Notes - COM31-IT213 Networking and Data Communication
Notes - COM31-IT213 Networking and Data Communication
Lecturer:
Mr Chinyerezi Kapenya
(M.Sc.IT, BBA C&MIS, CCNA-Instructor, PDGE, Computer
Hacking Forensic Investigation)
Introduction to Data Communication and Networking
What is an electronic device , these are components for controlling the flow of electrical
currents for the purpose of information processing and system control. These are used in
the data communication.
The Console Cable is used for the serial connection between your computer‘s
serial port and the console port on your TP-Link switch or router to access the
CLI (Command Line Interface) of the device.
10
Introduction to Data Communication and Networking
Cabling
A straight through cable is a type of twisted pair cable that is used in local
area networks to connect a computer to a network hub such as a router. This
type of cable is also sometimes called a patch cable
11
Introduction to LAN’S and WAN’S
Cabling
An Ethernet crossover cable is a type of Ethernet cable used to connect
computing devices together directly.
12
Introduction to Data Communication and Networking
Cabling
Usually, straight through cables are primarily used for connecting unlike
devices. And crossover cables are use for connecting unlike devices alike
devices.
Use straight through cable for the following cabling:
Switch to router
Switch to PC or server
Hub to PC or server
Use crossover cables for the following cabling:
Switch to switch
Switch to hub
Hub to hub
Router to router
Router Ethernet port to PC NIC
PC to PC
13
Introduction to Data Communication and Networking
Cabling
14
Introduction to Data Communication and Networking
Advantages of twisted pair cable
• It is the smallest amount expensive media of transmission of brief description.
• It is relatively easy for implementation and termination.
• If a portion of a twisted pair cable is broken it doesn‘t affect the whole network.
• It is inexpensive and readily available.
• It is flexible and lightweight.
• It is easy to work with it and install.
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Advantages:
Increased capacity and bandwidth
Lightweight
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Disadvantages:
Difficult to install and maintain
High cost
Fragile
Introduction to Data Communication and Networking
Three types of transmission modes
Based on the direction of data from sender to receiver, there can be 3 types of
transmission modes which are as follows
Simplex
Half-duplex
Duplex
Introduction to Data Communication and Networking
Three types of transmission modes
Simplex:
In simplex mode, among the two devices which are communicating with each
other, one device can only be a sender and the other can only be a receiver. Thus
the sender device will not receive data but will transmit data, and the receiver
device will only receive data but will not transmit or send any data. This
transmission is unidirectional.
Advantage
The sender can use the full capacity of the medium to transmit data, so more data
is transmitted at a time.
Disadvantage
One way connection, so no inter-communication between devices.
Introduction to Data Communication and Networking
Half-Duplex
In half-duplex, both devices which are communicating with each other can
send and receive data, but not at the same time, that is, when one device is
sending data then another device can only receive that data but can‘t send data
back. This is like a narrow bridge where vehicles from both end of the bridge
can cross the bridge but not at the same time.
In half-duplex, both devices can send and receive data and also entire capacity
of the transmission medium is used when transmitting data.
Disadvantage
As when one device is sending data then another one must wait, this can cause
delay in sending the data at the right time.
Introduction to Data Communication and Networking
Full-Duplex
In full-duplex or duplex mode, both devices can send and receive data at
the same time. Here is this transmission mode, data going in a direction
will share the capacity of the transmission medium with the data going in
another direction. This sharing can be obtained by two ways, such as, by
sharing the capacity of the medium, or having two physically separated
transmission paths.
Both parties can talk and listen to each other at the same time.
Disadvantages
Data communications are the exchange of data between two devices using one or
multiple forms of transmission medium using one of the three transmission
modes. That is, data communication is movement of data from one device or
end-point to another device or end point through electrical or optical medium.
Systems that facilitates this movement of data between devices or end-points are
called data communication network. There are 5 components of a data
communication network. The devices which are in need to be a part of a data
communication network made up of computer hardware and software.
Data communication networks collect data from devices such as microphone and
let the data to be carried to the receiver or destination such as a micro-computer
or minicomputer. However, it could be the opposite, that is data communication
networks can also carry data from a micro-computer or minicomputer to a device
such as printer. Data communications networks facilitate more efficient use of
computers and improve the day-to-day control of a business by providing faster
information flow. They also provide message transfer services to allow computer
users to talk to one another via electronic mail, chat, and video streaming.
Introduction to Data Communication and Networking
5 Components of Data Communication Network
Data
Sender
Receiver
Transmission Medium
Protocol
Introduction to Data Communication and Networking
Components of Data Communication Network
Data
Communication of data means a message or data will be
transmitted from one device and will be received in the
destination or target device. Thus the first component in a data
communication network is data or message to that needs to be
delivered and received. Data or message can be of various forms
such as text, audio, video, image or combinations of these forms
etc.
Sender
A source must send that to a destination. This source is the
sender. The device that sends the data to the destination or target
is the Sender. It can be a computer, cell phone, video camera and
so on.
Introduction to Data Communication and Networking
Components of Data Communication Network
Receiver
The destination of a transmitted data is the receiver which will
receive the data. The device that receives the data is the
Receiver. A receiver can again be a computer, cell phone, video
camera and so on.
Transmission medium
In data communication network, the transmission medium is the
physical path for the data to travel to its destination. Receiver
receives the data at one end of this path and the sender sent from
another end of the path. Transmission medium could be like
twisted-pair cable, coaxial cable, fiber-optic cable etc.
Introduction to Data Communication and Networking
Components of Data Communication Network
Protocol
A protocol is nothing but a set of rules that applies on the full data
communication procedure. This is like an agreement between the
two devices to successfully communicate with each other. For
example, how to send the data, how the data will be traveling,
how to ensure that full data has received, how to handle errors in
transmission etc. Both devices follow the same set of rules or
protocol so that they understand each other.
Introduction to Data Communication and Networking
Measuring Capacity of Communication
Data Transfer Rate Data travels in the form of signals over a channel. One
signal carries one or more bits over the channel. Data transfer rate is the number
of bits transmitted between source and destination in one second. It is also
known as bit rate. It is measured in terms of bits per second (bps). The higher
units for data transfer rates are:
1 Kbps=210 bps=1024 bps
1 Mbps=220 bps=1024 Kbps
1 Gbps=230 bps=1024 Mbps
1 Tbps=240 bps=1024 Gbps
Computer Hardware
Computer Hardware is any part of the computer that can be touched. These are
primarily electronic devices used to build up the computer. Computer
Hardware actually perform the computing operations along with taking input
and sending the computed result as output or to storing that.
Examples
What is a ―Network‖?
• A network is a way to get ―stuff‖ between 2 or more ―things‖
• A group or system of interconnected people or things
Examples: Mail, phone system, conversations, railroad system,
highways and roads.
34
Introduction to Networks
What is Computer Network
A computer network is a group of computer systems and other computing
hardware devices that are linked together through communication channels to
facilitate communication and resource-sharing among a wide range of users.
The smallest network is between two electronic devices and the largest network is
the World Wide Web (WWW) or internet. The World Wide Web also known as the
web, WWW or W3 refers to all the public websites or pages that users can access
on their local computers and other devices through the internet.
Introduction to Networks
Computer Network
Computer networks are commonly classified based on both their purpose and size.
Gain a better understanding of network classification as you explore several
different types of networks, including LAN, WAN, WLAN, MAN, SAN, and the
specific purposes of PAN, EPN, and VPN networks.
Types of Networks
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose. The size of a network can be
expressed by the geographic area they occupy and the number of computers that are
part of the network. Networks can cover anything from a handful of devices within
a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
• Personal area network, or PAN
• Local area network, or LAN
• Metropolitan area network, or MAN
• Wide area network, or WAN
Introduction to Networks
Computer Network
In terms of purpose, many networks can be considered general purpose, which
means they are used for everything from sending files to a printer to accessing the
Internet. Some types of networks, however, serve a very particular purpose.
Some of the different networks based on their main purpose are:
• Storage area network, or SAN
• Enterprise private network, or EPN
• Virtual private network, or VPN
The Internet
It is a collection of other networks, including other LANs and WANs. Hence, the name
INTERconnection of NETworks. In order to be connected to that worldwide Network, one
needs a ISP (Internet Service Provider). They are the companies who provide you service in
terms of internet connection to connect to the internet..
Examples of ISP in Zambia
• Afczas
• Airtel Zambia
• Bank-of-Zambia-vAS
• CITYCHannel
• Liquid Intelligent Technologies
• Mtn Zambia
• Paratus Telecommunications Zambia
• UUNET Africa, Lusaka Zambia
• ZAMREN
• ZAMTEL
Introduction to Networks
Computer Network
Metropolitan Area Network (MAN)
A metropolitan area network, or MAN, consists of a computer network across an
entire city, college campus or small region. A MAN is larger than a LAN, which is
typically limited to a single building or site. Depending on the configuration, this
type of network can cover an area from several miles to tens of miles. A MAN is
often used to connect several LANs together to form a bigger network. When this
type of network is specifically designed for a college campus, it is sometimes
referred to as a campus area network, or CAN.
Repeater
A repeater is an electronic device that amplifies the signal it receives. You can
think of repeater as a device which receives a signal and retransmits it at a higher
level or higher power so that the signal can cover longer distances, more than 100
meters for standard LAN cables. Repeaters work on the Physical layer.
Introduction to Networks
Computer Network
Common Network Device
Access Point
While an access point (AP) can technically involve either a wired or wireless
connection, it commonly means a wireless device. An AP works at the second OSI
layer, the Data Link layer, and it can operate either as a bridge connecting a standard
wired network to wireless devices or as a router passing data transmissions from one
access point to another.
Wireless access points (WAPs) consist of a transmitter and receiver (transceiver)
device used to create a wireless LAN (WLAN). Access points typically are separate
network devices with a built-in antenna, transmitter and adapter. APs use the wireless
infrastructure network mode to provide a connection point between WLANs and a
wired Ethernet LAN. They also have several ports, giving you a way to expand the
network to support additional clients. Depending on the size of the network, one or
more APs might be required to provide full coverage. Additional APs are used to allow
access to more wireless clients and to expand the range of the wireless network. Each
AP is limited by its transmission range — the distance a client can be from an AP and
still obtain a usable signal and data process speed. The actual distance depends on the
wireless standard, the obstructions and environmental conditions between the client and
the AP. Higher end APs have high-powered antennas, enabling them to extend how far
the wireless signal can travel.
Introduction to Networks
Computer Network
Types of network devices
Access Point
APs might also provide many ports that can be used to increase the network‘s size, firewall
capabilities and Dynamic Host Configuration Protocol (DHCP) service. Therefore, we get
APs that are a switch, DHCP server, router and firewall.
To connect to a wireless AP, you need a service set identifier (SSID) name. 802.11 wireless
networks use the SSID to identify all systems belonging to the same network, and client
stations must be configured with the SSID to be authenticated to the AP. The AP might
broadcast the SSID, allowing all wireless clients in the area to see the AP‘s SSID. However,
for security reasons, APs can be configured not to broadcast the SSID, which means that an
administrator needs to give client systems the SSID instead of allowing it to be discovered
automatically. Wireless devices ship with default SSIDs, security settings, channels,
passwords and usernames. For security reasons, it is strongly recommended that you change
these default settings as soon as possible because many internet sites list the default settings
used by manufacturers.
Access points can be fat or thin. Fat APs, sometimes still referred to as autonomous APs,
need to be manually configured with network and security settings; then they are essentially
left alone to serve clients until they can no longer function. Thin APs allow remote
configuration using a controller. Since thin clients do not need to be manually configured,
they can be easily reconfigured and monitored. Access points can also be controller-based or
stand-alone.
Introduction to Networks
Computer Network
Common Network Device
Having a solid understanding of the types of network devices available can help
you design and built a network that is secure and serves your organization well.
However, to ensure the ongoing security and availability of your network, you
should carefully monitor your network devices and activity around them, so you
can quickly spot hardware issues, configuration issues and attacks.
Introduction to Networks
Computer Network
Advantages of Networks
• Allow groups of users to exchange information and share data
• Allow easy and efficient communication among individuals, including electronic
mail (e-mail)
• Device sharing can reduce costs
• Data Storage: Al the data of the respective organization will be stored in a remote
server that can be accessed in any given time. Each and every employee within an
organization will be able to access them.
• Connecting Computers: A single network can be used to connect limited number of
computers interconnecting with each other. Hence, all the computers does not need
to have a ISP account, they can be functioned under the network with single unit.
• Problem Solving: Computer networking makes it possible for people all around the
world to troubleshoot and solve problems in lesser amount of time.
• Reliability: The information stored on the central server is considered to be
reliable. If one PC happens to loose the information, similar kind of data can be
accessed using another computer.
• Security and protection is already included with computer network.
Introduction to Networks
Disadvantages of Networks
• Robustness: The connected systems on a network entirely depend on the main server. In case if the
server breaks down, the system cannot be used anymore.
• Independence: Since networks are based on the centralized server, most of the decisions are made
themselves. This hinders the freedom of user who wants to use the computer as they desire.
• Malware Attack: Basically due to their interactions, a virus can easily spread between computers in
a network. Even if one of the computer happens to get infected with malware, there are high chances
of them spreading to remaining computers.
• Implementation: All though computer networks are considered to be cost effective, it is certainly not
when it is implemented. Setting up a computer network can be expensive. It depends on the number
of systems connected. Additionally, there must be separate cables and equipment's such as switches,
routers and hubs.
• Security: Unlike standalone computers, a computer connected to a network posses many security
risks. Since there are large number of users using the network. For large networks such as WAN,
hackers can easily access the network using specialized tools developed for this purpose.
• Productivity: One of the major problems of computer networking is that it can drastically decrease
the productivity of the company. When there is an internet access.
• Maintenance: For the proper functioning of a computer network, it requires regular maintenance.
The problem is this cannot be done with basic skills.
• Accessibility: Even though most of the modern computers provide free access, there are still
connectivity issues in some countries. Particularly countries those are developing, people residing
there suffer from connectivity challenges. Unless these challenges are resolved, there is no assurance
of true global network. 54
Introduction to Networks
Network Services
The Network especially the Internet is essentially designed for communications and
computing resources sharing. The basic services must be available on Network and Internet ‟
server‖ so that, from their computers at work or at home by joining the Internet you can:
• Exchange electronic mail (e-mail)
• Participate live (in real time) in a conversation with another person via the 'Internet video
phone' (like Skype), or audio-video conferencing between multiple people using a
specially designed computer programs and equipment.
• Participate in on-line (directly, in real time) written discussion with a larger group of
people who use the 'Internet Relay Chat' (IRC) service - chat rooms.
• To work on a remote computer using the 'Telnet' service.
• Take files of any type (download) from remote computers and deliver files (upload) them
with an FTP (File Transfer Protocol) service.
• Paying bills through the 'Internet Banking' (ebanking).
• Search the Web, documents, various web sites or via dedicated international service, as
'Google' and 'Yahoo!', oversubscribed keywords to find the desired documents.
• Publicly disclose their images or pictures, messages, voices and video through social
networks.
• Advertise your business in a variety of ways, from setting up video clips to the creation of
their own website.
• Read web editions of newspapers .
Introduction to Networks
Network Services
• Play simple games
• Reading complex documents using 'hypertext'. Clicking on a keyword or image on
the screen the user is automatically goes to other facilities within the same or other
domains.
• Read multimedia documents found on World Wide Web (www or web) that contain
text, graphics, sound, and video using intelligent browser web presentation, as
'Google Chrome', 'Firefox' or 'Internet Explorer' program support.
Network protocols and Standards
What is Network Protocols
A network protocol is an established set of rules that determine how data is transmitted
between different devices in the same network. Essentially, it allows connected devices
to communicate with each other, regardless of any differences in their internal
processes, structure or design. Network protocols are the reason you can easily
communicate with people all over the world, and thus play a critical role in modern
digital communications.
Similar to the way that speaking the same language simplifies communication between
two people, network protocols make it possible for devices to interact with each other
because of predetermined rules built into devices‘ software and hardware. Neither local
area networks (LAN) nor wide area networks (WAN) could function the way they do
today without the use of network protocols.
The following groups have defined and published different network protocols:
• The Institute of Electrical and Electronics Engineers (IEEE)
• The Internet Engineering Task Force (IETF)
• The International Organization for Standardization (ISO)
• The International Telecommunications Union (ITU)
• The World Wide Web Consortium (W3C)
While network protocol models generally work in similar ways, each protocol is unique
and operates in the specific way detailed by the organization that created it.
Network protocols and Standards
Who Uses Network Protocols?
Network protocols aren‘t only relevant to certified network specialists or IT
professionals. Billions of people use network protocols daily, whether they
know it or not. Every time you use the internet, you leverage network
protocols. Though you may not know how network protocols work or how
frequently you encounter them, they are necessary for using the internet or
digital communications in any capacity.
Encapsulation
A protocol defines how the data is encapsulated in the frame or packet. Each packet in all
PDUs contains three fields for control information along with the data field. There are three
control information fields such as Address, Error Control and Protocol Control.
Network protocols and Standards
The function of protocols
There is the various function of the protocol, which are as follows:
Segmentation and Reassembly
In a layered architecture, when the application entity sends data to another host's application
entity, it moves from the application layer to the physical layer of the same host. Then the
data packet travels on transmission media and then again from the physical layer to the
application layer of destination.
In this process, the lower level protocol breaks up the data into smaller blocks and adds extra
control information for peer-level use. This process is called Segmentation.
Similarly, when the packet reaches the destination and it moves from the lower level to the
upper-level. The upper level protocols recombine the blocks to get actual data after removing
control information added by the sender's lower level protocols. This is called reassembly.
Addressing
Addressing is a process of defining the address of entities during communication. The
concept of addressing is complex and includes addressing level, addressing scope, connection
identifiers and addressing modes.
Ordered Delivery
If the communicating machine is not connected directly, they are indirectly connected in a
network. There lies a possibility of data packets not reaching their destination in the same
sequence in which they were sent. The basic reason for a break of the sequence is that the
data units (PDUs) traverse different network paths.
Network protocols and Standards
The function of protocols
There is the various function of the protocol, which are as follows:
Error Control
The damage of data and loss of data must be adequately monitored when data transmission
takes place. The damage or error in data controls is detected by the error control methods
defined in the protocol. The error control is implemented in two steps as follows−
• Error Detection
• Retransmission of data
For error detection, some error detection code is sent by the sender with each PDU. The
receiver knows that code and checks if the code in the received data is correct or not. Suppose
any error is detected, the receiver requests the sender to retransmit the data. On the other
hand, if no error is detected, the receiver transmits an acknowledgement for correct receiving
data to the sender.
Flow Control
Flow control is also a necessary process to control the problems like congestion, overloading,
loss of data etc. Flow control is a function performed by the receiving machine to limit the
data rate being sent by the transmitting machine. The stop and wait protocols are the simplest
methods to control the data flow. Flow control is a must, especially if the communicating
machines have different transmission and reception data rates.
Network protocols and Standards
The function of protocols
There is the various function of the protocol, which are as follows:
Other Transmission Controls
Timing and Synchronization is one of the essential transmission controls. A protocol also
provides different additional services to communicating entities which include the following.
• Priority
• Quality of Service
• Security
Network protocols and Standards
History
Its development began in 1974, led by computer scientists Bob Kahn and Vint
Cerf. It is frequently used in conjunction with the Transmission Control
Protocol, or TCP. Together they are referred to as TCP/IP. The first major
version of the Internet Protocol was Version 4, or IPv4. In 1981, it was
formally defined in (Request For Comments) RFC 791 by the Internet
Engineering Task Force, or IETF. The successor to IPv4 is IPv6, which was
formalized by the IETF in 1998. It was designed to eventually replace IPv4.
As of 2018, IPv6 governs approximately 20% of all Internet traffic.
Network protocols and Standards
IP Addressing and Classes
An IP address is an address used to uniquely identify a device on an IP
network.
The address is made up of 32 binary bits which can be divisible into a
network portion and host portion with the help of a subnet mask.
32 binary bits are broken into four octets (1 octet = 8 bits)
Dotted decimal format (for example, 172.16.81.100)
Network ID – portion identifies the network where the computer sits
HOST ID – portion identifies the computer on that network
Network protocols and Standards
With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B,
Class C, Class D and Class E, while only A, B, and C are commonly used
Ranges 127.x.x.x are reserved for the loopback or local host, for
example, 127.0.0.1 is the loopback address. Range
255.255.255.255 broadcasts to all hosts on the local network.
Ping 127.0.0.1 to test the loopback and if the NIC is working
Network protocols and Standards
IP Addressing and Classes
Static DHCP
Network protocols and Standards
IP Addressing and Classes
2. Specifically, subnets:
Creates smaller broadcast domains.
Limit the amount of traffic on the other network segments.
Provide low-level security.
Can be created to match the physical layout or administrative structure of the organization.
Can be reserved for future growth.
Network protocols and Standards
IP Addressing and Subnetting
150.50.0.0 /16
Network protocols and Standards
IP Addressing and Subnetting
150.50.0.0 /16
150.50.0.0
150.50.3/16
.0 /24
150.50.4.0 /24
150.50.5.0 /24
Subnetting does not change how the outside world sees the network
but provides additional structure within the organization.
Network protocols and Standards
IP Addressing and Subnetting
Also, depends on whether you are an enterprise network or a service provider (ISP).
Network protocols and Standards
IP Addressing and Subnetting
• Subnet Mask - A Subnet mask is a 32-bit number that masks an IP address, and divides the IP
address into network address and host address.
• Network ID - Network ID is the portion of an IP address that identifies the TCP/IP network on
which a host resides. The network ID portion of an IP address uniquely identifies the host's network
on an internetwork, while the host ID portion of the IP address identifies the host within its network.
• Host ID - Host ID is a a specific piece of information which uniquely identifies a computer
• Broadcast ID - A broadcast address is a network address at which all devices connected to a
multiple-access communications network are enabled to receive datagrams. A message sent to a
broadcast address may be received by all network-attached hosts.
• Subnetting does not change how the outside world sees the network but provides additional structure
within the organization.
Network protocols and Standards
IP Addressing and Subnetting
Subnet /24 /25 /26 /27 /28 /29 /30 /31 /32
Mask
The remaining (from 32) bits subsequently define how large the given network
actually is.
Example - /24 - /32 = 8bits
Network protocols and Standards
IP Addressing and Subnetting
Class B
Class B network range starts from 128.0.0.0 to 191.255.255.255. It has Subnet mask
255.255.0.0 hence it has 16 network bits of which first two bits fixed as ‗10‘. So it has
a total of 14 the network bits and 16 host bits.
So total number of the network will be 2^14=16384
And the total number of hosts per network will be 2^16-2=65534
Network protocols and Standards
IP Addressing and Subnetting
Class C
Class C network range starts from 192.0.0.0 to 223.255.255.255. The subnet mask is
255.255.255.0 which means it has 24 network bits and the first three bits is fixed as
‗110‘. So it has a total of 21 network bits and 8 host bits.
Hence total no. of the network will be 2^21=2097152
And the total number of hosts per network will be 2^8-2=254
Calculating the IP usable for /29 ,/28 and /27 networking range.
/29
/29 represents 29 of the 32 bits of the address are the Netmask hence only 3 bits are
available to distinguish the computers.
However, you always lose 2 addresses from the block for broadcast and loopback, so
the result is:
2^(32-29) – 2 = 2^3 – 2 = 8 – 2 = 6
We have only 5 usable addresses on /29 allocations.
Network protocols and Standards
IP Addressing and Subnetting
/28
/28 denotes the 28 of the 32 bits of the address are the Netmask hence only 4 bits are
available to differentiate the computers.
However, you always lose 2 addresses for broadcast and loopback, so the result is:
2^(32-28) – 2 = 2^4 – 2 = 16 – 2 = 14
We have only 14 usable addresses on /28 allocations.
/27
/27 denote that 27 of the 32 bits of the address are the Netmask hence only 5 bits are
available to differentiate the computers.
However, you always lose 2 addresses for broadcast and loopback, so the result is:
2^(32-27) – 2 = 2^5 -2 = 32 – 2 =30
We have only 30 usable addresses on /27 allocations.
Network protocols and Standards
IP Addressing and Subnetting
Subnet /24 /25 /26 /27 /28 /29 /30 /31 /32
Mask
We have been given the IP address as 192.168.4.0 /24 you have been asked to create
3 subnets.
Subnet /24 /25 /26 /27 /28 /29 /30 /31 /32
Mask
The fist network id is the always the original network id. The next network id will be 0 +
64=64, 64+64 =128, 128+64 = 192 . Number of Usable Host ID can be found by getting the host
64 which is the total number of host IDs for each network. So to get the usable host we
subtract 64-2 = 62 as usable host, because we have removed the two bits(host ID) reserved for
network id and broadcast id. To get the Broadcast ID we should keep in mind that the one bit(
one host ID) has ben reserved for each broad cast ID. So we subtract 64 -1 = 63 +64. The Host
ID range is any Host id between the Network ID and the Broadcast ID.
Network protocols and Standards
Connectionless versus connection oriented protocols
A number of characteristics can be used to describe communications protocols. The most
important is the distinction between connection-oriented transport services (COTS) and
connectionless transport services (CLTS).
Connection-Oriented Protocols
TCP is an example of a connection-oriented protocol. It requires a logical connection to be
established between the two processes before data is exchanged. The connection must be
maintained during the entire time that communication is taking place, then released
afterwards. The process is much like a telephone call, where a virtual circuit is
established--the caller must know the person's telephone number and the phone must be
answered--before the message can be delivered. TCP/IP is also a connection-oriented
transport with orderly release. With orderly release, any data remaining in the buffer is sent
before the connection is terminated. The release is accomplished in a three-way handshake
between client and server processes. The connection-oriented protocols in the OSI protocol
suite, on the other hand, do not support orderly release. Applications perform any handshake
necessary for ensuring orderly release.
Network protocols and Standards
Connectionless versus connection oriented protocols
Connection-Oriented Protocols
Examples of services that use connection-oriented transport services
• telnet: Telnet is an application protocol used on the Internet or local area network to
provide a bidirectional interactive text-oriented communication facility using a virtual
terminal connection
• rlogin: rlogin is a Unix program that allows users to log in on another host using a
network. rlogin uses TCP port 513. rlogin is also the name of the application layer
protocol used by the software, also the protocol is part of the TCP/IP protocol suite.
• ftp: (File Transfer Protocol) is a network protocol for transmitting files between
computers over Transmission Control Protocol/Internet Protocol (TCP/IP) connections.
Within the TCP/IP suite, FTP is considered an application layer protocol.
Connectionless Protocols
Connectionless protocols, in contrast, allow data to be exchanged without setting up a link
between processes. Each unit of data, with all the necessary information to route it to the
intended destination, is transferred independent of other data packets and can travel over
different paths to reach the final destination. Some data packets might be lost in transmission
or might arrive out of sequence to other data packets.
UDP is a connectionless protocol. It is known as a datagram protocol because it is analogous
to sending a letter where you don't acknowledge receipt.
Network protocols and Standards
Connectionless versus connection oriented protocols
Connectionless Protocols
Examples of applications that use connectionless transport services are
• Broadcasting: Broadcasting is the distribution of audio or video content to a dispersed
audience via any electronic mass communications medium, but typically one using the
electromagnetic spectrum (radio waves), in a one-to-many model
• TFTP: Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol
which allows a client to get a file from or put a file onto a remote host.
Reasons
The reasons for using layered protocols are explained below:
• Layering of protocols provides well-defined interfaces between the layers, so that a change in
one layer does not affect an adjacent layer.
• The protocols of a network are extremely complicated and designing them in layers makes
their implementation more feasible.
Advantages
The advantages of layered protocols are as follows −
• Assists in protocol style, as a result of protocols that operate at a particular layer have outlined
information that they work and a defined interface to the layers on top of and below.
• Foster‘s competition because products from completely different vendors will work along.
• Prevents technology or capability changes in one layer from touching different layers above
and below.
• Provides a typical language to explain networking functions and capabilities.
Network protocols and Standards
Protocols in a layered Architecture
Disadvantages
The disadvantages of layered protocols are as follows:
• The main disadvantages of layered systems consist primarily of overhead each in computation
and in message headers caused by the abstraction barriers between layers. Because a message
typically should pass through several (10 or more) protocol layers the overhead of those
boundaries is commonly more than the computation being done.
• The upper-level layers cannot see what is within the lower layers, implying that an application
cannot correct where in an exceedingly connection a problem is or precisely what the matter is.
• The higher-level layers cannot control all aspects of the lower layers, so that they cannot
modify the transfer system if helpful (like controlling windowing, header compression,
CRC/parity checking, et cetera), nor specify routing, and should rely on the lower protocols
operating, and cannot specify alternatives when there are issues.
Network protocols and Standards
Protocols in a layered Architecture
What is OSI Model?
The OSI Model is a logical and conceptual model that defines network communication
used by systems open to interconnection and communication with other systems. The
Open System Interconnection (OSI Model) also defines a logical network and
effectively describes computer packet transfer by using various layers of protocols.
7. Application Layer
The application layer is used by end-user software such as web browsers and email clients. It
provides protocols that allow software to send and receive information and present meaningful data
to users.
A few examples of application layer protocols are the Hypertext Transfer Protocol (HTTP), File
Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and
Domain Name System (DNS).
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines how two devices should
encode, encrypt, and compress data so it is received correctly on the other end. The presentation
layer takes any data transmitted by the application layer and prepares it for transmission over the
session layer.
Some examples of presentation layer protocols are SSL stands for Secure Sockets Layer, HTTP/
HTML (agent), FTP (server), AppleTalk Filing Protocol, Telnet, and so on.
Network protocols and Standards
Protocols in a layered Architecture
7 Layers of the OSI Model
5. Session Layer
The session layer creates communication channels, called sessions, between devices. It is
responsible for opening sessions, ensuring they remain open and functional while data is being
transferred, and closing them when communication ends. The session layer can also set
checkpoints during a data transfer—if the session is interrupted, devices can resume data transfer
from the last checkpoint.
Other examples of session layer implementations include Zone Information Protocol (ZIP), the
AppleTalk protocol that coordinates the name binding process, and Session Control Protocol (SCP)
– the DECnet Phase IV session-layer protocol, (ADSP)AppleTalk Data Stream Protocol,
(NetBIOS) Network Basic Input Output System, (PAP) Password Authentication Protocol, (PPTP)
Point-to-Point Tunneling Protocol, (RPC) Remote Procedure Call Protocol, (RTCP)Real-time
Transport Control Protocol.
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks it into ―segments‖ on the
transmitting end. It is responsible for reassembling the segments on the receiving end, turning it
back into data that can be used by the session layer. The transport layer carries out flow control,
sending data at a rate that matches the connection speed of the receiving device, and error control,
checking if data was received incorrectly and if not, requesting it again.
Typical examples of layer 4 are the Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP).
Network protocols and Standards
Protocols in a layered Architecture
7 Layers of the OSI Model
3. Network Layer
The network layer has two main functions. One is breaking up segments into network packets, and
reassembling the packets on the receiving end. The other is routing packets by discovering the best
path across a physical network. The network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.
From a TCP/IP perspective, this is where IP addresses are applied for routing purposes.
• The TCP/IP protocols layout standards on which the internet was created, while the OSI model
provides guidelines on how communication has to be done. Therefore, TCP/IP is a more
practical model.
• The TCP/IP and OSI models have similarities and differences. The main similarity is in the
way they are constructed as both use layers, although TCP/IP consists of just four layers, while
the OSI model consists of the following seven layers
The upper layer for both the TCP/IP model and the OSI model is the application layer. Although
this layer performs the same tasks in each model, those tasks may vary depending on the data each
receives.
Network protocols and Standards
Protocols in a layered Architecture
Network protocols and Standards
Protocols in a layered Architecture
What is the TCP/IP model
The functions performed in each model are also similar because each uses a network layer and
transport layer to operate. The TCP/IP and OSI models are each mostly used to transmit data
packets. Although they will do so by different means and by different paths, they will still reach
their destinations.
The similarities between the TCP/IP model and the OSI model include the following:
• They are both logical models.
• They define networking standards.
• They divide the network communication process in layers.
• They provide frameworks for creating and implementing networking standards and devices.
• They enable one manufacturer to make devices and network components that can coexist and
work with the devices and components made by other manufacturers.
Network protocols and Standards
Protocols in a layered Architecture
What is the TCP/IP model
The differences between the TCP/IP model and the OSI model include the following:
• TCP/IP uses just one layer (application) to define the functionalities of the upper layers, while
OSI uses three layers (application, presentation and session).
• TCP/IP uses one layer (physical) to define the functionalities of the bottom layers, while OSI
uses two layers (physical and data link).
• The TCP/IP header size is 20 bytes, while the OSI header is 5 bytes.
• TCP/IP is a protocol-oriented standard, whereas OSI is a generic model based on the
functionalities of each layer.
• TCP/IP follows a horizontal approach, while OSI follows a vertical approach.
• In TCP/IP, the protocols were developed first, and then the model was developed. In OSI, the
model was developed first, and then the protocols in each layer were developed.
• TCP/IP helps establish a connection between different types of computers, whereas OSI helps
standardize routers, switches, motherboards and other hardware.
Network protocols and Standards
Open Systems Interconnection (OSI) model
Models, also called protocol stacks, represented in layers, help to understand where things
go right or wrong.
7 Application
4 Transport Transport
Protocol
3 Network Network
2 Data Local Network Data
1 Physical (LAN)
Physical
120
Wireless Networking Standards
Purpose of wireless network standard
Wireless standards are a set of services and protocols that dictate how your Wi-Fi network (and
other data transmission networks) acts. The most common wireless standards you will encounter
are the IEEE 802.11 Wireless LAN (WLAN) & Mesh.
The Institute of Electrical and Electronic Engineers (IEEE) develops official standards to
enable wireless local area network (WLAN) devices to work together, regardless of which
manufacturer made them. The IEEE updates the Wi-Fi standard every few years.
These standards are driven by two factors:
• speed - getting data transmitted faster between PCs and access points
• security - making sure that the wireless capability is not abused
You need to be aware of both factors when choosing wireless networking equipment.
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
The committee for IEEE 802 standards formed a working group for wireless local network
standards 802.11 in 1990. This group undertook development of the general standard for
radio equipment and networks working at 2.4 GHz, with access time of 1 and 2 Mbps
(Megabits-per-second). The works on development of the standard were completed in 7
years, and in June 1997 the first specification of the 802.11 was ratified. The IEEE 802.11 is
the first standard for WLAN products from an independent international organization
developing the most of standards for wired networks. But the first established data rate in a
wireless network didn't meet the requirements of users by that time. And the developers had
to create a new standard to make the Wireless LAN technology popular, cheap and attractive
for modern tough business applications.
In September 1999 the IEEE ratified the extension of the previous standard. The new IEEE
802.11b extension (also known as 802.11 High rate) defines a standard for products of
wireless networks working at 11 Mbps (similar to Ethernet), what allows using these devices
in large organizations. The compatibility of products from different manufacturers is ensured
by an independent organization named Wireless Ethernet Compatibility Alliance (WECA). It
was founded by the leaders of wireless communication industry in 1999. At present it
includes more than 80 companies such as Cisco, Lucent, 3Com, IBM, Intel, Apple, Compaq,
Dell, Fujitsu, Siemens, Sony, AMD etc. On the WECA's site you can look through the
products which meet the requirement of Wi-Fi (the WECA's term for IEEE 802.11b).
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
Not all old Wi-Fi standards are obsolete. At least, not yet. Here is a brief history of Wi-
Fi standards and whether the standard is still active.
• IEEE 802.11: The original! This now-defunct standard was created in 1997 and
supported a blazing fast maximum connection speed of 54 megabits per second
(Mbps). Devices using this haven't been made for over a decade and won't work
with today's equipment.
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
• IEEE 802.11a: Created in 1999, this version of Wi-Fi works on the 5GHz
band. This was done with the hope of encountering less interference since
many devices (like most wireless phones) also use the 2.4GHz band.
802.11a is fairly quick, too, with maximum data rates topping out at
54Mbps. However, the 5GHz frequency has more difficulty with objects in
the signal's path, so the range is often poor.
• IEEE 802.11b: Also created in 1999, this standard uses the more typical
2.4GHz band and can achieve a maximum speed of 11Mbps. 802.11b was
the standard that kick-started Wi-Fi's popularity.
• IEEE 802.11g: Designed in 2003, the 802.11g standard upped the
maximum data rate to 54Mbps while retaining use of the reliable 2.4GHz
band. This resulted in the widespread adoption of the standard.
• IEEE 802.11n: Introduced in 2009, this version had slow initial adoption.
802.11n operates on both 2.4GHz and 5GHz, as well as supporting multi-
channel usage. Each channel offers a maximum data rate of 150Mbps,
which means the standard's maximum data rate is 600Mbps.
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
• IEEE 802.11ac: The ac standard is what you will find most wireless devices
using at the time of writing. Initially released in 2014, ac drastically
increases the data throughput for Wi-Fi devices up to a maximum of 1,300
megabits per second. Furthermore, ac adds MU-MIMO support, additional
Wi-Fi broadcast channels for the 5GHz band, and support for more antennas
on a single router.
• IEEE 802.11ax: Next up for your router and your wireless devices is the ax
standard. As 802.11ax completes its rollout, you will have access to
theoretical network throughput of 10Gbps—around a 30-40 percent
improvement over the ac standard. Furthermore, wireless ax will increase
network capacity by adding broadcast subchannels, upgrading MU-MIMO,
and allowing more simultaneous data streams.
• IEEE 802.11be: Although the specifications for 802.11be are yet to be
finalized, its highly likely that this will become the successor to 802.11ax.
As per the IEEE Xplore paper, 802.11be will deliver "doubled bandwidth
and the increased number of spatial streams, which together provide data
rates as high as 40 Gbps."
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
Like all IEEE 802 standards, the 802.11 works on two lower levels of the ISO/OSI model: a
physical and data link. Any network applications, a network operating system or a protocol (e.g.,
TCP/IP) will work perfectly in the 802.11 network as in the Ethernet.
The 802.11 deals with two types of equipment - a client which is a computer equipped with a
wireless Network Interface Card (NIC), and an Access point (AP) which serves a bridge between a
wireless and wired networks. An access point usually contains a transceiver, a wired network
interface (802.3) and software for data processing. ISA, PCI or PC Card network cards in the
802.11 standard or integrated solutions (e.g. telephone garniture of the 802.11) can serve a wireless
station.
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
Over the past 24 years, IEEE 802.11, commonly referred to as Wi-Fi, has evolved from 2 Mbps to
multi-gigabit speeds, a 1,000-fold increase in throughput. The standard has continuously advanced
itself by introducing new protocols such as 802.11n, 802.11ac, and 802.11ax (Wi-Fi 6).
Wireless Networking Standards
Purpose of wireless network standard
Development of the wireless network standard
Can All Wi-Fi Standards Communicate?
Two devices using the same Wi-Fi standard can communicate without
restriction. Issues arise, however, when you try to connect two devices that use
different, potentially incompatible wireless standards.
• In recent times, your router and devices using 802.11ac can communicate
happily.
• Devices that use 802.11b, g, and n can all communicate with an ac router.
• 11b cannot communicate with a, and vice versa.
• 11g cannot communicate with b, and vice versa.
The original 1997 standard (now known as 802.11 legacy) is now obsolete,
while the a and b standards are nearing the end of their lifespan.
Wireless Networking Standards
Wireless access point
A wireless access point (WAP), or more generally just access point (AP), is a
networking hardware device that allows other Wi-Fi devices to connect to a wired
network. As a standalone device, the AP may have a wired connection to a router, but, in
a wireless router, it can also be an integral component of the router itself. An AP is
differentiated from a hotspot which is a physical location where Wi-Fi access is
available.
An access point connects to a wired router, switch, or hub via an Ethernet cable, and
projects a WiFi signal to a designated area.
Wireless Networking Standards
Wireless Access Point
• A wireless communications hardware device that creates a central point of wireless
connectivity. A wireless access point behaves much like a "hub" in that the total
bandwidth is shared among all users for which the device is maintaining an active
network connection.
Wireless Port
• A network port that has been installed to connect a wireless access point to the
University's wired network. Wireless ports provide both data and power service to
the wireless access point and are clearly distinguished from ordinary network ports
by an affixed yellow warning label. Because wireless ports carry both data and
electrical power, ordinary end-user devices could be severely damaged if they are
connected to this type of port.
WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security protocol.
It was the privacy component established in the IEEE 802.11, a set of technical standards that
aimed to provide a wireless local area network (WLAN) with a comparable level of security
to a wired local area network (LAN). The Wi-Fi Alliance ratified WEP as a security standard
in 1999. The Wi-Fi Alliance officially retired WEP in 2004
WPA (Wi-Fi Protected Access) is a wireless security protocol released in 2003 to address the
growing vulnerabilities of its predecessor, WEP. The WPA Wi-Fi protocol is more secure than
WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit
and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity
Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.
TKIP is much more secure than the fixed-key system used by WEP.
Wireless Networking Standards
Security & WPA
WEP vs WPA vs WPA2
WPA2 is the more recent wireless security protocol protecting wireless networks, so it‘s generally your
best option when looking to secure your Wi-Fi network. Let‘s take a look at the pros and cons of each
security protocol, ordered from best to worst.
WPA2
Pros:
Addresses many security flaws of its predecessors
Uses the strongest encryption method: AES
Required by the Wi-Fi Alliance for use on all Wi-Fi certified products
256-bit key for encryption
Cons:
Still contains some security vulnerabilities
Requires the most processing power
WPA
Pros:
Addresses security vulnerabilities of the original wireless security standard, WEP
TKIP encryption method is better than the fixed-key encryption used by WEP
256-bit key for encryption
Cons:
When rolled out onto WEP devices, TKIP can be exploited
Similar security vulnerabilities to WEP
Wireless Networking Standards
Security & WPA
WEP
Pros:
Better than no security protocol — though not by much
Cons:
Riddled with security vulnerabilities
Only 64-bit and 128-bit keys for encryption
Fixed-key encryption
Hard to configure
Network Topologies and Architectures
Network topology is the topological structure of a network and may be depicted physically
or logically. It is an application of graph theory wherein communicating devices are modeled
as nodes and the connections between the devices are modeled as links or lines between the
nodes.
• Physical – The physical network topology refers to the actual connections (wires, cables,
etc.) of how the network is arranged. Setup, maintenance, and provisioning tasks require
insight into the physical network.
• Logical – The logical network topology is a higher-level idea of how the network is set
up, including which nodes connect to each other and in which ways, as well as how data
is transmitted through the network. Logical network topology includes any virtual and
cloud resources.
Network architecture refers to the way network devices and services are structured to serve
the connectivity needs of client devices. Network devices typically include switches and
routers. Types of services include DHCP and DNS
Network Topologies and Architectures
Client / Sever
In client-server network relationships, certain computers act as servers and others act as
clients.
A server is simply a computer that provides the network resources and provides service to
other computers when they request it.
A client is the computer running a program that requests the service from a server. Local area
network (LAN) is based on client server network relationship.
Advantages
The advantages of client server network are as follows:
• It is very secure.
• Gives better performance.
• It has centralized backup.
• It is very reliable.
Disadvantages
The disadvantages of client server network are as follows −
• It requires professional administration.
• It is more hardware and software intensive.
• It requires expensive dedicated software.
A client-server network is one on which all available network resources such as files,
directories, applications and shared devices, are centrally managed and hosted and then are
accessed by the client.
Network Topologies and Architectures
In peer-to-peer (P2P) networking, a group of computers are linked together with equal
permissions and responsibilities for processing data.
A peer-to-peer (P2P) network is also created when two or more PCs are connected and share
resources without going through a separate server computer. A P2P network can be an ad hoc
connection—a couple of computers connected via a Universal Serial Bus to transfer files. A
P2P network also can be a permanent infrastructure that links a half-dozen computers in a
small office over copper wires. Or a P2P network can be a network on a much grander scale
in which special protocols and applications set up direct relationships among users over the
Internet.
Network Topologies and Architectures
Why Is Network Topology Important?
The layout of your network is important for several reasons.
• it plays an essential role in how and how well your network functions.
• Choosing the right topology for your company‘s operational model can increase performance
while making it easier to locate faults, troubleshoot errors, and more effectively allocate
resources across the network to ensure optimal network health.
• A streamlined and properly managed network topology can increase energy and data
efficiency, which can in turn help to reduce operational and maintenance costs.
The design and structure of a network are usually shown and manipulated in a software-created
network topology diagram. These diagrams are essential for a few reasons, but especially for how
they can provide visual representations of both physical and logical layouts, allowing
administrators to see the connections between devices when troubleshooting.
The way a network is arranged can make or break network functionality, connectivity, and
protection from downtime. The question of, ―What is network topology?‖ can be answered with an
explanation of the two categories in the network topology.
• Physical – The physical network topology refers to the actual connections (wires, cables, etc.)
of how the network is arranged. Setup, maintenance, and provisioning tasks require insight into
the physical network.
• Logical – The logical network topology is a higher-level idea of how the network is set up,
including which nodes connect to each other and in which ways, as well as how data is
transmitted through the network. Logical network topology includes any virtual and cloud
resources.
Network Topologies and Architectures
What’s the Most Common Type of Network Topology?
Building a local area network (LAN) topology can be make-or-break for your business, as
you want to set up a resilient, secure, and easy-to-maintain topology. There are several
different types of network topology and all are suitable for different purposes, depending on
the overall network size and your objectives.
Bus Topology
A bus topology orients all the devices on a network along a single cable running in a single
direction from one end of the network to the other—which is why it‘s sometimes called a
―line topology‖ or ―backbone topology.‖ Data flow on the network also follows the route of
the cable, moving in one direction.
Network Topologies and Architectures
What’s the Most Common Type of Network Topology?
Bus Topology
Advantages of Bus Topology
• Bus topologies are a good, cost-effective choice for smaller networks because the
layout is simple, allowing all devices to be connected via a single coaxial or RJ45
cable. If needed, more nodes can be easily added to the network by joining
additional cables.
Disadvantages of Bus Topology
• However, because bus topologies use a single cable to transmit data, they‘re
somewhat vulnerable. If the cable experiences a failure, the whole network goes
down, which can be time-consuming and expensive to restore, which can be less of
an issue with smaller networks.
Bus topologies are best suited for small networks because there‘s only so much
bandwidth, and every additional node will slow transmission speeds.
Ring topology
Ring topology is where nodes are arranged in a circle (or ring). The data can travel
through the ring network in either one direction or both directions, with each device
having exactly two neighbors.
Network Topologies and Architectures
What’s the Most Common Type of Network Topology?
Ring topology
• Confidentiality means that data, objects and resources are protected from unauthorized
viewing and other access.
• Integrity means that data is protected from unauthorized changes to ensure that it is reliable
and correct.
• Availability means that authorized users have access to the systems and the resources they
need.
• Authentication enables organizations to keep their networks secure by permitting only
authenticated users or processes to gain access to their protected resources.
Network Security
Common forms of networking attacks
Vulnerabilities in the network will leave your organization open to a wide range of attacks
such as:
• Virus: A virus cannot execute itself and requires some form of user interaction — the
simplest is an email with a malicious link or attachment.
• Malware: Malware is one of the fastest ways of spreading malicious attacks.
• Worm: A vulnerable network application can be attacked without the user being involved
through a worm.
• Phishing: Phishing is frequently associated with network attack . In phishing attacks, a
user receives emails that come disguised as being from a known and trusted source.
• Denial of service (DoS) and distributed denial of service (DDoS): In denial of service
(DoS), a single network or even an entire infrastructure can be destroyed, partially or
entirely by a DoS, which does not allow any verified access.
• DNS and IP spoofing: In domain name system(DNS) spoofing , hackers corrupt the
DNS data and insert the attacker‘s cache. As a result, the name server turns in the wrong
IP address during a search.
• Compromised key: An attacker can access secure communication with the help of a
compromised key.
Network Security
Types of Network Security With Examples
Let‘s understand the different types of network security with the help of examples.
• Application Security : Application security involves steps that a developer
undertakes to spot, repair, and prevent security vulnerabilities at any point in the
application‘s development.
• Data Loss Prevention : Data loss prevention involves taking measures to prevent
employees from sharing data outside a prescribed network. It ensures that all
information is transmitted safely.
• Email Security: Email gateways are weak links that are often the source of a
security breach. When phishing attacks are refined with social engineering tactics,
emails are the primary source of these attacks.
• 5Virtual Private network (VPN): VPN creates a secure tunnel for information
passage on the internet. The tunnel is encrypted from originating point to destination
point, ensuring all data transmitted and received is protected.
• Firewalls : Firewalls are the barriers between an internal and external network, such
as the internet. They use a prescribed set of protocols to regulate incoming and
outgoing traffic on the network.
Firewall
Firewall definition
A firewall is a computer network security system that restricts internet traffic in to, out
of, or within a private network. The firewall is a Hardware or software that selectively
block or allow data packets. It is typically intended to help prevent malicious activity
and to prevent anyone—inside or outside a private network—from engaging in
unauthorized web activities.
Firewall
Features of Firewall
Bandwidth control and monitoring
Bandwidth control―sometimes referred to as traffic shaping―is one of the best firewall
features. We don‘t always have unlimited amounts of bandwidth. That means it‘s vital to
take control of the bandwidth we do have available. With a firewall, you can control the
bandwidth available for sites, applications, and users.
Web filtering
You can think of a web filter firewall as a content filtering firewall. A web filter firewall
is defined as a software program that oversees the data packets that your computer sends
and receives. In doing this, it filters any compromising content that has been forbidden
or flagged.
Logging
Having access to logs on a firewall gives you up-to-the-minute information about what
is happening on your network. Sought after firewall features include being able to give
graphs in real time and show you what vulnerabilities or attacks are happening.
Virtual Private Networks
Virtual Private Network (VPN) are networks that are built using public wires (usually
the internet) to connect remote users or regional offices to a company‘s private, internal
network. VPNs are great for users connecting back to a site or the office. They can also
be used to connect two sites together.
Firewall
Features of Firewall
Malware and virus filtering
Next generation firewalls are always filtering for malware, new and old, and are your perimeter
defense mechanisms. This includes scanning for viruses, compromised websites, files containing
viruses, bot nets trying to hack you, man-in-the-middle attacks―you name it! They can even scan
encrypted traffic, such as SSL and TLS connections, to make sure they are safe and trusted.
Intrusion prevention system
An intrusion prevention systems (IPS) is the latest advancements from intrusion detection systems
(IDS). IPS continually monitors your network, capturing information about possible malicious
attacks. These events are then reported to the system administrator(s), who take preventative steps
like closing access points and configuring firewalls to prevent future attacks.
Firewall
How Firewalls Works
Firewalls are software or hardware that work as a filtration system for the data attempting to enter
your computer or network. Firewalls scan packets for malicious code or attack vectors that have
already been identified as established threats. Should a data packet be flagged and determined to be
a security risk, the firewall prevents it from entering the network or reaching your computer.
There are several different ways security firewalls can monitor and regulate network traffic. These
methods can include:
Packet filtering. Packets are small amounts of data. When a firewall uses packet filtering, the
packets attempting to enter the network are run against a group of filters. These filters remove the
packets that match certain identified threats and allow the others through to their intended
destination.
Proxy service. These firewalls are incredibly secure, but they come with their own drawbacks.
They work more slowly than other types of firewalls and are often limited with regard to the sorts
of applications they can support. Instead of serving as a filtration system that data passes through,
proxy servers function as go-betweens. By essentially creating a mirror of the computer behind the
firewall, they prevent direct connections between the customer device and the incoming packets,
protecting your network location from potential bad actors.
Stateful inspection. Where static filtering examines the packet headers, stateful inspection
firewalls examine a variety of elements of each data packet and compare them to a database of
trusted information. These elements include source and destination IP addresses, ports, and
applications. Incoming data packets are required to sufficiently match the trusted information in
order to be allowed through the firewall. Stateful inspection is a newer method of firewall filtering.
Firewall
Types of firewall include the following:
• Packet filtering firewall
• Circuit-level gateway
• Application-level gateway (aka proxy firewall)
• Stateful inspection firewall
• Next-generation firewall (NGFW)
Virtual Private Network
A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a
network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents
unauthorized people from eavesdropping on the traffic and allows the user to conduct work
remotely. VPN technology is widely used in corporate environments.
Virtual Private Network
How does a virtual private network (VPN) work?
A VPN extends a corporate network through encrypted connections made over the
Internet. Because the traffic is encrypted between the device and the network,
traffic remains private as it travels. An employee can work outside the office and
still securely connect to the corporate network. Even smartphones and tablets can
connect through a VPN.