The document outlines the development and significance of ARPANET as the foundational network for the internet, highlighting milestones such as the invention of the World Wide Web by Tim Berners-Lee and the creation of early search engines. It discusses key components of internet infrastructure, including TCP/IP protocols, DNS, wireless networking, intrusion detection systems, and virtual private networks, and explains their roles in data communication and security. Additionally, it covers web creation and hosting processes, emphasizing the importance of domain names and hosting providers.
Overview of ARPANET, TCP/IP, World Wide Web, origins of search engines, FTP, and social networking.
IP addresses, gTLDs, root servers, and ccTLDs essential for managing internet naming and addressing.
TCP/IP's role in internet communication, packet handling, and addressing system essential for data transmission.
Wireless technologies, their applications, and various types of wireless networks including PAN, LAN, MAN, WAN.
Packet switching vs circuit switching, DNS importance in mapping domain names to IP addresses.
Focus on intrusion detection systems, types, working mechanisms, along with VPNs, their types, benefits, and drawbacks.Steps to register a domain, hosting websites, and creating web pages with online payment capabilities.
The Advanced ResearchProjects Agency Network (ARPANET) was the network that became the basis and technical
foundation of the internet . ARPANET was initially funded by the Advance Research Projects Agency (ARPA) of the United
States Department of Defence in the 1970s . The initial purpose was to communicate and share computer resources
among mainly scientific users at the connected institutions. In the late 1970s the development of the TCP/IP protocols
made it possible to expand the size of the network, which now had become a network of networks, in an orderly way.
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web
resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via
the internet. English scientist Tim Berners Lee invented the World Wide Web in 1989. He wrote the first web
browser computer program in 1990 while employed at CERN in Switzerland.
4.
The first fewhundred web sites began in 1993 and most of them were at colleges, but long before most of them existed
came Archie. The first search engine created was Archie, created in 1990 by Alan Emtage, a student at McGill University
in Montreal. SEARCH ENGINE is a software system that is designed to search for information on the World Wide Web.
The search results are generally presented in a line of results often referred to as search engine results pages (SERPs). The
information may be a mix of web pages, images, and other types of files.
The formal standard for FTP was published in RFC 765, File Transfer Protocol Specification, June 1980. This was the first
standard to define FTP operation over modern TCP/IP. The File Transfer Protocol (FTP) is a standard network protocol used
to transfer computer files between a client and server on a computer network. FTP is built on a client-server architecture
and uses separate control and data connections between the client and the server.
Social networking is the use of internet-based social media programs to make connections with friends, family,
classmates, customers and clients. Social networking can occur for social purposes, business purposes or both through
sites such as Facebook, Twitter, LinkedIn, Classmates.com and Yelp. Social networking is also a significant target area for
marketers seeking to engage users.
5.
INTERNET MANAGEMENT
•Naming andAddressing
• IP ADDRESSES:- An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network
interface identification and location addressing. Its role has been characterized as follows:
A name indicates what we seek. An address indicates where it is. A route indicates how to get there.
• GENERIC TOP LEVEL DOMAINS (gTLDS):-
• A gTLD (generic top-level domain name) is the top-level domain name of an Internet address that
identifies it generically as associated with some domain class, such as .com (commercial), .net
(originally intended for Internet service providers, but now used for many purposes), .org (for non-
profit organizations, industry groups, and others),.edu (for educational institutions); and many other.
6.
• Shared GlobalServices and Operations
• ROOT SERVERS :-
A root name server is a name server for the root zone of the Domain Name System (DNS) of the Internet. It directly answers
requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for the
appropriate top-level domain (TLD). The root name servers are a critical part of the Internet infrastructure because they are
the first step in translating (resolving) human readable host names into IP addresses that are used in communication
between Internet hosts.
• Country code Top Level Domains (ccTLDs):-
A country code top-level domain (ccTLD) is an Internet top-level domain generally used or reserved for a country,
sovereign state, or dependent territory identified with a country code. The ccTLD identifies a specific national domicile
for an address. (For instance, .fr for France and .mx for Mexico.)
7.
TCP/IP
• TCP/IP (TransmissionControl Protocol/Internet Protocol) is the basic communication language or protocol of
the Internet. It can also be used as a communications protocol in a private network (either an intranet or
an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy
of the TCP/IP program just as every other computer that you may send messages to or get information from
also has a copy of TCP/IP.
• TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of
a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that
reassembles the packets into the original message. The lower layer, Internet Protocol, handles
the address part of each packet so that it gets to the right destination.
• TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is
provided a service (such as sending a Web page) by another computer (a server) in the network.
8.
INTERNET PROTOCOL(IP)
• TheInternet Protocol (IP) is the method or protocol by which data is sent from one computer to another on
the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely
identifies it from all other computers on the Internet.
• The Internet Protocol is responsible for addressing hosts and for routing datagrams (packets) from a source
host to a destination host across one or more IP networks. For this purpose, the Internet Protocol defines the
format of packets and provides an addressing system that has two functions: Identifying hosts and
providing a logical location service.
9.
WIRELESS NETWORKING
• Wirelessnetworking is a method by which homes, telecommunications networks and enterprise (business)
installations avoid the costly process of introducing cables into a building, or as a connection between
various equipment locations. Wireless telecommunications networks are generally implemented and
administered using radio communication.
WIRELESS NETWORK :-
A wireless network is any type of computer network that uses wireless data connections for
connecting network nodes. Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into
buildings or as a connection between different equipment locations.
Wireless networks use radio waves to connect devices such as laptops to the Internet, the business network
and applications. When laptops are connected to Wi-Fi hot spots in public places, the connection is
established to that business’s wireless network.
10.
Types of WirelessNetwork
Type Range Applications Standards
Personal area network (PAN) Within reach of a person
Cable replacement for
peripherals
Bluetooth, ZigBee, NFC
Local area network (LAN) Within a building or campus
Wireless extension of wired
network
IEEE 802.11 (WiFi)
Metropolitan area network
(MAN)
Within a city
Wireless inter-network
connectivity
IEEE 802.15 (WiMAX)
Wide area network (WAN) Worldwide Wireless network access Cellular (UMTS, LTE, etc.)
11.
PACKET SWITCHING
• Packetswitching is a digital networking communications method that groups all transmitted
data into suitably sized blocks, called packets, which are transmitted via a medium that may be
shared by multiple simultaneous communication sessions. Packet switching increases network
efficiency, robustness and enables technological convergence of many applications operating on the
same network.
• Packets are composed of a header and payload. Information in the header is used by networking
hardware to direct the packet to its destination where the payload is extracted and used
by application software.
ORIGINAL
MESSAGE IS
BROKEN INTO
PARTS
ROUTED ACROSS
A PATH THAT CAN
BE MODIFIED AS
NEEDED
AT THE
DESTINATION IT IS
REASSEMBLED
CIRCUIT SWITCHING
• Atype of communications in which a dedicated channel (or circuit) is established for the duration
of a transmission. The most ubiquitous circuit-switching network is the telephone system, which
links together wire segments to create a single unbroken line for each telephone call.
• Circuit-switching systems are ideal for communications that require data to be transmitted in real-
time.
• Circuit-switching networks are sometimes called connection-oriented networks. Note, however, that
although packet switching is essentially connectionless, a packet switching network can be made
connection-oriented by using a higher-level protocol. TCP, for example, makes IP networks
connection-oriented.
ORIGINAL
MESSAGE
ROUTED ACROSS
A PATH A FIXED
PATH
ORIGINAL
MESSAGE
14.
DNS(Domain Name System)
•The Domain Name System (DNS) maps internet domain names to the internet protocol (IP)
network addresses they represent and enables websites to use names, rather than difficult-to-
remember IP addresses.
• A Domain Name is an identification string that defines a realm of administrative autonomy,
authority or control within the Internet. Domain names are formed by the rules and procedures of
the Domain Name System (DNS).
IDS(Intrusion Detection System)
IntrusionDetection System (IDS) is a software used to determine if a computer network
or server has experienced an unauthorized intrusion.
Intrusion is the illegal entry or unwelcome addition into the system.
IDS detects these intrusion attempts so that action may be taken to repair the damage later.
IDS monitors network traffic and monitors for suspicious activity and alerts the system or network
administrator.
17.
How IDS works?
• IDS works with a
copy of the traffic. It
can detect an attack
and send an alert
(and take other
actions), but it cannot
prevent the attack
because it does not
operate on traffic
inline in the
forwarding path.
18.
TYPES OF IDS
1.Host Based IDS
2. Network Based IDS
3. Stack Based IDS
4. Signature Based IDS
5. Anomaly Based IDS
19.
Host IntrusionDetection
Systems (HIDS) are installed
on the individual devices in
the network.
HIDS analyzes the incoming
and outgoing packets from a
particular device.
HIDS is better than Network
IDS as a comparison to
detecting malicious activities
for a particular device.
Fig. - Host Based IDS
HOST BASED IDS
20.
NETWORK BASED IDS
Network Intrusion Detection
Systems (NIDS) are monitoring
traffic at strategic points on the
network.
IDS uses as a dedicated platform
for use to analyze all the passing
network traffic.
NIDS work with the network and
analyses the ethernet packet to be
decide to apply rules.
Fig. - Network Based IDS
21.
STACK BASED IDS
Stack IDS is a technology, which
are integrated with the TCP/IP
stack.
Stack Intrusion Detection System
allows the IDS to be watching the
packets, than IDS pull the packet
from the stack before the os.
Fig. - Stack Based IDS
22.
SIGNATURE BASED
IDS
• IDSSignature detection work well
with the threads that are already
determined or known.
• It implicates searching a series of
bytes or sequence that are termed
to be malicious.
• One of the most profitable point is
that IDS Signatures are easy to
apply and develop once you will
figure out the sort of network
behavior to be find out.
Fig. - Signature Based IDS
23.
ANOMALY BASED
IDS
Anomalydetection technique is a
centralized process that works on the
concept of a baseline for network
behavior.
This baseline is a description of
accepted network behavior, which is
learned or specified by the network
administrators, or both.
It’s like a guard dog personally
interviewing everyone at the gate
before they are let down the drive.
Fig. - Anomaly Based IDS
24.
Intrusion prevention systems(IPS)
o Intrusion prevention systems (IPS) also known as intrusion detection and prevention
systems (IDPS), are network security appliances that monitor network and system activities for
malicious or harmful activity.
o The main objectives of intrusion prevention systems are:
Identification of malicious activity
Log information about said activity
Attempt to block/stop harmful activity
Report malevolent activity.
25.
How IPS works?
• IPS device operates in
inline mode i.e. because
the IPS device is in the
actual traffic path. This
makes the device more
effective against worms
and atomic attacks
(attacks that are carried
out by a single packet).
26.
IPS’S DETECTION METHODS
Signature-basedDetection
This method of detection utilizes signatures of attack patterns that are preconfigured and
predetermined.
A signature-based intrusion prevention system monitors the network traffic for matches to
these signatures.
Once a match is found the intrusion prevention system takes the appropriate action.
Statistical anomaly-based or Knowledge-based Detection
A statistical anomaly-based IDS determines normal network activity like what sort of
bandwidth is generally used, what protocols are used, what ports and devices generally
connect to each other .
It alert the administrator or user and prevent malicious contents when anomalous(not
normal) traffic is detected .
27.
Intrusion prevention systemscan be classified into four different types:
Network-based Intrusion Prevention System (NIPS):
It monitors the entire network for suspicious traffic by analysing protocol activity.
In a NIPS, sensors are located at network borders of the network. Sensors capture
all network traffic and analyses the content of individual packets for malicious
traffic and prevents them.
Example: Snort (Snort is a free and open source network intrusion prevention
system (NIPS) created by Martin Roesch in 1998.Snort is now developed
by Source fire.)
28.
Host-based intrusionprevention system (HIPS):
It is an installed software package which monitors a single host for suspicious activity by analysing
events occurring within that host.
Example: OSSEC ( OSSEC is a free, open source host-based intrusion Prevention system (IDS). It
provides intrusion Prevention for most operating systems,
including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows OS.)
Wireless intrusion prevention systems (WIPS):
monitors a wireless network for suspicious traffic by analysing wireless networking protocols.
Network behaviour analysis (NBA):
Examines network traffic to identify threats that generate unusual traffic flows, such as distributed
denial of service (DDoS) attacks, certain forms of malware and policy violations.
29.
VPN(Virtual Private Network)
•What is a VPN ?
A technology that creates a network that is physically public, but virtually private.
VPNs typically require remote users of the network to be authenticated, and often secure data
with encryption technologies to prevent disclosure of private information to unauthorized
parties.
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network
at a remote location, using the Internet or any unsecure public network to transport the
network data packets privately, using encryption. The VPN uses authentication to deny access
to unauthorized users, and encryption to prevent unauthorized users from reading the private
network packets. The VPN can be used to send any kind of network traffic securely, including
voice, video or data.
REMOTE ACCESS VPN
•A remote-access VPN allows individual users to establish secure
connections with a remote computer network.
• There are two components required in a remote-access VPN. The first
is a network access server(NAS).
• The other required component of remote-access VPNs is client
software
32.
INTRANET VPN
• IntranetVPNs link corporate headquarters, remote
offices, and branch offices over a shared
infrastructure using dedicated connections.
• The benefits of an intranet VPN are as follows:
- Reduces WAN bandwidth costs
- Connect new sites easily
33.
Extranet VPN
• ExtranetVPNs link customers, suppliers, partners, or
communities of interest to a corporate intranet over a shared
infrastructure using dedicated connections. In this example, the
VPN is often an alternative to fax, snail mail, or EDI. The
extranet VPN facilitates e-commerce.
34.
VPN ADVANTAGES
• Security-- The VPN should protect data while it's traveling on the public network. If intruders attempt to
capture the data, they should be unable to read or use it.
• Reliability --
• Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are
restricted), and the VPN should provide the same quality of connection for each user even when it is handling its
maximum number of simultaneous connections.
• Cost Savings
Eliminating the need for expensive long-distance leased lines
Reducing the long-distance telephone charges for remote access.
Transferring the support burden to the service providers
Operational costs
35.
Disadvantages of VPN
VPNsrequire detailed understanding of network security
issues and careful installation / configuration to ensure
sufficient protection on a public network like the Internet.
The reliability and performance of an Internet-based VPN
is not under an organization's direct control. Instead, the
solution relies on an ISP and their quality of service.
36.
WEB CREATION &HOSTING
REGISTERING A DOMAIN NAME
Select a Domain Registrar
Check domain availability, register it providing domain owner details
Configure Name Server for your domain that contains the host details
for the domain or sub-domains.
HOSTING THE WEBSITE
•Choose a hosting provider. You would get the IP address host
computer.
•Open DNS server settings that you used while registering the
domain.
•Map your domain and sub-domains to different hosts (IP
Addresses) in DNS Server.
WEBSITE CREATION & HOSTING
37.
CREATE A SIMPLEWEB PAGE
UPLOADING CONTENT TO THE WEBSITE
ENABLING ONLINE PAYMENT
Editor's Notes
#32 In other words, employees who want to use the VPN from their computers require software on those computers that can establish and maintain a connection to the VPN
Employee to Business…..