Data Transmission Basics for Digital Investigations.

Slides:



Advertisements
Similar presentations
Chapter 2 Network Models.
Advertisements

Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1-1 Introduction to Computer Networks and Data Communications.
OSI Model.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Review on Networking Technologies Linda Wu (CMPT )
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
ECS 152A 1. Introduction. A Communications Model Source —generates data to be transmitted Transmitter —Converts data into transmittable signals Transmission.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Protocols and the TCP/IP Suite
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
CCNA Network Fundamentals.  Elements of communication –Source (encoding data before transmission) –Transmission Media (Channel) – Information sent –
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Lesson 5—Networking BASICS1 Networking BASICS Protocols and Network Software Unit 2 Lesson 5.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
William Stallings Data and Computer Communications
An Introduction to Networking
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Network Models.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Communication Architecture and Network Protocol Layering Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by:
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
COMPUTER NETWORK AND DESIGN CSCI 3385K. Host-to-Host Communications Model Older model Proprietary Application and combinations software controlled by.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Network Models.
Chapter Objectives In this chapter, you will learn:
Computer Networks.
Computer Networks.
Click to edit Master subtitle style
The OSI Model and the TCP/IP Protocol Suite
CHAPTER 2 THE OSI MODEL.
Layered Architectures
Using MIS 2e Chapter 6 Appendix
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
Data and Computer Communications by William Stallings Eighth Edition
Chapter 3: Open Systems Interconnection (OSI) Model
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

Data Transmission Basics for Digital Investigations

2 Objectives Understand the OSI and TCP models Understand the basics of how data is transmitted on networks

3 OSI Model Standard was needed for companies to communicate with each other via their computer systems OSI model released in 1984 Created by the International Organization for Standardization (ISO) OSI model breaks down complexity of data communications into a simple layered approach

4 OSI Model (Cont.) Advantages of layered approach:  Different hardware/software vendors have a standard to follow for designing products  Collaboration between companies to develop network components is easier  Changes in one layer are not carried over into other layers  Network design is broken down into smaller, more manageable parts  Problem resolution is easier because problems are usually confined to a single layer

5 OSI Model (Cont.) Layer 7: Application layer provides services to applications such as or Internet browsers  Allows access to network services that support applications  Handles network access, flow control, and error recovery Layer 6: Presentation layer ensures the data formats from the application layer of one computer can be read by the application layer of another computer  Converts all formats into a common uniform format  Protocol conversion  Encryption/decryption

6 OSI Model (Cont.) Layer 5: Session layer provides services to the presentation layer by creating a communication link between two hosts  Establishes identification to exclude non-communicating hosts  Establishes checkpoints  Manages data transmit times and length Layer 4: Transport layer segments data and prepare these segments for transport across a network. Also reassembles those segments on the receiving side.  Regulates flow control  Uses acknowledgements  Enables error handling

7 OSI Model (Cont.) Layer 3: Network layer functions (Connectivity and path selection between two hosts on a network)  Logical addressing (IP addressing)  Translating logical addresses to physical addressing  Packet switching  Routing

8 OSI Model (Cont.) Layer 2: Data link layer functions (physical addressing across a network)  Conversion of packets into raw bits  Error correction  Flow control Layer 1: Physical layer functions (physical connectivity issue in a network)  Defines hardware standards  Transmits raw data over different mediums  Defines protocols on how to transmit raw data over different mediums

9 OSI Model (Cont.) Data flow in the OSI model  Protocols that function at each layer on Host A communicate with the corresponding layer on Host B  Protocol data units (PDUs) are used to include header information on the packet being sent from host to host  Each layer depends on the layer below it for services, and each layer above adds PDUs via encapsulation

10 higher level protocols lower level protocols or network services higher level protocols lower level protocols or network services Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer END USER AEND USER B Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer PHYSICAL MEDIUM End user functions Network functions OSI Reference Model

11 TCP/IP Model Also called the Internet Protocol Suite Set the communications protocols for the Internet and other similar networks.  TCP – Transmission Control ProtocolTransmission Control Protocol  IP – Internet ProtocolInternet Protocol De facto standard for communications Direct result of the Department of Defense efforts to require a protocol that could survive wartime situations and still communicate with other hosts via different communication mediums Has only four (five) layers as compared to seven layers of OSI model

TCP/IP vs. OSI Model

13 TCP/IP Model (Cont.) How data transports in the network Switching networks  Packet switching  Circuit switching

Typical Scenario We have a source machine A We have a destination machine B A has some application specific data stored as a file. An example might be a web page stored as an html file on a web server. The user on machine B launches a web browser (Application layer) and types in the URL to the web page on machine A and hits GO!

Typical Scenario cont. (APPLICATION LAYER)  An http request (Application Layer) with URL is generated by the browser and sent down the stack to the Transport layer. (TCP LAYER)  The transport layer “wraps” the application layer data with TCP headers.  TCP header provides information for end-to-end service, such as end host port numbers, Sequence number and Acknowledgement Number for tracking and delivery confirmation.

Typical Scenario cont. (IP LAYER) Once the Transport layer has added its headers, it transfers the growing set of data to the IP Layer. The Network layer wraps the TCP segment with IP headers. IP headers give the receiving counterpart information on source and destination IP addresses, next layer protocol, fragmentation information, etc.

Typical Scenario cont. (DATA LINK LAYER)  Once the IP Layer has added its headers, it transfers the still growing set of data to the Data Link layer.  The Data Link Layer wraps the IP packet with frame header.  The frame header is just more bytes of data that specifies source and destination physical MAC addresses of the current hop (the whole path may contain multiple hops). Run “tracert” in Windows.

Typical Scenario cont. (PHYSICAL LAYER)  A completed Frame ready to be placed on the wire and sent to its destination.  The wire is the physical layer and it accommodates the physical transfer of the frame to its destination.

Network Devices 21

Network Interface Card

Also known as NIC, network card or network adapter Works in OSI Layers 1 and 2 Has a unique MAC (Media Access Control) or physical address (12-digit hexadecimal)  ipconfig/all in Windows Command Prompt Connects to other network devices, e.g. routers or switches, via network cables or wireless connections

Network Cables

Category 5 cable  CAT-5 twisted pair cables are mostly used for 100 mbps  4 pairs (8)of twisted wires are connected to the 8 pins of a RJ-45 plug  Each pair of wires has specific functions, such as sending and receiving data signal Crossover cables are good for direct communication between two computers or same type of devices. Crossover cables  Needs n(n-1)/2 cables for n computers (too many cables!)

Network Hubs

Work in Layer 1 (Physical Layer)  Not capable of making use of MAC or IP addresses Same as connecting all wires together  Broadcast every single bit onto all the links  Have NO Media Access Control Can cause traffic conflicts from different computers; performance degrades when more computers are connected Not very fast speed, e.g. 10mbps ~ 100mbps

Network Switches

Mainly work in Layer 2 (Data Link Layer)  Make use of MAC addresses  Have Media Access Control Do not look into traffic type or other details like routers do  Not capable of making use of IP addresses Support high data rate, e.g. 100 mbps or 1 Gbps Good for high speed communications among computers in a LAN

Routers

Also called Layer 3 switches Work in Layer 3 (Network Layer)  Make use of IP addresses  Decide a path in the networks for data  Interconnect separate logical networks, often different types of networks Not as fast as switches, e.g., 100mbps

32 Data Network Types Local Area Network  A network configuration designed for a limited space or geographic area such as a series of offices in the same building  Two common types of LANs are the campus area network (CAN) and the metropolitan area network (MAN) Wide Area Network  A group of smaller LANs connected logically or physically  WANs can combine other subnetworks such as intranets, extranets, and virtual private networks (VPNs) to provide enhanced network capabilities

33 Data Network Types cont. Internet  The Internet is an interconnection of different-sized networks (LANs) around the world Intranet  An intranet is a local or wide area network based on TCP/IP, but with firewalls that limit the network’s access to the Internet  An intranet is more secure than the Internet because it has a restricted user community and local control Extranet  An extranet is an intranet that allows select users outside of the firewalls to access the site

34 Firewalls Firewalls typically run monitoring software to detect and thwart external attacks on the site and protect the internal corporate network Firewalls are an essential device for network security Many of the architectures needed for security rely on one or more firewalls within an intelligent design

35 Firewalls cont. Application-Level Gateway Firewall  Allows the network administrator to implement stricter security policies than packet-filtering routers can manage  Requires special-purpose code (a proxy service) for each desired application  The proxy code can be configured to support only acceptable features of an application  Users are permitted access to the proxy services, but may not log in to the application-level gateway itself  Application-level gateways allow information to flow between systems but do not allow the direct exchange of data

36 Firewalls cont. Benefits of Application-Level Gateways  The network manager has complete control over each service and permitted services  It has the ability to support strong user authentication and provide detailed logging information  The filtering rules are much easier to configure and test

37 Firewalls cont. Limitations of Application-Level Gateways  It requires either that users modify their behavior or that specialized software be installed on each system that accesses proxy services

38 Summary OSI model standardized the method of transmitting data on a network using a seven- layer approach  Application, presentation, session, transport, network, data link, and physical

39 Summary (Cont.) TCP/IP model consists of four layers:  Application, transport, Internet, network interface  De facto standard on the Internet Two address schemes are used to transmit data across networks  Logical addressing  Physical addressing