Applied Networks & Security

Similar documents
Applied Networks & Security

Applied Networks & Security

Chapter 2 Communicating Over the Network

It is the process of sharing data, programs, and information between two or more computers.

Data Communication and Network. Introducing Networks

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014

Component Function Example

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

ITEC 3800 Data Communication and Network. Introducing Networks

Parts of a Network. app. router. link. host. Computer Networks 2

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

ITP 140 Mobile Applications Technologies. Networks

Typical Network Uses

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Dr./ Ahmed Mohamed Rabie Sayed

Chapter 5 Local Area Networks. Computer Concepts 2013

The Features and Uses of Computer Networking. Unit 11 Task 1

Communicating over the Network

Chapter 14: Introduction to Networking

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Networks: Communicating and Sharing Resources

Networks. Computer Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Home Networking. A home network generally conforms to one of the following configurations

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Networking. Prof. Abdul Hameed

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Chapter 2. Communicating Over The Network

INTRODUCTION TO ICT.

Internet. Class-In charge: S.Sasirekha

Management Information Systems

ITP 140 Mobile Applications Technologies. Networks

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them

Unit 11: Computer Networks

IT 2004 Data Communication & Networking

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

Networking By: Vince

Networking. Networking. How Home Networking Works

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Özgür ZEYDAN (PhD.)

CIT 380: Securing Computer Systems. Network Security Concepts

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008

Networks: Communicating and Sharing Resources

COMPONENTS OF DATA COMMUNICATION

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer.

Communications and Networks

Unit A: Computer and Internet Basics

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Networking 101 By: Stefan Jagroop

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

2. Give advantages and disadvantages of computer network. (Any 2 advantages- 2 Marks, Any 2 disadvantages- 2 Marks) Answer: Advantages:

Review: Networking Fall Final

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

STM. Computing. Specifica on Topics. High Level Skills you should think about to take your work to the next level:

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

E3-E4 CM TECHNICAL IT INFRASTRUCTURE

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

Objectives. Network Structure. Network Structure

MOTHER TERESA SR. SEC. CO-ED SCHOOL. CLASS VIII (Comp Sc.) CHAPTER-1 : ABOUT NETWORKING

Lesson 1: Network Communications

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

LECTURE WK4 NETWORKING

TYPES OF COMPUTER NETWORKS

networks List various types of networks and their

Acknowledgment and Disclaimer:

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

Electrical and Telecommunications Engineering Technology_TCET3142/TC570 NEW YORK CITY COLLEGE OF TECHNOLOGY THE CITY UNIVERSITY OF NEW YORK

Chapter 3. The Basics of Networking

The ULTIMATE GUIDE. to Buying Networking Equipment

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall

CHAPTER 5 Introduction to Internet Technology

Introduction to Networking

E-Commerce. Infrastructure I: Computer Networks

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

N300 WiFi Router with External Antennas

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

4. The transport layer

CompTIA A+ Accelerated course for & exams

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Discovering Computers Chapter 9 Communications and Networks

CEN 444 Computer networks

Transcription:

Applied Networks & Security Introduction with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1

Critical analysis disclaimer Following this disclaimer are slides used in other versions of the course. We mark up some slides using strikethroughs and underlined red in comic sans ms 20pt font. This is not meant to slight other teachers or their material. Much of the material is good and helpful so we use it. We do this to explore complex issues, refresh dated material, correct inaccuracies and stimulate critical thinking. In some cases we are pedantic where it seems useful, but we are not exhaustive and try to avoid being overly tedious when it is unnecessary. IT 263 Winter 2006/2007 John Kristoff - DePaul University 2

IT 263 Applied Networks and Security Introduction

Overview Course Goals and Overview Types of Networks Protocols and Packet Sniffing Typical SOHO Network Layouts 4

Course Topics Introduce networking and security technologies that everyone should know about, using small office home office (SOHO) networks as our main example Networking Topics: Network applications Network connectivity (Ethernet cabling, switching, routers) IP addressing, network address translation Internet access services Security Topics: Typical threats and responses Data Integrity and Encryption Firewalls Virtual private network (VPNs) 5

Course Topics We will not study enterprise networking topics in this course, such as: Structured cabling systems (rack-based systems) Server operating systems and management User/resource Directory trees Network user administration Server arrays These topics are covered in TDC 363 6

Network Types Personal Area Networks (PANs) Interconnect personal devices (PDA, cell phone, portable game module, PC) within 30 feet or so. Example: Bluetooth, docking cable Local Area Networks (LANs) Interconnect devices within single business/building Example: Ethernet often spans buildings/cities, PAN/LAN/MAN/WAN geographic delineation not always clear 7

Network Types Metropolitan Area Networks (MANs) Interconnect customer sites controlled by a single telecommunications carrier within a metropolitan geographic region. Example: Hong Kong Broadband Network Wide Area Networks (WANs) Interconnect customer sites around the world Example: The Internet, Frame Relay 8

Network Interconnections 9

Network Applications What are networks used for? Sharing resources Printers, Disks, Folders Communicating Information 2-way: E-mail, Text Chat / Instant Messaging, Videoconferencing, Voice over IP. 1-way: Web sites, IP-TV, music download Distributed Applications Collaborative work, Gaming Internet Connectivity 10

SOHO LAN Applications Disk sharing 11

SOHO LAN Applications Folder Sharing 12

SOHO LAN Applications Printer Sharing 13

Applications use Packets! All network services are provided via packetbased client-server communications Client machine sends a request packet to a server. Server accepts request, processes it, and transmits back a response packet(s). Packets are strings of bytes and have size restrictions For example, Ethernet packets frames can only be between 64 bytes and 1528 1518, in length, containing no more than 1500 bytes of user data. 14

Packet basics Clients and servers must follow a set of rules called a protocol which determines Packet format Permissible requests and responses Format of header information and data Packet ordering and timing Protocol standards are documents that define protocols. For Internet applications, protocol standards are called Request for Comments (RFCs). http://www.ietf.org/rfc.html 15

Packet Flow To access a particular network application based on a particular protocol, the sequence of packets exchanged between a client and server form a packet flow for that application. In this course, we will study the following packet flows: Establishing a TCP connection (3-way TCP handshake) Retrieving files from a web server (HTTP) Reading e-mail (IMAP) Sending e-mail (SMTP) 16

Example: File Download Packet Flow Open File Read Data Close File File Opened Data (multiple pkts) File Closed C l i e n t F i l e S e r v e r 17

Protocols Protocols: a set of rules governing the format (syntax), meaning (semantics) and timing of the information that are exchanged between client and server. Protocol Data Unit (PDU): Header Data 18

Protocol Layering Layered Protocols: - Client-Server communications processes are broken into simpler functions - Each function implemented by its own hardware/software module - Each module adds its own control information ( header ) to the outgoing message Application Application Protocol Application Transport Transport Protocol Transport Network Access Network Access Protocol Network Access Communications Network 19

Windows Networking Model Microsoft refers to these 3 protocol layers as: Services Layer Protocol Layer Hardware Layer 20

Example: HTTP Service 3-Layer Protocol Stack Browser HTTP Protocol Server OS TCP/IP Protocols OS NIC Card / Driver Ethernet Protocol NIC Card / Driver LAN Network 21

WinXP PC running FireFox Layering Example www.depaul.edu Linux PC running Apache User clicks http://www.depaul.edu FireFox Software (Client App) Create GET Request in HTTP format Receive and Process GET Request Apache Software (Server App) WinXP OS TCP Software IP Software Ethernet Driver Ethernet Card Add TCP Header Add IP Header Add Ethernet Header & Trailer Remove TCP Header Remove IP Header Remove Ethernet Header & Trailer TCP Software IP Software Ethernet Driver Ethernet Card LINUX OS Ethernet Trailer HTTP Request TCP Header IP Header Ethernet Header 22

Packets inside Frames IP packet carried inside Ethernet frame E t h e r n e t H e a d e r H I P e a d e r D a t a E t h e r n e t T r a i l e r I n t e r n e t P r o t o c o l ( I P ) p a c k e t E t h e r n e t F r a m e 23

Ethereal (Now www.wireshark.org) To view and understand data packets on the network, we will use a free packet analyzer tool called Ethereal. You can install from www.ethereal.com. What can Ethereal do? Captures a copy of every data packet going in and out of a computer (acts as a Sniffer). Displays the contents of each packet in an easy-to-read format. 24

Ethereal Example I access http://reed.cs.depaul.edu/lperkovic/it263/test while running Ethereal 25

Ethereal Example This web page has the following underlying HTML source 26

The Packet Flow Let s look at the packet flow from Ethereal. Note: capture file is posted. 27

28

29

Why Learn Ethereal? It s not just for network gurus! Ethereal is useful for ordinary PC users: Find the cause of application errors Check the health of your network Figure out why the network is slow Determine whether your PC is infected with a virus 30

Why Learn Ethereal? Find the cause of application errors For example: JP was using Outlook Express to read his e-mail. He could read e-mail, but he couldn t send any e-mail (got a server not accessible message). Was it a problem in his PC? Was it a problem in his network? Was it a problem with his firewall? Was it a problem with the Exchange server? 31

Why Learn Ethereal? Check the health of your network When the network is slow or not working, running Ethereal can tell you: Are packets getting through? Is the network overloaded? Are there error conditions that are creating lots of extraneous packets across the network? 32

Why Learn Ethereal?.. Because you will use that tool extensively in your career: If you work in telecom/networking If you work in security If you work in computer forensics 33

Why Learn Ethereal? Determine whether your PC is infected: If infected by a virus or bot, chances are: you PC is talking to something/someone. You really want to know especially if your PC is been running slow with lots of hard disk access. 34

SOHO Network Configurations Networks are composed of many devices, including: workstations (computers and telephones) servers Ethernet hubs and switches routers firewalls wireless access points (APs) 35

Home Network Single PC CATV or DSL Line SOHO Router PC Kitchen Den Living Room Dining Room 36

Home Network Wired LAN CATV or DSL Line Hub SOHO Router PC PC Kitchen Den PC PC Living Room Dining Room 37

Home Network Wireless LAN CATV or DSL Line SOHO Router / WiFi Access Pt PC WiFi Laptop Kitchen Den WiFi Laptop WiFi Laptop Living Room Dining Room 38

Small Office Network Wired LAN Client PC Client PC Client PC Client PC Ethernet Hub/Switch SOHO Router Client PC Client PC Server CATV or DSL Line 39

Small Office Network Wired LAN - Logical Layout Client PC Client PC Client PC Server Ethernet Hub/Switch SOHO Router CATV or DSL Line 40

Small Office Network Multiple Subnets Subnet #1 Subnet #2 Client PC Client PC Client PC Server Client PC Client PC Client PC Server Ethernet Hub/Switch Ethernet Hub/Switch Router / Firewall Modem / CSU CATV or DSL or T-1 Line 41

Small Office Network Public/Private Subnets Subnet #1 Subnet #2 Client PC Client PC Client PC Server Client PC Client PC Client PC Server Ethernet Hub/Switch Ethernet Hub/Switch DMZ / Public Subnet Web Server Router / Firewall Ethernet Hub/Switch Router E-mail Server Modem / CSU CATV or DSL or T-1 Line 42

Small Office Network Wireless LANs Subnet #1 Subnet #2 WiFi Laptop WiFi Laptop WiFi Laptop WiFi Laptop WiFi Laptop WiFi Laptop Server Server WiFi Access Point Ethernet Hub/Switch WiFi Access Point Ethernet Hub/Switch DMZ / Public Subnet Web Server Router / Firewall Ethernet Hub/Switch Router E-mail Server Modem / CSU CATV or DSL or T-1 Line 43