You are on page 1of 44

NET 202 MWF 4:00 – 5:00 PM

NETWORKING 1

Module 1. Introducing to Computer Network

LEARNING TARGET/S: At the end of the unit, the students CAN:

1. Understand what Computer Network is.

2. Describe what are network devices and each uses.

3. Illustrate the importance of computer network.

Week: 1-3

Activating Prior Knowledge (APK): Think and Reflect!

What is computer network and how it works?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 1


NET 202 MWF 4:00 – 5:00 PM

I. ESSENTIAL IDEAS

a. Brief History of Computer Networking.

YEAR EVENT

1961 The idea of ARPANET, one of the earliest computer networks, was
proposed by Leonard Kleinrock in 1961, in his paper titled
"Information Flow in Large Communication Nets."

1965 The term "packet" was coined by Donald Davies in 1965, to describe
data sent between computers over a network.

1969 ARPANET was one of the first computer networks to use packet


switching. Development of ARPANET started in 1966, and the first
two nodes, UCLA and SRI (Standford Research Institute), were
connected, officially starting ARPANET in 1969.

1969 The first RFC surfaced in April 1969, as a document to define and


provide information about computer communications, network
protocols, and procedures.

1969 The first network switch and IMP (Interface Message Processor) was


sent to UCLA on August 29, 1969. It was used to send the first data
transmission on ARPANET.

1969 The Internet was officially born, with the first data transmission being
sent between UCLA and SRI on October 29, 1969, at 10:30 p.m.

1970 Steve Crocker and a team at UCLA released NCP (NetWare Core


Protocol) in 1970. NCP is a file sharing protocol for use
with NetWare.

1971 Ray Tomlinson sent the first e-mail in 1971.

1971 ALOHAnet, a UHF wireless packet network, is used in Hawaii to


connect the islands together. Although it is not Wi-Fi, it helps lay the
foundation for Wi-Fi.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 2


NET 202 MWF 4:00 – 5:00 PM

1973 Ethernet is developed by Robert Metcalfe in 1973 while working at


Xerox PARC.

1973 The first international network connection, called SATNET, is


deployed in 1973 by ARPA.

1973 An experimental VoIP call was made in 1973, officially introducing


VoIP technology and capabilities. However, the first software
allowing users to make VoIP calls was not available until 1995.

1974 The first routers were used at Xerox in 1974. However, these first


routers were not considered true IP routers.

1976 Ginny Strazisar developed the first true IP router, originally called


a gateway, in 1976.

1978 Bob Kahn invented the TCP/IP protocol for networks and developed


it, with help from Vint Cerf, in 1978.

1981 Internet Protocol version 4, or IPv4, was officially defined


in RFC 791 in 1981. IPv4 was the first major version of the Internet
protocol.

1981 BITNET was created in 1981 as a network between IBM mainframe


systems in the United States.

1981 CSNET (Computer Science Network) was developed by the U.S.


National Science Foundation in 1981.

1983 ARPANET finished the transition to using TCP/IP in 1983.

1983 Paul Mockapetris and Jon Postel implemented the first DNS in 1983.

1986 The NSFNET (National Science Foundation Network) came online in


1986. It was a backbone for ARPANET, before eventually replacing
ARPANET in the early 1990s.

1986 BITNET II was created in 1986 to address bandwidth issues with the
original BITNET.

1988 The first T1 backbone was added to ARPANET in 1988.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 3


NET 202 MWF 4:00 – 5:00 PM

1988 WaveLAN network technology, the official precursor to Wi-Fi, was


introduced to the market by AT&T, Lucent, and NCR in 1988.

1988 Details about network firewall technology was first published in


1988. The published paper discussed the first firewall, called
a packet filter firewall, that was developed by Digital Equipment
Corporation the same year.

1990 Kalpana, a U.S. network hardware company, developed and


introduced the first network switch in 1990.

1996 IPv6 was introduced in 1996 as an improvement over IPv4, including


a wider range of IP addresses, improved routing, and embedded
encryption.

1997 The first version of the 802.11 standard for Wi-Fi is introduced in


June 1997, providing transmission speeds up to 2 Mbps.

1999 The 802.11a standard for Wi-Fi was made official in 1999, designed


to use the 5 GHz band and provide transmission speeds up to
25 Mbps.

1999 802.11b devices were available to the public starting mid-1999,


providing transmission speeds up to 11 Mbps.

1999 The WEP encryption protocol for Wi-Fi is introduced in September


1999, for use with 802.11b.

2003 802.11g devices were available to the public starting in January 2003,


providing transmission speeds up to 20 Mbps.

2003 The WPA encryption protocol for Wi-Fi is introduced in 2003, for


use with 802.11g.

2003 The WPA2 encryption protocol is introduced in 2004, as an


improvement over and replacement for WPA. All Wi-Fi devices are
required to be WPA2 certified by 2006.

2009 The 802.11n standard for Wi-Fi was made official in 2009. It


provides higher transfer speeds over 802.11a and 802.11g, and it can
operate on the 2.4 GHz and 5 GHz bandwidths.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 4


NET 202 MWF 4:00 – 5:00 PM

2018 The Wi-Fi Alliance introduced WPA3 encryption for Wi-Fi in


January 2018, which includes security enhancements over WPA2.

b. Terminologies used in Computer Networking

WAN: It stands for Wide Area Network and covers a wide area such as a
city.

LAN: It stands for Local Area Network and covers a small area such as a
small office or home. It physically connects all the computers located in the
premises.

Internet: It is a computer network system that connects the computers of the


world. It is normally connecting through WAN and LAN.

Intranet: It is a close room computer network system, system, as it covers a


small area and only authorized people can access it.

World Wide Web (WWW): It is the service that is used on Internet to view
and search contents (in the form of web-pages).

Voice over Internet Protocol (VoIP): It is a Protocol, which is used


especially for voice transfer over IP network. Likewise, it facilitates users to
make phone-calls by using internet.

Download: It is a process that saves data from Internet onto a personal


computer.

Upload: It is a process that transfers the saved data from a personal


computer to Internet server.

Dial-Up: It is a technique in which a phone line is used in order to connect


to the Internet.

Broadband: It is a wide bandwidth data transmission that transports


multiple signals and traffic types swiftly.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 5


NET 202 MWF 4:00 – 5:00 PM

TCP/IP: It stands for Transmission Control Protocol/Internet Protocol.


The TCP/IP model is a concise version of the OSI model. It contains four
layers.

UDP:  (User Datagram Protocol) is a communications protocol that is


primarily used for establishing low-latency and loss-tolerating connections
between applications on the internet. It speeds up transmissions by enabling
the transfer of data before an agreement is provided by the receiving party.
NAT(Network Address Translation): Allows a single device, such as a
router, to act as an agent between the Internet (or public network) and a local
network (or private network), which means that only a single unique IP
address is required to represent an entire group of computers to anything
outside their network

Byte: Is a unit of digital information that most commonly consists of eight


bits. Historically, the byte was the number of bits used to encode a single
character of text in a computer and for this reason it is the smallest
addressable unit of memory in many computer architectures.

Bit (short for binary digit): Is the smallest unit of data in a computer.


A bit has a single binary value, either 0 or 1. Although computers usually
provide instructions that can test and manipulate bits, they generally are
designed to store data and execute instructions in bit multiples called bytes.

Kilobyte (abbreviated "K" or "KB"): Is the smallest unit of measurement


greater than a byte. It precedes the megabyte, which contains 1,000,000
bytes. While one kilobyte is technically 1,000 bytes, kilobytes are often used
synonymously with kibibytes, which contain 1,024 bytes.

Megabyte: Is a multiple of the unit byte for digital information. Its


recommended unit symbol is MB. The unit prefix mega is a multiplier
of 1000000 (106) in the International System of Units (SI). Therefore, one
megabyte is one million bytes of information.

Gigabyte: Is a multiple of the unit byte for digital information.


The prefix giga- means 109 in the International System of Units (SI).
Therefore, one gigabyte is one billion bytes. The unit symbol for the gigabyte
is GB.

c. A Network

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 6


NET 202 MWF 4:00 – 5:00 PM

What is a Network?

A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

Two very common types of networks include:

 Local Area Network (LAN)


 Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a


Wireless LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively


small area. It is generally limited to a geographic area such as a writing lab,
school, or building.

Computers connected to a network are broadly categorized as servers or


workstations. Servers are generally not used by humans directly, but rather
run continuously to provide "services" to the other computers (and their
human users) on the network. Services provided can include printing and
faxing, software hosting, file storage and sharing, messaging, data storage
and retrieval, complete access control (security) for the network's resources,
and many others.

Workstations are called such because they typically do have a human user
which interacts with the network through them. Workstations were
traditionally considered a desktop, consisting of a computer, keyboard,
display, and mouse, or a laptop, with with integrated keyboard, display, and
touchpad. With the advent of the tablet computer, and the touch screen
devices such as iPad and iPhone, our definition of workstation is quickly
evolving to include those devices, because of their ability to interact with the
network and utilize network services.

Servers tend to be more powerful than workstations, although configurations


are guided by needs. For example, a group of servers might be located in a
secure area, away from humans, and only accessed through the network. In

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 7


NET 202 MWF 4:00 – 5:00 PM

such cases, it would be common for the servers to operate without a


dedicated display or keyboard. However, the size and speed of the server's
processor(s), hard drive, and main memory might add dramatically to the
cost of the system. On the other hand, a workstation might not need as much
storage or working memory, but might require an expensive display to
accommodate the needs of its user. Every computer on a network should be
appropriately configured for its use.

On a single LAN, computers and servers may be connected by cables or


wirelessly. Wireless access to a wired network is made possible by wireless
access points (WAPs). These WAP devices provide a bridge between
computers and networks. A typical WAP might have the theoretical capacity
to connect hundreds or even thousands of wireless users to a network,
although practical capacity might be far less.

Nearly always servers will be connected by cables to the network, because


the cable connections remain the fastest. Workstations which are stationary
(desktops) are also usually connected by a cable to the network, although the
cost of wireless adapters has dropped to the point that, when installing
workstations in an existing facility with inadequate wiring, it can be easier
and less expensive to use wireless for a desktop.

See the Topology, Cabling, and Hardware sections of this tutorial for more


information on the configuration of a LAN.

Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas,


such as Florida, the United States, or the world. Dedicated transoceanic
cabling or satellite uplinks may be used to connect this type of global
network.

Using a WAN, schools in Florida can communicate with places like Tokyo in
a matter of seconds, without paying enormous phone bills. Two users a half-
world apart with workstations equipped with microphones and a webcams
might teleconference in real time. A WAN is complicated. It uses
multiplexers, bridges, and routers to connect local and metropolitan networks
to global communications networks like the Internet. To users, however, a
WAN will not appear to be much different than a LAN.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 8


NET 202 MWF 4:00 – 5:00 PM

Advantages of Installing a School Network


User access control.
Modern networks almost always have one or more servers which
allows centralized management for users and for network resources
to which they have access. User credentials on a privately-owned and
operated network may be as simple as a user name and password, but
with ever-increasing attention to computing security issues, these
servers are critical to ensuring that sensitive information is only
available to authorized users.
Information storing and sharing.
Computers allow users to create and manipulate information.
Information takes on a life of its own on a network. The network
provides both a place to store the information and mechanisms to
share that information with other network users.
Connections.
Administrators, instructors, and even students and guests can be
connected using the campus network.
Services.
The school can provide services, such as registration, school
directories, course schedules, access to research, and email accounts,
and many others. (Remember, network services are generally
provided by servers).
Internet.
The school can provide network users with access to the internet, via
an internet gateway.
Computing resources.
The school can provide access to special purpose computing devices
which individual users would not normally own. For example, a
school network might have high-speed high quality printers
strategically located around a campus for instructor or student use.
Flexible Access.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 9


NET 202 MWF 4:00 – 5:00 PM

School networks allow students to access their information from


connected devices throughout the school. Students can begin an
assignment in their classroom, save part of it on a public access area
of the network, then go to the media center after school to finish their
work. Students can also work cooperatively through the network.
Workgroup Computing.
Collaborative software allows many users to work on a document or
project concurrently. For example, educators located at various
schools within a county could simultaneously contribute their ideas
about new curriculum standards to the same document, spreadsheets,
or website.

Disadvantages of Installing a School Network


Expensive to Install.
Large campus networks can carry hefty price tags. Cabling, network
cards, routers, bridges, firewalls, wireless access points, and software
can get expensive, and the installation would certainly require the
services of technicians. But, with the ease of setup of home
networks, a simple network with internet access can be setup for a
small campus in an afternoon.
Requires Administrative Time.
Proper maintenance of a network requires considerable time and
expertise. Many schools have installed a network, only to find that
they did not budget for the necessary administrative support.
Servers Fail.
Although a network server is no more susceptible to failure than any
other computer, when the files server "goes down" the entire network
may come to a halt. Good network design practices say that critical
network services (provided by servers) should be redundant on the
network whenever possible.
Cables May Break.
The Topology chapter presents information about the various
configurations of cables. Some of the configurations are designed to

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 10


NET 202 MWF 4:00 – 5:00 PM

minimize the inconvenience of a broken cable; with other


configurations, one broken cable can stop the entire network.
Security and compliance.
Network security is expensive. It is also very important. A school
network would possibly be subject to more stringent security
requirements than a similarly-sized corporate network, because of its
likelihood of storing personal and confidential information of
network users, the danger of which can be compounded if any
network users are minors. A great deal of attention must be paid to
network services to ensure all network content is appropriate for the
network community it serves.

d. Protocol

What is a Protocol?

A protocol is a set of rules that governs the communications between computers


on a network. In order for two computers to talk to each other, they must be
speaking the same language. Many different types of network protocols and
standards are required to ensure that your computer (no matter which operating
system, network card, or application you are using) can communicate with
another computer located on the next desk or half-way around the world. The
OSI (Open Systems Interconnection) Reference Model defines seven layers of
networking protocols. The complexity of these layers is beyond the scope of this
tutorial; however, they can be simplified into four layers to help identify some of
the protocols with which you should be familiar (see fig 1).

OSI Layer Name Common Protocol

7 Application HTTP | FTP | SMTP | DNS | Telnet

6 Presentation

5 Session

4 Transport TCP | SPX

3 Network IP | IPX

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 11


NET 202 MWF 4:00 – 5:00 PM

2 Data Link Ethernet

1 Physical

Fig 1. OSI model related to common network protocols

Figure 1 illustrates how some of the major protocols would correlate to the
OSI model in order to communicate via the Internet. In this model, there are
four layers, including:

 Ethernet (Physical/Data Link Layers)


 IP/IPX (Network Layer)
 TCP/SPX (Transport Layer)
 HTTP, FTP, Telnet, SMTP, and DNS(combined
Session/Presentation/Application Layers)

Assuming you want to send an e-mail message to someone in Italy, we will


examine the layers "from the bottom up" -- beginning with Ethernet
(physical/data link layers).

Ethernet (Physical/Data Link Layers)

The physical layer of the network focuses on hardware elements, such as


cables, repeaters, and network interface cards. By far the most common
protocol used at the physical layer is Ethernet. For example, an Ethernet
network (such as 10BaseT or 100BaseTX) specifies the type of cables that
can be used, the optimal topology (star vs. bus, etc.), the maximum length of
cables, etc. (See the Cabling section for more information on Ethernet
standards related to the physical layer).

The data link layer of the network addresses the way that data packets are
sent from one node to another. Ethernet uses an access method called
CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a
system where each computer listens to the cable before sending anything
through the network. If the network is clear, the computer will transmit. If
some other node is already transmitting on the cable, the computer will wait
and try again when the line is clear. Sometimes, two computers attempt to
transmit at the same instant. When this happens a collision occurs. Each
computer then backs off and waits a random amount of time before
attempting to retransmit. With this access method, it is normal to have

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 12


NET 202 MWF 4:00 – 5:00 PM

collisions. However, the delay caused by collisions and retransmitting is very


small and does not normally effect the speed of transmission on the network.

Ethernet

The original Ethernet standard was developed in 1983 and had a maximum
speed of 10 Mbps (phenomenal at the time) over coaxial cable. The Ethernet
protocol allows for bus, star, or tree topologies, depending on the type of
cables used and other factors. This heavy coaxial cabling was expensive to
purchase, install, and maintain, and very difficult to retrofit into existing
facilities.

The current standards are now built around the use of twisted pair wire.
Common twisted pair standards are 10BaseT, 100BaseT, and 1000BaseT.
The number (10, 100, 1000) and for the speed of transmission (10/100/1000
megabits per second); the "Base" stands for "baseband" meaning it has full
control of the wire on a single frequency; and the "T" stands for "twisted
pair" cable. Fiber cable can also be used at this level in 10BaseFL.

Fast Ethernet

The Fast Ethernet protocol supports transmission up to 100 Mbps. Fast


Ethernet requires the use of different, more expensive network
concentrators/hubs and network interface cards. In addition, category 5
twisted pair or fiber optic cable is necessary. Fast Ethernet standards include:

 100BaseT - 100 Mbps over 2-pair category 5 or better UTP cable.


 100BaseFX - 100 Mbps over fiber cable.
 100BaseSX -100 Mbps over multimode fiber cable.
 100BaseBX - 100 Mbps over single mode fiber cable.

Gigabit Ethernet

Gigabit Ethernet standard is a protocol that has a transmission speed of 1


Gbps (1000 Mbps). It can be used with both fiber optic cabling and copper.
(see the Cabling section for more information).

 1000BaseT - 1000 Mbps over 2-pair category 5 or better UTP cable.


 1000BaseTX - 1000 Mbps over 2-pair category 6 or better UTP
cable.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 13


NET 202 MWF 4:00 – 5:00 PM

 1000BaseFX - 1000 Mbps over fiber cable.


 1000BaseSX -1000 Mbps over multimode fiber cable.
 1000BaseBX - 1000 Mbps over single mode fiber cable.

The Ethernet standards continue to evolve. with 10 Gigabit Ethernet (10,000


Mbps) and 100 Gigabit Ethernet (100,000 Mbps),

Ethernet Protocol Summary


Protocol Cable Speed

Ethernet Twisted Pair, Coaxial, Fiber 10 Mbps

Fast Ethernet Twisted Pair, Fiber 100 Mbps

Gigabit Ethernet Twisted Pair, Fiber 1000 Mbps

Older Network Protocols

Several very popular network protocols, commonly used in the 90's and early
21st century have now largely fallen into disuse. While you may hear terms
from time to time, such as "Localtalk" (Apple) or "Token Ring" (IBM), you
will rarely find these systems still in operation. Although they played an
important role in the evolution of networking, their performance and capacity
limitations have relegated them to the past, in the wake of the standardization
of Ethernet driven by the success of the Internet.

IP and IPX (Network Layer)

The network layer is in charge of routing network messages (data) from one
computer to another. The common protocols at this layer are IP (which is
paired with TCP at the transport layer for Internet network) and IPX (which
is paired with SPX at the transport layer for some older Macintosh, Linus,
UNIX, Novell and Windows networks). Because of the growth in Internet-
based networks, IP/TCP are becoming the leading protocols for most
networks.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 14


NET 202 MWF 4:00 – 5:00 PM

Every network device (such as network interface cards and printers) have a
physical address called a MAC (Media Access Control) address. When you
purchase a network card, the MAC address is fixed and cannot be changed.
Networks using the IP and IPX protocols assign logical addresses (which are
made up of the MAC address and the network address) to the devices on the
network, This can all become quite complex -- suffice it to say that the
network layer takes care of assigning the correct addresses (via IP or IPX)
and then uses routers to send the data packets to other networks.

TCP and SPX (Transport Layer)

The transport layer is concerned with efficient and reliable transportation of


the data packets from one network to another. In most cases, a document, e-
mail message or other piece of information is not sent as one unit. Instead, it
is broken into small data packets, each with header information that identifies
its correct sequence and document.

When the data packets are sent over a network, they may or may not take the
same route -- it doesn't matter. At the receiving end, the data packets are re-
assembled into the proper order. After all packets are received, a message
goes back to the originating network. If a packet does not arrive, a message
to "re-send" is sent back to the originating network.

TCP, paired with IP, is by far the most popular protocol at the transport level.
If the IPX protocol is used at the network layer (on networks such as Novell
or Microsoft), then it is paired with SPX at the transport layer.

HTTP, FTP, SMTP and DNS (Session/Presentation/Application Layers)

Several protocols overlap the session, presentation, and application layers of


networks. There protocols listed below are a few of the more well-known:

 DNS - Domain Name System - translates network address (such as


IP addresses) into terms understood by humans (such as Domain
Names) and vice-versa
 DHCP - Dynamic Host Configuration Protocol - can automatically
assign Internet addresses to computers and users
 FTP - File Transfer Protocol - a protocol that is used to transfer and
manipulate files on the Internet
 HTTP - HyperText Transfer Protocol - An Internet-based protocol
for sending and receiving webpages

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 15


NET 202 MWF 4:00 – 5:00 PM

 IMAP - Internet Message Access Protocol - A protocol for e-mail


messages on the Internet
 IRC - Internet Relay Chat - a protocol used for Internet chat and
other communications
 POP3 - Post Office protocol Version 3 - a protocol used by e-mail
clients to retrieve messages from remote servers
 SMTP - Simple Mail Transfer Protocol - A protocol for e-mail
messages on the Internet

e. Hardware

What is Networking Hardware?

Networking hardware includes all computers, peripherals, interface cards and


other equipment needed to perform data-processing and communications within
the network. CLICK on the terms below to learn more about those pieces of
networking hardware.

 Workstations
 Hubs
 Bridges
 Firewalls
 Routers

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 16


NET 202 MWF 4:00 – 5:00 PM

 FileServers
 Repeaters

This section provides information on the following components:

 Network Servers
 Workstations
 Network Interface Cards
 Switches
 Repeaters
 Bridges
 Routers
 Firewalls

File/Network Servers

One or more network servers is a part of nearly every local area network.These
are very fast computers with a large amount of RAM and storage space, along
with a one or more fast network interface card(s). The network operating system
provides tools to share server resources and information with network users. A
sophisticated permissions-handling system is included, so that access to sensitive
information can be carefully tailored to the needs of the users. For small
networks, a singe network server may provide access control, file sharing, printer
sharing, email, database, and other services.

The network server may be responding to requests from many network users
simultaneously. For example, it may be asked to load a word processor program
to one workstation, receive a database file from another workstation, and store an
e-mail message during the same time period. This requires a computer that can
store and quickly share large amounts of information. When configuring such a
server, budget is usually the controlling factor. The following guidelines should
be followed:

 Fastest processor(s)
 Large amount of RAM
 multiple large, fast hard drives
 Extra expansion slots
 Fast network interface card(s)

Optionally (if no other such devices are available on the network):

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 17


NET 202 MWF 4:00 – 5:00 PM

 A RAID (Redundant Array of Inexpensive Disks) to preserve large


amounts of data(even after a disk failure)
 A back-up unit (i.e. DAT tape drive, removable hard drives, or
CD/DVD/BluRay burner)

Workstations

Computers that humans use are broadly categorized as workstations. A typical


workstation is a computer that is configured with a network interface card,
networking software, and the appropriate cables. Workstations do not necessarily
need large storage hard drives, because files can be saved on the file server.
Almost any computer can serve as a network workstation.

Laptops/Mobile Devices

Laptops and other mobile devices are becoming more and more common. These
devices typically have modest internal storage, but enough power to serve as a
workstation for users on the go. These machines nearly always have a wireless
adapter to allow quick network connections without cumbersome cabling. In a
school environment with good wireless coverage, a mobile device user can move
about the campus freely, and remain continuously connected to the network.

Network Interface Cards

The network interface card (NIC) provides the physical connection between the
network and the computer workstation. Most NICs are internal, and they are
included in the purchase of most computers. Network interface cards are a major
factor in determining the speed and performance of a network. It is a good idea to
use the fastest network card available for the type of workstation you are using.

The most common network interface connections are Ethernet cards and wireless
adapters.

Ethernet Cards

Ethernet cards are usually included with a computer, although additional ethernet
cards can be purchased and installed on most computers,. Ethernet cards can
contain connections for either coaxial or twisted pair cables (or both) (See fig. 1).
If it is designed for coaxial cable, the connection will be BNC. If it is designed
for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 18


NET 202 MWF 4:00 – 5:00 PM

contain an AUI connector. This can be used to attach coaxial, twisted pair, or
fiber optics cable to an Ethernet card. When this method is used there is always
an external transceiver attached to the workstation. Only the RJ-45 connector is
found on most modern ethernet cards (See the Cabling section for more
information on connectors.)

Fig. 1. Ethernet card.

From top to bottom:

RJ-45, AUI, and BNC connectors

Wireless Adapters

Wireless adapters are found in most portable devices, such as laptops, smart
phones, and tablet devices. External wireless adapters can be purchased and
installed on most computers having an open USB (Universal Serial Bus) port, or
unused expansion slot. (See the Cabling section for more information on
connectors.)

Switches

An ethernet switch is a device that provides a central connection point for cables
from workstations, servers, and peripherals. In a star topology, twisted-pair wire

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 19


NET 202 MWF 4:00 – 5:00 PM

is run from each workstation to a central switch/hub. Most switches are active,
that is they electrically amplify the signal as it moves from one device to another.
The predecessor of the switch was the hub, which broadcasted all inbound
packets out all ports of the device, creating huge amounts of unnecessary
network traffic. Modern switches build a port map of all IP address which
respond on each port, and only broadcasts on all ports when it doesn't have a
packet's target IP address already in its port map. Switches are:

 Usually configured with 8, 12, or 24 RJ-45 ports


 Often used in a star or tree topology
 Available as "managed" or "unmanaged", with the later less expensive,
but adequate for smaller networks
 direct replacements for hubs, immediately reducing network traffic in
most networks
 Usually installed in a standardized metal rack that also may
store network servers, bridges, or routers

Repeaters

Since a signal loses strength as it passes along a cable, it is often necessary to


boost the signal with a device called a repeater. The repeater electrically
amplifies the signal it receives and rebroadcasts it. Repeaters can be separate
devices or they can be incorporated into a concentrator. They are used when the
total length of your network cable exceeds the standards set for the type of cable
being used.

A good example of the use of repeaters would be in a local area network using a
star topology with unshielded twisted-pair cabling. The length limit for
unshielded twisted-pair cable is 100 meters. The most common configuration is
for each workstation to be connected by twisted-pair cable to a multi-port active
concentrator. The concentrator amplifies all the signals that pass through it
allowing for the total length of cable on the network to exceed the 100 meter
limit.

Bridges

A bridge is a device that allows you to segment a large network into two smaller,
more efficient networks. If you are adding to an older wiring scheme and want
the new network to be up-to-date, a bridge can connect the two.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 20


NET 202 MWF 4:00 – 5:00 PM

A bridge monitors the information traffic on both sides of the network so that it
can pass packets of information to the correct location. Most bridges can "listen"
to the network and automatically figure out the address of each computer on both
sides of the bridge. The bridge can inspect each message and, if necessary,
broadcast it on the other side of the network.

The bridge manages the traffic to maintain optimum performance on both sides
of the network. You might say that the bridge is like a traffic cop at a busy
intersection during rush hour. It keeps information flowing on both sides of the
network, but it does not allow unnecessary traffic through. Bridges can be used to
connect different types of cabling, or physical topologies. They must, however,
be used between networks with the same protocol.

Routers

Routers are the traffic directors of the global internet. All routers maintain
complex routing tables which allow them to determine appropriate paths for
packets destined for any address. Routers communicate with each other, and
forward network packets out of or into a network. Here's an example:

You want to search for something on the internet using a search engine. You
open a browser on your workstation. The browser opens to a blank page (not
usually the default, but appropriate for this example). You type
"http://www.google.com" into the URL (Universal Resource Locator) address
line of the browser. The browser software packages up the URL you typed, and
sends it with a request for an IP address to the DNS (Domain Name Server) that
has been set in your network adapter's configuration. The domain server returns
an IP, such as 74.125.67.103 (actual address returned by DNS for google.com on
June 7th, 2011). The browser ships the request for that IP address off to the
network card, which bundles the request into an ethernet packet, destined for
74.125.67.103. The network card sends the packet to the gateway of your
network, which opens the header of the packet, and makes a determination that
the packet is traveling out of your network, in search of 74.125.67.103. Your
network's router has routing tables which it has been building from
communicating with other routers, and potentially augmented with "static
routes", which are specific paths added by your network's administrators to make
the task of accessing certain networks easier, or faster, or in some cases, not
possible. In this case, I find that my router knows about another router at my
ISP(Internet Service Provider), which in turn has several more routers that are all
on networks of which I am just a small node, much like finding an atom of a
molecule of a piece of dust on a rock on a moon of a planet of a sun of a galaxy

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 21


NET 202 MWF 4:00 – 5:00 PM

of the universe. In any case, the packet gets passed from router to router, each
time moving out of the subnets of the packet sender, towards a router that will
know where the desired server is. The packet finally reaches the router of the
network at 74.125.67.103, which dutifully delivers the packet to the server at that
IP address. The server carefully crafts a response, and sends a reply back, which
follows the same process to get the response "Yes. Go ahead" back to the
requester. Whew. And that's just the initial request.

While bridges know the addresses of all computers on each side of the network,
routers know the addresses other routers which in turn know about their own
networks. Routers can even "listen" to entire networks to determine which
sections are busiest -- they can then redirect data around those sections until
traffic congestion clears.

So, routers are network gateways. They move network packets from one network
to another, and many can convert from one network protocol to another as
necessary. Routers select the best path to route a message, based on the
destination address of the packet. The router can direct traffic to prevent head-on
collisions, and is smart enough to know when to direct traffic along back roads
and shortcuts.

If you have a school LAN that you want to connect to the Internet, you will need
to purchase a router. In this case, the router serves as the forwarder between the
information on your LAN and the Internet. It also determines the best route to
send the data over the Internet.

Firewalls

A firewall is a networking device that is installed at the entrance to a LAN when


connecting a networks together, particularly when connecting a private network
to a public network, such as the internet. The firewall uses rules to filter traffic
into and out of the private network, to protect the private network users and data
from malevolent hackers.

Firewalls are either hardware or software, depending on their intended use. A


firewall used to protect a network is a hardware device that should be installed in
the network between the router and the network. Almost all hardware firewalls
will have at least two ports, labeled "Trusted" and "Untrusted". These terms
imply the true nature of the firewall's responsibility to the private network. The
public network is connected to the untrusted network port, and the private
network is connected to the trusted port.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 22


NET 202 MWF 4:00 – 5:00 PM

Firewall rules are usually simple, consisting of a verb, either allow or deny, the
direction of the traffic, either inbound or outbound, and an address or other
network traffic identifier. Firewall rules are cumulative, so general rules may be
specified, and exceptions added as necessary. Some examples are:

 Allow outbound all (all private network users can do anything on the
public network)
 Deny inbound all (default setting to prevent all traffic from the public or
untrusted port, to the private port)
 Allow inbound port 80 (allow internet web traffic to come into network
to find web servers)
 Allow inbound port 80 destined to 170.200.201.25 (allow inbound web
traffic to a specific web server on your private network)
 Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a
specific IP address or range of addresses)

Software firewalls are commonly included in modern workstation and server


operating systems. They operate in a similar way as hardware firewalls, except
that they filter traffic in and out of the machine itself. These software firewalls
are typically unnoticed by machine users, and only need attention occasionslly
when an internet-connected application don't work as expected. The software
firewall should always be considered a "suspect" in such cases. The problem is
easily resolved, by setting an exception rule in the firewall for the software that is
attempting to communicate.

f. Cabling

What is Network Cabling?

Cable is the medium through which information usually moves from one network
device to another. There are several types of cable which are commonly used
with LANs. In some cases, a network will utilize only one type of cable, other
networks will use a variety of cable types. The type of cable chosen for a network
is related to the network's topology, protocol, and size. Understanding the
characteristics of different types of cable and how they relate to other aspects of a
network is necessary for the development of a successful network.

The following sections discuss the types of cables used in networks and other
related topics.

 Unshielded Twisted Pair (UTP) Cable

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 23


NET 202 MWF 4:00 – 5:00 PM

 Shielded Twisted Pair (STP) Cable


 Coaxial Cable
 Fiber Optic Cable
 Cable Installation Guides
 Wireless LANs
 Unshielded Twisted Pair (UTP) Cable

Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks (See fig. 1).

Fig.1. Unshielded twisted pair

The quality of UTP may vary from telephone-grade wire to extremely high-speed
cable. The cable has four pairs of wires inside the jacket. Each pair is twisted
with a different number of twists per inch to help eliminate interference from
adjacent pairs and other electrical devices. The tighter the twisting, the higher the
supported transmission rate and the greater the cost per foot. The EIA/TIA
(Electronic Industry Association/Telecommunication Industry Association) has
established standards of UTP and rated six categories of wire (additional
categories are emerging).

Categories of Unshielded Twisted Pair

Category Speed Use

1 1 Mbps Voice Only (Telephone Wire)

2 4 Mbps LocalTalk & Telephone (Rarely used)

3 16 Mbps 10BaseT Ethernet

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 24


NET 202 MWF 4:00 – 5:00 PM

4 20 Mbps Token Ring (Rarely used)

5 100 Mbps (2 pair) 100BaseT Ethernet

5 1000 Mbps (4 pair) Gigabit Ethernet

5e 1,000 Mbps Gigabit Ethernet

6 10,000 Mbps Gigabit Ethernet

Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45


connector. This is a plastic connector that looks like a large telephone-style
connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way.
RJ stands for Registered Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard designates which wire
goes with each pin inside the connector.

Fig. 2. RJ-45 connector

Shielded Twisted Pair (STP) Cable

Although UTP cable is the least expensive cable, it may be susceptible to


radio and electrical frequency interference (it should not be too close to
electric motors, fluorescent lights, etc.). If you must place cable in
environments with lots of potential interference, or if you must place cable in
extremely sensitive environments that may be susceptible to the electrical

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 25


NET 202 MWF 4:00 – 5:00 PM

current in the UTP, shielded twisted pair may be the solution. Shielded
cables can also help to extend the maximum distance of the cables.

Shielded twisted pair cable is available in three different configurations:

1. Each pair of wires is individually shielded with foil.


2. There is a foil or braid shield inside the jacket covering all wires (as
a group).
3. There is a shield around each individual pair, as well as around the
entire group of wires (referred to as double shield twisted pair).

Coaxial Cable

Coaxial cabling has a single copper conductor at its center. A plastic layer
provides insulation between the center conductor and a braided metal shield
(See fig. 3). The metal shield helps to block any outside interference from
fluorescent lights, motors, and other computers.

Fig. 3. Coaxial cable

Although coaxial cabling is difficult to install, it is highly resistant to signal


interference. In addition, it can support greater cable lengths between
network devices than twisted pair cable. The two types of coaxial cabling are
thick coaxial and thin coaxial.

Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the


specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to
the approximate maximum segment length being 200 meters. In actual fact
the maximum segment length is 185 meters. Thin coaxial cable has been
popular in school networks, especially linear bus networks.

Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the


specifications for thick coaxial cable carrying Ethernet signals. The 5 refers
to the maximum segment length being 500 meters. Thick coaxial cable has
an extra protective plastic cover that helps keep moisture away from the
center conductor. This makes thick coaxial a great choice when running

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 26


NET 202 MWF 4:00 – 5:00 PM

longer lengths in a linear bus network. One disadvantage of thick coaxial is


that it does not bend easily and is difficult to install.

Coaxial Cable Connectors

The most common type of connector used with coaxial cables is the Bayone-
Neill-Concelman (BNC) connector (See fig. 4). Different types of adapters
are available for BNC connectors, including a T-connector, barrel connector,
and terminator. Connectors on the cable are the weakest points in any
network. To help avoid problems with your network, always use the BNC
connectors that crimp, rather screw, onto the cable.

Fig. 4. BNC connector

Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by several


layers of protective materials (See fig. 5). It transmits light rather than
electronic signals eliminating the problem of electrical interference. This
makes it ideal for certain environments that contain a large amount of
electrical interference. It has also made it the standard for connecting
networks between buildings, due to its immunity to the effects of moisture
and lighting.

Fiber optic cable has the ability to transmit signals over much longer
distances than coaxial and twisted pair. It also has the capability to carry
information at vastly greater speeds. This capacity broadens communication
possibilities to include services such as video conferencing and interactive
services. The cost of fiber optic cabling is comparable to copper cabling;
however, it is more difficult to install and modify. 10BaseF refers to the
specifications for fiber optic cable carrying Ethernet signals.

The center core of fiber cables is made from glass or plastic fibers (see fig 5).
A plastic coating then cushions the fiber center, and kevlar fibers help to

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 27


NET 202 MWF 4:00 – 5:00 PM

strengthen the cables and prevent breakage. The outer insulating jacket made
of teflon or PVC.

Fig. 5. Fiber optic cable

There are two common types of fiber cables -- single mode and multimode.
Multimode cable has a larger diameter; however, both cables provide high
bandwidth at high speeds. Single mode can provide more distance, but it is
more expensive.

Specification Cable Type

10BaseT Unshielded Twisted Pair

10Base2 Thin Coaxial

10Base5 Thick Coaxial

100BaseT Unshielded Twisted Pair

100BaseFX Fiber Optic

100BaseBX Single mode Fiber

100BaseSX Multimode Fiber

1000BaseT Unshielded Twisted Pair

1000BaseFX Fiber Optic

1000BaseBX Single mode Fiber

1000BaseSX Multimode Fiber

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 28


NET 202 MWF 4:00 – 5:00 PM

Installing Cable - Some Guidelines

When running cable, it is best to follow a few simple rules:

 Always use more cable than you need. Leave plenty of slack.
 Test every part of a network as you install it. Even if it is brand new,
it may have problems that will be difficult to isolate later.
 Stay at least 3 feet away from fluorescent light boxes and other
sources of electrical interference.
 If it is necessary to run cable across the floor, cover the cable with
cable protectors.
 Label both ends of each cable.
 Use cable ties (not tape) to keep cables in the same location together.

Wireless LANs

More and more networks are operating without cables, in the wireless mode.
Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of
transceiver/antenna to send and receive the data. Information is relayed
between transceivers as if they were physically connected. For longer
distance, wireless communications can also take place through cellular
telephone technology, microwave transmission, or by satellite.

Wireless networks are great for allowing laptop computers, portable devices,
or remote computers to connect to the LAN. Wireless networks are also
beneficial in older buildings where it may be difficult or impossible to install
cables.

The two most common types of infrared communications used in schools are
line-of-sight and scattered broadcast. Line-of-sight communication means
that there must be an unblocked direct line between the workstation and the
transceiver. If a person walks within the line-of-sight while there is a
transmission, the information would need to be sent again. This kind of

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 29


NET 202 MWF 4:00 – 5:00 PM

obstruction can slow down the wireless network. Scattered infrared


communication is a broadcast of infrared transmissions sent out in multiple
directions that bounces off walls and ceilings until it eventually hits the
receiver. Networking communications with laser are virtually the same as
line-of-sight infrared networks.

Wireless standards and speeds

The Wi-Fi Alliance is a global, non-profit organization that helps to ensure


standards and interoperability for wireless networks, and wireless networks
are often referred to as WiFi (Wireless Fidelity). The original Wi-Fi standard
(IEEE 802.11) was adopted in 1997. Since then many variations have
emerged (and will continue to emerge). Wi-Fi networks use the Ethernet
protocol.

Standard Max Speed Typical Range

802.11a 54 Mbps 150 feet

802.11b 11 Mbps 300 feet

802.11g 54 Mbps 300 feet

802.11n 100 Mbps 300+ feet

Wireless Security

Wireless networks are much more susceptible to unauthorized use than


cabled networks. Wireless network devices use radio waves to communicate
with each other. The greatest vulnerability to the network is that rogue
machines can "eves-drop" on the radio wave communications. Unencrypted
information transmitted can be monitored by a third-party, which, with the
right tools (free to download), could quickly gain access to your entire
network, steal valuable passwords to local servers and online services, alter
or destroy data, and/or access personal and confidential information stored in
your network servers. To minimize the possibility of this, all modern access
points and devices have configuration options to encrypt transmissions.
These encryption methodologies are still evolving, as are the tools used by
malicious hackers, so always use the strongest encryption available in your
access point and connecting devices.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 30


NET 202 MWF 4:00 – 5:00 PM

A NOTE ON ENCRYPTION: As of this writing WEP (Wired Equivalent


Privacy) encryption can be easily hacked with readily-available free tools
which circulate the internet. WPA and WPA2 (WiFi Protected Access
versions 1 and 2) are much better at protecting information, but using weak
passwords or passphrases when enabling these encryptions may allow them
to be easily hacked. If your network is running WEP, you must be very
careful about your use of sensitive passwords or other data.

Three basic techniques are used to protect networks from unauthorized


wireless use. Use any and all of these techniques when setting up your
wireless access points:

Encryption.
Enable the strongest encryption supported by the devices you will be
connecting to the network. Use strong passwords (strong passwords
are generally defined as passwords containing symbols, numbers,
and mixed case letters, at least 14 characters long).
Isolation.
Use a wireless router that places all wireless connections on a subnet
independent of the primary private network. This protects your
private network data from pass-through internet traffic.
Hidden SSID.
Every access point has a Service Set IDentifier (SSID) that by
default is broadcast to client devices so that the access point can
be found. By disabling this feature, standard client connection
software won't be able to "see" the access point. However, the
eves-dropping programs discussed previously can easily find
these access points, so this alone does little more than keep the
access point name out of sight for casual wireless users.
Advantages of wireless networks:

 Mobility - With a laptop computer or mobile device, access can be


available throughout a school, at the mall, on an airplane, etc. More
and more businesses are also offering free WiFi access ("Hot spots").
 Fast setup - If your computer has a wireless adapter, locating a
wireless network can be as simple as clicking "Connect to a

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 31


NET 202 MWF 4:00 – 5:00 PM

Network" -- in some cases, you will connect automatically to


networks within range.
 Cost - Setting up a wireless network can be much more cost effective
than buying and installing cables.
 Expandability - Adding new computers to a wireless network is as
easy as turning the computer on (as long as you do not exceed the
maximum number of devices).

Disadvantages of wireless networks:

 Security - Be careful. Be vigilant. Protect your sensitive data with


backups, isolated private networks, strong encryption and passwords,
and monitor network access traffic to and from your wireless
network.
 Interference - Because wireless networks use radio signals and
similar techniques for transmission, they are susceptible to
interference from lights and electronic devices.
 Inconsistent connections - How many times have you hears "Wait a
minute, I just lost my connection?" Because of the interference
caused by electrical devices and/or items blocking the path of
transmission, wireless connections are not nearly as stable as those
through a dedicated cable.
 Speed - The transmission speed of wireless networks is improving;
however, faster options (such as gigabit Ethernet) are available via
cables. If you are only using wireless for internet access, the actual
internet connection for your home or school is generally slower than
the wireless network devices, so that connection is the bottleneck. If
you are also moving large amounts of data around a private network,
a cabled connection will enable that work to proceed much faster.

g. Topology

What is a Topology?

The physical topology of a network refers to the configuration of cables,


computers, and other peripherals. Physical topology should not be confused with

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 32


NET 202 MWF 4:00 – 5:00 PM

logical topology which is the method used to pass information between


workstations. Logical topology was discussed in the Protocol chapter.

Main Types of Physical Topologies

The following sections discuss the physical topologies used in networks and
other related topics.

 Linear Bus
 Star
 Tree (Expanded Star)
 Considerations When Choosing a Topology
 Summary Chart

Linear Bus

A linear bus topology consists of a main run of cable with a terminator at each
end (See fig. 1). All nodes (file server, workstations, and peripherals) are
connected to the linear cable.

Fig. 1. Linear Bus topology

Advantages of a Linear Bus Topology

 Easy to connect a computer or peripheral to a linear bus.


 Requires less cable length than a star topology.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 33


NET 202 MWF 4:00 – 5:00 PM

Disadvantages of a Linear Bus Topology

 Entire network shuts down if there is a break in the main cable.


 Terminators are required at both ends of the backbone cable.
 Difficult to identify the problem if the entire network shuts down.
 Not meant to be used as a stand-alone solution in a large building.

Star

A star topology is designed with each node (file server, workstations, and
peripherals) connected directly to a central network hub, switch, or concentrator
(See fig. 2).

Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and
controls all functions of the network. It also acts as a repeater for the data flow.
This configuration is common with twisted pair cable; however, it can also be
used with coaxial cable or fiber optic cable.

Fig. 2. Star topology

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 34


NET 202 MWF 4:00 – 5:00 PM

Advantages of a Star Topology

 Easy to install and wire.


 No disruptions to the network when connecting or removing devices.
 Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

 Requires more cable length than a linear topology.


 If the hub, switch, or concentrator fails, nodes attached are disabled.
 More expensive than linear bus topologies because of the cost of the
hubs, etc.

Tree or Expanded Star

A tree topology combines characteristics of linear bus and star topologies. It


consists of groups of star-configured workstations connected to a linear bus
backbone cable (See fig. 3). Tree topologies allow for the expansion of an
existing network, and enable schools to configure a network to meet their needs.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 35


NET 202 MWF 4:00 – 5:00 PM

Fig. 3. Tree topology

Advantages of a Tree Topology

 Point-to-point wiring for individual segments.


 Supported by several hardware and software venders.

Disadvantages of a Tree Topology

 Overall length of each segment is limited by the type of cabling used.


 If the backbone line breaks, the entire segment goes down.
 More difficult to configure and wire than other topologies.

5-4-3 Rule

A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3


rule. One aspect of the Ethernet protocol requires that a signal sent out on the

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 36


NET 202 MWF 4:00 – 5:00 PM

network cable reach every part of the network within a specified length of time.
Each concentrator or repeater that a signal goes through adds a small amount of
time. This leads to the rule that between any two nodes on the network there can
only be a maximum of 5 segments, connected through 4 repeaters/concentrators.
In addition, only 3 of the segments may be populated (trunk) segments if they are
made of coaxial cable. A populated segment is one that has one or more nodes
attached to it. In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on
the network have 4 segments and 3 repeaters/concentrators between them.

NOTE: This rule does not apply to other network protocols or Ethernet networks
where all fiber optic cabling or a combination of a fiber backbone with UTP
cabling is used. If there is a combination of fiber optic backbone and UTP
cabling, the rule would translate to a 7-6-5 rule. The speed of networking
switches is vastly improved over older technologies, and while every effort
should be made to limit network segment traversal, efficient switching can allow
much larger numbers of segments to be traversed with little or no impact to the
network.

Considerations When Choosing a Topology

 Money. A linear bus network may be the least expensive way to install a
network; you do not have to purchase concentrators.
 Length of cable needed. The linear bus network uses shorter lengths of
cable.
 Future growth. With a star topology, expanding a network is easily
done by adding another concentrator.
 Cable type. The most common cable in schools is unshielded twisted
pair, which is most often used with star topologies.

Summary Chart
Physical Topology Common Cable Common Protocol

Linear Bus Twisted Pair


Coaxial Ethernet
Fiber
Star Twisted Pair Ethernet
Fiber
Tree Twisted Pair
Coaxial Ethernet
Fiber

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 37


NET 202 MWF 4:00 – 5:00 PM

h. Software

What is a Network Operating System?

Unlike operating systems, such as Windows that are designed for single users to
control one computer network operating systems (NOS) coordinate the activities
of multiple computers across a network. The network operating system acts as a
director to keep the network running smoothly.

The two major types of network operating systems are:

 Peer-to-Peer
 Client/Server

Nearly all modern networks are a combination of both. The networking design
can be considered independent of the servers and workstations that will share it.

Peer-to-Peer

Peer-to-peer network operating systems allow users to share resources and files
located on their computers and to access shared resources found on other
computers. However, they do not have a file server or a centralized management
source (See fig. 1). In a peer-to-peer network, all computers are considered equal;
they all have the same abilities to use the resources available on the network.
Peer-to-peer networks are designed primarily for small to medium local area
networks. Nearly all modern desktop operating systems, such as Macintosh OSX,
Linux, and Windows, can function as peer-to-peer network operating systems.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 38


NET 202 MWF 4:00 – 5:00 PM

Fig. 1. Peer-to-peer network

Advantages of a peer-to-peer network:

 Less initial expense - No need for a dedicated server.


 Setup - An operating system (such as Windows XP) already in place may
only need to be reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

 Decentralized - No central repository for files and applications.


 Security - Does not provide the security available on a client/server
network.

Client/Server

Client/server network operating systems allow the network to centralize


functions and applications in one or more dedicated file servers (See fig. 2). The
file servers become the heart of the system, providing access to resources and
providing security. Individual workstations (clients) have access to the resources
available on the file servers. The network operating system provides the
mechanism to integrate all the components of the network and allow multiple
users to simultaneously share the same resources irrespective of physical

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 39


NET 202 MWF 4:00 – 5:00 PM

location. UNIX/Linux and the Microsoft family of Windows Servers are


examples of client/server network operating systems.

Fig. 2. Client/server network

Advantages of a client/server network:

 Centralized - Resources and data security are controlled through the


server.
 Scalability - Any or all elements can be replaced individually as needs
increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple
platforms.

Disadvantages of a client/server network:

 Expense - Requires initial investment in dedicated server.


 Maintenance - Large networks will require a staff to ensure efficient
operation.
 Dependence - When server goes down, operations will cease across the
network.

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 40


NET 202 MWF 4:00 – 5:00 PM

Network Operating System Software

The following links include some of the more popular peer-to-peer and
client/server network operating systems.

 Macintosh OS X
 Microsoft Windows Server
 UNIX/Linux

II. LEARNING EXPERIENCES

A. Clarifying Understanding: I GET IT!

D i r e c t

1. What are the layers of OSI Model?

2. What are routers?

3. What is the job of Network layer under the OSI Model?

4. What is LAN?

5. What is NIC?

6. What is WAN?

7. How many layers are there under TCP/IP?

8. What is the Important of the OSI Physical Layer?

9. What does 10Base-T mean?

10. What is a MAC Address?

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 41


NET 202 MWF 4:00 – 5:00 PM

11. What are Firewalls?

12. What is TCP/IP?

13. What is a Link?

14. How IP Addresses arranged and displayed?

15. What is SSID?

16. What is the speed of CAT6 Unshielded Twisted Pair Cable?

17. How can you manage a network using a router?

18. What is DHCP?

19. Why use MAC Address?

20. What a network operating System?

________________________________________________________________________

B. Processing Questions: I CAN EXPLAIN!

1. Describe Network Topology.


2. Briefly describe NAT.
3. Describe Star Topology.
4. Describe Tree Topology.
5. Describe Bus Topology.
6. Explain the difference between TCP and UDP.
7. Explain the difference between Hub and Switch.
8. What are the important differences between MAC and IP address?

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 42


NET 202 MWF 4:00 – 5:00 PM

C. Lifelong Learning: MAKE IT REAL!

What is the impact of computer networking in humanity?

Answer:
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 43


NET 202 MWF 4:00 – 5:00 PM

D. Framing Concepts: NOW I KNOW!

Direction: Give at least 8 network devices and its uses?

Device Use

Sources
https://www.udemy.com/
https://www.computerhope.com/history/network.htm
https://www.tutorialspoint.com/basics_of_computer_science/basics_of_computer_science_networking_terminology.htm
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/network

Cybersecurity Emerging Challenges | 44

You might also like