Conputer Networks Security
Conputer Networks Security
NETWORK FUNDAMENTALS
OVERVIEW
• Introduction to Networks
• Categories of Networks
• Communication Model
• Protocol Architecture
• Protocols
• OSI
• TCP/IP
• LAN Topology
• Transmission Media
Introduction to Networks
• A Network: A group of devices that can
communicate with each other over links.
• Each device is called a host. Each host has a
unique address.
• Network is a connection between two or
more devices.
• Which is connected by a communication
links.
• A node can be computer, printer or any
other devices which is capable of sending
and receiving information at each other.
Example:
INTERNET
• An internet:
• It is Used for
i) Business Application
ii) Home Application
iii) Mobile Users
iv) E-Mail
Categories or Types of Network
• There are Three Types:
1. LAN - Local Area Network
2. MAN - Metropolitan Area Network
3. WAN – Wide Area Network
1. LAN - Local Area Network
A LAN is Designed by Local Area Connections such as:
i) within Building
ii) within office
iii) within Campus
iv) within Specific Place
Advantages :
1) Sharing of Files.
2) Sharing of Programs.
3) Communication Exchange.
Disadvantages :
1) Reliability.
2) Capacity.
3) High Cost.
2. MAN - Metropolitan Area Network
A Metropolitan Area Network (MAN) is a
network that interconnects users with
computer resources in a geographic area or
region larger than that covered by even a
large local area network (LAN) but smaller
than the area covered by a wide area
network (WAN).
• MAN supports up to 150 Kilometers Distance.
• Example:
Telephone Network
Cable TV
Advantages :
1) High Bandwidth.
2) It support Large number of Clients.
3) Reduce the Errors.
Disadvantages :
1) Large Space Requirements.
2) Slower Data Access.
3) High Cost.
3. WAN – Wide Area Network
• WAN Provide a Long Distance Transmission of Data.
• By Using WAN Exchange the Information from one
country to another country.
Components of Network
- Which gives the Request.
- Which gives the Response.
- It Indicates Modulator / Demodulator.
- Which identifies the Path between Client
& Server.
- Which overcomes the Traffic
problems.
Communication Model
• Data communications are exchange of
data between two devices via some
transmission medium.
• It should be done in two ways
i) Local - It takes LAN Connection.
ii) Remote - It takes Long distance like
MAN & WAN.
• Data should be Transferred in the form of
0’s and 1’s
Transmission
Source
Medium Destination
TIMING
Standard Organizations:
• International Standard Organization
• ANSI
• IEEE
The OSI Model
• An ISO (International standard Organization) that
covers all aspects of network communications is the
Open System Interconnection (OSI) model.
• An open system is a model that allows any two
different systems to communicate regardless of their
underlying architecture (hardware or software).
• The OSI model is not a protocol; it is model for
understanding and designing a network architecture
that is flexible, robust and interoperable.
• The OSI model is a layered framework for the
design of network systems that allows for
communication across all types of computer
systems.
• The OSI model is built of seven ordered layers:
1. (Layer 1) Physical layer
2. (Layer 2) Data link layer
3. (Layer 3) Network layer
4. (Layer 4) Transport layer
5. (Layer 5) Session layer
6. (Layer 6) Presentation layer
7. (Layer 7) Application layer
Peer-to-Peer Process
• Within a single machine, each layer calls upon services of
the layer just below it.
• Layer 3, for example, uses the services provided by layer
2 and provides services for layer 4.
• Between machines, layer x on one machine communicates
with layer x on another machine, by using a protocol (this
is Peer-to-Peer Process).
• Communication between machines is therefore a peer-to-
peer process using protocols appropriate to a given layer.
Interfaces between Layers
• There is an interface between each pair of
adjacent layers. This interface defines what
information and services a layer must provide
for the layer above it.
Functions of Layers
1. Physical Layer
The physical layer is responsible for transmitting
individual bits from one node to the next.
Physical layer
The physical layer is concerned with the following:
• Physical characteristics of interfaces and
media: It define the type of transmission media
• Representation of the bits: the physical layer
data consist of a stream of bits(0,1). The
transmitted bits must be encoded into signals –
electrical or optical. The physical layer defines
the type of encoding.
• Data rate: The physical layer defines the
transmission rate, the number of bits sent each
second.
Physical Layer
• Line configuration: the physical layer is
concerned with the connection of devices
to the medium.
• Physical topology – Ring, star
• Transmission Mode - Simplex, Half
duplex Full Duplex
2. Data Link Layer
• It is responsible for node-to-node delivery of data.
Functions of the Data Link Layer:
• Framing. The data link layer divides the stream of bits
received from the network layer into data units called
frames.
The network layer is responsible for the delivery of packets from the original
source to the final destination.
4. Transport Layer
i) Mesh Topology
ii) Star Topology
iii) Tree Topology
iv) Bus Topology
v) Ring Topology
vi) Hybrid Topology
Types of Topology
A B
Central controller
(or)
HUB
C D
Star Topology
Advantages :
• Less expensive than Mess topology.
• Less number of cables to be used.
• It is robustness.
Star Topology
Disadvantages:
• Each device must connected to central
controller.
• It require more installation process.
• If central controller failure means all the
devices should be failed.
Types of Topology
A B C D
D B
Ring
C
Ring Topology
Advantages:
• Easy to install and reconfigure.
• Fault can be easily identified.
Ring Topology
Disadvantages:
• It is unidirectional traffic.
• In rings if one device gets failure then the
entire system should be failed.
VI. Hybrid Topology
◦ ACK (Acknowledgment)
Can detect all single-bit errors. Can detect burst errors only if the total
number of errors in each data unit is odd.
• Increases the likelihood of detecting burst errors.
• n bits LRC can detect a burst error of n bits.
• Errors may be undetected if:
• Have even number of errors in that position.
You will experience a painful
sharpening from time to time, but
this is required if you are to become
a better pencil.
Error Correction
Redundancy Bits
You have the
ability to
correct any
mistakes you
might make.
Hamming Codes-Error correction
Hamming codes, like polynomial codes,
are appended to the transmitted message
FCS
FCS
CAT 3
CAT 5
Figure 13.19 Fast Ethernet topology
Figure 13.20 Fast Ethernet implementations
Gigabit Ethernet
Speed 1Gpbs
Minimum frame length is 512 bytes
Operates in full/half duplex modes mostly
full duplex
In the full-duplex mode of Gigabit Ethernet,
there is no collision;
the maximum length of the cable is
determined by the signal attenuation
in the cable.
Figure 13.23 Gigabit Ethernet implementations
10Gbps Ethernet
Maximum link distances cover 300 m to 40 km
Full-duplex mode only
No CSMA/CD
Uses optical fiber only
Token Ring
It allows each station to sent one frame
.
The access control mechanism used by
Ethernet is inefficient sometimes because
of collision.
It solves the collision problem by passing
token
Initially a station waits for token, if a
token is free the station may send a data
frame
Cont..,
This frame proceeds around the ring ,being
regenerated by each station .Each station
examines the destination address finds the
frame is addressed to another station and relays
it to its neighbor.
The intended recipient recognizes its own
address and copies the message and set the
address bit
The token finally reach the sender and it
recognizes that the data is delivered through
address bit
Token is passed from NIC to NIC
Token Ring
Token Bus
It combines the feature of token ring and
Ethernet
FDDI
• Fiber Distributed Data Interface
• local area network protocol standardized by ANSI
• 100-Mbps token passing
• Dual-ring LAN
• A high-speed backbone technology
• High bandwidth
• Optical fiber transmission
• Allows up to 1000 stations
FDDI Architecture
Components of FDDI
• Fiber optic cable
• A concentrator (ring)
• Stations: 2 types
• DAS (Dual Attachment Station) or Class
A:
• Connected to both the rings
• SAS (Single Attachment Station) or Class
B:
• Connected to primary ring
FDDI Frame Format
Internetworking
Networking Devices
Devices
Hub
98/
25
Repeater:
A repeater is a regenerator, not an
amplifier
A repeater installed on a link receives the
signal before it becomes too weak or
corrupted ,regenerates the original bit
pattern, and put the refreshed copy back
onto the link.
Gateways:
104
/ 25
Bridges
Divide a large network into smaller segment
It filters the traffic . It contains logic(Bridge
table) that allows them to keep the traffic for
each segment separate.
Ie) Isolating and controlling the link problems
(e.g.congestion)
Bridges have look-up table that contains physical
address of every station connected to it.
105
/ 25
Bridge
108
/ 25
When aframe enters a bridge ,it checks the address of
the destination and forward the new copy only to the
segment to which the address which belongs
Types
Simple
Multiport
Transparent
Remote
Source routing
Simple Bridge
It is aless expensive type of bridge
It links 2 segments (LANS) and lists the
address of all the stations in table
included in each of them.
Here address must be entered manually.
The table is modified when stations are
added and removed.
Multiport Bridge
It is used to connect more than two LANS.
So the bridge has 3 tables.
Here address must be entered manually
Transparent Bridge:
• A transparent or learning bridge builds its table of
station on its own (automatically).
• The table is empty when it is installed, it builds its table
when it encounters the packet for transmission. It
uses the source address for building table.
• It identifies the changes and update the table when
system moved from one station to another
Multiport bridge
113
/ 25
Cont.,
Bridges are normally installed
redundantly,that is two LANS may be
connected by more than one bridge.in
this cases they may create a loop.
So packet may go round and round,It can
be avoided by algorithms like
◦ Spannig tree algorithm
◦ Source routing
Function of a bridge
115
/ 25
Data Communications and Computer Networks
Remote Bridges
•A remote bridge is capable of passing a data frame
from one local area network to another when the two
LANs are separated by a long distance and there is a
wide area network connecting the two LANs.
•A remote bridge takes the frame before it leaves the
first LAN and encapsulates the WAN headers and
trailers.
•When the packet arrives at the destination remote
bridge, that bridge removes the WAN headers and
trailers leaving the original frame.
Data Communications and Computer Networks
Switches
•A switch is a combination of a hub and a bridge (multi-
port bridge).
•It can interconnect two or more workstations, but like a
bridge, it observes traffic flow and learns.
•When a frame arrives at a switch, the switch examines the
destination address and forwards the frame out the one
necessary connection.
•Workstations that connect to a hub are on a shared
segment.
•Workstations that connect to a switch are on a switched
segment.
Wireless LANs
LAN/WLAN World
LANs provide connectivity for interconnecting
computing resources at the local levels of an
organization
Wired LANs
Limitations because of physical,hard-
wired infrastructure
Wireless LANs provide
Flexibility
Portability
Mobility
Ease of Installation
Wireless LAN Applications
Medical Professionals
Education
Temporary Situations
Airlines
Security Staff
Emergency Centers
IEEE 802.11 Wireless LAN
Standard
Inresponse to lacking standards, IEEE
developed the first internationally
recognized wireless LAN standard – IEEE
802.11
IEEE published 802.11 in 1997, after seven
years of work
Scope of IEEE 802.11 is limited to Physical
and Data Link Layers.
Benefits of 802.11 Standard
Appliance Interoperability
Fast Product Development
Stable Future Migration
Price Reductions
The 802.11 standard takes into account the
following significant differences between
wireless and wired LANs:
Power Management
Security
Bandwidth
WLAN Topology
Ad-Hoc Network
The BSS without an AP is a stand-alone network and cannot send data to other BSSs.
they can locate one another and agree to be part of a BSS.
WLAN Topology
Infrastructure
◦ BSS-transition
station can move from one BSS to another, but the movement is confined
inside one ESS.
NETWORK LAYER
OVERVIEW
• Network Layer
• Switching Concepts
• Circuit Switching
• Packet Switching
• Message Switching
• IP Addressing
• IPV4
• IPV6
• Routing Protocols
• Distance Vector Routing
• Link State Routing
Network Layer
• The Network layer is responsible for
the source-to-destination delivery of a
packet possible across multiple
networks.
• It converts Frames into packets.
• Source-to-Destination delivery of a packet
• Logical addressing
• Routing
• Internetworking
Network layer Duties
3
Switching Concepts
Switches are hardware or software devices used
for temporary connection b/w 2 or more devices
linked to the switch in network but not to each
another
Switches are needed to connect multiple devices
for making one-one communication
TYPES:
•
•
•
Circuit switching
It creates direct physical connection
b/w two devices such as phone or
computers.
Any computer can be connected to any
other using Levers.
N-by-N folded switches can connect n
lines in full duplex mode.
2 types:
◦
◦
Space Division Switch
Path in the circuit are separatedfrom each other
It is used both in analog and digital
communication
2 Types:
◦ Crossbar switch
◦ Multistage switch
• Crossbar Switch:
It connects n inputs to m outputs using cross points
• Limitation:
More cross points needed(1000 I/P - 1000 O/P requires
1000000 crosspoints)
Crossbar Switch:
Multistage switch
Devices are linked to switches ,that are in turn
linked to another switches(Hierarchy of
switches)
Blocking:
The reduction in a number of cross
points causes a phenomena called
Blocking.
During heavy traffic one input cannot be
connected to output because no path
available
Time Division Switches
It uses time division multiplexing
2 methods:
Time slot interchange
TDM bus
Time slot interchange:
It changes the ordering of the slot based on the
desired connection
It uses RAM to store time slot
Ex:
1->3 2->4 3->1 4->2
A B C D -> C D A B
TSI
TDM Bus- Time Div ision Multiplexing
Here each input and output lines are connected
to high speed bus
Each bus is closed during one of the four time slots
Limitations of Circuit Switching
• It is specially designed for voice
communication(telephone). Not suitable
for data communication.
• Once a circuit is established, it remains for
duration of the session. It creates
dialed(temporary)and leased(Permanent).
• Less data rate because of point to point
connection.
Packet switching
• Packet switching is better for data
transmission.
• Here data are transmitted through unit of
variable length blocks called packets.
• Longer transmission are divided into
multiple packets.
• Packet length is decided by network.
DatagramApproach
• In this approach a message is divided into
multiple packets.
• All packets choose various routes and
reaches the destination.
• Ordering of packets in destination is done by
transport layer.
DatagramApproach
Virtual Circuit approach
It uses single route to send all packets of the
message
Two formats:
◦ Switched virtual circuit
◦ Permanent virtual circuit
SVC
• Connection is temporary
• Dial-up lines
DuringTransmission.
A connection is established-all packets are sent –
proper ACK- Connection is terminated
PVC
• Connection is permanent.
• Circuit is dedicated for two users, No one else can
use the line when communication takes place.
• It always gets the same route.
• Leased lines.
During Transmission.
No connection establishment or termination
PVC
Circuit switchedVs Virtual Circuit
Path Vs Route:
Circuit switched->Path
Virtual Circuit->route
Message Switching
• It uses amechanism called store and forward
• Here a message is received and stored until a
appropriate route is free, then sends along.
• Message switching- uses secondary
storage(Disk)
• Packet switching – uses primary
storage(RAM)
Routers
• The routers decide which route is best among
many routes in a particular transmission.
• Routers are like stations on the network
Routing concepts:
Least cost routing:
Cheaper
Shortest path(using small number of relays or hops.
Hop-count ->Number of relays
Non - Adaptive Routing
In some routing protocols , once a pathway
to a destination is selected ,the router sends
all packets in that way.
Adaptive Routing:
The router may select new route for each
packet.
Packet Life Time (or)Time to Live:
The problem created by looping or
bouncing is avoided by destroying the packet
without looping, New packet is
retransmitted
• To route the packet with optimal cost many
routing algorithms are used to Calculating the
shortest path between 2 routers
1. Distance Vector Routing
2. Link State Routing
Distance vector Routing
Def:
• Each router periodically shares its knowledge about
the entire network with its neighbor.
• It is represented by graph.
Key Works:
• Each router shares its knowledge about the entire
network to neighbors.
• Routing only to the directly linked routers.
• Information sharing at regular interval(each 30
seconds).
The Concept of Distance Vector Routing
2
8
1
Solution
We replace each group of 8 bits with its equivalent decimal
number and add dots for separation:
a. 129.11.11.239
b. 249.155.251.15
Example 2
Change the following IP addresses from dotted-decimal notation to
binary notation.
a. 111.56.45.78
b. 75.45.34.78
Solution
We replace each decimal number with its binary equivalent
(see Appendix B):
Static IP address
◦ manually input by network administrator.
◦ manageable for small networks.
◦ requires careful checks to avoid
duplication.
Types of IP address
Dynamic IP address
examples - BOOTP, DHCP
◦ Assigned by server when host boots
◦ Derived automatically from a range of
addresses
◦ Duration of ‘lease’ negotiated, then address
released back to server
Subnetting
Dividing the network into several smaller
groups (subnets) with each group having its
own subnet IP address.
Site looks to rest of internet like single
network and routers outside the organization
route the packet based on the main Network
address.
Local routers route within subnetted
network using subnet address.
Subnetting
Host portion of address partitioned into subnet
number (most significant part) and host number
(least significant part)
In this case, IP address will have 3 levels
(Main network, subnet, host)
Subnet mask is a 32-bit consists of zeros and ones
that indicates which bits of the IP address are
subnet number and which are host number
Subnet mask when AND ed with the IP address
it gives the subnetwork address
Masking.
Masking is a process that extracts the address
of the physical network from an IP address.
Boundary level masking: Here the mask
numbers are either 255 or 0, finding the
subnetwork address is very easy.
Non-boundary level masking.
If mask numbers are not just 255 or 0,
finding the subnetwork address involves
using the bitwise A N D operators
Supernetting:
• Supernetting combines several networks into
one lager one (Because of Address reduction)
IP Network Addressing
INTERNET world’s largest public data
network, doubling in size every nine months
IPv4, defines a 32-bit address - 232
(4,294,967,296) IPv4 addresses available
The first problem is concerned with the
eventual depletion of the IP address space.
Traditional model of classful addressing does not
allow the address space to be used to its
maximum potential.
ClassfulAddressing
When IP was first standardized in Sep 1981,
each system attached to the IP based Internet
had to be assigned a unique 32-bit address
The 32-bit IP addressing scheme involves a
two level addressing hierarchy
3FFE:85B:1F1F::A9:1234
IPSec support is
Inbuilt IPSec support.
only optional.
Fragmentation is done by
Fragmentation is done only
sender and forwarding
by sender.
routers.
Packet flow identification is
available within the IPv6 header
No packet flow identification.
using the Flow Label field.
TRANSPORT LAYER
OVERVIEW
• Transport Layer
• Service
• Connection Establishment
• Flow Control
• Congestion Control and Avoidance
• Transmission Control Protocol
• User Datagram Protocol
• Transport for Real Time Applications (RTP).
• The Transport layer is responsible for process-
to-process or end-end delivery of the entire
message.
• The transport layer ensures that the whole
message arrives intact and overseeing both
Service point addressing(Process-Process
delivery)
Segmentation and reassembly
Connection control
Flow control(QoS) – MUX & Demux
Error control – error checking and
recovery
Congestion control
– Transport Layer Provides :
• Efficient
• Reliable and
• Cost-effective services
– Another TWO Kinds of Services are :
• Connection oriented - TCP
• Connectionless - UDP
Simple Service: Primitives
• Simple primitives:
– Connect
– Send
– Receive
– Disconnect
• How to handle incoming connection request in
server process?
Wait for connection request from client!
– listen
Berkeley service : Primitives
Connection Establishment
• Once a connection is established, both client and
server may exachnge data using several system
calls.
• A connection is typically used for client-server
interaction.
• A server advertizes a particular server at a well-
known address and clients establish connections to
that socket to avail of the offered service.
• Thus the connection estblishment procedure is
asymmetric.
–Problems to solve
• Selection of the initial sequence
number for a new connection.
• Wrap around of sequence numbers
for an active connection.
• It Handle host crashes.
Releasing a connection
– Asymmetric
• Connection broken when one party hangs up
• Abrupt! may result in data loss
– Symmetric
• Both parties should agree to release connection
• How to reach agreement? Two-army problem
• Solution: three-way-handshake
– Pragmatic approach
• Connection = 2 unidirectional connections
• Sender can close unidirectional connection
Flow Control
It is a set of procedures to tell the sender how much
data it can transmit before it must wait for an
acknowledgement from the receiver.
Two categories of flow control:
◦ Stop-and-wait
Send one frame at a time.
◦ Sliding window
Send several frames at a time.
Stop-and-wait
Sender sends one frame and waits for an
acknowledgement before sending the next frame.
Stop-and-wait
Advantages:
◦ Simplicity.
◦ Each frame is checked and acknowledged
before the next frame is sent.
Disadvantages:
◦ Slow.
Can add significantly to the total transmission time
if the distance between devices is long.
◦ Inefficiency
Each frame is alone on the line.
SlidingWindow
Sender can send several frames before
needing an acknowledgement.
Advantages:
◦ The link can carry several frames at once.
◦ Its capacity can be used efficiently.
Congestion Control and Avoidance
• Congestion Control is concerned with
efficiently using a network at high load.
• Several techniques can be employed. These
include:
• – Warning bit
– Choke packets
Detection
– Load shedding
– Random Early Discard
– Traffic shaping Avoidance
Principles of Congestion Control
Congestion:
informally: “too many sources sending too much
data too fast for network to handle”
different from flow control!
= end-to-end issue!
Choke Packets
• A more direct way of telling the source to
slow down.
• A choke packet is a control packet
generated at a congested node and
transmitted to restrict traffic flow.
• The source, on receiving the choke packet
must reduce its transmission rate by a certain
percentage.
• An example of a choke packet is the ICMP
Source Quench Packet.
3
4
8
Load Shedding
• When buffers become full, routers simply discard
packets.
• Which packet is chosen to be the victim depends
on the application and on the error strategy usedin
the data link layer.
• For a file transfer, for, e.g. cannot discard older
packets since this will cause a gap in thereceived
data.
• For real-time voice or video it is probably better to
throw away old data and keep new packets.
• Get the application to mark packets with discard
priority.
Congestion Avoidance
The following 2 Methods are used to Avoid the
Congestions :
1. Random Early Discard
2. Traffic Shaping
3
5
0
RED, cont.
• If avg is greater than some upper threshold,
congestion is assumed to be serious and the
packet is discarded.
• If avg is between the two thresholds, this
might indicate the onset of congestion. The
probability of congestion is then calculated.
Traffic Shaping
• Another method of congestion Avoidance is to
“shape” the traffic before it enters the
network.
• Traffic shaping controls the rate at which
packets are sent (not just how many). Used in
ATM and Integrated Services networks.
• At connection set-up time, the sender and
carrier negotiate a traffic pattern (shape).
• Two traffic shaping algorithms are:
– Leaky Bucket
– Token Bucket
The Leaky Bucket Algorithm
• The Leaky Bucket Algorithm used to control
rate in a network. It is implemented as a single-
server queue with constant service time. If the
bucket (buffer) overflows then packets are
discarded.
The Leaky Bucket Algorithm
(a)A leaky bucket with water. (b) a leaky bucket with packets.
Token Bucket Algorithm
• In contrast to the LB, the Token Bucket
Algorithm, allows the output rate to vary,
depending on the size of the burst.
• In the TB algorithm, the bucket holds tokens. To transmit
a packet, the host must capture and destroy one token.
• Tokens are generated by a clock at the rate of one token
every sec.
• Idle hosts can capture and save up tokens (up to the max.
size of the bucket) in order to sendlarger bursts later.
The Token Bucket
5-34 Algorithm
ByteStream
ByteStream
T C P T C P
IP Internetwork
Well-known ports used by TCP
Figure : TCP segment format
TCP Header
The length of TCP header is minimum 20
bytes long and maximum 60 bytes.
Source Port (16-bits) - It identifies
source port of the application process on the
sending device.
Destination Port (16-bits) - It identifies
destination port of the application process on
the receiving device.
Sequence Number (32-bits) -
Sequence number of data bytes of a
segment in a session.
Acknowledgement Number (32-
bits) - When ACK flag is set, this number
contains the next sequence number of the data
byte expected and works as acknowledgement
of the previous data received.
Data Offset (4-bits) - This field implies
both, the size of TCP header (32-bit words)
and the offset of data in current packet in the
whole TCP segment.
Reserved (3-bits) - Reserved for future use
and all are set zero by default.
Flags (1-bit each)
NS - Nonce Sum bit is used by Explicit
Congestion Notification signaling process.
CWR - When a host receives packet with ECE
bit set, it sets Congestion Windows Reduced to
acknowledge that ECE received.
ECE - If SYN bit is clear to 0, then ECE means that
the IP packet has its CE (congestion experience) bit
set.
URG - It indicates that Urgent Pointer
field has significant data and should be
processed.
ACK - It indicates that Acknowledgement
field has significance. If ACK is cleared to 0, it
indicates that packet does not contain any
acknowledgement.
PSH - When set, it is a request to the
receiving station to PUSH data (as soon as it
comes) to the receiving application without
buffering it.
RST - Reset flag has the following
features:
It is used to refuse an incoming connection.
It is used to reject a segment.
It is used to restart a connection.
SYN - This flag is used to set up a
connection between hosts.
FIN - This flag is used to release a connection
and no more data is exchanged thereafter.
Because packets with SYN and FIN flags have
sequence numbers, they are processed in
correct order.
Windows Size - This field is used for flow
control between two stations and indicates
the amount of buffer (in bytes) the receiver
has allocated for a segment,
i.e. how much data is the receiver
expecting.
Checksum - This field contains the
checksum of Header, Data and Pseudo
Headers.
Urgent Pointer - It points to the urgent
data byte if URG flag is set to 1.
Options - It facilitates additional options
which are not covered by the regular
header.
Option field is always described in 32-bit
words. If this field contains data less than
32-bit, padding is used to cover the
remaining bits to reach 32-bit boundary.
Connection Management in TCP
TFTP
DNS
RPC, NFS
SNMP
Figure :Pseudo header for checksum calculation
Figure : Queues in UDP
TCP UDP
Slow Fast
Highly Reliable Unreliable
20 Bytes 8 Bytes
APPLICATIONS
• Applications
OVERVIEW
• DNS
• E-Mail Protocol
• WWW
• SNMP
• SMTP
• Security
• Cryptography
• DES
• RSA
• Web security
• SSL
• An application layer is an abstraction layer that
specifies the shared communications protocols
and interface methods used by hosts in a
communications network.
• The application layer abstraction is used in both
of the standard models of computer networking.
• The Internet Protocol Suite (TCP/IP) and the OSI
model.
• Although both models use the same term for their
respective highest-level layer.
Services of Application Layers
• File Transfer
• Addressing
• Mail Services
• Directory Services
• Authentication
DNS
• (Domain Name System) The Internet's
system for converting alphabetic names
into numeric IP addresses.
• For example, when a Web address (URL) is
typed into a browser, DNS servers return the
IP address of the Web server associated
with that name.
• In this example, the DNS converts the URL
www.company.com into the IP address
204.0.8.51.
A Hierarchy of Servers
• The DNS system is a hierarchy of duplicated
database servers worldwide that begin with the
"root servers" for the top-level domains (.com,
.net, .org, .gov, .edu, .mil, etc.). The root
servers point to the "authoritative" servers
located in ISPs,
www.yahoo.com
www --------> Host Name
Yahoo--------> Server Name
com ----------> Domain Name
Structure of DNS
• It Consists of Four Elements
DISADVANTAGES:
Emails cannot be accessed from other machines(unless configured
to do so).
Exporting the local mail folder to another email client or physical
machine can be difficult.
Email folders can become corrupted, potentially losing the entire
mailbox at once.
IMAP(Internet Mail Access Protocol)
This protocol is used while receiving an email.
When one uses IMAP, the emails will be present in the
server and not get downloaded to the user`s mail box and
deleted from the server.
This helps to have less memory used in the local
computer and server memory is increased.
ADVANTAGES:
Mail stored on remote server, i.e. accessible from
multiple different location.
Internet connection needed to access mail.
Mail is automatically backed up if server is managed
properly.
DISADVANTAGES:
The main disadvantage of the IMAP protocols is that
it is mandatory to have an internet connection on
all the time to read/reply and search the message.
WWW
• The World Wide Web is the universe of network-
accessible information.
• In simple terms, The World Wide Web is a way of
exchanging information between computers on the
Internet.
• The World Wide Web is based on several different
Technologies : Web browsers, Hypertext Markup
Language (HTML) and Hypertext Transfer Protocol
(HTTP).
Features of WWW
• HyperText Information System
• Cross-Platform
• Distributed
• Open Standards and Open Source
• Uses Web Browsers to provide a single interface
for many services
• Dynamic, Interactive and Evolving.
• “Web 2.0”
Components of WWW
• There are 5 Components of WWW:
1. Uniform Resource Locator (URL): serves as
system for resources on web.
2. HyperText Transfer Protocol (HTTP): specifies
communication of browser and server.
3. Hyper Text Markup Language (HTML): It Defines
structure, organisation and content of webpage.
4. Web Server : A web server is computer software
and underlying hardware that accepts requests via
HTTP, the network protocol created to distribute
web pages.
Components of WWW
5. Web Browser : A web browser (commonly
referred to as a browser or internet browser).
• It is an application software for accessing the
World Wide Web.
• When a user requests a web page from a
particular website, the web browser retrieves the
necessary content from a web server and then
displays the page on the user's device.
WWW Architecture
Working of WWW
• The World Wide Web is based on several different
technologies :
1. Web browser.
2. Hypertext Markup Language (HTML).
3. Hypertext Transfer Protocol (HTTP).
1. Web browser : It is used to access webpages.
Web browsers can be defined as programs which
display text, data, pictures, animation and video on
the Internet.
2. HTML : Hyperlinked resources on the World
Wide Web can be accessed using software
interface provided by Web browsers.
3. HTTP : It can be used for several tasks
including : searches, mailing, transferring files,
and much more. Some of the commonly used
browsers are Internet Explorer, Opera Mini,
Google Chrome.
• Online Forms
• Shopping Carts
• Word Processors
• Spreadsheets
• Video and Photo Editing
• File Conversion
• File Scanning
• E-mail programs such as Gmail, Yahoo and AOL.
• Popular Applications include Google Apps and
Microsoft 365.
SNMP
• Simple Network Management Protocol (SNMP)
is an application–layer protocol defined by the
Decryption Formula
• The decryption process is very straightforward and
includes analytics for calculation in a systematic
approach. Considering receiver C has the private
key d, the result modulus will be calculated as −
• Web security is also known as
“Cybersecurity”. It basically means
protecting a website or web application by
detecting, preventing and responding to
cyber threats.
• web security is easy to install and it also
helps the business people to make their
website safe and secure.
• A web application firewall prevents
automated attacks that usually target small
or lesser-known websites.
• Secure Sockets Layer (SSL) is a security
protocol that provides privacy,
authentication, and integrity to Internet
communications.
• SSL eventually evolved into Transport Layer
Security (TLS).
• SSL, or Secure Sockets Layer, is an
encryption-based Internet security
protocol. It was first developed by Netscape
in 1995.
• SSL encrypts data that is transmitted across
the web.
• SSL initiates an authentication process called
a handshake between two communicating
devices to ensure that both devices are
really who they claim to be.
• SSL also digitally signs data in order to
provide data integrity.
• SSL supports the following information
security principles:
1. Encryption: protect data transmissions
(e.g. browser to server, server to server,
application to server, etc.)
2. Authentication: ensure the server you’re
connected to is actually the correct server.
3. Data integrity: ensure that the data that is
requested or submitted is what is actually
delivered.