SlideShare a Scribd company logo
Opening Quote
In the new economy, bandwidth replaces
computer power as the driving force of
technological advance. The telecosmic
vision of nearly infinite wave-borne
bandwidth does for communications that
Moore’s law did for computing: defines
the direction of technological advance, the
vectors of growth, the sweet spots of
finance.
George Gilder (author of Microcosm and
Telecosm)
CSSS 5110 Textbook
CSSS 5110 2
Chapter 1: Computer Network
Fundamentals
Guide to Computer Network Security
Why Networks are Important
• By 2016, Cisco estimates that over 3,000
Petabytes of information will be transferred
over the Internet DAILY!
• Netflix accounts for around 1/3 of primetime
downstream traffic
• During the holiday 2013 season, Amazon sold
an average of 426 items per SECOND!
• As of 2012, every day on Facebook there are:
• 2.7 Billion Likes
• 300 Million Photos uploaded
• >500 Terabytes of data transmitted
Computer communication networks
A Computer network is a distributed system
consisting of loosely coupled computers and
other devices.
To form a network, there are communicating
rules or protocols each device in the network
must follow to communicate with another.
Kizza - Guide to Computer Network
Security
5
Ethernet
Laptop computer
Laptop computer Workstation
Laser printer
IBM Compatible
Internetworking technology enables multiple,
diverse underlying hardware technologies, and
different software regimes to interconnect
heterogeneous networks and bring them to
communicate smoothly
The network elements (computing elements),
network software (operating systems and
browsers), and users all work together
exchanging information and utilizing the
resources in the network
The network elements may be of diverse
technologies and software may be as different as
possible but the whole combo works in unison.
Kizza - Guide to Computer Network
Security
6
Computer communication networks
Networks
Local Area Network (LAN)
Wide Area Network (WAN)
– Circuit Switched
– Packet Switched
– Frame Relay
– Asynchronous Transfer Mode (ATM)
Wireless Network
Metropolitan Area Network (MAN)
PAN ???
A
Networking
Configuration
Figure 1.7 A Networking Configuration
Internet
Router
Router
Ethernet
switch
Information
server
Firewall
host
High-speed link
(e.g., SONET)
LAN PCs
and workstations
Private
WAN
ATM
Network
ATM
switch
High-speed
link
Subscriber
connection
Residential
user Internet service
provider (ISP)
Data Communication Media
Technology
Data movement in computer networks
is either analog or digital
– In analog format data is sent as a
continuous electromagnetic wave with a
constant frequency signal called a carrier.
– The carrier signal has three characteristics:
Amplitude modulation – each bit is represented
by a different amplitude of the carrier wave.
Frequency modulation – each bit is represented
by a different frequency of the carrier wave
Phase shift modulation – shifts in the wave
encode binary information.
– In digital encoding binary data is
represented as electrical voltage.
Kizza - Guide to Computer Network
Security
9
Transmission Media
Medium – The matter or substance over
which data travels
The quality, dependability, and overall
performance of a computer network
depends on the transmission medium
Kizza - Guide to Computer Network
Security
10
Transmission Media – Physical
Physical media fall into the following
types:
Copper wire – insulated copper wires.
Traditionally used because copper has
low resistance to electrical currents.
Twisted pair – a pair of wires of insulated
copper wires each wrapped around the
other.
Coaxial cables – insulated dual conductor
cables with inner conductor in the core.
Optical fiber – small medium made of
glass and plastics and conducts optical
rays. Kizza - Guide to Computer Network
Security
11
Media
Physical matter used to carry voice or data
transmissions
Guided media – transmission flows along
physical medium
Wireless (radiated) media – transmission
flows through the air
Guided Media
Twisted-pair (TP) cable
– Insulated pairs of wires bundled together
– Wires twisted to reduce electromagnetic
interference
– Some times use additional shielding (STP)
– Commonly used for telephones, LANs
– Characteristics
Price – inexpensive
Distance – typically up to 100m
Use – Telephones, LANs
Guided Media
Coaxial cable
– Has a single copper core, plus
outer insulation, shielding,
and inner insulation
– Less prone to interference
– Characteristics
Price - inexpensive (but more
costly than TP)
Distance - up to 2 km (1.2
miles)
Use: Cable TV / Internet
Guided Media
Fiber optic cable
– Optical core made of glass
or plastic
– Data transmitted using light
from lasers or LEDs
– Resistant to interference
and corrosion
– Extremely fast data rates
– Characteristics
Price: Expensive
Distance: 500m – 100km
Use: Trunk line / Backbone,
long distance circuits (e.g.,
undersea cables)
Guided Media
Fiber optics
– Multimode (about 50 micron core)
– Graded index multimode
– Single mode (about 5 micron core)
Wireless Media
Radio
– Wireless transmission of electrical waves
through air
– Each device on network has a radio transceiver
operating at a specific frequency range
– Enables mobile network communication
– Characteristics
Distance: depends on frequency and power
Use: Wireless LANs, cellular and cordless phones,
baby monitors
Wireless Media
• Microwave
• High-frequency radio
communication
• Requires line of sight which
may require large antennas
and towers
• Affected by weather
• Characteristics
• Distance: ~60 km (due to
curvature of earth
• Use: Trunk line / Backbone,
long distance
• Satellite
• Special form of microwave
communication
• Long distance leads to
propagation delays
Media
Factors to consider in media selection
– Type of network
– Cost
– Transmission distance
– Security
– Error rates
– Transmission speeds
Wireless Networks
– Wireless networks fall one of the following three
categories depending on distance as follows:
Restricted proximity network: this network
involves LANs with a mixture of fixed and wireless
devices.
Intermediate/Extended network: this
wireless network is made up of two fixed LANS
component joined together by a wireless
component. The bridge may be connecting LANs
in two nearby buildings or even further.
Mobile network: This is a fully wireless network
connecting two network elements. One of these
elements is usually a mobile unit which connects
to the home network (fixed) using cellular or
satellite technology.
Kizza - Guide to Computer Network
Security
20
– The three types of wireless communication are
connected using the following basic technologies:
Infrared – uses pulses of infrared light to carry
coded instructions to the receiving network
element
High-Frequency Radio – using electromagnetic
radio waves or radio frequencies (RF
transmission)
Microwave – This is a higher frequency version
of radio communication. It is capable of being
focused in a single direction
Others include laser waves
Kizza - Guide to Computer Network
Security
21
Wireless Networks
Network Topologies
Computer networks, whether LANs, MANs, or
WANs are constructed based on a topology.
There are several topologies including:
– Mesh – allows multiple access links to a
network element
– Tree – except the root, every element in the
network can only be accessed through its
predecessors
– Bus – all elements are on a shared line
– Star – communication between any two
elements in the network must go through
central node
– Ring – each element in network is directly
connected to two neighbors forming a ring
Kizza - Guide to Computer Network
Security
22
Network Connectivity and Protocols
These are operational
modalities/procedures for moving
packets between network transmitting
elements
There are two widely used of protocol
suites:
– OSI – Open Systems Interconnection of the
International Organization for
Standardization (ISO)
– TCP/IP – most widely used
Both of these proposed suites are
based on layered stacks of services
Kizza - Guide to Computer Network
Security
23
Comparison of Network Models
Network Model - Layers
Layer Purpose Example Protocols /
Standards
PDU
5. Application User’s access to network, software to
perform work
Packet (or Data)
4. Transport TCP, UDP Segment
3. Network Deciding where the message goes
1. Addressing
2. Routing
IP, ICMP Packet
2. Data Link Move a message from one device to the next
1. Controls hardware
2. Formats the message
3. Error checking
Ethernet Frame
1. Physical Transmits the message 100BASE-T, 802.11ac
HTTP, SMTP, DNS, FTP,
DHCP, IMAP, POP, SSL
End-to-End Management
1. Link application layer to network
2. Segmenting and tracking
3. Flow control
Copyright 2011John Wiley & Sons, Inc. 1 - 26
Message Transmission Using
Layers
Protocols
Used by network model layers
Sets of standardized rules to define how to
communicate at each layer and how to
interface with adjacent layers
receiver
sender
Layer N
Layer N-1
Layer N+1
Layer N
Layer N-1
Layer N+1
1 - 28
Message Transmission Example
Network Models
• Layers allow simplicity of networking in some ways
• Easy to develop new software that fits each layer
• Relatively simple to change the software at any level
• Matching layers communicate between different computers
and computer platforms
• Accomplished by standards that we all agree on; e.g., physical
layer at the sending computer must match up with the same layer
in the receiving computer
• Advantages of Layers
• Networking functionality is modular and the software/hardware at
any layer can be more easily substituted; e.g., substitute wired
for wireless at the physical layer
• Easier to troubleshoot or make changes to one layer at a time
• Application developers only need to worry about the application
layer in their programs
• Disadvantages of Layers
• Inefficient because the encapsulation/de-encapsulation at each
layer requires processing
• Inefficient because encapsulation in a PDU increases overhead at
each layer
Network Services
Networks work effectively when
network services move data in the
network. These services fall into two
categories:
– Connection services to facilitate the
exchange of data between the two network
communicating end-systems with as little
data loss as possible and in as little time as
possible.
– Switching services to facilitate the
movement of data from host to host across
the length and width of the network mesh
of hosts, hubs, bridges, routers and
gateways
Kizza - Guide to Computer Network
Security
30
• Two connection services are provided by most
digital networks:
• Connected-oriented services – offer prior
connection controls in a form of three-way
handshake
• Connectionless service – no handshake is needed
no prior information and no warnings
• Two switching services are provided:
• Circuit switching – The network must reserve all
resources needed for the communication session
before any communication begins. Example:
telecommunications sessions.
• Packet switching networks are referred to as Packet
networks. There are two types of these networks
• Virtual circuit networks – logical connection is
needed before a packet is sent
• Datagram and networks
Kizza - Guide to Computer Network
Security
31
Network Services
Network Connecting Devices
The computing elements in a network
(LAN, WAN) are interconnected using
connecting devices commonly referred
to as nodes
There are several types:
– Hub – the simplest connecting devices. It
takes in inputs and retransmits them
verbatim
– Bridge – it is similar to the hub, however,
bridges filter incoming data packets for
addresses before the packets/frames are
re-transmitted
Kizza - Guide to Computer Network
Security
32
– Switch – a newer version of a bridge with high
a performance capacity and can accommodate
higher numbers of interfaces
– Router – general-purpose nodes that
interconnect two or more heterogeneous
networks; dedicated special purpose
computers with their own Address Resolution
Protocol (ARP) and IP addresses
– Gateway – this is a more versatile device that
can provide translation of and between
networking technologies such as OSI and
TCP/IP
Gateways can connect two or more autonomous
networks
They perform all functions of a router and more
Kizza - Guide to Computer Network
Security
33
Network Connecting Devices
Network Technologies
• Network technologies in each network
category.
• LAN Technologies
• Star-based Ethernet (IEEE 802.3) LAN
• Wireless (IEEE 802.11ac)
Kizza - Guide to Computer Network
Security
34
– WAN Technologies:
Integrated Services Digital Network (ISDN)
X.25
Other WAN Technologies
– Frame Relay is a packet-switched network with the ability to
multiplex many logical data conversions over a single connection. It
provides flexible efficient channel bandwidth using digital and fiber
optics transmission. It has many similar characteristics to X.25
network except in format and functionality.
– Point-to-point Protocol (PPP) is the Internet Standard for
transmission of IP packets over serial lines. The point-to-point link
provides a single, pre-established communications path from the
ending element through a carrier network, such as a telephone
company, to a remote network. These links can carry datagram or
data-stream transmissions.
– xDirect Service Line (xDSL) is a technology that provides an
inexpensive, yet very fast connection to the Internet.
– Switched Multi-megabit Data Service (SMDS) is a connectionless
service operating in the range of 1.5-100Mbps; any SMDS station
can send a frame to any other station on the same network.
– Asynchronous Transfer Mode (ATM) – Quality of Service.
Kizza - Guide to Computer Network
Security
35
Network Technologies

More Related Content

Similar to Computer NW Security - Kizza - ch01 (1).ppt

Stoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationStoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission Presentation
Jennifer Stoe
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
AbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
AbyThomas54
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
Palanivel Kuppusamy
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
Gunjan Mathur
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
Md Irfan Ansari
 
Networking and telecommunication.pptx
Networking and telecommunication.pptxNetworking and telecommunication.pptx
Networking and telecommunication.pptx
sanskritisubedi2007
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
Besar Limani
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
jashhad
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
Faraz Faqeer
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
prapti borthakur
 
Communication technology
Communication technologyCommunication technology
Communication technology
Abhishek Curtis
 
Computer networks
Computer networksComputer networks
Computer networks
Tej Kiran
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
suthi
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
Sithu PM
 
Networking fundamentals (1)
Networking fundamentals (1)Networking fundamentals (1)
Networking fundamentals (1)
Dhivya Gurumoorthy
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
Tariq Emad
 

Similar to Computer NW Security - Kizza - ch01 (1).ppt (20)

Stoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationStoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission Presentation
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
Networking and telecommunication.pptx
Networking and telecommunication.pptxNetworking and telecommunication.pptx
Networking and telecommunication.pptx
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Computer networks
Computer networksComputer networks
Computer networks
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
 
Networking fundamentals (1)
Networking fundamentals (1)Networking fundamentals (1)
Networking fundamentals (1)
 
Network ppt
Network pptNetwork ppt
Network ppt
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 

Recently uploaded

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
uevausa
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
Senior Software Profiles Backend Sample - Sheet1.pdf
Senior Software Profiles  Backend Sample - Sheet1.pdfSenior Software Profiles  Backend Sample - Sheet1.pdf
Senior Software Profiles Backend Sample - Sheet1.pdf
Vineet
 
Bangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts ServiceBangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts Service
nhero3888
 
Essential Skills for Family Assessment - Marital and Family Therapy and Couns...
Essential Skills for Family Assessment - Marital and Family Therapy and Couns...Essential Skills for Family Assessment - Marital and Family Therapy and Couns...
Essential Skills for Family Assessment - Marital and Family Therapy and Couns...
PsychoTech Services
 
Health care analysis using sentimental analysis
Health care analysis using sentimental analysisHealth care analysis using sentimental analysis
Health care analysis using sentimental analysis
krishnasrigannavarap
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
High Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENT
High Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENTHigh Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENT
High Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENT
ranjeet3341
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
zsafxbf
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
nyvan3
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
Drownings spike from May to August in children
Drownings spike from May to August in childrenDrownings spike from May to August in children
Drownings spike from May to August in children
Bisnar Chase Personal Injury Attorneys
 
Salesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - CanariasSalesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - Canarias
davidpietrzykowski1
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
Vineet
 
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
actyx
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
9gr6pty
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
TeukuEriSyahputra
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
aguty
 
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
nitachopra
 

Recently uploaded (20)

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
Senior Software Profiles Backend Sample - Sheet1.pdf
Senior Software Profiles  Backend Sample - Sheet1.pdfSenior Software Profiles  Backend Sample - Sheet1.pdf
Senior Software Profiles Backend Sample - Sheet1.pdf
 
Bangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts ServiceBangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts Service
 
Essential Skills for Family Assessment - Marital and Family Therapy and Couns...
Essential Skills for Family Assessment - Marital and Family Therapy and Couns...Essential Skills for Family Assessment - Marital and Family Therapy and Couns...
Essential Skills for Family Assessment - Marital and Family Therapy and Couns...
 
Health care analysis using sentimental analysis
Health care analysis using sentimental analysisHealth care analysis using sentimental analysis
Health care analysis using sentimental analysis
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
High Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENT
High Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENTHigh Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENT
High Profile Call Girls Navi Mumbai ✅ 9833363713 FULL CASH PAYMENT
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
Drownings spike from May to August in children
Drownings spike from May to August in childrenDrownings spike from May to August in children
Drownings spike from May to August in children
 
Salesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - CanariasSalesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - Canarias
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
 
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
 
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
 

Computer NW Security - Kizza - ch01 (1).ppt

  • 1. Opening Quote In the new economy, bandwidth replaces computer power as the driving force of technological advance. The telecosmic vision of nearly infinite wave-borne bandwidth does for communications that Moore’s law did for computing: defines the direction of technological advance, the vectors of growth, the sweet spots of finance. George Gilder (author of Microcosm and Telecosm)
  • 3. Chapter 1: Computer Network Fundamentals Guide to Computer Network Security
  • 4. Why Networks are Important • By 2016, Cisco estimates that over 3,000 Petabytes of information will be transferred over the Internet DAILY! • Netflix accounts for around 1/3 of primetime downstream traffic • During the holiday 2013 season, Amazon sold an average of 426 items per SECOND! • As of 2012, every day on Facebook there are: • 2.7 Billion Likes • 300 Million Photos uploaded • >500 Terabytes of data transmitted
  • 5. Computer communication networks A Computer network is a distributed system consisting of loosely coupled computers and other devices. To form a network, there are communicating rules or protocols each device in the network must follow to communicate with another. Kizza - Guide to Computer Network Security 5 Ethernet Laptop computer Laptop computer Workstation Laser printer IBM Compatible
  • 6. Internetworking technology enables multiple, diverse underlying hardware technologies, and different software regimes to interconnect heterogeneous networks and bring them to communicate smoothly The network elements (computing elements), network software (operating systems and browsers), and users all work together exchanging information and utilizing the resources in the network The network elements may be of diverse technologies and software may be as different as possible but the whole combo works in unison. Kizza - Guide to Computer Network Security 6 Computer communication networks
  • 7. Networks Local Area Network (LAN) Wide Area Network (WAN) – Circuit Switched – Packet Switched – Frame Relay – Asynchronous Transfer Mode (ATM) Wireless Network Metropolitan Area Network (MAN) PAN ???
  • 8. A Networking Configuration Figure 1.7 A Networking Configuration Internet Router Router Ethernet switch Information server Firewall host High-speed link (e.g., SONET) LAN PCs and workstations Private WAN ATM Network ATM switch High-speed link Subscriber connection Residential user Internet service provider (ISP)
  • 9. Data Communication Media Technology Data movement in computer networks is either analog or digital – In analog format data is sent as a continuous electromagnetic wave with a constant frequency signal called a carrier. – The carrier signal has three characteristics: Amplitude modulation – each bit is represented by a different amplitude of the carrier wave. Frequency modulation – each bit is represented by a different frequency of the carrier wave Phase shift modulation – shifts in the wave encode binary information. – In digital encoding binary data is represented as electrical voltage. Kizza - Guide to Computer Network Security 9
  • 10. Transmission Media Medium – The matter or substance over which data travels The quality, dependability, and overall performance of a computer network depends on the transmission medium Kizza - Guide to Computer Network Security 10
  • 11. Transmission Media – Physical Physical media fall into the following types: Copper wire – insulated copper wires. Traditionally used because copper has low resistance to electrical currents. Twisted pair – a pair of wires of insulated copper wires each wrapped around the other. Coaxial cables – insulated dual conductor cables with inner conductor in the core. Optical fiber – small medium made of glass and plastics and conducts optical rays. Kizza - Guide to Computer Network Security 11
  • 12. Media Physical matter used to carry voice or data transmissions Guided media – transmission flows along physical medium Wireless (radiated) media – transmission flows through the air
  • 13. Guided Media Twisted-pair (TP) cable – Insulated pairs of wires bundled together – Wires twisted to reduce electromagnetic interference – Some times use additional shielding (STP) – Commonly used for telephones, LANs – Characteristics Price – inexpensive Distance – typically up to 100m Use – Telephones, LANs
  • 14. Guided Media Coaxial cable – Has a single copper core, plus outer insulation, shielding, and inner insulation – Less prone to interference – Characteristics Price - inexpensive (but more costly than TP) Distance - up to 2 km (1.2 miles) Use: Cable TV / Internet
  • 15. Guided Media Fiber optic cable – Optical core made of glass or plastic – Data transmitted using light from lasers or LEDs – Resistant to interference and corrosion – Extremely fast data rates – Characteristics Price: Expensive Distance: 500m – 100km Use: Trunk line / Backbone, long distance circuits (e.g., undersea cables)
  • 16. Guided Media Fiber optics – Multimode (about 50 micron core) – Graded index multimode – Single mode (about 5 micron core)
  • 17. Wireless Media Radio – Wireless transmission of electrical waves through air – Each device on network has a radio transceiver operating at a specific frequency range – Enables mobile network communication – Characteristics Distance: depends on frequency and power Use: Wireless LANs, cellular and cordless phones, baby monitors
  • 18. Wireless Media • Microwave • High-frequency radio communication • Requires line of sight which may require large antennas and towers • Affected by weather • Characteristics • Distance: ~60 km (due to curvature of earth • Use: Trunk line / Backbone, long distance • Satellite • Special form of microwave communication • Long distance leads to propagation delays
  • 19. Media Factors to consider in media selection – Type of network – Cost – Transmission distance – Security – Error rates – Transmission speeds
  • 20. Wireless Networks – Wireless networks fall one of the following three categories depending on distance as follows: Restricted proximity network: this network involves LANs with a mixture of fixed and wireless devices. Intermediate/Extended network: this wireless network is made up of two fixed LANS component joined together by a wireless component. The bridge may be connecting LANs in two nearby buildings or even further. Mobile network: This is a fully wireless network connecting two network elements. One of these elements is usually a mobile unit which connects to the home network (fixed) using cellular or satellite technology. Kizza - Guide to Computer Network Security 20
  • 21. – The three types of wireless communication are connected using the following basic technologies: Infrared – uses pulses of infrared light to carry coded instructions to the receiving network element High-Frequency Radio – using electromagnetic radio waves or radio frequencies (RF transmission) Microwave – This is a higher frequency version of radio communication. It is capable of being focused in a single direction Others include laser waves Kizza - Guide to Computer Network Security 21 Wireless Networks
  • 22. Network Topologies Computer networks, whether LANs, MANs, or WANs are constructed based on a topology. There are several topologies including: – Mesh – allows multiple access links to a network element – Tree – except the root, every element in the network can only be accessed through its predecessors – Bus – all elements are on a shared line – Star – communication between any two elements in the network must go through central node – Ring – each element in network is directly connected to two neighbors forming a ring Kizza - Guide to Computer Network Security 22
  • 23. Network Connectivity and Protocols These are operational modalities/procedures for moving packets between network transmitting elements There are two widely used of protocol suites: – OSI – Open Systems Interconnection of the International Organization for Standardization (ISO) – TCP/IP – most widely used Both of these proposed suites are based on layered stacks of services Kizza - Guide to Computer Network Security 23
  • 25. Network Model - Layers Layer Purpose Example Protocols / Standards PDU 5. Application User’s access to network, software to perform work Packet (or Data) 4. Transport TCP, UDP Segment 3. Network Deciding where the message goes 1. Addressing 2. Routing IP, ICMP Packet 2. Data Link Move a message from one device to the next 1. Controls hardware 2. Formats the message 3. Error checking Ethernet Frame 1. Physical Transmits the message 100BASE-T, 802.11ac HTTP, SMTP, DNS, FTP, DHCP, IMAP, POP, SSL End-to-End Management 1. Link application layer to network 2. Segmenting and tracking 3. Flow control
  • 26. Copyright 2011John Wiley & Sons, Inc. 1 - 26 Message Transmission Using Layers
  • 27. Protocols Used by network model layers Sets of standardized rules to define how to communicate at each layer and how to interface with adjacent layers receiver sender Layer N Layer N-1 Layer N+1 Layer N Layer N-1 Layer N+1
  • 28. 1 - 28 Message Transmission Example
  • 29. Network Models • Layers allow simplicity of networking in some ways • Easy to develop new software that fits each layer • Relatively simple to change the software at any level • Matching layers communicate between different computers and computer platforms • Accomplished by standards that we all agree on; e.g., physical layer at the sending computer must match up with the same layer in the receiving computer • Advantages of Layers • Networking functionality is modular and the software/hardware at any layer can be more easily substituted; e.g., substitute wired for wireless at the physical layer • Easier to troubleshoot or make changes to one layer at a time • Application developers only need to worry about the application layer in their programs • Disadvantages of Layers • Inefficient because the encapsulation/de-encapsulation at each layer requires processing • Inefficient because encapsulation in a PDU increases overhead at each layer
  • 30. Network Services Networks work effectively when network services move data in the network. These services fall into two categories: – Connection services to facilitate the exchange of data between the two network communicating end-systems with as little data loss as possible and in as little time as possible. – Switching services to facilitate the movement of data from host to host across the length and width of the network mesh of hosts, hubs, bridges, routers and gateways Kizza - Guide to Computer Network Security 30
  • 31. • Two connection services are provided by most digital networks: • Connected-oriented services – offer prior connection controls in a form of three-way handshake • Connectionless service – no handshake is needed no prior information and no warnings • Two switching services are provided: • Circuit switching – The network must reserve all resources needed for the communication session before any communication begins. Example: telecommunications sessions. • Packet switching networks are referred to as Packet networks. There are two types of these networks • Virtual circuit networks – logical connection is needed before a packet is sent • Datagram and networks Kizza - Guide to Computer Network Security 31 Network Services
  • 32. Network Connecting Devices The computing elements in a network (LAN, WAN) are interconnected using connecting devices commonly referred to as nodes There are several types: – Hub – the simplest connecting devices. It takes in inputs and retransmits them verbatim – Bridge – it is similar to the hub, however, bridges filter incoming data packets for addresses before the packets/frames are re-transmitted Kizza - Guide to Computer Network Security 32
  • 33. – Switch – a newer version of a bridge with high a performance capacity and can accommodate higher numbers of interfaces – Router – general-purpose nodes that interconnect two or more heterogeneous networks; dedicated special purpose computers with their own Address Resolution Protocol (ARP) and IP addresses – Gateway – this is a more versatile device that can provide translation of and between networking technologies such as OSI and TCP/IP Gateways can connect two or more autonomous networks They perform all functions of a router and more Kizza - Guide to Computer Network Security 33 Network Connecting Devices
  • 34. Network Technologies • Network technologies in each network category. • LAN Technologies • Star-based Ethernet (IEEE 802.3) LAN • Wireless (IEEE 802.11ac) Kizza - Guide to Computer Network Security 34
  • 35. – WAN Technologies: Integrated Services Digital Network (ISDN) X.25 Other WAN Technologies – Frame Relay is a packet-switched network with the ability to multiplex many logical data conversions over a single connection. It provides flexible efficient channel bandwidth using digital and fiber optics transmission. It has many similar characteristics to X.25 network except in format and functionality. – Point-to-point Protocol (PPP) is the Internet Standard for transmission of IP packets over serial lines. The point-to-point link provides a single, pre-established communications path from the ending element through a carrier network, such as a telephone company, to a remote network. These links can carry datagram or data-stream transmissions. – xDirect Service Line (xDSL) is a technology that provides an inexpensive, yet very fast connection to the Internet. – Switched Multi-megabit Data Service (SMDS) is a connectionless service operating in the range of 1.5-100Mbps; any SMDS station can send a frame to any other station on the same network. – Asynchronous Transfer Mode (ATM) – Quality of Service. Kizza - Guide to Computer Network Security 35 Network Technologies

Editor's Notes

  1. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.pdf http://variety.com/2014/digital/news/netflix-youtube-bandwidth-usage-1201179643/ http://www.theverge.com/2013/12/26/5245008/amazon-sees-prime-spike-in-2013-holiday-season http://www.cnet.com/news/facebook-processes-more-than-500-tb-of-data-daily/
  2. One type of network that has become commonplace is the local area network (LAN). Indeed, LANs are to be found in virtually all medium- and large-size office buildings. LANs, especially Wi-Fi LANs, are also increasingly used for small office and home networks. As the number and power of computing devices have grown, so have the number and capacity of LANs be found in business networks. The development of internationally recognized standards for LANs has contributed to their proliferation in enterprises. Although Ethernet has emerged as the dominant LAN architecture, business managers still have choices to make about transmission rates (e.g., 100 Mbps vs. Gigabit vs. 10 Gbps Ethernet) and the degree to which both wired and wire- less LANs will be combined within the enterprise network. Interconnecting and man- aging a diverse collection of local area networks and computing devices within today’s business networks presents ongoing challenges for networking professionals. Wide area networks generally cover a large geographical area. They often require the crossing of public right-of-ways, and typically rely at least in part on circuits provided by one or more common carriers—communications companies that offer communication services to the general public. Typically, a WAN consists of a number of interconnected switching nodes. A transmission from any network-attached device is routed through these nodes to the specified destination device. These nodes are not concerned with the content of the data; rather, their purpose is to provide a switching facility that will move the data from node to node until they reach their destination. Traditionally, WANs have been implemented using one of two technologies: circuit switching and packet switching. More recently, frame relay and cell relay net- works have assumed major roles. Chapter 16 looks more closely at frame relay and ATM (Asynchronous Transfer Mode), the most widely used cell relay technology; multiple protocol label switching (MPLS) and wide area Ethernet (WAE) are also considered. In a circuit-switching network, a dedicated communications path is established between senders and receivers through the network’s switching nodes. That path is a connected sequence of physical links between nodes. On each link, a logical channel is dedicated to the connection between the sender and receiver. Data generated by the sending device are transmitted along the dedicated path as rapidly as possible. At each switching node, incoming data are routed or switched to the appropriate outgoing channel without delay. The classic example of circuit switching is the telephone network. When you call someone and they answer, a circuit connection is established over which a steady stream of data can be passed. The circuit functions the same way no matter how many switching nodes are needed to establish the connection with the person you called. The circuit is yours to use for as long as you need it and is terminated when you hang up. A different approach is used in a packet-switching network. In this case, it is not necessary to dedicate transmission capacity along a path through the network. Rather, data are transmitted in a sequence of small chunks, called packets. Each packet is passed through the network from switching node to switching node along some path leading from source to destination. At each switching node, the entire packet is received, may be stored briefly, and then transmitted to the next node. Traditionally, packet-switching networks have been most commonly used for terminal-to-computer and computer-to-computer data communications; they are likely to be used to carry time-sensitive voice and video traffic. Packet switching was developed at a time when digital long- distance transmission facilities exhibited a relatively high error rate compared to those that are available today. As a result, there is a considerable amount of over- head built into packet-switching schemes to compensate for errors. The overhead includes additional bits added to each packet to facilitate error checking and additional processing at destination devices and intermediate switching nodes to detect and recover from errors. With modern high-speed telecommunications systems, this overhead is unnecessary and counterproductive. Error rates have been dramatically lowered and the few errors that remain can easily be caught and addressed by destination devices. This means that it is no longer necessary to carry out error-checking activities at switching nodes. The elimination of node-to-node error checking and error recovery also means that circuit capacity can be more productively used to carry data rather than error control information. Frame relay was developed to take advantage of the higher data rates and low error rates that are available to implement WANs. Whereas the original packet- switching networks were designed to support per user data rates of about 64 Kbps, frame relay networks are designed to operate efficiently at user data rates of 2 Mbps or more. The key to achieving these high data rates is using less error-prone circuits and stripping out most of the overhead involved with error control. Asynchronous Transfer Mode (ATM), which is also commonly referred to as cell relay, is a culmination of advancements in both circuit switching and packet switching. However, ATM is widely viewed as an evolution from frame relay. The most obvious difference between frame relay and ATM is that frame relay uses variable-length packets, called frames, and ATM uses fixed-length packets, called cells. As with frame relay, ATM provides little overhead for error control, depending on the inherent reliability of the transmission system and using destination devices to catch and correct errors. By using a fixed packet length, the processing overhead associated with moving data across the network can be reduced even further for ATM compared to frame relay. The result is that ATM is designed for data rates of 100s of Mbps, and in the Gbps range. ATM can also be viewed as an evolution from circuit switching. With circuit switching, only fixed-data-rate circuits are available to sending and receiving devices. ATM allows senders and receivers to establish multiple virtual channels with data rates that are dynamically defined at the time each virtual channel is created. Each channel can be used to carry a different type of data (e.g., voice, data, image, or video) making ATM ideal for supporting videoconferencing and other time-sensitive multimedia applications. By using small, fixed-size cells, ATM is so efficient that it can offer logical, dedicated constant-data-rate channels even though it is using a packet-switching technique. Thus, ATM extends circuit switching to allow multiple channels with the data rate on each channel dynamically set on demand. As with WANs, a LAN is a communications network that interconnects a variety of devices and provides a means for information exchange among those devices. There are several key distinctions between LANs and WANs: 1. The geographic scope of the LAN is small, typically a single building or a cluster of buildings. This difference in geographic scope leads to different technical solutions, as we shall see. 2. It is usually the case that switches and communication equipment used to implement the LAN is owned by the same organization that owns the LAN- attached computing devices. For WANs, this is less often the case, with all or at least a significant fraction of the WAN circuits and switching nodes not owned by the business. This has two implications. First, care must be taken by business managers when choosing LANs because the choices can translate into substantial capital investment in network equipment purchases and ongoing network maintenance. Second, the network management responsibility for a LAN falls solely on the owner. 3. The internal data rates of LANs are typically much greater than those of WANs. Data rates of 100 Mbps or exceeding 1 Gbps can be cost-effectively achieved within LANs but interconnecting LANs across WANs at comparable data transmission rates can be costly. LANs come in a number of different configurations. The most common are switched LANs and wireless LANs. The most common switched LAN is a switched Ethernet LAN and the most common type of wireless LANs are Wi-Fi LANs. As the name suggests, a metropolitan area network (MAN) occupies a middle ground between LANs and WANs. Business interest in MANs has been driven by a growing awareness that traditional point-to-point and switched network techniques used in WANs may be inadequate to satisfy communication traffic increases needed within enterprise networks. While frame relay and ATM continue to be used to satisfy a wide range of high-speed needs, there is an expanding need for both private and public networks capable of providing high capacity at low costs over a large metropolitan area. A number of approaches have been implemented, including wireless networks (e.g., WiMax and Wi-Fi clouds) and metropolitan extensions to Ethernet—Metro Ethernet. The primary market for MANs is the customer that has high-capacity needs in a metropolitan area. A MAN is intended to provide the required capacity at lower cost and greater efficiency than obtaining an equivalent service from a local telephone company or an Internet service provider.
  3. To give some feel for the scope of concerns of Parts Three through Five, Figure 1.7 illustrates some of the typical communications and network elements in use today. In the upper-left-hand portion of the figure, we see an individual residential user connected to an Internet service provider through some sort of subscriber connection. Common examples of such a connection are a digital subscriber line (DSL), which provides a high-speed link over telephone lines or fiber-optic cable and requires a special DSL modem, or connecting to a cable TV service provider, which requires a cable modem. In each case, there are separate issues concerning signal encoding, error control, and the internal structure of the network that the residential user connects to. Typically, an ISP’s network consists of a number of interconnected servers (although only a single server is shown in Figure 1.7) connected to the Internet through a high-speed link. One example of such a link is a SONET (synchronous optical network) line, described in Chapter 6. The Internet consists of a number of interconnected routers that span the globe. These routers forward packets of data from source to destination through the Internet. The lower portion of the figure shows a LAN implemented using a single Ethernet switch. This is a common configuration at small businesses and other small organizations. The LAN is connected to the Internet through a firewall that pro- vides security services. In this example, the firewall connects to the Internet through an ATM network. There is also a router off of the LAN hooked into a private WAN, which might be a private ATM or frame relay network.
  4. License: Public Domain URL: http://commons.wikimedia.org/wiki/File:UTP_cable.jpg Author: Baran Ivo
  5. License: CC By URL: http://commons.wikimedia.org/wiki/File:MultimodeFiber.JPG Author: Hhedeshian