Information Security Unit 5: Network Security

Slides:



Advertisements
Similar presentations
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Advertisements

1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Network Access and Transmission Methods Chapter 10.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. WAN Infrastructure  WAN Transmission Technologies  WAN Connectivity Methods 
Networks for Distributed Systems n network types n Connection-oriented and connectionless communication n switching technologies l circuit l packet.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
William Stallings Data and Computer Communications
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Click to edit Master subtitle style
Chapter 7 Introducing Wide-Area Networks
NETWORK AND COMMUNICATIONS
Chapter 4: Network Access
Instructor Materials Chapter 1: WAN Concepts
Network Access and Transmission Methods
Networking Using the OSI Model.
Lecture #01 Transmission Media
Networks and Communication
WAN Transport Methods Chapter 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Intro to MIS – MGS351 Network Basics
Chapter 4 Computer Networks – Part 2
Section 8.1 Explain the role of carriers in WAN transmissions
Lecture #01 Transmission Media
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
Telecommunications and Networking
WAN technologies.
LAN Risanuri Hidayat.
Objectives Overview Discuss the purpose of the components required for successful communications Describe these uses of computer communications: wireless.
Chapter 2 Review of Information Network and Technology
Chapter 4: Network Access
Transfer of data in ICT systems
Networks, telecommunications
Chapter 1: WAN Concepts Connecting Networks
Lecture #01 Transmission Media
Click to edit Master subtitle style
Network Basics Extended Learning Module E
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Lecture 1: Introduction to WAN
Effective communications are essential to organizational success
Ethernet First network to provide CSMA/CD
Computing Over Distance
Data Communication and Networks
Lecture #01 Transmission Media
ANEEL ABBASI MUHAMMAD ADNAN MOIZ SHAH MUHAMMAD KHAYAM GROUP MEMBERS.
Data Communication and Networks
Slides for Chapter 3: Networking and Internetworking
Computer Network Overview
Business Data Communications, 4e
NETWORK Unit 1 Module: 2 Objective: 7.
Review of Important Networking Concepts K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry – LECTURE 2 COMS 525:
Chapter 1. Introduction Data Communications
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networks, telecommunications
Data Communication and Networks
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Data Communication and Networks
Optical communications & networking - an Overview
Data Communication and Networks
OSI Reference Model Kashif Ishaq.
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Basics of Telecommunications and Networks
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Presentation transcript:

Information Security Unit 5: Network Security Slide Credits: Sunil Paudel

Outline LAN security Wireless security threats and mitigation Internet threats and security Remote access security management Network attack and countermeasures

Telecommunications & Network Technologies

Wired Telecom Technologies 32 voice or data channels, each channel 2.048 Mbit/sec T-1( USA, Canada and Japan) 24 voice or data channels, each 1.544 Mbit/sec SONET (Synchronous Optical NETwork) High speed, fiber optic, encapsulates T-protocols, ATM, TCP/IP Outside US- SDH (Synchronous Digital Hierarchy)

Wired Telecom Technologies (cont.) Frame Relay Early packet-switched technology that used to transmit data between locations at a lower cost than dedicated T-1 lines Being replaced by DSL and MPLS ATM (Asynchronous Transfer Mode) Synchronous, connection-oriented packet protocol Packets called cells, are fixed length Not common in LANs, but widely used for WAN links

Wired Telecom Technologies (cont.) DSL (Digital Subscriber Line) Digital packet over copper voice circuits at higher clock rate, coexists with low frequency voice Modem used on subscriber side to convert DSL signals to Ethernet (and sometimes Wi-Fi) DSLAM (Digital Subscriber Line Access Multiplexer) on telco end aggregates signals

Access Technologies MMDS: Multichannel Multipoint Distribution Service, Broadband Radio Service (BRS) formerly known as Multichannel Multipoint Distribution Service (MMDS), also known as Wireless Cable, is a wireless telecommunications technology, used for general-purpose broadband networking or, more commonly, as an alternative method of cable television programming reception. LMDS: Local Multipoint Distribution Service, is a broadband wireless access technology originally designed for digital television transmission (DTV). It was conceived as a fixed wireless, point-to-multipoint technology for utilization in the last mile

DSL Speed Comparison Pure Fibre Hybrid Fibre/Copper FTTH Enhanced FTTx, VDSL2, ADSL2plus FTTH: Fiber to the Home ADSL ISDN Voice band Modem

Wired Telecom Technologies (cont.) MPLS (Multiprotocol Label Switching) Packet switched technology, encapsulates TCP/IP, ATM, SONET, Ethernet frames) Carries voice + data, has QoS (quality of service) capabilities to guarantee jitter-free voice and other media such as video Replacing Frame Relay and ATM

Multiprotocol Support MPLS can be used on different network technologies IP Requires router upgrades Coexist with ordinary routers ATM Enables and ordinary switches co-exist Frame relay Mixed network

Wired Telecom Technologies (cont.) Other wired telecom technologies Data Over Cable Service Interface Specification (DOCSIS) Used for cable Internet service PSTN (Public Switched Telephone Network) 56 Kbps modem ISDN (Integrated Services Digital Network) Limited to 128 Kbps

Wireless Telecom Technologies (cont.) CDMA2000 (code division multiple access) GPRS (General Packet Radio Service) Encapsulated in GSM (Global System for Mobile communications) protocol EDGE (Enhanced Data rates for GSM Evolution) Up to 1Mbit/s UMTS (Universal Mobile Telecommunications System)

Wireless Telecom Technologies (cont.) WiMAX (Worldwide Interoperability for Microwave Access) Based on IEEE 802.16, WiMAX is a wireless competitor to DSL and cable modems, also competes with CDMA, GPRS, EDGE, UMTS Rates range from 2 to 12 Mbit/s, theoretically as high as 70 Mbit/s

Wired Network Technologies Ethernet Frame-based protocol 14 byte header Payload (46-1500 bytes) Checksum Inter-frame gap Error detection: Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

Wired Network Technologies (cont.) Ethernet devices Hub – connects local stations together; sends each frame to every connected node Repeater – extend signal over distances Switch – like a hub but sends data only to the correct node Router – connect networks to each other Gateway – translates various types of communications

Wired Network Technologies (cont.) Universal Serial Bus (USB) Successor to RS-232 serial Speeds USB 1.0/1.1 – 1.5 Mbits/s and 12 Mbits/s USB 2.0 – 480 Mbits/s USB 3.0 – 4.8 Gbits/s Hot pluggable Used to connect peripheral and human interface devices

Wired Network Technologies (cont.) RS-232 Serial communications, used to connect communications devices such as modems, and human interface devices such as mice FDDI (Fiber Distributed Data Interface) Token technology over fiber that has been replaced by gigabit Ethernet and SONET Fiber Channel Gigabit protocol used in SANs (Storage Area Networks)

Common Network Topologies Figure : Common network topologies

Network Topologies Bus Ring All of the nodes in the network are connected to a single conductor. A break in the network conductor will cause some or the entire network to stop functioning. Ring All of the nodes are connected to exactly two other nodes, forming a circular loop. Breaking any conductor will cause the network to stop functioning.

Network Topologies (cont.) Star All nodes are connected to a central device. A break in a conductor will disconnect only one node, and the remaining nodes will continue functioning. Ethernet networks are physical stars, with computers connected to central hubs or switches.

Wireless Network Technologies Wi-Fi, also known as WLAN, Wireless LAN Wireless data link layer network protocol Bandwidth up to 54Mbit/s for 802.11g, distances to 100m Some people claim up to 600 Mbps for 802.11n

Wireless Network Technologies (cont.) Wi-Fi standards Standard Spectrum Data Rate Range Released 802.11a 5 GHz 54 Mbit/s 120 m 1999 802.11b 2.4 GHz 11 Mbit/s 140 m 802.11g 2003 802.11n 2.4/5 GHz 248 Mbit/s 250 m 2009 802.11y 3.7 GHz 5000 m 2008

Wireless Network Technologies (cont.) Wi-Fi security SSID should be a non-default value SSID broadcast should be disabled ( Suggestion) MAC access control Authentication Require ID and password, Encryption WEP (Wired Equivalent Privacy) WPA (Wireless Protected Access) WPA2 (superset of WPA, full standard)

Wireless Network Technologies (cont.) Bluetooth Personal Area Network (PAN) technology Data rate: 1Mbit/s – 3Mbit/s Distance: up to 10 m Devices can authenticate through a process called “pairing”, during which two devices can exchange a cryptographic secret key that the two devices can later use Communications between paired devices can also be encrypted IrDA Infrared Data Association standard From 2.4kbit/s to 16Mbit/s

Wireless Network Technologies (cont.) Wireless USB (WUSB) Wireless protocol designed for wireless connectivity of various computer peripherals Printers, digital cameras, hard disks, and other high-throughput devices. Bandwidth ranges from 110 Mbit/s at 10 meters to 480 Mbit/s at 3 meters 3.1 to 10.6 GHz frequency range Near Field Communication (NFC) Ultra-short distance (up to 10cm or 4”) Works like RFID Intended for cell phones Rates: 106 kbit/s, 212 kbit/s, or 424 kbit/s

OSI Protocol Model Application Presentation Session Transport Network Data link Physical Mnemonics: All People Seem To Need Domino’s Pizza

OSI Protocol Model: Physical Concerned with a network’s physical media Electrical Optical Radio frequency Example standards RS-232, RS-422, T1, E1, 10Base-T, SONET, DSL, 802.11a (physical), Twinax

OSI Protocol Model: Data Link Concerned with the transfer of data between nodes Manages error correction for any errors that take place at the physical layer Example standards 802.3 (Ethernet), 802.11a MAC, GPRS, AppleTalk, ATM, FDDI, Fibre Channel, Frame Relay, PPP, SLIP, Token Ring, Wi-MAX ARP could be placed here, or in layer 3

OSI Protocol Model: Network Used to transport variable-length data sequences between nodes Manages fragmentation and reassembly Communications are point-to-point No notion of a “connection” Data packets may not arrive in order Example standards IP, ICMP, ARP, IPX

OSI Protocol Model: Transport Manages the delivery of data from node to node on a network Even when there are intermediate devices such as routers and a variety of physical media between the nodes Manages “connections” Guarantee the order of delivery of data packets, packet reassembly, error recovery Examples: UDP, TCP, IPsec, PPTP, L2TP, SPX

OSI Protocol Model: Session Manages connections between nodes, including session establishment, communication, and teardown Example standards NetBIOS, TCP sessions, SIP

OSI Protocol Model: Presentation Deals with the presentation or representation of data in a communications session Character set translation Compression Encryption Examples of presentation - layer standards include SSL, TLS, MIME, and MPEG

OSI Protocol Model: Application Top-most layer in the OSI network model Concerned with the delivery of data to and from applications Examples standards DNS, NFS, NTP, DHCP, SMTP, HTTP, SNMP, SSH, Telnet, WHOIS

Data to application layer OSI Layers Application Presentation (Http, TIFF, JPEG) Session (NFS, SQL, RPC) Transport (TCP,UDP) Network (IP,OSPF,ICMP) Data Link (ARP,SLIP,PPP) Physical Communication setup Data to application layer Initial contact End to end integrity Defines Protocols Routing

Thank You !