[go: up one dir, main page]

0% found this document useful (0 votes)
27 views5 pages

Unit 8

The document discusses the Internet Network-Management framework, focusing on the Simple Network Management Protocol (SNMP) and its components, including the Structure of Management Information (SMI) and High-Level Information Base (HIB). It also covers encryption, cryptography, and the significance of firewalls in network security, detailing various encryption methods and firewall functionalities. Overall, the document emphasizes the importance of these technologies in managing, monitoring, and securing networks.

Uploaded by

dornabaskota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views5 pages

Unit 8

The document discusses the Internet Network-Management framework, focusing on the Simple Network Management Protocol (SNMP) and its components, including the Structure of Management Information (SMI) and High-Level Information Base (HIB). It also covers encryption, cryptography, and the significance of firewalls in network security, detailing various encryption methods and firewall functionalities. Overall, the document emphasizes the importance of these technologies in managing, monitoring, and securing networks.

Uploaded by

dornabaskota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Unit-VIII: Network management and Security

Internet Network-Management framework

The Internet Network-Management framework is a set of standard protocols and tools used to
manage and monitor networks, including devices such as routers, switches, and servers. The
framework is based on the Simple Network Management Protocol (SNMP), which is used to
collect and organize data about network devices and their performance.

Two important components of the Internet Network-Management framework are the Structure of
Management Information (SMI) and the High-Level Information Base (HIB).

The SMI is a standard that defines the structure and syntax for managing data in network
management systems. It provides a standardized way of organizing and describing data about
network devices and their behavior, such as the configuration settings of a router or the status of
a switch port. This standardization enables different network management systems to exchange
and use data in a consistent and interoperable way.

The HIB is a conceptual structure that describes the types of information that can be managed
using SNMP. It provides a way of organizing and categorizing the different types of data that can
be collected and managed by SNMP, such as information about network interfaces, routing
tables, or system performance.

Together, the SMI and HIB provide a framework for organizing, collecting, and managing data
about network devices and their behavior. This information can be used to monitor and optimize
network performance, troubleshoot issues, and plan for future network growth and expansion

SNMP protocol

The Simple Network Management Protocol (SNMP) is a standard protocol used to manage and

monitor network devices such as routers, switches, servers, and printers. SNMP is part of the

1|Page
Internet Network-Management framework, and it is widely used in both enterprise and service

provider networks.

SNMP is based on a client-server model. A network management system (NMS) acts as the

client, and the network devices being managed act as the servers. The NMS communicates with

the managed devices using SNMP messages, which are sent over the network using User

Datagram Protocol (UDP).

SNMP allows the NMS to collect and monitor various types of data about the managed devices,

such as the device's configuration settings, performance statistics, and error messages. SNMP

defines a hierarchical structure for organizing this data, which is called the Management

Information Base (MIB). The MIB is a tree-like structure that contains objects that can be

accessed and

SNMP is widely used in network management because it is simple, flexible, and widely

supported by network devices and management systems. It provides a powerful and standardized

way to monitor and manage network devices, which is essential for ensuring the reliability and

performance of modern computer networks

Encryption- Basis for Data and Message Security

Encryption is the method of using a mathematical algorithm (cipher) to transform


information/data into an unreadable format (called cipher text). Its purpose is to ensure
privacy by keeping the information hidden from anyone for whom it is not intended, even
those who can see the encrypted data. Or Encryption is the mutation of information in any
form (text, video, and graphics) into a representation unreadable by anyone without a
decryption key. Decryption is the reverse of encryption; it is the method of using algorithm

2|Page
that transforms encrypted information/data back into a readable format (called plain
text).Encryption and decryption require the use of some secret information, usually referred
to as a key. The key is what you use to "unlock" a message. Depending on the encryption
mechanism used, the same key might be used for both encryption and decryption, while for
other mechanisms, the keys used for encryption and decryption might be different.

Cryptography

Cryptography is the science of writing information in a “hidden” or “secret” form and is an very
old art. Cryptography is necessary when communicating data over any network, particularly the
Internet. It protects the data in transit and also the data stored on the disk. Some terms commonly
used in cryptography are:

Plaintext Ciphertext
Original
Encryption Decryption Plaintext

 Plain text: Plaintext is the original message that is an input, i.e. unencrypted data.
 Cipher text— It is the coded message or the encrypted data.

 Encryption— It is the process of converting plaintext to cipher text, using an encryption


algorithm.
 Decryption— It is the reverse of encryption, i.e. converting cipher text to plaintext, using
a decryption algorithm.

Secret/Symmetric/Private Key Cryptography

In secret key cryptography, a single/shared key is used for both encryption and decryption.
The sender uses the key (or some set of rules) to encrypt the plaintext and sends the
ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the
3|Page
message and recover the plaintext. Because a single key is used for both functions, secret
key cryptography is also called symmetric encryption. Shared-key techniques suffer from
the problem of key distribution, since shared keys must be securely distributed to each pair
of communicating parties. Secure key distribution becomes cumbersome in large networks.

Public Key Cryptography

Public-key techniques involve a pair of keys; a private key and a public key associated with
each user. Information encrypted by the private key can be decrypted only using the
corresponding public key. The private key, used to encrypt transmitted information by the
user, is kept secret. The public key is used to decrypt information at the receiver and is not
kept secret. Since only the bona fide author of an encrypted message has knowledge of the
private key, a successful decryption using the corresponding public key verifies the identity
of the author and ensures message integrity.

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. The primary goal of a firewall is to protect
a network from unauthorized access and potential cyber-attacks by filtering traffic based on a set
of defined security policies.

Firewalls can be implemented as software or hardware, or as a combination of both. They


typically work by examining data packets as they pass through the network, and applying a set of
rules to determine whether the packets should be allowed through or blocked.

Firewalls can be configured to allow or block traffic based on a variety of criteria, including:

 Source and destination IP addresses


 Source and destination ports
 Protocol type (e.g. TCP, UDP)
 Application type (e.g. HTTP, FTP, SMTP)

4|Page
Firewalls can be configured to operate in several different modes, including:

 Packet filtering: This mode filters packets based on their source and destination IP addresses,
ports, and protocols. It is the simplest and fastest form of firewall, but it can be less effective at
detecting and blocking more sophisticated attacks.
 Stateful inspection: This mode keeps track of the state of network connections and allows only
authorized traffic to pass through. It is more effective at blocking unauthorized traffic and
detecting attacks, but it can be more resource-intensive than packet filtering.
 Application-layer filtering: This mode filters traffic based on specific application-level protocols,
such as HTTP, FTP, and SMTP. It can be highly effective at detecting and blocking attacks that
use these protocols, but it can be more complex to set up and maintain than other modes.

Firewalls are an essential component of network security and are used in many different types of
networks, including enterprise networks, home networks, and cloud-based networks. They
provide an important layer of protection against cyber threats and help to ensure the privacy and
security of network user

5|Page

You might also like