0% found this document useful (0 votes)
20 views48 pages

Module 6

The document provides an overview of the Application Layer in data communication and computer networks, focusing on protocols such as DNS, SMTP, SNMP, FTP, and HTTP. It explains the functions and workings of these protocols, including how they manage data transmission, email communication, network management, file transfers, and web data access. Key concepts such as domain name resolution, message composition, and protocol characteristics are also discussed.

Uploaded by

shruti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views48 pages

Module 6

The document provides an overview of the Application Layer in data communication and computer networks, focusing on protocols such as DNS, SMTP, SNMP, FTP, and HTTP. It explains the functions and workings of these protocols, including how they manage data transmission, email communication, network management, file transfers, and web data access. Key concepts such as domain name resolution, message composition, and protocol characteristics are also discussed.

Uploaded by

shruti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

DATA COMMUNICATION AND COMPUTER NETWORKS

Module VI: Application Layer

Dr. Ashok Kumar


Associate Professor
Department of Computer Science & Engineering, ASET, Amity University, Gwalior, India

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Domain Name System (DNS)
• Domain Name System (DNS) is a hostname for IP address translation service.

• DNS is a distributed database implemented in a hierarchy of name servers.

• It is an application layer protocol for message exchange between clients and


servers.

• DNS is used to convert the domain name of the websites to their numerical IP
address.

2
DNS Types

3
Name-to-Address Resolution
• The host requests the DNS name server to resolve the domain name. And the name
server returns the IP address corresponding to that domain name to the host so that the
host can future connect to that IP address.

4
Domain Name Server

5
Working of DNS
 DNS is a client/server network communication protocol. DNS clients
send requests to the. server while DNS servers send responses to the
client.

 Client requests contain a name which is converted into an IP address


known as a forward DNS lookup while requests containing an IP address
which is converted into a name known as reverse DNS lookups.

 DNS implements a distributed database to store the name of all the hosts
available on the internet.
6
NAME SPACE

To be unambiguous, the names assigned to machines must be carefully selected from a name space with complete control
over the binding between the names and IP addresses.
• Flat Name Space:

In a flat name space, a name is assigned to an address. A name in this space is a sequence of characters without
structure. The names may or may not have a common section; if they do, it has no meaning.
• Hierarchical Name Space:

In a hierarchical name space, each name is made of several parts. The first part can define the nature of the
organization, the second part can define the name of an organization, the third part can define departments in the
organization, and so on.
DOMAIN NAME SPACE

To have a hierarchical name space, a domain


name space was designed. In this design the
names are defined in an inverted-tree structure
with the root at the top. The tree can have only
128 levels: level 0 (root) to level 127.
DOMAIN NAME SPACE
Label: Each node in the tree has a label, which is a string with a maximum of
63 characters. The root label is a null string (empty string).
Domain Name:Each node in the tree has a domain name. A full domain name
is a sequence of labels separated by dots (.). The domain names are always
read from the node up to the root. The last label is the label of the root (null).
Domain:A domain is a subtree of the domain name space. The name of the
domain is the domain name of the node at the top of the subtree.
Domain names and labels
FQDN and PQDN
Fully Qualified Domain Name

• If a label is terminated by a null string, it is called a fully qualified domain name


(FQDN). An FQDN is a domain name that contains the full name of a host. It
contains all labels, from the most specific to the most general, that uniquely define
the name of the host. Example challenger.ate.tbda.edu.
Partially Qualified Domain Name
• If a label is not terminated by a null string, it is called a partially qualified domain
name (PQDN). A PQDN starts from a node, but it does not reach the root.
Challenger
• The DNS client adds the suffix atc.jhda.edu. before passing the address to the
DNS server.
SMTP
• SMTP stands for Simple Mail Transfer Protocol.
• SMTP is a set of communication guidelines that allow software to transmit an electronic mail over
the internet is called Simple Mail Transfer Protocol.
• It is a program used for sending messages to other computer users based on e-mail addresses.
• It provides a mail exchange between users on the same or different computers, and it also supports:
– It can send a single message to one or more recipients.
– Sending message can include text, voice, video or graphics.
– It can also send the messages on networks outside the internet.
Components of SMTP
First, we will break the SMTP client and SMTP server into two
components such as user agent (UA) and mail transfer agent
(MTA). The user agent (UA) prepares the message, creates the
envelope and then puts the message in the envelope.
The mail transfer agent (MTA) transfers this mail across the internet.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SMTP
Condition 1:-SMTP allows a more complex system by adding
a relaying system. Instead of just having one MTA at sending
side and one at receiving side, more MTAs can be added,
acting either as a client or server to relay the email.

Condition 2:- The relaying system without TCP/IP protocol


can also be used to send the emails to users, and this is
achieved by the use of the mail gateway. The mail gateway
is a relay MTA that can be used to receive an email.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SMTP
Working of SMTP
1. Composition of Mail: A user sends an e-mail by composing an electronic mail message using a Mail User
Agent (MUA). Mail User Agent is a program which is used to send and receive mail. The message contains
two parts: body and header. The body is the main part of the message while the header includes
information such as the sender and recipient address.
2. Submission of Mail: After composing an email, the mail client then submits the completed e-mail to the
SMTP server by using SMTP on TCP port 25.
3. Delivery of Mail: E-mail addresses contain two parts: username of the recipient and domain name. For
example, [email protected], where "vivek" is the username of the recipient and "gmail.com" is the domain
name.
If the domain name of the recipient's email address is different from the sender's domain name, then
message submission agent (MSA) will send the mail to the Mail Transfer Agent (MTA). To relay the
email, the MTA will find the target domain.
4. Receipt and Processing of Mail: Once the incoming message is received, the exchange server delivers it to
the incoming server (Mail Delivery Agent) which stores the e-mail where it waits for the user to retrieve it.
5. Access and Retrieval of Mail: The stored email can be retrieved by using MUA (Mail User Agent). MUA can
be accessed by using login and password.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
• SNMP stands for Simple Network Management Protocol.
• SNMP is a framework used for managing devices on the internet.
• It provides a set of operations for monitoring and managing the internet.
SNMP Concept
• SNMP has two components Manager and agent.
• The manager is a host that controls and monitors a set of agents such as
routers.
• It is an application layer protocol in which a few manager stations can
handle a set of agents.
• The protocol designed at the application level can monitor the devices
made by different manufacturers and installed on different physical
networks.
• It is used in a heterogeneous network made of different LANs and WANs
connected by routers or gateways.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
Managers & Agents
• A manager is a host that runs the SNMP client program while the agent is a router that
runs the SNMP server program.
• Management of the internet is achieved through simple interaction between a manager
and agent.
• The agent is used to keep the information in a database while the manager is used to
access the values in the database.
• For example, a router can store the appropriate variables such as a number of packets
received and forwarded while the manager can compare these variables to determine
whether the router is congested or not.
• Agents can also contribute to the management process. A server program on the agent
checks the environment, if something goes wrong, the agent sends a warning message
to the manager.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
Management Components
• Management is not achieved only through the
SNMP protocol but also the use of other
protocols that can cooperate with the SNMP
protocol. Management is achieved through the
use of the other two protocols: SMI (Structure of
management information) and MIB(management
information base).
• Management is a combination of SMI, MIB, and 2.MIB
SNMP. The MIB (Management information base) is a
1. SMI second component for the network
• The SMI (Structure of management information) management.
Each agent has its own MIB, which is a
is a component used in network management. Its
collection of all the objects that the manager
main function is to define the type of data that
can manage
can be stored in an object and to show how to
encode the data for the transmission over a
network.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
SNMP
• SNMP defines five types of messages: GetRequest,
GetNextRequest, SetRequest, GetResponse, and Trap.
1. GetRequest: The GetRequest message is sent from a
manager (client) to the agent (server) to retrieve the value
of a variable.
2. GetNextRequest: The GetNextRequest message is sent
from the manager to agent to retrieve the value of a
variable. This type of message is used to retrieve the values
of the entries in a table. If the manager does not know the
indexes of the entries, then it will not be able to retrieve
the values. In such situations, GetNextRequest message is
used to define an object.
3. GetResponse: The GetResponse message is sent from an
agent to the manager in response to the GetRequest and 5. Trap: The Trap message is sent from an
GetNextRequest message. This message contains the value agent to the manager to report an event.
of a variable requested by the manager. For example, if the agent is rebooted, then
4. SetRequest: The SetRequest message is sent from a it informs the manager as well as sends the
manager to the agent to set a value in a variable. time of rebooting.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
FTP
• FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one
host to another.
• It is also used for downloading the files to computer from other servers.
Objectives of FTP
• It provides the sharing of files.
• It is used to encourage the use of remote computers.
• It transfers the data more reliably and efficiently.
Why FTP?
• Although transferring files from one system to another is very simple and straightforward, but
sometimes it can cause problems. For example, two systems may have different file
conventions. Two systems may have different ways to represent text and data. Two systems
may have different directory structures. FTP protocol overcomes these problems by
establishing two connections between hosts. One connection is used for data transfer, and
another connection is used for the control connection.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
FTP
• Mechanism of FTP
The figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process,
and data transfer process. The server has two components:
the server control process and the server data transfer
process.
There are two types of connections in FTP:
1. Control Connection: The control connection uses very
simple rules for communication. Through control
connection, we can transfer a line of command or line
of response at a time. The control connection is made
between the control processes. The control
connection remains connected during the entire
interactive FTP session.
2. Data Connection: The data connection is made
between data transfer processes. The data connection
opens when a command comes for transferring the
files and closes when the file is transferred.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
FTP
FTP Clients
• FTP client is a program that implements a file transfer protocol which allows you to transfer files between two hosts on
the internet.
• It allows a user to connect to a remote host and upload or download the files.
• It has a set of commands that we can use to connect to a host, transfer the files between you and your host and close
the connection.
Advantages of FTP:
• Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to transfer the files from one
computer to another computer.
• Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.
• Security: To access the FTP server, we need to login with the username and password. Therefore, we can say that FTP is
more secure.
• Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a manager of the company,
you send some information to all the employees, and they all send information back on the same server.
Disadvantages of FTP:
• FTP serves two operations, i.e., to send and receive large files on a network. However, the size limit of the file is 2GB that
can be sent. It also doesn't allow you to run simultaneous transfers to multiple receivers.
• Passwords and file contents are sent in clear text. So, it is quite possible that attackers can carry out the brute force
attack by trying to guess the FTP password.
• It is not compatible with every system.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
HTTP & WWW
• HTTP stands for HyperText Transfer Protocol.
• It is a protocol used to access the data on the World Wide Web (www).
• The HTTP protocol can be used to transfer the data in the form of plain text, hypertext,
audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its efficiency that
allows us to use in a hypertext environment where there are rapid jumps from one
document to another document.
• HTTP is similar to the FTP as it also transfers the files from one host to another host.
But, HTTP is simpler than FTP as HTTP uses only one connection, i.e., no control
connection to transfer the files.
• HTTP is similar to SMTP as the data is transferred between client and server. The HTTP
differs from the SMTP in the way the messages are sent from the client to the server
and from server to the client. SMTP messages are stored and forwarded while HTTP
messages are delivered immediately.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
HTTP & WWW
Features of HTTP:
• Connectionless protocol: HTTP is a connectionless protocol.
HTTP client initiates a request and waits for a response from
the server. When the server receives the request, the server
processes the request and sends back the response to the
HTTP client after which the client disconnects the
connection. The connection between client and server exist
only during the current request and response time only.
• Media independent: HTTP protocol is a media independent
as data can be sent as long as both the client and server
know how to handle the data content. The above figure shows the HTTP
• Stateless: HTTP is a stateless protocol as both the client and transaction between client and server.
server know each other only during the current request. The client initiates a transaction by
sending a request message to the
server. The server replies to the request
message by sending a response
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India message.
HTTP & WWW
Messages
• HTTP messages are of two types: request and response. Both the message
types follow the same message format.
• Request Message: The request message is sent by the client that consists of
a request line, headers, and sometimes a body.

• Response Message: The response message is sent by the server to the


client that consists of a status line, headers, and sometimes a body.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Uniform Resource Locator (URL)
• A client that wants to access the document in an internet needs an address and to facilitate the access of
documents, the HTTP uses the concept of Uniform Resource Locator (URL).
• The Uniform Resource Locator (URL) is a standard way of specifying any kind of information on the internet.
• The URL defines four parts: method, host computer, port, and path.
• Method: The method is the protocol used to retrieve the document from a server. For example, HTTP.
• Host: The host is the computer where the information is stored, and the computer is given an alias name.
Web pages are mainly stored in the computers and the computers are given an alias name that begins with
the characters "www". This field is not mandatory.
• Port: The URL can also contain the port number of the server, but it's an optional field. If the port number is
included, then it must come between the host and path and it should be separated from the host by a
colon.
• Path: Path is the pathname of the file where the information is stored. The path itself contain slashes that
separate the directories from the subdirectories and files.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Security: Cryptography
• The main aim of any organization is to protect their data from attackers.
Security:
Ensuring the (secrecy) confidentiality, data integrity and availability of
components of computer system.
1. Network security – measures to protect data during their transmission.
2. Internet security - measures to protect data during their transmission over a
collection of interconnected networks.
3. Computer security – the protection to an automated information system in
order to preserve the integrity, availability and confidentiality of information
system resources.
Security Services/Requirements
1. Confidentiality
2. Integrity
3. Availability
4. Authentication
5. Non-Repudiation
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Security: Cryptography
Confidentiality:
• Assures that private or confidential information is not made available or disclosed
to unauthorized individuals.
• Specifies that only the sender and receiver will be able to access the information
shared between them.
Integrity:
• Integrity gives the assurance that the information received is exact and accurate.
• If the content of the message is changed after the sender sends it but before
reaching the intended receiver, then it is said that the integrity of the message is
lost.
Availability:
• The principle of availability states that the resources and information will be
available to authorized party at all times.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Security: Cryptography
Authentication:
• Authentication is the mechanism to identify the user or system or the entity.
• It ensures the identity of the person trying to access the information.
• The authentication is mostly secured by using username and password.
• The main objective of authentication is to allow authorized users to access the
computer and to deny access to the unauthorized users.
Non-repudiation:
• Non-repudiation is a mechanism that prevents the denial of the message content
sent through a network.
• In some cases, the sender sends the message and later denies it. But the non-
repudiation does not allow the sender to refuse the receiver.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
security attack
• A security attack is an activity or act made upon a system with the goal to obtain
unauthorized access to information or resources.
• Goal of security attack - is to compromise one or more of the five major security
requirements: Confidentiality, Availability, Authentication, Integrity, and
Nonrepudiation.
Types of Attack

Passive Attack:
– Just to obtain information.
– Does not Modify or harm the system.
Active Attack:
– May Change the Data and harm the system.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Cryptography
Cryptography, a word with Greek origins, means "secret writing.
Cryptography can provide confidentiality, integrity, authentication, and non-repudiation of
messages.
• Cryptography is technique of securing information and communications
through use of codes so that only those person for whom the information is
intended can understand it and process it. Thus preventing unauthorized
access to information.
• The prefix “crypt” means “hidden” and suffix “graphy” means “writing”.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Cryptograph
The original message, before being transformed, is called plaintext.
After the message is transformed, it is called cipher text
Types of Cryptography:-

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gwalior, Madhya Pradesh, India
Symmetric Key Algorithm :-

In symmetric key cryptography, the same key is used by the sender (for encryption) and the
receiver (for decryption).
The key is shared.

Two Types of Symmetric Key :-


 Traditional algorithms, which were character-oriented.
 Modem ones, which are bit-oriented.
Key Features:
•Single Key: Both encryption and decryption are performed using
the same secret key.
•Speed and Efficiency: Symmetric algorithms are generally
faster and more efficient than asymmetric algorithms, making
them suitable for encrypting large volumes of data.
•Key Sharing: The primary challenge is securely sharing the
secret key between the sender and receiver before
communication can begin.
•Common Algorithms: Popular symmetric algorithms include
AES, DES, 3DES, and Blowfish.
•Applications: Used in various applications like file encryption,
secure data storage, and VPNs.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
How it works:
1.Key Agreement: The sender and receiver agree on a secret key.
2.Encryption: The sender uses the secret key to encrypt the plaintext
message into ciphertext.
3.Transmission: The encrypted ciphertext is transmitted to the
receiver.
4.Decryption: The receiver uses the same secret key to decrypt the
ciphertext and retrieve the original plaintext message.

Strengths:
•Speed and Efficiency: Symmetric algorithms are computationally
faster and more efficient than asymmetric algorithms, making them
suitable for encrypting large amounts of data.
•Simplicity: The use of a single key simplifies the encryption and
decryption process.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Weaknesses:
•Key Sharing:
The primary challenge is securely sharing the secret key between
the sender and receiver before communication can begin. If the key
is compromised, the entire communication can be compromised.
•Limited Key Management:
Symmetric key cryptography is not ideal for managing a large
number of keys or for situations where secure key distribution is
challenging.

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Asymmetric Key (Public-Key) Algorithm :-

Asymmetric key cryptography, also known as public-key cryptography, is a


cryptographic method that utilizes a pair of mathematically related keys: a public
key and a private key. The public key can be shared freely, while the private key
must be kept confidential.
Key Features:
•Key Pair:
Asymmetric cryptography uses a pair of keys, one public and one
private, that are mathematically linked.
•Public Key:
Anyone can use the public key to encrypt data, but only the recipient
with the corresponding private key can decrypt it.
•Private Key:
The private key is kept secret and is used for decryption.
•Secure Communication:
This system allows for secure communication by enabling encryption
and decryption, as well as digital signatures.
•Digital Signatures:
The private key can be used to create a digital signature, which verifies
the authenticity and integrity of a message.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
How it Works:
1.Key Generation: A user generates a key pair consisting of a public
key and a private key.
2.Public Key Distribution: The public key is shared openly with others
who want to communicate with the user.
3.Encryption: To encrypt a message, the sender uses the recipient's
public key.
4.Decryption: The recipient uses their private key to decrypt the
message.

Benefits:
•No Key Exchange Required: Unlike symmetric encryption, where
keys need to be securely exchanged, asymmetric cryptography only
requires the public key to be shared.
•Secure Communication: It provides strong security for
communication and data transmission.
•Digital Signatures: It enables digital signatures for authentication and
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Limitations:
•Computational Complexity: Asymmetric encryption is generally
slower than symmetric encryption.
•Key Length: Asymmetric algorithms often require longer keys
compared to symmetric algorithms, which can lead to higher
computational overhead.

Examples of Asymmetric Algorithms:


•RSA: A widely used algorithm for encryption and digital
signatures.
•ECC: Elliptic Curve Cryptography, another popular algorithm for
digital signatures and key exchange.
•Diffie-Hellman: A key exchange algorithm used to establish a
shared secret key

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
User Authentication
• Five Common Types of User Authentication
1. Password-Based Authentication:-Passwords can be made up of numbers, letters, or special
characters; the strongest combine all these options.
2. Multi-Factor Authentication:-Multi-Factor Authentication (MFA) requires two or more
independent means of identifying a user. Examples of MFA include codes generated from a user's
smartphone, captcha tests, voice biometrics, facial recognition, and fingerprints.
3. Certificate-Based Authentication:-Certificate-based authentication technologies use digital
certificates to identify users. These certificates are electronic documents similar to passports or
driver's licenses.
4. Biometric Authentication:-This security process uses the unique biological characteristics of an
individual.
5. Token-Based Authentication:-Using token-based authentication, users log in to their credentials
once and receive a unique encrypted string of random characters. The token is further used to
access the protected systems. The purpose of the digital token is to prove that the access
permission is already with you.
Security Protocols in Internet
Security protocols in the internet are essential for ensuring secure
communication and protecting data from unauthorized access and
cyber threats.

They are implemented at various levels of the network, from the


application layer to the network layer, and utilize encryption,
authentication, and integrity checks to safeguard data
transmission.

Key Security Protocols:


• SSL/TLS (Secure Sockets Layer/Transport Layer Security):
• These protocols provide secure communication between a web
browser and a web server, ensuring that data transmitted
between them is encrypted and protected from eavesdropping.
• IPSec (Internet Protocol Security):
• IPSec is a suite of protocols that provides secure communication at
the network layer, encrypting and authenticating data packets.
Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
• HTTPS (Hypertext Transfer Protocol Secure):
• HTTPS is a secure version of HTTP, which uses SSL/TLS to encrypt data
transmitted between a web server and a client.
• SSH (Secure Shell):
• SSH is a network protocol that provides secure remote login and secure file
transfer, protecting against unauthorized access and data interception.
• Kerberos:
• Kerberos is a network authentication protocol that uses symmetric key
cryptography to verify the identity of users and services, often used in
conjunction with single sign-on (SSO).
• DNS over HTTPS/TLS:
• These protocols secure DNS (Domain Name System) queries, preventing
eavesdropping and man-in-the-middle attacks by encrypting the communication
between a client and a DNS server.
• VPNs (Virtual Private Networks):
• VPNs use encryption and security protocols like IPSec or SSL/TLS to create a
secure tunnel for data transmission, protecting data when connecting to public
networks. Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
How Security Protocols Work:
• Encryption:
• Security protocols employ encryption techniques to convert data into an unreadable
format, protecting it from unauthorized access during transmission.
• Authentication:
• Protocols use authentication mechanisms to verify the identity of users or devices,
ensuring that only authorized parties can access sensitive information.
• Integrity Checks:
• These protocols use checksums or hashes to verify that data has not been altered
during transmission, ensuring data integrity.
• Confidentiality:
• Security protocols ensure that only the intended recipient can view the data,
preventing unauthorized access and eavesdropping

Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity Univ
ersity, Gwalior, Madhya Pradesh, India
Firewall
• A firewall can be defined as a special type of network security device or a software
program that monitors and filters incoming and outgoing network traffic based on a
defined set of security rules.
• It acts as a barrier between internal private networks and external sources
• The primary purpose of a firewall is to allow non-threatening traffic and prevent
malicious or unwanted data traffic for protecting the computer from viruses and
attacks.
• A firewall is a cybersecurity tool that filters network traffic and helps users block
malicious software from accessing the Internet in infected computers.

44
Firewall Architected

45
Function of Firewall
• The firewall works as a gatekeeper.
• It analyzes every attempt coming to gain access to our operating system and prevents traffic from
unwanted or non-recognized sources.
• Firewall acts as a barrier or filter between the computer system and other networks
Firewalls have become so powerful, and include a variety of functions and capabilities with built-in
features:
 Network Threat Prevention
 Application and Identity-Based Control
 Hybrid Cloud Support
 Scalable Performance
 Network Traffic Management and Control
 Access Validation
 Record and Report on Events
46
Limitations of Firewall
Firewalls have some limitations:
 Firewalls cannot stop users from accessing malicious websites, making it
vulnerable to internal threats or attacks.
 Firewalls cannot protect against the transfer of virus-infected files or software.
 Firewalls cannot prevent misuse of passwords.
 Firewalls cannot protect if security rules are misconfigured.
 Firewalls cannot protect against non-technical security risks, such as social
engineering.
 Firewalls cannot stop or prevent attackers with modems from dialling in to or out
of the internal network.
 Firewalls cannot secure the system which is already infected.

47
Types of Firewalls

Depending on their structure and functionality, there are different types of firewalls. The following
is a list of some common types of firewalls:

 Proxy Firewall
 Packet-filtering firewalls
 Stateful Multi-layer Inspection (SMLI) Firewall
 Unified threat management (UTM) firewall
 Next-generation firewall (NGFW)
 Network address translation (NAT) firewalls

48

You might also like