Computer Networking - This Book Includes - Computer Networking For Beginners and Beginners Guide (All in One)
Computer Networking - This Book Includes - Computer Networking For Beginners and Beginners Guide (All in One)
RUSSELL SCOTT
© Copyright 2019 - All rights reserved
The content contained within this book may not be reproduced, duplicated or transmitted without direct
written permission from the author or the publisher.
Under no circumstances will any blame or legal responsibility be held against the publisher, or author,
for any damages, reparation, or monetary loss due to the information contained within this book. Either
directly or indirectly.
Legal Notice:
This book is copyright protected. This book is only for personal use. You cannot amend, distribute, sell,
use, quote or paraphrase any part, or the content within this book, without the consent of the author or
publisher.
Disclaimer Notice:
Please note the information contained within this document is for educational and entertainment
purposes only. All effort has been executed to present accurate, up to date, and reliable, complete
information. No warranties of any kind are declared or implied. Readers acknowledge that the author is
not engaging in the rendering of legal, financial, medical or professional advice. The content within this
book has been derived from various sources. Please consult a licensed professional before attempting
any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances is the author responsible for
any losses, direct or indirect, which are incurred as a result of the use of information contained within
this document, including, but not limited to, — errors, omissions, or inaccuracies.
Table of Contents
NETWORKING FOR BEGINNERS
Introduction
Chapter 1: Networking Basics
Computer Network: The Meaning
LAN vs. WAN
Network Infrastructure
Peer-to-Peer vs. Client-Server
Client-Server Network Architecture
Network Devices
Network Speeds
The OSI Model
The Network Administrator
Collision and Broadcast Domains
Chapter 2: Networking Hardware
Host Machines (Workstations and Computers)
Network Adapter (Network Interface Card)
Hub
Switch
Router
Modem
Firewall
Chapter 3: Network Cabling
Ethernet Cables
Straight-through Cables
Crossover Cables
Rollover Cables
Chapter 4: Wireless Technology
Wireless Hardware
SSID
Bluetooth
WiMAX
Radio Frequency Identification
Communications Protocol
Extending Networks with Wi-Fi
Ad Hoc Mode vs. Infrastructure Mode
Security Threats
Chapter 5: IP Addressing
What is an IP address?
What is the Function of an IP Address?
The Binary Number System
Hexadecimal Number System
Default Gateway
Finding Your IP Address Manually
IP Address Configuration
DHCP
Default IP Address Classes
Chapter 6: IP Subnetting
How to Subnet
Bit Borrowing
Determining the Subnet Mask
Calculating Host Addresses per Subnet
Determining Host Ranges
Subnet Masks Changing
VLAN
IPv4 vs. IPv6
Address Depletion
Chapter 7: Network Protocols
TCP/IP Model
Application Layer Protocols
Transport Layer Protocols
Internet Layer Protocols
Link Layer Protocols
Frame Relay Protocol
Network Address Translation
Routing Types
Dynamic Routing
Routing Protocols
Link State Protocols
Routing Tables
Ports
Chapter 8: Internet Essentials
Internet basics
Internet History
Internet Technical Terms
Common Uses of the Web
Assessing Internet Service Plans
How to Get Internet Connectivity
Using Dial-Up
Using Cables
Using Wi-Fi
Using DSL
Chapter 9: Virtualization Architecture and Cloud computing
Meaning of cloud computing
Characteristics of Cloud Computing
Cloud Computing in Practice
Virtualization
Virtualization in Cloud Computing
Components of a Server computer
Three basic kind of Cloud Services
Public clouds vs. private clouds
Chapter 10: Network Troubleshooting
Hardware Management and Maintenance
Network Troubleshooting
Hardware Troubleshooting
Summary of Network Management
Administering and Supporting End Users
Adding Workstations & Peripheral Devices
Software Troubleshooting
Cable Troubleshooting
Wireshark Short Guide
Conclusion
COMPUTER NETWORKING
BEGINNERS GUIDE
Introduction
Chapter 1: Intro to Computer Networking
Computer Network Components
Computers/Workstations
Classifications of computer networks
Private Networks
Internetwork
Network Topology
Physical Topology
Network Architecture
Ethernet
Network Router
Chapter 2: Basics of Network Design
Roles and responsibilities
Network quality
Functionality
Network size
Reach
Speed
Extensibility
Easy of Use
Maintenance and administration
Security
Availability of Documentation
Load Balance
Chapter 3: Wireless Communication Systems
Installing a Wireless Adapter
Accessing a WAP
Setting up a WAP
Wireless Network Management
Wireless Connection Metrics
Bluetooth Architecture
Mobile Telephony Glossary
CISCO Certification Guide
Chapter 4: Network Security
Network Security Zones
Logical Security Zones
Physical Access Zones
Protecting Personal Privacy
Security Policy Domains
Common Network Threats
Chapter 5: Hacking Network
What is hacking?
Who is a hacker?
Types of cyber crimes
A look at ethical hacking
Chapter 6: Different Hacking Methods
Keylogger
Malware
Trojan horses
Ransomware
Waterhole Attacks
Fake WAP
Passive Attacks
Phishing
Bait and Switch
Cookie Theft
Man in the middle attack
Password Stealing
Mac Spoofing
What is social engineering?
Chapter 7: Working on a DoS attack
How this attack works
The distributed denial of service attack
An example of a DDoS Attack
Chapter 8: Keeping Your Information Safe
Attacking a website with Cross-Site Scripting
An Injection Attack
Password Hacking
Conclusion
NETWORKING FOR BEGINNERS
An Easy Guide to Learning Computer Network Basics. Take Your
First Step, Master Wireless Technology, the OSI Model, IP
Subnetting, Routing Protocols and Internet Essentials.
RUSSELL SCOTT
Introduction
I nofthis book, you are certain to get down to an exciting learning undertaking
various networking experience. Particularly, Networking for Beginners
concisely sets the tempo with an-easy-to-understand introduction to the
essentials of networking so you get to know just enough about the LANs and
WANs, the OSI model and networking components.
It is also worth noting that the issue of network maintenance and
troubleshooting have been significantly covered. There is appreciable
coverage on wireless technology, the Internet, and the interesting concept of
virtualization in cloud computing. Also, this book introduces the interesting
concepts of IP addressing and subnetting that certainly injects a practical
touch to the largely theoretical aspect of networking.
Thoroughly researched to meet the current networking and technological
needs of learners, Networking for Beginners is a highly practical and up-to-
date beginners guide to the essentials of through to the very advanced
concepts of computer networking. Prepared from a teaching and guidance
point of view, the book does not compel readers to have any experience or
prior knowledge in the discipline of networking. Readers have the chance to
grab the basics of computer networking through to the fundamental concepts
of TCP/IP configuration, router basics, network troubleshooting, network
security, IP Management as well as virtualization and cloud computing
among other key networking topics. After reading this book, you will have a
considerable understanding of different networking protocols and their role in
making the networking concept a reality.
Chapter 1:
Networking Basics
LANs
WANs
LAN
A LAN refers to any group of computers that are linked to one another a
small area like an office or a small building. In a LAN, two or more
computers are connected via communication media like coaxial cables,
twisted pair copper cables or fiber-optic cables.
It is easy and less costly to set up a LAN since it can do just fine with
inexpensive network hardware such as switches, Ethernet cables, and
network adapters. The limited traffic allows for faster transmission of data
over LANs.
Besides, LANs are easy to manage since they are set up in a small space.
Thus, even security enforcement is also enhanced through closer monitoring
of activities within the network’s geographical location.
LAN examples include office networks and home-based networks.
Merits of a LAN
LANs have a rather obvious advantage over WANs considering the LANs’
small geographical coverage as unlike the Wans that stretch over unlimited
geographical coverage.
The following are the pros of a LAN:
Ease of installation since it involves a small area within which
computers can be connected. The limited area of operation
amounts to a limited number of networked machines which
makes it a lot easier to set up a LAN.
Ease of maintenance due to the small network area and few
networked computers.
Ease of security enforcement since also due to the relatively
small operating environment and a few networked devices
Limitations of a LAN
The limitations of a LAN can be summarized in one sentence by considering
its confinement to limited geographical space and the number of networked
machines. Thus, it is agreeable to conclude that LANs’ limitation is its
inability to accommodate many users thereby restricting LANs for use within
small offices, business settings, learning spaces, and home settings.
WAN
A WAN is a kind of computer network that stretches over large geographical
regions-cities, states and even countries. It is bigger than LAN or MAN. It is
not restricted to a particular geographical location. It spans over large
geographical locations by the use of telephone lines, satellite links or fiber
optic cables. The Internet is a perfect example among the existing WANs
globally.
WANs are widely embraced for education, government, and business
activities.
Examples of WAN
The following examples show just how WANs can connect people limitlessly
irrespective of their geographical locations:
Advantages of WANs
Disadvantages of WANs
Network Infrastructure
Network infrastructure entails all the necessary resources that lead to the full
functionality of the networking concept. That is to say, in other words, that
hardware, software, network protocols, human input, and design functions
that lead to effective network operation, management and communication; all
these do constitute what is conventionally referred to as network
infrastructure. In a nutshell, the following are some of the elements of
network infrastructure:
Network software
Network hardware
Network protocols
Network services
Network Devices
From a physical perspective, a network can be quite simple-just two
computers connected together to move data from one to the other over a
simple Ethernet cable. That’s not to say, however, that the network will stay
simple. For this reason, you should consider every network building block in
the initial design even if it is not included in the first phase of
implementation.
Even if you are intent on building a home network or small-office network,
you ought to anticipate future needs besides those other things intended for
purchase and installation without hesitation; either accommodating the need
for space, nodes, and wiring right away or building a plan for making the
additions and upgrades. Doing so saves time in the long run and may
eliminate some frustration when hooking up a new server doesn’t mean that
switches, routers, or hubs also have to be changed out.
The following list is a good starting point for identifying necessary
networking components:
Printers
Database hosts
Client workstations and PCs
File servers
Laptops, notebooks, and handhelds
Other peripheral hardware:
ð Interface devices
ð Hard drives
ð Network switching and routing components
ð Web cameras
ð Network and end-user software
ð Removable media
Network Speeds
In computer networking, speed and bandwidth are almost interchangeable,
but they are not, really. So, what is speed (and bandwidth)?
Whereas network speed is the circuitry bit rate, bandwidth is that “speed” that
ends up being used. Thus, speed refers to the theoretical throughput while
bandwidth is the actual throughput.
In a scenario of the internet, we can define speed in the following ways
(bandwidth, actually):
Network protocols
Communication overheads in the diverse networking hardware
components
Operating systems
Transport
Presentation
Application
Session
Physical
Data link
Network
The upper layer of this model primarily handles issues related to applications.
Those issues are executed in the software. The closest layer (or the
uppermost) to the user is the application layer. The end user interacts with
software application just as the application software does.
When a layer is said to be an upper layer, it is said so about another. An
upper layer is a layer that lies right above the other one.
The lower layer of this model handles issues of data transport. The
implementation of the data link as well as physical layers occurs in software
and hardware. In this model, the physical layer stands as the lowest layer. It is
also the nearest to the physical medium. Primarily, the physical layers
provides the necessary information to the physical medium.
Physical Layer
Framing: the data link layer does the translation of the physical
layer’s raw bit stream into data packets referred to as frames. It
adds a header and trailer to the data frame. The header contains
both receiver and source addresses.
Physical addressing: the physical addressing layer enjoins a
header to the frame. This header has the address of the receiver.
The frame is transmitted to the receiver whose address is
indicated on the header.
Data Flow control: this is the data link layer’s primary role. It
maintains a constant data rate so that no data is corrupted while
on transit.
Error control: this is achieved by addition of a cyclic redundant
check (CRC) on the trailer that is put onto the data packet before
being sent to the physical layer. In case of any errors, the
receiver can request for the retransmissions of the corrupted
frame.
Access control: this layer determines which of the available
network devices is given top priority over the link at a particular
moment.
TCP
TCP is a short form of Transmission Control Protocol. It is a standard
protocol which allows systems to share messages/information over the
internet. The protocol establishes and preserves the link between hosts.
TCP divides data into smaller units referred to as segments. The resulting
segments do not travel over the internet using the same route. They reach the
destination in no specific. However, TCP reorders the individual segments at
the destination to reconstitute the original message.
Encryption
Translation
hough there are both software and physical network components, our
T primary focus in this section is channeled towards discussing about
physical components of a computer network. Essentially, physical
computer networks include host machines (computers), routers, hubs,
switches, repeaters, Network Interface Cards (NICs), network server,
modems, and many other peripheral devices.
Hub
A hub divides a network connection into several devices. A hub connects all
computers on a network via cables. Every computer sends a request to the
network through the hub.
When the hub gets a request from a particular computer, it broadcasts that
request across the network to all network devices.
Each network device checks the request to determine if it belongs there. If
not, the request is subsequently discarded.
The downside to this process is consumption of more bandwidth and
communication is highly limited. Presently, a hub is as good as obsolete due
to the hype with routers and switches.
Switch
A switch links a number of devices on a computer network. This important
connection device is technologically more advanced than a hub.
A switch has an updated that determines the destination of transmitted data.
The switch transmits a message to the desired destination as per the physical
address on each incoming request.
Unlike the hub, it does not transmit data to all devices across the network.
Thus, there is increased data transmission speeds since individual computers
communicate directly with the switch.
Router
A router gives an internet connection to a local area network. It receives,
analyzes and forwards incoming packets to another computer network.
It operates in Layer 3 in the OSI model-simply referred to as the network
layer.
Packet forwarding is governed by the contents of the routing table. A router
is smart enough to choose or decide the most appropriate path for the
transmission of data from all available paths.
Benefits of Routers
Limitations of Routers
Disadvantages of routers are normally ignore, but we can mention just two:
Modem
A modem is an acronym that stand for Modulator/Demodulator. It changes
digital data into analog signals over a telephone line.
The modem makes it possible for a computer to establish a connection to the
Internet via an existing telephone line. It is installed on the PCI slot of the
motherboard-not on the motherboard itself.
Modems are classified as follows based on data transmission rates and
different speeds:
Cable modem
Dial Up Modem/Standard PC modem
Cellular modem
Firewall
A firewall could be in hardware or software form. So, it is in order to define a
firewall as a network device or software application that restricts entry into
and out of a private network. Private networks are normally connected to the
internet. Firewalls come in quite handy when there is a need to restrict
network users from gaining unauthorized entry into such networks, especially
intranets.
When messages are being transmitted in and out of the internet, they are
supposed to pass through the firewall for screening. Those that do not fulfill
certain requirements are denied access through the firewall.
It must be noted that firewalls do not offer authentication services besides
traffic screening and network connection permissions. Thus, they should be
complemented to guarantee enhanced security for networks.
There is a variety of firewalls. They include:
Ethernet Cables
Ethernet cabling entails the use of 3 common cable types. They include:
Coaxial;
Twisted pair copper;
Fiber optic cables.
Coaxial Cables
Often, internet access is achieved with coaxial cabling. The term coaxial is
analogous to the fact that it has two conductors that run parallel to each other.
Coaxial cables contain a conductors that runs through the center of cables.
There exists a layer of insulation that surrounds the conductor. In addition,
there is a conducting shield that comes right after the insulating material. The
insulating material and the conducting shield make coaxial cables highly
resistant to interference from the external environment.
Coaxial cables are categorized into thinnet and thicknet types. Thinnet is also
referred to as Thin Ethernet (10Base2) cable while Thicknet is also referred
to as Thick Ethernet (10Base5) cable. They are practically outdated forms of
Ethernet cabling techniques.
Thicknet uses Radio Grade 8 coaxial cable with conformation to the
specification of original Xerox Ethernet, and has a 0.5” diameter. On the
other hand, thinnet is a thinner Radio Grade 58-similar to Radio Grade 6 TV
cable.
A thicknet supports data rates of up to 10 Mbps and extends to up to 500m of
length. This cable standard supports up to 100 devices in a time of one
second. Similarly, thinnet supports up to 10Mbps, just like the thicknet.
However, it can only extend up to185m (intentionally meant to be 200m) of
length. Besides, thinnet can support only up to 30 devices.
The following are the main characteristics of coaxial cables:
UTP Cables
UTP cables are commonly embraced for use in telecommunications. They
fall into the following categories:
They are more costly than the Unshielded Twisted Pair cables.
They are highly prone to attenuation.
Core
This may be a narrow strand of plastic or glass for light transmission. The
amount of light that passes through the fiber increases with increase in the
size of the core.
Cladding
This refers to the concentric layer of glass. It primarily offers a lower
refractive index at the interface of the core to allow the transmission of light
waves through the fiber.
Jacket
A jacket is a plastic protective coating for the preservation of the strength of a
fiber, offer fiber protection and absorb shock. We will examine the
advantages of fiber optic cables over twisted pair copper cables:
Straight-through Cables
A straight through cable is just another type of twisted pair copper cable that
connects a network host (computer) to a router, switch and hub. A straight-
through c able is also referred to as a patch cable. A patch cable is another
option for a wireless connection in a case of where a single or more host
machines connect to a router via wireless signal. Pins match on a patch cable.
Also, it uses just a single wiring standard at both ends-the T568A or T568B
wiring standard
Crossover Cables
A crossover cable is a form of Ethernet cable that provides direct linking
between different networking devices. This cable is also referred to as the
RJ45 cable. It uses different wiring standards at its terminal points-T568A at
one end and T568B at the other end. A crossover cable’s internal wiring
reverses receive and transmit signals. It is used to connect similar networking
devices. For instance, a crossover cable can be used to connect one computer
to another computer, or one switch to another switch.
Summary of Crossover vs. Straight Through Cables
Primarily, straight through cables are used to link dissimilar networking
devices while crossover cables are used to link similar devices. So, straight
through would come in handy in connecting the following devices:
Switch to server
Hub to Computer
Switch to computer
Hub to Server
Switch to Router
Hub to hub
PC to PC
Switch to hub
Switch to switch
Router to router
PC NIC to Router Ethernet port NIC
Rollover Cables
Rollover cables are actually “rollover wired cables”. They have opposite pin
alignments on its terminal ends. That is to say that the first pin on connector
A links with pin 8 of connector B. rollover wired cables are also referred to
as YOST cables, and are primarily used to link to a networking device’s
console port so that it can be reprogrammed. Whereas crossover and straight
through cables are intended for data transmission, a rollover cable is mainly
used to create an interface with a given networking device.
Chapter 4:
Wireless Technology
Wireless Hardware
It is good to know that a wireless network is not 100% wireless. There are
various hardware components that make the wireless concept a reality. The
following are the most important hardware components of a wireless
network:
SSID
SSID is a short form for Service Set Identifier. If we know that, in the context
of wireless technology, service set refers to a collection of wireless network
devices, then we ought to know that SSID refers to the technical name that
identifies a given wireless network.
SSIDs are case sensitive names of up to 32 characters. Special characters are
admissible when coming up with SSIDs.
A Wi-Fi base (wireless router) broadcasts its SSID allowing Wi-Fi-enabled
devices to show a full list wireless networks within reach. An open network
is just connected without a need for authentication. On the other hand, a
secured network will request for a passkey without which one cannot
establish a connection.
Bluetooth
Primarily, Bluetooth came in as an alternative to the issue of heavy cabling
that rocked the connection-based mobile phone, computer, fixed electronic
device, and an assortment of hand-held device ‘networking’ needs. Bluetooth
is based on the 802.15 IEEE standard. Instead of using cable for data
transmission, a 2.4GHZ ISM frequency is instead used for the transmission.
Bluetooth technology offers three power classes of Bluetooth output. The
Bluetooth output power classes determine the distance limits within which
data transmission can occur. The three output power classes are listed below:
Locate the Bluetooth button from the device’s settings and turn it
on.
Make sure that the devices are discoverable by enabling the
‘Discoverable’ mode in the Bluetooth’s settings.
Select your preferred Bluetooth device for pairing from the list
of available devices.
WiMAX
The acronym WiMAX can be broken down as follows:
W-Worldwide
I-Interoperability
M-Microwave
AX-Access
A reader
RFID tag
Frequency of operation.
Means of powering the RFID tag.
A communications Protocol which also referred to as the air
interface protocol.
Frequency of Operation
RFID tags need to be configured to the transceiver’s frequency in order to be
get activated. LF, HF and UHF are the three frequencies that RFID tags use.
Communications Protocol
Slotted Alloha is the air interface protocol that’s adopted for RFID tags. It is
quite similar to the Ethernet protocol. The slotted Alloha protocol only
allows RFID tags to transmit radio signals at predetermined time intervals
after getting powered. This technique greatly minimizes chances of collisions
of RFID transmissions. It also permits the reading of up to 1000 RFID tags in
one second.
WAPs even allow users to access the Internet while traveling. For example,
someone hangs a special device in their motor home’s window. It connects to
a port on a computer and, when placed within a modest distance (as close as a
few feet through obstructions such as thick walls or as far as 400 or so feet in
open air) of an active WAP, it will facilitate connections to local area
networks and to the Internet. If you are close enough to a WAP to pick up the
signal, and the signal from your wireless access device is adequately strong
and reliable, you can easily connect.
802.11g
802.11b
802.11n draft
Note
With wired networks, the term “at wire speeds” is interpreted to mean the
data is passing through the network at a rate that is dictated by the physical
limits of the devices and wires comprising that network. In wired networks,
connecting a computer to a fast Ethernet (100Mbps) or a Gigabit-speed
(1,000Mbps) network does not guarantee that that processed throughput will
equal those speeds. Speed limiters in a wired environment include the wire
itself, the performance of the network interface card (NIC), and the bus speed
of the computer’s system board and processor. Similarly, wireless networks
have a carrier radio frequency that, under the various standards, is designed
to carry data under ideal conditions at the rated data throughput. Your actual
throughput, however, will be less for all the same reasons as wired networks
—plus the fact that the signals are affected by distance and by radio
interference from other nearby wireless networks, portable phones, and even
microwave ovens. If you are using a Wi-Fi device that should get, for
example, 11Mbps throughput, it probably won’t in a typical environment.
Infrastructure Mode
In infrastructure mode, all devices on a wireless network communicate via a
central access point. The access point is often a wireless router. Devices
transmit packets to the access point which then forwards the packets to their
intended destinations.
Wireless Network security
Wireless networks are quite vulnerable to attacks. Primarily, wireless signals
sometimes extend beyond their intended geographical limits, making it quite
difficult to restrict access, especially by those who are intent on intruding into
the network.
Security Threats
Essentially, the following are the common threats to wireless networks:
What is an IP address?
n IP address is a four-octet, eight-bit digital address (32 bits total) that,
A when written out, looks appears as follows: 10.156.158.12. Evidently, an
IP is a special set of numbers that are separated by dots. The set of
numbers is used to identify a computer (or network device) using Internet
Protocol (IP) for network communication. In an IP address, the value of any
of the octets-the numbers between the periods-can be from 0 to 255.
An IP address is not entirely different from a phone number. If you know
someone’s phone number-say, your Uncle Brown-you can call her by dialing
her number on your telephone’s keypad. Then, your phone company’s
computers and switching equipment go to work to connect your phone with
the phone belonging to Uncle Brown over an audio communication channel.
Once connected, you can speak with Mr. Bradley, even if he is many miles
away. When you do, the audio signal carrying your voice will typically travel
over a pair of copper wires from your house to a switch at your local phone
company.
From there, the signal might be converted to a light wave in order to travel
over a fiber optic cable to another switch. From this second switch, the audio
signal might be converted to a radio-wave signal in order to travel from one
microwave tower to another. Eventually, as the signal nears its destination-
Uncle Mike’s house-it will be converted back to an audio analog signal,
traveling over a pair of copper wires from Uncle Brown’s phone company to
her house. (This scenario assumes the use of land lines. If cell phones are
involved, then this process will vary in the details, but not in the concept).
Default Gateway
A default gateway refers to a network node that uses the IP suite to act as a
router that forwards packets to a computer in on a different network unless
there exists another path specification which matches IP address of the
receiving network host.
Finding the IP Address of the Default Gateway
It is important to be able to know the IP address of the network’s default for
effective troubleshooting, and to gain access to web-based management of a
router. Normally, the router’s private IP address is the default gateway’s IP
address. It is the IP address with which a router communicates with another
local network. However, the private IP address may not necessarily be the
default gateway’s IP address so you need to find it in some way.
The following is a step-by-step guide on how you can find the IP address of
the default gateway (for all Ms Windows versions):
You should see a window that shows the IP addresses of your computer,
DNS servers, default gateway, and subnet mask among many more important
aspects of the network. Alternatively, you can consider doing the following:
Ping the IP address of the router (assuming that you know it). To ping the IP
address of the router, open the command prompt (like in the first method).
Exercise: what appears in the CMD prompt should tell you whether your
machine is properly configured with an IP address or not.
IP Address Configuration
The following is a step-by-step guide on configuring the computers in our
office LAN:
The process is more or less the same in other Windows operating system
versions, with quite little differences.
In Mac OS:
➢ Click Apple
➢ Click System Preferences
➢ Click Network
➢ Click Network Status
➢ Select Built-in Ethernet
New screen appears with Configure IPv4 option
➢ Select Manually
➢ Set IP address and subnet mask (manually)
➢ Select Apply
In the configuration of the above office LAN, subnet mask 255.255.0.0 is
used (do further reading to know more about subnet masks).
DHCP
DHCP is short form of Dynamic Host Configuration Protocol. This is a
protocol that provides swift, automatic and centralized IP address allocation
in a network. DHCP is also used in the proper configuration of default
gateway, subnet mask and DNS server.
DHCP in Action
We now know what the DHCP does. But we do not know how it does
whatever it does. Trust me we won’t get out of here without a proper
understanding of how DHCP achieves performs its functions.
DHCP Server
A DHCP server issues unique IP addresses and constructs other network
information automatically. Whereas small businesses and homes rely on
routers to perform the functions of a DHCP server, the implementations of
large networks could makes use of single dedicated computer to do the same
work.
Clients on routed networks request for IP addresses from the routers. Routers
respond by assigning available IP addresses to the network devices that sent
their requests.
Requesting devices must be turned on and connected to the network. The
request must be directed at the server. Such a request is known as a
DHCPDISCOVER request. The DHCPDISCOVER request is contained in
the DISCOVER packet. The server responds by providing the client an IP
address with a DHCPOFFER packet. The network device then responds by
accepting the offer. If the server finds it suitable to confirm IP address
assignment to the device, it sends an ACK that the device indeed has been
assigned a given IP address. If the server finds it unsuitable to confirm the
assignment of IP address to the device, it sends a NACK
Merits of Using DHCP
Class A Address
This class of IP addresses is characterized by the following key features:
A class B address’ initial two bits of the first octet are always set
to one and zero.
IP addresses of Class B type range from 128.x.x.x to
191.255.x.x.
Class B’s default subnet mask is 255.255.x.x.
Network addresses in Class B are given as 214 (16384).
There are 65534 host addresses per network.
The IP address format for Class B is
10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
Class C address is characterized with the following features:
The first three bits of the network address’ first octet are always
set to 110.
IP addresses of Class B range from 192.0.0.0 x to
223.255.255.255.
Class C’s default subnet mask is given as 255.255.255.x.
Class C boasts of 221 (2097152) network addresses.
There are 28-2 (254) host addresses per network.
The format of Class C address is given as
110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address
Class D addresses have the following features:
The first octet of the IP address contains 1110 as its first four
first bits.
IP addresses of Class D range from 224.0.0.0 to
239.255.255.255.
This class is reserved for multicasting. Multicasting involves the
transmission of data, not to one host or two, but to multiple
hosts. This is the reason why it is unnecessary to extract host
addresses from the IP addresses of class D. there is also no
subnet mask for Class D.
Class E
The following are the features of Class E:
IP address in Class E are set aside for R&D, study or experimental functions
only. IP addresses in this class range from240.0.0.0 to 255.255.255.254. Just
like Class D, Class also doesn’t have a subnet mask.
Chapter 6:
IP Subnetting
How to Subnet
outed IP environments require that your pool of IP addresses be sub-
R netted. This allows each sub-net to see itself as a discrete segment of the
larger internetwork. The router then ties together the various sub-nets into
one network. The router knows how to route traffic to the correct segment
because it builds a routing table. The routing table is basically the networks
roadmap.
IP sub-netting is fairly complex, and so to make this discussion informative
but still digestible at an introductory level, we will limit our exploration of
sub-netting to one class of IP addresses; we consider the illustration of sub-
netting a Class B range of IP addresses. The mathematical tricks that we use
to sub-net the Class B network can also be used to sub-net a Class A or Class
C network (although sub-netting Class C networks greatly limits the number
of usable IP addressed that you end up with).
Sub-netting is a two-part process. First you must determine the sub-net mask
for the network (it will be different than the default sub-net masks; for
example, the default for Class B is 255.255.0.0). After figuring out the new
sub-net mask for the network, you must then compute the range of IP
addresses that will be in each sub-net.
Okay, let's cheat a little before we do the math of sub-netting a Class B
network. I think it will aid in the overall understanding of the sub-netting
process. The following is a simple description which shows the new sub-net
masks, the number of sub-nets, and the number of hosts per sub-net that
would be created when using a certain number of bits for sub-netting:
Bit Borrowing
Suppose we needed to come up with 30 subnets from our 130.1.0.0 network;
we would have to first compute the bits that ought to be borrowed to come up
with the subnet mask.
To know the number of bits we have to get the sum of lower order bits then
subtract one (since we can’t use subnet 0).
The ordered bits are 128, 64, 32, 16, 8, 4, 2, and 1.
Lower ordered are counted from 1, 2, 4… whereas higher ordered bits are
counted from 128, 64, 16…
So, 30 subnets are obtained by getting the sum of 1+2+4+8+16 minus 1.
Which is 31-1=30.
Counting from 1 to 16 (1, 2, 4, 8, 16) gives us 5 bits.
So the number of borrowed bits is 5.
To get us going, we’ll need to revisit that procedure for determining our
subnet mask. We used the higher ordered bits to determine the value of the
third octet of our subnet mask.
Can you remember the lowest of the higher ordered bits? Certainly, you do-
just like I do. It was 8. So, we go with this lowest of the higher ordered bits as
increment on the third octet of our network address to obtain the first subnet
ID and keep doing this all the way to the last the 30 subnets.
Thus, the first subnet and subsequent subnets will be as follows:
130.1.8.1 to 130.1.15.254;
130.1.16.1 to 130.1.15.254;
130.1.24.1 to 130.1.15.254;
etc, etc.
Note:
You can neither have a zero (0) in the last portion of an address nor 255 in
the end of an address.
VLAN
VLAN, in full, is Virtual Local Area Network (normally referred to Virtual
LAN). It refers to a switched network that is segmented logically using a
project team, application or function. The logical segmentation is done
without consideration of users’ physical locations.
VLANs are more or less same like physical LANs. The only difference is that
VLANs allow end stations to be grouped regardless of whether they are on
the same physical segment or not.
A VLAN can accommodate any form of switch module port. Multicast,
broadcast and unicast data packets can be relayed and swamped to end
stations only in a given VLAN.
Each VLAN is taken as a logical network. Packets fated for stations outside
of a VLAN must be forwarded through a router to reach its destination.
Notably, a VLAN can be associated with an IP sub-nets.
Supported VLANs
Conventionally, we identify VLANs with a numbers ranging from 1 to 4094.
The following must be noted:
1002-1005 VLAN IDs are set aside for FDDI and Token Ring
VLANs
VLAN IDs > 1005 are not found in the VLAN database since
they are extended-range.
Switch module supports extended-range and normal range
VLANs (1005).
Number of configured features, SVIs and routed ports affects
functioning of the switch module hardware.
Why make the switch? Because under IPv4, there are not enough numbers
available to assign one to every computer or device on the Internet that needs
one. IPv6 solves this problem, offering 2 raised to the 128th power addresses;
in contrast, IPv6 offers only 2 raised to the 32nd power-although masking
and private-address strategies have been used to extend the number of
available IPv4 addresses on the Internet.
Address Depletion
IP address depletion refers to the exhaustion of unassigned IPv4 addresses. IP
address has always been anticipated considering the unchecked upsurge in of
computing devices, high-speed growth of the internet, and limited IPv4 IP
addresses. The deployment of IPv6 was a response to the IP address depletion
scare as a result of the apparent IPv4 limitations.
Further, a number of concepts have been established to address the same
issue while still implementing IPv4 IP addressing. Most popular of the
responses to IP address depletion was the concept of the Network Address
Translation and the Classless Inter-Domain Routing (shortened to CIDR).
Chapter 7:
Network Protocols
TCP/IP Model
This model came into being way before the conception of the OSI model.
The TCP/IP model exhibits remarkable differences from the OSI model.
Essentially, the TCP/IP model is made up of 4 layers that are listed below
(from the lowest to the highest layer):
Domain Name System (or simply DNS): The connection of a host machine
on the Internet is identified by the use of a unique IP address that is assigned
to each host.
People prefer the use of names to IP addresses since it is easier to deal with
names than addresses. For this reason, the DNS is used to map names to the
different addresses.
User Datagram Protocol (UDP): this is the cheaper alternative of the TCP.
This protocol does not provide any of the TCP’s features. This means that
UDP is a less effective protocol, but does have less overhead. As a result, it
less costly as compared to the TCP.
UDP is an ideal protocol in situations where reliable transport is not a
priority. It is a cost effective option. UDP is a connectionless protocol, unlike
TCP which is connection-oriented.
Token Ring Protocol: This protocol requires that the network topology
defines the order of data transmissions by host machines. All network hosts
are linked to one another in one ring.
Token ring protocol uses a token (a 3-byte frame) that moves around the ring
via token passing mechanism. Frames, too, move around the ring in the same
direction as the token to their respective destinations.
FDDI protocol: FDDI stands for Fiber Distributed Data Interface. It refers to
the ISO and ANSI standards that govern data transmission on fiber optic
media in LANs. The fiber optic lines are restricted to a range of up to 124
miles (200km).
FDDI protocol works in a similar way as the token ring protocol. FDDI is
often deployed on the backbone for WANs.
FDDI networks have two token rings:
Physical layer: this layer outline the electrical functional and physical
features that connect a computer to a terminal node (packet-switched). The
linking is made possible by the X.21 physical implementer.
Data link layer: data exchange over the link is done by the data link layer’s
link access procedures. Control information is attached to packets and
transmitted over the link. The packets originate from the packet layer. When
the control information is attached to the packets, Link Access Procedure
Balanced (LAPB) is formed. This kind of services offers a means of
delivering a bit-oriented, ordered and error-free frames.
Packet layer: this layer gives a proper definition of data packet format and
control procedures for data packet transmission.
An external virtual circuit service is offered by this layer. Virtual circuits
come in two forms:
Frame relay implements all standard protocols at the physical layer and is
often applied at the data link layer.
Virtual circuits can join one router to multiple remote networks. Often,
permanent virtual circuits make such connectivity a reality. Switched virtual
circuits can be used as well.
Frame relay is based on the X.25, and a fast packet technology. Data
transmission is done through the encapsulation of packets into multiple sized
frames. A lack of error-detection is the primarily the cause of the service’s
high transmission rate. End points perform error-correction functions as well
as retransmissions of dropped frames.
The following are the frame relay devices:
Routing Types
Routing appears in the following classifications:
Static Routing
This is also referred to as non-adaptive routing. The administrator has to add
routes in the routing table manually. Packets are sent from source to
destination along a path that’s defined by the administrator. Routing does not
depend on network topology or network state. It is the job of the
administrator to decide the routes along which data are transmitted from
source to destination.
Dynamic Routing
This is also referred to as adaptive routing. In this approach, a router
determines the routing path as per the prevailing condition in the network.
Dynamic protocols the heavy-lifting when it comes to discovering of new
routes. These protocols are RIP and OSPF. Automatic adjustments are meant
when particular routes fails to function as expected.
Important:
A router filters out network traffic not merely by packet address,
but by a specific protocol.
A router does not divide a network physically. It does so
logically.
IP routers divides networks into a number of subnets to ensure
that specific network traffic meant for a particular IP address can
be allowed to pass between specified network segments.
However, this intelligent data forwarding leads to decreased
speeds.
Routing Protocols
Routes that are determined via routing protocols are known as dynamic
routes. The configuration of routing protocols on routers aids in routing
information exchange.
Let’s examine the great benefits that come with routing protocols.
Link state and distance vector protocols are collectively referred to as interior
routing protocols (IGP), and are used for information exchange within self-
governing systems. Border Gateway protocols (BGP) are exterior are
examples of exterior routing protocols(EGP) that helps in the routing
information exchange between autonomous systems that are found on the
internet. Other than the above protocols, there is Cisco’s EIGRP protocol.
Though it is essentially an advanced form of distance vector protocol, some
descriptions portray it as a product of distance vector and link state protocols.
Distance Vector Protocols
Analogous to the name, the best path is determined by examining shortest of
the routes (distances).
A distance vector protocol relays an entire a routing table to a directly linked
router with the same routing protocol (the directly linked table is known as a
neighbor). Good examples of distance vector protocols are EIGRP and RIP.
Summary
Though link state routing protocols and distance vector routing protocols aim
at accomplishing the same objective, their implementations are clearly unlike.
The following are the obvious distinctions between link state routing
protocols and distance vector protocols:
Samples of distance vector routing protocols include IGRIP and RIP. Link
state routing protocols include IS-IS and OSPF protocols.
Routing Tables
A set of rules that often presented in table format for the determination of the
best route for packet forwarding by a router or switch, is referred to as a
routing table. A basic routing table is characterized by the following features:
Ports
A network port refers to an application-specific or process-specific software
construct which acts as an endpoint. A port is used by transport layer
protocols of the IP suite including TCP and UDP.
Every network port is identified by a port number. A port number associate
the IP address and nature of transport protocol over which communication
takes place.
Port numbers are 16-bit unsigned integers. Port numbers begin from 0 to
65535.
Chapter 8:
Internet Essentials
Internet basics
his section covers some of the basic technology concepts that makes the
T Internet work and discusses various options for connecting to the
information superhighway so that everyone on your network can surf the
Internet, communicate via e-mail, share digital pictures with others, conduct
research using countless online resources, make purchases online, download
movies and music, video conference, and more. To begin with, let’s talk a
little bit about the history of the Internet
Internet History
When talking about the historical backdrop of any medium, regardless of
whether print, broadcasting or the Internet, there are a few issues of strategy.
Presumably the most evident red herring for any type of innovative
historicism is the thing that used to be known as the 'incredible man'
hypothesis of history. While this overwhelmed more established types of
historiography, which continued by posting lords and commanders, it has
been expelled, or if nothing else uprooted from general verifiable records by
social and financial investigations, and would have all the earmarks of being
less significant to media history. Regardless, the enticement still exists to
stamp out the pioneers of any innovation, their Gutenbergs, Bells, and
Marconis. While anecdotal subtleties have their significance as a nexus of
recorded and material conditions, to seclude an individual 'virtuoso' from
mechanical, financial and social relations misshapes any record of starting
points more than it lights up. In the event that the Net as we probably am
aware it would not have taken its present structure without figures, for
example, Paul Baran or Tim Berners-Lee, it couldn't have been considered
without the virus war and monetary goals of the PC business.
The following issue confronting media history, especially when managing the
Internet, is progressively unpretentious, yet considerably more dangerous.
Innovative determinism, in any event in its solid structure, accept that the
chronicled advancement of a medium is a procedure of vital ‘laws’, whereby
the improvement of another medium makes the conditions for social and
mental collaborations. Figuring appears to be particularly helpless against
this type of determinism, especially since the articulation of 'Moore's Law',
generally deciphered to imply that PC power will twofold at regular intervals
or somewhere in the vicinity – in spite of the fact that, as we will see, taking
this individual law outside the realm of relevance creates its own issues.
While speculations of innovative determinism can be valuable for getting
away from the humanistic propensity to put people at the focal point of
history, one uncommon model being Manuel de Landa's War in the Age of
Intelligent Machines (1991), and such a view doesn't evacuate the fraudulent
inclination to consider the to be of innovation as one of inborn advancement.
A lucid record of mechanical history that exhibits a portion of the ideals and
indecencies of such determinism is Paul Levinson's Soft Edge (1997).
As Gary Chapman comments, value-based or deterministic models of
mechanical history are a lot less fortunate than those that consider social and
material conditions, especially the readiness of governments, organizations
and markets to put resources into new media. 'PCs, as different machines, are
material portrayals of a long procedure of advancement, mistake,
improvement, more blunder, greater improvement, combination of highlights,
the annihilation of supplanted rehearses, scholarly achievements and
impasses, etc, all encapsulated in the physical item and the manner in which
we use it' (1994:304).
Patrice Flichy has mentioned a comparative objective fact with reference to
radio and different interchanges media, that 'what shows up today as a
progression of normally enunciated advances seems to be, as a general rule,
the historical backdrop of a troublesome section starting with one space then
onto the next' (1995: 100). As to another socially significant advancement,
TV, Raymond Williams has contended against the lack of innovative
determinism, or 'symptomatic advances' expelled from social and social
structures: such developments are included not from a 'solitary occasion or
arrangement of occasions', however depend for their acknowledgment 'on
creations made with different closures basically in view' (1989:13).
Specifically, notes Williams, innovations, for example, telecommunication or
power required an adjustment in social recognitions before they were viewed
as valuable.
Similarly as with the PC, in the previous couple of years the Internet has been
allowed an ancient times, the purported 'Victorian Internet' of the broadcast,
which was introduced with Samuel Morse's transmission of the main electric
transmit message, 'What hath God created?' in 1844. Over the next decades,
broadcast lines were introduced crosswise over North America and Europe
and, in 1866, the primary transoceanic link was laid.
As transmit connections spread over the world, enlarged by phone lines
following Alexander Graham Bell's development in 1876, the establishments
were laid for a worldwide broadcast communications framework
(Moschovitis et al. 1999; Standage 1998).
The advancement of such a framework was helped by the creation of the
electronic PC. Despite the fact that Charles Babbage, baffled by the issues of
figuring in what Doron Swade has called 'a time of evaluation' (2000), had
planned and incompletely assembled his Difference Motor in the mid
nineteenth century, it was not until the mid-twentieth century that the
guideline of a universally handy PC – ready to peruse, compose, store and
procedure information – was set up.
Alan Turing, who had gone to King's College, Cambridge, and Princeton
University, set up the guideline of a mechanical PC, the 'Turing Machine', in
his paper 'On Computable Numbers'. Fundamentally, Turing likewise
contended that only one out of every odd numerical issue was resolvable, and
that there are a few issues for which no calculation exists that could be
nourished into a PC. In any case, most issues, when changed over into a
progression of computerized groupings of 1s and 0s, could be bolstered into a
machine by tape, recorded and unraveled for yield.
While Turing was delineating the hypothetical standards of the PC during the
1930s, Konrad Zuse built the primary crude electronic PCs, the Z1 and Z2;
the Z1, started in 1936, utilized mechanical entryways to tally parallel
numbers (Zuse having picked doubles over decimals since they could be
figured all the more rapidly).
In the Z2, these doors were supplanted by quicker electromagnetic transfers,
of the sort utilized in phone trades, however it was not until the development
of the Z3 in 1941 that Zuse finished a completely working, programmable
PC. Most gadgets of this time were actually close to ascertaining machines.
The capacity to process and perform various capacities didn't start until the
innovation of the Z3 and other completely programmable, electronic gadgets.
ENIAC (Electronic Numerical Integrator and Calculator), housed at the
University of Pennsylvania toward the part of the bargain World War, and the
Colossus, worked at Bletchley Park in 1943 and intended to figure out codes
created by the German Enigma machine.
These early gadgets, which were joined in 1944 by Howard Aiken's and
IBM's Mark I and the Manchester 'Child' in 1948, were enormous machines.
ENIAC, for instance, secured 650 square feet, while the Mark I gauged five
tons, and such early, immense PCs were loaded up with flighty vacuum
cylinders and transfers (the term bug is followed back to a story that one of
the main software engineers, Grace Murray Hopper, found a moth in the
Mark II in 1947). Just because, in any case, they spoke to the capability of
consistently expanding PC control.
The UNIVAC (Universal Automatic Computer), in view of the thoughts of
John Von Neumann, was the principal financially accessible PC and the main
such machine to store information on attractive tape. The following
undertaking was to discover something to do with this power, and a few
analysts have even recommended that the mid-twentieth century insanity for
concentrating data owes all around to the development of these behemoths in
government and enormous partnerships. All through the 1950s and 1960s,
centralized computers, for example, the System/360, alongside the
substantially more dominant 'supercomputers', ruled open reasoning and
involved gigantic cupboards in uncommonly cooled rooms gone to via
seasoned technocrats.
Internet Technical Terms
Just as you don’t necessarily need to know the inner works of a combustion
engine to drive a car, it’s not imperative that you understand every aspect of
how the Internet works in order to take advantage of all that it offers. That
said, it never hurts to examine, however briefly, the various terms and
concepts that relate to the Internet.
TCP/IP
TCP/IP—short for Transmission Control Protocol/Internet Protocol—is a
group of rules called protocols that define how devices, be they similar or
diverse (i.e., computers, routers, and modems), connect and communicate
with each other. (In this context, a “protocol” describes technical details
about how any two communication devices will interact and work together to
move digital data from one device to another.)
TCP/IP works by determining the best available transmission path for data to
travel. Rather than sending all the data in one large chunk, however, the
protocol breaks the data into small packets.
These packets can travel over any number of different paths to reach their
destination; when they arrive, they are reassembled in order.
To ensure that packets arrive at the correct destination, each one contains
both the destination address and the source address. This information is
stored in each packet’s “envelope,” or “header.”
The TCP part of the protocol controls the breakdown of data on the sending
end and its reassembly on the receiving end, while IP handles the routing of
the data packets.
Think of it this way: Sending data via TCP/IP is not unlike sending letters via
the U.S. Postal
Service. Each letter you send by post encompasses the dispatcher’s address
(i.e., the source address) and the recipient’s address (i.e., the destination
address). The difference is that with snail mail, you send the whole letter in
one package or envelope (packet). If you were to send that same letter over
the Internet, it would be sent in hundreds if not thousands of packets
(envelopes) to get to its destination, after which it would be electronically
reassembled.
Internet protocols in use under the TCP/IP banner include UDP, PPP, SLIP,
VoIP, and FTP.
DNS
Just as it is easier to remember someone’s name than it is to remember her
phone number, so, too, is it easier to remember the location of a Web site by
its domain name rather than its IP address. For example, suppose you
frequently visit the Web site of Ford Motor Company. Chances are, you will
probably remember the site’s domain name-i.e., Ford.com-and not its IP
address. Your computer’s Web browser, however, operates in the exact
opposite way. It needs to know Ford.com’s IP address in order to connect
with the site.
That’s the point domain name system comes in. When you enter the domain
name of a site you want to visit (Ford.com), your Web browser initiates a
session with a DNS server either locally or on the Internet to locate the IP
address associated with that domain name. DNS servers perform a
hierarchical lookup for the IP addresses using domain name associations for
registered domain names to locate the IP address of the site you want to visit.
If the DNS server your computer is linked to cannot determine the IP address
linked with the domain name you entered, the DNS server will then look up
the number on successively higher-level DNS servers until it finds the entry
(or errors out).
Once the IP address is found, your computer can locate and communicate
with the computer housing the Ford.com Web site. The first DNS server
stores the association in memory for a time in case you or someone else it
serves needs to visit that site again. The DNS server stores only frequently
used associations because it can look up the ones it does not know on the
higher level DNS servers.
Sub-net Mask
A sub-net mask is a number applied within a host configuration file that
allows for the division of an IP class C network into separately routable
networks. For home networks on an ISP’s larger network, the sub-net mask
will most often be 255.255.255.0, because home networks are not usually
split into physically separate segments with internal routers. In office
buildings and business environments, sub-nets are used to detach traffic onto
physically isolated networks to retain the data traffic on the low and to
enhance performance for access to peripherals and local servers. Data traffic
destined for another sub-net or to the WAN will have to pass through the
router.
Communication
This takes place in the following ways:
E-mail
The most popular Internet communication tool is e-mail-that is, messages are
sent electronically from sender to host on the Internet, potentially forwarded
to other hosts, and ultimately downloaded at the recipient’s convenience.
One way to obtain an e-mail account is from your Internet service provider
(ISP); most plans include the use of at least one e-mail address. Alternatively,
you might run your own home or office e-mail server under a domain name
you own. You access messages received via these accounts through special
software called an e-mail client.
Another option is to use any one of several free Web browser–accessible e-
mail services, such as the following:
Yahoo! Messenger
Window Live Messenger
Video Conferencing
Video conferencing gives users the rare chance of conducting virtual
meetings, thereby cutting down on a lot of transport costs. To do a video
conference via the Internet, at least one participant ought to have a static IP
address detectible to the Internet. Moreover, each contributor should have a
service with an upload speed of at least 400Kbps to sustain quality
communications, principally if you’re using the video component. To video
conference, you must have access to a Web cam of some sort.
Blogging
Blogs, short for Weblogs, are sites on which people can share information
with other interested or likeminded individuals. Think of a blog as a digital
journal that can be read by people around the world.
Engaging in Commerce
Commerce represents one of the most common uses of the Internet. Business-
related activities include (but are not restricted to) the following:
Downloading Software
Many major software publishers-including Microsoft, Corel, and Sun-offer
users the ability to download what would otherwise be boxed commercial
off-the-shelf software (COTS). All you need is a good Internet connection
and a PayPal account, credit card, or in some cases a checkbook to pay the
fee. There is also a wide variety of trial software, freeware, and shareware, as
well as open-source software, available for download online.
Surveillance
Setting up surveillance cameras to be viewed over the Web is nearly a plug-
and-play operation, provided you have the necessary IP addresses to support
the camera or Web servers. This technology allows, for example, monitoring
of your home or office while away or, say, checking on your summer house
while you are at home.
Business owners can set up cameras at their place of work to monitor events
at the office or keep tabs while away.
Internet speed
Customer service support
Email addresses
Price
Equipment provided by ISP
Nature of IP address provided-static or dynamic
Complimentary Wi-Fi access
Transmission media used
Webpage hosting
Using Dial-Up
Dial-up is, for the most part, obsolete from a speed perspective, but in some
rural areas, it is the only available low-cost Internet-connection option. When
connecting your computer using dial-up over a plain old telephone service
(POTS) line, there are three common scenarios:
Using Cables
A popular Internet-connection choice in many areas is cable. In fact, your
home or small office may already have a cable connection for television
service, making the addition of a cable modem to the mix fairly simple. Cable
Internet service is high speed-much better than that offered by dial-up. In
addition, many cable-based packages bundle increased television channels for
viewing and Internet phone service.
Using Wi-Fi
Connecting wirelessly to the Internet is fairly simple, but your network must
include a gateway or router designed for wireless connections. In addition,
any computers on your network must have Wi-Fi capabilities built in or, in
the case of a laptop or notebook computer, a slot for a wireless Wi-Fi card.
If your computer or workstations are not configured for Wi-Fi, fear not.
There are hosts of manufacturers making devices to support wireless
connections—essentially, these are portable wireless NICs that can be
plugged into either an Ethernet port or a USB port.
Using DSL
Using DSL to connect to the Internet over standard phone lines has an
advantage of accessing the internet are higher speeds than the dial-up option
(assuming you live in an area where DSL service is available). Moreover,
whereas a dial-up connection relies upon the audio/analog band on a phone
line, data on a DSL Internet connection passes over the wire pair at a
frequency that is higher-meaning that users can still use their phone lines
while at the same time using the Internet (and, by extension, keep your
Internet connection live 24/7).
Chapter 9:
Virtualization Architecture and Cloud computing
Virtualization
Virtualization is a process by which a virtual version of some actual thing is
created. In computing, this may involve virtualization of an operating system,
network resources, server, storage device or even a desktop.
Technically, we can refer to virtualization as a technique which permits
sharing of one instance of a physical resource or application among multiple
users or groups.
The technique involves the assignment of a logical name to a physical storage
of a given resource or application, and offering a pointer to the specific
resource or application as is required.
Types of Virtualization
The following are the different categories of virtualization
Storage drives
Motherboard
Processor
Network connection
Video cards
Memory
Power supply
Virtualization Software
The following are the most common popular virtualization software:
VM Ware Fusion
VM Ware Workstation
Parallels Desktop
Oracle Virtualization
QEMU
Microsoft Hyper-V
Redhat Virtualization
Veertu-for MAC
Apple-Boot Camp
Hardware
Administration and end-user support
Software
Data management
Performing Inspections
Keeping a close eye on the condition of all hardware is essential. For this
reason, you should inspect all hardware at least once per month. This
inspection should include the following:
Upgrading Firmware
“Firmware” refers to any program that is resident in a chip. For example, a
computer’s BIOS is firmware. Sometimes, maker’s release updates for
firmware to fix flaws or to enable the equipment to work with some newly
released hardware device or operating-system upgrade. You should check the
manufacturer’s Web site or help desk for all network equipment at least
quarterly to determine whether any firmware upgrades are available for your
equipment.
If so, be sure to adhere to the maker’s instructions to the letter for loading
new firmware and firmware updates. Firmware loads often require low-level
booting from a DOS or maintenance disk, although some will be compatible
with the computer’s operating system.
Upgrading Hardware
Two factors drive hardware upgrades:
Performance issues due to changes in applications or the addition
of new applications may necessitate a hardware upgrade or the
addition of new features that are linked to the hardware’s
capability or capacity. For example, adding memory and
installing an additional hard drive for more file space are typical
upgrades performed to support those changes.
You may opt to upgrade hardware on a purely optional basis-for
example, adding a bigger monitor, higher-quality sound card, a
TV card, or a similar device.
Repairing Hardware
As the person responsible for the network, you must assess your willingness
and ability to perform hardware repairs-before a hardware component stops
working. To that end, you should go through your entire hardware inventory
and determine the following:
For big-ticket items, you may want to transfer the repair risk to someone else
by arranging for service and support contracts-assuming your budget can
support this.
Network Troubleshooting
Network trouble-shooting refers to all the measures and techniques
assembled to identify, diagnose and resolve network issues. The process is
systematic and primarily seeks to restore normalcy to the functionality of a
computer network.
Network administrators are charged with the responsibility of identifying
network problems and repairing it with the aim of ensuring a smooth run of
operations in the network. They also do whatever it takes to ensure that the
network is operating at optimal levels.
The following are just a few of the many computer network troubleshooting
processes:
Hardware Troubleshooting
This is a form troubleshooting that takes care of issues with hardware
components. It may include:
Software Troubleshooting
Software entails a set of measures for scanning, recognizing, diagnosing and
offering solutions to issues with software in the network. It includes issues
with network operating systems, diagnostic software as well as software
applications installed on individual network computers.
Cable Troubleshooting
Cabling offers a physical connection between network components. Cables
are prone to physical interference. As a result, there may result in disruption
of connection due to external pressure. They may get damaged, too. When
such interference occurs, a lot of issues may arise since interference with
cables means direct interference to data transmission. Thus, c able issues
always lead to communication lapse since data transmission is hampered.
As a network administrator, it is necessary to identify cable issues and be in a
position to offer quick fixes so that network activities are not interfered with,
at least not for long durations.
RUSSELL SCOTT
Introduction
he content of this books is arranged in a way that allows even the
T completely inexperienced networking, the first-time learner to effortlessly
take in the various networking concepts-from the most fundamental to the
very advanced ones.
Just as it is the norm to crawl before we walk (and eventually sprint!), the
book sets out with an introduction that allows you to grasp the meaning of
computer networks.
Given the fact that the book introduces you to the fundamentals of network
design, you’ll certainly come out sufficiently equipped with a good deal of
knowledge on the ABCs of network design, user’s responsibilities, features
and step-by-step guidelines on the installation of a small office or home
network. As you move further down, subsequent chapters offer more
advanced networking concepts such as wireless network technologies and
communications.
Most importantly, in the final chapters, the book talks about network security,
social engineering, and different hacking methods.
Being a thoroughly researched and organized volume, this book, in its
simplicity and brevity, allows you to conveniently acquire the highly valuable
networking knowledge needed to kick-start your journey towards a promising
networking career. With a practical approach that the book assumes, we are
certain that you’ll come out with the right know-how to get you started in this
field.
Chapter 1:
Intro to Computer Networking
Computers/Workstations
Computers may be desktop computers, laptops as well as portable devices
(smartphones and tablets) plus their additional accessories such as portable
hard drives, CD Players, keyboards and mice. They are the major hardware
components of any computer network.
Computers are the primary components without which a network is just but a
dream. Computers offer the platform for users to perform their different tasks
on the network. In the case of a centralized system, computers serve as a link
between users and the dedicated network server.
Wired PANs: a wired personal area network is created when a person uses a
USB cable to connect two different hardware devices. For instance, it is
common practice nowadays to connect a phone to a computer via a USB
cable to share files, access the Internet, and many other things.
WAN Examples
Mobile Broadband: 3G or 4G networks are widely serving people in a big
region, state or even country.
Private Network: banks create private networks that link different offices
established in different locations via a telephone leased line that’s obtained
from a telecom company.
Last Mile: telecommunication companies offer internet services to thousands
of customers in different cities by simply connecting homes, offices and
business premises with fiber.
Private Networks
Private networks are IP networks with host computers that hide behind a
device that provides NAT. The computers on these networks are assigned IP
addresses outside of the pool of numbers used on the Internet. Essentially,
any number in the private address range can be assigned locally to a
computer or host.
Private network IP addresses begin with any of the following numbers:
10
172.16–172.31
192.168
Internetwork
An internetwork refers to two or more LANs, or WAN segments that are
linked using devices, and are configured using a local addressing scheme.
The process is referred to as internetworking.
An interconnection between private, commercial, government, industrial and
public computer networks can as well be referred to as internetworking. The
process makes use of internet protocol.
The Open System Interconnection is the reference model that is universally
used for internetworking.
Network Topology
A network topology refers to the arrangement and the way components of a
network are interconnected. Two types of network topologies exist:
Physical topology
Logical topology
Tree topology
Ring topology
Mesh topology
Bus topology
Hybrid topology
Star topology
Bus Topology
In this topology, all nodes on a network are connected via a single cable.
Network devices are either linked directly to the backbone cable or via drop
cables.
When a node wants to relay some message, it relays it to the entire network.
The message is received by all the network nodes regardless of whether it is
addressed or not.
This topology is primarily adopted for 802.4 and 802.3 (Ethernet) standard
networks.
Bus topology configuration is simpler in comparison with other topologies.
The backbone cable is a “single lane” through which messages are relayed to
all the nodes on the network.
Bus topologies popularly rely on CSMA as the primary access method.
CSMA is a media access control that regulates data flow in order to maintain
data integrity over the network.
There are two options for problem handling in case of simultaneous message
relay by two nodes on the network:
When the transmission media is busy, the sender lays back and relaxes until
the media is not occupied. The technique significantly minimizes the chances
of message collisions. It not bank hopes on “recovery after the collision.”
Ring Topology
The only difference between ring topology and bus topology is that in the
former the ends are connected; while in the former, ends are open.
When one node gets a message from the sender, that node sends the message
to the next node. Hence, communication takes place in one direction-it is
unidirectional
Each and every single node on the network is linked to another node without
a termination point. Data flows continuously in one loop-endless loop.
Data flow always takes a clockwise direction.
Ring topology often uses token passing as the main access method.
Token passing: an access method in which tokens are passed from station to
another.
Token: a data frame that moves around the network.
A token moves around the network from one node to another till
the destination.
The sender puts an address plus data in the token.
The token passes from one node to the next-checking the token
address against the individual addresses of each node on the
network until it finds a match.
The token is used as a carrier-for data (and the destination
address).
Star Topology
In this topology, a central computer, switch or hub connects all the nodes on
the network. The central device is the server while the peripherals are clients.
Coaxial cables or Ethernet’s RJ-45 are favored for connection of the network
nodes to the server. Switches are hubs are preferred as the main connection
devices in this topology.
This is by far the most widely used topology in network implementations.
Tree Topology
Tree topology puts the features of bus and star topologies in one basket.
In this topology, all computers are interconnected, but in a hierarchical
manner.
The top-most node in this topology is referred to as a root node whereas all
the others are descendants of the root node.
There exists just a single path between two nodes for the transmission of
data-forming a parent-child hierarchy.
Mesh Topology
In this topology, all computers are interconnected via redundant connections.
It offers different (multiple) paths from one node to another.
In mesh topology, there are no connecting devices like switches or hubs. For
instance, the Internet.
WANs normally are implemented with mesh topology since communication
failures are of serious concern. It is also largely implemented in wireless
networks.
The formula for forming mesh topology is shown below:
Hybrid Topology
The amalgamation of different network topologies (at least two of them)
result in another topology that is conventionally referred to as hybrid
topology. It is a connection among different links and computers for data
transmission.
A hybrid can only be formed by a combination of dissimilar topologies. For
instance, a combination of bus and star topologies. However, a combination
of similar topologies does result in a hybrid topology.
An issue in one part of the network does not affect the entire
network.
Hybrid topology allows network to be scaled further by addition
of more devices without messing with the existing network.
This network topology is quite flexible. An organization can
customize the nature of its network to suit its specific network
needs and interests.
The network topology is highly effective since it can be designed
in a way that network strength is maximized and the limitations
of the network are minimized.
Disadvantages of Hybrid Topology
Network Architecture
Computer network architecture refers to the logical and physical design of
computer network components. Typically, it is the arrangement and
organization of networked computers (among other network devices), and the
manner in which tasks are allocated to different computers and other devices
in a given network.
In this case, computer network components include hardware and software
components as well as protocols.
There are two recognized network architectures: peer-to-peer network
architecture and client/server network architecture.
Ethernet
Ethernet network architecture is the most widespread of all network
architecture all over the globe. We’re going to examine the depths of this
architecture and most likely find out why this architecture is as popular as it
is.
Most network peripheral components have a built-in NIC. As a result, they
can be easily plugged into an Ethernet wall outlet. It must be noted that the
standard predetermined Ethernet length of wire of 100m from a hub or switch
remains so even when it comes to NIC-equipped print servers and printers;
just as it is the case with workstations.
Printers that do not have a built-in NIC can still be used on a network by
getting a connection with a network print server through a parallel, serial or
USB port, or onboard NIC.
Suffice to say, Ethernet is a passive network architecture that embraces the
wait-and-listen approach. It is also referred to as contention-based
architecture since all computers on the network have to contend with the time
of transmission on a given network medium.
Access to Ethernet networks is via CSMA/CD. This simply means that the
network hosts have to listen to the network until the transmission medium is
clear so that they can also transmit. Basically, they have to “sense” and
determine that the line is indeed clear to initiate their own data transmission
processes. A network host only sends out it data once it “feels” that the
transmission is clear. In case there are multiple transmissions, a collision or
collisions take place on the transmission medium. The machines sense the
collisions and immediately halt their transmission processes.
One of the machine starts the retransmission as the others wait for the line to
clear before they can retransmit their data. This process happens until all the
network have completed their transmissions.
In a similar fashion, hosts wait and listen on the line for data meant for them.
When a particular host senses that incoming is mean for them, they open door
for its reception and actually does receive the data onto its NIC interface.
Ethernet is characterized by frequent collisions. As a result, some devices
have collision to prompt you when a collision happens. In fact, collisions are
the main limitations of the Ethernet architecture. On the hand, Ethernet is the
most affordable of all other network architectures.
Note:
Fast Ethernet
The traditional Ethernet has a speed of 10Mbps. Fast Ethernet offers a speed
that is higher than the original 10Mbps. It has a 100Mbps transfer rate. The
throughput is higher than the traditional Ethernet standard since the time it
takes to transmit data over a network medium has been minimized by
whopping factor of 10. Thus, Fast Ethernet works at a rate that is 10 times the
traditional speed of 10Mbps.
Traditionally, hubs and other connecting devices were designed to
accommodate the 10 Mbps transfer rate. For such devices, Fast Ethernet is
not supported. Fortunately, many connecting devices are being with NICs
that can comfortably handle both 10Mbps and 100Mbps transfer rates. That
means that the devices can accommodate both the original 10Mbps Ethernet
as well the Fast Ethernet.
Gigabit Ethernet
This is another version of Ethernet that is even faster than Fast Ethernet. It
uses the same data formats and IEEE Ethernet specifications just like the
other Ethernets-10Mbps and Fast Ethernet.
With Gigabit Ethernet, users are able to enjoy 1000Mbps transfer on a
network. Unlike Fast Ethernet that operates on both twisted-pair cables and
fiber-optic cables, Gigabit Ethernet was initially restricted to fiber-optic
cabling. This required that a LAN be set up with specialized servers and
high-speed switches. Gigabit Ethernet was considered to be a backbone for
large LANs that required high transmission speeds.
Currently, anyone can practically enjoy the amazing high speeds of Gigabit
Ethernet since it is being bundled out in network cards that can be
conveniently installed in network servers and network clients.
10BASE-2: This type of Ethernet works with a fairly flexible coaxial cable
(RG-58A/U I or a thinnet), with a maximum cable length of 185m (this is
rounded off to 200. Thus, the 2 in 10BASE-2). With the use of T-connectors
to link the cabling to the network hosts’ network cards, 10BASE-2 uses a bus
topology. Though 10BASE-2 has always been the most pocket-friendly
option for the Ethernet implementation, 10BASE-T setups are presently the
most widespread.
100BASE-TX: This is the type of Fast Ethernet that relies on the same
Category 5 UTP cabling that is available on 10BASE-T Ethernet. This
enactment can also employ 100-Ohm shielded twisted pair cable. The
maximum cable length in the absence of a repeater is 100 meters.
100BASE-T4: This is the sort of Fast Ethernet that runs over Category 5
cabling, as can the 100BASE-TX. However, it can as well run over lower-
grade twisted-pair cabling like Categories 3 and 4. In this type of Ethernet,
the maximum cable run is the standard 100m length.
100BASE-FX: This is the sort of Fast Ethernet that spans over fiber-optic
cable with a maximum length of 412m.
10Gigabit Ethernet: This is the kind of Ethernet that delivers 10 billion bits
per second over fiber optic cables.
Network Router
A router is just another networking device that primarily connects different
networks. A router plays the role of forwarding data packets based on what
information is contained in the header of a data packet.
This is a device that operates in the network layer of the OSI model. In the
TCP/IP model, a router operates in the internet layer.
Routing refers to the process of determining the best path along which data
transmission takes place-from source to destination. Routing is done by a
router, which has been defined above.
Routing algorithms are responsible for actualizing the routing process. The
routing algorithms refer to a piece of software that works behind the scenes to
ensure that the most appropriate path is selected for the transmission of data
from sender to receiver.
The routing algorithms are also responsible for the initialization of the
routing table. They are also responsible for the maintenance of the routing
table.
Routing metrics are used by routing protocols in the determination of the best
path for data transmission. Routing metrics include hop count, delay,
bandwidth and current load among others.
Delay: this refers to the time that a router takes in the queuing,
processing and transmitting of data to a given interface. The path
with the lowest delay value is unquestionably taken to be the best
path.
Hop Count: this refers to a metric that offers a specification of
passes through a connecting device like a router. The path with
the lowest hop count is preferred to any other available path if
routing protocols consider the hop as a primary variable.
Bandwidth: this refers to the link capacity. It is given in bits per
second. The transfer rates of all links are compared. The link
with the highest transfer rate is embraced as the best path.
Reliability: the reliability value is determined dynamically. Some
links are more vulnerable to malfunctioning than others. Besides,
some links are more easily repaired than others-after a
breakdown. Whatever the case, a more reliable link is preferred
to a less reliable link. The system administrator is charged with
responsibility of assigning reliability values which are numeric
in nature.
Load: this is the degree of how busy a network link is at any
given moment. It may be in the form of packets that are
processed per unit time; processor utilization or memory use.
The load increases with increasing traffic. In routing, the link
with a lighter load is considered to be the best path for data
transmission.
Chapter 2:
Basics of Network Design
T his chapter dispenses with the technical terms and acronyms as much as
possible to expound on the networking design fundamentals; the basic
features on which the accomplishment or failure of our simple office local
area network will rest. To begin with, every keen reader will gain an
understanding of the different responsibilities performed when assembling
and running a network. Then we’ll discover the features that help to define
quality in a home or small-office network.
You’ll also identify the preliminary steps you should take first, to get your
network design on paper, and then get it into operation.
Designing a network might seem like putting together a huge jumble of
puzzle pieces. But by tackling each component on its own, you’ll quickly
demystify the process and attain your goal of designing a network that is easy
to use, always works, and takes very little time and effort to operate and
manage.
Roles and responsibilities
The following are tasks that must be performed in computer networking:
Network designing
Network setup
End-user responsibilities
Network administration
Troubleshooting
At various times throughout the process, you will be wearing one or more of
these hats; as such, you must carefully consider them as you design your
network. Examining the challenges faced by each role during the blueprint-
building stage can help you design a better network, free from mistakes or
failures.
Network installation
The installation process begins with assembling all required materials which
include the servers, computers, printers and any other necessary network
components. It is also imperative to have the requisite skills for the actual
installation of the network. This will allow you to put together all the
assembled hardware and installation of the necessary applications, beginning
with the network operating system. Finally, it is expected of the network
installer to run tests to ascertain that all the network components are properly
installed and ready for deployment. Also, it is the work of the installation
guru to configure the network so as it can perform the functions of which it
was intended.
Network end-user roles and responsibilities
As one of many end-users, your own networking needs must also be
accommodated in the design. Before you talk to other users, you should get
all of your own requirements on paper first. You will find that other users
will be seeking much of the same functionality you are looking for.
Network administration
After installation and setup of the network are complete, you will change hats
to become the network’s administrator (if not you then someone else has to
take the mantle of a network administrator). As the administrator, it will be
your job to manage end-user accounts, oversee manual and automated
backups of critical network data and files, and see to it that necessary updates
and patches are applied to the network software and application software at
appropriate times. Occasionally, as the administrator, you also will have to
deal with and resolve security issues.
Network troubleshooting
Inevitably, something will go wrong on your network. In your role as an ace
network troubleshooter, it will be your task to find out what is wrong and
make the needed repairs. Often, there is a tendency to think the worst has
happened when a problem crops up. There may indeed be a big problem, but
as the troubleshooter, you should always be certain to check the easy, simple,
or obvious issues first. The “big” problem may be as simple as a cord being
unplugged or a tripped circuit breaker.
As the troubleshooter, you will benefit greatly from having easy access to the
documentation and specifications for network components, so be sure to
collect this information during the design and build phase. Finding a problem
and applying fixes are much easier when good documentation is available.
Network quality
Esoteric is not a term that applies to a quality home or small-office network.
In contrast, ubiquitous, simple, and seamless are the terms that can be used in
this case. A quality network is one that is accessible from everywhere,
feasible and performs all the tasks and chores it can do for you. The things it
can’t do without your help should be easy and painless for someone else to
perform without you.
Quality goes beyond the physical network itself. It also relates to measures
that minimize operational, administrative, and troubleshooting time needed
after installation. This section discusses metrics that pertain to quality in any
network, be it small or large.
Functionality
Successful network design begins with function, essentially, answering these
two questions:
Answering these questions begins with identifying what data will be traveling
over the network to accomplish the end-users’ access and communication
goals. Networking is essentially about sharing, exchanging, moving, or
communicating data among people and/or devices.
Network size
“Network size” refers to the number of nodes or ports that can be supported
on the network. A node (or port) is a place to connect a computer or other
network device. A computer, a printer, and shared fax are examples of
network devices that would use one port and become an addressable node on
the network. The network size should be adequate to meet the needs of the
location, building, or work site. Your home or small-office network may
begin small, with one network server and perhaps as few as two networked
computers and one printer.
As you begin considering the size of your network, it might be helpful to
think in terms of implementation phases. First, consider the network that you
would like or need to have available from the first day to six months out as
phase 1. Then decide how your network should be from six months to one
year, or phase 2.
Finally, determine the actual size of your network should be from one year to
three years into the future (phase 3). If the number of devices required in the
future is likely to increase, make your best approximation during the design
stage as to how many you will need. That way, the growth pattern can be
considered and accommodated in the first round of design and purchases of
hubs, routers, switches, and firewalls.
Reach
The most noticeable network issue, which will greatly frustrate end-users, is a
speed degradation or permanent difference in speeds between user groups or
locations. For this reason, your network must be designed to reach end-user
node connection points, offering equal service to all.
Each of the various physical connecting media (wire, fiber, cable, or wireless)
and engineering standards for carrying Ethernet signals involves differing
physical limitations with regard to distance, which must be accounted for in
the initial design. As you design your network, consider the size and
frequency of data transmission over various network segments to identify
potential data choke points and eliminate them by choosing sufficiently fast
communications links that offer the necessary range.
If your network will be of the Ethernet variety and contained within a 100-
meter (328-foot) radius, then CAT-5 or CAT-6 UTP cable will generally be
sufficient.
When two very distant locations need to be connected together, the options
are to use the Internet for communication between the networks, which works
best if data streams are modest in size and frequency, or one of the available
connectivity options from telephone companies (Telcos). A dedicated point-
to-point or routed direct connection will be necessary for data-intensive and
steady-state communications between network locations.
Speed
Network data transmission chokepoints can be caused by any number of
problems:
You need not approach this as an ‘either/or’ scenario. Most likely, you will
use both types of networks in your home or office environment.
Extensibility
As you plan your network, you will want to make sure it can be extended to
accommodate changes in the future, such as the addition of new equipment or
other features. For example, if you know your network will need to serve
three or more locations in the future, then buying and installing a router with
only two communications ports and no room to add a third or fourth is a
mistake. So is buying a file server with limited memory-expansion capability
when planned software purchases will require added memory later.
Easy of Use
Your network should be ready to work whenever you are. Uptime and
reliability are as important for your network as they are for your car.
Security
Access should be open to authorized users and closed to unauthorized ones.
One way to ensure this is to create security zones. A security zone is a
segment of a network that is separate from the whole where distinct security
or access policy is applied. The purpose of security zones is twofold: to
provide or manage access and to protect the privacy of stored information.
For example, in a business office environment, a security zone might limit
access to financial records to members of the accounting department only.
Availability of Documentation
The completed network should be well documented, with all the component’s
technical data available. Some people find collecting and cataloging such
information tedious. After all, it is much more fun to make connections and
configure things to work together. But good documentation can save the day
when things go wrong and failures occur. This is one area where a nitpicky
collection of every little detail pays off.
Load Balance
Networks are democratic in the sense that end-users generally expect to
receive equal access and performance. Everyone on the network should enjoy
more or less the same speeds as the other users, and multiple locations should
perform near the same. To improve performance, data transmission loads
should be balanced across the network. Drawing out the network connections
helps identify aggregate upstream segments with more users than others.
After implementation, it may be necessary to test or gauge network
performance to find trouble spots.
Chapter 3:
Wireless Communication Systems
Important:
A warning on the package indicates that the CD must be loaded first before
you connect the adapter to the PC. It is always a good idea to follow these
types of warnings and to perform the CD installation routine before
connecting a device.
These steps demonstrate the installation routine for a Windows Vista
computer. If you use a different operating system, your steps may vary. The
same is true if you install a device other than the Linksys 2.4GHz, 802.11g-
compliant USB adapter shown on these pages.
To install, do the following:
Notice that a second warning appears here, indicating that you should
load the software before connecting the device.
Accessing a WAP
With the wireless USB adapter installed, the next step is to connect the
computer to a wireless network.
Note:
These steps demonstrate connecting to a wireless network using a Windows
Vista computer. If you use a different operating system, your steps may vary.
Publicly available networks apply different security measures. For some, you
need only be in the vicinity to connect; for others, you must enter the
network’s name in order for your computer to detect it. Some require you to
enter the WEP or other security key to log in, and still others require you to
launch your Web browser and enter a user name and password in the screen
that automatically appears after the initial connection.
Setting up a WAP
In addition to using publicly available WAPs, you can set up a WAP of your
own. The exact procedure varies by manufacturer; shown here are the steps
for setting up a 2-wire gateway with built-in wireless. (Note that these steps
assume you’ve already set up the device as your gateway, and steps you
through the procedure for configuring the device for use as a WAP).
To set up an independent WAP (that is, one that is not part of a gateway
device), simply plug it into your wired network and step through the setup
procedure provided by the manufacturer.
Note that you can also use a computer with a connected wireless transceiver
as a wireless access point. You have to set up the PC’s share features and do
some configuring, but it works (although it’s probably best to just buy an
actual WAP if one isn’t built into your gateway).
➢ Click the Security tab. This tab contains settings that enable you to
set the security type, the encryption type, the network security key,
and so on. In the dialog box shown, access to the network is available
to anyone who knows the security key, and the default encryption
type for this network, WEP (wireless encryption protocol), is being
used. Higher levels of security may be necessary for your
environment.
➢ When you have finished adjusting the settings for your wireless
network, click OK to close the Properties dialog box.
➢ In the Network and Sharing Center window, click the View Status
link. The Wireless Network Connection Status dialog box appears,
with the General tab displayed by default. It reports the number of
bytes sent and received, the signal quality (graphed in bars), and the
connection speed.
➢ Click the Details button. The Network Connection Details dialog
box appears, showing additional information about the wireless
connection. To close the Network Connection Details dialog box and
return to the Wireless Network Connection Status dialog box, click
the Close button.
➢ Click the Properties button in the Wireless Network Connection
Status dialog box.
➢ The Wireless Network Connection Properties dialog box opens,
with the Networking tab displayed. Here you’ll find various settings
that pertain to the wireless network, such as the dynamic IP address
assigned to this connection to the computer and the default gateway’s
address for reaching the Internet.
➢ You’ll need to make changes to the settings in this tab only on rare
occasions, but the information found here may be helpful when
diagnosing problems. Knowing, for example, that File and Printer
Sharing is enabled can be useful when connections fail.
➢ Click the Sharing tab. To allow other users on your wireless
network to access the Internet via this computer’s Internet
connection, select the ‘Allow Other Network Users to Connect
Through This Computer’s Internet Connection’ checkbox.
➢ The Allow Other Network Users to Control or Disable the Shared
Internet Connection checkbox is grayed out because the Allow Other
Network Users to Connect Through This Computer’s Internet
Connection checkbox is unchecked.
➢ Click OK to close the Wireless Network Connection Properties
dialog box.
➢ Click OK to close the Wireless Network Connection Status dialog
box.
The WAP model architecture
The WAP model encompasses a layered structure typically known as the
WAP protocol stack. This is similar to the famous OSI and TCP/IP model
architectures. The WAP protocol stack features 5 distinct layers each charged
with a specific role(s).
The individual WAP Protocol stack layers are discussed below:
Summary
Each lower layer of the WAP protocol stack gives a properly defined
interface to the most immediate upper layer. Consequently, the internal
functioning of any layer is either invisible or transparent to its upper layers.
Essentially, the layered design enables services and applications to take
advantage of the WAP-stack’s features, too. This makes it possible to utilize
the WAP stack for applications and services that are currently unspecified by
WAP.
Bluetooth Architecture
As it may already be known, Bluetooth is another form of the many wireless
technology standards. It is primarily used for data exchange over short
distances. This is possible for both fixed and mobile devices as long as the
devices in question are Bluetooth-enabled. The Bluetooth technology
wireless standard builds on PANs (or piconets). Short wavelength
transmissions in ISM’s 2.4GHz band are used for Bluetooth data exchanges.
Importantly, it must be understood that Bluetooth is also a protocol stack.
The Bluetooth stack defines the technology’s functionality as well as its use
in the accomplishment of given tasks.
Besides being a software stack, Bluetooth is also a hardware-based radio
system. The software offers specifications for linkages between the
architectural interfaces of the hardware and software aspects of Bluetooth.
The Bluetooth protocol stack is composed of layers of programs. Every
Bluetooth protocol stack layer communicates with a layer below and above it.
The Bluetooth protocol stack is composed of upper and lower layers.
Each Bluetooth profile uses particular parameters and options to perform its
task at the different layers of the protocol stack.
The following is a list of the various Bluetooth protocol stack profiles in
existence:
MOBITEX
MOBITEX is another form of wireless network architecture. It lays down a
technological structure for fixed equipment that are essential in supporting all
wireless terminals in a radio-based and packet-switched communication
system. MOBITEX supporting frequencies include 80GHz, 400MHz and
900MHz.
Most popularly, MOBITEX refers to MOBITEX Technology AB, which a
renown wireless communications provider that swung off of Ericcson.
CDPD
This is what is referred to as Cellular Digital Packet data. It is a standard
which supports wireless access to public packet-switched networks as well as
the Internet. Modem and cellular telephone providers that offer CDPD
services enable users to get internet connectivity at speeds of up to 19.2kbps.
Notably, CDPD is an open standard. It, therefore, conforms to the OSI
model’s layered structure. Thus, it is capable of extending in days to come.
The CDPD supports connectionless network protocol as well as the Internet
Protocol. Besides, it supports multicast service. Expectedly, it is going to
support the highly promising IPv6, that seeks to address the issue of IP
depletion that’s been staring at the IPv4 addressing system. The circuit-
switched version of CDPD (known conventionally as CS CDPD) can be used
in scenarios of heavy traffic that warrants dedicated connections.
AMPS
AMPS is Advanced Mobile Phone Service. It is a specification for analog
signal cellular telephone service most common in the larger United States as
well as many other countries around the globe. This technology is based on
the initial electromagnetic emission spectrum allotment for cellular service.
The allotment (allocation) is a responsibility of the Federal Communications
Commission. The frequency spectrum that AMPS allocates to cellular
telephone ranges from 800 MHz to 900MHz. The 2G version of AMPS
cellular technology is D-AMPS. AMPS transfers data at speeds of up to 19.2
kbps using CDPD.
FDMA
FDMA is an abbreviation for Frequency Division Multiple Access. This
refers to the division of frequency band allotted for wireless communication
into thirty distinct channels. Each channel carries digital data (given a digital
service) or a voice conversation. This is the basic technology in Advanced
Mobile Phone Service, which is shortened to AMPS. AMPS is undoubtedly
the most wide-spread cellular phone system in the whole of North America.
FDMA allows individual channels to be apportioned to just a single user at
any given moment.
TDMA
TDMA is a short form for Time Division Multiple Access. This is a
technology that’s particularly most embraced in radio networks and digital
cellular telephone communications. The technology divides individual
channels into 3 time slots to increase the amount of exchangeable data.
TDMA is a typical feature of GSM, PCS and D-AMPS spectrums. This
technology is also a crucial feature of DECT (which stands for Digital
Enhanced Cordless Telecommunications).
CDMA
This is a short form of code-division multiple access. It is a kind of
multiplexing that permits several signals to take up one transmission channel.
This is particularly important in optimizing the use of bandwidth that is
available. The technique uses ADC (analog to digital conversation) alongside
spread spectrum technology. It is used primarily in cellular telephone systems
that use ultra-high-frequency (UHF). This is typically applicable to telephone
systems in the 1.9GHz and 800MHz bands as well as IS-95.
SSMA
SSMA is a short form of Spread Spectrum Multiple Access. This is wireless
communication technique which uses signals that have transmission
bandwidth magnitude that is larger than the required minimum RF
bandwidth. There are two core forms of SSMA:
DSSS
FHSS
FHSS stands for Frequency Hopped Spread Spectrum whereas DSS is the
short of Direct Sequence Spread Spectrum.
DSSS
It is mostly used in CDMA. A Psuedo Random Noise Code multiplies a
message signal. Users are assigned distinct where each code is orthogonal to
all other codes allocated to other users. The receiver identifies users by first
getting the identity of the respective transmitter.
FHSS
This is a form of multiple access system which involves individual carrier
frequency users being varied in a pseudo-random manner inside a wideband
channel. For data to be transmitted on various carrier frequencies, they must
be broken down into bursts of uniform sizes.
Summary
Time hopping and hybrid are other forms of spread spectrum. It is also
important to keep in mind that spread spectrum systems are bandwidth
efficient since users are able to share a spread spectrum bandwidth without
bothering one another, especially in multiple user environments.
CCNA
A CCNA certification equips individuals with basic installation, support, and
network (wireless or wired) troubleshooting skills. The following are tracks
available for CCNAs: collaboration, cloud, routing and switching, cyber Ops,
Industrial, and Data Center.
CCDA
The certification equips learners with basic knowledge and skills in security
and voice incorporation in networks, and the design of both wired and
wireless networks. To get a CCDA, a person is required to have a valid
CCENT or CCNA Routing and Switching (or at least a CCIE certification).
CCNP
CCNA is a prerequisite for all CCNP solution tracks.
Requirements for CCNP solution tracks (apart from Routing and Switching):
pass 4 exams.
CCNP Routing and Switching: Pass 3 exams.
CCNPs have skills in planning, deployment and troubleshooting of networks.
CCDP
To get CDP certification: pass 3 certification exams and have both CCDA
and CCNA routing and switching credentials, or any CCDE or CCIE
certification.
CCDPs are proficient in the deployment of multi-layered switched networks
as well as scalable networks.
Data center
Collaboration
Routing and switching
Security
Wireless
Service provider
Technological
Business
Operational
Budgeting
CCAr
This is the top level certification in all Cisco certifications. The certification
is offers validation of an individual’s skills of senior network infrastructure
architect. A CCAr is a person who can effectively plan and design
Infrastructure depending on different business strategies. This, certainly, is
the most challenging certification of all Cisco certifications.
Chapter 4:
Network Security
Internet traffic: On this traffic path, data packets flow from the
Internet to the organization’s three-branch network and vice
versa.
The DMZ: This branch allows all types of TCP/IP traffic to and
from the Internet and therefore provides no security or controls.
Each of these zones supports an exclusive set of security and access polices
of its own to match with its purpose to the extent that the currently available
technology allows. Later in this chapter, you will see that these logical
divisions can be matched with the data-classification scheme suggested for
small networks.
Keep in mind that these logical zones or sectors are also physical areas to
some degree-but then again, all zones connect with copper wire and silicon
chips.
Nonetheless, each logical security zone takes on unique characteristics from
other broadly defined and logically distinct areas of the network because they
will be managed and controlled differently from other zones-at least from a
security perspective.
Open
Protected
Restricted
Open Data
Information in the open category might include information in the public
domain, information that is published, data that is open to freedom of
information requests, or information that is widely known or published in a
company’s annual report. Using resources to protect this category of
information provides little if any value, as it is available to anyone
determined enough to find it and can often be found from multiple sources.
Here are some characteristics of open data:
Protected Data
Information in the protected category may be released, and its release may
even benefit the owner of the data. The data, however, must be protected to
ensure its accuracy and overall integrity. That is, it is data that people inside
or outside of the organization rely on; therefore, it must be entirely accurate
and truthful. For example, the Enron accounting scandal of 2001 was largely
about the fact that people inside and outside the company relied on data to
assess the company’s overall health and welfare that turned out to be largely
inaccurate.
Although information in this class must be protected to preserve its integrity
and accuracy, access to people simply needing to read it is not highly
controlled. As such, the protective effort for this category of information is
focused on fixing the data as read only and tightly controlling who can
originate, publish or post, or make changes to it. This strategy requires close
control over write privileges but opens read-only to nearly everyone.
Expending personal or company resources beyond fixing responsibility for
parking the information in the first place or changing it once it’s posted also
provides little payback.
Restricted Data
Data categorized as restricted would encompass any data whose inadvertent
or intentional release into the public domain would cause harm to a person or
to your organization. One reason for reducing the restricted category to one
level for protective action and policies (rather than the three used by the U.S.
Department of Defense) is that it allows-even requires—the best possible
protective measures to be applied to all data in the classification without
distinction. This simplifies data-protection measures in both planning and
implementation. That is, if you are going to encrypt restricted data, the cost of
using a longer encryption key or the best encryption algorithm is only a small
margin higher than implementing a weak one. It boils down to this: If some
of the data held or crossing your network deserves protection, do the best job
that can be done given the current technology and your budget to protect it.
Any less fails the due-diligence test should control of the data be lost.
Of the items in this list, the three that facilitate easy identity theft or other
invasions of privacy are Social Security number, date of birth, and driver’s
license number.
Useful Tip
If you have resisted conducting commerce over the Internet because of the
perceived risk of identity theft, be advised that there are ways to limit your
exposure by using pre-paid debit cards such as those offered by
https://www.greendotonline.com or Wal-Mart. Another way is to establish a
PayPal account to pay for online purchases.
In that case, you might create three Internet access (logical) security policy
domains on the home network:
As the network operative, your challenge is to enforce the policy for the
domain such that the goals of the policy are met. For example, enforcement
of the policy example outlined here requires the entry of a user name and
password on the workstations, firewall and access rules on the PC operating
system, and firewall rules in the Internet gateway/router. These must all work
together to effectively enforce the policy.
The following list provides baseline security measures that everyone should
employ:
Intrusion
Malware
Denial of service attacks
Network Intrusions
Hackers employ numerous and unique techniques to access to network
resources. When they do, many undesirable incidents happen that only seek
to disrupt the normal operations on the given network.
The following are practical ways that attackers use to gain unauthorized entry
into networks:
Software engineering
Password cracking
Packet sniffing
Vulnerable software
Software Engineering
Some network attackers resort to obtaining as much information regarding
network users as possible as long as it gives them access to the network. This
technique is known as social engineering.
Commonly, attackers act as network support team officials. They then call
network users claiming that there is an issue with the specific user’s account
and that they would like to help. Blindly, the user reveals their login details
(username and password) to the pretentious attacker-who uses the
information to gain access into the network.
Other attackers go as far as searching into discarded trash (old files and
documents) with the hope of stumbling upon some user’s network access
credentials. When they do, they use such information to gain access to, and
do a lot of illegal activities on the network.
There is no 100% watertight measure to prevent network intrusion using this
technique. However, it is important to educate network users on the need to
keep their network access credentials private and confidential so as to
minimize chances of unauthorized entry to the network via social
engineering.
Password Cracking
There are cases in which an attack is on the network, but cannot pass the
authentication test on the network systems. Under such circumstances, the
attacker resorts to password cracking as the only solution to their
predicament.
The first technique in password cracking is typically guesswork. This
technique involves either dictionary method or brute force attack.
In the dictionary method, the attacker uses a familiar password and its
variations until they figure out the correct one. However, brute force attack
involves the use of every possible combination of characters to crack the
password.
Guidelines to prevent password cracking include:
Packet Sniffing
Some attackers turn to sniffing of data packets over the network. In packet
sniffing, the assumption is that the attacker can see packets as the move over
the network. The attackers install special devices on the network. The
attacker uses the device to see the packets, and waits till a TELNET or FTP
data packet appears.
Many applications sent passwords and usernames over the network in plain
text. When an attacker manages to grab such information, they are able to
gain access into the network systems and attack it however they please.
Data encryption is the solution to this menace. However, this is also no 100%
guarantee since some attackers have the tools to decrypt encrypted data.
Nonetheless, it is a measure that helps to an appreciable degree.
To achieve data encryption in a network, SSH should be preferred to
TELNET or STFP instead of FTP (STFP stands for Secure FTP).
Vulnerable Software
It’s luck to write error-free code. Writing huge chunks of program code may
sometimes end up with errors and loopholes that give way to hacking attacks.
The basic attack that takes advantage of such limitations is the buffer
overflow.
A buffer overflow is a result of a program’s attempt to place more data in a
buffer than it was configured to hold. The result is the overflow spilling past
the end and over immediate memory locations. An attacker may capitalize on
the programmer’s failure to state the maximum size of a variable. When the
attacker finds the variable, he or she sends data to the application assigned to
that variable. The program counter gets to the inserted code, runs it, and the
attacker gets remote access to the network.
Sometimes, buffer overflows do lead to application crashes instead of access
to the network by the attacker. Either way, the attacker manages to interfere
with the normal operation of the network.
The above attack can be prevented by taking the following measures:
What is hacking?
The first thing that we need to take a look at is the idea of hacking. Hacking
is going to be a process where we are able to identify weaknesses that show
up in the network or a computer system, and then use this in order to exploit
the weaknesses and gain some access that we would like. A good method that
is used with hacking is to work with an algorithm of password cracking in
order to gain the access that we want to a system.
Computers have become pretty much a mandatory thing in order to make
sure that your business is going to run in a successful manner. It is not
enough though to have a system that is isolated, one that is not able to
connect with any of the other computers in the building, or in other parts of
the world. But when you bring them out and allow them to communicate with
some of the other businesses out there, you will find that it does expose them
to some vulnerabilities along the way as well.
This is a common issue that a lot of companies are going to have to face
along the way. they need to allow their computer systems to talk to and work
with some of the other networks out there, and to have this open
communication, but they also want to reduce the threats that are going on
around them. They do not want to have things like any of the common
cybercrimes showing up because this is going to end up costing them
millions of dollars on a yearly basis and can be so bad for them and their
customers. many businesses need to find a way to keep their information
safe, while still being able to conduct the business that they want.
Who is a hacker?
Another thing that we need to take a look at is the different types of hackers.
Usually, when we are talking about a hacker, we are going to imagine
someone who has some bad thoughts in mind, someone who is sitting behind
a desk in a dark room, intent on taking down the government or someone else
and causing a lot of harm. But there are actually a lot of different types of
hackers out there. These hackers are often going to work with similar kinds
of methods in order to get the work done, but it is often the intention behind
what they are doing that will make the difference.
A hacker is going to be someone who is able to find and exploit out the
weaknesses that are found in a computer system or a network in order to gain
the access that they would like. Hackers are usually going to be computer
programmers who are skilled with a lot of knowledge about computer
security. Many times we are able to classify hackers based on the intent of
their actions. Some o the most common types of hackers that we are able to
explore and learn about will include:
1. The ethical hacker or the white hat hacker: These are going to be
the hackers who will gain access to a network or a system with a
view to fix identified weaknesses. They can sometimes do things
like checking out the vulnerability of a system or penetration
testing. If you are working on your own system and making sure
that it is safe against others, then you would be a white hat
hacker. If someone hires you to do the same thing on their
system, this is white hat hacking for them as well.
2. Cracker or a black hat hacker: This is a type of hacker who is
going to gain some access that is unauthorized to a computer
system for their own personal gain. The intent for this one is to
usually steal some corporate data, violate the privacy rights of
others, and move funds from various bank accounts along the
way.
3. Grey hat hackers: This is going to be a hacker who is somewhere
between the ethical hacker and the white hat hacker. Their
intentions are not really malicious, but they don’t usually have
permission to be on the system they are attacking either. This
person is going to break into some computer system, without the
right permission, in order to figure out the weaknesses. But
instead of using these weaknesses against the company they will
often reveal these to the owner of that system.
4. Script kiddies: This is going to be someone who doesn’t have
any skills in coding or hacking who is able to gain access to the
system. They also will not learn about the process of coding
either. They will use some of the hacking tools that are already
in existence to get to their goal and leave it at that.
5. Phreaker: This is someone who is not really as prevalent today as
they were in the past, but they are going to be able to identify
and then exploit some of the weaknesses that happen in a phone
system and not in a computer system.
1. Get permission in writing from the person who runs and owns
the computer system or the network, before you start any of the
hacking that you would like to do.
2. Protect the privacy of the organization that is being hacked in the
process, and do not tell others that you are working on this.
3. When you find some of the weaknesses in the system that could
put the business at risk, you need to transparently report this to
the organization that owns and runs it all.
4. Inform all of the vendors of the hardware and software that there
are some of these weaknesses so that they can be prepared and
do something to help fix them.
This also brings up the idea of why ethical hacking is such an important thing
along the way as well. Information is going to be one of the most valuable
assets that we are going to see with a company. Keeping this information as
secure as possible is going to protect the image of an organization and saves
the company a ton of money in the process. It is a lot of work to get started
but it can be so worth it.
Hacking is also going to lead to a lot of loss for a business, especially for
those that are dealing with finances, like PayPal. Ethical hacking is going to
help them to be a step ahead of these criminals. This is a good thing because
otherwise, they would lead to a big loss in business along the way as well.
While we are on this topic, we need to take a look at the legality that we will
see with ethical hacking. This is going to be something that is considered
legal, and you will not get in trouble for doing it, as long as the four rules that
we established earlier on are in place right from the very beginning. There is
also a certification program that a hacker is able to take in order to help make
sure that they are up to date on the skills that are needed to get this work
done, and will ensure that we are set up and ready to go with the work in no
time.
Hacking is going to be a big deal to many companies and their networks if
they are not careful with how they protect themselves and the valuable
information that is found on them. Remember that hacking is going to be
when we can identify and exploit some of the weaknesses that are found on a
computer system or network, and closing up some of these weaknesses is the
best way to make sure that things keep safe. In addition to hacking, we have
to make sure that we watch out for what is known as cybercrime, which is
when a hacker, or someone else, is going to commit some kind of crime with
the help of computers and other similar items.
There are some differences in the kinds of hackers that you are able to
encounter. When we are talking about a black hat hacker, these individuals
are going to be the hackers that we are used to seeing and hearing about on
the news and in movies. They only want to get on the system to cause some
trouble and to steal information for their own needs. But there are also the
ethical hackers, the ones who are there to help improve the security of a
computer system or network. Ethical hacking is completely legal, and it is
going to be one of the best ways that a company can make sure that their
information is as safe and secure as possible along the way.
When we talk about our networks in this guidebook, we are looking at this
from an angle of trying to keeping the information and the network as safe as
possible. We will talk about a number of different techniques that a hacker is
able to discuss when they are using your system and trying to gain the access
that they would like to that. But we are doing this as an informative kind of
idea, in order to help you to know the best places in order to protect your
system.
Ethical hacking is considered legal, and it is completely fine for you to work
with this if you are trying to keep your own system safe and secure from
someone else. You can even do this on another system if you would like, as
long as the other person knows that you are there and has given you
permission in order to do this to keep them safe. We have to remember that
the ethical hacker and the black hat hacker are going to use some of the same
ideas when it comes to how they will handle the methods of hacking. But the
difference is whether they are given permission to do the work and if they try
to do it to protect or exploit the system they are on.
In this guidebook, we need to make sure that we are doing everything in an
ethical manner. We do not want to end up with something getting us in
trouble because we do not follow the rules, or we use this in the wrong
manner overall. Make sure to keep ethical hacking in mind ahead of time to
make sure that you can do this in a safe and legal manner.
And that is the critical thing that we need to work on when we are in this
guidebook. Hackers are always able to get through and spend the time that is
needed to really find those weaknesses. And then your business is at risk and
it is going to cause so many more problems than it is worth. This is why
hacking on an ethical form is going to be one of the best methods to use
because it will ensure that you are able to protect and close up those
weaknesses and vulnerabilities, and will keep the hacker out.
Chapter 6:
Different Hacking Methods
here are a lot of different methods that a hacker is able to work with when
T it is time for them to try to get onto one of the networks that they have
their eyes on. It is important to always be on the lookout for what
someone may try to do, and getting a look at some of the different methods of
hacking that another person could do to get on your system is going to be
something that we need to pay attention to as well. Some of the various
hacking methods that are out there right now, and that could put your own
computer at risk in no time will include:
Keylogger
The first option that we are going to take a look at is the keylogger. This is
going to be a simple software that will record the key sequence and the
strokes of your keyboard into a log file onto the computer of the hacker. Any
time that the hacker works on a keystroke, they are going to have that
information sent right over to the hackers' computer so that they will be able
to see what you are doing and figure out if there is information on your
username and passwords.
These log files that go over to the hacker might contain a lot of the personal
information that you would like to keep safe and secure on your system. For
example, they could send over things like your passwords and personal email
IDs as well, often without you knowing what is going on at all.
This process is going to be known as keyboard capturing and it can be either
a type of hardware or software. While the software key logger of this type is
going to target more about the programs that are installed on the computer of
the target. But there are also some hardware devices that the hacker is able to
rely on, and these are going to target something a bit differently, like the
smartphone sensors, electromagnetic emissions, and keyboards.
The key logger attacks are a big reason why there are a lot of online sites for
banking that will allow you to have an option to work with their virtual or on
the screen keyboards. It is important for you to be careful when you are
working with your computer in a public setting in case a hacker is trying to
gain access to the information that you are sending.
Malware
Another thing that we need to take some time to look at here is the idea of
malware. This is going to be malicious software that is able to get onto your
system. To put it in simple terms, malware is going to be any kind of
software that was written in a manner to steal data, damage devices, and
cause a mess for the target. Viruses, spyware, ransomware, and trojans are
good examples of the types of malware that you could experience and that
you need to protect your system from.
For the most part, this malware is going to be created by a team of hackers
because they would like to sell the malware to the highest bidder they can
find online, or because they would like to make money by stealing the
financial information of their target. However, there are some other issues
that can come up as to why the hacker could use this. They may be able to
use the malware as a weapon of war between two governments, to test the
security of a system, and even to protest. No matter how or why the malware
was created, it is going to be bad news when it is something that can end up
on your own computer.
Malware is able to do a lot of different things based on how you are going to
use it, or what the hacker plans to see it do. Some of the different types of
malware that you need to be aware o and watch out for will include:
Trojan horses
The trojan horse is going to be a kind of malware that is going to disguise
itself as something that is legitimate. The hope is to trick the target into
clicking on a link or downloading something that looks like it is safe so that
the trojan horse can be added to the system. You will find that these trojans
can be employed by hackers and other thieves online who would like to gain
some access to the system of their users. Often there will be some social
engineering in place to help trick the user to give up the information or click
on the link so that the trojan can be added and executed on the system.
Once the trojan has had some time to become activated, it allows the criminal
to spy on you while you do work on the computer, steal your data that is
more sensitive, and even gain some of the backdoor access that they want to
your system. Some of the actions that the hacker could try to do with the help
of the trojan horse can include:
One thing that you will notice with these is that they are a bit different than
worms and viruses. For example, they are not able to go through and replicate
themselves. But if they are able to get onto a system because of someone who
is trusting, the hacker will be able to use that trojan in order to add malware,
viruses, and more onto that system with ease.
Ransomware
Ransom malware, also known as ransomware, is going to be one of the types
of malware that is going to get on your system and will prevent you from
accessing your system or any of the personnel files. Everything is going to be
locked up and when you try to open them up, you will find that they are
corrupted or encrypted and you are not able to do anything with them at all.
Often the hacker who does this is going to demand payment, usually in
Bitcoin or another cryptocurrency that is hard to see, and then will use this to
regain access.
The earliest variants that you are able to find of this kind of malware were
going to be found way back in the 1980s, and payment was something that
people had to send through snail mail. Of course, these attacks have become
more advanced today, and we will find that usually, this has to be something
that we send with a credit card or a cryptocurrency.
One thing to keep in mind is that just because pay the ransom doesn’t mean
that the hacker is actually going to keep their word. Sometimes they will not
let go of the files, and you will be stuck without any of the parts that you
need on your network. Other times you will have the appearance of getting
the information back, but the hacker probably left something behind like a
Trojan horse, a virus, or malware so that they can get on your system again if
they choose to do this.
Waterhole Attacks
The second option that we are going to take a look at is known as a waterhole
attack. This is going to be where the hacker is going to try to poison a place
so that the target will get hit by the attack, just because they are completing
an action that they think is completely normal. This means that the hacker is
going to work on hitting the part of the network for the target that is the most
accessible, at least physically.
A good example of this one is when the hacker will try to target the most
accessed physical location of the target in the hopes of attacking them in the
process. This point could be like in a coffee shop or a cafeteria for example.
Once the hacker has had a chance to figure out when you are in these public
locations, they will be able to get into there, and then create a fake access
point for the Wi-Fi. They would disguise this to look like the one that you are
used to getting on, but it will be controlled by the hacker and they will be
able to cause some of the issues that they want. For example, they may go in
and modify a few of the websites that you tend to visit the most, so that these
websites will be redirected to the hacker, allowing them to steal the personal
and financial information that they want.
As this attack works to collect information from the user when they are in
one specific place, being able to detect this attack is going to be harder to
figure out than some of the others. One of the best ways that you are able to
make sure that you are protected from this attack is to follow some of the
basic security practices that are available and always update the software and
the operating system on your computer as often as possible to keep it safe.
Fake WAP
The next attack that is on our list is going to be working with a fake WAP.
Sometimes a hacker is not going to really try and get on the system to cause
issues or to steal money. They may do this kind of attack in order to have fun
and figure out the amount of chaos that they are able to cause on the system.
Even when they do this as a way to have fun, the hacker is able to work with
some specific software that will allow them to create their own wireless
access point that is fake.
This particular WAP is going to connect to the official public place WAP so
that it will seem to be normal to someone who is not looking that closely at it.
Once the target is able to connect onto the fake WAP, the hacker is able to
use that to their advantage. They will often be able to steal information and
use it in the manner that they would like.
Passive Attacks
This is a method that is sometimes known as eavesdropping as well, but it is
a more passive attack where the hacker is going to spend their time listening
in on the conversation of another person, and learning what they can from the
data and communication that goes from one network or system to another.
Unlike a few of the other attacks that we have already looked at that are
going to be a bit more active in nature, and that want the hacker to put in a bit
more work in the process, you will find that a passive attack is going to get
the hacker onto the network that they would like. Then they stop and just
look around, without causing any issues in the process. This method is going
to ensure that the hacker is able to monitor what is going on with that
computer system and the networks that are there, and they can use this to gain
information that they really should not have access to.
The main motive that we are going to see with the passive attack is that the
hacker is not intending to harm the system right now. Right now, they are
working in a more passive manner in order to get more information out of the
system, without the people who own the system having any idea that they are
there or that something is going on. These hackers may target different things
like phone calls, instant messaging services, web browsing, emails and more
in order to learn what is going on and then decide what kind of attack they
would like to do at a later time.
Phishing
The next type of attack that we are going to take a look at here is known as
phishing. This is where the hacker is going to spend some time trying to
replicate a website that is common and that others trust. Then they are going
to find a way to trick the target when they send out the spoofed link. Often
we will see this when a hacker tries to steal the banking information of a
target. They will send out an email that looks like it comes from the bank,
and then they will be able to steal the login credentials if the user does go
through and put in that information.
When we are able to combine phishing together with social engineering,
which we will talk about more in the next chapter, we will find that it is going
to be used often, and it can be really dangerous. If we are not on the alert
against people who are trying to deceive us and steal our information, it is
way too easy to fall prey to some of these attacks and what they can do to us.
Once the victim goes to the email that is spoofed and tries to enter in some of
the data that is needed, the hacker is going to be able to get to that private
information with the help of a Trojan horse that is running on the site that is
fake and made up. This is why we need to be careful when it comes to the
emails that we open and where we are placing some of our private
information.
Bait and Switch
Another one of the techniques that we are able to spend some of our time on
will be known as Bait and Switch. This one is going to be where the hacker is
going to purchase some space of advertising on a website. Then later, when
the user is able to click on the ad, they may find that they are going to a
website that is not always as secure as we would hope. Instead, they are
going to end up on one that may have a virus or malware or something else
on it that we need to be careful with.
This works so that the hacker is able to get people to click on their links, and
then they can add in some malware and adware to the computer of the target
when they would like. The user is going to get caught, and sometimes not
even notice what is going on. If the hacker is successful, then they will be
able to go through and run that malicious program on the target computer and
steal the information that they would like.
Cookie Theft
There are many sites that are going to rely on cookies in the browser in order
to help hold onto the personal data that you have. these are going to be able to
hold onto some information like our browser history, our usernames, and our
passwords for the various sites that we try to access. Once the hacker has
been able to access the cookie, they are able to do some authentication to
make themselves look like you on the browser. A popular method to carry
out this kind of attack is to encourage a user’s IP packets to pass through the
machine of the attacker.
This can be called a few different names, and it is an easy attack to carry out
if the user is not working with SSL or https for their entire session. On the
websites where you have to enter in some information, it is very important to
double-check that the connections you are relying on here are encrypted.
Password Stealing
Another option that we are able to see with a hacker is the idea of password
stealing. Many hackers are going to work on this one because they know that
it can provide them with a lot of information on their target, and it allows
them a way to get onto a network without as much work. And since many
people still insist on not having a really strong password, or going with one
that is really easy to guess, it is no wonder that the hacker is able to get this
information and do whatever they want on the computer.
There are a few methods that are available for the hacker to use. Keep in
mind that if you have a really strong password, and you make sure that your
password is not the same on many different sites, then you should be safe
even from this kind of attack. But it is still possible that the hacker is going to
work to make sure they can get the information that they want along the way.
One option is a brute force attack or a dictionary attack. This is when the
hacker is just going to try out a bunch of different passwords to see which
one is going to stick and be the one that they need to get on. If you have a
common password or one that matches up with your family or something the
hacker is able to learn about you online, then it is likely that this attack, given
enough time, is going to work against you.
Hackers are also able to go through and create their own password crackers.
What this means is that they can go and, through social engineering and other
options, add on a tool that is able to monitor the websites that you are on,
check what you are typing in, and then report this kind of information back to
the hacker. The hacker is then given a view of the passwords and usernames,
and even the websites, that you use, and they can use this information against
you.
As we mentioned, some of the best methods that you are able to use in order
to really make sure that you are able to keep the hacker out of some of your
valuable information are:
Mac Spoofing
The final thing that we are able to spend some time on in this chapter is
something known as the Mac Spoofing. This is going to be where the hacker
is going to get themselves onto a network while looking, the whole time like
they really do belong on that network. We are going to take a look at some of
the steps that a hacker is able to use in order to complete one of these attacks
and get themselves on the network that they would like along the way. This is
going to involve doing some MAC spoofing that will help you to confuse the
other person or the rest of the network, and then you can do some filtering in
the process in order to make sure that the hacker can stay on the network for
as long as they would like.
You may find that the idea of MAC filtering is going to be something that is
really useful to work with here because it is going to be responsible for
helping a computer to lock out the MAC addresses that are not allowed to be
there to connect to the wireless network. You will find that for the most part,
this is going to be an effective manner to keep hackers and others without the
proper authorization from getting onto your system. But it is not always
going to work each time, and this is what the hacker is hoping for.
When a hacker is looking to do one of these options, then there are a few
steps that they are able to go through in order to make sure that this spoofing
is done and that the system is going to allow them to get on. Without them
getting caught up in the act and getting told on by the system or another
person at all. And if everything goes well, the hacker will be able to stay on
the network for as long as they want, looking at things, stealing information,
and more. Some of the steps that need to happen to make sure that the MAC
spoofing happens includes:
Make sure that the Wi-Fi adapter that you are on is using
monitor mode. When this is done, you are able to find the
wireless network that you want to target, as well as information
on who else is connected to it. To do this, you would want to
type in the following command:
Airodump-ng-c [channel]-bssid [target router MAC
Address]-I wlan0mon
After this, you will notice that a window shows up that will
display all of the clients who are connected to that network. You
should also be able to see the MAC addresses that come with
those clients. These are the addresses that you will need to hold
into because they will help you complete the spoof and enter the
network.
From here, you will want to pick out one of the MAC addresses
that are on the list, maybe write down a few in case you misplace
them later on and need to save time.
Now before you are able to perform this spoofing, you will need
to take your monitoring interface down. You can do this by
entering the following command:
Airmon-ng stop wlan0mon
The next thing that you will do is to take down the wireless
interface of the MAC address that you want to spoof. To do this,
enter the following command:
Ifconfig wlan0 down
At this time, you will want to make sure that you use the
Macchanger software so that you can change up the address. You
can do this by using the following command:
Macchanger – m [New MAC Address] wlan0
Remember, you already took down the wireless interface in a
previous step. Now you will want to bring it all backup. To make
this happen, type in the following command:
Ifconfig wlan0 up
Now that we have gotten this far, you will find that the wireless adapter is
going to be changed so that you have the same MAC address that you chose
from. If you went through the steps in the right manner, you would find that
you were able to change up that address so that the system or network that
you want to get on will believe that you are someone who should actually be
there. The network will see the address that you use and will allow you the
option to log in, look around, and have access to what you would like on that
network.
As we can see through this chapter, there are a ton of different types of
attacks that can happen when you are trying to make sure that your computer
and your network are as safe as possible. Taking care of the information that
is found inside of your network is going to be really important when it is time
to make sure that everything lines up and does what it should. When you are
ready to work with hacking, or you are ready to keep your own network safe,
make sure to check out some of these potential hacking methods and learn
more about how they work.
This, of course, is simply part of the beginning that you are going to see when
any hacker is ready to go through the social engineering process to steal
information. And you have to always be on the lookout for what is going to
show up on your own computer as well. While things like the phishing
attacks are going to be rampant and short-lived and only need to work with a
few people to make sure that they are successful, you will find that there are
other methods out there that can cause more damage. You need to take the
proper steps to make sure that you and your systems are as safe as possible.
Most of the methods that you are able to use to keep your own system safe,
and to make sure that a social engineering attack is not going to happen to
you will include mostly rely on paying more attention to some of the details
that are actually right there in front of you. Sometimes we get excited or too
trusting, and we miss the signs. And this allows the hacker the advantage of
getting ahold of all the information that they would like. With this in mind,
some of the steps that you can take to keep yourself safe and to make sure
that you are protected from some of the social engineerings that the hacker
may try to use against you will include:
1. Slow down: The spammer would like nothing more than for you
to act first and think later. If the message has a huge sense of
urgency, then this is a red flag.
2. Research the facts: If something comes to you without you
requesting it, then this looks like it could be spam as well.
Always look up numbers and websites instead of clicking on the
links in the email.
3. Remember that issues with emails are high: Hackers, spammers,
and social engineers are going to take control over email
accounts, and the incidents of this keep growing. They are going
to then be able to work with the trust of the contacts of that
person. Even when the sender looks like it is someone you know
if you are not expecting to get a link or an attachment from that
friend, make sure to check out that information with your friend
before downloading.
4. Beware of any kind of download: If you do not know the sender
personally and expect a file from them in the first place, then
downloading what you see is going to be a mistake.
5. Foreign offers are usually fake: If you get an email from a
sweepstake or a lottery overseas, money from someone you have
never heard from, or a request to transfer funds from a foreign
country for a share of the money, this is always a scam.
You will always find that it is easier for a hacker of any kind to gain your
trust and then work on the attack that they want, compared to doing
something that is random. It may take them more time to work in this
manner, but it is definitely going to give them more of the results that they
are looking for along the way as well. You have to always be careful about
the communications that you are seeing, and be on the lookout to figure out
whether the links, emails, information, and more that you are sending out and
even receiving are going to be safe for you to use and that all of these are
actually coming from the person you think they should.
Hackers like to work with social engineering because they know that they are
able to gain the trust of another person without all of the work that some of
the other methods take. If you are on the lookout though and learn to not trust
everything just because it looks safe or is found in your inbox online, then
you may be able to miss out on some of these attacks, and can close up the
vulnerabilities that are on your system. The biggest weakness that is found on
a computer network is the people, especially when it comes to social
engineering, so question everything and be safe ahead of time to ensure that
no one is going to be able to gather your information if you don’t want them
to.
Chapter 7:
Working on a DoS attack
O necomputer
of the attacks that a hacker is likely to use to help get into their target’s
and make sure that they are able to get the results that they
want is a denial of service attack or DoS attack. This is going to be an
attack that will make it harder for actual users of that system to get on and
complete the business that they want. The reason for this one is that the
hacker is able to go through and cause issues, and will flood up the system
until it will crash. Then the hacker is able to get onto the system and steal all
of the information they want or use that advantage in some other manner. Or
it can at least make a big disruption in how the business is going to be able to
conduct themselves as well.
A DoS attack is unique because it is going to be more of an intentional type
of attack that happens online, and one that is going o be carried out on
networks, online resources, and many websites in order to restrict some of the
access that is needed by users who should be on the system. These attacks are
going to be notable events that are hard to break and can take hours, and
sometimes longer, in order to get people back on the network. Let’s take a
look in order to look at some of the things that happen with a DoS attack.
<script>window.arlter)”test”)</script?
If you type this in and then an alert box shows up when you click on this
post, then the site is going to be vulnerable to the attack and we can continue
on with some of the other steps that we can take to work with this process.
Next on the list is that we want to create and then upload what is known as
our cookie catcher.
The goal with this type of attack here is that we would like to be able to get a
user to click on it, and then steal the cookies from them, which is going to
make it easier for you to access the account of that user on the website, and
get more information as well. You will need to also create a cookie catcher
for this to work, which will be there to help capture all of the cookies of the
potential targets, and will provide you with the information that you need.
You also want to stop here and make sure that it was vulnerable to the remote
code execution that you want to use as well.
From here, we will want to make sure that we can post our cookie catcher
and still have it work well. To make this happen, the right kind of coding
needs to show up in the post so that you are able to capture the cookies and
send that information over to your own system when it is time. Adding in
some text to this before and after the code is often best because it makes the
information look more reliable and less suspicious to those who may be
checking it out along the way as well. A good example of the kind of code
that you would like to use here will include:
If this works, there should be some cookies that will come to your chosen
website. You can then use the cookies that you have collected. You are able
to use the information from the cookies, which should be saved to the website
of your choice, for whatever purpose you need.
An Injection Attack
We also need to take some time to look at what is known as an injection
attack. Similar to what we did above, we need to spend some time looking for
a website that has some weaknesses or vulnerabilities on it to see how this
will work. This is where you are going to find all of the easily accessible
admin logins that you want, and you can work with them in no time. You can
even look through your own search engine to see if you would like and see if
you can find something like admin login.php or admin login.asp.
When you are able to find a website that is going to work for your needs on
this kind of attack you need to go through the steps that are needed in order to
log in here as an admin. You can type in admin as the username that you will
want for this, and then use one o a number of strings as a password to help
you get started. You may need to experiment with this a bit to find the one
that will get you onto the system.
Keep in mind that this one is going to take you a little bit more time than the
other options. You may need to try out multiple strings to get one that will
work, and it is going to include a lot of trial and error to get it to work. With
some persistence, you will be able to get your own way onto a site as an
admin, without having the actual authority to be there in the first place. This
is even easier if you work with a site that is vulnerable and will not have the
right safeguards in place.
From this point, we will have the freedom to access the website as we would
like. Eventually, you will be able to find the string that is going to make it
easier for you as an admin to get onto the website as an admin and do the
work that you would like. You can then, because you are an admin of that
page, about to do some further actions on the process, and get it to work for
your own needs as well. For example, as an admin, you will be able to go
through and upload a web shell on this to gain server-side access to upload a
file, mess with some of the accounts and files, and so much more.
When you are the one who gets to be an admin, you will be in charge of the
whole system quite a bit, and this is great news for someone who is just
getting started out with this. There is very little that you won’t be able to do
as the admin of the system, and if you get in and get out quickly, it will be
hard for someone else to even notice that you were there until it is too late.
Password Hacking
While we are on this topic, we need to spend a bit of time looking at
something known as password hacking. It is so important that you find some
methods that will ensure that your password is going to stay safe and sound.
Any time that someone is able to get onto a secure website, they need to have
their own username and password in place. This information will be sent to
the website to be authenticated before anyone is able to get onto the network.
A hacker, if this information is placed onto a database and that database is not
secure, is able to get on to that information and can use it later to make sure
they can get the valuable information that is inside. This is an even easier
process to work with if the hacker is able to get this from the Local Area
Network or LAN. The hack that we are going to take some time to go
through step by step below is going to happen on a LAN connection, so we
will want to double-check that we are working with a router or a HUB and
that it is all done online.
To get this attack to happen, we need to start out everything with the
VMWare first, and then go through some of the steps below to make this all
happen including:
The wireless network of your target is going to be one of the best ways that
you are able to handle some of the work that you want to do to get on their
network. This wireless network allows them to communicate with one
another, but it also offers some chances for the hacker to get onto the system
and cause the problems that they would like. Learning the best ways to
protect your network, and being careful when you go to open wireless
connections can be great ways to make sure that no one is going to be able to
get onto your system without your permission.
Conclusion