Network Foundations
Network Foundations
Network Foundations
Network Topology
• Manner in which a network is physically connected and shows the layout
of resources and systems
• Topological structure of a network depicted physically or logically
• Types of topology
• Ring
• Star
• Bus
• Mesh
• Tree
• Hybrid
RING Topology
• Closed loop unidirectional transmission links to which devices are serially
connected
• The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology
• Data is transferred in a sequential manner that is bit by bit. Data transmitted,
has to pass through each node of the network, till the destination node.
• Advantage
• Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data
• Cheap to install and expand
• Disadvantage
• Troubleshooting is difficult in ring topology
• Adding or deleting the computers disturbs the network activity
• Failure of one computer disturbs the whole network
BUS Topology
• Every computer and network device is connected to single cable
• When it has exactly two endpoints, then it is called Linear Bus topology.
• Single cable with nodes attached
• When there are branches from the single cable, it is called Tree topology
• It transmits data only in one direction
• Every device is connected to a single cable
• Advantages
• cost effective / easy to understand / Used in small networks.
• Easy to expand joining two cables together / Cable required is least compared to other
network topology
• Disadvantages
• Cables fails then whole network fails
• If network traffic is heavy or nodes are more the performance of the network decreases.
• Cable has a limited length
• It is slower than the ring topology
STAR Topology
• All the computers are connected to a central node
• Every node has its own dedicated connection to the central node
• The central node acts as a repeater for data flow
• Can be used with twisted pair, Optical Fibre or coaxial cable
• Advantages
• Fast performance with few nodes and low network traffic
• Central nodes can be upgraded easily
• Easy to setup, deploy and troubleshoot
• Failure of one system does not negatively impact the network
• Disadvantages
• Cost of installation is high and expensive to use
• If central node fails then the whole network is stopped
• Performance is based on the central node that is it depends on its capacity
MESH Topology
• It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other.
• There are two techniques to transmit data over the Mesh topology, they are :
• Routing: the nodes have a routing logic, as per the network requirements
• Flooding: the same data is transmitted to all the network nodes, hence no routing logic is
required
• Partial Mesh Topology : In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two or three
devices.
• Full Mesh Topology : Each and every nodes or devices are connected to each other.
• Advantages
• Each connection can carry its own data load
• Provides security and privacy
• Disadvantage
• Installation and configuration is difficult
• Bulk wiring is required
TREE Topology
• It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology.
• Used in WAN
• Ideal if workstations are located in groups
• Advantages
• Extension of bus and star topologies
• Expansion of nodes is possible and easy
• Easily managed and maintained
• Error detection is easily done
• Disadvantages
• Heavily cabled
• Costly
• If more nodes are added maintenance is difficult
• Central hub fails, network fails
Media Access
Technologies
General Introduction
• Deals with how systems communicate over the media
• It is usually represented in protocols, NIC drivers and interfaces
• They setup the rules
• on how systems communicate in a network,
• how errors are handled
• The MTU – Maximum transmission unit
• How much data a frame can carry on a specific network
• CSMA/CA
• Systems monitor the network for transmission activity; if they sense the network to
be free; the computer beacons out a broadcast message before transmitting the
data
• This is primarily used in Wireless LAN Technology
Collision and Broadcast domain
• Collision Domain
• Is a group of computers that are contending for the same shared communication
medium
• Collision domains are there in network that are connected by a hub, repeater or
wireless access points
• Broadcast Domain
• Set of computing nodes that can receive all layer 2 broadcast frames
• They are nodes interconnected by switches, bridges or hubs but with no router in
between them
Polling
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The workstation annie asks its configured name
server, dakota, for www.nominum.com’s address
dakota.west.sprockets.com
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The name server dakota asks a root name server, m, for
www.nominum.com’s address
m.root-servers.net
dakota.west.sprockets.com
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The root server m refers dakota to the com name servers
• This type of response is called a “referral”
m.root-servers.net
dakota.west.sprockets.com Here’s a list of the
com name servers.
Ask one of them.
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The name server dakota asks a com name server, f,
for www.nominum.com’s address
What’s the IP address
of
www.nominum.com?
m.root-servers.net
dakota.west.sprockets.com
f.gtld-servers.net
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The com name server f refers dakota to the
nominum.com name servers
Here’s a list of the
nominum.com
name servers.
Ask one of them.
m.root-servers.net
dakota.west.sprockets.com
f.gtld-servers.net
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The name server dakota asks a nominum.com name server,
ns1.sanjose, for www.nominum.com’s address
What’s the IP address
of
www.nominum.com?
m.root-servers.net
dakota.west.sprockets.com
ns1.sanjose.nominum.net
f.gtld-servers.net
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The nominum.com name server ns1.sanjose
responds with www.nominum.com’s address
m.root-servers.net
dakota.west.sprockets.com
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
The Resolution Process
• The name server dakota responds to annie with
www.nominum.com’s address
Here’s the IP
address for
www.nominum.com
m.root-servers.net
dakota.west.sprockets.com
ns1.sanjose.nominum.net
f.gtld-servers.net
annie.west.sprockets.com
ping www.nominum.com.
Acknowledgement: David Conrad at nominum.com
Resolution Process (Caching)
• After the previous query, the name server dakota now knows:
– The names and IP addresses of the com name servers
– The names and IP addresses of the nominum.com name servers
– The IP address of www.nominum.com
• Let’s look at the resolution process again
annie.west.sprockets.com
ping ftp.nominum.com.
Acknowledgement: David Conrad at nominum.com
Resolution Process (Caching)
• The workstation annie asks its configured name
server, dakota, for ftp.nominum.com’s address
m.root-servers.net
dakota.west.sprockets.com
f.gtld-servers.net
annie.west.sprockets.com
ping ftp.nominum.com.
Acknowledgement: David Conrad at nominum.com
Resolution Process (Caching)
• dakota has cached a NS record indicating ns1.sanjose is an
nominum.com name server, so it asks it for
ftp.nominum.com’s address
What’s the IP address
of ftp.nominum.com?
m.root-servers.net
dakota.west.sprockets.com
ns1.sanjose.nominum.net
f.gtld-servers.net
annie.west.sprockets.com
ping ftp.nominum.com.
Acknowledgement: David Conrad at nominum.com
Resolution Process (Caching)
• The nominum.com name server ns1.sanjose
responds with ftp.nominum.com’s address
m.root-servers.net
dakota.west.sprockets.com
Here’s the IP
address for ns1.sanjose.nominum.net
ftp.nominum.com
f.gtld-servers.net
annie.west.sprockets.com
ping ftp.nominum.com.
Acknowledgement: David Conrad at nominum.com
Resolution Process (Caching)
• The name server dakota responds to annie with
ftp.nominum.com’s address
Here’s the IP
address for
ftp.nominum.com
m.root-servers.net
dakota.west.sprockets.com
ns1.sanjose.nominum.net
f.gtld-servers.net
annie.west.sprockets.com
ping ftp.nominum.com.
Acknowledgement: David Conrad at nominum.com
DNS Attacks
• DNS cache poisoning
• These attacks capture and divert queries to another website unknown to users
• Denial of service (DoS)
• Attempts to make a given service impossible or very hard to access. Attacks sometimes
use brute force (saturating servers by flooding them with simultaneous queries) or go
for a more subtle approach by exhausting a rare resource on the server
• Distributed denial of service (DDoS)
• An elaborate form of DoS that involve thousands of computers generally as part of a
botnet or robot network: a network of zombie computers that the attacker
commandeers from their unwitting owners by spreading malware from one machine to
another
• Reflected attacks
• send thousands of requests with the victim’s name as the source address. When
recipients answer, all replies converge on the official sender, whose infrastructures are
then affected.
DNS Attacks
• Reflective amplification DoS:
• if the size of the answer is larger than the question, an amplification effect is
caused. The same technique as reflected attacks is used, except that the difference
in weight between the answer and question amplifies the extent of the attack. A
variant can exploit the protective measures in place, which need time to decode
the long replies; this may slow down query resolution
• Cybersquatting
• involves registering a domain name with the deliberate intent of undermining and
profiting from a third party’s rights or in some way harming that third party.
• "Name-jacking" or theft
• appropriating the domain name (updating the holder’s field and/or contacts) or
taking control by technical means to divert traffic, such as by modifying the name
servers hosting the site.
SMTP
SMTP clients and servers have two main components
User Agents – Prepares the message, encloses it in an envelope. (ex. Thunderbird, Eudora)
Mail Transfer Agent – Transfers the mail across the internet (ex. Sendmail, Exim)
IMAP: Dr.Amer
Friends
….
Internet
Post Office Protocol v3
Simple
• Eg: connect voice and data network; connect IPX with IP network
Firewalls
• Used to restrict access to one network from another network
• Considered chock points in the network
• Work from Layer 3 to Layer 7
• Different types
• Packet filtering
• Stateful
• Proxy
• Dynamic Packet filtering
• Kernel Proxy
• 3 different firewall architectures
• Screened host
• Multihomed
• Screened subnet
Packet Filtering Firewall
• Works in Layer 3 and 4
• Stateless firewalls
• Takes decision based on source and destination IP/Port numbers, protocol type and
direction
Advantage Disadvantage
Not application dependent Cannot prevent attacks that attack
application specific vulnerabilities
Scalable Has limited logging facilities
Have high performance Do not support identity based access
Commonly used as first line of defence Cannot detect spoofed address
May not be able to detect fragmentation
attacks
Stateful firewalls
performance hit
destination
• Cannot look into the contents of the packet Has visibility to the entire packet
• Takes decision based on the header Takes decision based on the content of the packet
information
www.cyintegriti.com