Вы находитесь на странице: 1из 105

Networks

&
Telecommunication
Systems
1
Data Communication and Networking:
Topics
Components for Networking and Communication
Connecting the Businesses: LAN, WAN, MAN.

Types of Internet Connection,

Wireless Networks: Applications, Wireless Technologies.

Mobile Communication, Mobile Network Infrastructure,


GSM, CDMA, 2G, 3G, 4G.

Intranet, Extranet, Internet

WWW, Search Engine, Email, Blogging, Social


2
Networking, Document Sharing etc.
What is Communications
• Communications
– The message (data and information) is communicated
via the signal

– The transmission medium “carries” the signal


Transmission
medium

Sender Signal Receiver

3
Telecommunications
• Telecommunications
– The electronic transmission of signals for
communications, including such means as:
• Telephone
• Radio
• Television

• Telecommunication medium
• Anything that carries an electronic signal and interfaces
between a sending device and a receiving device
4
Communications and Telecommunications

• In human speech, the sender transmits a signal


through the transmission medium of the air

• In telecommunications, the sender transmits a


signal through the transmission medium of a
cable or air
5
Communications and Telecommunications

6
Communication
Data Communication:

• electronic collection, processing, and distribution of data --


typically between computer system hardware devices

Telecommunication, or teleprocessing

process of using communication facilities, such as the


telephone system, microwave relays, and satellite to
send data between computers.
7
Modes of Transmission
• Analog Data Transmissions:
– Analog data transmission is the transmission of data in a
continuous waveform.

• Digital Data Transmission:


– Digital data transmission is the transmission of data using
distinct on and off electrical states.

• Modem
– Modulation-demodulation device which converts the digital
signal to analog and vice-versa.
8
Elements of a Telecommunications System
• Telecommunication devices
– Relay signals between computer systems and
transmission media

9
Networks

10
Computer Network

• The communications media, devices, and


software needed to connect two or more
computer systems and/or devices

• Used to share hardware, programs, and


databases across the organization
11
WHY we need networking ??

• Fosters teamwork, innovative ideas, and new business


strategies
• Helps organization to interconnect its hardware, software,
databases and various media to achieve interconnectivity
between its employees and stakeholders.
• Data communication or data conferencing allows two or
more users to share the common data resource either on
the common computer server or their networked
12 computers.
Types of Network

13 Classification of interconnected processors by scale


Types of Networks
Local Area Network (LAN)
– interconnects two or more computers or devices
within a relatively small, well-defined area, such as a
room, building, or cluster of buildings using physical
wires, infrared links or wireless systems.

Wide Area Network (WAN)


– A wide area network (WAN) interconnects two or
more computers that are geographically dispersed.
14
Types of Networks
• Metropolitan Area Network (MAN)
– usually spans a city or a large campus.

– subset of WAN which allows the high-speed connectivity


between LANs spread across metropolitans.

• Virtual Private Network (VPN)


– uses a public telecommunication infrastructure, such as the
Internet, to provide remote offices or individual users with

15 secure access to their organization's network.


Local Area Networks

16
Metropolitan Area Networks

• A metropolitan area network based on cable


TV.

17
Wide Area Networks
• Relation between hosts on LANs and the
subnet.

18
Architecture of the Internet

19
Internet Connections
Internet backbone

A set of high-speed networks that carry Internet traffic,


provided by companies such as AT&T, Verizon, GTE, British
Telecom, and IBM

Internet service provider (ISP)

A company that provides other companies or individuals with


access
20
to the Internet
20
Internet Connections
Phone modem converts computer data into an analog audio
signal for transfer over a telephone line, and then a modem
at the destination converts it back again into data

Digital subscriber line (DSL) uses regular copper phone lines


to transfer digital data to and from the phone company’s
central office

Cable modem uses the same line that your cable TV signals
come
21 21 in on to transfer the data back and forth
Internet Connections
Broadband
Transfer speeds are faster than 768 kilobits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the Internet
to your home computer) may not be the same as uploads
(sending data from your home computer to the Internet)

22 22
Leased Line Connections

• Premium internet connectivity product, delivered


over fiber normally, which is dedicated and
provides uncontended, symmetrical speeds, full-
duplex.

• It is also known as an Ethernet leased line, data


circuit or private circuit.
23
Network Topology
Topology defines the way in which computers, printers, and other
devices are connected.

A network topology describes

the layout of the wire and devices

as well as the paths used by data

transmissions.

24
Network Components

Interconnecting
Media
Devices

Networking
Computers
Software

Applications

26
Networking Media
The means by which signals (data) are sent from one
computer to another (either by cable or wireless means)

Twisted Pairs Coaxial Fiber Optical Microwave


Cables Cables Cables Transmission

Satellite
Infrared Bluetooth
Transmission

27
Networking Devices

HUB, Switches, Routers, Wireless Access Points,


Modems etc.

28
Repeater
• A repeater operates at the physical layer.
• Regenerate a the signal over the same network before the
signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same
network.
• They do not amplify the signal.
• When the signal becomes weak, they copy the signal bit by
bit and regenerate it at the original strength. It is a 2 port
device.
29
Hub
• Multiport repeater.
• A hub connects multiple wires coming from different
branches, for example, the connector in star topology
which connects different stations.
• Hubs cannot filter data, so data packets are sent to all
connected devices.
• They do not have intelligence to find out best path for
data packets which leads to inefficiencies and wastage.
30
Bridge
• A bridge is a repeater, with add on functionality of
filtering content by reading the MAC addresses of
source and destination.

• It is also used for interconnecting two LANs


working on the same protocol.

• It has a single input and single output port, thus


making it a 2 port device.
31
Switch
• A switch is a multi port bridge with a buffer and a design that
can boost its efficiency(large number of ports imply less traffic)
and performance.
• Switch is data link layer device.
• Switch can perform error checking before forwarding data, that
makes it very efficient as it does not forward packets that have
errors and forward good packets selectively to correct port only.
• Switch divides collision domain of hosts, but broadcast domain
remains same.
32
Routers
• A router is a device like a switch that routes data packets
based on their IP addresses.
• Router is mainly a Network Layer device.
• Routers normally connect LANs and WANs together and
have a dynamically updating routing table based on which
they make decisions on routing the data packets.
• Router divide broadcast domains of hosts connected
through it.
33
34
Gateway
• A gateway is a passage to connect two networks together
that may work upon different networking models.
• They basically works as the messenger agents that take data
from one system, interpret it, and transfer it to another
system.
• Gateways are also called protocol converters and can
operate at any network layer.
• Gateways are generally more complex than switch or router.
35
Computers: Clients and Servers
• network services are located in a dedicated computer whose only
function is to respond to the requests of clients.

• The server contains the file, print, application, security, and other
services in a central computer that is continuously

available to respond to client requests.

36
Wireless Networks
• Wireless Fidelity (Wi-Fi): Wireless Fidelity has
emerged as a standard wireless communication that
is also known as 802.11.

• Wi-Fi or 802.11b standard allows the wireless speed


of up to 11 Mbps, which is much faster than a DSL
connection.
37
Advantages of wireless networks
Mobility - With a laptop computer or mobile device, access can be
available throughout a school, at the mall, on an airplane, etc.
More and more businesses are also offering free WiFi access
("Hot spots").
Fast setup - If your computer has a wireless adapter, locating a
wireless network can be as simple
Cost - Setting up a wireless network can be much more cost
effective than buying and installing cables.
Expandability - Adding new computers to a wireless network is as
easy.
38
Disadvantages of wireless networks
Inconsistent connections - Because of the interference
caused by electrical devices and/or items blocking the
path of transmission, wireless connections are not
nearly as stable as those through a dedicated cable.

Speed - The transmission speed of wireless networks is


improving; however, faster options are available via
cables.

39
Disadvantages of wireless networks
Security- Protect your sensitive data with backups,
isolated private networks, strong encryption and
passwords, and monitor network access traffic to and
from your wireless network.

Interference - Because wireless networks use radio signals


and similar techniques for transmission, they are
susceptible to interference from lights and electronic
devices.
40
Cellular Technology
• Cellular networks are divided up into cells, each cell
being serviced by one or more radio transceivers
(transmitter/receiver).

• Communication in a cellular network is full duplex,


where communication is attained by sending and
receiving messages on two different frequencies -
frequency division duplexing (FDD).
41
e

42
43
44
45
46
47
48
First Generation (1G)
First generation services were analogue services for cell phones.

• 1G: Voice Only

• Remember analog “brick phones” and “bag phones” way, way back in
the day? Cell phones began with 1G in the 1980s.

• 1G is an analog technology and the phones generally had poor


battery life and voice quality was poor, without much security, and
would sometimes experience dropped calls.

• The max speed of 1G is 2.4 Kbps

49
2G: SMS & MMS
• Cell phones received their first major upgrade when they went from 1G to 2G.

Second Generation (2G): 2G services were digital.

The transition to 2G provided the ability to store, copy, encrypt and compress data,
and allowed data transmission without loss and with error-correction. There are
two kinds of 2G services

• Global System for Mobility (GSM)

• Code Division Multiple Access (CDMA)

• This leap took place in 1991 on GSM networks first, in Finland, and effectively took
cell phones from analog to digital.

• The max speed of 2G with General Packet Radio Service (GPRS) is 50 Kbps or 1
50
Mbps with Enhanced Data Rates for GSM Evolution (EDGE).
2.5G & 2.75G
• Finally Data, but Slow
• Before making the major leap from 2G to 3G wireless
networks, the lesser-known 2.5G and 2.75G was an interim
standard that bridged the gap
• 2.5G introducing a new packet switching technique that
was more efficient than what was previously being used.
• This led to 2.75G, which provides a theoretical threefold
capacity increase. 2.75G with EDGE began in the US with
51GSM networks (AT&T being the first).
3G
• Introduced in 1998
• faster data-transmission speeds,
• Use cell phone in more data-demanding ways like for video calling
and mobile internet.
• Like 2G, 3G evolved into 3.5G and 3.75G as more features were
introduced in order to bring about 4G.
• The max speed of 3G is estimated to be around 2 Mbps for non-
moving devices and 384 Kbps in moving vehicles.
• The theoretical max speed for HSPA+ is 21.6 Mbps.
52
4G
– 4G promises to deliver data up to 10 times faster than 3G
speeds.

• Released in 2008.

• It supports mobile web access like 3G but also gaming services,


HD mobile TV, video conferencing, 3D TV, and other things that
demand higher speeds.

• The max speed of a 4G network when the device is moving is


100 Mbps or 1 Gbps for low mobility communication like when
53
stationary or walking.
4G
• Expected to provide a comprehensive and secure all-
IP based mobile broadband solution to laptop
computer, wireless modems, smartphone, and other
mobile devices.

• Facilities: ultra-broadband Internet access,

IP telephony,

gaming services, and

54 streamed multimedia.
Applications
• E-mail

• Searchable Data (Web Sites)

• E-Commerce

• News Groups

• Internet Telephony (VoIP)

• Video Conferencing

• Chat Groups

• Instant Messengers
55• Internet Radio
Switching *
• Every time in computer network you access the
internet or another computer network outside your
immediate location, your messages are sent through
a maze of transmission media and connection
devices.
• The mechanism for moving information between
different computer network and network segment is
called switching in computer network
56
Switching Techniques *
• Circuit switching: Circuit switching is the method
used to connect telephone lines.
• It opens up a complete predetermined transmission
route from sender to receiver before a message is
transmitted.
• An entire message is then transmitted at once.
• It is faster and more efficient for data to be
transmitted with packet switching.
57
*
• Message switching also involves sending an entire message
at one time over a predetermined transmission route. But
transmission route is not dedicated to just one message
• Packet switching: Most complex of the data movement
methods discussed here. Its advantage is that it can increase
the utilization of the network, thus decreasing the cost of
using the network.
• In packet switching there is no temporary storage of
messages in secondary storage devices.
58
Packet Switching *

Figure
15.4
Messages
sent by
packet
switching

Take a message, break it into three packets, and


simulate this process
59 59
TCP/IP
Transmission Control Protocol (TCP)
Software that breaks messages into packets, hands them
off to the IP software for delivery, and then orders and
reassembles the packets at their destination
Internet Protocol (IP)
Software that deals with the routing of packets through
the maze of interconnected networks to their final
destination
60 60
High-Level Protocols
Other protocols build on TCP/IP protocol suite

Simple Mail Transfer Protocol (SMTP) used to specify transfer of


electronic mail

File Transfer Protocol (FTP) allows a user to transfer files to and


from another computer

Telnet used to log onto one computer from another

Hyper Text Transfer Protocol (http) allows exchange of Web


documents

61 61 Which of these have you used?


Network Addresses
Hostname

A name made up of words separated by dots that uniquely


identifies a computer on the Internet

IP address

An address made up of four one-byte numeric values separated


by dots that uniquely identifies a computer on the Internet

Is there a correspondence between the parts of a hostname and


an IP address?
62 62
Domain Name System
Host number
The part of the IP address that specifies a particular host
(machine) on the network Yes, but what is it?
Domain name
The part of a hostname that specifies a specific organization or
group
Top-level domain (TLD)
The last section of a domain name that specifies the type of
organization or its country of origin
63 63
Domain Name System

matisse.csc.villanova.edu

Computer
name

Domain name TLD

64 64
Domain Name System

65 65
Domain Name System
Organizations based in countries other than the
United States use a top-level domain that
corresponds to their two-letter country codes

Do you
email
someone
in another
country?

Figure 15.11
66 66 Some of the top-level domain names
based on country codes
Security

67
What is Security?

• “The quality or state of being secure—to be free from danger”


• A successful organization should have multiple layers of security
in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
68
Network Vulnerability

• Intentional attacks on computing resources and


networks persist for a number of reasons
• Complexity of computer software and newly
emerging hardware and software combinations
make computer and the network susceptible to
intrusion
– It is difficult to thoroughly test an application for all

69
possible intrusions
Security Threats

2. Back door and


4. Being an
1. Trojan horse remote 3. Denial of
intermediary for
programs administration service
another attack
programs

6. Mobile code
5. Unprotected 7. Cross-site
(Java, JavaScript, 8. Email spoofing
Windows shares scripting
and ActiveX)

9. Email-borne 10. Hidden file


11. Chat clients 12. Packet sniffing
viruses extensions

Source: CERT
70
Trojan Horse Programs

• Programs that are installed without the knowledge


of the user

• They perform a wide variety of covert talks such as:


– modifying and deleting files,

– transmitting files to the intruder,

– installing programs, installing viruses and other Trojan


horse programs etc.
71
Backdoor and Remote Administration Programs

• Covert installation of remote administration


programs such as BackOrifice, Netbus and
SubSeven

• Such programs give remote access to the


computer from anywhere on the Internet
72
Intermediary for Other Attacks

• Client computer is used to launch mostly denial

of service attacks on other computers

• An agent is usually installed using a Trojan horse

program to launch the denial of service attack

on other computers
73
Unprotected Windows Share

• Malicious code can be stored in protected


Windows share for propagation

74
Mobile code (Java/JavaScript/ActiveX)
• Mobile codes in Java, JavaScript, and ActiveX can be
executed by a web browser is generally useful, but it can
also be used to run malicious code on the client computer.

• Disabling Java, JavaScript, and ActiveX from running in the


Web browser must be considered when accessing websites
that cannot be trusted

• Email received in HTML format is also susceptible to mobile


code attack because it could also carry the mobile code
75
Cross-site Scripting
• A malicious script can be sent and stored by a web developer on
a website to be downloaded by an unsuspecting surfer

• When this website is accessed by a user, the script is transferred


to the local web browser

• Ways of acquiring malicious scripts include “following links in


web pages, email messages, or newsgroup, using interactive
forms on an untrustworthy site, viewing online discussion
groups, forums, or other dynamically generated pages where
users can post text containing HTML tags” - CERT
76
Email Spoofing
• Email “spoofing” tricks the user in believing that the email
originated from a certain user such as an administrator
although it actually originated from a hacker

• Such emails may solicit personal information such as


credit card details and passwords

• Examining the email header may provide some additional


information about the origin of the email

77
Email Borne Viruses
• Malicious code is often distributed through email
as attachments

• Attachments must thus be opened with caution

78
Hidden File Extensions
• An attachment may have a hidden file extension
– Such files may execute the attachment

• Example:
– Downloader (MySis.avi.exe or QuickFlick.mpg.exe)

– VBS/Timofonica (TIMOFONICA.TXT.vbs)

– VBS/CoolNote (COOL_NOTEPAD_DEMO.TXT.vbs)

– VBS/OnTheFly (AnnaKournikova.jpg.vbs)

• In the above files, the hidden extension is .vbs pertaining to


79 an executable Visual Basic script
Chat Clients

• Internet chat applications such as instant


messaging applications and

• Internet Relay Chat (IRC) involve the exchange of


information including files that may contain
malicious executable codes

• The same caution that applies to email

80 attachments apply here as well


Packet Sniffing
• Packet sniffer programs capture the contents of packets that
may include passwords and other sensitive information that
could later be used for compromising the client computer

• For example, a sniffer installed on a cable modem in one cable


trunk may be able to sniff the password from other users on
the same trunk

• Encryption of network traffic provides one of the defenses


against sniffing
81
Reasons to Secure Computing and Network
Resources
• Many businesses rely heavily on computers to operate
critical business processes

• Individuals are using computers for tasks that required


confidentiality

• Advent of Internet has provided a physical path of entry


for every computer connected to the Internet
– An always connected broadband connection is always
vulnerable in this case
82
Providing Security
• Providing security requires action on two fronts, namely
the management and the technical fronts respectively

• The management aspect relates to organizational


policies and behavior that would address security threats
and issues

• The technical aspect relates to the implementation of


hardware and software to secure access to computing

83
resources and the network
Management Aspect

• Best practice approach is to ensure secure


behavior

• The above can be done by established guidelines


for managing, addressing and rectifying security
related issues

84
Technical Aspect

• Introduce security related hardware and


software to secure access to computers and
computing resources

85
Technical Approaches
– Implement security patches and other updates pertaining
to an operating system and other venerable software such
as the Internet Explorer
– Install self-monitoring an anti-virus, anti-spam and anti-
hacker and pop-up blocker software
– Install a firewalls
– Use encryption wherever feasible

• All the approaches can be used to complement one


another
86
Self-Monitoring Software and Security Patches

Security patches are issued by mainly the OS vendor such


as Microsoft to patch security holes as they are
discovered

• Examples of self-monitoring software include anti-virus,


spyware elimination, pop-up blocking, and anti-spam
software

• Both the security patches and the self-monitoring

87
software act at the local client level
Examples of Self-Monitoring Software

• Antivirus
– Mcafee
• Spyware elimination
• Pop-up blocker
• Anti-Spam

88
Communication Security
• IPsec
• Firewalls
• Virtual Private Networks
• Wireless Security

89
IPsec
• The IPsec authentication header in transport
mode

90
Firewalls

• Firewalls are used for controlling access to the


computing resources

• In general, it acts at the network level controlling


network access to computing resources

• Firewalls can be implemented in software as


well as in hardware

91
Firewalls

• A firewall consisting of two packet filters and


an application gateway.

92
Virtual Private Networks

• (a) A leased-line private network. (b) A virtual


private network.

93
Encryption

• By encryption, the data can be made illegible to the intruder

• It can be implemented at the network level as well as the

client level

• For example, locally stored data can be encrypted and the

network traffic could equally well be encrypted

94
Some Applications of Encryption

• VPN
• Digital Certificates

95
Security Professionals and the Organization

• Wide range of professionals required to support a


diverse information security program

• Senior management is key component; also, additional


administrative support and technical expertise required
to implement details of IS program

96
Senior Management
• Chief Information Officer (CIO)

– Senior technology officer

– Primarily responsible for advising senior executives on


strategic planning

• Chief Information Security Officer (CISO)

– Primarily responsible for assessment, management, and


implementation of IS in the organization

97 – Usually reports directly to the CIO


Virus
• Program that inserts itself into one or more files
and performs some action
– Insertion phase is inserting itself into file

– Execution phase is performing some (possibly null)


action

• Insertion phase must be present


– Need not always be executed
99
Cyber Crime

100
What is Cybercrime?

• Using the Internet to commit a crime.


– Identity Theft
– Hacking
– Viruses
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography

101
Cybercrime Components

• Computers

• Cell Phones

• PDA’s

• Game Consoles

102
Computer Security - Terminology

• People
– Hackers
• White Hat – Good guys. Report hacks/vulnerabilities to
appropriate people.
• Black Hat – Only interested in personal goals, regardless
of impact.
• Gray Hat – Somewhere in between.

103
Information Security Management System
(ISMS)
1. Security policy - management direction

2. Organization of information security - governance of information


security

3. Asset management - inventory and classification of information


assets

4. Human resources security - security aspects for employees


joining, moving and leaving an organization

5. Physical and environmental security - protection of the computer

104
facilities
Information Security Management System
(ISMS)
6. Communications and operations management -
management of technical security controls in systems
and networks

7. Access control - restriction of access rights to


networks, systems, applications, functions and data

8. Information systems acquisition, development and


maintenance - building security into applications
105
ISMS – Cntd
7. Information security incident management - anticipating
and responding appropriately to information security
breaches

8. Business continuity management - protecting,


maintaining and recovering business-critical processes
and systems

9. Compliance - ensuring conformance with information


security policies, standards, laws and regulation
106
Thank You

107

Вам также может понравиться