FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking



Similar documents
IT Data Communication and Networks (Optional)

The OSI and TCP/IP Models. Lesson 2

Networking Test 4 Study Guide

Ethernet. Ethernet. Network Devices

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Data Communication and Computer Network

Mathatma Gandhi University

Protocol Data Units and Encapsulation

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

DATA COMMUNICATION AND NETWORKS

Chapter 2 - The TCP/IP and OSI Networking Models

IT4405 Computer Networks (Compulsory)

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Local Area Networks (LANs) Blueprint (May 2012 Release)

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Chapter 5. Data Communication And Internet Technology

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Computer Networking Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Overview of Computer Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Introduction to computer networks and Cloud Computing

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

The OSI Model: Understanding the Seven Layers of Computer Networks

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

OSI Reference Model: An Overview

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Objectives of Lecture. Network Architecture. Protocols. Contents

WAN Data Link Protocols

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

CSE 3461 / 5461: Computer Networking & Internet Technologies

Communication Networks. MAP-TELE 2011/12 José Ruela

How To Understand The Layered Architecture Of A Network

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Post-Class Quiz: Telecommunication & Network Security Domain

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Computer Networks CS321

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

SSVP SIP School VoIP Professional Certification

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Computer Networks Vs. Distributed Systems

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

MANAGEMENT INFORMATION SYSTEMS 8/E

Network Models and Protocols

Computer Networking: A Survey

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham


Zarządzanie sieciami telekomunikacyjnymi

CSCI 362 Computer and Network Security

Data Link Protocols. TCP/IP Suite and OSI Reference Model

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Study Guide CompTIA A+ Certification, Domain 2 Networking

Overview of Routing between Virtual LANs

Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks III

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Lecture 28: Internet Protocols

CPS221 Lecture: Layered Network Architecture

Transport and Network Layer

Internetworking and IP Address

The OSI Model and the TCP/IP Protocol Suite

COMPUTER NETWORK TECHNOLOGY (300)

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

UPPER LAYER SWITCHING

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Data Communication Networks and Converged Networks

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Networking Devices. Lesson 6

EC 301 COMPUTER NETWORKING FUNDAMENTALS

VPN. Date: 4/15/2004 By: Heena Patel

Computer Networks/DV2 Lab

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Data Communication Networks Introduction

524 Computer Networks

Communication Systems Internetworking (Bridges & Co)

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Written examination in Computer Networks

2 Basic Concepts. Contents

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

DATA COMMUNICATION (Basics of data communication, OSI layers.)

Discovering Computers Chapter 9 Communications and Networks

How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)

Local Area Network. OSI Seven Layer Model. Whole Building Network

This course has been retired. View the schedule of current <a href=

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

SSVVP SIP School VVoIP Professional Certification

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Transcription:

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Learning Objectives Upon completion of this chapter, you should be able to: Describe the basic elements of computer-based data communication Know the key entities and organizations behind current networking standards, as well as the purpose of and intent behind the more widely used standards Explain the nature and intent of the OSI reference model and list and describe each of the model s seven layers Describe the nature of the Internet and the relationship between the TCP/IP protocol and the Internet Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 2

Networking Fundamentals Fundamental exchange of information: sender communicates message to receiver over some medium Communication only occurs when recipient is able to receive, process, and comprehend message One-way flow of information is called a channel When recipient becomes a sender, for example by responding to original sender s message, this two-way flow is called a circuit Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 3

Networking Fundamentals (continued) Any medium may be subject to interference, called noise, which occurs in variety of forms Attenuation: loss of signal strength as signal moves across media Crosstalk: occurs when one transmission bleeds over to another Distortion: unintentional variation of communication over media Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 4

Networking Fundamentals (continued) Any medium may be subject to interference, called noise, which occurs in variety of forms (continued) Echo: reflection of a signal due to equipment malfunction or poor design Impulse: sudden, short-lived increase in signal frequency or amplitude, also known as a spike Jitter: signal modification caused by malfunctioning equipment White noise: unwanted noise due to signal coming across medium at multiple frequencies Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 5

Reasons to Network Data communications: exchange of messages across a medium Networking: interconnection of groups or systems with purpose of exchanging information Some reasons to build a network: To exchange information To share scarce or expensive resources To allow distributed organizations to act as if centrally located Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 6

Types of Networks Networks can be categorized by: Components: peer-to-peer (P2P), server-based, distributed multi-server Size: local area network (LAN), metropolitan area network (MAN), wide area network (WAN) Layout or topology: physical (ring, bus, star, hierarchy, mesh, hybrid), logical (bus, star) Media: guided (wired), unguided (wireless) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 7

Network Standards Among the agencies that work on data communications standards are: Internet Society (ISOC) Internet Assigned Numbers Authority (IANA) American National Standards Institute (ANSI) International Telecommunication Union (ITU) Institute of Electrical and Electronics Engineers (IEEE) Telecommunications Industry Association (TIA) International Organization for Standardization (ISO) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 8

OSI Reference Model and Security OSI reference model allocates functions of network communications into seven distinct layers, each with its own functions and protocols Premise of model is information sent from one host is translated and encoded through various layers, from Application layer to Physical layer Physical layer initiates transmission to receiver Receiver translates and decodes message by processing information through each layer in reverse order Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 9

The Physical Layer The primary function of the Physical layer is to place the transmission signal carrying the message onto the communications media that is, to put bits on a wire The functions of the Physical layer are: Establish and terminate the physical and logical connection to the media Manage the flow and communication on the media Embed the message onto the signal carried across the physical media Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 10

Network Media Dominant media types and standards include: Coaxial cable Fiber-Optic cable Twisted-pair wire Wireless LAN Bluetooth Infrared Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 11

Embedding the Message Method used to embed message on signal depends on type of message and type of signal Two types of message (or information): Analog information: continuously varying source (such as voice communications) Digital information: discrete, between a few values (such as computer communications) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 12

Embedding the Message (continued) Multiplexing combines several circuits to create high-bandwidth stream to carry multiple signals long distances Three dominant multiplexing methods are: Frequency division multiplexing (FDM): combines voice channels Time division multiplexing (TDM): assigns a time block to each client Wave division multiplexing (WDM): uses different frequencies of light so multiple signals can travel on same fiber-optic cable Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 13

Managing Communication Bit (or signal) flow conducted in several ways: Simplex transmissions: flow one way through a medium Half-duplex transmissions: flow either way, but in only one direction at a time Full-duplex transmissions: can flow both ways at the same time Serial transmissions: flow one bit at a time down a single communications channel Parallel transmissions: flow multiple bits at a time down multiple channels Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 14

Managing Communication (continued) Asynchronous (or timing-independent) Formulate data flow so each byte or character has its own start and stop bit Used in older modem-based data transfers to send individual characters between systems Synchronous (or timing-dependent) Use computer clocking to transmit data in continuous stream between two systems Clock synchronization makes it possible for end nodes to identify start and end of data flow This protocol is much more efficient Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 15

Data Link Layer Primary networking support layer Referred to as first subnet layer because it provides addressing, packetizing, media access control, error control, and some flow control for local network In LANs, it handles client-to-client and client-toserver communications Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 16

Data Link Layer (continued) DLL is further divided into two sublayers: Logical Link Control (LLC) sublayer Primarily designed to support multiplexing and demultiplexing protocols transmitted over MAC layer Also provides flow control and error detection and retransmission Media Access Control (MAC) sublayer Designed to manage access to communications media in other words, to regulate which clients are allowed to transmit and when Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 17

DLL Protocols Dominant protocol for local area networking is Ethernet for wired networks and Wi-Fi for wireless networks Other DLL LAN protocols include: Token ring Fiber Distributed Data Interface (FDDI) Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) WANs typically use ATM and frame relay Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 18

Forming Packets and Addressing First responsibility of DLL is converting Network layer packet into DLL frame DLL adds not only a header but also a trailer When necessary, packet is fragmented into frames, with corresponding information embedded into each frame header Addressing is accomplished with a number embedded in network interface card (NIC) This MAC address allows packets to be delivered to an endpoint; typically shown in hexadecimal format (e.g., 00-00-A3-6A-B2-1A) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 19

Media Access Control A primary function of DLL is controlling flow of traffic that is, determining which station is allowed to transmit when Two general approaches: Control Contention Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 20

Media Access Control (continued) Control (deterministic) Well-regulated network: traffic transmitted in orderly fashion, maintaining optimal data rate Facilitate priority system: key clients or servers can be polled more frequently than others Contention (stochastic) Clients listen to determine if channel is free and then transmit Must have mechanisms to deal with collisions Collision avoidance vs. collision detection Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 21

Switches and Bridges Specific technologies used to connect networks at Data Link layer While hub connects networks at Physical layer, connecting two networks with hub results in one large network (or collision domain) Connection via Layer 2 switch, capable of bridging, maintains separate collision domains Bridging: process of connecting networks with DLL protocols while maintaining integrity of each network, only passing messages that need to be transmitted between the two Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 22

Network Layer and Packetizing Network layer is primary layer for communications between networks Three key functions: Packetizing Addressing Routing During packetizing, Network layer takes segments sent from Transport layer and organizes them into packets for transmission across a network Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 23

Addressing Network layer uses network-layer address to uniquely identify destination across multiple networks Typical address consists of the network ID and the host ID In TCP/IP, IP address is network-layer address IP address contains source and destination IP address along with additional packet information Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 24

Addressing (continued) Addresses maintained and issued by Internet Assigned Numbers Authority (IANA) In early years, addresses distributed as follows: Class A: consists of primary octet (the netid) with three octets providing host ID portion; allows up to 16,777,214 hosts on network Class B: consists of two octets in netid with two octets providing 65534 host IDs Class C: consists of three octets in netid with one octet providing 254 host IDs Class D and Class E addresses are reserved Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 25

Addressing (continued) This address assignment method proves inefficient Internet moving to new version of IP, IPv6, which uses 128-bit address instead of 32-bit Increases available addresses by factor of 2 128 Network Address Translation (NAT): uses device, like a router, to segregate external Internet from internal network Device maps organizational addresses to different addresses inside the intranet Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 26

Routing Moving Network layer packets across networks Routing protocols include static and dynamic Internal routing protocols: Used inside autonomous system (AS) Distance-vector routing protocols and link-state routing protocols External routing protocols: Communicate between autonomous systems Translate different internal routing protocols Border Gateway Protocol (BGP) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 27

Transport Layer Primary function of Transport layer is to provide reliable end-to-end transfer of data between user applications Lower layers focus on networking and connectivity while upper layers, beginning with Transport layer, focus on application-specific services Transport layer also responsible for end-to-end error control, flow control, and several other functions Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 28

Error Control Process of handling problems with transfer process, which may result in modified or corrupted segments Broken into two components: error detection and error correction Errors are typically single-bit or multiple-bit Bit errors are most likely the result of noise interference Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 29

Error Control (continued) Errors detected using one of several schemes: Repetition: data transmitted redundantly Parity: check bits at end of each byte of data Redundancy: parity calculated for blocks of data rather than individual byte (LRC, VRC, CRC) Errors typically corrected by retransmission of damaged segment Dominant error correction techniques are automatic repeat requests (ARQs) Three most common ARQs are Stop-And-Wait, Go-Back-N, and Selective Repeat Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 30

Flow Control Purpose is to prevent receiver from being overwhelmed with segments, preventing effective processing of each received segment Some error correction techniques have built-in flow control Dominant technique is sliding window protocol, which provides mechanism by which receiver can specify number of segments (or bytes) it can receive before sender must wait Receiver enlarges or reduces window size as necessary Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 31

Other Functions of the Transport Layer Assignment of ports, which identify the service requested by a user Combination of Network layer address and port is referred to as a socket Tunneling protocols also work at Transport layer These protocols work with Data Link layer protocols to provide secure connections Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 32

Session Layer Responsible for establishing, maintaining, and terminating communications sessions between two systems Regulates whether communications are simplex (one way only), half-duplex (one way at a time), or full-duplex (bidirectional) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 33

Presentation Layer Responsible for data translation and encryption functions For example, if one system is using standard ASCII and another is using EBCDIC, the Presentation layer performs the translation Encryption can also be part of operations performed at this level Presentation layer encapsulates Application layer messages prior to passing them down to Transport layer Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 34

Application Layer At Application layer, user is provided with a number of services, most aptly called application protocols TCP/IP protocol suite includes applications such as e-mail (SMTP and POP), World Wide Web (HTTP and HTTPS), file transfer (FTP and SFTP), and others Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 35

The Internet and TCP/IP The Internet incorporates millions of small, independent networks, connected by most of the major common carriers Most services we associate with the Internet are based on Application layer protocols The Internet is a physical set of networks, while the World Wide Web (WWW) is a set of applications that run on top of the Internet Web uses domain name-based Uniform Resource Identifiers (URIs), Uniform Resource Locator (URL) being best-known type Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 36

TCP/IP TCP/IP actually suite of protocols used to facilitate communications across the Internet Developed before OSI reference model, it is similar in concept but different in detail TCP/IP model is less formal than OSI reference model Each of the four layers of TCP/IP model represents a section of one or more layers of OSI model Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 37

Application Layer TCP/IP Application layer consists of utility protocols that provide value to end user Data from users and utilities are passed down to Transport layer for processing Wide variety of Application layer protocols that support Internet users: SMTP, POP for e-mail, FTP for data transfer, HTTP for Web content Application layers on each host interact directly with corresponding applications on other hosts to provide requisite communications support Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 38

Transport Layer Responsible for transferring of messages, including resolution of errors, managing necessary fragmentation, and control of message flow, regardless of underlying network Connection or connectionless messages Connects applications through use of ports Lowest layer of TCP/IP stack to offer any form of reliability TCP: connected, reliable protocol UDP: connectionless, unreliable protocol Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 39

Internetwork Layer Handles moving packets in a single network Examples of protocols are X.25 and ARPANET s Host/IMP Protocol Internet Protocol (IP) performs task of moving packets from source host to destination host IP carries data for many different upper-layer protocols Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 40

Internetwork Layer (continued) Some protocols carried by IP function on top of IP but perform other Internetwork layer functions All routing protocols are also part of Network layer Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 41

Subnet Layers TCP/IP Subnet layers include Data Link and Physical layers TCP/IP relies on whatever native network subnet layers are present For example, if user s network is Ethernet then IP packets are encapsulated into Ethernet frames No specification for Data Link layer or Physical layer Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 42

Chapter Summary Fundamental exchange of information: sender communicates message to receiver over some medium Communication only occurs when recipient is able to receive, process, and comprehend message Any medium may be subject to interference: attenuation, crosstalk, distortion, echo, impulse, jitter, white noise Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 43

Chapter Summary (continued) Some reasons to build a network: To exchange information To share scarce or expensive resources To allow distributed organizations to act as if centrally located Networks can be categorized by: components, size, layout or topology, media OSI reference model allocates functions of network communications into seven distinct layers, each with its own functions and protocols Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 44

Chapter Summary (continued) OSI reference model layers: Physical: puts transmissions onto media Data Link: primary networking support layer Network: primary layer for communications between networks Transport: provides reliable end-to-end transfer of data between user applications Session: establishes, maintains, terminates communications sessions between two systems Presentation: data translation and encryption Application: provides application protocols Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 45

Chapter Summary (continued) Each of four layers of TCP/IP model represents a section of one or more layers of OSI model Application: consists of utility protocols that provide value to end user Transport: responsible for transferring messages, regardless of underlying network Internetwork: handles moving packets in a single network Subnet: includes Data Link and Physical layers, relying on whatever native network subnet layers are present for signal transmission Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 46