Professional Documents
Culture Documents
Cyber Warfare
Basic Networking Concepts
Captain Diogo silva
Lecture 02
Contents
01 Introduction
02 Definitions
03 Network Topology
04 Network Architecture
05 Network Protocols
06 Network Devices
07 Demonstration
01 Introduction
Lecture 02
The first computer network
ARPANET (1969)
Interface Message
Processor
The first rough conceptual design of the ARPANET
https://www.darpa.mil/ddm_gallery/1969%20ARPANET%20290x230.png Interface Message Processor
https://www.darpa.mil/ddm_gallery/1969a_ARPANET_full.jpg
Lecture 02
Takeoff
Ali, Abdelmohsen & Hamouda, Walaa & Uysal, Murat. (2015). Next Generation M2M Cellular Networks: Challenges and Practical Considerations.
IEEE Communications Magazine. 53. 10.1109/MCOM.2015.7263368.
Lecture 02
02 Definitions
Lecture 02
Definition # 1: Network
Lecture 02
Several modern network devices
Images from:
https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Lecture 02
Protocols
Lecture 02
Protocol: Human Analogy
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET
http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
slide from:
https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Lecture 02
Definition #2: Protocol
Lecture 02
Internet
Lecture 02
Definition #3: Internet
Lecture 02
Internet
• In this network of
networks, several
services run, such as
▪ the email service,
▪ the world wide web,
▪ the video conferencing
platforms,
▪ and many other networking applications
• Watch this video with “two fathers” of the internet;
they invented the TCP/IP protocol (first paper).
https://www.youtube.com/
watch?v=UZomljVNNak Lecture 02
Internet
• Internet standards
• RFC: Request for Comments
• IETF: Internet Engineering
Task Force
slide from:
https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Lecture 02
Definition #4:
Mobile Network
• Mobile networks use
antennas that are
organized in cells which
are interconnected.
https://www.publicdomainpictures.net/en/view-image.php?image=365101
• We’re currently operating
the fifth generation of
mobile Internet (5G).
An illustration of a mobile network
Lecture 02
Definition #5: Virtual Private
Networking
• In order to ensure privacy and security Virtual Private
Networks (VPNs) can be used. VPN is a service that
allows the exchange of encrypted communication over
a public network such as the Internet.
• The provider of the service guarantees that the
communication between the sender and the receiver of
an electronic message is encrypted, and no one can
read the information exchanged.
• This and other related security mechanisms, are based
on cryptography.
Lecture 02
A Virtual Private Network
Lecture 02
Definition #6: The Cloud
Lecture 02
A conceptual view of a cloud
infrastructure
Lecture 02
03 Network Topology
Lecture 02
Network Topology
Lecture 02
Personal Area Networks (PANs)
Lecture 02
Local Area Networks (LANs)
Lecture 02
Wide Area Networks (WANs)
Lecture 02
04 Network Architecture
Lecture 02
Network Architecture
Lecture 02
Network Architecture
Data Link
Layer
▪ It is the lowest level and it sets the specifications for the
Network
different networking devices and the electrical signal
Layer
that traverses the network in the form of bits (0 or 1).
▪ The networking devices can be linked with other devices
Transport
Layer
Internet
Layer
either with a wire or wirelessly.
Session
Layer
Presentation
Layer
Application
Layer
Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Data Link Layer (aka L2)
•
Physical
Layer
Data Link
Layer
▪ This layer facilitates the actual addressing of the
Network
networking devices and the physical links among them.
▪ It organizes the transmitted information in data frames
Layer
Transport
Layer and regulates the transmission of these frames within
Internet
Layer
the network.
Session
Layer
Presentation
Layer
Application
Layer
Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Network Layer (aka L3)
•
Physical
Layer
Data Link
Layer
▪ This level enables the communication among different
Network
networks through the logical addressing, namely the
Layer
address of a computer that is used to connect to the
Transport
Layer Internet.
Internet
Layer
▪ It is responsible to route the network packets to the
Session
appropriate path without creating congestion in the
Layer
different parts of the network.
Presentation
Layer
Application
Layer
Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Transport Layer
•
Physical
Layer
Data Link
Layer
▪ It is responsible for the transmission of information
Network
from one host machine to the other by ensuring that
Layer
the communication will be reliable and error-free.
▪ It establishes the communication rules between the
Transport
Layer
Internet
Layer
different hosts and monitors the information flow
Session
between them.
Layer
Presentation
Layer
Application
Layer
Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Session Layer
•
Physical
Layer
Data Link
Layer
▪ This layer, as its name declares, is responsible for
Network
managing the communication session of the hosts.
▪ It regulates and synchronizes the dialogue among the
Layer
Transport
Layer machines and detects any problems that may arise in
Internet
Layer
the communication.
Session
Layer
Presentation
Layer
Application
Layer
Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Presentation Layer
•
Physical
Layer
Data Link
Layer
▪ It is responsible for the format of the data transferred
Network
among different machines and it ensures that data sent
Layer
by the sender can be read by the receiving machine in
Transport
Layer an understandable format.
Internet
Layer
Session
Layer
Presentation
Layer
Application
Layer
Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Application Layer (aka L7)
•
Physical
Layer
Data Link
Layer
▪ The last layer offers services to a variety of applications
Network
such as email exchanging, Internet browsing, file
Layer
downloading and many other applications.
Transport
Layer
Internet
Layer
Session
Layer
Presentation
Layer
Application
Layer
Lecture 02
The OSI reference model running
in two hosts
Lecture 02
in practice, only parts of this
OSI vs. TCP/IP architecture are usually
implemented
Lecture 02
05 Network Protocols
Lecture 02
Network Protocols
Lecture 02
Common Protocols
Lecture 02
Common Protocols
Lecture 02
Common Protocols
• Post Office Protocol Version 3 (POP3) is an IMAP
alternative.
• Domain Name System (DNS) is a protocol of the
same level which translates the name addresses of
the websites to the corresponding unique Internet
address of the website.
• Dynamic Host Configuration Protocol (DHCP) is used
for automatically providing Internet addresses to the
host when they are connecting to a network.
• Session Initiation Protocol (SIP) is a protocol that is
used in multimedia communications such as
teleconferences, music broadcasting or streaming,
voice call over the Internet.
Lecture 02
06 Network Devices
Lecture 02
Network Devices
(NIC)
• networking devices
https://commons.wikimedia.org/wiki/File:Ethernet_NIC_100Mbit_PCI.jpg
Lecture 02
Network Devices
• NICs enables devices to connect
in a network
• NICs acquire a unique
identification number upon
construction - the media access
control address (MAC address) - https://commons.wikimedia.org/wiki/File:Router_1.jpg
Lecture 02
Repeaters
https://www.flickr.com/photos/bcgovphotos/51105701913
Lecture 02
Switches & Routers
Lecture 02
Switches & Routers
Lecture 02
Wireless Access Point
Lecture 02
https://commons.wikimedia.org/wiki/File:Outdoors_Wireless_Access_Point.jpg
Wireless Access Point
Lecture 02
07 Demonstration
Lecture 02
1. IP address
2. Physical address
3. Ping another system
4. Trace the route to another system
07 5. Check IP location
6. IP address of a domain
Lecture 02
Demonstration
Attention
The following set of tools presented in this section
should not be used in a corporate network (e.g.,
HAFA).
Lecture 02
Using “ipconfig”
• “ipconfig” allows to see the network information of
the device
Lecture 02
Using ipconfig
Lecture 02
Using ipconfig
Lecture 02
What is my public IP?
•An approach is to contact someone on the internet
that tells you
Lecture 02
Using “ping” https://ping.eu/
Lecture 02
Using “tracert”
•“tracert” allows you to check a path to a remote host
▪ Example: in the command prompt execute “tracert hafa.haf.gr”
https://tools.keycdn.com/traceroute
Lecture 02
Using “tracert”
Lecture 02
Check an IP location
• Several online services for that
▪ https://www.maxmind.com/en/geoip-demo
▪ Example with some of the previous tracert results (only public IPs)
Lecture 02
Check an IP location
• Several online services for that
▪ https://www.maxmind.com/en/geoip-demo
▪ Example with some of the previous tracert results (only public IPs)
Lecture 02
Using “nslookup”
•“nslookup” allows to check the IP that corresponds to a
specific domain name
▪ Example: in the command prompt execute “nslookup hafa.haf.gr”
https://www.nslookup.io/
Lecture 02
08 Extra activity (optional)
Lecture 02
Packet Tracer Workspace
•Packet tracer is a CISCO virtual lab that provides an interactive
way to practice networking, IoT, and cybersecurity – no
hardware required besides your own laptop!
https://skillsforall.com/course/getting-started-cisco-packet-tracer?userLang=en-US
Lecture 02
Packet Tracer Workspace
Lecture 02
The toolbar with the networking
devices
Lecture 02
Adding a device in the workspace
Lecture 02
Configuring a device
Lecture 02
Configuring the WiFi access point
Lecture 02
Adding the computing devices
Lecture 02
Connecting the desktop computer
Lecture 02
Connecting the wire to the router
Lecture 02
IP Address settings in the desktop
computer
Lecture 02
Replacing the NIC
Lecture 02
Adding the wireless network card
Lecture 02
Connecting to the wireless
network
Lecture 02
The connected devices in our
Home Network
Lecture 02
Communication between the two
devices
Lecture 02
Questions?
Lecture 02
End of lesson quiz
https://forms.gle/a2L8CtwfqXMtfPxn6
● Scan the code or copy
the URL
● Answer the quiz
● Only 1 submission per
student
● Don’t forget your name!
● Limit of 5 minutes
Basic Networking Concepts
Date
The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.
Lecture 02