You are on page 1of 64

Explore the Network

K A Milan Maduranga (MSc. Information Security-UoC,MCSE,CCNP,CCAI,MCT)


Lecturer & Consultant - National Institute of Business Management
Cisco Certified Academy Instructor-Cisco Networking Academy
Microsoft Certified Trainer-Microsoft IT Academy

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Globally Connected
Networking Today
 Network has no boundary and
supports the way we:
• Learn
• Communicate
• Work
• Play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Communicating in a Connected World
What is the Network?
 Are you Online?
• For most of us, the Internet has become a large part of everyday life.

 Who owns the Internet?


• No one owns the Internet.
• It is a worldwide collection of interconnected networks exchanging
information using common standards over telephone wires, fiber-optic
cables, wireless transmissions, and satellite links.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
The physical network that carries Internet traffic
between different computer systems is
the Internet backbone. In the early days of the
Internet, ARPANET served as the system's
backbone. Today, several large corporations
provide the routers and cable that make up the
Internet backbone. These companies are
upstream Internet Service Providers (ISPs).
That means that anyone who wants to access
the Internet must ultimately work with these
companies, which include:

•UUNET
•Level 3
•Verizon
•AT&T
•Qwest
•Sprint
•IBM

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
ARPANET

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Bandwidth vs Throughput

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Download time
Calculate the required time for download of data

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Transmitting Data on the Network
 The Bit
• Computers use binary codes to represent and interpret letters, numbers
and special characters with bits.
• Each group of eight bits, such as the representations of letters and
numbers, is known as a byte.

 Getting Bits Moving


• Bits are transmitted as
signals over copper wire
(electrical pulses), fiber-
optic cable (light pulses),
and wireless (radio waves).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Communicating in a Connected World
It’s All About the Speed
 Measuring Bandwidth
• Digital bandwidth is the amount of data that can flow from one place to
another in a given amount of time measured in the number of bits that
(theoretically) can be sent across the media in a second.

 Measuring Throughput
• Throughput is the actual measure of the transfer of bits across the
media over a given period of time.
• Many factors influence throughput including the amount of data being
sent / received, the types of data being transmitted, and the
accumulated latency created by the number of network devices
encountered between source and destination.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Measuring Bandwidth

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Globally Connected
Providing Resources in a Network
 Networks of Many Sizes
• Small Home / Office Networks
• Medium to Large Networks
• World Wide Network

 Clients and Servers


• Clients request and display information
• Servers provide information to other
devices on the network

 Peer-to-Peer
• Computers can be both server and client at
the same time.
• What are the advantages?
• What are the disadvantages?

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Clients and Servers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Peer-to-Peer Network
What does Peer-to-Peer mean?
Network in which a host can be a client and a server for other
hosts.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
ISPs

 An Internet Service Provider (ISP) is a company the provides


Internet access. The most common ISP is the provider who
delivers Internet to your home or business for a fee.
However, there are 3 levels of ISPs. Tier 1, tier 2, and tier 3
providers. All 3 play an important role in providing Internet
access.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Tier 3 ISP

 A tier 3 ISP is a provider who strictly purchases Internet


transit. A tier 3 provider is the last mile provider who delivers
Internet access to residential homes and businesses.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
SEA-ME-WE 4
 https://en.wikipedia.org/wiki/SEA-ME-WE_4
 South East Asia–Middle East–Western Europe 4 (SEA-ME-
WE 4) is an optical fibre submarine communications cable
system that carries telecommunications ...Lit capacity: 2.3
Tbits/s/pair (two fibre pairs)
 Owner(s): Consortium
 Design capacity: 1.28 Tbit/s (2005); 2.8 Tbit/s ...
 Construction beginning: 2004

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
SEA-ME-WE 5
 https://en.wikipedia.org/wiki/SEA-ME-WE_5
 South East Asia–Middle East–Western Europe 5 (SEA-ME-
WE 5) is an optical fibre submarine communications cable
system that carries telecommunications ...Design
capacity: 24 Tbit/s (3 fibre pairs)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
LANs, WANs, and the
Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Overview of Network Components

The network infrastructure contains three categories of network


components:
 Devices
 Media
 Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
 Network devices:
•Computers
•Hubs
•Switches
•Routers
•Wireless access points
 Network media:
•Twisted-pair copper cabling
•Fiber-optic cabling
•Radio waves

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Network Devices
 Switches
• A switch (multiport bridge) has several ports and refers to a
table of MAC addresses to determine which port to use to
forward the frame.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
 Routers
• Devices that connect entire networks to each other. They use IP
addresses to forward packets to other networks.
• A router can be a computer with special network software installed
or can be a device built by network equipment manufacturers.
• Routers contain tables of IP addresses along with optimal routes
to other networks.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
 Wireless Access Points (WAP)
• Provide network access to wireless devices such as laptops and
PDAs.
• Use radio waves to communicate with radios in computers, PDAs,
and other wireless access points.
• Have limited range of coverage.

 Multipurpose Devices
• Perform more than one function.
• More convenient to purchase and configure just one device.
• Combines the functions of a switch, a router and a wireless access
point into one device.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Network Media
 Communication across a network is carried on a medium.
The medium provides the channel over which the message
travels from source to destination.

Provide the pathway


for data transmission

Interconnect devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Network Media
 Metallic wires within cables - data is encoded into electrical
impulses
 Glass or plastic fibers (fiber optic cable) - data is encoded as
pulses of light
 Wireless transmission - data is encoded using wavelengths
from the electromagnetic spectrum

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
 Network Interface Card –
A NIC, or LAN adapter, provides the physical connection to the
network at the PC or other end device. The media that are
connecting the PC to the networking device, plug directly into
the NIC

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Topology Diagrams
provide a visual map of how the network is connected.

•Physical topology diagrams - Identify the physical location of


intermediary devices and cable installation.
•Logical topology diagrams - Identify devices, ports, and
addressing scheme

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Types of Networks
Network infrastructures can vary greatly in terms of:
 Size of the area covered
 Number of users connected
 Number and types of services available
 Area of responsibility

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
LANs, WANs, and the Internet
LANs and WANs
 Local Area Networks
• Spans across small geographical area
• Interconnects end devices
• Administrated by a single organization
• Provide high speed bandwidth to
internal devices

 WAN Area Networks


• Interconnects LAN
• Administrated by multiple service
providers
• Provide slower speed links between
LANS

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
LANs, WANs, and the Internet
The Internet, Intranets, and Extranets
 Intranets and Extranets

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
The Internet

The Internet is a worldwide collection of interconnected networks


(internetworks or internet for short).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Network Addressing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
IPv4 Addresses and
Subnet Masks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
IPv4 Addresses and Subnet Masks
Purpose of the IPv4 Address
 What is an IPv4 Address?
• Is a logical network address that identifies a particular host
• Configured and is unique on the network for communications
• Is associated with a network interface card

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
IPv4 Addresses and Subnet Masks
IP Address Structure
 IPv4 Addressing
• 32 binary bits
• For ease of use, the 32 bits are group into four 8-bit bytes called octets.
• The octets are represented in dotted-decimal notation.

 Binary to Decimal

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
IPv4 Addresses and Subnet Masks
Parts of an IP Address
 Networks and Hosts
• Logical 32-bit IPv4 address is hierarchical and is made up of two parts
o Network
o Host

When a host is configured with an IP address, it is entered as a dotted


decimal number, such as 192.168.1.5. This IP address must be unique on a
network to ensure data can be sent/received.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Types of IPv4 Addresses
IPv4 Address Classes and Default Subnet Masks
 Classful Addressing
• Class A (0.0.0.0/8 to 127.0.0.0/8) supports extremely large networks.
• Class B (128.0.0.0 /16 – 191.255.0.0 /16) supports the needs of
moderate to large size networks.
• Class C (192.0.0.0 /24 – 223.255.255.0 /24) supports small networks
with a maximum of 254 hosts.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Types of IPv4 Addresses
Public and Private IP Addresses
• Private Addresses - IETF reserved some Internet address space for
private networks.

 Using Private IPv4 Addresses


• Does not connect directly to the Internet
• Visible on local network only
• Loopback address:
127.0.0.0 network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Types of IPv4 Addresses
Unicast, Broadcast and Multicast Addresses
 A Message for Me
• Unique destination MAC
and IP addresses

 Something for Everyone


• Broadcast MAC and IP address:
o MAC address: FFFF:FFFF:FFFF
o Host portion of IP Address is all 1s

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Types of IPv4 Addresses
Unicast, Broadcast and Multicast Addresses (Cont.)
 Just for this Group
• A single packet is sent to a selected set of hosts in the multicast group
• Reserved IPv4 address
o Reserved multicast range: 224.0.0.0 to 239.255.255.255
o Reserved multicast range on local network: 224.0.0.0 to
224.0.0.255

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
How IPv4 Addresses are Obtained
Static and Dynamic Address Assignment
 Assigning Addresses
• Can be done statically or
dynamically
• Assign an IPv4 address, subnet
mask, default gateway and other
necessary info for network
communications

Static IPv4 addresses:


Hosts, such as servers and printers, that need particular addresses
Can be time consuming and error prone
Need to maintain an accurate list of which IPv4 addresses
Dynamic IPv4 Address Assignment
Dynamic Host Configuration Protocol (DHCP) allows for automatic
assignment of addressing information
Preferred method of assignment for a large network
IP addresses can be reallocated when they become available
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
How IPv4 Addresses are Obtained
DHCP Servers
 Where Do DHCP Addresses Come From?
• Medium to large network
o Usually a local dedicated PC-based server
• Home network
o A wireless router can serve as a client to receive IP configuration
information from the ISP
o A wireless router can
act as a DHCP server
for the hosts in the local
network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
LANs, WANs, and the Internet
Internet Connections
 Internet Access Technologies
• Internet Service Provider (ISP)
• Broadband cable
• Broadband Digital Subscriber Line (DSL)
• Wireless WANs
• Mobile Services
• Business DSL
• Leased Lines
• Metro Ethernet

 Types of Internet Connections


• Home and Small Office
• Business

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Home and Small Office Internet Connections

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
 Cable - Typically offered by cable television service providers, the Internet
data signal is carried on the same cable that delivers cable television
 DSL - Digital Subscriber Lines provide a high bandwidth, always on,
connection to the Internet. DSL runs over a telephone line. In general,
small office and home office users connect using Asymmetrical DSL
(ADSL), which means that the download speed is faster than the upload
speed.
 Cellular - Cellular Internet access uses a cell phone network to connect.
Wherever you can get a cellular signal, you can get cellular Internet
access.
 Satellite - The availability of satellite Internet access is a real benefit in
those areas that would otherwise have no Internet connectivity at all.
 Dial-up Telephone - An inexpensive option that uses any phone line and
a modem. The low bandwidth provided by a dial-up modem connection is
usually not sufficient for large data transfer,

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Businesses Internet Connections

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
 Dedicated Leased Line - Leased lines are actually reserved
circuits within the service provider’s network that connect
geographically separated offices for private voice and/or data
networking. The circuits are typically rented at a monthly or
yearly rate. They can be expensive.
 Ethernet WAN - Ethernet WANs extend LAN access
technology into the WAN. Ethernet is a LAN technology you
will learn about in a later chapter. The benefits of Ethernet
are now being extended into the WAN.
 DSL - Business DSL is available in various formats. A
popular choice is Symmetric Digital Subscriber Lines (SDSL)
which is similar to the consumer version of DSL, but provides
uploads and downloads at the same speeds.
 Satellite - Similar to small office and home office users,
satellite service can provide a connection when a wired
solution is not available.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
The Network as a Platform

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
The Network as a Platform
Converged Networks
 Traditional Separate Networks
• Each network with its own rules and

 The Converging Network


• Capable of delivering data, voice, and video over the same network
infrastructure

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Computer to Network Connection
Wireless and Wired Router Configurations
 To connect to a network, attach
a straight-through Ethernet cable
to the NIC port.
 The other end connects to a
router or to a
telecommunications port that is
wired so that data will reach the
router.
 For wireless connections,
configure the router with the
following:
 Network Mode (set the 802.11
standard)
 Network Name (SSID)
 Channel (important when there are
multiple APs in the network)
 Wireless Security (should be WPA2)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Computer to Network Connection
Network Sharing
 All Windows computers on a network must be
part of either a domain or a workgroup.
 Before computers can share resources, they
must share the same domain name or
workgroup name.
 Mapping a local drive is a useful way to
access a single file, specific folders, or an
entire drive between different operating
systems over a network.
 Determine which resources will be shared
over the network and the type of permissions
users will have to the resources.
 Read - user can view data in files and run programs
 Change - user can add files and subfolders, change
the data in files, and delete subfolders and files
 Full Control - user can change permissions of files and
folders

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Network Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Am I at Risk?
Hackers and Intruders
 What Do They Want?
 When the hacker gains access to the network, four types of threat may arise:
Information theft, Identity theft, Data loss / manipulation, and Disruption of
service

 Where Do They Come


From?
 External threats arise from
individuals working outside of an
organization.
 Internal threats occur when
someone has authorized access
to the network through a user
account or has physical access
to the network equipment.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Am I at Risk?
Social Engineering Attacks
 Social Engineering
• In the context of computer and network security, social engineering
refers to a collection of techniques used to deceive internal users into
performing specific actions or revealing confidential information.

 Types of Social Engineering


 Three of the most common methods hackers use to obtain information
directly from authorized users go by unusual names: pretexting, phishing,
and vishing.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Am I at Risk?
Virus, Worms, and Trojan Horses
 Other Types of Attacks
• Malicious software can damage a system, destroy data, as well as deny
access to networks, systems, or services. They can also forward data
and personal details from unsuspecting PC users to criminals.

A worm is similar to a A Trojan horse is


A virus is a program virus, but unlike a program that is
that spreads by virus does not need written to appear like
modifying other to attach itself to an a legitimate program,
programs or files. existing program. when in fact it is an
attack tool.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Methods of Attack

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Methods of Attack
Denial of Service and Brute Force Attacks
 An attacker uses a DoS attack to perform these functions:
• Flood a system or network with traffic to prevent legitimate network traffic from flowing
• Disrupt connections between a client and server to prevent access to a service

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Methods of Attack
Denial of Service and Brute Force Attacks
(Cont.)
 DDoS
• DDoS is a more sophisticated and potentially damaging form of the DoS
attack. It is designed to saturate and overwhelm network links with
useless data.

 Brute Force
• With brute force attacks, a fast computer is used to try to guess
passwords or to decipher an encryption code. The attacker tries a large
number of possibilities in rapid succession to gain access or crack the
code.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Methods of Attack
Other Types of Malware

 Spyware
• Spyware is any program that gathers personal information from your
computer without your permission or knowledge. This information is
sent to advertisers or others on the Internet and can include passwords
and account numbers.

 Adware
• Adware is a form of spyware
used to collect information
about a user based on
websites the user visits. That
information is then used for
targeted advertising.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Methods of Attack
Other Types of Malware
 Botnets and Zombies
• When infected, the “zombie” computer contacts servers managed by the
botnet creator. These servers act as a command and control (C&C)
center for an entire network of compromised devices, or "botnet."

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64

You might also like