0% found this document useful (0 votes)
75 views69 pages

Computer Networking Part 2 and Internet Safe Suring: CS1 Rick Graziani Cabrillo College Spring 2006

This document discusses computer networking and internet safety. It covers local area networks (LANs), configuring IP addresses, what the internet and TCP/IP are, and how to connect to the internet using a DSL or cable modem with or without a router. It also discusses wireless networks, setting the service set identifier (SSID), and using encryption like WEP or WPA for security. The instructor recommends doing research to determine if any health risks exist from wireless networks.

Uploaded by

Rahul Gupta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views69 pages

Computer Networking Part 2 and Internet Safe Suring: CS1 Rick Graziani Cabrillo College Spring 2006

This document discusses computer networking and internet safety. It covers local area networks (LANs), configuring IP addresses, what the internet and TCP/IP are, and how to connect to the internet using a DSL or cable modem with or without a router. It also discusses wireless networks, setting the service set identifier (SSID), and using encryption like WEP or WPA for security. The instructor recommends doing research to determine if any health risks exist from wireless networks.

Uploaded by

Rahul Gupta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 69

Computer Networking Part 2 and Internet Safe Suring

CS 1 Rick Graziani Cabrillo College Spring 2006

Review
Network LANs IP Configuration Internet TCP/IP DSL/Cable Modem with a Router

Rick Graziani [email protected]

What is a network?
A computer network is a series of computers and other devices
interconnected by communication paths. Computer networks include: LANs and WANs
http://www.albany.edu

Rick Graziani [email protected]

LAN Local Area Network

A LAN:
Operates within a limited geographical area Controlled by local administration Allows local users to: Share printers Access local file servers with software and data Access the Internet
Rick Graziani [email protected] 4

Creating an Ethernet Network



To start, your computer must have an Ethernet Network Interface Card (NIC). Ethernet NICs have an RJ-45 interface or port. Hubs and Switches are used to connect computers, printers and other devices in the Ethernet LAN. Ethernet cables, i.e. Cat-5 or Cat-6 cables (Category 5, Category 6) are used to connect computers to the hubs and switches. Cat-5 cable connects computer NIC to hub or switch.

Rick Graziani [email protected]

IP Configuration
To communicate with other computers
on your network you need to properly configure: IP Address (of your computer) Subnet Mask (of your computer) To communicate with computers outside your network you need to properly configure: Default Gateway IP Address To be able to use domain names, like www.cabrillo.edu, instead of IP addresses you need to properly configure: DNS (Domain Name System) Server IP Address
6

Rick Graziani [email protected]

IP Configuration: Default Gateway


Any information that needs to be sent to IP Addresses outside your
network is sent to the Default Gateway or Router.

192.168.1.10

To the Internet

192.168.1.1

Rick Graziani [email protected]

IP Configuration: DNS
Hey, 207.62.87.54, what is the IP Address for www.yahoo.com?

It is 66.94.230.47

Hey, 66.94.230.47, please send me your web page.


Yahoo Web Server

Here, 192.168.1.10, here is my web page.

Rick Graziani [email protected]

Setting the IP Configuration Information

IP information can be configured: Statically Dynamically Using a DHCP (Dynamic Host Configuration Protocol) Server

Rick Graziani [email protected]

IP Configuration: Dynamic Configuration


Im booting up, if there is a DHCP Server out there, I need my IP Configuration Information!

DHCP Server
Here is your IP Address, Subnet Mask, IP Address for the Default Gateway (router), and IP Address for the DNS Server!

Rick Graziani [email protected]

10

What is the Internet?

The Internet was originally designed by DARPA (Defense Advanced Research Projects Agency) in response to the U.S.S.R. launching Sputnik, the first satellite. Out of this came the Internet, a way for computers to communicate from different parts of the world. These computers can be any type of computer using any type of operating system, as long as they are using the protocol TCP/IP.
11

Rick Graziani [email protected]

What is TCP/IP? What is a protocol?

The actual letter (data) is inside (encapsulated) the envelope.

A protocol is nothing more than an agreement or rules to

govern a way of communicating. The sender and receiver, and everyone in between, must agree on the rules, the protocol.
12

Rick Graziani [email protected]

What is TCP/IP? What is a protocol?

Protocol: An agreed form of communications.

Rick Graziani [email protected]

13

Source IP Address: 192.168.1.10

Inside envelope: Request for web page 66.94.230.47

192.168.1.10

Destination IP Address: 66.94.230.47

Yahoo Web Server

Source IP Address: 66.94.230.47 Destination IP Address: 192.168.1.10


Rick Graziani [email protected]

Inside envelope: Web page

14

DSL or Cable Modem: No Router

Routers can help protect your DSL or Cable Modem Network. 204.180.205.1 Public Address

Hacker can only get to public address and not private address

DSL or Cable Modem

Rick Graziani [email protected]

15

DSL or Cable Modem: With a Router


When using NAT (Network Address Translation, the Router helps hide your network from attackers. 204.180.205.1 Public Address

192.168.1.10 Private Address

Internet Hackers can only get to public addresses and not private addresses
Rick Graziani [email protected] 16

Bandwidth

Bandwidth - The amount of information that can flow through a


network connection in a given period of time. Usually measured in bits per second (bps) bps: bits per second Kbps: thousands of bits per second Mbps: millions of bits per second

Rick Graziani [email protected]

17

Networking Part 2
Circuit Switching versus Packet Switching Wireless Careers in Information Technology

Rick Graziani [email protected]

18

WAN Link Options

Rick Graziani [email protected]

19

Circuit Switched
Circuit Switching: A form of data communication which establishes a
single connection or circuit between source and destination to carry the data stream. Like a conventional telephone system. When a subscriber makes a telephone call the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party.

Rick Graziani [email protected]

20

Packet Switching
Packet Switching: A form of data communications which breaks
a data stream into small sections, sends them separately by the best available channels and reassembles the original data stream at its destination. An alternative is to allocate the capacity to the traffic only when it is needed, and share the available capacity between many users.

Frame Relay, X.25, ATM


Rick Graziani [email protected] 21

Wireless Access Point

A wireless access point is a device that connects wireless devices (laptops, etc.) to a wired network, usually an Ethernet LAN.

Rick Graziani [email protected]

22

Wireless Access Point

In our example the wireless access point (AP) will include a Router.

Rick Graziani [email protected]

23

Putting it together

Exactly the same as connecting a router without an AP.


24

Rick Graziani [email protected]

Configuring the AP and Router


Wireless Settings: SSID (Service Set Identifier) Name of your network Security: WPA, WEP, or none
Router settings include: IP Address, Subnet Mask, Default Gateway, and DNS Server information

Rick Graziani [email protected]

25

SSID

The SSID is what will be displayed when people with wireless computers are looking for a wireless LAN.

Rick Graziani [email protected]

26

Linksys WRT54G
Router Information IP Address from ISP Connects to your DSL/Cable Modem NAT (Network Address Translation) Local Network Switch or Hub Connect wired computers DHCP Server (optional) Wireless SSID: MyHomeNetwork DHCP Server: (optional) Channel: 11

MAC address for APs IP address

Encryption Function: WPA


Rick Graziani [email protected] 27

You choose

There are many resources to discuss the possible health risks or wireless LANs. As a networking and WLAN user and instructor I have my own thoughts which I will share. If you are concerned, then research the information and come to your own conclusions. The following information is from my own research and experience.

Rick Graziani [email protected]

28

Wireless Frequency
Wireless APs operate at:
2.4 GHz 5 GHz 2 GHZ! Thats the same as my microwave oven, isnt that dangerous? Answer: No. Electromagnetic waves happen naturally. Light is an electromagnetic wave It is not the frequency, but the wattage, the power. Any electromagnetic wave can be dangerous with too much power. A 25 watt light bulb is safe, but it wouldnt be safe at 250,000 watts Wireless access points generate signals at 1/10th of a watt. Like all electromagnetic waves, the signal does not fade in a linear manner, but inversely as the square of the distance.
29

Rick Graziani [email protected]

Rick Graziani [email protected]

www.britishlibrary.net

30

Inverse square law


10 20 30 40 50 100

Point A

3 times the distance 1/9 the power of Point A

10 times the distance 1/100 the power of A 5 times the distance 1/25 the power of Point A

2 times the distance the power of Point A

Double the distance of the wireless link, we receive only of the


original power. Triple the distance of the wireless link, we receive only 1/9 the original power. Move 5 times the distance, signal decreases by 1/25.

Rick Graziani [email protected]

31

Putting it in some perspective


Measurements from an antenna transmitting 100mW at 1 inch Remember a milliwatt is 1/1,000th of a Watt Microwave oven typically operates at 1,000 watts in a confined space.
1 100 mW 1/10th watt 2 25 mW 1/40th watt 4 6.25 mW 1/166th watt 8 1.56 mW 1/1000th watt 16 0.39 mW 4/10,000th watt 32 0.097 mW 1/10,000th watt 64 (5.3 ft) 0.024 mW 2/100,000th watt 128 (10.6 ft) 0.006 mW 6/1,000,000th watt 256 (21.3 ft) 0.0015 mW 15/10,000,000th watt Light bulbs would also be dangerous the were 10,000 to 1,000,000,000,000 stronger. A 250,000 watt up to a 250,000,000,000,000 watt light bulb would also be dangerous.
32

Rick Graziani [email protected]

Rick Graziani [email protected]

33

Wireless Security Everyone can hear



Others can hear or capture your information. Wireless signals are propagated, sent, similar to our voice sound waves.

Rick Graziani [email protected]

34

Wireless Security Everyone can hear


If we dont want them to understand what they hear, we can encrypt or
code the information. As long a our wireless computer and access point are using the same encryption algorithm, such as WEP or WPA.

Rick Graziani [email protected]

35

Wireless Security - WPA


WPA (WiFi Protected Access) is currently the best option. The password is configured on both the wireless access point and the
computer.

Rick Graziani [email protected]

36

Wireless Security

Without any security, anyone can: Use your wireless access point to access your network and the Internet. Capture your information from your wireless computer.

Rick Graziani [email protected]

37

Wireless Security
CommView DriftNet

Rick Graziani [email protected]

38

Wireless Security
Your web browsing or email access should already be secured. Look for the lock

Rick Graziani [email protected]

39

Rick Graziani [email protected]

40

Careers in Information Technology

Rick Graziani [email protected]

41

Computer Support Specialist

Installing computer hardware and software. Troubleshooting Maintenance and upgrades


42

Rick Graziani [email protected]

Networking: System Administrator

Installing, configuring, and maintaining network servers UNIX, LINUX, Microsoft Web, DNS, DHCP, Mail Servers Backup and recovery, user administration Security
Rick Graziani [email protected] 43

Networking: Network Technician/Analyst

Install, manage, troubleshoot network infrastructure:

Routers, Switches, Cables, Wireless Access Points Issues: Security, Quality of Service, Video On Demand, Voice over IP
44

Rick Graziani [email protected]

Keeping up on technology

Wireless Security
Rick Graziani [email protected] 45

Internet: Safe Surfing

Safe Surfing

Adware
Pop-ups Spyware Blocking Pop-ups Java Traps or Pop-Up Hell Spyware Blocking Spyware Cookies Virus Protection Spam Blocking Spam
47

Rick Graziani [email protected]

Adware

Adware or advertising-supported software is any software application



in which advertisements are displayed while the program is running. Displays the ads in pop-up windows or through a bar that appears on a computer screen. Adware helps recover programming development costs, and helps to hold down the price of the application for the user (even making it free of charge)and, of course, it can give programmers a profit, which helps to motivate them to write, maintain, and upgrade valuable software.

Rick Graziani [email protected]

48

What are Pop-ups? (Wikipedia.org)

Pop-up ads are a form of online advertising on the Web where certain
websites open a new web browser window to display advertisements. Usually generated by JavaScript A less intrusive variation on the pop-up window is the pop-under advertisement. This opens a new browser window, but in the background, so as not to interrupt the user's page-view.

Rick Graziani [email protected]

49

From Gain Publishing: www.gainpublishing.com/ about/

Rick Graziani [email protected]

50

What are Pop-ups? (Wikipedia.org)

For early advertising-supported websites, banner ads were sufficient


revenue generators. But in the wake of the dot com crash, prices paid for banner advertising clickthroughs decreased and many vendors began to investigate more effective advertising methods. Pop-up ads by their nature are difficult to ignore or overlook, and are claimed to be more effective than static banner ads. Pop-ups have a much higher click rate than web banner ads do.
51

Rick Graziani [email protected]

What are Pop-ups? (Wikipedia.org)


Ultimate irony!

Most users regard pop-ups as a nuisance. In the early 2000s, all major web browsers except Internet Explorer

allowed the user to block pop-ups almost completely. In 2004, Microsoft released Windows XP SP2, which added pop-up blocking to Internet Explorer. Some users install non-Microsoft ad-blocking software instead. Advertisers continually seek ways to circumvent such restrictions. Many of the latest pop-ups are created using Flash and have extensive animation and trickery.
52

Rick Graziani [email protected]

Rick Graziani [email protected]

53

From Microsoft

With Windows XP Service Pack 2 (SP2) Internet Explorer allows you

to prevent most pop-up windows from appearing over pages you want to view while you're using the Internet. When you install SP2, Pop-up Blocker is turned on in Internet Explorer and set to the medium setting, which means it will block most automatic pop-ups.
54

Rick Graziani [email protected]

Block Pop-up Windows with Internet Explorer

http://www.microsoft.com/windowsxp/using/web/sp2_popupblocker.mspx
Rick Graziani [email protected] 55

C/NET Pop-ups mean more $$$

Publishers willingly allow pop-ups or pop-unders because they



command higher prices, and they're in high demand by advertisers. Ad executives say they can cost advertisers about $10 per thousand sent for top-rated sites. That compares with between $2 and $3 per thousand for a static banner ad that appears on the same popular site. The Web sites that sold or disseminated the most pop-up ads in the month of April 2005 include CNN.com, ESPN.com, Excite.com, Weather.com, and The New York Times.

Rick Graziani [email protected]

56

Java Trap or Pop-up Hell

Pornographic websites are among the most common users of pop-up


ads. Some particularly vicious types of pop-up ads have been specifically designed to "hijack" a user's Internet session. As each window is closed by the user it activates another window -sometimes indefinitely. Usually the only way to stop this is to close the browser. Mouse Trapping: Another variation of pop-up fills an entire screen with an ad or Web page, removing any menu bars or other on-screen icons by which the user can close the window.
57

Rick Graziani [email protected]

What are Pop-ups? (Wikipedia.org)

Pop-up ads can also be spawned as a separate process (that is to say,

apart from the browser) on the user's local computer. This is typically because of a spyware infestation, or because the user has voluntarily (or involuntarily) installed adware.

Rick Graziani [email protected]

58

Spyware (Wikipedia.org)

Spyware is computer software that gathers and reports information

about a computer user without the user's knowledge or consent. May perform many different functions, including: the delivery of unrequested advertising (pop-up ads in particular), harvesting private information re-routing page requests to illegally claim commercial site referal fees Spyware as a category overlaps with adware Spyware or Malware in a broader sense can include: adware, remote access trojans (RATs), keystroke loggers, denial-of-service (DoS) attack agents, probe tools, and other backdoor network threats (including most popular remote access tools).
Rick Graziani [email protected] 59

Fighting Spyware

Spybot (www.safer-networking.org) PestPatrol (www.pestpatrol.com)


Rick Graziani [email protected] 60

Cookies
A cookie is information sent by a
server to a browser and then sent back to the server each time it accesses that server. They were invented by Lou Montulli, a former employee of Netscape Communications. Amongst other uses, cookies enable websites to be customized for individual users once browsing patterns have been established. Cookies can however cause potential security problems as information such as credit card details might be collected via a cookie. Cookies can however, only store information that you provide.
61

Rick Graziani [email protected]

Cookies - Purpose

Typically this is used to authenticate or identify a registered user of a


web site as part of their first login process or initial site registration without requiring them to sign in again every time they access that site. Other uses are maintaining a "shopping basket" of goods selected for purchase during a session at a site, site personalization (presenting different pages to different users), and tracking a particular user's access to a site.
62

Rick Graziani [email protected]

Cookies - Permissions

A browser may or may not allow the use of cookies. The user can usually choose a setting. Microsoft Internet Explorer
Tools > Internet Options > Privacy Tab Use slider to set options, or use advanced options
Rick Graziani [email protected] 63

Virus Protection

In computer security technology, a virus is a selfreplicating program that spreads by inserting copies of itself into other executable code or documents
64

Rick Graziani [email protected]

Spam (Wikipedia)

Spamming is the act of sending unsolicited electronic messages in



bulk. The most common form of spam is that delivered in e-mail as a form of commercial advertising. Spamming has been considered by various commercial, government, and independent entities to be one of the foremost social problems facing electronic media today. Many attempts have been made to curb this problem including e-mail filtering, contractual measures such as Internet Service Providers' acceptable-use policies, laws such as the Can Spam Act of 2003 and market pressures such as boycotts of those who use or support spam.
65

Rick Graziani [email protected]

CAN-SPAM Act of 2003 (Wikipedia)


The CAN-SPAM Act of 2003, signed into law by President Bush on
December 16, 2003, establishes the first national standards for the sending of commercial e-mail and requires the Federal Trade Commission (FTC) to enforce its provisions. The bill's full name is an acronym: Controlling the Assault of NonSolicited Pornography and Marketing Act of 2003. It also requires the FTC to promulgate rules to shield consumers from unwanted mobile service commercial messages. The bill permits e-mail marketers to send unsolicited commercial e-mail as long as it contains all of the following: an opt-out mechanism; a functioning return e-mail address; a valid subject line indicating it is an advertisement; and the legitimate physical address of the mailer. The legislation also prohibits the sale or other transfer of an e-mail address obtained through an opt-out request. It criminalizes the use of automated means to register for multiple e-mail accounts from which to send spam. It prohibits sending sexually-oriented spam Rick Graziani [email protected] markings. 66 without clear

Anti-Spam

Spammers obtain e-mail addresses by a number of means:


Web pages guessing common names at known domains "e-pending" searching for e-mail addresses corresponding to specific persons Many e-mail spammers go to great lengths to conceal the origin of their messages. Spoofing e-mail addresses - spammer modifies the e-mail message so it looks like it is coming from another e-mail address. Among the tricks used by spammers to try to circumvent the filters is to intentionally misspell common spam filter trigger words, ie. "viagra" might become "vaigra", or by inserting other symbols within the word, i.e. "v/i/a/g./r/a".
67

Rick Graziani [email protected]

Spam

Rick Graziani [email protected]

68

Internet: Safe Surfing


CS 1 Rick Graziani Spring 2006

You might also like