SlideShare a Scribd company logo
1 of 25
Network Connecting Devices
UNIT O5
HUB:
Hub in computer network is used for connecting multiple computers or
segments of a LAN. Normally, it is used for Peer to Peer small Home
Network. LAN Hub receive data packets (frames) through one port and
broadcasts them through all other ports, so that all other computers or
other network devices can see all packets.
Operates in half duplex mode
Available in 4 to 24 port sizes. There is no routing table in hub, as We
find in router or switch.
Benefits or advantages of Hubs
Following are the benefits or advantages of Hubs:
➨It can extend total distance of the network.
➨It does not affect performance of the
network seriously.
➨It is cheaper
.
➨It can connect different media types.
Drawbacks or disadvantages of Hubs
Following are the disadvantages of Hubs:
➨It does not have mechanisms such as collision detection
and retransmission of packets.
➨It does not operate in full duplex mode.
Dedicated Bandwidth
Network hubs share all their bandwidth between every connected
Network Size
Hubs are unable to support networks that are as large as switches
because hubs send all traffic to all devices on the network. The more
devices you add, the slower the network gets, eventually becoming
unusable.
Itcan not connect different network architectures such as token ring and
ethernet etc.
Types of Hub
Hubs (Passive andActive)
ACTIVE HUBS
An active hub is actually a multiport repeater. It is
normally used to create connections between
stations in a physical star topology. However,
hubs can also be used to create multiple levels
of hierarchy,. The hierarchical use of hubs
removes the length limitation of 10Base-T (100
m).
Passive Hubs
A passive hub is just a connector
. Itconnects the wires
coming from diferent branches. Ina star topology Ethernet
LAN, a passive hub is just a point where the signals coming
from different stations collide; the hub is the collision point.
This type of a hub is part of the media; its location in the
Internet model is below the physical layer
.
Repeaters
A repeater is a device that operates only in the physical
layer. Signals that carry information within a network can
travel a fixed distance before attenuation endangers the
integrity of the data. A repeater receives a signal and,
before it becomes too weak or corrupted, regenerates the
original bit pattern. The repeater then sends the refreshed
signal. A repeater can extend the physical length of a LAN,
Routers
A router is a three-layer device that routes packets based on
their logical addresses (host-to host addressing).
A router normally connects LANs and WANs in the Internet and
has a routing table that is used for making decisions about the
route. The routing tables are normally dynamic and are
updated using routing protocols.
The primary function of a router is to
connect networks together and keep certain kinds of broadcast
traffic under control. There are several companies that make
routers: Cisco, Linksys, Juniper, Netgear, Nortel (BayNetworks),
Redback, Lucent, 3Com, HP, Dlink.
FUNCTIONS OF A ROUTER
Restrict broadcasts to the LAN
Act as the default gateway.
Perform Protocol Translation (Wired Ethernet to
Wireless/WiFi, or Ethernet to CATV)
Move (route) data between networks
Learn and advertise loop free paths
Calculate 'best paths' to reach network destinations.
Routers can only learn and advertise routes
dynamically if they are using a routing protocol such
as RIP
,OSPF
, EIGRP
, IS-IS or BGP
. Otherwise, a
human has to configure the routes by hand, which is
called static routing.
Routing moves data on a hop-by-hop basis, what is
often called 'hot potato' routing. If a set of routers
ends up passing the data around in a circle, without
reaching the destination, it's calleda a 'routing loop'.
Gateway:
A gateway is a network node that connects two
networks using different protocols together. While
a bridge is used to join two similar types of
networks, a gateway is used to join two dissimilar
networks.
The most common gateway is a router that connects
a home or enterprise network to the internet. In
most IP-based networks, the only traffic that doesn't
go through at least one gateway is traffic flowing
among nodes on the same local area network (LAN)
segment -- for example, computers connected to the
same switch.
Gateways can take several forms and perform a
variety of tasks. These include:
Web application firewall - filters traffic to and from
a web server and look at application-layer data.
API, SOA or XML gateway - manages traffic
flowing into and out of a service, microservices-
oriented
architecture or an XML-based web service.
Network Security Devices
Assurance of network security is one of the most important moments for safe
and correct working of the computer systems and networks. The network
security includes assurance of the limited access to sensitive information, the
protection from unauthorized access, risks and potential security threats, and
enhancement of network performance.
There are few types of network securitydevices:
active devices - firewalls, antivirus scanning devices, content filtering devices,
which block the surplus traffic;
passive devices, such as intrusion detection appliances, which identify and
report on unwanted traffic;
preventative devices - penetration testing devices and vulnerability
assessment appliances, which scan the networks and identify potential
security problems;
Unified Threat Management (UTM) devices, such as firewalls, content
filtering, web caching, which serve as all-in-one security devices.
Network Security Devices(firewall)
A firewall is a network security system designed to prevent
unauthorized access to or from a private network. Firewalls can
be implemented as both hardware and software, or a
combination of both.
Its primary objective is to control the incoming and outgoing
network traffic by analyzing the data packets and determining
whether it should be allowed through or not, based on a
predetermined rule set.
All messages entering or leaving the intranet pass through the
firewall, which examines each message and blocks those that do
not meet the specified security criteria.
Firewall Filtering Techniques
There are several types of firewall techniques that will prevent potentially harmful information
from getting through:
Packet Filter: Looks at each packet entering or leaving the network and accepts or
rejects it based on user-defined rules. Packet filtering is fairly effective and transparent
to users, but it is difficult to configure. Inaddition, it is susceptible to IPspoofing.
Application Gateway: Applies security mechanisms to specific applications, such
as FTP and Telnet servers. This is very effective, but can impose a performance
degradation.
Circuit-level Gateway: Applies security mechanisms when a TCP or UDP connection is
established. Once the connection has been made, packets can flow between the hosts
without further checking.
Proxy Server: Intercepts all messages entering and leaving the network. The proxy
server effectively hides the true network addresses.
Stateful Multilayer Inspection Firewall
Stateful multilayer Inspection Firewall is a combination of all the firewalls that
mentioned above.
They can Filter packets at Network layer using ACLs, check for legitimate
sessions on the Session Layers and they also evaluate packets on the
Application layer (ALG).
Stateful Multilayer Inspection Firewall can work on a Transparent mode
allowing direct connections between the client and the server which was
earlier not possible.
Next Generation Firewall (NGFW)
Firewalls called nextgeneration firewalls (NGFW), work by filtering network and
Internet traffic based upon the applications or traffic types using specific ports.
Next Generation Firewalls (NGFWs) blend the features of a standard firewall with
quality of service (QoS) functionalities in order to provide smarter and deeper
inspection.
How does a firewall work?
There are two access denial methodologies used
by firewalls. A firewall may allow all traffic
through unless it meets certain criteria, or it may
deny all traffic unless it meets certain criteria
(see figure 3).The type of criteria used to
determine whether traffic should be allowed
through varies from one type of firewall to
another.
on wh ich netw ork layer it op erates at. A
f re w all deter mi nes wh at traff ic to let throu gh depe
discuss ion on netwo rk lay rs and arc hitecture follows.
Figure 3: Ba sic Fire w all Op era tion.
Types of Firew al l
VPN
A VPN is a virtual private network, which is a dedicated and encrypted
connection between the host computer to a secure server. A VPN
connects your personal computer to the proxy server within your
organisation. Effectively, everything you do online, if connected through
a VPN, will send the encrypted request to a proxy server. The proxy will
then send the request to the internet and send the encrypted response
back to you.
IDS/IPS
Intrusion detection systems (IDS) and intrusion prevention
systems (IPS)are reporting tools that identify and protect
networks from intrusion.
IDS and IPSare network monitors. They analyse all network
traffic based on a set of rules defined by the administrator.
The main difference between IDS and IPSis that IDS just flags
the administrator whenever a problem is detected whereas an
IPSwill attempt to prevent the intrusion once it’s identified.

More Related Content

Similar to PT.pptx (20)

Network devices
Network devicesNetwork devices
Network devices
 
Networks
Networks   Networks
Networks
 
Network devices
Network devicesNetwork devices
Network devices
 
Network_Devices.pdf
Network_Devices.pdfNetwork_Devices.pdf
Network_Devices.pdf
 
Firewall
FirewallFirewall
Firewall
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall
FirewallFirewall
Firewall
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Firewalls
FirewallsFirewalls
Firewalls
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

More from FranzLawrenzDeTorres1

More from FranzLawrenzDeTorres1 (20)

enterprisearchitectureppt-181203183218.pdf
enterprisearchitectureppt-181203183218.pdfenterprisearchitectureppt-181203183218.pdf
enterprisearchitectureppt-181203183218.pdf
 
finaldemo-ict10-180801142047.pdf
finaldemo-ict10-180801142047.pdffinaldemo-ict10-180801142047.pdf
finaldemo-ict10-180801142047.pdf
 
functionsandformulas-131221213835-phpapp01.pdf
functionsandformulas-131221213835-phpapp01.pdffunctionsandformulas-131221213835-phpapp01.pdf
functionsandformulas-131221213835-phpapp01.pdf
 
ER-and-EE-Lesson-1.pdf
ER-and-EE-Lesson-1.pdfER-and-EE-Lesson-1.pdf
ER-and-EE-Lesson-1.pdf
 
JDVP-Parents-Orientation.pptx
JDVP-Parents-Orientation.pptxJDVP-Parents-Orientation.pptx
JDVP-Parents-Orientation.pptx
 
Evolution of System.pptx
Evolution of System.pptxEvolution of System.pptx
Evolution of System.pptx
 
ICTConcepts.ppt
ICTConcepts.pptICTConcepts.ppt
ICTConcepts.ppt
 
animated-meeting-agenda-toolbox.pptx
animated-meeting-agenda-toolbox.pptxanimated-meeting-agenda-toolbox.pptx
animated-meeting-agenda-toolbox.pptx
 
SIA LESSON.pptx
SIA LESSON.pptxSIA LESSON.pptx
SIA LESSON.pptx
 
LESSON_8_1_NETWORK_CABLE.pptx
LESSON_8_1_NETWORK_CABLE.pptxLESSON_8_1_NETWORK_CABLE.pptx
LESSON_8_1_NETWORK_CABLE.pptx
 
English-10.pptx
English-10.pptxEnglish-10.pptx
English-10.pptx
 
personal-relationships11.ppsx
personal-relationships11.ppsxpersonal-relationships11.ppsx
personal-relationships11.ppsx
 
Ch02.ppt
Ch02.pptCh02.ppt
Ch02.ppt
 
chapter01-160621234231.pptx
chapter01-160621234231.pptxchapter01-160621234231.pptx
chapter01-160621234231.pptx
 
bahagingfeasib-180917140000.pptx
bahagingfeasib-180917140000.pptxbahagingfeasib-180917140000.pptx
bahagingfeasib-180917140000.pptx
 
THE CONDOM.pptx
THE CONDOM.pptxTHE CONDOM.pptx
THE CONDOM.pptx
 
INTRODUCTION TO MANAGEMENT SCIENCE.pptx
INTRODUCTION TO MANAGEMENT SCIENCE.pptxINTRODUCTION TO MANAGEMENT SCIENCE.pptx
INTRODUCTION TO MANAGEMENT SCIENCE.pptx
 
trisha pangit.pptx
trisha pangit.pptxtrisha pangit.pptx
trisha pangit.pptx
 
CSS.pptx
CSS.pptxCSS.pptx
CSS.pptx
 
bahagingpananalita-171106104815.pptx
bahagingpananalita-171106104815.pptxbahagingpananalita-171106104815.pptx
bahagingpananalita-171106104815.pptx
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

PT.pptx

  • 2.
  • 3. HUB: Hub in computer network is used for connecting multiple computers or segments of a LAN. Normally, it is used for Peer to Peer small Home Network. LAN Hub receive data packets (frames) through one port and broadcasts them through all other ports, so that all other computers or other network devices can see all packets. Operates in half duplex mode Available in 4 to 24 port sizes. There is no routing table in hub, as We find in router or switch.
  • 4.
  • 5. Benefits or advantages of Hubs Following are the benefits or advantages of Hubs: ➨It can extend total distance of the network. ➨It does not affect performance of the network seriously. ➨It is cheaper . ➨It can connect different media types.
  • 6. Drawbacks or disadvantages of Hubs Following are the disadvantages of Hubs: ➨It does not have mechanisms such as collision detection and retransmission of packets. ➨It does not operate in full duplex mode. Dedicated Bandwidth Network hubs share all their bandwidth between every connected Network Size Hubs are unable to support networks that are as large as switches because hubs send all traffic to all devices on the network. The more devices you add, the slower the network gets, eventually becoming unusable. Itcan not connect different network architectures such as token ring and ethernet etc.
  • 7. Types of Hub Hubs (Passive andActive) ACTIVE HUBS An active hub is actually a multiport repeater. It is normally used to create connections between stations in a physical star topology. However, hubs can also be used to create multiple levels of hierarchy,. The hierarchical use of hubs removes the length limitation of 10Base-T (100 m).
  • 8. Passive Hubs A passive hub is just a connector . Itconnects the wires coming from diferent branches. Ina star topology Ethernet LAN, a passive hub is just a point where the signals coming from different stations collide; the hub is the collision point. This type of a hub is part of the media; its location in the Internet model is below the physical layer .
  • 9. Repeaters A repeater is a device that operates only in the physical layer. Signals that carry information within a network can travel a fixed distance before attenuation endangers the integrity of the data. A repeater receives a signal and, before it becomes too weak or corrupted, regenerates the original bit pattern. The repeater then sends the refreshed signal. A repeater can extend the physical length of a LAN,
  • 10. Routers A router is a three-layer device that routes packets based on their logical addresses (host-to host addressing). A router normally connects LANs and WANs in the Internet and has a routing table that is used for making decisions about the route. The routing tables are normally dynamic and are updated using routing protocols. The primary function of a router is to connect networks together and keep certain kinds of broadcast traffic under control. There are several companies that make routers: Cisco, Linksys, Juniper, Netgear, Nortel (BayNetworks), Redback, Lucent, 3Com, HP, Dlink.
  • 11.
  • 12.
  • 13. FUNCTIONS OF A ROUTER Restrict broadcasts to the LAN Act as the default gateway. Perform Protocol Translation (Wired Ethernet to Wireless/WiFi, or Ethernet to CATV) Move (route) data between networks Learn and advertise loop free paths Calculate 'best paths' to reach network destinations.
  • 14. Routers can only learn and advertise routes dynamically if they are using a routing protocol such as RIP ,OSPF , EIGRP , IS-IS or BGP . Otherwise, a human has to configure the routes by hand, which is called static routing. Routing moves data on a hop-by-hop basis, what is often called 'hot potato' routing. If a set of routers ends up passing the data around in a circle, without reaching the destination, it's calleda a 'routing loop'.
  • 15. Gateway: A gateway is a network node that connects two networks using different protocols together. While a bridge is used to join two similar types of networks, a gateway is used to join two dissimilar networks. The most common gateway is a router that connects a home or enterprise network to the internet. In most IP-based networks, the only traffic that doesn't go through at least one gateway is traffic flowing among nodes on the same local area network (LAN) segment -- for example, computers connected to the same switch.
  • 16. Gateways can take several forms and perform a variety of tasks. These include: Web application firewall - filters traffic to and from a web server and look at application-layer data. API, SOA or XML gateway - manages traffic flowing into and out of a service, microservices- oriented architecture or an XML-based web service.
  • 17. Network Security Devices Assurance of network security is one of the most important moments for safe and correct working of the computer systems and networks. The network security includes assurance of the limited access to sensitive information, the protection from unauthorized access, risks and potential security threats, and enhancement of network performance. There are few types of network securitydevices: active devices - firewalls, antivirus scanning devices, content filtering devices, which block the surplus traffic; passive devices, such as intrusion detection appliances, which identify and report on unwanted traffic; preventative devices - penetration testing devices and vulnerability assessment appliances, which scan the networks and identify potential security problems; Unified Threat Management (UTM) devices, such as firewalls, content filtering, web caching, which serve as all-in-one security devices.
  • 18. Network Security Devices(firewall) A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented as both hardware and software, or a combination of both. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  • 19.
  • 20. Firewall Filtering Techniques There are several types of firewall techniques that will prevent potentially harmful information from getting through: Packet Filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. Inaddition, it is susceptible to IPspoofing. Application Gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Circuit-level Gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. Proxy Server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
  • 21. Stateful Multilayer Inspection Firewall Stateful multilayer Inspection Firewall is a combination of all the firewalls that mentioned above. They can Filter packets at Network layer using ACLs, check for legitimate sessions on the Session Layers and they also evaluate packets on the Application layer (ALG). Stateful Multilayer Inspection Firewall can work on a Transparent mode allowing direct connections between the client and the server which was earlier not possible. Next Generation Firewall (NGFW) Firewalls called nextgeneration firewalls (NGFW), work by filtering network and Internet traffic based upon the applications or traffic types using specific ports. Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of service (QoS) functionalities in order to provide smarter and deeper inspection.
  • 22. How does a firewall work? There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria (see figure 3).The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another.
  • 23. on wh ich netw ork layer it op erates at. A f re w all deter mi nes wh at traff ic to let throu gh depe discuss ion on netwo rk lay rs and arc hitecture follows. Figure 3: Ba sic Fire w all Op era tion. Types of Firew al l
  • 24. VPN A VPN is a virtual private network, which is a dedicated and encrypted connection between the host computer to a secure server. A VPN connects your personal computer to the proxy server within your organisation. Effectively, everything you do online, if connected through a VPN, will send the encrypted request to a proxy server. The proxy will then send the request to the internet and send the encrypted response back to you.
  • 25. IDS/IPS Intrusion detection systems (IDS) and intrusion prevention systems (IPS)are reporting tools that identify and protect networks from intrusion. IDS and IPSare network monitors. They analyse all network traffic based on a set of rules defined by the administrator. The main difference between IDS and IPSis that IDS just flags the administrator whenever a problem is detected whereas an IPSwill attempt to prevent the intrusion once it’s identified.