Professional Documents
Culture Documents
Computer networks components comprise both physical parts as well as the software
required for installing computer networks, both at organizations and at home. The
hardware components are the server, client, peer, transmission medium, and connecting
devices. The software components are operating system and protocols.
.
Computer networks components
Modem: It converts analog signal to digital and vice versa.
Firewall: A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
A firewall typically establishes a barrier between a trusted network and an untrusted
network, such as the Internet.
It decides whether the traffic is allowed to flow or not. The firewall can be implemented
as hardware and software, or a combination of both.
.
Types of Firewalls:
Packet Filters –
It works in the network layer of the OSI Model. It applies a set of rules (based on the contents of IP and
transport header fields) on each packet and based on the outcome, decides to either forward or discard
the packet.
Security threats to Packet Filters:
IP address Spoofing:
In this kind of attack, an intruder from the outside tries to send a packet towards the internal corporate
network with the source IP address set equal to one of the IP address of internal users.
Prevention:
Firewall can defeat this attack if it discards all the packets that arrive at the incoming side of the firewall,
with source IP equal to one of the internal IPs.
Source Routing Attacks:
In this kind of attack, the attacker specifies the route to be taken by the packet with a hope to fool the
firewall.
Prevention:
Firewall can defeat this attack if it discards all the packets that use the option of source routing aka path
addressing.
Tiny Fragment Attacks:
Many times, the size of the IP packet is greater than the maximum size allowed by the underlying network
such as Ethernet, Token Ring etc. In such cases, the packet needs to be fragmented, so that it can be
carried further. The attacker uses this characteristic of TCP/IP protocol. In this kind of attack, the attacker
intentionally creates fragments of the original packet and send it to fool the firewall.
Prevention:Firewall can defeat this attack if it discards all the packets which use the TCP protocol and is
fragmented. Dynamic Packet Filters allow incoming TCP packets only if they are responses to the
outgoing TCP packets.
.
2. Application Gateways –
It is also known as Proxy server. It works as follows:
Step-1: User contacts the application gateway using a TCP/IP application such as HTTP.
Step-2: The application gateway asks about the remote host with which the user wants to
establish a connection. It also asks for the user id and password that is required to access the
services of the application gateway.
Step-3: After verifying the authenticity of the user, the application gateway accesses the
remote host on behalf of the user to deliver the packets.
3. Stateful Inspection Firewalls –
It is also known as ‘Dynamic Packet Filters’. It keeps track of the state of active connections
and uses this information to decide which packets to allow through it, i.e., it adapts itself to
the current exchange of information, unlike the normal packet filters/stateless packet filters,
which have hardcoded routing rules.
4. Circuit-Level Gateways –
It works at the session layer of the OSI Model. It is the advanced variation of Application
Gateway. It acts as a virtual connection between the remote host and the internal users by
creating a new connection between itself and the remote host. It also changes the source IP
address in the packet and puts its own address at the place of source IP address of the
packet from end users. This way, the IP addresses of the internal users are hidden and
secured from the outside world.
Hub
A hub is a network hardware device for
connecting multiple Ethernet devices together
and making them act as a single network
segment.
A hub connects multiple wires coming from
different branches
Types of Hub
Active Hub:- These are the hubs which have their own power supply and can
clean, boost, and relay the signal along with the network. These are used to
extend the maximum distance between nodes.
Passive Hub :- These are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.
Intelligent Hub :- It work like active hubs and include remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
Bridge
A bridge is a device that creates a single,
aggregate network from multiple
communication networks.
A bridge operates at data link layer.
A bridge is a repeater, with add on the
functionality of filtering content by reading the
MAC addresses of source and destination.
It is also used for interconnecting two LANs
working on the same protocol.
It has a single input and single output port,
thus making it a 2 port device.
Types of Bridge:
Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or
deleted from the network, reconfiguration of the stations is unnecessary. These
bridges make use of two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by
source station and the frame specifies which route to follow. The host can
discover frame by sending a special frame called discovery frame, which
spreads through the entire network using all possible paths to destination.
Switch
Dynamic routing protocols are another important type of routing protocol. It helps routers
to add information to their routing tables from connected routers automatically. These
types of protocols also send out topology updates whenever the network changes'
topological structure.
Advantage:
Easier to configure even on larger networks.
It will be dynamically able to choose a different route in case if a link goes down.
It helps you to do load balancing between multiple links.
Disadvantage:
Updates are shared between routers, so it consumes bandwidth.
Routing protocols put an additional load on router CPU or RAM.
Internet Routing Protocols:
The following are types of protocols which help data packets find their way
across the Internet:
Routing Information Protocol (RIP)
RIP is used in both LAN and WAN Networks. It also runs on the Application layer of
the OSI model. The full form of RIP is the Routing Information Protocol. Two
versions of RIP are
RIPv1
RIPv2
The original version or RIPv1 helps you determine network paths based on the IP
destination and the hop count journey. RIPv1 also interacts with the network by
broadcasting its IP table to all routers connected with the network.
RIPv2 is a little more sophisticated as it sends its routing table on to a multicast
address.
Interior Gateway Protocol (IGP)