Networking Concepts Module A Copyright Pearson Prentice Hall 2013.

Slides:



Advertisements
Similar presentations
Network Services Networking for Home & Small Business.
Advertisements

Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Presentation on Osi & TCP/IP MODEL
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Network Services Networking for Home & Small Business.
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP: A Closer Look Transmission Control Protocol.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
Module A. Copyright Pearson Prentice-Hall 2010  Octet ◦ A Byte (collection of 8 bits)  8 bits = 1 Character ◦ Bit  Is the basic unit of IT represented.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Protocols and the TCP/IP Suite
Layered Standards Architectures
Chapter 5 Network and Transport Layers
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Computer Networks.
Chapter 2 Updated January 2009
Welcome to the Cloud Chapter 1 Panko and Panko
Review of TCP/IP Internetworking
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
TCP/IP Internetworking
Using MIS 2e Chapter 6 Appendix
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
TCP/IP Internetworking
Network Architecture Introductory material
Net 431: ADVANCED COMPUTER NETWORKS
Review of TCP/IP Internetworking
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networking for Home and Small Businesses – Chapter 6
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Protocols and the TCP/IP Suite
Topic 5: Communication and the Internet
Review of Important Networking Concepts
Network Protocol Layers
ECEN “Internet Protocols and Modeling”
Process-to-Process Delivery:
Review of TCP/IP Internetworking
Lecture 4 Communication Network Protocols
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
Networking Theory (part 2)
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Protocols 2 Key Revision Points.
Layered Standards Architectures
Protocols and the TCP/IP Suite
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
OSI Reference Model Unit II
Kyle Broussard, Alexandra Mikolai,
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Theory (part 2)
Unit – III Network Essentials
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Networking Concepts Module A Copyright Pearson Prentice Hall 2013

This is a module that some teachers will cover while others will not This module is a refresher on networking concepts, which are important in information security If your teacher does not cover networking, you might want to cover it yourself, to “get the rust out” of your networking knowledge Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

A-5: The Internet Copyright Pearson Prentice Hall 2013

A-5: The Internet The global Internet has thousands of networks connected by routers Network Browser Webserver Software Packet Packet Router Route Router Router Packet Copyright Pearson Prentice Hall 2013

Packet travels in a different frame in each network Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Transmission of frames across a network. Frames contain packets. Super Layer Description Application Communication between application programs on different hosts attached to different networks on an internet. Internetworking Transmission of packets across an internet. Packets contain application layer messages. Network Transmission of frames across a network. Frames contain packets. Copyright Pearson Prentice Hall 2013

Super Layer TCP/IP OSI Hybrid TCP/IP-OSI Application Presentation Session Internet Transport Network Single Network Subnet Access Data Link Physical Copyright Pearson Prentice Hall 2013

In a single network, a physical link connects adjacent devices. A data link is the path that a frame takes across a single network. One data link; three physical links. Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

IP Version 4 Packet Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

2. SYN, ACK (1) (Acknowledgement of 1) PC transport process Webserver transport process 1. SYN (Open) Open (3) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) 3-Way Open Copyright Pearson Prentice Hall 2013

A-15: Messages in a TCP Session (continued) PC transport process Webserver transport process 1. SYN (Open) Open (3) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) 4. Data = HTTP Request Carry HTTP Req & Resp (4) 5. ACK (4) 6. Data = HTTP Response 7. ACK (6) Copyright Pearson Prentice Hall 2013

A-15: Messages in a TCP Session (continued) PC transport process Webserver transport process 8. Data = HTTP Request (Error) Carry HTTP Req & Resp (4) 9. Data = HTTP Request (No ACK so Retransmit) 10. ACK (9) 11. Data = HTTP Response 12. ACK (11) Error Handling Copyright Pearson Prentice Hall 2013

A-15: Messages in a TCP Session (continued) PC transport process Webserver transport process Normal Four-Way Close 13. FIN (Close) Close (4) 14. ACK (13) 15. FIN 16. ACK (15) Note: An ACK may be combined with the next message if the next message is sent quickly enough Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice Hall 2013

A-24: Application Standards Application Exploits By taking over applications, hackers gain the permissions of the exploited program A multitude of application standards Consequently, there is a multitude of security issues at the application level Copyright Pearson Prentice Hall 2013

A-24: Application Standards Many Applications Need Two Types of Standards One for the transmission of messages, one for the content of application documents For the World Wide Web, these are HTTP and HTML, respectively For transmission, e-mail uses SMTP, POP, and IMAP For message content, e-mail uses RFC 2822 (all- text), HTML, and MIME Copyright Pearson Prentice Hall 2013

A-24: Application Standards FTP and Telnet Have no security Passwords are transmitted in the clear so can be captured by sniffers Secure Shell (SSH) can replace both securely Copyright Pearson Prentice Hall 2013

A-24: Application Standards Many Other Application Standards Have Security Issues Voice over IP Service-oriented architecture (SOA); web services Peer-to-peer applications Copyright Pearson Prentice Hall 2013

Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall