SlideShare a Scribd company logo
1.GATEWAY
2.FIREWALL
3.BRIDGE AND ACCESS-
POINT
Presented by
MScIT/16/010 Vinay
Vaghamshi
Gateway
 A gateway is a network node connecting two
networks that use different protocols.
 A node on a network that serves as an entrance
to another network.
 In enterprises, The gateway is the computer that
routes the traffic from a workstation to the
outside network that is serving the Web pages.
 In homes, the gateway is the ISP that connects
the user to the internet.
What is gateway?
 Gateway are also known as Protocol Converters and
can operate any network level. The activates of
gateway are more complex than routers or switch as it
works on different protocols.
 Router is also gateway, Since it interprets data from
one network protocols to another
 Combination of networking hardware and software
that connects two similar kinds of networks.
 Popular type of gateways includes:
 E-Mail Gateway
 IBM Host Gateway
 Internet Gateway
 LAN Gateway
A gateway is an internetworking device that is
capable of joining two different protocol based
network.
Functions of gateway
 A Gateway can connect the telephone network
to the Internet.
 A gateway is always associated with Routers, as
it directs the packets to its destination. On other
hand, you can use it as Proxy Server and
Firewall.
Functions of gateway
 Web application firewalls filter traffic to and from
a web server and look at application-layer data
 Cloud storage gateways translate storage
requests with various cloud storage service API
calls
 Cloud bridges connect networks and services
inside a data center to a virtual data center in an
infrastructure as a service environment, or
between IaaS environments
 API, SOA or XML gateways manage traffic flowing
into and out of a service, microservices-oriented
architecture or an XML-based web service.
Definition of firewall
 A firewall is a hardware or software designed to
permit or deny network transmissions based
upon a set of rules and is frequently used to
protect networks from unauthorized access
while permitting legitimate communications to
pass.
Firewalls Can Perform Basic Routing Functions
How does a software firewall
work?
 Inspects each individual “packet” of data as it arrives at
either side of the firewall
 Determines whether it should be allowed to pass
through or if it should be blocked
 Focus for security decisions
 Stop hackers from accessing your computer
 Can enforce security policy
 Protects your personal information
 Limits your exposure
 Blocks “pop up” ads and certain cookies
 Can log Internet activity efficiently
 Determines which programs can access the Internet
Hardware/software firewall
Figure 1: Hardware Firewall.
Hardware firewall providing
protection
to a Local Area Network.
Figure 2: Computer with Firewall
Software.
Computer running firewall software
that provide protection to PC..etc.,
Firewall Rules
 Allow – traffic that flows automatically
because it has been deemed
 Block – traffic that is blocked because it has
been deemed dangerous to your computer
 Ask – asks the user whether or not the traffic
is allowed to pass through
Types of Firewalls
1. Packet Filtering Firewall
 It looks at each packet entering or leaving the
network and accepts or rejects it based on user-
defined rules. Packet filtering is fairly effective and
transparent to users, but it is difficult to configure.
In addition, it is susceptible to IP spoofing.
 Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP
header
 Two default policies (discard or forward)
Packet Filtering
Applications
Presentations
Sessions
Transport
DataLink
Physical
DataLink
Physical
Router
Applications
Presentations
Sessions
Transport
DataLink
Physical
Networ
k
Networ
k
Types of Firewalls
2. Application gateway/ proxy server/ proxy
application gateway
 In such type of firewall remote host or network can
interact only with proxy server, proxy server is
responsible for hiding the details of the internal
network
 i.e. intranet.
 User uses TCP/IP applications, such as FTP and
Telnet servers.
 This is very effective, but can impose a performance
degradation.
Application gateway
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Application Gateway
Applications
Presentations
Sessions
Transport
Network Network
Telnet HTTPFTP
Types of Firewalls
3. Circuit level gateway
 It is a stand alone system or application.
 It does not permit end-to-end TCP connection. It sets
up 2 TCP connections:
 B/w itself and a TCP user on an inner host.
 B/w itself and a TCP user on an outer host.
 Specialized function performed by an Application-level
Gateway
 The gateway typically relays TCP segments from one
connection to the other without examining the
contents
Circuit-level gateway
Definition of a Bridge
 A bridge is a connecting device which has it’s own
processor, memory and two NIC cards, to connect
two portions of a network
 Facilitates host to host communication
 Operates at the physical as well as data link layer
 Bridge is to divide a big network in to smaller sub-
networks
How Bridges Work?
 Bridges work at the Media Access Control
Sub-layer of the OSI model
 .
• Routing table is built to record the segment
no. of
address
 .
• If destination address is in the same segment
as the source address, stop transmit
 .
• Otherwise, forward to the other segment
Bridge at the Last two OSI
Layers
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Bridge
A
Physical layer
Data link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
B
Function of a Bridge
 As a physical layer device it generates the signal it
receives
 As a data link layer device it checks the source and
destination addresses in the frame
 It send data frames only to the concerned destination
 It minimizes unwanted traffic
 It minimizes network congestion
 Error links can be identified and then isolated
 Security features or access control can be added
 It acts as a filter
 It maintains a table that maps addresses to ports
Characteristics of Bridges
 Routing Tables
– Contains one entry per station of network to which bridge
is connected.
– Is used to determine the network of destination station of
a received packet.
 Filtering
– Is used by bridge to allow only those packets destined to
the remote network.
– Packets are filtered with respect to their destination and
multicast addresses.
 Forwarding
– the process of passing a packet from one network to
another.
 Learning Algorithm
– the process by which the bridge learns how to reach
stations on the internetwork.
Types of Bridges
 Transparent Bridge
– Also called learning bridges
– Build a table of MAC addresses as frames arrive
– Ethernet networks use transparent bridge
– Duties of transparent bridge are : Filtering frames,
forwarding and blocking
 Source Routing Bridge
– Used in Token Ring networks
– Each station should determine the route to the
destination when it wants to send a frame and therefore
include the route information in the header of frame.
– Addresses of these bridges are included in the frame.
– Frame contains not only the source and destination
address but also the bridge addresses.
Access-point
Routers versus Bridges
 Addressing
 Routers are explicitly addressed.
 Bridges are not addressed.
 Availability
 Routers can handle failures in links, stations, and other routers.
 Bridges use only source and destination MAC address, which
does not guarantee delivery of frames.
 Message Size
 Routers can perform fragmentation on packets and thus handle
different packet sizes.
 Bridges cannot do fragmentation and should not forward a frame
which is too big for the next LAN.
 Forwarding
 Routers forward a message to a specific destination.
 Bridges forward a message to an outgoing network.
 Priority
 Routers can treat packets according to priorities
 Bridges treat all packets equally.
 Error Rate
 Network layers have error-checking algorithms that
examines each received packet.
 The MAC layer provides a very low undetected bit error
rate.
 Security
 Both bridges and routers provide the ability to put“security
walls” around specific stations.
 Routers generally provide greater security than bridges
 Because
 they can be addressed directly and
 They use additional data for implementing security
Thank
you

More Related Content

What's hot

computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
Sangeetha Rangarajan
 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
Kuppusamy P
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
File system
File systemFile system
File system
Harleen Johal
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Network software
Network softwareNetwork software
Network software
SakthiVinoth78
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
Jennifer Christy
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Basic concept of OOP's
Basic concept of OOP'sBasic concept of OOP's
Basic concept of OOP's
Prof. Dr. K. Adisesha
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
Local area network
Local area networkLocal area network
Local area network
Ayushi Gagneja
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 

What's hot (20)

computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
 
Application Layer
Application Layer Application Layer
Application Layer
 
Transport layer
Transport layer Transport layer
Transport layer
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
File system
File systemFile system
File system
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Network software
Network softwareNetwork software
Network software
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Basic concept of OOP's
Basic concept of OOP'sBasic concept of OOP's
Basic concept of OOP's
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Local area network
Local area networkLocal area network
Local area network
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Similar to Gateway and firewall

PT.pptx
PT.pptxPT.pptx
Networkswitch
Networkswitch Networkswitch
Networkswitch
Ravinder Kaur
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Study of Network Devices
Study of Network DevicesStudy of Network Devices
Study of Network Devices
SM. Aurnob
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
sherifmeetme
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
ShantanuDharekar
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
Tonny Michael
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
Asish Verma
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
ShantanuDharekar
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
ShantanuDharekar
 
four
fourfour
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
lovizabasharat
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Avishek Maitra
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
Sujee Antony
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
RoHit VashIsht
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
IT Tech
 

Similar to Gateway and firewall (20)

PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Networkswitch
Networkswitch Networkswitch
Networkswitch
 
Network switch
Network switchNetwork switch
Network switch
 
Study of Network Devices
Study of Network DevicesStudy of Network Devices
Study of Network Devices
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Networks
Networks   Networks
Networks
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
four
fourfour
four
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 

Recently uploaded

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (16)

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

Gateway and firewall

  • 2. Gateway  A gateway is a network node connecting two networks that use different protocols.  A node on a network that serves as an entrance to another network.  In enterprises, The gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages.  In homes, the gateway is the ISP that connects the user to the internet.
  • 3. What is gateway?  Gateway are also known as Protocol Converters and can operate any network level. The activates of gateway are more complex than routers or switch as it works on different protocols.  Router is also gateway, Since it interprets data from one network protocols to another  Combination of networking hardware and software that connects two similar kinds of networks.  Popular type of gateways includes:  E-Mail Gateway  IBM Host Gateway  Internet Gateway  LAN Gateway
  • 4. A gateway is an internetworking device that is capable of joining two different protocol based network.
  • 5. Functions of gateway  A Gateway can connect the telephone network to the Internet.  A gateway is always associated with Routers, as it directs the packets to its destination. On other hand, you can use it as Proxy Server and Firewall.
  • 6. Functions of gateway  Web application firewalls filter traffic to and from a web server and look at application-layer data  Cloud storage gateways translate storage requests with various cloud storage service API calls  Cloud bridges connect networks and services inside a data center to a virtual data center in an infrastructure as a service environment, or between IaaS environments  API, SOA or XML gateways manage traffic flowing into and out of a service, microservices-oriented architecture or an XML-based web service.
  • 7. Definition of firewall  A firewall is a hardware or software designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Firewalls Can Perform Basic Routing Functions
  • 8. How does a software firewall work?  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked  Focus for security decisions  Stop hackers from accessing your computer  Can enforce security policy  Protects your personal information  Limits your exposure  Blocks “pop up” ads and certain cookies  Can log Internet activity efficiently  Determines which programs can access the Internet
  • 9. Hardware/software firewall Figure 1: Hardware Firewall. Hardware firewall providing protection to a Local Area Network. Figure 2: Computer with Firewall Software. Computer running firewall software that provide protection to PC..etc.,
  • 10. Firewall Rules  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 11. Types of Firewalls 1. Packet Filtering Firewall  It looks at each packet entering or leaving the network and accepts or rejects it based on user- defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 13. Types of Firewalls 2. Application gateway/ proxy server/ proxy application gateway  In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network  i.e. intranet.  User uses TCP/IP applications, such as FTP and Telnet servers.  This is very effective, but can impose a performance degradation.
  • 14. Application gateway Applications Presentations Sessions Transport Data Link Physical Network Data Link Physical Applications Presentations Sessions Transport Data Link Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTPFTP
  • 15. Types of Firewalls 3. Circuit level gateway  It is a stand alone system or application.  It does not permit end-to-end TCP connection. It sets up 2 TCP connections:  B/w itself and a TCP user on an inner host.  B/w itself and a TCP user on an outer host.  Specialized function performed by an Application-level Gateway  The gateway typically relays TCP segments from one connection to the other without examining the contents
  • 17. Definition of a Bridge  A bridge is a connecting device which has it’s own processor, memory and two NIC cards, to connect two portions of a network  Facilitates host to host communication  Operates at the physical as well as data link layer  Bridge is to divide a big network in to smaller sub- networks
  • 18. How Bridges Work?  Bridges work at the Media Access Control Sub-layer of the OSI model  . • Routing table is built to record the segment no. of address  . • If destination address is in the same segment as the source address, stop transmit  . • Otherwise, forward to the other segment
  • 19. Bridge at the Last two OSI Layers Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer Bridge A Physical layer Data link layer Network layer Transport layer Session layer Presentation layer Application layer B
  • 20. Function of a Bridge  As a physical layer device it generates the signal it receives  As a data link layer device it checks the source and destination addresses in the frame  It send data frames only to the concerned destination  It minimizes unwanted traffic  It minimizes network congestion  Error links can be identified and then isolated  Security features or access control can be added  It acts as a filter  It maintains a table that maps addresses to ports
  • 21. Characteristics of Bridges  Routing Tables – Contains one entry per station of network to which bridge is connected. – Is used to determine the network of destination station of a received packet.  Filtering – Is used by bridge to allow only those packets destined to the remote network. – Packets are filtered with respect to their destination and multicast addresses.  Forwarding – the process of passing a packet from one network to another.  Learning Algorithm – the process by which the bridge learns how to reach stations on the internetwork.
  • 22. Types of Bridges  Transparent Bridge – Also called learning bridges – Build a table of MAC addresses as frames arrive – Ethernet networks use transparent bridge – Duties of transparent bridge are : Filtering frames, forwarding and blocking  Source Routing Bridge – Used in Token Ring networks – Each station should determine the route to the destination when it wants to send a frame and therefore include the route information in the header of frame. – Addresses of these bridges are included in the frame. – Frame contains not only the source and destination address but also the bridge addresses.
  • 24. Routers versus Bridges  Addressing  Routers are explicitly addressed.  Bridges are not addressed.  Availability  Routers can handle failures in links, stations, and other routers.  Bridges use only source and destination MAC address, which does not guarantee delivery of frames.  Message Size  Routers can perform fragmentation on packets and thus handle different packet sizes.  Bridges cannot do fragmentation and should not forward a frame which is too big for the next LAN.  Forwarding  Routers forward a message to a specific destination.  Bridges forward a message to an outgoing network.
  • 25.  Priority  Routers can treat packets according to priorities  Bridges treat all packets equally.  Error Rate  Network layers have error-checking algorithms that examines each received packet.  The MAC layer provides a very low undetected bit error rate.  Security  Both bridges and routers provide the ability to put“security walls” around specific stations.  Routers generally provide greater security than bridges  Because  they can be addressed directly and  They use additional data for implementing security