Professional Documents
Culture Documents
Presented by:
Dr. Orieb AbuAlghanam
1
Networks and Information Security Essentials
The internet is not owned by any individual or group. The internet is a worldwide collection of
interconnected networks (internetwork or internet for short), cooperating with each other to exchange
information using common standards. Through telephone wires, fiber-optic cables, wireless transmissions,
and satellite links, internet users can exchange information in a variety of forms.
Everything that you access online is located somewhere on the global internet. Social media sites,
multiplayer games, messaging centers that provide email, online courses — all of these internet
destinations are connected to local networks that send and receive information through the internet.
Think about all of the interactions that you have during the day which require you to be online.
2
Networks and Information Security Essentials
3
Networks and Information Security Essentials
The Bit
Did you know that computers and networks only work with binary digits, zeros and ones? It can be difficult to imagine that all of our data is stored and
transmitted as a series of bits. Each bit can only have one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit” and represents the
smallest piece of data.
Humans interpret words and pictures, computers interpret only patterns of bits.
A bit is stored and transmitted as one of two possible discrete states. This can include two directions of magnetization, two distinct voltage or current levels, two
distinct levels of light intensity, or any other physical system of two discrete states.
For example, a light switch can be either On or Off; in binary representation, these states would correspond to 1 and 0 respectively.
Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction into binary code for the CPU to process and store. Every output
device (printer, speakers, monitors, etc.) will take binary data and translate it back into human recognizable form. Within the computer itself, all data is processed
and stored as binary.
Computers use binary codes to represent and interpret letters, numbers and special characters with bits. A commonly used code is the American Standard Code
for Information Interchange (ASCII). With ASCII, each character is represented by eight bits. For example:
Each group of eight bits, such as the representations of letters and numbers, is known as a byte.
Codes can be used to represent almost any type of information digitally including computer data, graphics, photos, voice, video, and music.
4
Networks and Information Security Essentials
After the data is transformed into a series of bits, it must be converted into signals that can be sent across the network
media to its destination. Media refers to the physical medium on which the signals are transmitted. Examples of media
are copper wire, fiber-optic cable, and electromagnetic waves through the air. A signal consists of electrical or optical
patterns that are transmitted from one connected device to another. These patterns represent the digital bits (i.e. the data)
and travel across the media from source to destination as either a series of pulses of electricity, pulses of light, or radio
waves. Signals may be converted many times before ultimately reaching the destination, as corresponding media
changes between source and destination.
•Electrical signals - Transmission is achieved by representing data as electrical pulses on copper wire.
•Optical signals - Transmission is achieved by converting the electrical signals into light pulses.
•Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves through the air.
In most homes and small businesses, network signals are transmitted across copper wires (cables) or Wi-Fi enabled
wireless connections. Larger networks employ fiber-optic cables in order to reliably carry signals for longer distances.
5
Networks and Information Security Essentials
Bandwidth
Streaming a movie or playing a multiplayer game requires reliable, fast connections. To support these “high bandwidth” applications,
networks have to be capable of transmitting and receiving bits at a very high rate.
Different physical media support the transfer of bits at different speeds. The rate of data transfer is usually discussed in terms of bandwidth
and throughput.
Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of data that can flow from one place to another
in a given amount of time. Bandwidth is typically measured in the number of bits that (theoretically) can be sent across the media in a
second.
Common bandwidth measurements are as follows:
•Thousands of bits per second (kbps)
•Millions of bits per second (Mbps)
•Billions of bits per second (Gbps)
Physical media properties, current technologies, and the laws of physics all play a role in determining available bandwidth.
6
Networks and Information Security Essentials
The table shows the commonly used units of measure for bandwidth.
7
Encryption Theory
8
Networks and Information Security Essentials
Sharing files: directly accessing the files over the network, attaching files to
emails, etc.
Sharing resources: setting up a printer or a hard drive so everyone on the
network can access it.
Sharing programs: giving access to software installed on central hard drive and
manage that access through licensing.
9
Encryption Theory
10
Networks and Information Security Essentials
11
Networks and Information Security Essentials
LAN
• Network of computers located in a single location, like a home,
school, or office building
• Can share connection with other LANS and with the internet
12
Networks and Information Security Essentials
WAN
• Network over a large area like a city, a country, or multiple
countries
• Connects multiple LANs together
• Generally utilizes different and much more expensive networking
equipment than LANs
• The internet is the most popular WAN
13
Networks and Information Security Essentials
LAN Vs WAN
LAN WAN
Connects host within a relatively Hosts may be widely dispersed.
small geographical area. • Across Campuses
• Same Building • Across Cities/countries
• Same room
• Same Campus
Faster: LANs provide high speed Slower: WANs typically provide slower
bandwidth to internal end devices and speed links between LANs.
intermediary devices.
Cheaper Expensive
Under a control of single ownership Not under a control of a single person.
14
Networks and Information Security Essentials
Network Infrastructure
The path that a message takes from its source to destination can be as simple as a single cable connecting one computer
to another, or as complex as a network that literally spans the globe. This network infrastructure is the platform that
supports the network. It provides the stable and reliable channel over which our communications can occur.
•End devices
•Intermediate devices
•Network media
15
Networks and Information Security Essentials
16
Networks and Information Security Essentials
17
Networks and Information Security Essentials
End Devices
Some examples of end devices are as follows:
•Computers (workstations, laptops, file servers, web servers)
•Network printers
•Telephones and teleconferencing equipment
•Security cameras
•Mobile devices (such as smart phones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners)
An end device (or host) is either the source or destination of a message transmitted over the network. In order to
uniquely identify hosts, addresses are used. When a host initiates communication, it uses the address of the
destination host to specify where the message should be sent.
18
Networks and Information Security Essentials
19
Networks and Information Security Essentials
Hubs
Physical Layer devices: essentially repeaters
operating at bit levels: repeat received bits on one
interface to all other interfaces
Broadcast: the data are sent to every device on a
network.
20
Networks and Information Security Essentials
21
Networks and Information Security Essentials
Bridges
Link Layer devices: operate on Ethernet frames, examining frame header and selectively
forwarding frame based on its destination
Bridge: we can say that the bridge is the old version of the switch, where the bridge works almost
like the switch.
22
Networks and Information Security Essentials
Router
a device whose primary purpose is to connect two or more networks and determine the
next network point to which the data should be forwarded toward its destination.
23
Networks and Information Security Essentials
Comparisons
24
Networks and Information Security Essentials
Transmission Medium
• anything that can carry
information from a
source to a destination.
• Transmission medium
can be classified into
Guided media and
Unguided media.
25
Networks and Information Security Essentials
Guided Media
1.Twisted-pair cables, which use metallic (copper) conductors that accept and transport
signals in the form of electric current. Twisted-pair types are:
•Shielded Twisted-Pair (STP)
•Unshielded twisted-pair (UTP)
2.Coaxial cables, which use metallic (copper) conductors that accept and transport signals in
the form of electric current. Coaxial types are:
•Thin
•Thick
3.Optical fiber is a cable that accepts and transports signals in the form of light.
•Single mode
•Multimode
26
Networks and Information Security Essentials
28
Networks and Information Security Essentials
29
Networks and Information Security Essentials
30
Networks and Information Security Essentials
31
Networks and Information Security Essentials
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. BNC
Coaxial is the most widely used media for transporting high radio
frequency signals over wire, especially cable television signals.
Traditional cable television was composed completely of coax
cable.
Fiber-optics
Fiber optic cabling consists of a center glass core surrounded by
several layers of protective materials.
It transmits light rather than electronic signals eliminating the
problem of electrical interference.
Either lasers or light emitting diodes (LEDs) generate the light pulses
that are used to represent the transmitted data as bits on the media.
More expensive (usually) than copper media over the same distance
(but for a higher capacity)
Unlike copper wires, fiber-optic cable can transmit signals with less
attenuation and is completely immune to EMI and RFI.
33
Networks and Information Security Essentials
Fiber-optics Continued
The connectors used with Fiber-optics cables are ST and SC connectors. Subscriber Connector (SC) is
widely used with single-mode
Because light can only travel in one direction over optical fiber, two fiber
Note: The laser light transmitted over fiber-optic cabling can damage the
human eye. Care must be taken to avoid looking into the end of an active
Straight Tip (ST) connector is
widely used with multimode
optical fiber. fiber
34
Networks and Information Security Essentials
35
Networks and Information Security Essentials
36
Networks and Information Security Essentials
37
Networks and Information Security Essentials
38
Networks and Information Security Essentials
Ethernet Cabling
The internal wires of a UTP cable are arranged in specific order when
used with Ethernet.
The arrangement of the wires depend on the devices to be connected by
the cable.
There are three Ethernet cabling types in terms of the internal wires
arrangement:
• Straight-Through cable.
• Crossover cable.
• Rolled cable.
39
Networks and Information Security Essentials
Straight-Through Cable
40
Networks and Information Security Essentials
Crossover Cable
41
Networks and Information Security Essentials
Rolled Cable
42
Networks and Information Security Essentials
43
Networks and Information Security Essentials
44
Networks and Information Security Essentials
Auto-MDIX
Most switch devices now support the automatic medium-dependent
interface crossover (auto-MDIX) feature.
When the auto-MDIX feature is enabled, the switch detects the required
cable type for copper Ethernet connections and configures the interfaces
accordingly.
45
Networks and Information Security Essentials
46
Networks and Information Security Essentials
• Extended star or hybrid: This is a combination of the other topologies such as star networks
interconnected to each other using a bus topology.
• Bus: All end systems are chained to each other and terminated in some form on each end. Bus
topologies were used in legacy Ethernet networks.
• Ring: End systems are connected to their respective neighbor forming a ring. Unlike the bus
topology, the ring does not need to be terminated. Ring topologies were used in legacy Fiber
Distributed Data Interface (FDDI) networks.
47
Networks and Information Security Essentials
48
Networks and Information Security Essentials
Protocols
The sending of a message, over a network, is governed
by rules called protocols.
A Protocol is information added to the “header”
and/or a “trailer” of the data in order to be send to the
intended destination and to be interrupted in correct
way. Common computer protocols include: Message
format, Message size, Timing, Encoding, and Message
delivery options.
49
Networks and Information Security Essentials
Protocols Continued
When data travels on the media, it is converted into a stream of bits, or 1s
and 0s. If a node is receiving long streams of bits, how does it determine
where a frame starts and stops or which bits represent the address?
Framing breaks the stream into decipherable groupings, with control
information inserted in the header and trailer as values in different fields.
This format gives the physical signals a structure that can be received by
nodes and decoded into packets at the destination. The data link layer
frame includes:
Header: Contains control information, such as addressing, and is located at the beginning of the PDU.
Data: Contains the IP header, transport layer header, and application data.
50
Networks and Information Security Essentials
Packet Loss
Packet loss occurs when one or more packets
of data travelling across a computer network
fail to reach their destination.
Queue preceding link in buffer has finite
capacity.
Packet arrived to full queue is dropped (lost).
Lost packet may be retransmitted by previous
node, by source end system, or not at all.
51