deepak bhinde pgt computer science k v no. 2, ajmer · address 0.0.0.0, 127 .0.0.1 and 255 .255...

27
Deepak Bhinde Deepak Bhinde PGT Computer Science K V No. 2, Ajmer

Upload: others

Post on 15-Jul-2020

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Deepak BhindeDeepak Bhinde

PGT Computer Science

K V No. 2, Ajmer

Page 2: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Agenda � Introduction

� Need for Networking

� Elementary Terminology of Network

Domain Name Resolution� Domain Name Resolution

� Network Topologies

� Types of Network

� Transmission Media

� Network Devices

� Network Security

Deepak Bhinde PGT Computer Science

Page 3: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Deepak Bhinde PGT Computer Science

Page 4: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Computer Networks� What is a Network ?

An interconnected collection of autonomous computer.

� Computer Networks

Computer network

Deepak Bhinde PGT Computer Science

� Computer networkconnects two or moreautonomouscomputers.

� The computers canbe geographicallylocated anywhere.

Page 5: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Need of Networking � Network Goals

1. Resource Sharing

� To make all programs ,data and peripherals available to any oneon the network irrespective of the physical location of theresource and the user.resource and the user.

2. Reliability

� A file can have copies on two or three different machines , so if one of them is unavailable ( hardware crash ) , the other copies could be used.

3. Cost Factor

� PC’s have better price / performance ratio then micro computer.

4. Communication Medium

Deepak Bhinde PGT Computer Science

Page 6: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Application of Network� Resource Sharing

� Hardware (computing resources, disks, printers)� Software (application software)

� Information Sharing� Easy accessibility from anywhere (files, databases)� Easy accessibility from anywhere (files, databases)� Search Capability (WWW)

� Communication� Email� Message broadcast

� Remote computing

� Distributed processing (GRID Computing)

Deepak Bhinde PGT Computer Science

Page 7: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Elementary Terminology of

Network� Nodes (Workstations )

A computer becomes a workstation (or node ) of a network as soon as it is attached to a network.

� Server � Server

A computer that facilitates the sharing of data , softwareand hardware resource ( e.g. printer , modems etc .) onthe network , is termed as a Server.

Deepak Bhinde PGT Computer Science

Page 8: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Network Interface Unit (NIU) / MAC Address

� A Network Interface unit is an interpreter that helpsestablish communication between the server andworkstation .

� Each network interface that attested to a workstationhas a unique number identifying it which is known asthe node address.

� The NIU is also called Terminal Access Point (TAP).

� Different manufactures have different names for theinterface . The NIU is also called NIC – NetworkInterface Card.

Deepak Bhinde PGT Computer Science

Page 9: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Network Interface Unit (NIU) / MAC Address

� The NIC manufacture assigns a unique physical address to each NIC Card. This physical address is known as Media Access Control address ( MAC address)

� The MAC address refers to the physical address assigned by NIC Manufacture.assigned by NIC Manufacture.

� A Mac address is a 6- byte address with each byte separated by a colon

� E.g. Each MAC address is unique for each network card.

10 : B5 : 03 : 63 : 2E : FC

Deepak Bhinde PGT Computer Science

Manufacture Id ( This code is assigned to manufacture by IEEE)

Card no ( assigned by the Manufacture )

Page 10: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� IP Address

� IP address is for the INTERFACE of a host. Multipleinterfaces mean multiple IP addresses, i.e., routers.

� 32 bit IP address in dotted-decimal notation for easeof reading, i.e., 193.140.195.66

� Address 0.0.0.0, 127.0.0.1 and 255.255.255.255 carries� Address 0.0.0.0, 127.0.0.1 and 255.255.255.255 carriesspecial meaning.

� IP address is divided into a network number and ahost number.

� Also bits in Network or Host Address cannot be all 0or 1.

Deepak Bhinde PGT Computer Science

Page 11: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� IP Address

Deepak Bhinde PGT Computer Science

Page 12: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Deepak Bhinde PGT Computer Science

Page 13: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Class A : Address begins with bit 0. It has 8 bitnetwork number (range 0.0.0.0-to-127.255.255.255), 24bit host number.

� Class B : Address begins with bits 10. It has 16 bitnetwork number (range 128.0.0.0-to-191.255.255.255),network number (range 128.0.0.0-to-191.255.255.255),16 bit host number.

� Class C : Address begins with bits 110. It has 24 bitnetwork number (range 192.0.0.0-to-223.255.255.255),8 bit host number.

� Class D : Begins with 1110, multicast addresses(224.0.0.0-to-239.255.255.255)

� Class E : Begins with 11110, unused

Deepak Bhinde PGT Computer Science

Page 14: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Domain Name

� The domain name is a unique name assigned to a website.

� easy to remember names for computers on the Internet (such as internic.net).

� A domain generally contain following s following parts:

� www

� Name decribing the website’s purpose

� TLD (Top Level Domain ) such as .com, .net , .org ,.edu , .ca , .in , .jp etc.

� Examples

www.amazon.com

www.wayn.com.cn

www.cbse.nic.in

Deepak Bhinde PGT Computer Science

Page 15: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Domain Name Resolution

� DNR refers to the process of obtaining corresponding IP address from a domain name

� DNS Resolution is the procedure used to resolve a IP

address from a domain name.

� This is very similar to how we get the phone number of � This is very similar to how we get the phone number of

a person we want to contact.

� It is all based on hierarchy.

Deepak Bhinde PGT Computer Science

Page 16: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Domain Names vs. URLs

� A domain name is contained in a URL. See the examples below.

� ftp://ftp.company.com/downloads.report.doc

� http://www.networkclue.com/index.php� http://www.networkclue.com/index.php

Deepak Bhinde PGT Computer Science

Protocol

Resource or File

Hostname Domain Name

Fully Qualified Domain Name (FQDN)

Page 17: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Network Topology

� The network topologydefines the way in whichcomputers, printers, andother devices areconnected. A network

Introduction to Computer Networks

connected. A networktopology describes thelayout of the wire anddevices as well as thepaths used by datatransmissions.

Page 18: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Bus Topology

Commonly referred to as alinear bus, all the deviceson a bus topology areconnected by one singlecable.cable.

Page 19: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Star & Tree Topology

� The star topology is the most commonly used architecture in Ethernet LANs.

� When installed, the star topologyresembles spokes in a bicyclewheel.

� Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames orpackets, like bridges, switches, androuters, this topology significantlyreduces the traffic on the wires bysending packets only to the wires ofthe destination host.

Page 20: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Ring Topology

� A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data as wellas the destination address to the frame.

� The frame then continues around thering until it finds the destination node,ring until it finds the destination node,which takes the data out of the frame.

� Single ring – All the devices on thenetwork share a single cable

� Dual ring – The dual ring topologyallows data to be sent in bothdirections.

Page 21: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Mesh Topology

The mesh topologyconnects all devices(nodes) to each otherfor redundancy andfault tolerance.fault tolerance.

It is used in WANs tointerconnect LANs andfor mission criticalnetworks like thoseused by banks andfinancial institutions.

Implementing themesh topology isexpensive and difficult.

Page 22: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

Network Security

Deepak Bhinde PGT Computer Science

Page 23: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Intrusion Problem / Access Attacks

� When an authorized user attempts to gain access toprotected sensitive information , it is known as AccessAttack or Intrusion Problem .

� This type of attack against confidentially of information.

� Some common access attack are :

Snooping refers to unauthorized access of someone else ‘s� Snooping refers to unauthorized access of someone else ‘sdata ,email, computer – activity , or data communication.

� Eavesdropping is the act of secretly listening /interruptingsomeone else’s private communication / data / information.

Deepak Bhinde PGT Computer Science

Page 24: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Denial of service (DoS) Attacks

� A Denial of Service (DoS) attack is an attack whichattempts to prevent the victim from being able to use allor part of their network connection.

� A denial of service attack may target a user, to preventthem from making outgoing connections on thenetwork. A denial of service may also target an entireorganization, to either prevent outgoing traffic or toorganization, to either prevent outgoing traffic or toprevent incoming traffic to certain network services,such as the organizations web page.

� Denial of service attacks are much easier to accomplishthan remotely gaining administrative access to a targetsystem. Because of this, denial of service attacks havebecome very common on the

Deepak Bhinde PGT Computer Science

Page 25: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Network Security Measures

� The combination of identification ,authentication andauthorization can control access to a system.

� The combination is very useful especially in networksecurity.

� Various technologies used for Network Security

1. Active Protection1. Active Protection

2. Preventive Measures

Deepak Bhinde PGT Computer Science

Page 26: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Active Protection

� Authorization

� Asking the user a legal login- id .

� Authentication

� In termed as Password – protection.

� Firewall

A system deigned to prevent unauthorized access to or � A system deigned to prevent unauthorized access to or from a private network is called firewall.

� Intrusion detection

� The art and science of sensing when a system or network is being used inappropriately or without authorization.

Deepak Bhinde PGT Computer Science

Page 27: Deepak Bhinde PGT Computer Science K V No. 2, Ajmer · Address 0.0.0.0, 127 .0.0.1 and 255 .255 .255 .255 carries special meaning. IP address is divided into a network number and

� Preventive Measures

� Implement proper security policy for your organization

� Use proper file access permission when sharing files on theinternetinternet

� Disconnect from the Internet when away

Deepak Bhinde PGT Computer Science