Intoduction To Network
Intoduction To Network
5
5
6
6 Reports
Processing
reports 7
7
Statistics,
4
4 summaries,
exceptions
8
8 Mainframe
Partners Processing batch jobs
and clients
exchange Reports
information 2
2
1 Reports
1
Backups
3
3
Data
update Tape Storage
1
10
0 Sequential
9
9 data sets
Disk Storage
Production System databases
Control Operator
Computer
Network
Computer Network
A computer network is a system in which multiple computers are connected to each other to share information and
resources.
The physical connection between networked computing devices is established using either cable media or wireless
media.
The best-known computer network is the Internet.
Advantages of networking.
Communication: “To be precise, an effective and faster Data Sharing: Another wonderful advantage of
communication between computers, which computer networks is the data sharing.
enable us to communicate effectively”
Computer networking technology has improved the way of Data such as documents, file, accounts information, reports,
communication between people from the same or different presentation files, videos, images etc
organizations, Can be shared within a local network or remotely connected
They can communicate in a matter of seconds for collaborating the networks.
work activities.
In offices, networked computers are serving as the backbone for the
daily communication from top to bottom level of organization.
Different types of software can be installed which are useful for
transmitting messages and emails at fast speed.
Instant and multiple Access : One of the other advantages of computer networking is that it
enable multiple users to access same data at the same time from a same or remote location.
• One of the real time examples is a world wide web.
• Everyone can access a web page from a different location and read the same information at a same time.
Cost Effective: Building a computer network, save a lot of cost for any organizations in different ways.
• Building “uplinks” through the computer networking, immediately transfers files and messages to the
other people which reduced transportation and communication expense.
• It also raises the standard of the organization because of the advanced technologies that re used in
networking.
Presence of computer viruses and malware: If even one computer on a network gets affected
by a virus,
• There is a possible threat for the other systems getting affected too. Viruses can spread on a network
easily,
• Because of the inter- connectivity of workstations. Moreover, multiple systems with common resources
are the
• Perfect breeding ground for viruses that multiply.
• Lack of Independence: Since most networks have a centralized server and dependent clients, the
client users lack any freedom whatsoever. Centralized decision making can sometimes hinder how a client
user wants to use his own computer.
• Lack of Robustness: As previously stated, if a computer network’s main server breaks down, the
entire system would become useless. Also, if it has a bridging device or a central linking server that fails, the
entire network will also come to a standstill.
ELEMENTARY TERMINOLOGY OF NETWORKS
Non-dedicated
Dedicated servers
Non-dedicated Servers
Manufacturing:
• Computer networks are used today in, many aspects of manufacturing, including the manufacturing
process itself.
• Two applications that use networks to provide essential services are computer-assisted design (CAD) and
computer-assisted manufacturing (CAM), both of which allow multiple users to work on a project
simultaneously.
Electronic messaging: Probably • Directory services: Directory • Information services: • Electronic data interchange • Teleconferencing:
the most widely used network services allow lists of files to be Network information services (EDI): EDI allows business Teleconferencing allows
application is electronic mail stored in a central location to include bulletin boards and information (including conferences to occur without
(e-mail). speed worldwide search data banks. A World Wide Web documents such as purchase the participants being in the
operations. site offering the technical orders and invoices) to be same place. Applications
specifications for a new transferred without using include simple text
product is an information paper. conferencing (where
service. participants communicate
through their keyboards and
computer monitors). voice
conferencing (where
participants at a number of
locations communicate
simultaneously over the
phone) and video conferencing
(where participants can see as
well as talk to one another).
• Bits & Bytes
Bit - One digit either 0 or 1.
Byte - Any combination of 0 or 1.
also called an octet.
• 0 – OFF
• 1 – ON
• computer only Understand 0 or 1.
HISTORY
HISTORY
• History (Development) of Computer Networks Each of the past three
centuries has been dominated by a single technology. The 18th century
was the era of the great mechanical systems accompanying the
Industrial Revolution. The 19th century was the age' of the steam
engine. During the 20th century, the key technology was information
gathering, processing, and distribution.
Intro: Communication
Process of transferring information form one point to another.
It may contain message, gestures, video, audio, etc,.
It uses a medium do transmit data called channel.
Old methods of
Communication
Not efficient
It is an Analog communication.
Not all can use it.
You need to know “morse code” to use telegraphy
Disturbances
High maintained
Development…
Why Analog??
Can’t we use wire less…..
Birth of internet
•Today we use internet more than the amount of time we read books in
our entire life.
ARPA ( Advanced Research Project Agency)
RAND (Military corporation, USA)
NPL (National Physical Laboratory, ENGLAND)
CYCLADES (Scientific Network, FRANCE)
All the above are the fundamentals of INTERNET.
ARPANET…
• The first workable prototype of the Internet came in the late 1960s with the creation of ARPANET,
or the Advanced Research Projects Agency Network. Originally funded by the U.S. Department of
Defense, ARPANET used packet switching to allow multiple computers to communicate on a
single network.
Telnet (Remote Computing)
Telnet or remote computing is telecommunication utility software, which uses available
telecommunication facility and allows you to become a user on a remote computer.
Once you gain access to the remote computer, you can use it for the intended purpose.
The TELNET works in a very step by step procedure. The commands typed on the client computer
are sent to the local Internet Service Provider (ISP), and then from the ISP to the remote computer
that you have gained access.
Most of the ISP provides facility to TELNET into your own account from another city and check
your e-mail while you are traveling or away.
What is the Internet?
• The Internet is a global network of billions of computers and other electronic devices. With the Internet, it's
possible to access almost any information, communicate with anyone else in the world, and do much more.
• You can do all of this by connecting a computer to the Internet, which is also called going online. When
someone says a computer is online, it's just another way of saying it's connected to the Internet.
Internet
The Internet is a network of networks
Computer users on the Internet can contact one another anywhere in the world
In Internet a huge resource of information is accessible to people across the world
Information in every field starting from education, science, health, medicine,
history, and geography to business, news, etc. can be retrieved through Internet
You can also download programs and software packages from anywhere in the
world
What is the Web?
• The World Wide Web—usually called the Web for short—is a collection of
different websites you can access through the Internet. A website is made up of related text,
images, and other resources. Websites can resemble other forms of media—like newspaper articles
or television programs—or they can be interactive in a way that's unique to computers.
Conclusion
INTER-NET today we took 40 years to grow.
Today we access internet through optical fibers
connected around the globe
It has become the most important thing in our life.
NETWORK
TOPOLOGY
NETWORK TOPOLOGY
• The pattern of interconnection of nodes in a network is called the TOPOLOGY. The selection of a topology for a network
cannot be done in isolation as it affects the choice of media and the access method used.
• The way a network is arranged can make or break network functionality, connectivity, and protection from downtime. The
question of, “What is network topology?” can be answered with an explanation of the two categories in the network
topology.
1) Physical – The physical network topology refers to the actual connections (wires, cables, etc.) of how the network
is arranged. Setup, maintenance, and provisioning tasks require insight into the physical network.
2) Logical – The logical network topology is a higher-level idea of how the network is set up, including which nodes
connect to each other and in which ways, as well as how data is transmitted through the network. Logical network
topology includes any virtual and cloud resources.
Types of Network Topology
BUS TOPOLOGY
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines.
There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over
the main cable, there is a limit of drop lines and the distance a main cable can have.
Advantages of bus topology
Easy installation.
It uses less cable tahn other topologies.
It is relatively inexpensive.
• In Simplex mode of communication, signal flows in ONE direction and only one
node transmit and the other receives.
• In Half duplex mode of communication, each node can transmit and receive but
NOT at the same time.
• In Full-duplex mode of communication, both stations transmit and receive
simultaneously.
Point to Point:
Topology
Advantages and Disadvantages
Advantages Disadvantages
VS
• Highest Bandwidth because there is • This topology is only used for small
only two nodes having entire areas where nodes are closely located.
bandwidth of a link • The entire network depends on the
• Very fast compared to other network common channel in case of link
topologies because it can access only broken entire network will become
two nodes. dead.
• Very simple connectivity • There are only two nodes if any of the
node stops working, data cannot be
• Easy to handle and maintain
transfer across the network.
Tree Topology
A tree topology is a special type of structure where many connected elements are
arranged like the branches of a tree. For example, tree topologies are frequently
used to organize the computers in a corporate network, or the information in a
database.
Advantages of Tree Topology
• It provides high scalability, as leaf nodes can add more nodes in the hierarchical chain.
• Other nodes in a network are not affected, if one of their nodes get damaged.
• It provides easy maintenance and fault identification.
• OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical
medium to the software application in another computer.
• It divides network architecture into seven layers which, from top to bottom, are the
Application, Presentation, Session, Transport, Network, Data Link, and Physical
Layers. It is therefore often referred to as the OSI Seven Layer Model.
OSI History
In 1978, the International Standards OSI has two major components: an The concept of a 7 layer model was Various aspects of OSI design evolved
Organization (ISO) began to develop its abstract model of networking, called the provided by the work of Charles from experiences with the Advanced
OSI framework architecture. Basic Reference Model or seven-layer Bachman, then of Honeywell. Research Projects Agency Network
model, and a set of specific protocols. (ARPANET) and the fledgling Internet.
OSI Groups
Application Layer
Session Layer
Network Layer
Physical Layer
Layer1: Physical Layer
• The Physical Layer defines the electrical and physical specifications for devices. In particular, it defines
the relationship between a device and a physical medium.
• This includes the layout of pin, voltages, cable specification, hubs, repeaters, network adapters, host
bus adapters, and more.
• The major functions and services performed by the Physical Layer are:
• Establishment and termination of a connection to a communication
medium.
• Participation in the process whereby the communication resources are
effectively shared among multiple users. For example, flow control.
• Modulation, or conversion between the representation of digital data in
user equipment and the corresponding signals transmitted over a
communications channel. These are signals operating over the physical
cabling (such as copper and optical fiber) or over a radio link.
Layer 2: Data Link Layer
• The Data Link Layer provides the functional and procedural means to transfer data between network entities
and to detect and possibly correct errors that may occur in the Physical Layer.
• Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide
area media in the telephone system.
• The data link layer is divided into two sub-layers by IEEE.
• One is Media Access Control (MAC) and another is Logical Link Control
(LLC).
• Mac is lower sub-layer, and it defines the way about the media access
transfer, such as CSMA/CD/CA(Carrier Sense Multiple Access/Collision
Detection/Collision Avoidance)
• LLC provides data transmission method in different network. It will re-
package date and add a new header.
Layer 3: Network Layer
• The Network Layer provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while maintaining the quality
of service requested by the Transport Layer.
• The OSI model made this layer responsible for graceful close of sessions, which is a property of
the Transmission Control Protocol, and for session check pointing and recovery, which is not
usually used in the Internet Protocol Suite. The Session Layer is commonly implemented
explicitly in application environments that use remote procedure calls.
• The session layer decides when to turn communication on and off between two computer- it
provides the mechanisms that control the data exchange process and coordinates the interaction
between them.
Layer 6: Presentation Layer
The OSI
reference model.
77
Layer 7: Application Layer
Application Layer
Application Layer
Presentation Layer TELNET, FTP, SMTP, POP3, SNMP, NNTP,
DNS,NIS, NFS, HTTP, ...
Session Layer
Again, in both models, the layers above transport are application-oriented users of the
transport service. Despite these fundamental similarities, the two models also have
many differences. In this section we will focus on the key differences between the two
reference models. It is important to note that we are comparing the reference models
here, not the corresponding protocol stacks. The protocols themselves will be
discussed later. Three concepts are central to the OSI model:
1. Services.
2. Interfaces.
3. Protocols.
OSI vs TCP/IP
NETWORK ADDRESS
NETWORK ADDRESS
• A network address is any Logical or Physical address that uniquely distinguishes
a network node or device over a computer or telecommunications network. It is a
numeric/symbolic number or address that is assigned to any device that seeks
access to or is part of a network.
• PHYSICAL ADDRESS
• When referring to computers in general or computer memory, the physical address is the
computer memory address of a physical hardware device.
• When referring to a network address, physical address is sometimes used to describe the
MAC address.
• The MAC layer interfaces directly with the network medium. Consequently, each different type of network medium
requires a different MAC layer.
• The chance to see the MAC address is very difficult for any of your equipment.
MAC
• A MAC address is a unique character string, and since it identifies a specific physical device -one individual NIC -- the MAC
address, by convention, never changes for the life of the NIC. Two NICs never have the same MAC address (unless some
manufacturer screws up royally [which has happened]). Because your NIC's MAC address is permanent, it's often referred to as
the "real" or physical address of a computer.
• If you'd like to see the MAC address and logical address used by the Internet Protocol (IP) for your Windows computer, you can
run a small program that Microsoft provides.
• Go to the "Start" menu, click on "Run," and in the window that appears, type WINIPCFG (IPCONFIG/ALL for Windows
2000/XP).
• When the gray window appears, click on "More Info" and you'll get information.
Physical Address
LOGICAL ADDRESS
• Class A addresses are for networks with large number of total hosts. Class A allows for 126 networks by
using the first octet for the network ID. The first bit in this octet, is always set and fixed to zero. And next
seven bits in the octet is all set to one, which then complete network ID. The 24 bits in the remaining octets
represent the hosts ID, allowing 126 networks and approximately 17 million hosts per network. Class A
network number values begin at 1 and end at 127.
• IP Range: 1.0.0.0 to 126.0.0.0
• First octet value range from 1 to 127
• Subnet Mask: 255.0.0.0 (8 bits)
• Number of Networks: 126
• Number of Hosts per Network: 16,777,214
Class B Public Address
• Class B addresses are for medium to large sized networks. Class B allows for 16,384 networks
by using the first two octets for the network ID. The two bits in the first octet are always set and
fixed to 1 0. The remaining 6 bits, together with the next octet, complete network ID. The 16
bits in the third and fourth octet represent host ID, allowing for approximately 65,000 hosts per
network. Class B network number values begin at 128 and end at 191.
• Range: 128.0.0.0 to 191.255.0.0
• First octet value range from 128 to 191
• Subnet Mask: 255.255.0.0 (16 bits)
• Number of Networks: 16,382
• Number of Hosts per Network: 65,534
Class C Public Address
• Class C addresses are used in small local area networks (LANs). Class C allows for
approximately 2 million networks by using the first three octets for the network ID. In class
C address three bits are always set and fixed to 1 1 0. And in the first three octets 21 bits
complete the total network ID. The 8 bits of the last octet represent the host ID allowing for
254 hosts per one network. Class C network number values begin at 192 and end at 223.
• Range: 192.0.0.0 to 223.255.255.0
• First octet value range from 192 to 223
• Subnet Mask: 255.255.255.0 (24 bits)
• Number of Networks: 2,097,150
• Number of Hosts per Network: 254
Class D Address Class
• Classes D are not allocated to hosts and are used for multicasting.
• Range: 224.0.0.0 to 239.255.255.255
• First octet value range from 224 to 239
• Number of Networks: N/A
• Number of Hosts per Network: Multicasting
• Within each network class, there are designated IP address that is reserved specifically for
private/internal use only. This IP address cannot be used on Internet-facing devices as that are non-
routable. For example, web servers and FTP servers must use non-private IP addresses. However,
within your own home or business network, private IP addresses are assigned to your devices (such as
workstations, printers, and file servers).
1. Class A Private Range: 10.0.0.0 to 10.255.255.255
2. Class B Private APIPA Range: 169.254.0.0 to 169.254.255.255
3. Automatic Private IP Addressing (APIPA) is a feature on Microsoft Windows-based computers to
automatically assign itself an IP address within this range if a Dynamic Host Configuration
Protocol (DHCP) server is not available. A DHCP server is a device on a network that is responsible for
assigning IP address to devices on the network.
4. Class B Private Range: 172.16.0.0 to 171.31.255.255
5. Class C Private Range: 192.168.0.0 to 192.168.255.255
Special Addresses
• IP Range: 127.0.0.1 to 127.255.255.255 are network testing addresses
(also referred to as loop-back addresses)
IP (Internet Protocol)
• The core of the TCP/IP protocol suite
• Two versions co-exist
• v4 – the widely used IP protocol
• v6 – has been standardized in 1996, but still not widely deployed
• IP (v4) header minimum 20 octets (160 bits)
96
IPV4
• The IPv4 address is a 32-bit number that uniquely identifies a network interface on a machine. An IPv4
address is typically written in decimal digits, formatted as four 8-bit fields that are separated by
periods. Each 8-bit field represents a byte of the IPv4 address.
Ex: 192.168.1.1
IPV6
• An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing
16 bits (two octets, a group sometimes also called a hextet). The groups are separated by colons (:). An
example of an IPv6 address is:
Ex: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
Difference
between IPV4
and IPV6
Router, Switches
and Hub
Hubs
• Hubs are networking devices operating at a physical layer
of the OSI model that are used to connect multiple
devices in a network. They are generally used to connect
computers in a LAN.
• A hub has many ports in it. A computer which intends to
be connected to the network is plugged in to one of these
ports. When a data frame arrives at a port, it is broadcast
to every other port, without considering whether it is
destined for a particular destination device or not.
• Features of Hubs
• A hub operates in the physical layer of the OSI model.
• A hub cannot filter data. It is a non-intelligent network
device that sends message to all ports.
• Transmission mode is half duplex.
Switches
• Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward data
packets or data frames over the network.
• A switch has many ports, to which computers are plugged in. When a data frame arrives at
any port of a network switch, it examines the destination address, performs necessary
checks and sends the frame to the corresponding device(s).It supports unicast, multicast
as well as broadcast communications.
• Features of Switches
• A switch operates in the layer 2, i.e., data link layer of the OSI model.
• It is an intelligent network device that can be conceived as a multiport network bridge.
• It uses MAC addresses (addresses of medium access control sublayer) to send data packets to
selected destination ports.
• It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-all)
communications.
Switches
Routers
• Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are
responsible for receiving, analyzing, and forwarding data packets among the connected computer
networks. When a data packet arrives, the router inspects the destination address, consults its routing
tables to decide the optimal route and then transfers the packet along this route.
• Features of Routers
• A router is a layer 3 or network layer device.
• It connects different networks together and sends data packets from one network to another.
• A router can be used both in LANs (Local Area Networks) and WANs (Wide Area Networks).
• Routers provide protection against broadcast storms.
• Routers are more expensive than other networking devices like hubs, bridges and switches.
• Routers are manufactured by some popular companies like −
Cisco
D-Link
HP
3Com
Juniper
Nortel
PROTOCOL
• A communication protocol is a system of rules that allows two or more entities of a
communications system to transmit information via any kind of variation of a
physical quantity.
• In networking, a protocol is a set of rules for formatting and processing data.
Network protocols are like a common language for computers. The computers
within a network may use vastly different software and hardware; however, the use
of protocols enables them to communicate with each other regardless.
Protocols and Port numbers
• Port numbers are used to determine what protocol
incoming traffic should be directed to.
• Each port number identifies a distinct service, and
each host can have 65535 ports per IP address.
• Port use is regulated by the Internet Corporation
for Assigning Names and Numbers (ICANN). By
Port ICANN there are three categories for ports:
numbers….. • The port numbers are divided into three
categories:
Well-known ports
Registered ports
Dynamic ports
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP)
• Address Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet Protocol address (IP address) to
a permanent physical machine address in a local area network (LAN). The physical machine address is also known
as a Media Access Control or MAC address.
• The job of the ARP is essentially to translate 32-bit addresses to 48-bit addresses and vice-versa. This is necessary
because in IP Version 4 (IPv4), the most common level of Internet Protocol (IP) in use today, an IP address is 32-
bits long, but MAC addresses are 48-bits long.
• ARP can also be used for IP over other LAN technologies, such as token ring, fiber distributed data interface
(FDDI) and IP over ATM.
• In IPv6, which uses 128-bit addresses, ARP has been replaced by the Neighbor Discovery protocol.
How ARP works
FTP
FTP existed as one of the original programs for accessing information on the Internet, long before HTTP became popular for accessing web
pages. As such, your PC’s web browser, as well as the Windows Explorer program that displays files on your computer, can be used to access
FTP servers to get or put files from places remote.
1. FTP stands for File Transfer Protocol.
2. The term get is used in FTP to refer to receiving files.
3. The term put is used in FTP to refer to sending files.
4. In the modern context, using FTP in Windows is similar to opening a Windows Explorer window for a remote folder on a network
computer.
5. A computer on the Internet that offers FTP access is said to be an FTP host or FTP server.
6. You’re required to enter a username and password to access an FTP server, just like logging in to your own computer.
7. Various public FTP servers don’t require you to have an account for access. Occasionally, you may have to log in to these servers.
Often, the account name is guest and the password is either please or password. Sometimes, you’re required to give your email address
as the account name and then you can type anything for the password.
8. Webpages are uploaded to the Internet by using FTP. The webpage files are created on your own computer and then sent to the ISP’s
web server by using FTP, either by itself or as part of the webpage creation program.
9. Windows comes with a text-based version of the FTP program, similar to the one originally found on the old Unix computers that
dominated the Internet back in the early days.
What is FTP?
• FTP stands for File Transfer Protocol and, as the name implies, it is a way of transferring files between computers.
It is also one of those wonderful computer terms that’s both a noun and a verb.
• As a noun, FTP is the name for a method of sending files, but also the name of the program that actually sends the
files. Usage example: “Please send the file using FTP.”
• As a verb, FTP means to send or receive files. A proper replacement is the word send or fetch.
• Originally, FTP was developed to send and receive files in the old text-based computers and networks of the pre-
graphical era of computers (before the mid-1980s). You use FTP to access a remote computer on the network
to get or receive files, or to put or send files.
TCP Features
• Connection-oriented • Full duplex
• Byte-stream • Flow control: keep sender from
• app writes bytes overrunning receiver
• TCP sends segments • Congestion control: keep sender from
• app reads bytes overrunning network
• Reliable data transfer
W rite Read
…
…
bytes bytes
TCP TCP
Send buffer Receive buffer
…
Segment Segment Segment
T ransmit segments
Segment Format (cont)
• Each connection identified with 4-tuple:
• (SrcPort, SrcIPAddr, DsrPort, DstPAddr)
• Sliding window + flow control
• acknowledgment, SequenceNum, AdvertisedWinow
Data (SequenceNum)
Sender Receiver
Acknowledgment +
AdvertisedWindow
• Flags
• SYN, FIN, RESET, PUSH, URG, ACK
• Checksum is the same as UDP
• pseudo header + TCP header + data
0 4 10 16 31
SrcPort DstPort
SequenceNum
Acknowledgment
Options (variable)
Data
Connection Termination
Three-way Handshake
SECURE SHELL PROTOCOL(22)
ABOUT:
• Secure shell is a cryptography network
protocol for operating network.
• The standard TCP port for SSH is 22.
• SSH is generally used to access Unix-like
operating system.
• SSH provides a secure channel over an
unsecured network
ADVANTAGES:
•Strong encryption
•Integrity protection
DISADVANTAGES:
•slightly complex to administer
•some delay during authentication
TELNET(23)
SMTP
• SMTP full form is Simple Mail Transfer
Protocol
• It is used for sending emails Most e-mail
systems that send mail over the Internet
use SMTP to send messages from one
server to another
• POP3 and IMAP is responsible for
receiving mails
• It is a text-based protocol it uses text strings
to communicate with other mail servers
Working of SMTP
Mail server communication through SMTP Commands
Continues:
HTTP
What is HTTP (Hypertext Transfer Protocol)?
• The Hypertext Transfer Protocol is an application protocol for distributed,
collaborative, hypermedia information systems that allows users to communicate data
on the World Wide Web.
What is the purpose of HTTP?
• HTTP was invented alongside HTML to create the first interactive, text-based web
browser: the original World Wide Web. Today, the protocol remains one of the
primary means of using the Internet.
How does HTTP work?
As a request-response protocol, HTTP gives users a way to interact with web resources such as HTML
files by transmitting hypertext messages between clients and servers. HTTP clients generally use
Transmission Control Protocol (TCP) connections to communicate with servers.
All HTTP servers use the GET and HEAD methods, but not all support the rest of these request
methods.
What is https?
• HTTPS stands for Hyper Text Transfer Protocol Secure. It is a protocol for securing the communication between two systems e.g. the
browser and the web server.
• The following figure illustrates the difference between communication over http and https:
• Secure Communication: https makes a secure connection by establishing an encrypted link between the browser and the
server or any two systems.
• Data Integrity: https provides data integrity by encrypting the data and so, even if hackers manage to trap the data, they cannot
read or modify it.
• Privacy and Security: https protects the privacy and security of website users by preventing hackers to passively listen to
communication between the browser and the server.
• Faster Performance: https increases the speed of data transfer compared to http by encrypting and reducing the size of the
HTTP •
data.
SEO: Use of https increases SEO ranking. In Google Chrome, Google shows the Not Secure label in the browser if users' data
is collected over http.
VS • Future: https represents the future of the web by making internet safe for users and website owners.
HTTPS
What is DHCP?
Disadvantages of DHCP
• When DHCP server is unavailable, client is unable to access enterprises network
• Your machine name does not change when you get a new IP address
DHCP and IPCONFIG
• IPCONFIG/ALL
FQDN, servers (DNS, WINS), node type, etc
NIC description, MAC address, IP address, gateway, subnet mask
• To handle leases
IP CONFIG/RENEW [adapter]
IP CONFIG/RELEASE [adapter]
if no adapter name is specified, then the IP leases for all adapters bound to TCP/IP
will be released or renewed.
Security problem
• Other Options:
• Use ICMP request message encapsulated into an IP packet with record route option.
• Example: Ping –R machine
• Limited number of IP addresses
• IP header lenght = 4 bits
• Allows 15* 4 bytes (60 – 20 IP header– 3 bytes for option information ) Only 9 IP addresses
• Use ICMP request message encapsulated into IP packet with timestamp option
• More severe limitation
Domain Name Service(53)
What is DNS?
• The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online
through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol
(IP) addresses. DNS translates domain names to IP address so browsers can load Internet resources.
• Each device connected to the Internet has a unique IP address which other machines use to find the
device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in
IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in
IPv6).
How does DNS work?
There are 4 DNS servers involved in loading a webpage:
DNS recursor - The recursor can be thought of as a librarian who is asked to go find a particular book somewhere in a library.
The DNS recursor is a server designed to receive queries from client machines through applications such as web browsers.
Typically the recursor is then responsible for making additional requests in order to satisfy the client’s DNS query.
Root nameserver - The root server is the first step in translating (resolving) human readable host names into IP addresses. It can
be thought of like an index in a library that points to different racks of books - typically it serves as a reference to other more
specific locations.
TLD Nameserver - The top level domain server (TLD) can be thought of as a specific rack of books in a library. This
nameserver is the next step in the search for a specific IP address, and it hosts the last portion of a hostname (In example.com,
the TLD server is “com”).
Authoritative Nameserver - This final nameserver can be thought of as a dictionary on a rack of books, in which a specific
name can be translated into its definition. The authoritative nameserver is the last stop in the nameserver query. If the
authoritative name server has access to the requested record, it will return the IP address for the requested hostname back to the
DNS Recursor (the librarian) that made the initial request.
The DNS Process
Whenever a computer needs to connect to a server (such as the www.yahoo.com web
server) it must look up the server’s IP address using the DNS system.
Each computer on the Internet has a list of the IP address of a local DNS server.
So, when a computer needs to look up an IP address, it asks its local DNS server for it.
Step 1 Root DNS
Yahoo’s DNS
Local DNS
for
S
N P
al D ’s I
s loc .com
k o
as yaho
) PC w.
1 ww
www.yahoo.com
Web Server
PC
Step 1: If the PC does not already have the address for www.yahoo.com in its own DNS cache, it asks
its local DNS server for the IP address information.
Step 2 Root DNS
S
o t DN
s Ro
S a sk
N
o c al D
2) L Yahoo’s DNS
Local DNS
for
S
N P
al D ’s I
s loc .com
k o
as yaho
) PC w.
1 ww
www.yahoo.com
Web Server
PC
Step 2: If the local DNS server does not already have the address for www.yahoo.com in its own DNS
cache, it asks the root DNS servers for the IP address of Yahoo’s DNS server.
Step 3 Root DNS
S
o t DN
s Ro
’s DNS
a sk ho o
l DNS o f Ya
o ca IP
2) L re turns Yahoo’s DNS
Local DNS oot
3) R
for
S
N P
al D ’s I
s loc .com
k o
as yaho
) PC w.
1 ww
www.yahoo.com
Web Server
PC
Step 3: The root DNS server returns the IP address of Yahoo’s DNS server to the local DNS server.
Step 4 Root DNS
S
o t DN
s Ro
’s DNS
a sk ho o
l D NS o f Ya
o ca IP
2) L re turns Yahoo’s DNS
Local DNS oot NS for www’s
IP
3) R ask s Y a h o o ’s D
4) Local DNS
for
S
N P
al D ’s I
s loc .com
k o
as yaho
) PC w.
1 ww
www.yahoo.com
Web Server
PC
Step 4: The local DNS server connects to Yahoo’s DNS server and asks for www.yahoo.com’s IP
address.
Step 5 Root DNS
S
o t DN
s Ro
’s DNS
a sk ho o
l D NS o f Ya
o ca IP
2) L re turns Yahoo’s DNS
Local DNS oot NS for www’s
IP
3) R ask s Y a h o o ’s D
4) Local DNS
for
S
N P
al D ’s I 5) Yahoo’s DNS returns IP info for www.yahoo.com
s loc .com
k o
as yaho
) PC w.
1 ww
www.yahoo.com
Web Server
PC
Step 5: Yahoo’s DNS server returns the IP address information of www.yahoo.com to the local DNS
server.
Step 6 Root DNS
S
o t DN
s Ro
’s DNS
a sk ho o
l D NS o f Ya
o ca IP
2) L re turns Yahoo’s DNS
Local DNS oot NS for www’s
IP
3) R ask s Y a h o o ’s D
4) Local DNS
for
S
N P
al D ’s I 5) Yahoo’s DNS returns IP info for www.yahoo.com
s loc .com IP
s k hoo ns
C
a ya
. r e tur
P w S
1) ww D N PC
l to
o ca www.yahoo.com
L
6) Web Server
PC
Step 6: The local DNS adds www.yahoo.com’s IP address to its cache and then returns the IP address
info to the PC.
Step 7 Root DNS
S
o t DN
s Ro
’s DNS
a sk ho o
l D NS o f Ya
o ca IP
2) L re turns Yahoo’s DNS
Local DNS oot NS for www’s
IP
3) R ask s Y a h o o ’s D
4) Local DNS
for
S
N P
al D ’s I 5) Yahoo’s DNS returns IP info for www.yahoo.com
s loc .com IP
s k hoo ns
C
a ya
. r e tur
P w S
1) ww D N PC
l to
o ca www.yahoo.com
L
6) Web Server
PC 7) PC Connects to www.yahoo.com’s IP
Step 7: The PC adds the IP address info to its local cache and can then connect to www.yahoo.com
using that IP address.
Some DNS records are
• DNS Zones provide us a way to maintain these records on one or more servers.
Primary Zone:
This is the main zone and has a read/write copy of the zone data. All changes to
the zone are made in the primary zone and are replicated to the other zones. It
is master copy of zone data
Secondary Zone:
A secondary Zone is a read-only copy of the primary zone. This zone cannot
process updates and can only retrieve updates from the primary zone. This
zone can answer DNS name resolution queries from client's nodes, this helps
reduce the workload on the primary zone.
Zone Types
• Stub Zone:
Stub zones are like a secondary zone but only stores partial zone data. These
zones are useful to help reduce zone transfers by passing the requests to
authoritative servers. These zones only contain the SOA, NS and A records.
• Forward lookup zone:
forward lookup zone provides hostname to IP address resolution. When you
access a system or website by its hostname such as mcirosoft.com DNS checks
the forward lookup zone for the IP information related to the hostname.
Zone Transfers
• A Zone transfer is where the master DNS servers transfer zone data from the master to
secondary.
• If DNS server is misconfigured, then attacker pretend to be slave and ask the master for a
copy of the zone records and gets list of domain names registered for that particular zone.
Then the attacker gathers information about all domains and try to attack any of the
domain if it is vulnerable.
OPERATING SYSTEM
OPERATING SYSTEM
• Operating System is a software, which makes a computer to actually work.
• It is the software the enables all the programs we use.
• The OS organizes and controls the hardware.
• OS acts as an interface between the application programs and the machine hardware.
• Examples: Windows, Linux, Unix and Mac OS, etc.,
What OS does?
Example: Just like a boss gives order to his employee, in the similar way we request or pass our orders to the Operating System. The main goal of the
Operating System is to thus make the computer environment more convenient to use and the secondary goal is to use the resources in the most
efficient manner.
Kernel in Operating System
• Kernel is central component of an operating system that manages operations of computer and hardware.
It basically manages operations of memory and CPU time. It is core component of an operating system.
Kernel acts as a bridge between applications and data processing performed at hardware level using
inter-process communication and system calls.
Objectives of Kernel :
• To establish communication between user level application
and hardware.
• To decide state of incoming processes.
• To control disk management.
• To control memory management.
• To control task management.
Kernel
Types of Kernel :
• Monolithic-Kernel
• Micro-Kernel
• Hybrid-Kernel
Types of Kernel
1. Monolithic-Kernel
It is one of types of kernel where all operating system services operate in kernel space. It has dependencies between systems
components. It has huge lines of code which is complex.
Example - Unix, Linux, Open VMS, XTS-400 etc.
Advantage
It has good performance.
Disadvantage
It has dependencies between system component and
lines of code in millions.
2. Micro-Kernel
It is kernel types which has minimalist
approach. It has virtual memory and thread
scheduling. It is more stable with less services
in kernel space. It puts rest in user space.
Example - Mach, AmigaOS, Minix, K42 etc.
• Advantage
It is more stable.
• Disadvantage
There are lots of system calls and
context switches.
3.Hybrid-Kernel
It is the combination of both monolithic kernel and microkernel. It has speed and design of
monolithic kernel and modularity and stability of microkernel.
Example -
Windows NT, Netware, BeOS etc.
1. Advantage
It combines both monolithic kernel and microkernel.
2. Disadvantage
It is still similar to monolithic kernel.
BIOS
The data that is installed on a small memory chip on the motherboard is BIOS which
means Basic Input Output System.
The first program to be launched when a computer starts is BIOS.
In this article, we will go through the details like What is BIOS, the function and types
of BIOS, BIOS Acronym, and how it works, its application, and some more details to
understand its importance.
What is the BIOS
(Basic Input
Output System)?
2. Legacy BIOS – Older motherboards have legacy firmware on the BIOS to turn the PC on. Although it governs
how the CPU and the components communicate, like UEFI, Legacy BIOS have other limitations. These can’t
identify drives bigger than 2.1 TB, and their setup programs have text-only menus.
The BIOS is the basic and essential portion of the Motherboard Firmware and is in charge of checking
and booting the hardware attached to the device, thereby passing the computer control to the Operating
system.
Now we can think about imagining a machine without BIOS. The answer is No. A computer cannot
run without BIOS (Basic Input Output System).
What is a File system?
• Any computer file is stored on a storage medium with a given capacity. In
actual fact, each storage is linear space for reading or both reading and
writing digital information. Each byte of information on it has its offset
from the storage start known as an address and is referenced by this
address. A storage can be presented as a grid with a set of numbered
cells (each cell is a single byte). Any file saved to the storage gets its own
cells.
History
• Portable System Group formed November 1988
• Started with five software engineers
• Later became Windows NT
• FAT for NT was written in early 1989
• Supported DOS disk format
• Entirely new code base and programming model
• FASTFAT started in late 1989 (two person effort)
• Other file systems done by the Core NT group were
• HPFS, NTFS, CDFS, NPFS
• FS development was done concurrently with kernel development
• A lot of cooperative design between the file systems, I/O system, Memory Management, and the
Cache manager
Types of file systems
• Examples of disk file systems include FAT, NTFS, HFS, ext2, ISO 9660, ODS-5, and UDF.
• Some disk file systems are also journaling file systems or versioning file systems.
File systems of Windows
• Microsoft Windows employs two major file systems: NTFS, the primary format most modern versions of
this OS use by default, and FAT, which was inherited from old DOS and has exFAT as its later extension.
In addition, the ReFS file system was developed by Microsoft as a new generation file system for server
computers starting from Windows Server 2012.
FAT: File Allocation System
• File Allocation Table (FAT) is a patented file system developed by Microsoft for MS-DOS and is the
primary file system for consumer versions of Microsoft Windows.
The most common implementations have a serious drawback in that when files are deleted and new
files written to the media, their fragments tend to become scattered over the entire media making
reading and writing a slow process.
De-fragmentation is one solution to this, but is often a lengthy process in itself and has to be repeated
regularly to keep the FAT file system clean.
Advantages:
It has 600+ Penetration testing and network security tools pre-installed.
It is completely free and open source. So you can use it for free and even contribute for its development.
It supports many languages.
Great for those who are intermediate in linux and have their hands on Linux commands.
Could be easily used with Rasberry Pi.
Disadvanatges:
It is not recommended for those who are new to linux and want to learn linux.(As it is Penetration Oriented)
It is a bit slower.
Some software may malfunction.
What is Kali Linux used for?
Kali Linux is mainly used for advanced Penetration Testing and Security Auditing. Kali contains several
hundred tools which are geared towards various information security tasks, such as Penetration Testing,
Security research, Computer Forensics and Reverse Engineering.
1. As free as it can get – Kali Linux has been and will always be free to use.
2. More tools than you could think of – Kali Linux comes with over 600 different penetration
testing and security analytics related tool.
3. Open-source – Kali, being a member of the Linux family, follows the widely appreciated open-
source model. Their development tree is publicly viewable on Git and all of the code is available
for your tweaking purposes.
4. Multi-language Support – Although penetration tools tend to be written in English, it has been
ensured that Kali includes true multilingual support, allowing more users to operate in their
native language and locate the tools they need for the job.
5. Completely customizable – The developers at offensive security understand that not everyone
will agree with their design model, so they have made it as easy as possible for the more
adventurous user to customize Kali Linux to their liking, all the way down to the kernel.
System Requirements for Kali Linux- (How much RAM does Kali Linux need?)
Installing Kali is a piece of cake. All you have to make sure is that you have the compatible hardware.
Kali is supported on i386, amd64, and ARM (both ARMEL and ARMHF) platforms. The hardware
requirements are minimal as listed below, although better hardware will naturally provide better
performance.
• Firewall, a term which is supposedly coined by AT&T’s Steven Bellovin, is a metaphor (wall on fire)
indicating that it prevents intruders (like virus, trojans, ransomware, other types of malware and other
such security threats) from breaking into networks and infecting them. Simply put, network
firewall(s) protect your networks against security threats.
Types Of Firewall
1. Packet Filtering Firewall
2. Circuit Level Firewall Or Gateway
3. Stateful Inspection Firewall
4. Application-Level Firewall
Packet-filtering Router
• Packet-filtering Firewall: this is the first firewall created for network security which was basically
responsible for filtering (inspecting) data packets coming into the network based on an established rule-set (or
criteria) – like allowing data from only certain IP addresses, packet types, port numbers etc., – and ignoring those
which don’t match them.
Packet-filtering Router
Simplicity
Advantages: Transparency to users
High speed
• Disadvantages:
• Additional processing overhead on each connection (gateway as splice point)
Circuit Level Firewall
• Circuit-level Gateway: these firewalls operate at the session level – monitoring TCP handshakes –
instead of at the data packets level. Simply put, they ensure the external sessions your network
encounters (or engages with) are legitimate or not.
Stateful Inspection Firewall
• Stateful Inspection Firewall: these network firewalls accomplish both data packet filtering and session
(TCP handshake) filtering. In other words, they do the job of both packet filtering and circuit level
filtering firewalls. This means they monitor all active sessions or connections and thus determine which
network packets should be allowed or disallowed.
Firewall
• Intrusion detection
• The identification through intrusion signatures and report of intrusion activities
• Intrusion prevention
• The process of both detecting intrusion activities and managing automatic
responsive actions throughout the network
IDS vs IPS
IPS Techniques to defend against Attacks
• Intrusion prevention sensors look at header and data portions of the traffic
looking for suspicious traffic that indicate malicious activity.
Not having an IPS system result in attacks going unnoticed. Don’t forget a firewall does the filtering, blocking and
allowing of addresses, ports, service, but also allows some of these through the network as well. However this
means that the access allowed is just let through, and firewalls have no clever way of telling whether that traffic is
legit and normal. This is where the IPS and IDS systems come into play.
So where firewalls block and allow traffic through, IDS/IPS detect and look at that traffic in close detail to see if it
is an attack. IDS/IPS systems are made up of sensors, analysers and GUI’s in order to do their specialised job.
The Job of an IPS\IDS system
• Policy Violations - Rules, protocols and packet designs that are violated. An example
would be an IP packet that are incorrect in length.
• Exploits - Attempts to exploit a vulnerability of a system, application or protocol. An
example would be a buffer overflow attacks.
• Reconnaissance - Is a detection method that is used to gain information about system
or network such as using port scanners to see what ports are open.
• DOS\DDOS - This is when an attack attempts to bring down your system by sending
a vast number of requests to it such as SYN flood attacks.
Conclusion
The key for building a secure network is to define what security means to you. Once it
has been defined, everything it goes on with the network can be evaluated with respect
to that policy. Projects and systems can then be broken down into their components,
and it becomes much simpler to decide whether what is proposed will conflict with
your security policies and practices.
END