Module 6
Module 6
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Domain Name System (DNS)
• Domain Name System (DNS) is a hostname for IP address translation service.
• DNS is used to convert the domain name of the websites to their numerical IP
address.
2
DNS Types
3
Name-to-Address Resolution
• The host requests the DNS name server to resolve the domain name. And the name
server returns the IP address corresponding to that domain name to the host so that the
host can future connect to that IP address.
4
Domain Name Server
5
Working of DNS
DNS is a client/server network communication protocol. DNS clients
send requests to the. server while DNS servers send responses to the
client.
DNS implements a distributed database to store the name of all the hosts
available on the internet.
6
NAME SPACE
To be unambiguous, the names assigned to machines must be carefully selected from a name space with complete control
over the binding between the names and IP addresses.
• Flat Name Space:
In a flat name space, a name is assigned to an address. A name in this space is a sequence of characters without
structure. The names may or may not have a common section; if they do, it has no meaning.
• Hierarchical Name Space:
In a hierarchical name space, each name is made of several parts. The first part can define the nature of the
organization, the second part can define the name of an organization, the third part can define departments in the
organization, and so on.
DOMAIN NAME SPACE
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SMTP
Condition 1:-SMTP allows a more complex system by adding
a relaying system. Instead of just having one MTA at sending
side and one at receiving side, more MTAs can be added,
acting either as a client or server to relay the email.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SMTP
Working of SMTP
1. Composition of Mail: A user sends an e-mail by composing an electronic mail message using a Mail User
Agent (MUA). Mail User Agent is a program which is used to send and receive mail. The message contains
two parts: body and header. The body is the main part of the message while the header includes
information such as the sender and recipient address.
2. Submission of Mail: After composing an email, the mail client then submits the completed e-mail to the
SMTP server by using SMTP on TCP port 25.
3. Delivery of Mail: E-mail addresses contain two parts: username of the recipient and domain name. For
example, [email protected], where "vivek" is the username of the recipient and "gmail.com" is the domain
name.
If the domain name of the recipient's email address is different from the sender's domain name, then
message submission agent (MSA) will send the mail to the Mail Transfer Agent (MTA). To relay the
email, the MTA will find the target domain.
4. Receipt and Processing of Mail: Once the incoming message is received, the exchange server delivers it to
the incoming server (Mail Delivery Agent) which stores the e-mail where it waits for the user to retrieve it.
5. Access and Retrieval of Mail: The stored email can be retrieved by using MUA (Mail User Agent). MUA can
be accessed by using login and password.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
• SNMP stands for Simple Network Management Protocol.
• SNMP is a framework used for managing devices on the internet.
• It provides a set of operations for monitoring and managing the internet.
SNMP Concept
• SNMP has two components Manager and agent.
• The manager is a host that controls and monitors a set of agents such as
routers.
• It is an application layer protocol in which a few manager stations can
handle a set of agents.
• The protocol designed at the application level can monitor the devices
made by different manufacturers and installed on different physical
networks.
• It is used in a heterogeneous network made of different LANs and WANs
connected by routers or gateways.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
Managers & Agents
• A manager is a host that runs the SNMP client program while the agent is a router that
runs the SNMP server program.
• Management of the internet is achieved through simple interaction between a manager
and agent.
• The agent is used to keep the information in a database while the manager is used to
access the values in the database.
• For example, a router can store the appropriate variables such as a number of packets
received and forwarded while the manager can compare these variables to determine
whether the router is congested or not.
• Agents can also contribute to the management process. A server program on the agent
checks the environment, if something goes wrong, the agent sends a warning message
to the manager.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
Management Components
• Management is not achieved only through the
SNMP protocol but also the use of other
protocols that can cooperate with the SNMP
protocol. Management is achieved through the
use of the other two protocols: SMI (Structure of
management information) and MIB(management
information base).
• Management is a combination of SMI, MIB, and 2.MIB
SNMP. The MIB (Management information base) is a
1. SMI second component for the network
• The SMI (Structure of management information) management.
Each agent has its own MIB, which is a
is a component used in network management. Its
collection of all the objects that the manager
main function is to define the type of data that
can manage
can be stored in an object and to show how to
encode the data for the transmission over a
network.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
• SNMP defines five types of messages: GetRequest,
GetNextRequest, SetRequest, GetResponse, and Trap.
1. GetRequest: The GetRequest message is sent from a
manager (client) to the agent (server) to retrieve the value
of a variable.
2. GetNextRequest: The GetNextRequest message is sent
from the manager to agent to retrieve the value of a
variable. This type of message is used to retrieve the values
of the entries in a table. If the manager does not know the
indexes of the entries, then it will not be able to retrieve
the values. In such situations, GetNextRequest message is
used to define an object.
3. GetResponse: The GetResponse message is sent from an
agent to the manager in response to the GetRequest and 5. Trap: The Trap message is sent from an
GetNextRequest message. This message contains the value agent to the manager to report an event.
of a variable requested by the manager. For example, if the agent is rebooted, then
4. SetRequest: The SetRequest message is sent from a it informs the manager as well as sends the
manager to the agent to set a value in a variable. time of rebooting.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
FTP
• FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one
host to another.
• It is also used for downloading the files to computer from other servers.
Objectives of FTP
• It provides the sharing of files.
• It is used to encourage the use of remote computers.
• It transfers the data more reliably and efficiently.
Why FTP?
• Although transferring files from one system to another is very simple and straightforward, but
sometimes it can cause problems. For example, two systems may have different file
conventions. Two systems may have different ways to represent text and data. Two systems
may have different directory structures. FTP protocol overcomes these problems by
establishing two connections between hosts. One connection is used for data transfer, and
another connection is used for the control connection.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
FTP
• Mechanism of FTP
The figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process,
and data transfer process. The server has two components:
the server control process and the server data transfer
process.
There are two types of connections in FTP:
1. Control Connection: The control connection uses very
simple rules for communication. Through control
connection, we can transfer a line of command or line
of response at a time. The control connection is made
between the control processes. The control
connection remains connected during the entire
interactive FTP session.
2. Data Connection: The data connection is made
between data transfer processes. The data connection
opens when a command comes for transferring the
files and closes when the file is transferred.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
FTP
FTP Clients
• FTP client is a program that implements a file transfer protocol which allows you to transfer files between two hosts on
the internet.
• It allows a user to connect to a remote host and upload or download the files.
• It has a set of commands that we can use to connect to a host, transfer the files between you and your host and close
the connection.
Advantages of FTP:
• Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to transfer the files from one
computer to another computer.
• Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.
• Security: To access the FTP server, we need to login with the username and password. Therefore, we can say that FTP is
more secure.
• Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a manager of the company,
you send some information to all the employees, and they all send information back on the same server.
Disadvantages of FTP:
• FTP serves two operations, i.e., to send and receive large files on a network. However, the size limit of the file is 2GB that
can be sent. It also doesn't allow you to run simultaneous transfers to multiple receivers.
• Passwords and file contents are sent in clear text. So, it is quite possible that attackers can carry out the brute force
attack by trying to guess the FTP password.
• It is not compatible with every system.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
HTTP & WWW
• HTTP stands for HyperText Transfer Protocol.
• It is a protocol used to access the data on the World Wide Web (www).
• The HTTP protocol can be used to transfer the data in the form of plain text, hypertext,
audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its efficiency that
allows us to use in a hypertext environment where there are rapid jumps from one
document to another document.
• HTTP is similar to the FTP as it also transfers the files from one host to another host.
But, HTTP is simpler than FTP as HTTP uses only one connection, i.e., no control
connection to transfer the files.
• HTTP is similar to SMTP as the data is transferred between client and server. The HTTP
differs from the SMTP in the way the messages are sent from the client to the server
and from server to the client. SMTP messages are stored and forwarded while HTTP
messages are delivered immediately.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
HTTP & WWW
Features of HTTP:
• Connectionless protocol: HTTP is a connectionless protocol.
HTTP client initiates a request and waits for a response from
the server. When the server receives the request, the server
processes the request and sends back the response to the
HTTP client after which the client disconnects the
connection. The connection between client and server exist
only during the current request and response time only.
• Media independent: HTTP protocol is a media independent
as data can be sent as long as both the client and server
know how to handle the data content. The above figure shows the HTTP
• Stateless: HTTP is a stateless protocol as both the client and transaction between client and server.
server know each other only during the current request. The client initiates a transaction by
sending a request message to the
server. The server replies to the request
message by sending a response
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India message.
HTTP & WWW
Messages
• HTTP messages are of two types: request and response. Both the message
types follow the same message format.
• Request Message: The request message is sent by the client that consists of
a request line, headers, and sometimes a body.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Uniform Resource Locator (URL)
• A client that wants to access the document in an internet needs an address and to facilitate the access of
documents, the HTTP uses the concept of Uniform Resource Locator (URL).
• The Uniform Resource Locator (URL) is a standard way of specifying any kind of information on the internet.
• The URL defines four parts: method, host computer, port, and path.
• Method: The method is the protocol used to retrieve the document from a server. For example, HTTP.
• Host: The host is the computer where the information is stored, and the computer is given an alias name.
Web pages are mainly stored in the computers and the computers are given an alias name that begins with
the characters "www". This field is not mandatory.
• Port: The URL can also contain the port number of the server, but it's an optional field. If the port number is
included, then it must come between the host and path and it should be separated from the host by a
colon.
• Path: Path is the pathname of the file where the information is stored. The path itself contain slashes that
separate the directories from the subdirectories and files.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Security: Cryptography
• The main aim of any organization is to protect their data from attackers.
Security:
Ensuring the (secrecy) confidentiality, data integrity and availability of
components of computer system.
1. Network security – measures to protect data during their transmission.
2. Internet security - measures to protect data during their transmission over a
collection of interconnected networks.
3. Computer security – the protection to an automated information system in
order to preserve the integrity, availability and confidentiality of information
system resources.
Security Services/Requirements
1. Confidentiality
2. Integrity
3. Availability
4. Authentication
5. Non-Repudiation
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Security: Cryptography
Confidentiality:
• Assures that private or confidential information is not made available or disclosed
to unauthorized individuals.
• Specifies that only the sender and receiver will be able to access the information
shared between them.
Integrity:
• Integrity gives the assurance that the information received is exact and accurate.
• If the content of the message is changed after the sender sends it but before
reaching the intended receiver, then it is said that the integrity of the message is
lost.
Availability:
• The principle of availability states that the resources and information will be
available to authorized party at all times.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Security: Cryptography
Authentication:
• Authentication is the mechanism to identify the user or system or the entity.
• It ensures the identity of the person trying to access the information.
• The authentication is mostly secured by using username and password.
• The main objective of authentication is to allow authorized users to access the
computer and to deny access to the unauthorized users.
Non-repudiation:
• Non-repudiation is a mechanism that prevents the denial of the message content
sent through a network.
• In some cases, the sender sends the message and later denies it. But the non-
repudiation does not allow the sender to refuse the receiver.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
security attack
• A security attack is an activity or act made upon a system with the goal to obtain
unauthorized access to information or resources.
• Goal of security attack - is to compromise one or more of the five major security
requirements: Confidentiality, Availability, Authentication, Integrity, and
Nonrepudiation.
Types of Attack
Passive Attack:
– Just to obtain information.
– Does not Modify or harm the system.
Active Attack:
– May Change the Data and harm the system.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Cryptography
Cryptography, a word with Greek origins, means "secret writing.
Cryptography can provide confidentiality, integrity, authentication, and non-repudiation of
messages.
• Cryptography is technique of securing information and communications
through use of codes so that only those person for whom the information is
intended can understand it and process it. Thus preventing unauthorized
access to information.
• The prefix “crypt” means “hidden” and suffix “graphy” means “writing”.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Cryptograph
The original message, before being transformed, is called plaintext.
After the message is transformed, it is called cipher text
Types of Cryptography:-
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Symmetric Key Algorithm :-
In symmetric key cryptography, the same key is used by the sender (for encryption) and the
receiver (for decryption).
The key is shared.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
How it works:
1.Key Agreement: The sender and receiver agree on a secret key.
2.Encryption: The sender uses the secret key to encrypt the plaintext
message into ciphertext.
3.Transmission: The encrypted ciphertext is transmitted to the
receiver.
4.Decryption: The receiver uses the same secret key to decrypt the
ciphertext and retrieve the original plaintext message.
Strengths:
•Speed and Efficiency: Symmetric algorithms are computationally
faster and more efficient than asymmetric algorithms, making them
suitable for encrypting large amounts of data.
•Simplicity: The use of a single key simplifies the encryption and
decryption process.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Weaknesses:
•Key Sharing:
The primary challenge is securely sharing the secret key between
the sender and receiver before communication can begin. If the key
is compromised, the entire communication can be compromised.
•Limited Key Management:
Symmetric key cryptography is not ideal for managing a large
number of keys or for situations where secure key distribution is
challenging.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Asymmetric Key (Public-Key) Algorithm :-
Benefits:
•No Key Exchange Required: Unlike symmetric encryption, where
keys need to be securely exchanged, asymmetric cryptography only
requires the public key to be shared.
•Secure Communication: It provides strong security for
communication and data transmission.
•Digital Signatures: It enables digital signatures for authentication and
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Limitations:
•Computational Complexity: Asymmetric encryption is generally
slower than symmetric encryption.
•Key Length: Asymmetric algorithms often require longer keys
compared to symmetric algorithms, which can lead to higher
computational overhead.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
User Authentication
• Five Common Types of User Authentication
1. Password-Based Authentication:-Passwords can be made up of numbers, letters, or special
characters; the strongest combine all these options.
2. Multi-Factor Authentication:-Multi-Factor Authentication (MFA) requires two or more
independent means of identifying a user. Examples of MFA include codes generated from a user's
smartphone, captcha tests, voice biometrics, facial recognition, and fingerprints.
3. Certificate-Based Authentication:-Certificate-based authentication technologies use digital
certificates to identify users. These certificates are electronic documents similar to passports or
driver's licenses.
4. Biometric Authentication:-This security process uses the unique biological characteristics of an
individual.
5. Token-Based Authentication:-Using token-based authentication, users log in to their credentials
once and receive a unique encrypted string of random characters. The token is further used to
access the protected systems. The purpose of the digital token is to prove that the access
permission is already with you.
Security Protocols in Internet
Security protocols in the internet are essential for ensuring secure
communication and protecting data from unauthorized access and
cyber threats.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Firewall
• A firewall can be defined as a special type of network security device or a software
program that monitors and filters incoming and outgoing network traffic based on a
defined set of security rules.
• It acts as a barrier between internal private networks and external sources
• The primary purpose of a firewall is to allow non-threatening traffic and prevent
malicious or unwanted data traffic for protecting the computer from viruses and
attacks.
• A firewall is a cybersecurity tool that filters network traffic and helps users block
malicious software from accessing the Internet in infected computers.
44
Firewall Architected
45
Function of Firewall
• The firewall works as a gatekeeper.
• It analyzes every attempt coming to gain access to our operating system and prevents traffic from
unwanted or non-recognized sources.
• Firewall acts as a barrier or filter between the computer system and other networks
Firewalls have become so powerful, and include a variety of functions and capabilities with built-in
features:
Network Threat Prevention
Application and Identity-Based Control
Hybrid Cloud Support
Scalable Performance
Network Traffic Management and Control
Access Validation
Record and Report on Events
46
Limitations of Firewall
Firewalls have some limitations:
Firewalls cannot stop users from accessing malicious websites, making it
vulnerable to internal threats or attacks.
Firewalls cannot protect against the transfer of virus-infected files or software.
Firewalls cannot prevent misuse of passwords.
Firewalls cannot protect if security rules are misconfigured.
Firewalls cannot protect against non-technical security risks, such as social
engineering.
Firewalls cannot stop or prevent attackers with modems from dialling in to or out
of the internal network.
Firewalls cannot secure the system which is already infected.
47
Types of Firewalls
Depending on their structure and functionality, there are different types of firewalls. The following
is a list of some common types of firewalls:
Proxy Firewall
Packet-filtering firewalls
Stateful Multi-layer Inspection (SMLI) Firewall
Unified threat management (UTM) firewall
Next-generation firewall (NGFW)
Network address translation (NAT) firewalls
48