High Speed Internet Access for the Home Presented by: David F. Soll Vice President of Advanced Technology.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Communication Asad M. Nafees. Outline Digital Communication ISDN Digital Subscriber Line (DSL) Cable modems Satellite broadband Wireless Communication.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Wi-Fi Structures.
Chapter 6: The Internet1 The Internet Chapter 6. Chapter 6: The Internet2 Internet Technology Background Internet Infrastructure Internet Protocols, Addresses,
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
Introduction to Computer Networking. Wireless Network.
Firewall Slides by John Rouda
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Firewall Kidane Ghebresilassie Sandra Corona Sirisha Garimella Christopher Mora Elizabeth Canela.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Windows XP Home Networking Scott Manchester Technical Evangelist Home Networking.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
Firewalls. What are firewalls? a hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization.
EMerge Browser Managed Security Platform Module 1 Networking for eMerge.
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
The Internet for SME’s What is ADSL? Asymmetric Digital Subscriber Line (ADSL) is high- speed digital connectivity over the existing, copper (or analogue)
Chapter 13 – Network Security
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Why do you need to think about security?  Data loss  System loss  Identity theft.
Copyright 2007 Jim Martin1 Broadband Internet Access Dr. Jim Martin
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
The State of the Firewall Art ComNET DC 2002 David Strom
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
ADSL CONNECTIONS. 1. How does ADSL work? The ADSL consists in the analog digital data transmission supported by the cable symmetrical copper pairs carrying.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Internet Connection Types Connect to the Internet through: –modemmodem –local-area networklocal-area network –cable modemcable modem –Digital Subscriber.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Networking Components Assignment 3 Corbin Watkins.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Internet Options By OTX-West. Discussion Points Technologies  Dial-Up  DSL  Cable Data Transfer Speeds  1 Kbps (Kilobit per second) = one thousand.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
Unit Communication Hardware
CONNECTING TO THE INTERNET
Why do we need Firewalls?
Click to edit Master subtitle style
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Information Security Session October 24, 2005
Firewalls Routers, Switches, Hubs VPNs
Fire-wall.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Presentation transcript:

High Speed Internet Access for the Home Presented by: David F. Soll Vice President of Advanced Technology

Agenda High Speed Service Options Connection Methodologies Network Address Translation Firewalls Questions

High Speed Service Options Cable Modem Bus Topology Always Connected Asymmetric Send and Receive speeds Speeds up to 8 Megabits per second Advertising 1.5 MBPS receive Advertising 128 KBPS send Typical throughput of 500 Kilobits per second to 4 Megabits per second receive Utilizes a form of DHCP Uses machine name instead of MAC address All addresses are reserved You always get the same IP address Cost about $39 per month (in addition to basic cable) About 3.6 Million subscribers in the year 2000

High Speed Service Options xDSL Digital Subscriber Lines ADSL – Asymmetric DSL SDSL – Symmetric DSL HDSL – High Data Rate DSL Star Topology Speed depends on the distance to a switch Maximum of 32 Megabits per second downstream Current equipment only capable of 6 MBPS Maximum of 1 Megabit per second upstream Typical speeds top out at 640 KBPS Many xDSL vendors use PPPoE This means dial-up rather than dedicated connections The same IP address is not guaranteed Cost typically about $49 per month About 2 million subscribers in the year 2000

High Speed Service Options Satellite Yes!!! Two-way satellite is available and affordable High speed receive, lower speed send Long latency due to distance Largest Provider is Hughes Electronics which has merged: DirecPC ( EchoStar ( Typical Speeds From 300 KBPS to 2 MBPS receive From 64 KBPS to 256 KBPS send Typical installation cost of $500 to $1,000 Cost from $29 to $700

Connection Methodologies Most services provide for a single PC Two ways to add more PC’s to the Internet connection: Pay for more connections Use a router with NAT (discussed later) Typically you pay per IP address NAT tricks the provider into thinking that there is only one machine connected

Connection Methodologies Single PC

Connection Methodologies Multiple PC’s with a Router PC

Connection Methodologies Multiple PC’s with a Router

Network Address Translation Translates an internal, non-Internet accessible IP address to one that can live on the Internet Local LAN utilizes Private Internet Address (PIA) Typically x.x Also available 10.x.x.x and x.x PIA’s are guaranteed not to be found anywhere on the Internet

Network Address Translation Example Browser session going through NAT Browser starts and requests a page The request comes from a PIA and a randomly selected port number The NAT router receives this request and forwards it to the Internet, except with its IP address and a port number that it randomly selects The router keeps a table of translations for IP Address/Port Numbers A Web server responds to the router’s IP address and port The NAT router looks up the translation and forwards the packet to the original PIA address and port After a time-out period, the translation is removed from the table

Firewalls NAT does a fairly good job of protection, but not perfect A hacker can “tail-gate” in, following a legitimate packet Firewalls are not always necessary, but do provide functionality that may prove to be valuable Many firewalls do protect against Viruses or Trojan Horse programs

Firewalls What is a firewall? A firewall ABSOLUTELY ISOLATES your computer from the Internet using a “wall of code” that inspects each individual “packet” of data as it arrives at either side of the firewall — inbound to or outbound from your computer — to determine whether it should be allowed to pass or be blocked. Three types of blocking traffic: Stateless Stateless packets can be filtered on a Windows machine without any additional code State full Windows can not filter traffic based on state Firewalls provide state full traffic filtering Must be state full to detect viruses and trojan horses Proxy Application specific

Firewalls Two major types of firewalls Centralized Provides protection for an entire network Protects multiple machines Personal Provides protection only for one machine Better able to handle virus and Trojan horse protection A combination of both firewall types can be the most secure

Firewalls Port Monitors Software that monitors IP ports and attempts to protect them against malicious packets Many of them don’t work too well and can even invite hacking since they acknowledge existence of a listener on a port If you want to monitor port access attempts, find a high quality one that will monitor but won’t respond to ports that don’t have a listener STAY AWAY FROM PORT MONITORS!

Firewalls You need a Personal Internet Firewall if: Your computer's files need to be accessed remotely across the Internet. You are operating any sort of Internet server such as Personal Web Server. You use any sort of Internet-based remote control or remote access program such as PC Anywhere, Laplink, or Wingate. You want to properly and safely monitor your Internet connection for intrusion attempts. You want to preemptively protect yourself from compromise by "inside the wall" Trojan horse programs like NetBus and Back Orifice.

Firewalls BlackICE Defender - $40.00 Symantec/Norton Personal Firewall - $50.00 Zone Alarm - Free Zone Alarm Pro - $40.00 Tiny Personal Firewall – Free Sygate Personal Firewall – Free McAfee Firewall - $30.00 PC-Viper - $20.00 AtGuard – Discontinued Conseal Desktop eSafe Desktop PrivateFirewall Lockdown 2000 Sphinx - $50.00 CyberArmor Deerfield Personal Firewall – $30.00

Firewalls Leak-Proof Firewalls (Based on GRC’s Leak Test) McAfee Firewall - v Sygate Personal FW - v 4.0+ (FREE for personal use) Symantec/Norton - v Tiny Personal FW - v (FREE for personal use) ZoneAlarm – Never Leaked (FREE) ZoneAlarm Pro – Never Leaked Leak-Proof but Strange Firewalls (Based on GRC) PC-Viper – Doesn’t leak but seems unfinished

Firewalls Leaky (unsafe) Personal Firewalls (Based on GRC) Masquerade Vulnerable AtGuard Conseal Desktop eSafe Desktop Private Firewall 2.0 Doesn’t Block Unknown Trojans or Viruses BlackICE Defender No Provision to block Trojans, Viruses, or Spyware Conseal PC Freeware Lockdown 2000

Firewalls Sources for more information: Gibson Research Corporation – Best source of firewall information grc.com – Great Web Site Includes free and commercial software Has a Firewall testing program Checkout Shields Up!

Questions ?

High Speed Internet Access for the Home Presented by: David F. Soll Vice President of Advanced Technology