0% found this document useful (0 votes)
112 views

Network Security Module 1

The document provides an overview of the TeachApex Network Security course. The course objectives are to understand computer networks, the OSI and TCP/IP models, different network types, components, and protocols. It also covers IP addressing concepts. The document defines what a computer network is and discusses the history and evolution of networks from the 1950s to present. It also describes common network topologies like bus, star, ring, tree, mesh, and hybrid along with different types of networks including personal area networks, local area networks, metropolitan area networks, wide area networks, storage area networks, campus area networks, wireless local area networks, enterprise private networks, and virtual private networks.

Uploaded by

Javeed Ahamed
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views

Network Security Module 1

The document provides an overview of the TeachApex Network Security course. The course objectives are to understand computer networks, the OSI and TCP/IP models, different network types, components, and protocols. It also covers IP addressing concepts. The document defines what a computer network is and discusses the history and evolution of networks from the 1950s to present. It also describes common network topologies like bus, star, ring, tree, mesh, and hybrid along with different types of networks including personal area networks, local area networks, metropolitan area networks, wide area networks, storage area networks, campus area networks, wireless local area networks, enterprise private networks, and virtual private networks.

Uploaded by

Javeed Ahamed
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

TeachApex

Network Security

Module 01: Network Fundamentals


Course Objectives

○ Understanding Computer Networks


○ OSI and TCP/IP Network Models
○ Different types of Network
○ Network Components
○ Networking protocols in TCP/IP Protocol Stack The overall objective of this course, is to
learn the key concepts of computer
○ IP Addressing Concepts networks, OSI and TCP/IP Models,
understand different types of Network,
Networking protocols and at last learn
concepts of IP Addressing.

TeachApex
2
Network Security
Understanding
Computer
Networks

TeachApex
3
Network Security
It is an interconnection of multiple
devices, generally termed as Hosts
connected using multiple paths for
the purpose of sending and/or
receiving data or media.

Computer networks support an


enormous number of applications
and services.

TeachApex
4
Network Security
History of Computer Networks

In 1950’s In 1960’s In 1963


Early networks of The commercial airline
computers included reservation system
the U.S. military radar SABRE went online "Intergalactic
system Semi- with two connected Computer Network"
Automatic Ground mainframes.
Environment (SAGE).

In 1964 In 1965 In 1972


Researchers at Dartmouth Western Electric Commercial
developed the Dartmouth Time introduced the first services using X.25
Sharing System. At the same widely used telephone
time, a research group supported were deployed.
switch that
by General Electric and Bell implemented true
Labs used a computer to route computer control.
and manage telephone
connections.
(Continued..)
History of Computer Networks

In 1991 In 1996 In 2000

Home Broadband The 56K modem Cisco achieved a


created. was invented by Dr. stock market
capitalization of more
Brent Townshend. than $550 million.

In 2001 In 2010 In 2020


Home broadband
enters mainstream
usage and begins 100 Gigabit 100 Terabit Ethernet
growing at a faster rate Ethernet standard by 2020.
than Internet dial-up fully completed.
services.
Network Topologies
(Continued..)

Bus Star

TeachApex
7
Network Security
Network Topologies
(Continued..)

Ring Dual Ring

TeachApex
8
Network Security
Network Topologies

Tree Mesh Hybrid

TeachApex
9
Network Security
OSI & TCP/IP
Network Models

TeachApex
10
Network Security
OSI Model
○ OSI (Open Systems Interconnection)
model was created by the ISO, an
international standard-setting body.
○ It was designed to be a reference model
for describing the functions of a
communication system.
○ The OSI model provides a framework for
creating and implementing networking
standards and devices and describes how
network applications on different
computers can communicate through the
network media.

TeachApex
11
Network Security
TCP/IP Model
○ The Internet protocol suite is the conceptual model
and set of communications protocols used in the
Internet and similar computer networks. Application Layer
○ It is commonly known as TCP/IP because the
foundational protocols in the suite are the
Transmission Control Protocol (TCP) and the
Internet Protocol (IP). Transport Layer

Internet Layer

Network Access Layer

TeachApex
12
Network Security
TeachApex
13
Network Security
Different Types
of Networks

TeachApex
14
Network Security
Types of Networks

Personal Area Local Area Network Metropolitan Area Wide Area Network Storage Area
Network (PAN) (LAN) Network (MAN) (WAN) Network (SAN)

Campus Area Wireless Local Area Enterprise Private Virtual Private


Network (CAN) Network (WLAN) Network (EPN) Network (VPN)

TeachApex
15
Network Security
Personal Area Network
(PAN)

○ A computer network for


interconnecting devices centered on
an individual person's workspace.
○ A PAN provides data transmission
among devices such as computers,
smartphones, tablets and personal
digital assistants.

TeachApex
16
Network Security
Local Area Network
(LAN)

○ A computer network within a small


geographical area such as a home,
school, computer laboratory, office
building or group of buildings.
○ A Local Area Network (LAN) is a
private network owned and
maintained by a single organization.

TeachApex
17
Network Security
Metropolitan Area
Network (MAN)

○ A computer network that


interconnects users with computer
resources in a geographic region of
the size of a metropolitan area.
○ MAN covers a geographic area or
region larger than that covered by
even a large Local Area Network
(LAN) but smaller than the area
covered by a Wide Area Network
(WAN).

TeachApex
18
Network Security
Wide Area Network
(WAN)

○ A wide area network (WAN) is a


network that exists over a large-
scale geographical area.
○ A WAN connects different smaller
networks, including Local Area
Networks (LANs) and Metropolitan
Area Networks (MANs).

TeachApex
19
Network Security
Storage Area Network (SAN)
○ A specialized, high-speed network that provides
block-level network access to storage.
○ SANs are typically composed of hosts, switches,
storage elements, and storage devices that are
interconnected using a variety of technologies,
topologies, and protocols.
○ SANs can be accessed in the same fashion as a
drive attached to a server.

TeachApex
20
Network Security
Campus Area Network
(CAN)

○ A network of multiple interconnected


Local Area Networks (LAN) in a
limited geographical area.
○ A Campus Area Network is larger
than a Local Area Network (LAN)
but smaller than a Metropolitan Area
Network (MAN) or Wide Area
Network (WAN).

TeachApex
21
Network Security
Wireless Local Area Network
(WLAN)
○ A wireless local area network (WLAN) is a wireless
distribution method for two or more devices that
use high-frequency radio waves and often include
an access point to the Internet.
○ A WLAN allows users to move around the
coverage area, often a home or small office, while
maintaining a network connection.

TeachApex
22
Network Security
Enterprise Private Network (EPN)

○ An enterprise private network is a computer


network that helps enterprise companies
with a number of disparate offices connect
those offices to each in a secure way over a
network.
○ An enterprise private network is mainly set
up to share computer resources.

TeachApex
23
Network Security
Virtual Private Network
(VPN)

○ An encrypted connection over the


Internet from a device to a network.
○ Encrypted connection that helps
ensure the sensitive data is safely
transmitted.
○ VPN technology is widely used in
corporate environments.

TeachApex
24
Network Security
Network
Components

TeachApex
25
Network Security
Network Components
(Continued..)

Hub Switch
Hub is a device that Connects devices on a
splits a network computer network using
connection into multiple packet switching to receive,
computers. process, & forward data to
the destination device.

Router NIC
A device that connect a A hardware device that
LAN with an internet connect a computer
connection and also with the network. They
used to receive, are installed on the
analyze and forward mother board.
the incoming packets
to another network.

TeachApex
26
Network Security
Network Components

Modem Cables
It stands for Modulator A wire that is used to
and/or Demodulator. It connect more than one
converts the digital data computers or other
into an analog signal devices such as printers
over the telephone lines. and scanner to each other.

Client Server
A client is a computer Servers are computers
that is connected to that runs operating
other computers in the system and hold data
network and can that can be shared
receive data sent by over a computer
other computers. network.

TeachApex
27
Network Security
Networking
Protocols in
TCP/IP
Protocol Stack

TeachApex
28
Network Security
TCP/IP Layers and Protocol Stack
Layers Protocol Stack

HTTP/HTTPS, FTP, Telnet,


Application Layer NTP, DHCP, IMAP, LDAP,
SSH, TLS/SSL

Transport Layer TCP, UDP

Internet Layer IP, ICMP, IGMP, IPsec

Ethernet, Token Ring,


Network Access Layer Frame Relay

TeachApex
29
Network Security
Application Layer Networking Protocols
(Continued..)

HTTP/HTTPS FTP Telnet

• The HTTP is the • The FTP is the most • Telnet is a user command
application protocol for common protocol used in and an underlying TCP/IP
distributed and the file transferring in the protocol for accessing
collaborative hypermedia Internet and within private remote computers.
information system. networks.
• Through Telnet, an
• HTTP was developed to • FTP is often secured with administrator or another
facilitate hypertext and the SSL/TLS (FTPS) or user can access someone
World Wide Web. replaced with SSH File else's computer remotely.
Transfer Protocol (SFTP).
• The default port of HTTP is • Establish a connection to
80 and 443 is the secured • The default port of FTP TCP port number 23,
port. and FTPS are 21 and 990. where a Telnet server
application is listening.

TeachApex
30
Network Security
Application Layer Networking Protocols
(Continued..)

NTP DHCP IMAP

• Network Time Protocol • A network management • IMAP version 3 is another


(NTP) is a protocol used to protocol used to main protocol that used to
synchronize computer dynamically assign an IP retrieve mail from a server.
clock times in a network. address to any device, or IMAP does not delete the
node, on a network so content from the mail box
• The term NTP applies to they can communicate of the server.
both the protocol and the using IP.
client-server programs that • The default port of IMAP is
run on computers. • DHCP port number for 143 and secured is 993.
server is 67 and for the
• Port: 123 client is 68.

TeachApex
31
Network Security
Application Layer Networking Protocols

LDAP SSH TLS/SSL

• A standard application • A method for secure • SSL is the standard


protocol for accessing & remote login from one technology for keeping an
maintaining distributed computer to another. internet connection secure
directory information and safeguarding any
services over an IP • It provides several sensitive data.
network. alternative options for
strong authentication, and • TLS (Transport Layer
• LDAP uses a relatively it protects the Security) is just an
simple, string-based query communications security updated, more secure,
to extract information from and integrity with strong version of SSL.
Active Directory. encryption.
• The TCP and UDP port for • The standard TCP port for
LDAP traffic is 389. SSH is 22.

TeachApex
32
Network Security
Transport Layer Networking Protocols

TCP UDP

○ A network communication ○ UDP (User Datagram Protocol)


protocol designed to send data is connection-less.
packets over the Internet. ○ UDP is a very lightweight
○ TCP (Transmission Control protocol defined in RFC 768.
Protocol) is connection oriented. ○ UDP is efficient for broadcast
○ TCP provides extensive error and multicast type of network
checking mechanisms. transmission.

TeachApex
33
Network Security
Internet Layer Networking Protocols

IP (IPv4/IPv6) ICMP (ICMPv6) IGMP IPSec

IP is the underlying ICMP is a TCP/IP IGMP is a group IPSec is a secure


technology that makes it network layer protocol management protocol network protocol suite
possible for us to that provides that mainly manages the that authenticates and
connect our devices to troubleshooting, control group membership in a encrypts the packets of
the web. and error message multicast network. data sent over an
services. Internet Protocol
network.

TeachApex
34
Network Security
Network Access Layer Networking Protocols

Ethernet Token Ring Frame Relay

Ethernet is the traditional technology Token Ring local area network Frame relay has evolved from
for connecting wired Local Area (LAN) technology is a X.25 packet switching and
Networks (LANs), Metropolitan Area communications protocol for Local objective is to reduce network
Networks (MANs) and Wide Area Area Networks. delays, protocol overheads and
Networks (WANs) enabling devices to equipment cost.
communicate with each other via a In token ring, nodes/stations are
protocol. arranged in a ring topology.

TeachApex
35
Network Security
IP Addressing
Concepts

TeachApex
36
Network Security
IP Address
An IP Address is a numerical representation that
uniquely identifies a specific interface on the
network.
IP stands for Internet Protocol and describes a
set of standards and requirements for creating
and transmitting data packets, or datagrams,
across networks.

TeachApex
37
Network Security
IP Versions

IPv4 Addresses IPv6 Addresses

IPv4 addresses are actually 32-bit binary numbers, The address size was increased from 32 bits in IPv4
consisting of the two sub-addresses. to 128 bits in IPv6.
For example, the address 168.212.226.204 IPv6 addresses are represented by eight sets of four
represents the 32-bit binary number, also hexadecimal digits, and each set of numbers is
represented in 4 octets of numbers separated by a colon. For example:
10101000.11010100.11100010.11001100.
2DAB:FFFF:0000:3EAE:01AA:00FF:DD72:2C4A

TeachApex
38
Network Security
Subnet Masks
○ A single IP address identifies both a network, and a unique interface on that network. A subnet mask can also
be written in dotted decimal notation and determines where the network part of an IP address ends, and the
host portion of the address begins.
○ The bits marking the subnet mask must be consecutive ones. Most subnet masks start with 255. and
continue on until the network mask ends.
○ A Class C subnet mask would be 255.255.255.0.

TeachApex
39
Network Security
IP Address Classes

Size of
Leading network Size of rest Number of Addresses per Total addresses in
Class Start address End address
Bits number bit bit field networks network class
field

Class A 0 8 24 128 (27) 16,777,216 (224) 2,147,483,648 (231) 0.0.0.0 127.255.255.255

Class B 10 16 16 16,384 (214) 65,536 (216) 1,073,741,824 (230) 128.0.0.0 191.255.255.255

Class C 110 24 8 2,097,152 (221) 256 (28) 536,870,912 (229) 192.0.0.0 223.255.255.255

Class D (multicast) 1110 not defined not defined not defined not defined 268,435,456 (228) 224.0.0.0 239.255.255.255

Class E (reserved) 1111 not defined not defined not defined not defined 268,435,456 (228) 240.0.0.0 255.255.255.255

TeachApex
40
Network Security
IP Address Classes and Bit-wise Representations
Class A Class D
0. 0. 0. 0 = 00000000.00000000.00000000.00000000 224. 0. 0. 0 = 11100000.00000000.00000000.00000000
127.255.255.255 = 01111111.11111111.11111111.11111111 239.255.255.255 = 11101111.11111111.11111111.11111111
0nnnnnnn.HHHHHHHH.HHHHHHHH.HHHHHHHH 1110XXXX.XXXXXXXX.XXXXXXXX.XXXXXXXX

Class B Class E
128. 0. 0. 0 = 10000000.00000000.00000000.00000000 240. 0. 0. 0 = 11110000.00000000.00000000.00000000
191.255.255.255 = 10111111.11111111.11111111.11111111 255.255.255.255 = 11111111.11111111.11111111.11111111
10nnnnnn.nnnnnnnn.HHHHHHHH.HHHHHHHH 1111XXXX.XXXXXXXX.XXXXXXXX.XXXXXXXX

Class C
192. 0. 0. 0 = 11000000.00000000.00000000.00000000
223.255.255.255 = 11011111.11111111.11111111.11111111
110nnnnn.nnnnnnnn.nnnnnnnn.HHHHHHHH

TeachApex
41
Network Security
Thank You!

TeachApex
42
Network Security

You might also like