Professional Documents
Culture Documents
20/7059
CYBER SECURITY
OUTLINE
1. Introduction to Networking
Network architecture refers to the underlying structure and design principles that
govern the communication between devices within a network. Two common
architectures are peer-to-peer and client-server models. The peer-to-peer model allows
devices to communicate directly with one another without relying on a central server.
This architecture is often used in smaller networks or for specific applications like file
sharing. The client-server model uses a centralized server to manage and distribute
resources to client devices upon request. This model is widely adopted in enterprise
environments for its scalability and manageability. To standardize communication
across networks, two widely recognized models are the Open Systems
Interconnection (OSI) model and the Transmission Control Protocol/Internet Protocol
(TCP/IP) model. The OSI model defines seven layers, each responsible for specific
functions, ranging from physical transmission to application-level services. The
TCP/IP model, on the other hand, is a more practical model used in modern networks,
consisting of four abstraction layers: network access, internet, transport, and
application.
Network protocols are standardized sets of rules that govern how devices
communicate over a network. Among the most commonly used protocols are:
IPv4 utilizes 32-bit addresses, providing a limited supply of approximately 4.3 billion
unique addresses. IPv6 addresses are 128 bits long, offering a virtually inexhaustible
supply of unique addresses. This expanded address space not only resolves the
shortage of IPv4 addresses but also simplifies address allocation and enhances
security features.
Subnetting is the practice of dividing a larger network into smaller, more manageable
subnetworks. It improves network performance, security, and efficient use of IP
addresses by segmenting traffic and limiting broadcast domains.
The Domain Name System (DNS) translates human-readable domain names (e.g.,
www.example.com) into their corresponding IP addresses, and vice versa. DNS
operates on a hierarchical naming structure and utilizes a distributed database to store
and resolve these mappings. DNS enables users to access web resources using easy-
to-remember domain names instead of numerical IP addresses. DNS caching
mechanisms further improve performance by reducing the need for repeated lookups,
resulting in faster response times.
Virtual Private Networks (VPNs) create secure, encrypted connections over untrusted
networks, typically the internet. VPNs are widely used to provide remote access to
corporate resources, enabling employees to securely access company data and
applications from off-site locations. VPN connections are facilitated by tunneling
protocols, such as Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling
Protocol with IPSec (L2TP/IPSec), and OpenVPN. These protocols establish secure
tunnels between the client device and the corporate network, encrypting data in transit
to protect against unauthorized access and eavesdropping.
Quality of Service (QoS) refers to the ability to prioritize and control network traffic
to ensure optimal performance and reliability for critical applications. QoS
mechanisms classify and prioritize different types of network traffic based on
predefined policies, ensuring that latency-sensitive applications like VoIP, video
conferencing, and real-time data streaming receive priority over less time-critical
traffic. Common QoS techniques include traffic classification, bandwidth reservation,
and queuing disciplines. By implementing QoS policies, organizations can effectively
allocate network resources, minimize congestion, and deliver a consistent, high-
quality experience for time-sensitive applications and services.