You are on page 1of 88

International Air Force Semester

Cyber Warfare
Basic Networking Concepts
Captain Diogo silva

Lecture 02
Contents
01 Introduction
02 Definitions

03 Network Topology

04 Network Architecture

05 Network Protocols

06 Network Devices

07 Demonstration
01 Introduction

Lecture 02
The first computer network
ARPANET (1969)

Interface Message
Processor
The first rough conceptual design of the ARPANET
https://www.darpa.mil/ddm_gallery/1969%20ARPANET%20290x230.png Interface Message Processor
https://www.darpa.mil/ddm_gallery/1969a_ARPANET_full.jpg
Lecture 02
Takeoff

Ali, Abdelmohsen & Hamouda, Walaa & Uysal, Murat. (2015). Next Generation M2M Cellular Networks: Challenges and Practical Considerations.
IEEE Communications Magazine. 53. 10.1109/MCOM.2015.7263368.

Lecture 02
02 Definitions

Lecture 02
Definition # 1: Network

• A collection of devices that are able to


communicate and exchange electronic messages
using specific rules is considered a computer
network.
• A network can comprise not only desktop
computers and laptops but also other devices such
as servers, smart phones, televisions, gaming
consoles, cameras, printers, networking devices i.e.,
switches and routers, alarm systems, supervisory
control & data acquisition (SCADA) systems,
manned or unmanned vehicles, satellites, etc.

Lecture 02
Several modern network devices

Images from:
https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Lecture 02
Protocols

Lecture 02
Protocol: Human Analogy

• Persons communicate orally following rules


▪ the persons should first greet each
other
▪ they cannot talk altogether
simultaneously
▪ they should wait the other speakers
to complete their turn and then talk
▪ at the end they should close the
conversation by saluting each other
• Note also that people from different countries
speak different languages
Lecture 02
Protocol: Human Analogy

• Examples of Human Protocols?

Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET
http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time

slide from:
https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Lecture 02
Definition #2: Protocol

• A protocol sets the rules of the communication


among the different interconnected devices.
• It defines the format of the electronic messages,
specifies which device will communicate, when
and how to react when messages are received or
even when the messages are not received.

Lecture 02
Internet

Lecture 02
Definition #3: Internet

• The Internet comprises diverse networks from all over


the world, enabling them to exchange electronic
messages and communicate with each other.
• It is often called a network of networks since it
connects almost all the existing networks of the world.
• The Internet is very important since it enables
heterogenous networks to exchange information by
using specialized equipment, such as switches and
routers, which implement the most common
networking protocols.

Lecture 02
Internet

• In this network of
networks, several
services run, such as
▪ the email service,
▪ the world wide web,
▪ the video conferencing
platforms,
▪ and many other networking applications
• Watch this video with “two fathers” of the internet;
they invented the TCP/IP protocol (first paper).
https://www.youtube.com/
watch?v=UZomljVNNak Lecture 02
Internet

• Internet: “network of networks”


▪ Interconnected ISPs
• protocols are everywhere
• control sending, receiving of
messages
• e.g., HTTP (Web), streaming video,
Skype, TCP, IP, WiFi, 4G, Ethernet

• Internet standards
• RFC: Request for Comments
• IETF: Internet Engineering
Task Force
slide from:
https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Lecture 02
Definition #4:
Mobile Network
• Mobile networks use
antennas that are
organized in cells which
are interconnected.

https://www.publicdomainpictures.net/en/view-image.php?image=365101
• We’re currently operating
the fifth generation of
mobile Internet (5G).
An illustration of a mobile network

Lecture 02
Definition #5: Virtual Private
Networking
• In order to ensure privacy and security Virtual Private
Networks (VPNs) can be used. VPN is a service that
allows the exchange of encrypted communication over
a public network such as the Internet.
• The provider of the service guarantees that the
communication between the sender and the receiver of
an electronic message is encrypted, and no one can
read the information exchanged.
• This and other related security mechanisms, are based
on cryptography.
Lecture 02
A Virtual Private Network

• A virtual private network is established between


the sender and the receiver of the messages over
the public infrastructure

Lecture 02
Definition #6: The Cloud

• These large installations of hundreds of thousands


of computers that are called servers are usually
placed in large data centers that are interconnected
with similar infrastructures in other areas of the
globe.
• The end user of the networking service typically
does not know from which infrastructure is served;
thus, the whole mesh of the interconnected
computers is called Cloud.

Lecture 02
A conceptual view of a cloud
infrastructure

Lecture 02
03 Network Topology

Lecture 02
Network Topology

• Wide Area (WAN) WAN 100-1000km

• Metropolitan Area (MAN)


MAN <10km

• Local Area (LAN) LAN


10m-1km

• Personal Area (PAN) PAN


<10m

Lecture 02
Personal Area Networks (PANs)

• Networks that provide


access to a number of
devices in a short range
around a person are
usually called Personal
Area Networks (PANs).
• A Bluetooth network that connects a smart phone
with Bluetooth earphones is considered a PAN.

Lecture 02
Local Area Networks (LANs)

• Networks that expand to an


apartment or a building are
called Local Area Networks
(LANs)
• A LAN is usually privately
owned either by an individual
or a company.
• The network inside an apartment is considered a
LAN as well as a business network that connects
the computers of a company.
Lecture 02
Metropolitan Area Networks
(MANs)
• Networks that covers a
larger area such as a town
or a city are called
Metropolitan Area
Networks (MANs).
• The MANs usually comprise different LANs that are
installed in the different buildings having a shared
connection to the outer world.

Lecture 02
Wide Area Networks (WANs)

• Networks that usually


expand in different
countries or
continents are called
Wide Area Networks
(WANs) and
interconnect, most of
the times, MANs or
LANs of companies with branches in different countries

Lecture 02
04 Network Architecture

Lecture 02
Network Architecture

• When access to the Internet was possible,


many companies started developing their
networks, and as a result, enormous
difficulties emerged when different
networks attempted to communicate with
each other
• To solve this problem, the International
Standards Organization (ISO) established
different groups of experts to create
networking standards that all
manufacturers of networking devices
adopted (e.g., OSI model a layers approach)

Lecture 02
Network Architecture

Layered approach example: organization of air travel

When you buy a ticket to travel somewhere, what


systems/services must be in place to ensure it?
Network Architecture

Layered approach example: organization of air travel

ticket (purchase) ticketing service ticket (complain)


baggage (check) baggage service baggage (claim)
gates (load) gate service gates (unload)
runway takeoff runway service runway landing
airplane routing routing service airplane routing

each layer implements a service


▪ via its own internal-layer actions
▪ relying on services provided by layer below
slide from:
Lecture 02 https://gaia.cs.umass.edu/kurose_ross/ppt-8e/Chapter_1_v8.1.pptx
Open Systems Interconnection
(OSI) reference model
• The Physical Layer

Physical
Layer

Data Link
Layer
▪ It is the lowest level and it sets the specifications for the
Network
different networking devices and the electrical signal
Layer
that traverses the network in the form of bits (0 or 1).
▪ The networking devices can be linked with other devices
Transport
Layer

Internet
Layer
either with a wire or wirelessly.
Session
Layer

Presentation
Layer

Application
Layer

Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Data Link Layer (aka L2)

Physical
Layer

Data Link
Layer
▪ This layer facilitates the actual addressing of the
Network
networking devices and the physical links among them.
▪ It organizes the transmitted information in data frames
Layer

Transport
Layer and regulates the transmission of these frames within
Internet
Layer
the network.
Session
Layer

Presentation
Layer

Application
Layer

Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Network Layer (aka L3)

Physical
Layer

Data Link
Layer
▪ This level enables the communication among different
Network
networks through the logical addressing, namely the
Layer
address of a computer that is used to connect to the
Transport
Layer Internet.
Internet
Layer
▪ It is responsible to route the network packets to the
Session
appropriate path without creating congestion in the
Layer
different parts of the network.
Presentation
Layer

Application
Layer

Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Transport Layer

Physical
Layer

Data Link
Layer
▪ It is responsible for the transmission of information
Network
from one host machine to the other by ensuring that
Layer
the communication will be reliable and error-free.
▪ It establishes the communication rules between the
Transport
Layer

Internet
Layer
different hosts and monitors the information flow
Session
between them.
Layer

Presentation
Layer

Application
Layer

Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Session Layer

Physical
Layer

Data Link
Layer
▪ This layer, as its name declares, is responsible for
Network
managing the communication session of the hosts.
▪ It regulates and synchronizes the dialogue among the
Layer

Transport
Layer machines and detects any problems that may arise in
Internet
Layer
the communication.
Session
Layer

Presentation
Layer

Application
Layer

Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Presentation Layer

Physical
Layer

Data Link
Layer
▪ It is responsible for the format of the data transferred
Network
among different machines and it ensures that data sent
Layer
by the sender can be read by the receiving machine in
Transport
Layer an understandable format.
Internet
Layer

Session
Layer

Presentation
Layer

Application
Layer

Lecture 02
Open Systems Interconnection
(OSI) reference model
• The Application Layer (aka L7)

Physical
Layer

Data Link
Layer
▪ The last layer offers services to a variety of applications
Network
such as email exchanging, Internet browsing, file
Layer
downloading and many other applications.
Transport
Layer

Internet
Layer

Session
Layer

Presentation
Layer

Application
Layer

Lecture 02
The OSI reference model running
in two hosts

Lecture 02
in practice, only parts of this
OSI vs. TCP/IP architecture are usually
implemented

Lecture 02
05 Network Protocols

Lecture 02
Network Protocols

• Protocols define the rules of communication


• The term network protocols is used in a similar
manner to define the rules for the communication
between two hosts
• In each layer of the network, there is a plethora of
protocols that operate and set the rules for the
communication
• These protocols usually co-exist in a host and
depending on the type of the communication, the
appropriate communication protocols are activated
Lecture 02
Common Protocols
• Internet Protocol (IP) find the most appropriate
route.
• Internet Control Message Protocol (ICMP) exchange
error messages and monitoring information.
• Address Resolution Protocol (ARP) maps the
Internet address of a network device to the
physical address.
• Reverse Address Resolution Protocol (RARP)
performs the reverse operation of ARP.
• Internet Protocol Security (IPSec) encrypts the data
that will be exchanged between two hosts. Used in
Virtual Private Networks (VPNs).

Lecture 02
Common Protocols

• Simple Network Management Protocol


(SNMP) monitoring and management of
network services.
• Transmission Control Protocol (TCP)
establishes communication among hosts,
ensuring the reliable delivery of the
messages.
• User Datagram Protocol (UDP)
transmission of messages inside the
network without guaranteeing reliability,
but it ensures the delivery of the data
among the faster network route.

Lecture 02
Common Protocols

• Hypertext Transfer Protocol (HTTP) is


used for the World Wide Web. HTTPS is
the encrypted version of HTTP.
• File Transfer Protocol (FTP) exchange a
binary or a text file between two hosts.
• Simple Mail Transfer Protocol (SMTP)
exchange of electronic messages
(e-mails) between two parts.
• Internet Message Access Protocol (IMAP)
access the email messages in the e-mail
server using a client software.

Lecture 02
Common Protocols
• Post Office Protocol Version 3 (POP3) is an IMAP
alternative.
• Domain Name System (DNS) is a protocol of the
same level which translates the name addresses of
the websites to the corresponding unique Internet
address of the website.
• Dynamic Host Configuration Protocol (DHCP) is used
for automatically providing Internet addresses to the
host when they are connecting to a network.
• Session Initiation Protocol (SIP) is a protocol that is
used in multimedia communications such as
teleconferences, music broadcasting or streaming,
voice call over the Internet.

Lecture 02
06 Network Devices

Lecture 02
Network Devices

Computer networks require


specialized equipment,
distinguished in two broad
categories:
• network interface cards https://commons.wikimedia.org/wiki/File:Router_1.jpg

(NIC)
• networking devices

https://commons.wikimedia.org/wiki/File:Ethernet_NIC_100Mbit_PCI.jpg

Lecture 02
Network Devices
• NICs enables devices to connect
in a network
• NICs acquire a unique
identification number upon
construction - the media access
control address (MAC address) - https://commons.wikimedia.org/wiki/File:Router_1.jpg

and is used to uniquely identify


the specific interface card
• This address is used in order to
deliver a data packet to the
specific computing machine
https://commons.wikimedia.org/wiki/File:Ethernet_NIC_100Mbit_PCI.jpg

Lecture 02
Repeaters

• The main objective of a


repeater is to strengthen the
signal of a network

https://www.flickr.com/photos/bcgovphotos/51105701913

Lecture 02
Switches & Routers

Switches connect different devices together.

Routers connect different networks together.


https://www.flickr.com/photos/opengridscheduler/16480450157

Lecture 02
Switches & Routers

• Switches usually connect a great number of


devices and thus have several ports.
• Routers act as gateways of the local networks to
connect to other networks or the Internet
https://www.flickr.com/photos/opengridscheduler/16480450157

Lecture 02
Wireless Access Point

• For interconnecting mobile


devices (e.g., smart phones,
laptops, tablets) we use
Wireless Access Points
• Establishment a wireless
network for the mobile devices
in a specific area.
• Area may range from a few
square meters in a house to
larger areas such as University
campuses or airports.

Lecture 02
https://commons.wikimedia.org/wiki/File:Outdoors_Wireless_Access_Point.jpg
Wireless Access Point

• It is possible to combine a network of wireless


access points in order to cover larger areas by
connecting many of them with a switch

Lecture 02
07 Demonstration

Lecture 02
1. IP address
2. Physical address
3. Ping another system
4. Trace the route to another system
07 5. Check IP location
6. IP address of a domain
Lecture 02
Demonstration

Attention
The following set of tools presented in this section
should not be used in a corporate network (e.g.,
HAFA).

Although they are not harmful, typical users do not


use these tools, and their use can flag an alert in
monitoring systems.

Lecture 02
Using “ipconfig”
• “ipconfig” allows to see the network information of
the device

▪ First step: open command prompt

▪ Second step: write “ipconfig” and


press “enter”

Lecture 02
Using ipconfig

Lecture 02
Using ipconfig

Lecture 02
What is my public IP?
•An approach is to contact someone on the internet
that tells you

Lecture 02
Using “ping” https://ping.eu/

•“ping” allows checking for connectivity with a remote


host
▪ Example: in the command prompt, execute “ping hafa.haf.gr”

Lecture 02
Using “tracert”
•“tracert” allows you to check a path to a remote host
▪ Example: in the command prompt execute “tracert hafa.haf.gr”

https://tools.keycdn.com/traceroute

Lecture 02
Using “tracert”

Lecture 02
Check an IP location
• Several online services for that
▪ https://www.maxmind.com/en/geoip-demo
▪ Example with some of the previous tracert results (only public IPs)

Lecture 02
Check an IP location
• Several online services for that
▪ https://www.maxmind.com/en/geoip-demo
▪ Example with some of the previous tracert results (only public IPs)

Lecture 02
Using “nslookup”
•“nslookup” allows to check the IP that corresponds to a
specific domain name
▪ Example: in the command prompt execute “nslookup hafa.haf.gr”

https://www.nslookup.io/

Lecture 02
08 Extra activity (optional)

Lecture 02
Packet Tracer Workspace
•Packet tracer is a CISCO virtual lab that provides an interactive
way to practice networking, IoT, and cybersecurity – no
hardware required besides your own laptop!

•The course in the following link introduces you to the Cisco


Packet Tracer simulation environment.

https://skillsforall.com/course/getting-started-cisco-packet-tracer?userLang=en-US

Lecture 02
Packet Tracer Workspace

Lecture 02
The toolbar with the networking
devices

Lecture 02
Adding a device in the workspace

Lecture 02
Configuring a device

Lecture 02
Configuring the WiFi access point

Lecture 02
Adding the computing devices

Lecture 02
Connecting the desktop computer

Lecture 02
Connecting the wire to the router

Lecture 02
IP Address settings in the desktop
computer

Lecture 02
Replacing the NIC

Lecture 02
Adding the wireless network card

Lecture 02
Connecting to the wireless
network

Lecture 02
The connected devices in our
Home Network

Lecture 02
Communication between the two
devices

Lecture 02
Questions?

Lecture 02
End of lesson quiz
https://forms.gle/a2L8CtwfqXMtfPxn6
● Scan the code or copy
the URL
● Answer the quiz
● Only 1 submission per
student
● Don’t forget your name!
● Limit of 5 minutes
Basic Networking Concepts
Date

International Air Force Semester


2020-1-EL01-KA203-079068

The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.

Lecture 02

You might also like