
C. Transport
D. Physical
70
5. Which of the following is not true regarding firewalls?
A. They are able to log traffic information.
B. They are able to block viruses.
C. They are able to issue alarms based on suspected attacks.
D. They are unable to prevent internal attacks.
7. Which of the following IP addresses is not a private IP address as defined by RFC 1918?
A. 10.0.0.18
B. 169.254.1.119
C. 172.31.8.204
D. 192.168.6.43
71
9. When you’re designing a security system for Internet-delivered email, which of the following is least important?
A. Nonrepudiation
B. Availability
C. Message integrity
D. Access restriction
11. Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a
system?
A. Brute-force attacks
B. Denial of service
C. Social engineering
D. Port scanning
12. What authentication protocol offers no encryption or protection for logon credentials?
A. PAP
B. CHAP
C. SSL
D. RADIUS
72