Computer Network and Security Theme Module
Computer Network and Security Theme Module
APRIL, 2024
Contents
INTRODUCTION ................................................................................................................. 5
Background ............................................................................................................................ 5
Module Description ............................................................................................................... 5
Sub theme 1: Fundamentals of Networking ........................................................................ 5
Unit 1: Introduction to Data Communications and Computer Networks ................................ 5
Learning Objectives of the unit ............................................................................................ 6
1.1 Introduction to data communication .................................................................................. 6
1.2 Computer Networks And Its Application .......................................................................... 8
1.3 Transmission Media ........................................................................................................ 17
1.3.1 Wired transmission medium ......................................................................................... 17
1.4 Introduction to Computer Network Protocol ................................................................... 26
1.4.1 Computer network protocol ......................................................................................... 26
1.4.2 The OSI Reference Model ........................................................................................... 27
1.5 Network Protocols ........................................................................................................... 28
1.5.1 Hardware & Software Protocols.................................................................................. 29
1.5.2 Routable and Non Routable Protocols ........................................................................ 29
1.5.3 Internet Control Message Protocol (ICMP)................................................................ 29
Unit 2: The OSI and the TCP/IP Communication Models .............................................. 31
Learning Objectives of the unit .......................................................................................... 31
2.1 Communication and Layer Architecture ......................................................................... 31
2.2 The Seven Layers of an OSI Model ................................................................................ 32
2.2.1 The OSI Reference Model ........................................................................................... 32
Application Layer (Layer 7).................................................................................................. 32
Presentation Layer (Layer 6) ................................................................................................ 33
Session Layer (Layer 5) ........................................................................................................ 34
Transport Layer (Layer 4) .................................................................................................... 34
Network Layer (Layer 3)....................................................................................................... 35
Data link Layer (Layer 2) ..................................................................................................... 35
The Physical Layer (Layer 1) ............................................................................................... 35
2.3 Transmission Control Protocol (TCP) ............................................................................. 36
2.4 User Datagram Protocol (UDP) ....................................................................................... 36
2.5 Network Protocols ........................................................................................................... 38
2.5.1 File Transfer Protocol (FTP)......................................................................................... 38
2.5.2 Simple Mail Transfer Protocol (SMTP) ...................................................................... 38
2.5.3 Dynamic Host Configuration Protocol (DHCP)......................................................... 38
2.5.4 Telnet............................................................................................................................ 38
2
2.5.5 Network File System .................................................................................................... 38
2.6 TCP/IP Communication Models .................................................................................... 39
2.6.1 Application Layer ........................................................................................................ 39
2.6.2 Network Layer (3rd OSI Layer) .................................................................................. 42
3
1.4 Domain .......................................................................................................................... 201
1.5 Server Roles................................................................................................................... 201
1.6 Installing Active Directory Domain Services ................................................................ 202
1.7 User Account Management ........................................................................................... 203
1.8 Group Account Management......................................................................................... 206
1.9 Computer Account Management ................................................................................... 208
1.10 Implementing DNS ...................................................................................................... 209
1.11 Domain Name Space ................................................................................................... 210
1.12 Working with Organizational Units (OUs).................................................................. 214
1.13 Implementing File Services ......................................................................................... 215
1.14 Implementing DHCP ................................................................................................... 217
1.16 Using DHCP in a Routed Network.............................................................................. 217
1.15 Implementing DHCP ................................................................................................... 218
Self-check questions........................................................................................................... 220
Sub theme 3 Computer Security ...................................................................................... 223
Learning Objectives of the unit ........................................................................................ 223
What is Computer Security? ............................................................................................ 223
1.2 Confidentiality, Integrity, Availability: The three components of the CIA Triad ......... 223
2.1. Security mechanisms .................................................................................................... 227
Encryption and Decryption.................................................................................................. 229
3.cybersecurity incident .................................................................................................... 232
3.1 The growing importance of cybersecurity ..................................................................... 232
3.2 Security events............................................................................................................... 233
3.3 Firewalls ........................................................................................................................ 233
3.4 Critical servers ............................................................................................................... 234
Self-check questions........................................................................................................... 236
Reference ............................................................................................................................ 237
4
INTRODUCTION
Background
The Ministry of Education of Ethiopia has announced the implementation of exit exam for all under graduate
program students (public and private), beginning with the 2022/2023 academic year, in order to improve the quality
of graduates produced by higher learning institutions. The exit exam aimed at checking whether students have
acquired the required knowledge, skills and attitudes or not. To implement this, it is required to prepare a
comprehensive Exit Exam Module for students of Road Information Technology. As part of this task, Computer
Network and security module is prepared.
The Computer Network and security module is prepared by the Federal TVET Institute, Department of
Information Technology. This module is prepared in order to guide the students planning to take Exit Exam after
completing the necessary courses of Information Technology.
Module Description
The Computer Network and Security module is organized in three sub themes which are Fundamentals of Network
(Sub theme 1), Server Administrator (Sub theme 2), and Information system Security (Sub theme 3) in sequential
order in the module. All sub themes are also constructed from multiple units focusing on specific areas. At the
beginning of each units of sub themes important learning objectives were outlined. Further, at the end of each sub
themes some exercise and self-check questions were included to help students test themselves after studying the
material. For additional information, important reference materials are also cited.
Communication implies an exchange of information between at least two parties. The exchange may
be in the form of words, letters, messages, drawings, etc.
Data communication is the process of transmitting and receiving data in an orderly way. When the data
travels a short distance, the communication is referred to as local communications. When the data
travels a long distance, the communication is referred to as telecommunications.
It refers to all types of data transmission from voice to video. Telecommunication technology embraces
radio waves travelling through the air or through space, electrical waves flowing along a telephone
wire, and laser pulses travelling along optical fiber.
Examples of telecommunication services include: Telephone, cellular radio, fax, Teleconferencing,
video conferencing, etc
Five components of data communication
exchanges:
6
a. A simplex connection is a connection in which the data flows in only one direction, from
the transmitter to the receiver. This type of connection is useful if the data do not need to flow
in both directions (for example, from your computer to the printer or from the mouse to your
computer...).
b. A half-duplex connection (sometimes called an alternating connection or semi-duplex) is
a connection in which the data flows in one direction or the other, but not both at the same time.
• With this type of connection, each end of the connection transmits in turn.
• This type of connection makes it possible to have bidirectional communications
using the full capacity of the line.
• In a half-duplex transmission, the entire capacity of a channel is taken over by Whichever of the
two devices is transmitting at the time?
• Walkie-talkies and CB (citizens band) radios are both half-duplex systems.
• The half-duplex mode is used in cases where there is no need for communication in
both directions at the same time; the entire capacity of the channel can be utilized
for each direction.
c. Full-Duplex: In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously.
• The full-duplex mode is like a two-way street with traffic flowing in both directions
at the same time.
• In full-duplex mode, signals going in one direction share the capacity of the link: with
Signals going in the other direction.
• This sharing can occur in two ways: Either the link must contain two physically
separate transmission paths, one for sending and the other for receiving; or the
capacity of the channel is divided between signals travelling in both directions.
• One common example of full-duplex communication is the telephone network. When
two people are communicating by a telephone line, both can talk and listen at the
same time.
• The full-duplex mode is used when communication in both directions is required all
the time.
• The capacity of the channel, however, must be divided between the two directions.
7
Figure 1.1 Communication Modes
1.2 Computer Networks And Its Application
The two major benefits of computer networking include:
• Computer networks are used as a communication medium
• Computer networks are used for resource sharing and As a Communication medium
Uses of computers as a communication medium includes:
• Electronic mail (e-mail)
• Video conferencing
• Chatting
• Resource sharing
A computer network is a collection of computers and other devices that communicate to share data,
hardware, and software.
i.e. the importance of computer networking as a resource sharing includes:
• Data/information sharing,
• Program/software sharing and
• Device / hardware sharing
Data /Information Sharing
This involves access to remote or distributed database and files containing data, text, image or
video.
Program/software Sharing
Programs stored on a central server can simultaneously be accessed and loaded for execution on several
local computers. Software sharing occurs when several users at different locations run application
programs that are installed centrally in one location (server computer). Software’s that are installed
8
centrally can be managed and upgraded centrally.
Such systems are most commonly used in financial system where the main application is stored
centrally and users in different sections of the finance department are able to run the system
from the network
Based on Ownership
Based on ownership networks are commonly classified by as:
• Private Networks
• Public Networks
Private Network
Is the type of network which is built by an organization for its exclusive use? Example the
network in this campus is a private network.
Public Network
Is established and operated by a network service provider for the specific purpose of
providing services to customer organizations and individuals.
Example: Ethiopian Telecommunication Corporation
A bus topology connects each computer (node) to a single segment trunk. A ‘trunk’ is a
communication line, typically coax cable that is referred to as the ‘bus.’ The signal travels from one
end of the bus to the other. A terminator is required at each end to absorb the signal so it does not
reflect back across the bus.
In this topology when a data is to be transmitted from one device to the other, it is broadcast to the
communication channel i.e. the data will pass through all the stations. Each computer checks the
address on the signal (data frame) as it passes along the bus. If the signal’s address matches that of the
computer, the computer processes the signal. If the address doesn’t match, the computer takes no action
and the signal travels on down the bus.
➢ It is easy to extend
➢ In a bus topology since there is only one communication channel, the communication
channel can handle only one message at a time. I.e. when two computers transmit data
at the same time a collision occurs & the message will be re-sent. Data transmission
will slow down when this happens.
➢ If the bus is damaged anywhere in its path, then the network will stop working.
Limited cable length and number of stations Performance degrades as additional computers are
11
added.
Star topology
Star topology is the most common network topology found in most offices. In this topology all the
smaller computers called terminals and other peripheral devices are connected to a central host
computer called server computer or a hub, which looks like a star. The host computer is usually a
mainframe, minicomputer or powerful microcomputer.
The hub/server offers a common connection for all stations on the network. Each station has its own
direct cable connection to the hub/server. In most cases, this means more cable is required than for a
bus topology. However, this makes adding or moving computers a relatively easy task; simply plug them
into a cable outlet on the wall.
If a cable is cut, it only affects the computer that was attached to it. This eliminates the single point of
failure problem associated with the bus topology. (Unless, of course, the hub itself goes down.). Star
topologies are normally implemented using twisted pair cable, specifically unshielded twisted pair
(UTP).
Advantage and Disadvantage of the Star Topology Advantage
➢ In star topology modifying the system & adding new computers is easy
➢ If one computer in star topology fails, the only failed computer is unable to send /
receive data.
Disadvantage
Ring topology
In this topology all the computers and other peripheral devices are connected in a single circle of cable.
In other words, it’s a circle or ring of computers connected serially by cable. There are no
terminated ends to the cable; the signal travels around the circle in a clockwise direction.
That means each computer in the network can communicate with any other computer through the ring.
Ring networks avoid the data collisions that can slow down bus networks by creating an
electronic signal called token.Under the ring concept, a signal is transferred sequentially via a "token"
from one computer to the next. When a computer wants to transmit, it captures the token, attaches data
and an address to it, and then sends it around the ring. The token travels along the ring until it reaches
the destination address. The receiving computer acknowledges receipt with a return message to the
sender. The sender then releases the token for use by another computer.
Each station on the ring has equal access but only one station can talk at a time. Rings are normally
implemented using twisted pair or fiber-optic cable.
Advantage and Disadvantage of the Ring Topology Advantage
➢ If the path between two computers fails, then it will use the other path
➢ Addition of computers to the network will slow down the speed of the network
➢ Failure of one computer can have an impact on the rest of the network because each
computer acts as a repeater to boost the signal and send it to the next computer.
Mesh topology
13
Mesh topology is also known as completely connected network topology. In a mesh topology
each computer is connected to every other computer by a separate cable.
14
Advantage and Disadvantage of the Mesh Topology
Advantage
➢ In a mesh topology, if one computer fails then the entire network will not be affected
➢ If one path between the source and destination computer fails then it will use the other
path.
Disadvantage
16
1.3 Transmission Media
In data communication terminology, a transmission medium is a physical path between the
transmitter and the receiver i.e it is the channel through which data is sent from one place to
another. There are two types of transmission media, namely guided and unguided. Guided
transmission media are cables like twisted pair cables, coaxial cables, and fiber optic cables.
Unguided transmission media are wireless, such as infrared, radio waves, and microwaves.
17
Twisted pair cable is the oldest, least expensive and most commonly used type of transmission medium.
It consists of strands of insulated copper wires that are twisted together in pair to form a cable. There are
two types of twisted-pair cable.
18
Figure 1.9 RJ 45 connector
19
Types of Coaxial Cable
There are two types of coaxial cable:
1. Thin coaxial cable (thinnet)
2. Thick coaxial cable (thicknet)
The type of coaxial cable you select depends on the needs of your particular network.
Thinnet Cable
➢ Thinnet coaxial cable is a flexible coaxial cable about 0.64 centimeters thick.
➢ Because this type of coaxial cable is flexible and easy to work with, it can be used in
almost any type of network installation.
➢ Thinnet coaxial cable can carry a signal for a distance of up to approximately 185 meters
before the signal starts to suffer attenuation.
Thicknet Cable
➢ Thicknet cable is a relatively rigid coaxial cable about 1.27 centimeters in diameter.
➢ Thicknet cable’s copper core is thicker than a thinnet cable copper core.
➢ The thicker the copper core, the farther the cable can carry signals. This means that
thicknet can carry signals farther than thinnet cable.
➢ Thicknet cable can carry a signal for 500 meters
➢ Therefore, because of thicknet's ability to support data transfer over longer distances, it
is sometimes used as a backbone to connect several smaller thinnet-based networks.
➢ Thick coaxial cable has an extra protective plastic cover that helps keep moisture away
from the center conductor. This makes thick coaxial a great choice when running longer
lengths in a liner bus network.
Thinnet Vs Thicknet Cable:
Thinnet cables are flexible, easy to install and relatively inexpensive. However, a thicknet cable does not
bend easily and is therefore, harder to install. In addition, thicknet cable is more expensive than thinnet
cable, but will carry a signal farther.
Coaxial-Cable Connection Hardware
Both thinnet and thicknet cables use a connection component, known as a BNC connector, to make the
connections between the cable and the computers.
There are several components in the BNC family, including the following:
The BNC cable connector:
The interface at the end of the cable that is used to connect to a barrel or T-connector
20
Figure 1.10 BNC cable connector.
The BNC T connector
➢ This connector joins the network interface card (NIC) in the computer to the network
cable.
21
➢ A BNC terminator closes each end of the bus cable to absorb stray (lost) signals once
it reaches the end of the bus. Otherwise, the signal will bounce and all network activity
will stop.
22
photo-detector on the other end collects the optical signals and they are converted back to electrical
signals.
Unlike copper cable, the signals on fiber-optic cable are not subject to the problems of attenuation, or
crosstalk. This greatly increases the potential transmission distance. In addition fiber-optic cable is more
secure than copper wire. Fiber-optic cable is generally more expensive than copper cable (i.e. twisted
pair cable & coaxial cable).
Fiber-Optic Connection Hardware
The most common connector used with fiber optic cable is an ST connector. Fiber-
optic cable advantages and Disadvantages
Fiber-optic cable advantages
➢ Fastest transmission rate
➢ Not susceptible to electrical interference
➢ There is high security
Fiber-optic cable Disadvantages
➢ Most expensive
➢ Relatively difficult to work with
Wireless Transmission Medium
Although the majority of LANs connect devices using a physical cable, there are instances where it is
difficult or impossible to install cable- such as in historical properties or when there is no right-way of
access between adjacent buildings. In such cases wireless transmission can be used to connect network
devices.
23
radio waves; waves ranging in frequencies between 1 and 300 GHz are called microwaves. However,
the behavior of the waves, rather than the frequencies, is a better criterion for classification. Radio
waves, for the most part, are Omni-directional that is, when an antenna transmits radio waves, they are
propagated in all directions. This means that the sending and receiving antennas do not have to be
aligned. A sending antenna sends waves that can be received by any receiving antenna. Radio waves,
particularly those waves that propagate in the sky mode, can travel long distances.
This makes radio waves a good candidate for long-distance broadcasting such as AM radio. Radio
waves, particularly those of low and medium frequencies, can penetrate walls. This characteristic can
be both an advantage and a disadvantage. It is an advantage because, for example, an AM radio can
receive signals inside a building. It is a disadvantage because we cannot isolate a communication to
just inside or outside a building.
The radio wave band is relatively narrow, just under 1 GHz, compared to the microwave band. When
this band is divided into sub bands, the sub bands are also narrow, leading to a low data rate for digital
communications.
Almost the entire band is regulated by authorities (e.g., the FCC in the United States). Using any part
of the band requires permission from the authorities.
Omni directional Antenna
Radio waves use omnidirectional antennas that send out signals in all directions. Based on the
wavelength, strength, and the purpose of transmission, we can have several types of antennas.
Applications
The unidirectional characteristics of radio waves make them useful for multicasting, in which there is
one sender but many receivers. AM and FM radio, television, maritime radio, cordless phones, etc are
examples of multicasting.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwave waves, they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned (see each other). The
unidirectional property has an obvious advantage. A pair of antennas can be aligned without interfering
with another pair of aligned antennas.
The following describes some characteristics of microwave propagation: Microwave propagation is
line-of-sight. Since the towers with the mounted antennas need to be in direct sight of each other,
towers that are far apart need to be very tall.
The curvature of the earth as well as other blocking obstacles does not allow two short towers to
communicate by using microwaves.
➢ Repeaters are often needed for long distance communication.
➢ Very high-frequency microwaves cannot penetrate walls.
o This characteristic can be a disadvantage if receivers are inside buildings.
24
➢ The microwave band is relatively wide, almost 299 GHz.
o Therefore wider subbands can be assigned, and a high data rate is possible
➢ Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Two types of antennas
are used for microwave communications: the parabolic dish and the horn.
1. A parabolic dish antenna is based on the geometry of a parabola:
➢ Every line parallel to the line of symmetry (line of sight) reflects off the curve at
angles such that all the lines intersect in a common point called the focus.
➢ The parabolic dish works as a funnel, catching a wide range of waves and directing
them to a common point.
➢ In this way, more of the signal is recovered than would be possible with a single-
point receiver.
➢ Outgoing transmissions are broadcast through a horn aimed at the dish. The
microwaves hit the dish and are deflected outward in a reversal of the receipt path.
2. A horn antenna looks like a gigantic scoop.
➢ Outgoing transmissions are broadcast up a stem (resembling a handle) and deflected
outward in a series of narrow parallel beams by the curved head.
➢ Received transmissions are collected by the scooped shape of the horn, in a manner
similar to the parabolic dish, and are deflected down into the stem.
Applications
➢ Microwaves, due to their unidirectional properties, are very useful when unicast (one-
to-one) communication is needed between the sender and the receiver.
25
➢ They are used in cellular phones, satellite networks , and wireless LANs.
Infrared
➢ Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770
nm), can be used for short-range communication.
➢ Infrared waves, having high frequencies, cannot penetrate walls.
➢ This advantageous characteristic prevents interference between one system and another; a
short-range communication system in one room cannot be affected by another system in
the next room.
➢ When we use our infrared remote control, we do not interfere with the use of the remote by
our neighbors!!!
➢ However, this same characteristic makes infrared signals useless for long-range
communication.
➢ In addition, we cannot use infrared waves outside a building because the sun's rays contain
infrared waves that can interfere with the communication.
Applications
The infrared band, almost 400 THz, has an excellent potential for data transmission.
➢ Such a wide bandwidth can be used to transmit digital data with a very
high data rate.
The Infrared Data Association (IrDA), an association for sponsoring the use of infrared waves, has
established standards for using these signals for communication between devices such as keyboards,
mice, PCs, and printers. For example, some manufacturers provide a special port called the IrDA port
that allows a wireless keyboard to communicate with a PC.
➢ The standard originally defined a data rate of 75 kbps for a distance up to 8 m. The recent
standard defines a data rate of 4 Mbps.
➢ Infrared signals defined by IrDA transmit through line of sight; the IrDA port on the keyboard
needs to point to the PC for transmission to occur.
➢ Infrared signals can be used for short-range communication in a closed area using line-of-
sight propagation!!!
26
To successfully send and receive information, devices on both sides of a communication exchange
must accept and follow protocol conventions. In networking, support for protocols can be built into
software, hardware or both.
What is ISO?
ISO stands for the International Standardization Organization. It is an organization which works to
establish international standardization for all services and manufactured products. Therefore, in the area
of computing, the ISO’s goal is to establish global standards for communications and information
exchange. The ISO’s major achievement in the area of networking and communications has been to
define a set of standards, known as the OSI reference model.
27
Figure 1.16 OSI reference model
The above figure shows the assembly of data at the sending side and the disassembly of the data at the
receiving end. When data is sent over the network, it is passed through all seven layers each layer adds
a header with information before passing the data on to the next layer. The data link layer adds a trailer.
The physical layer passes the data with the attached header and trailer information on to the physical
network. When a data frame arrives at the receiving computer, each layer removes the appropriate
header and, if included, trailer and reads the information before sending the data on the next layer. This
process is repeated for every data frame sent between two computers communicating on the network.
1.5 Network Protocols
A protocol is a set of rules and procedures governing the exchange of data between two components.
Some of the functions that protocols perform include:
• Identifying the different devices in the communication path
• Establishing the speed & method to be used for the transmission of data
• Altering the receiving device to the incoming data & defining the way receipt of data is to be acknowledged
by the receiving device
• Determines how errors are to be detected and corrected
28
Protocols can be broadly classified in to different categories as:
• Hardware and software protocols
• Routable and Non Routable Protocols
• Connection Oriented and Connection less Protocols
1.5.1 Hardware & Software Protocols
Hardware Protocols are protocols that define how hardware devices operate and work together
i.e. hardware protocols define the communication between different hardware devices while Software
Protocols are Programs communicate with each other via software protocols. Network client computers
and network servers both have protocol packages that must be loaded to allow them to talk other
computers. These packages contain the protocols the computer needs to access certain network device or
service.
1.5.2 Routable and Non Routable Protocols
A Routable protocol is a network protocol which can carry data from one network and can pass through
the router to reach another network and be delivered to a computer in that remote network. Examples of
routable protocols: Internet Protocol (IP -IPv4 and Ipv6), IPX, AppleTalk, VINES Internetwork
Protocol (VIP), DECnet.
None routable Protocols A non-routable protocol’s data cannot be passed through a router to reach a
remote network. This is mainly because of the lack of capability of protocol (almost all non-routable
protocols are designed long back which will not fit well in current networks) and the addressing scheme
the non-routable protocol is using.
Non-routing protocols reachability limit is its own network and they are designed in such a way to
think that all computers they communicate are on the same network as the source computer
Connection Oriented and Connection less Protocols Connection Oriented Protocols
If you need to ensure that certain data arrives at its destination, then connection oriented protocol can
be used. This protocol sends acknowledgements to show that the data is received successfully.
Connectionless Protocols are those protocols that send out the data across the network with no feedback
as to whether it arrived at the destination device or not. I.e. it doesn’t acknowledge whether the data is
safely arrived at the destination device.
Connectionless Protocols are faster than connection oriented protocols ones due to the less
functionality. They are used mainly when there is a need to send data to multiple computers at once, or
where high speed is needed.
29
Since IP is a connection less protocol, there is no error checking mechanism. This implies that IP cannot
detect when an error occurs on the network. It’s up to the ICMP to report errors back to the host
computer that sent the IP packet.
For example, if a network device cannot forward an IP packet on to the next network in its journey,
then it will send back a message to the source of that packet using ICMP to explain the error. Some
common types of errors that ICMP can report include Destination Unreachable, Congestion, Echo
Request, Echo Replay etc…
RIP & OSPF
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are the tow routing
protocols in the Internet Protocol Suite. I.e. RIP & OSPF are used for routing information.
RIP: uses the number of routers (hops) between the originating computer (sender) and the destination
computer (receiver), to decide the best way (path) to route a packet.
OSPF: uses much more information than just the number of routers (hops) to make a decision. These
includes the number of hops between the source and destination device, the speed of the connection
between the hops and the load balancing – to calculate the best way to route packets.
30
Unit 2: The OSI and the TCP/IP Communication Models
Learning Objectives of the unit
Communication architecture is a strategy for connecting host computers and other communicating
equipment. It defines necessary elements for data communication between devices. Communication
architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a
31
manner defined by the communication architecture and passes it on to the communication software.
Separating communication functions adds flexibility, for example, we do not need to modify the entire
host software to include more communication devices.
The OSI reference model has seven layers. The main objective of dividing in to seven layers include:
creating manageable layers by breaking down the complex network operations.
32
This layer grants a direct interface and access to the users with the network. The users can directly
access the network at this layer. Few Examples of services provided by this layer include e-mail,
sharing data files, FTP GUI based software like Netnumen, Filezilla (used for file sharing), telnet
network devices etc. There is vagueness in this layer as is not all user-based information and the
software can be planted into this layer.
For Example
Any designing software can’t be put directly at this layer while on the other hand when we access any
application through a web browser, it can be planted at this layer as a web browser is using HTTP
(hypertext transfer protocol) which is an application layer protocol. Therefore irrespective of the
software used, it is the protocol used by the software that is considered at this layer.
Software testing programs will work on this layer as the application layer provides an interface to its end
users to test the services and their uses. The HTTP protocol is mostly used for testing at this layer but
FTP, DNS, TELNET can also be used as per the requirement of the system and network in which they
are operating.
• At this layer the user interfaces with the computer.
• Provides network services to application processes such as e-mail, file transfer, database access
• Initiates requests or accepts a request to send a packet
• The information to be sent across the network starts at this layer
Presentation Layer (Layer 6)
As suggested by the name itself, the presentation layer will present the data to its end users in the form
in which it can easily be understood. Hence, this layer takes care of the syntax, as the mode of
communication used by the sender and receiver may be different. It plays the role of a translator so that
the two systems come on the same platform for communication and will easily understand each other.
The data which is in the form of characters and numbers are split into bits before transmission by the
layer. It translates the data for networks in the form in which they require it and for devices like
phones, PC, etc in the format they require it. The layer also performs data encryption at the sender’s
end and data decryption at the receiver’s end.
It also performs data compression for multimedia data before transmitting, as the length of multimedia
data is very big and much bandwidth will be required to transmit it over media, this data is compressed
into small packets and at the receiver’s end, it will be decompressed to get the original length of data in
its own format. At this layer, a certain amount of data translation & byte reordering is done i.e. when
computers from dissimilar systems such as IBM, Apple & Sun - need to communicate a certain amount
of data translation & byte reordering is done.
33
Within the sending computer the presentation layer translates the data from the format sent down from
the application layer in to a commonly recognized, intermediary format.
At the receiving computer, this layer translates the intermediary format in to a format that can be useful
to the computer’s application layer.
Tasks like data compression, decompression, encryption & decryption are performed in this layer.
Compression: is the process of shrinking the size of data that will be put on the network cable
Decompression: is the process of extracting the compressed data in to its original size.
Encryption: is the process of making information unreadable to protect it from an authorized
viewing or use.
Decryption: is the process of decoding the information back to the original form A key is
required to decrypt the information
Session Layer (Layer 5)
This layer permits the users of different platforms to set up an active communication session between
themselves. The main function of this layer is to provide sync in the dialogue between the two distinctive
applications. The synchronization is necessary for efficient delivery of data without any loss at the
receiver end.
Let’s understand this with the help of an Example.
Assume that a sender is sending a big data file of more than 2000 pages. This layer will add some
checkpoints while sending the big data file. After sending a small sequence of 40 pages, it ensures the
sequence & successful acknowledgment of data.
If verification is OK, it will keep repeating it further till the end otherwise it will re-synchronize and re-
transmit. This will help in keeping the data safe and the whole data host will never completely get lost
if some crash happens. Also, token management, will not allow two networks of heavy data and of the
same type to transmit at the same time. Session layer starts, governs and stops transmission order i.e.
the session layer in the sending computer will start the transmission of the data, and the session layer at
the receiving computer will govern and stops the transmission of the data.
34
Network Layer (Layer 3)
The network layer is the third layer from the bottom. This layer has the accountability to accomplish
the routing of data packets from the source to destination host between the inter and intra networks
operating on the same or different protocols.
The answer is very simple that it finds out the easy, shortest, and time-efficient way out between the
sender and the receiver to exchange data using routing protocols, switching, error detection and
addressing techniques. It performs the above task by using a logical network addressing and subnetting
designs of the network. Irrespective of the two different networks working on the same or different
protocol or different topologies the function of this layer is to route the packets from the source to
destination by using the logical IP addressing and routers for communication.
The network layer is responsible for addressing messages.
At this layer, each segment is given an address which is the logical address.
At the network layer, we call the data (which includes at this point the transport header and the upper
layer information) a packet. Here one packet at a time is sent and an IP header is added to each packet
It determines the routing of data packets from the source to the destination computer. Determines which path the data
should take based on the network condition
Data link Layer (Layer 2)
Adds a header containing hardware (physical) source and destination address. Adds error checking information &
prepares packet for sending out over the physical connection. At the data link layer, we call the data (which includes
at this point the IP header and the upper layer information) a frame. The data link layer sends data frames from the
network layer to the physical layer – at the sender side. At the receiver end, it packages row bits from the physical
layer in to data frames.
35
Application Layer Application Layer
36
UDP is simpler than TCP because it doesn’t worry about:
• missing packets or keeping data in the right order
• UDP is used for programs that only send short messages.
Address Resolution Protocol (ARP) & Reverse Address Resolution Protocol (RARP)
Address Resolution Protocol (ARP): is used to find the physical (hardware) address of a computer, by
using its IP address. If for example system A wants to send the message to system B, it has to add/attach
the source physical address, the source IP address, the destination physical address and the destination
IP address to the data. However, if it doesn’t know the physical address of the destination device, but it
has the IP address of the destination device, then it will broadcast the message to all the devices
(computers) over the network using ARP request. Since the request is broadcast over the network, each
device on the network checks the destination IP address to their IP address, the device whom its IP
address is broadcasted over the network (for example, device B) will then send back its Physical
address to the source device(i.e. computer A) over the network using ARP reply.
Note:
ARP request is broadcast (i.e. the request is sent to every computer on the network).
ARP reply is unicast (i.e. the reply is sent to the requesting device only – in this case the reply is sent to
only device A).
37
Reverse Address Resolution Protocol (RARP): is used to find the IP address of a computer, by using
its physical address.
Note:
The RARP request packets are broadcast; the RARP reply packets are unicast.
38
2.6 TCP/IP Communication Models
TCP/IP Model helps you to determine how a specific computer should be connected to the internet
and how data should be transmitted between them. It helps you to create a virtual network when
multiple computer networks are connected together. The purpose of TCP/IP model is to allow
communication over large distances.TCP/IP stands for Transmission Control Protocol/ Internet
Protocol. TCP/IP Stack is specifically designed as a model to offer highly reliable and end-to-end byte
stream over an unreliable internetwork.
Four Layers of TCP/IP model
In this TCP/IP tutorial, we will explain different layers and their functionalities in TCP/IP model:
39
➢ E-mail (SMTP,POP,IMAP)
Domain Name System (DNS)
➢ Thousands of servers, installed in many different locations, provide the services we use
over the Internet.
➢ Each of these servers is assigned a unique IP address
➢ It would be impossible to remember all of the IP addresses
➢ DNS provides a way for hosts to use this name to request the IP address of a specific
server.
➢ DNS names are registered and organized on the Internet within specific high level
groups, or domains.
Web client and web server
➢ A web client first receives the IP address of a web server from DNS server
➢ Then the client browser uses that IP address and port 80 to request web services
➢ This request is sent to the server using the Hypertext Transfer Protocol (HTTP)
➢ The information content of a web page is encoded using specialized 'mark-up'
languages.
▪ E.g. HTML (Hypertext Mark-up Language)
➢ Many different web servers and web clients from many different manufactures work
together seamlessly because of HTTP and HTML
File Transfer Protocol (FTP)
➢ FTP is another common service used across the Internet that allows users to transfer
files
➢ A host running FTP client software can access an FTP server to perform various file
management functions including file uploads and downloads
➢ FTP service uses two different ports to communicate between client and server
➢ Requests to begin an FTP session are sent to the server using destination port 21.
➢ Once the session is opened, the server will change to port 20 to transfer the data files
➢ FTP client software is built into computer operating systems and into most web
browsers
40
➢ Mailboxes are identified by the format: [email protected]
Three application protocols used in processing email include
➢ Simple Mail Transfer Protocol (SMTP):- to send mail from client to server or server
to server
➢ Post Office Protocol (POP3):- to download email from server to client, and the server
deletes the mail
➢ Internet Message Access Protocol (IMAP4):- to download email from server to client,
and the server does not delete (keeps) the mail
TCP/IP Network Model Layers
➢ As with the OSI model, the TCP/IP suite uses a layered model.
➢ TCP/IP model has four or five - depending on who you talk to and which books you read!
➢ Some people call it a four layer suite - Application, Transport, Internet and Network
Access, others split the Network Access layer into its Physical and Datalink components.
41
Figure 2.8 Four Layers OSI Layers
42
➢ The network layer adds a header to the packet coming from the upper layer that, among other
things, includes the logical addresses of the sender and receiver. We discuss logical
addresses later in chapter Six.
Routing:- When independent networks or links are connected to create internetworks (network of
networks) or a large network, the connecting devices (called routers or switches) route or switch the
packets to their final destination.
➢ One of the functions of the network layer is to provide this mechanism.
43
2. Ensures that, if required, all the data is received reliably and in order by the correct
application
3. Employs error handling mechanisms
Responsibilities of the transport layer include the following
Service-point addressing:- Computers often run several programs at the same time. For this reason,
source-to-destination delivery means delivery not only from one computer to the next but also from a
specific process (running program) on one computer to a specific process on the other. The transport
layer header must therefore include a type of address called a service- point address (or port address).
The network layer gets each packet to the correct computer; the transport layer gets the entire message
to the correct process on that computer.
Segmentation and reassembly:- A message is divided into transmittable segments, with each segment
containing a sequence number.
These numbers enable the transport layer to reassemble the message correctly upon arriving at the
destination and to identify and replace packets that were lost in transmission.
Flow control:- Like the data link layer, the transport layer is responsible for flow control.
➢ However, flow control at this layer is performed end to end rather than across a single link.
Error control:- Like the data link layer, the transport layer is responsible for error control.
➢ However, error control at this layer is performed process-to-process rather than across a
single link.
➢ The sending transport layer makes sure that the entire message arrives at the receiving
transport layer without error (damage, loss, or duplication).
➢ Error correction is usually achieved through retransmission.
➢ Connection control:- The transport layer can be either connectionless or connection-
oriented.
➢ Connectionless transport layer treats each segment as an independent packet and delivers
it to the transport layer at the destination machine.
➢ Connection-oriented transport layer makes a connection with the transport layer at the
destination machine first before delivering the packets.
2.6.4 Transport layer addressing
Whenever we need to deliver something to one specific destination among many, we need an address.
At the data link layer, we need a MAC address to choose one node among several nodes if the
connection is not point-to-point. A frame in the data link layer needs a destination MAC address for
delivery and a source address for the next node's reply. At the network layer, we need an IP address to
choose one host among millions. A datagram in the network layer needs a destination IP address for
delivery and a source IP address for the destination's reply.
44
At the transport layer, we need a transport layer address, called a port number, to choose among multiple
processes running on the destination host.
➢ The destination port number is needed for delivery; the source port number is needed for
the reply.
➢ In the Internet model, the port numbers are 16-bit integers between 0 and 65,535.
➢ The client program defines itself with a port number, chosen randomly by the transport
layer software running on the client host. This is the ephemeral (temporal) port number.
(next slide, more on port number)
Identifying Applications (Processes)
In order to pass data streams to the proper applications, the Transport layer must identify the target
application. To accomplish this, the Transport layer assigns an application identifier called a port
number. Each software process that needs to access the network is assigned a port number unique in that
host This port number is used in the transport layer header to indicate to which application that piece of
data is associated.
The server process must also define itself with a port number. This port number, however, cannot be
chosen randomly. If the computer at the server site runs a server process and assigns a random number
as the port number, the process at the client site that wants to access that server and use its services will
not know the port number. Of course, one solution would be to send a special packet and request the
port number of a specific server, but this requires more overhead. The Internet has decided to use
universal port numbers for servers; these are called well-known port numbers. Example of well-
known port numbers: 21 for FTP, 23 telnet, 25 SMTP, 80 HTTP, etc
45
➢ It does not add anything to the services of IP except to provide process-to-process
communication.
Also, it performs very limited error checking. If UDP is so powerless, why would a process want to use
it? With the disadvantages come some advantages. UDP is a very simple protocol using a minimum of
overhead. If a process wants to send a small message and does not care much about reliability, it can
use UDP. Sending a small message by using UDP takes much less interaction between the sender and
receiver than using TCP or SCTP.
UDP packets, called user datagrams, have a fixed-size header of 8 bytes Source port number. This is the
port number used by the process running on the source host. Destination port number this is the port
number used by the process running on the destination host. This is a 16-bit field that defines the total
length of the user datagram, header plus data.
46
2. UDP is suitable for a process with internal flow and error control mechanisms. For example,
the Trivial File Transfer Protocol (TFTP) process includes flow and error control. It can
easily use UDP.
3. UDP is a suitable transport protocol for multicasting. Multicasting capability is embedded
in the UDP software but not in the TCP software.
4. UDP is used for management processes such as SNMP.
5. UDP is used for some route updating protocols such as Routing Information Protocol (RIP).
Transmission Control Protocol (TCP)
TCP, like UDP, is a process-to-process (program-to-program) protocol. TCP, therefore, like UDP, uses
port numbers. Unlike UDP, TCP is a connection-oriented protocol; it creates a virtual connection
between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport
level. In brief, TCP is called a connection-oriented, reliable transport protocol. It adds connection-
oriented and reliability features to the services of IP.
TCP Services
1. Process-to-Process Communication:- Like UDP, TCP provides process-to-process
communication using port numbers.
2. Stream Delivery Service
3. Full-Duplex Communication
4. Connection-Oriented Service
5. Reliable Service
Stream Delivery Service
➢ TCP, unlike UDP, is a stream-oriented protocol.
➢ In UDP, a process (an application program) sends messages, with predefined boundaries,
to UDP for delivery.
➢ UDP adds its own header to each of these messages and delivers them to IP for transmission.
➢ Each message from the process is called a user datagram and becomes, eventually, one IP
datagram.
➢ Neither IP nor UDP recognizes any relationship between the datagrams.
➢ Each application using UDP must send small data to fit into one user datagram as it is.
(UDP does not segment/reassemble)
TCP, on the other hand, allows the sending process to deliver data as a stream of bytes and allows the
receiving process to obtain data as a stream of bytes. TCP creates an environment in which the two
processes seem to be connected by an imaginary "tube” that carries their data across the Internet. The
sending process produces (writes to) the stream of bytes, and the receiving process consumes (reads
from) them (Fig. next slide)
47
Figure 2.11 TCP/IP sending and receiving
Sending and Receiving Buffers
Because the sending and the receiving processes may not write or read data at the same speed, TCP
needs buffers for storage. There are two buffers, the sending buffer and the receiving buffer, one for
each direction. One way to implement a buffer is to use a circular array of 1- byte locations. For
simplicity, two buffers of 20 bytes each in example next slide are used; normally the buffers are
hundreds or thousands of bytes, depending on the implementation. The two buffers shown do also have
the same size, which is not always the case.
Connection-Oriented Service
TCP, unlike UDP, is a connection-oriented protocol. When a process at site A wants to send and
receive data from another process at site B, the following occurs:
1. The two TCPs establish a connection between them.
2. Data are exchanged in both directions.
3. The connection is terminated.
Note that this is a virtual connection, not a physical connection. The TCP segment is encapsulated in an
IP datagram and can be sent out of order, or lost, or corrupted, and then resent.
➢ Each may use a different path to reach the destination. There is no physical connection.
➢ TCP creates a stream-oriented environment in which it accepts the responsibility of
delivering the bytes in order to the other site.
48
TCP Segment Numbering System
Byte Number. TCP numbers all data bytes that are transmitted in a connection.
➢ Numbering is independent in each direction.
➢ When TCP receives bytes of data from a process, it stores them in the sending buffer and
numbers them.
➢ The numbering does not necessarily start from 0.
➢ Instead, TCP generates a random number between 0 and 232 - 1 for the number of the first
byte.
➢ For example, if the random number happens to be 1057 and the total data to be sent are
6000 bytes, the bytes are numbered from 1057 to 7056.
➢ Byte numbering is used for flow and error control too.
Sequence Number. After the bytes have been numbered, TCP assigns a sequence number to each
segment that is being sent. The sequence number for each segment is the number of the first byte
carried in that segment.
49
Unit 3 Internet Protocol (IP) and IP Addressing
Learning Objectives of the unit
• Be able to understand Subnetting basics
• Be able to create subnets
• Be able to understand IP addressing Troubleshooting
3.1 IP Addresses
Before two computers on a network can communicate, they need to know how to contact each other. Just as
every computer has hardware address called a MAC address that is encoded in to the network card, computers
also have what is called a logical address.
This is an address that is usually set by an administrator, though it is sometimes automatically set by the network
protocol suite used. Every host on a TCP/IP is given an IP address. This address is a unique 4 byte address.
IP Address Representation
Dotted-decimal notation
In dotted-decimal notation the IP address is normally written as four decimal numbers, with each number
representing 1 byte. The numbers are separated by a dot.
Example: 132.24.75.9
Changing IP Addresses from binary notation to dotted-decimal notation and vice versa:
Example 1:
Solution: -129.11.11.239
50
Example 2
111.56.45.78
Example 3
Solution: - In dotted-decimal notation, each number is less than or equal to 255; 301 is outside this range.
If the first two bits of the first byte are10 then it is Class B address
If the first three bits of the first byte are 110 then it is Class C address If the first
four bits of the first byte is 1110 then it is Class D address If the first four bits of
Example 4
51
1. Find the class of the address: 00000001 00001011 00001011 11101111
Solution: The first 2 bits are 1; the third bit is 0. This is a class C address
Identifying the class in decimal notation
The first byte of class B addresses is always between 128 and 191
The first byte of class C addresses is always between 192 and 223
The first byte of class D addresses is always between 224 and 239
The first byte of class E addresses is always between 240 and 255
Example 5
Solution: The first byte is 227 (between 224 and 239); the class is D.
Solution: The first byte is 193 (between 192 and 223); the class is C.
52
Class A: Addresses
In class A addressing the first byte defines the Netid (Network Adress) while the remaining three bytes define the
Hostid (Host Computer).
For example, the address 56.88.1.123 has a network address (Netid) of 56, and the remaining numbers signify the
host.
The first byte of class A addresses is always between 0 and 127. This implies that there are a total of 128 blocks
(Network addresses) in Class A.
The first block ranges from 0.0.0.0 to 0.255.255.255 , while the last block ranges from 127.0.0.0 to
127.255.255.255.
With this arrangement each class A network (block) can have 256 * 256 * 256 = 16,777,216 host
computers. Generally, class A addresses can support 128 * 256 * 256 * 256 = 2,147,483,648 hosts.
Class B: Addresses
In class B addressing the first two bytes defines the Netid (Network Address) while the remaining two
bytes defines the Hostid (Host Computer)
For example, the address 131.88.1.123 has a network address (Netid) of 131.88, and the remaining
numbers i.e. 1.123 identify the host.
53
The first byte of class B addresses is always between 128 and 191.
The first block (network address) ranges from 128.0.0.0 to 128.0.255.255 , while the last block ranges from
191.255.0.0 to 191.255 . 255 . 255.
This implies that there are a total of 64 * 256 = 16,384 blocks (Network addresses) in Class B. This is because
the range of the first byte for class B addresses is 64 (i.e. from 128 to 191 the range is 64) and the second byte
consists of 256 addresses.
With this arrangement each class B network (block) can have 256 * 256 = 65,536 host computers. Generally,
Class C: Addresses
In class C addressing the first three bytes defines the Netid (Network Address) while the remaining one byte
defines the Hostid (Host Computer)
For example, the address 201.88.1.123 has a network address (Netid) of 201.88.1, and the last byte i.e. 123
identify the host.
The first byte of class C addresses is always between 192 and 223.
The first block ranges from 192.0.0. 0 to 192.0.0. 255 , while the last block ranges from 223.255.255. 0 to 223.
255 . 255 . 255.
This implies that there are a total of 32 * 256 * 256 = 2,097,152 blocks (Network addresses) in Class
C. This is because the range of the first byte for class C addresses is 32 (i.e. from 192 to 223 the range is 32) and
the second & third bytes each consists of 256 addresses.
With this arrangement each class C network (block) can have 256 host computers. Generally, class C
54
The number of addresses in a class C block is smaller than the needs of most Organizations Class D
addresses are used for multicasting; there is only one block in this class.
Class E addresses are reserved for special purposes; most of the block is wasted.
Network Addresses:
The network address (the first address in the block) is the one that is assigned to the organization.
The network address defines the network to the rest of the Internet. Unicast, Multicast, and Broadcast Addresses
Example
Solution
The value of n is 28, which means that number of addresses is 2 32−28 or 16.
Another way to find the first address, the last address, and the number of addresses is to represent the mask as a
32-bit binary (or 8-digit hexadecimal) number. This is particularly useful when we are writing a program to find
these pieces of information. In the above example the /28 can be represented as
Find
55
a. The first address
Solution
The first address can be found by ANDing the given addresses with the mask. ANDing here is done bit
by bit. The result of ANDing 2 bits is 1 if both bits are 1s; the result is 0 otherwise.
The last address can be found by ORing the given addresses with the complement of the mask. ORing
here is done bit by bit. The result of ORing 2 bits is 0 if both bits are 0s; the result is 1 otherwise. The
complement of a number is found by changing each 1 to 0 and each 0 to 1.
The number of addresses can be found by complementing the mask, interpreting it as a decimal number, and
adding 1 to it.
56
3.1.1 How to set static IP address
Sometimes, it’s better to assign a PC it’s own IP address rather than letting your router assign one
automatically. Join us as we take a look at assigning a static IP address in Windows.
Right now, the IP addresses for your PCs and other devices are probably assigned automatically by your
router using a procotol known as Dynamic Host Configuration Protocol (DHCP). It’s a handy way for
devices to connect to your network more easily, because you don’t have to configure IP addressing for
each new device yourself. The downside to automatic addressing is that it’s possible for a device’s IP
address to change from time to time. Mostly, that’s not a big deal, but there are times that you might
want a device to have a static, unchanging IP address. For example:
• You have a device (like a home media server, say) that you want to be able to find reliably and you (or
other devices) prefer to locate it by IP address. Using IP addresses is often much handier when
troubleshooting your network, for example?
• You have certain apps that can only connect to network devices using their IP address. In particular,
many older networking apps suffer this limitation.
• You forward ports through your router to devices on your network. Some routers play nice with port
forwarding and dynamic IP addresses; others do not.
57
While this article covers assigning static IP addresses to PCs within Windows itself, there is another
way to go about it. Many routers allow you to assign a pool of IP addresses that are handed out to
specific devices (based on the device’s physical, or MAC address). This method offers a couple of
significant advantages:
• IP addresses are still managed by the router, meaning that you won’t have to make (and keep up with)
changes on each individual device.
• It’s easier to assign addresses within the same IP address pool your router uses.
With all that in mind, though, let’s take a look at how to assign static IP addresses within Windows XP,
Vista, 7, 8, and 10.
To change the computer’s IP address in Windows, you’ll need to open the “Network
Connections” window. Hit Windows+R, type “ncpa.cpl” into the Run box, and then hit Enter.
In the “Network Connections” window, right-click the adapter for which you want to set a static IP
addresses, and then select the “Properties” command.
In the “Network Connections” window, right-click the adapter for which you want to set a static IP
address, and then select the “Properties” command.
58
In the properties window for the adapter, select “Internet Protocol Version 4 (TCP/IPv4)” and then
click the “Properties” button.
Select the “Use the following IP address” option, and then type in the IP address, subnet mask, and
default gateway that corresponds with your network setup. Next, type in your preferred
59
and alternate DNS server addresses. Finally, select the “Validate settings upon exit” option so that
Windows immediately checks your new IP address and corresponding information to ensure that it
works.
When you’re ready, click the “OK” button.
60
Windows automatically runs network diagnostics to verify that the connection is good. If there are
problems, Windows will give you the option of running the Network troubleshooting wizard. However,
if you do run into trouble, the wizard likely won’t do you too much good. It’s better to check that your
settings are valid and try again.
61
Assigning Addresses
SET A STATIC IP ADDRESS IN WINDOWS XP
To set a Static IP in Windows XP, right-click the “My Network Places” icon, and then select
“Properties.”
Right-click the adapter for which you want to set the IP, and then select “Properties” from the context
menu.
62
Figure 3.13: Ethernet Properties Dialog
Select the “Internet Protocol (TCP/IP)” entry, and then click the “Properties” button.
Select the “Use the following IP address” option. Type in the IP address, subnet mask, default gateway,
and DNS server addresses you want to use. When you’re finished, click the “OK” button.
63
Figure 3.15: TCP/IP Properties Dialog
You will need to close out of the adapter’s properties window before the changes go into effect.
64
Figure 3.16: Wirless Network Propertiess Dialog
And you can verify your new settings by using the ipconfig command at the command prompt.
This topic describes the issues you must resolve in order to create your network in an organized, cost-
effective manner. After you resolve these issues, you can devise a network plan as you configure and
administer your network in the future.
When you design your network, you must decide what type of network best meets the needs of your
organization. Some of the planning decisions you must make involve the following network hardware:
• The network topology, the layout, and connections of the network hardware
• The number of host systems your network can support
• The types of hosts that the network supports
• The types of servers that you might need
• The type of network media to use: Ethernet, Token Ring, FDDI, and so on
• Whether you need bridges or routers extend this media or connect the local network to
external networks
• Whether some systems need separately purchased interfaces in addition to their built in
interfaces
Based on these factors, you can determine the size of your local area network.
65
Obtaining Your Network's IP Number
An IPv4 network is defined by a combination of an IPv4 network number plus a network mask, or
netmask. An IPv6 network is defined by its site prefix, and, if subnetted, its subnet prefix.
Unless your network plans to be private in perpetuity, your local users most likely need to
communicate beyond the local network. Therefore, you must obtain a registered IP number for your
network from the appropriate organization before your network can communicate externally. This
address becomes the network number for your IPv4 addressing scheme or the site prefix for your IPv6
addressing scheme.
Internet Service Providers provide IP addresses for networks with pricing that is based on different
levels of service. Investigate with various ISPs to determine which provides the best service for your
network. ISP's typically offer dynamically allocated addresses or static IP addresses to businesses.
Some ISPs offer both IPv4 and IPv6 addresses.
The number of systems that you expect to support affects how you configure your network. Your
organization might require a small network of several dozen standalone systems that are located on one
floor of a single building. Alternatively, you might need to set up a network with more than 1,000
systems in several buildings. This setup can require you to further divide your network into subdivisions
that are called subnets.
When you plan your network addressing scheme, consider the following factors:
After you receive your assigned network IP address and you have given the IP addresses to your
systems, the next task is to assign names to the hosts. Then you must determine how to handle name
services on your network. The TCP/IP protocols locate a system on a network by using its IP address.
However, if you use a recognizable name, then you can easily identify the system. Therefore, the
TCP/IP protocols (and the Solaris OS) require both the IP address and the host name to uniquely
identify a system.
66
From a TCP/IP perspective, a network is a set of named entities. A host is an entity with a name. A
router is an entity with a name. The network is an entity with a name. A group or department in which
the network is installed can also be given a name, as can a division, a region, or a company. In theory,
the hierarchy of names that can be used to identify a network has virtually no limit. The domain name
identifies a domain.
67
3.3 Calculating Network, Hosts, and Broadcast Addresses
What Is IP Subnet Calculator?
As mentioned in detail above the concept of IP addressing and subnetting, the subnets and supernet
networks are derived from a big network to create small networks for interconnection of various
network devices, situated far apart with each other and assigning the unique IP address and subnet
mask to them for communication with each other.
The IP calculator will give output for the value of broadcast IP address, usable IP range of the host
devices, subnet mask, IP class and the total number of hosts by entering the subnet mask and the IP
address of the particular network as the input value. The IP calculator gives the result for both IPV4 and
IPV6 network protocol classes of networks.
Subnetting is the strategy used to partition a single physical network into more than one smaller logical
sub-network (subnets). An IP address includes a network segment and a host segment. Subnets are
designed by accepting bits from the IP address's host part and using these bits to assign a number of
smaller sub-networks inside the original network. Subnetting allows an organization to add sub-
networks without the need to acquire a new network number via the Internet service provider (ISP).
Subnetting helps to reduce the network traffic and conceals network complexity. Subnetting is essential
when a single network number has to be allocated over numerous segments of a local area network
(LAN).
Subnetting allows us to create various sub-networks or logical networks within one network of a
particular class of the network. Without subnetting, it is almost unrealistic to create big networks.
For constructing a big networking system, every link must have a unique IP address with every device on
that linked network which is being the participant of that network.
116
With the help of a subnetting technique, we can split the large networks of a particular class (A, B or C)
into smaller subnetworks for inter-connection between each node which are situated at different
locations. Each node on the network would have a distinctive IP and subnet mask IP. Any switch, router
or gateway that connects n networks has n unique Network ID and one subnet mask for each of the
network it interconnects with.
/1 128.0.0.0 2,147,483,646
/2 192.0.0.0 1,073,741,822
/3 224.0.0.0 536,870,910
/4 240.0.0.0 268,435,454
/5 248.0.0.0 134,217,726
/6 252.0.0.0 67,108,862
/7 254.0.0.0 33,554,430
Class A
/8 255.0.0.0 16,777,214
/9 255.128.0.0 8,388,606
117
Class B
Class C
/26 255.255.255.192 62
/27 255.255.255.224 30
/28 255.255.255.240 14
/29 255.255.255.248 6
/30 255.255.255.252 2
/31 255.255.255.254 0
/32 255.255.255.255 0
The host's formula will tell you how many hosts will be allowed on a network that has a certain subnet
mask. The host's formula is 2h - 2. The h represents the number of 0s in the subnet mask,
118
if the subnet mask were converted to binary. The first and last addresses are reserved: the first to
identify the network and the last to be used as the broadcast address.
Step 1 Find host range
To use the host's formula, let's first look at a simple example. Say you plan to use the IP address space
192.168.0.0. Currently, you have a small network subnet with 20 hosts. This network will grow to 300
hosts within the next year, however, and you plan to have multiple locations of a similar size in the
future and need to enable them to communicate using this address space.
With a single network subnet and only 20 hosts, the simplest thing to do would be to use 255.255.255.0
as your subnet mask. This would mean you would have 192.168.0.1 through 192.168.0.254 for your
hosts. The address 192.168.0.0 is reserved as the network subnet identifier, and 192.168.0.255 is
reserved for the network broadcast address.
Before you decide to use this subnet mask, however, let's apply the host's formula to it. To use the host's
formula in this scenario, you take the subnet mask 255.255.255.0 and convert it to binary. This would
give you: 111111111 11111111 11111111 00000000.
As you can see, there are eight 0s in the subnet mask. To use this with the host's formula, you would
calculate 28 - 2. This comes to 256 minus the 2 reserved addresses, or 254. So, with the subnet mask
specified, you will get 254 usable hosts. This would suit your 20-user network now but won't support
your future network expansion to 300 hosts.
Step 3 Calculate the total number of hosts per subnet
You should plan ahead and choose the best subnet mask the first time. This prevents you from having to
go back later and change all the IP addresses on this network. Adding 1s to the subnet mask means you
get fewer hosts per network subnet but more network subnets. If you remove 1s from the subnet mask,
you get more hosts per network but fewer networks. The latter is what we need to do.
To do this, let's take away one of the 1s to make our subnet mask: 11111111
119
This means you have nine 0s in the host portion of the subnet mask. To apply the host's formula with this
subnet mask, we'd calculate 29 - 2. The number of usable host IP addresses is 512 minus 2, or 510. This
would definitely suit a 20-user network now and future network and host expectations of 300 hosts.
Considering that information, we know the most efficient subnet mask for the network is
255.255.254.0. The valid host address range for each subnet must be written as two ranges, due to the
limitations of writing the addresses as dotted quads. The first IP subnet would be 192.168.0.1 through
192.168.0.255 and 192.168.1.0 through 192.168.1.254. Note that 192.168.0.0 identifies the subnet, and
192.168.1.255 is the network broadcast address. That is how you arrive at the total of 510 usable hosts.
Step 4 Calculate the number of subnets
Now that you understand the host's formula, you should also know the subnet's formula, which will
ensure you have the right subnet mask for the number of subnets that you have. Just because you
determine you have the right number of hosts for your LAN using the host's formula doesn't mean
you'll have enough subnets for your network. Let's see how the subnet's formula works.
The subnet's formula is 2s, where s is the number of 1s added to the subnet mask, from whatever the
subnet mask was. Let's take the same example as above, but build on it.
Using network 192.168.0.0, we expect to have 100 remote sites with 300 PCs each. What subnet mask
should we use? In our last example, we found the 255.255.254.0 subnet mask provided 510 hosts per
subnet. That was more than adequate to support 300 PCs, but does that same subnet mask provide
networks for at least 100 remote sites? Let's find out.
The number of subnets is found by counting the number of bits by which the initial mask was extended,
also known as the subnet bits. Our initial address allocation was 192.168.0.0 with a mask of
255.255.0.0. Using the host's formula, we selected a subnet mask of 255.255.254.0. Let's compare the
two masks and count the subnet bits.
The new mask uses seven subnet bits. Using the subnet's formula, this would give us 27 = 128
networks. This is at least 100, so we have enough subnets for 100 remote networks. This means we have
found the right subnet mask for our network. We convert our subnet mask from binary back to decimal and
get 255.255.254.0.
As you add subnet bits, the number of subnets increases by a factor of two, and the number of hosts per
subnet decreases by a factor of two. The table below shows the number of subnets and hosts for each of
eight mask bits in the third octet of an IPv4 address.
A default gateway
The default gateway is the path used to pass information when the device doesn't know where the
destination is. More directly, a default gateway is a router that connects your host to remote network
segments. It's the exit point for all the packets in your network that have destinations outside your
network. To configure TCP/IP correctly, it's necessary to understand how TCP/IP networks are addressed and
divided into networks and subnet works.
The success of TCP/IP as the network protocol of the Internet is largely because of its ability to connect
together networks of different sizes and systems of different types. These networks are arbitrarily
defined into three main classes (along with a few others) that have predefined sizes. Each of them can
be divided into smaller subnetworks by system administrators. A subnet mask is used to divide an IP
address into two parts. One part identifies the host (computer), the other part identifies the network to
which it belongs. To better understand how IP addresses and subnet masks work, look at an IP address
and see how it's organized.
The network address is a unique address to identify the network portion of the IP network. The network
address is the same for all the hosts within the same IP network. All the bits of the host portion in an IP
address are set to zero to identify as the network address of any IP network.
For example, IP address 192.168.5.50 with subnet mask 255.255.255.0 has the following network
address.
122
Unit 4 LAN Technologies
Learning Objectives of the unit
• Be able to understand the different LAN technologies and devices
Introduction
A local area network (LAN) is a computer network that is designed for a limited geographic area such
as a building or a campus. Although a LAN can be used as an isolated network to connect computers in
an organization for the sole purpose of sharing resources, most LANs today are also linked to a wide
area network (WAN) or the Internet. The LAN market has seen several technologies such as Ethernet,
Token Ring, Token Bus, FDDI, and ATM LAN. Some of these technologies survived for a while, but
Ethernet is by far the dominant technology.
4.2 IEEE STANDARDS
In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable
intercommunication among equipment from a variety of manufacturers. Project 802 does not seek to
replace any part of the OSI or the Internet model. Instead, it is a way of specifying functions of the
physical layer and the data link layer of major LAN protocols. The original Ethernet was created in
1976 at Xerox's Palo Alto Research Center (PARC). Since then, it has gone through four generations:
123
Standard Ethernet also known as IEEE 802.3 was the LAN standard proposed by IEEE. Data rate for
standard Ethernet is 10 Mbps. MAC Sublayer In Standard Ethernet, the MAC sublayer governs the
operation of the access method. It also frames data received from the upper layer and passes them to the
physical layer. Frame Format The Ethernet frame contains seven fields: preamble, SFD, DA, SA,
length or type of protocol data unit (PDU), upper-layer data, and the CRC. Ethernet does not provide
any mechanism for acknowledging received frames, making it what is known as an unreliable medium.
Acknowledgments must be implemented at the higher layers.
Preamble. The first field of the 802.3 frame contains 7 bytes (56 bits) of alternating 0s and 1s that
alerts the receiving system to the coming frame and enables it to synchronize its input timing. The
pattern provides only an alert and a timing pulse. The 56-bit pattern allows the stations to miss some
bits at the beginning of the frame. The preamble is actually added at the physical layer and is not
(formally) part of the frame.
Start frame delimiter (SFD). The second field (1 byte: 10101011) signals the beginning of the frame.
The SFD warns the station or stations that this is the last chance for synchronization. The last 2 bits is 11
and alerts the receiver that the next field is the destination address.
Destination addresses (DA). The DA field is 6 bytes and contains the physical address of the
destination station or stations to receive the packet.
Source addresses (SA). The SA field is also 6 bytes and contains the physical address of the sender of
the packet.
Length or type: this field is defined as a type field or length field. The original Ethernet used this field
as the type field to define the upper-layer protocol using the MAC frame. The IEEE standard used it as
the length field to define the number of bytes in the data field. Both uses are common today.
Data. This field carries data encapsulated from the upper-layer protocols. It is a minimum of 46 and a
maximum of 1500 bytes.
CRC. The last field contains error detection information, in this case a CRC-32.
Frame Length Ethernet has imposed restrictions on both the minimum and maximum lengths of a
frame, as shown in Figure 13.3.
MAC Addressing Each station on an Ethernet network (such as a PC, workstation, or printer) has its
own network interface card (NIC). The NIC fits inside the station and provides the station with a 6-byte
physical (MAC) address. As shown in Figure 13.4, the Ethernet address is 6 bytes (48 bits), normally
written in hexadecimal notation, with a colon between the bytes.
The data link layer can further be divided in to two layers: the upper sub-layer that is responsible for
flow and error control is called the logical link control (LLC) layer; the lower sub-layer that is mostly
responsible for multiple access resolution is called the media access control (MAC) layer When nodes
or stations are connected and use a common link, called a multipoint or broadcast link, we need a
multiple-access protocol to coordinate access to the link. The problem of controlling the access to the
medium is similar to the rules of speaking in an assembly. The procedures guarantee that the right to
124
speak is upheld and ensure that two people do not speak at the same time, do not interrupt each other,
do not monopolize the discussion, and so on.
RANDOM ACCESS
• In random access or contention methods, no station is superior to another station and none is
assigned the control over another. No station permits, or does not permit, another station to
send.
• At each instance, a station that has data to send uses a procedure defined by the protocol to
make a decision on whether or not to send.
• This decision depends on the state of the medium (idle or busy). In other words, each station
can transmit when it desires on the condition that it follows the predefined procedure, including
the testing of the state of the medium.
• This method later evolved into two parallel methods: carrier sense multiple access with
collision detection (CSMA/CD) and carrier sense multiple access with collision avoidance
(CSMA/CA). CSMA/CD tells the station what to do when a collision is detected. CSMA/CA
tries to avoid the collision.
Controlled access
• In controlled access, the stations consult one another to find which station has the right to send.
125
• A station cannot send unless it has been authorized by other stations.
Reservation
• In the reservation method, a station needs to make a reservation before sending data. Time is divided into
intervals. In each interval, a reservation frame precedes the data frames sent in that interval.
• If there are N stations in the system, there are exactly N reservation mini slots in the reservation frame. Each
minis lot belongs to a station. When a station needs to send a data frame, it makes a reservation in its own
minis lot. The stations that have made reservations can send their data frames after the reservation frame.
Unicast, Multicast, and Broadcast Addresses Data are transmitted over a network by three simple
methods i.e. Unicast, Broadcast, and Multicast So let’s begin to summarize the difference between
these three:
Unicast: from one source to one destination i.e. One-to-One
Broadcast: from one source to all possible destinations i.e. One-to-All
Multicast: from one source to multiple destinations stating an interest in receiving the traffic
i.e. One-to-Many
126
A source address is always a unicast address as station.
• The destination address, however, can be unicast, multicast, or broadcast.
The first implementation is called 10Base5, thick Ethernet, or Thicknet. The nickname derives from the
size of the cable, which is roughly the size of a garden hose and too stiff to bend with your hands.
10Base5 was the first Ethernet specification to use a bus topology with an external transceiver
(transmitter/receiver) connected via a tap to a thick coaxial cable.
The transceiver is responsible for transmitting, receiving, and detecting collisions. The transceiver is
connected to the station via a transceiver cable that provides separate paths for sending and receiving.
This means that collision can only happen in the coaxial cable. The maximum length of the coaxial
cable must not exceed 500 m; otherwise, there is excessive degradation of the signal. If a length of
more than 500 m is needed, up to five segments, each a maximum of 500-meter, can be connected
using repeaters.
127
10Base2: Thin Ethernet
The second implementation is called 10Base2, thin Ethernet, or Cheaper net. 10Base2 also uses a bus
topology, but the cable is much thinner and more flexible. The cable can be bent to pass very close to
the stations. In this case, the transceiver is normally part of the network interface card (NIC), which is
installed inside the station. Note that the collision here occurs in the thin coaxial cable. This
implementation is more cost effective than 10Base5 because thin coaxial cable is less expensive than
thick coaxial and the tee connections are much cheaper than taps. Installation is simpler because the
thin coaxial cable is very flexible. However, the length of each segment cannot exceed 185 m (close to
200 m) due to the high level of attenuation in thin coaxial cable.
10Base-T: Twisted-Pair Ethernet
The third implementation is called 10Base-T or twisted-pair Ethernet. 10Base-T uses a physical star
topology. The stations are connected to a hub via two pairs of twisted cable. Note that two pairs of
twisted cable create two paths (one for sending and one for receiving) between the station and the hub.
Any collision here happens in the hub. Compared to 10Base5 or 10Base2, we can see that the hub
actually replaces the coaxial cable as far as a collision is concerned. The maximum length of the
twisted cable here is defined as 100 m, to minimize the effect of attenuation in the twisted cable.
10Base-F: Fiber Ethernet
Although there are several types of optical fiber 10-Mbps Ethernet, the most common is called 10Base-F.
10Base-F uses a star topology to connect stations to a hub. The stations are connected to the hub using
two fiber-optic cables.
Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel (or Fibre Channel,
as it is sometimes spelled). IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-
compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. The goals of
Fast Ethernet can be summarized as follows:
Fast Ethernet is designed to connect two or more stations together. If there are only two stations, they can be
connected point-to-point. Three or more stations need to be connected in a star topology with a hub or a switch
at the center, as shown in Figure 4.6
128
Figure 4.6: point to point and star
The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The
IEEE committee calls the Standard 802.3z. The goals of the Gigabit Ethernet design can be summarized as
follows:
129
Topology
Gigabit Ethernet is designed to connect two or more stations. If there are only two stations, they can be
connected point-to-point. Three or more stations need to be connected in a star topology with a hub or a switch at
the center. Another possible configuration is to connect several star topologies or let a star topology be part of
another as shown in Figure 4.8
Gigabit Ethernet can be categorized as either a two-wire or a four-wire implementation. The two-wire
implementations use fiber-optic cable (1000Base-SX, short-wave, or 1000Base-LX, long-wave), or
STP (1000Base-CX). The four-wire version uses category 5 twisted-pair cable (1000Base-T). In other
words, we have four implementations, as shown in Figure
130
Figure 4.9: Gigabit Implementation
The IEEE committee created Ten-Gigabit Ethernet and called it Standard 802.3ae. The goals of the
Ten-Gigabit Ethernet design can be summarized as follows:
Ten-Gigabit Ethernet is designed for using fiber-optic cable over long distances. Three
implementations are the most common: 10GBase-S, 10GBase-L, and 10GBase-E. Table 13.4 shows a
summary of the Ten-Gigabit Ethernet implementations:
131
CSMA/CD: The Process
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier
transmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the
shared channel for transmission is busy or not, and defers transmissions until the channel is free. The
collision detection technology detects collisions by sensing transmissions from other stations. On
detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random
time interval before retransmission.
132
• Here channel needs to be sensed before and after the IFS.
• The channel also needs to be sensed during the contention time.
• For each time slot of the contention window, the channel is sensed.
• If it is found idle, the timer continues; if the channel is found busy, the timer is
topped and continues after the timer becomes idle again
• The station transmits and receives continuously and simultaneously (using two different
ports).
• We use a loop to show that transmission is a continuous process.
• We constantly monitor in order to detect one of two conditions: either transmission is
finished or a collision is detected.
• Either event stops transmission.
• When we come out of the loop, if a collision has not been detected, it means that
transmission is complete; the entire frame is transmitted.
• Otherwise, a collision has occurred.
• The third difference is the sending of a short jamming signal that enforces the collision in
case other stations have not yet sensed the collision.
133
Ethernet Physical Layer
Introduction to Ethernet Cable Standards
134
Name Cable Maximum
Transmission
Distance
The greatest limitation of coaxial cable is that devices on the cable are connected in series, so a single
point of failure (SPOF) may cause a breakdown of the entire network. As a result, the physical standards
of coaxial cables, 10BASE-2 and 10BASE-5, have fallen into disuse.
100M Ethernet cable standard
100M Ethernet is also called Fast Ethernet (FE). Compared with 10M Ethernet, 100M Ethernet has a
faster transmission rate at the physical layer, but has the same rate at the data link layer.
10Base-T and 100Base-TX have different transmission rates, but both apply to Category 5 twisted pair
cables. 10Base-T transmits data at 10 Mbit/s, while 100Base-TX transmits data at 100 Mbit/s.
100Base-T4 is now rarely used.
Gigabit Ethernet cable standard
Gigabit Ethernet developed from the Ethernet standard defined in IEEE 802.3. Based on the Ethernet
protocol, the transmission rate increased by 10 times, reaching 1 Gbit/s in GE. Table lists the
Gigabit Ethernet cable standard specifications.
135
Table 4.3 : Gigabit Ethernet cable standard
Using Gigabit Ethernet technology, you can upgrade an existing Fast Ethernet network from 100 Mbit/s
to 1000 Mbit/s. The physical layer of Gigabit Ethernet uses 8B10B coding. In the traditional Ethernet
technology, the data link layer delivers 8-bit data sets to the physical layer. After processing, the 8 bit data sets
are sent to the data link layer for transmission. This process is different on the Gigabit Ethernet of optical fibers,
in which the physical layer maps the 8-bit data sets to 10-bit data sets before sending them to the data link layer.
10GE cable standards
IEEE 802.3ae is the 10GE cable standard. For 10GE, the cables are all optical fiber in full- duplex
mode. The development of 10GE is well under way, and will be widely deployed in future.
Ethernet: Future Options
There have been several innovative leaps in networking technology over the last several years allowing
end users to load websites faster, open multiple browsers and online applications, and, overall, work
more efficiently when utilizing the Internet. Switches, routers, ethernet cables and other network gear
have moved up from providing 100 Megabit per second speeds to 1000 Megabit, or Gigabit speeds.
Today, nearly all of the basic network equipment needed to setup a complete local network in your
home or office is capable of reaching at least 1 gigabit per second speeds. New Ethernet cable
standards such as Cat6A, Cat7, and even Cat8-based ethernet cables, however, are now making it
possible to reach even faster speeds than ever before.
Technical advances in network equipment have now enabled the possibility of reaching even greater
speeds in your local network. Gig+ or 10-Gigabit speeds are now becoming possible with the proper
network gear and ethernet cabling. Keep in mind, however, that if your home or office is unable to take
full advantage of the wider bandwidth, then setting up your office for 10-gigabit speeds may not be
worthwhile. If you are planning to build out a future-proof 10-gigabit network at your home or office,
you’ll need to consider the cable infrastructure needs as well as the network equipment requirements.
Currently, there are three forms of ethernet cable that are rated for 10-gigabit speeds:
Cat6A – This ethernet cable is a Category 6 Augmented cable, which supports 10 Gigs for up to 328
136
feet of distance. When compared to Cat5, Cat6 is thicker, operates at a 250 Mhz frequency, and has
tighter twisted pairs reducing interference.
Cat7 – “Category 7” or “Cat7” ethernet cables support up to 10 gigabits per second of data and
transmission rates up to 100 meters on copper cabling. Cat7 cables are also individually shielded and
have been designed to transmit signals of up to 600 Mhz frequencies. Because Cat7 Ethernet cables are
not officially recognized by the IEEE standard and have more than one connector option, we
recommend avoiding these cables.
Cat8 – Category 8 ethernet cables are the officially recognized successor to Cat6A cabling. The
main benefit of Cat8 ethernet is faster throughput over short distances. Cat8 is capable of delivering 40
Gbps for up to 78 ft., and 25 Gbps up to 100 ft. From 100 ft. to 328 ft., Cat 8 ethernet provides 10
Gigabit speeds, similar to Cat6A.
For almost all cases, anyone looking to build a 10-gigabit capable network should use Cat6A ethernet
cables. This is because Cat8 cables are limited by their distances for delivering their highest rated
speeds, and, hence, are only useful in some situations, such as in a datacenter.
You will also need to consider that all other hardware is capable of transmitting data at Gigabit+ or 10-
gigabit speeds. This means that your router or firewall will need to be 10-gigabit capable as well as your
switch. Any other network gear such as Network Attached Storage (NAS), or Wireless Access Points
will also need to be capable of 10-gigabit speeds or else they will only be able to operate at maximum at
up to 1-gigabit per second.
137
4.3 Ethernet: Using Switches
How Does an Ethernet Switch Work?
When learning how a network switch works, it helps to look at the functionality one piece at a time:
• Receiving Packets. An ethernet switch works at the data link level. Devices with IPs
create packets, which are then housed within an ethernet frame.
• Encapsulation. In order to transport the information contained in the IP packet through
the network, encapsulation occurs, where bits adhere to the front and back of the
packet.
• Processing Identifying Data. The frame contains key identifying data in the header,
such as inter alia source, source MAC address and the destination MAC address. When
the frame arrives at the ethernet switch, the switch reads the information and decodes
where to forward it through the ports to reach its intended destination.
• Sending Packets. The frame arrives at the destination device, which then receives and
strips the packet.
Here are some key advantages to using an ethernet switch for your business:
Many different types of network switches exist to satisfy unique needs of business or personal
networks. One of the biggest aspects to consider is whether the network switch is managed or
unmanaged.
138
Unmanaged switches operate simply as a plug-and-play connection between devices on the network
(computers, printers, etc.) without the ability to customize configurations. While the functionality
may be limited, these are usually more affordable.Managed switches offer greater control over
traffic with the ability to configure advanced settings and features to meet your requirements.
Ethernet switches selectively forward individual frames from a receiving port to the port where the
destination node is connected. This selective forwarding process can be thought of as establishing a
momentary point-to-point connection between the transmitting and receiving nodes. The connection is
made only long enough to forward a single frame. During this instant, the two nodes have a full
bandwidth connection between them and represent a logical point- to-point connection.
To be technically accurate, this temporary connection is not made between the two nodes
simultaneously. In essence, this makes the connection between hosts a point-to-point connection. In
fact, any node operating in full-duplex mode can transmit anytime it has a frame, without regard to the
availability of the receiving node. This is because a LAN switch will buffer an incoming frame and
then forward it to the proper port when that port is idle. This process is referred to as store and forward.
With store and forward switching, the switch receives the entire frame, checks the FSC for errors, and
forwards the frame to the appropriate port for the destination node. Because the nodes do not have to
wait for the media to be idle, the nodes can send and receive at full media speed without losses due to
collisions or the overhead associated with managing collisions.
The switch maintains a table, called a MAC table. that matches a destination MAC address with the port
used to connect to a node. For each incoming frame, the destination MAC address in the frame header
is compared to the list of addresses in the MAC table. If a match is found, the port number in the table
that is paired with the MAC address is used as the exit port for the frame.
The MAC table can be referred to by many different names. It is often called the switch table.Because
switching was derived from an older technology called transparent bridging, the table is sometimes
called the bridge table. For this reason, many processes performed by LAN switches can contain bridge
or bridging in their names.
A bridge is a device used more commonly in the early days of LAN to connect - or bridge - two
physical network segments. Switches can be used to perform this operation as well as
139
allowing end device connectivity to the LAN. Many other technologies have been developed around
LAN switching. Many of these technologies will be presented in a later course. One place where
bridges are prevalent is in Wireless networks. We use Wireless Bridges to interconnect two wireless
network segments. Therefore, you may find both terms
- switching and bridging - in use by the networking industry.
The animation depicts selective forwarding of individual frames from a receiving port to the port where
the destination node is connected. A 12-port switch is shown with the following connections in the
switching table: Host with MAC address 0A is connected to port 1. Host with MAC address 0B is
connected to port 3. Host with MAC address 0C is connected to port
Host with MAC address 0D is connected to port 9. Two frames are shown: Frame 1: Destination
address is 0C, and the source address is 0A. Frame 2: Destination address is 0C, and the source address
is 0D. As the animation progresses, source host 0A and 0D transmit to destination host 0C. The switch
looks up the destination MAC address in the frame header and compares it to the list of addresses in its
MAC address table. The switch sees that it has two frames destined for the same host. It buffers the
frames in its memory buffers and sends them out the designated port one at a time. Next the animation
displays a new block diagram showing some of the key internal components of the switch. These
include the MAC address table, switching logic, memory buffers, CPU, and Flash. Host 0A transmits a
frame to destination host 0C. The switch uses its switching logic to look up the destination address in
its MAC address table and buffers the frame in its memory buffers. It then sends the frame to host 0C
on port 6. The animation continues showing source hosts 0A and 0B transmitting simultaneously to
destination host 0C. The switch looks up the destination address in its MAC address table and buffers
the two frames in its memory buffers. It then sends the frames one at a time to host 0C on port 6.
ARP request packets are sent to the broadcast addresses (FF:FF:FF:FF:FF:FF for the
Ethernetbroadcasts and 255.255.255.255 for the IP broadcast).
161
Figure 4.16 Address Resolution Protocol (ARP)
Let’s say that Host A wants to communicate with host B. Host A knows the IP address of host B, but it
doesn’t know the host B’s MAC address. In order to find out the MAC address of host B, host A sends
an ARP request, listing the host B’s IP address as the destination IP address and the MAC address of
FF:FF:FF:FF:FF:FF (Ethernet broadcast). Switch will forward the frame out all interfaces (except the
incoming interface). Each device on the segment will receive the packet, but because the destination IP
address is host B’s IP address, only host B will reply with the ARP reply packet, listing its MAC
address. Host A now has enough information to send the traffic to host B.
All operating systems maintain ARP caches that are checked before sending an ARP request message.
Each time a host needs to send a packet to another host on the LAN, it first checks its ARP cache for the
correct IP address and matching MAC address. The addresses will stay in the cache for a couple of
minutes. You can display ARP entries in Windows by using the arp
-a command:
162
: Figure 4.17 the arp -a command
Address Resolution Protocol (ARP) is a procedure for mapping a dynamic IP address to a permanent
physical machine address in a local area network (LAN). The physical machine address is also known
as a media access control (MAC) address.
The job of ARP is essentially to translate 32-bit addresses to 48-bit addresses and vice versa. This is
necessary because IP addresses in IP version 4 (IPv4) are 32 bits, but MAC addresses are 48 bits.
ARP works between Layers 2 and 3 of the Open Systems Interconnection model (OSI model). The
MAC address exists on Layer 2 of the OSI model, the data link layer. The IP address exists on Layer 3,
the network layer.
ARP can also be used for IP over other LAN technologies, such as token ring, fiber distributed data
interface (FDDI) and IP over ATM.
All operating systems in an IPv4 Ethernet network keep an ARP cache. Every time a host requests a
MAC address in order to send a packet to another host in the LAN, it checks its ARP cache to see if the
IP to MAC address translation already exists. If it does, then a new ARP request is unnecessary. If the
translation does not already exist, then the request for network addresses is sent and ARP is performed.
ARP broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using
that particular IP address. When a machine recognizes the IP address as its own, it sends a reply so
ARP can update the cache for future reference and proceed with the communication.
163
Host machines that don't know their own IP address can use the Reverse ARP (RARP) protocol for
discovery.
ARP cache size is limited and is periodically cleansed of all entries to free up space. Addresses tend to
stay in the cache for only a few minutes. Frequent updates enable other devices in the network to see
when a physical host changes their requested IP addresses. In the cleaning process, unused entries are
deleted along with any unsuccessful attempts to communicate with computers that are not currently
powered on.
What to Know
• Ping the device you want to find a MAC address for using the local network address.
• Enter the ARP command with a "-a" flag.
• Look for the IP address in the results. The Mac address is next to the IP address
How to Use ARP to Find a MAC Address
In Windows, Linux, and other operating systems, the command line utility ARP (Address Resolution
Protocol) shows local MAC address information stored in the ARP cache. However, it only works
within the small group of computers on a local area network (LAN), not across the internet.
164
ARP is intended to be used by system administrators, and it is not typically a useful way to track down
computers and people on the internet.
TCP/IP computer networks use both the IP addresses and MAC addresses of connected client
devices. While the IP address changes over time, the MAC address of a network adapter always stays
the same.
Using ARP, each local network interface tracks both the IP address and MAC address for each device
it has recently communicated with. Most computers let you see this list of addresses that ARP has
collected.
Here is one example of how to find a MAC address using an IP address.
1. Start by pinging the device you want the MAC to address for. Use a local
address. If your network is 10.0.1.x, use that number to ping. For
example:
ping 192.168.86.45
2. The ping command establishes a connection with the other devices on the
network and shows results like this:
3. Enter the ARP command with a "-a" flag to get a list that shows the MAC
address of the device you pinged:
arp -a
4 The results may look something like this but probably with many other entries.
5 Find the device's IP address in the list. The MAC address is shown right next to it. In this
example, the IP address is 192.168.86.45, and its MAC address is 98-90-96-B9-9D-61.
165
Unit 5 Basic Router Configuration
Learning Objectives of the unit
At the end of this unit, trainees are expected to:
The use of specific commands allows you to navigate from one command mode to another. The
standard order that a user would access the modes is as follows: user EXEC mode; privileged EXEC
mode; global configuration mode; specific configuration modes; configuration submodes; and
configuration subsubmodes.
When you start a session on a router, you generally begin in user EXEC mode , which is one of two
access levels of the EXEC mode. For security purposes, only a limited subset of EXEC commands are
available in user EXEC mode. This level of access is reserved for tasks that do not change the
configuration of the router, such as determining the router status.
In order to have access to all commands, you must enter privileged EXEC mode , which is the second
level of access for the EXEC mode. Normally, you must enter a password to enter privileged EXEC
mode. In privileged EXEC mode, you can enter any EXEC command, because privileged EXEC mode
is a superset of the user EXEC mode commands.
Most EXEC mode commands are one-time commands, such as show or more commands, which show
the current configuration status, and clear commands, which clear counters or interfaces. EXEC mode
commands are not saved across reboots of the router.
From privileged EXEC mode, you can enter global configuration mode . In this mode, you can enter
commands that configure general system characteristics. You also can use global configuration mode to
enter specific configuration modes. Configuration modes, including global configuration mode, allow
you to make changes to the running configuration. If you later save the configuration, these commands
are stored across router reboots.
From global configuration mode you can enter a variety of protocol-specific or feature-specific
configuration modes. The CLI hierarchy requires that you enter these specific configuration modes
only through global configuration mode. As an example, this chapter describes interface
configuration mode , a commonly used configuration mode.
ROM monitor mode is a separate mode used when the router cannot boot properly. If your system
(router, switch, or access server) does not find a valid system image to load when it is booting, the
system will enter ROM monitor mode. ROM monitor (ROMMON) mode can also be accessed by
interrupting the boot sequence during startup.
166
5.2 Introducing Cisco IOS Modes
Cisco IOS Modes of Operation
Cisco IOS software provides access to several different command modes. Each command mode provides
a different group of related commands.
For security purposes, Cisco IOS software provides two levels of access to commands: user and
privileged. The unprivileged user mode is called user EXEC mode. The privileged mode is called
privileged EXEC mode and requires a password. The commands available in user EXEC mode are a
subset of the commands available in privileged EXEC mode.
The following table describes some of the most commonly used modes, how to enter the modes, and
the resulting prompts. The prompt helps you identify which mode you are in and, therefore, which
commands are available to you.
167
Interface Interface configuration commands modify Enter MGX88
configurati the operation of an interface such as an the interface type 50-
on Ethernet or serial port. Many features are number command RPM(co
enabled on a per-interface basis. Interface from global nfig-if)#
configuration commands always follow an configuration mode.
For example, enter
Mode of How to Enter the
Operation Usage Mode Prompt
As shown in Figure 1, the command is the initial word or words entered in the command line following
the prompt. The commands are not case-sensitive. Following the command are one or more keywords
and arguments. After entering each complete command, including any keywords and arguments, press
the Enter key to submit the command to the command interpreter.
The keywords describe specific parameters to the command interpreter. For example, the show
command is used to display information about the device. This command has various keywords that
must be used to define what particular output should be displayed. For example:
The command show is followed by the keyword running-config. The keyword specifies that the
running configuration is to be displayed as the output.
A command might require one or more arguments. Unlike a keyword, an argument is generally not a
predefined word. An argument is a value or variable defined by the user. To determine the keywords
and arguments required for a command, refer to the command syntax. The syntax provides the pattern or
format that must be used when entering a command.
For instance the syntax for using the description command is:
168
Switch(config-if)# description string
169
As shown in Figure 2, boldface text indicates commands and keywords that are typed as shown and
italic text indicates an argument for which you supply the value. For the description command, the
argument is a string value. The string value can be any text string of up to 80 characters.
Therefore, when applying a description to an interface with the description command, enter a line
such as this:
The command is ping and the user defined argument is the 10.10.10.5.
Syntax:
The command is traceroute and the user defined argument is the 192.168.254.254
IOS Examination Commands
‘Show interface’
170
This command shows the status of interfaces of your router or access server. Some of the output offered
by this command includes an interface status (up-down). It shows the statistics of hardware, address,
MTU, ARP type, information about Input and Output queue, and errors. The ‘show interface’ command
is crucial when it comes to troubleshooting a switch or a router.
‘?’ Command
You are likely surprised to find this command in the list. You obviously understand that this is just a
help command. Nonetheless, it is essential to know that Cisco IOS is quite different from other OS in
terms of using ‘help’, also known as the question mark. This operating system is known to be of a
command-line type that has thousands of parameters and commands associated with ‘?’.
There are different ways you can use this command. For instance, you can utilize it for the list of every
possible command by typing ‘?’ at the system prompt. Additionally, you can also make use of it to
know what is the next parameter should be. You may also use this command to see others that begin
with a specific letter. For instance, you can type “show c?” and it will generate a list of commands that
begin with the letter C.
‘Show running-config’
You can use this command to reveal the current configuration of a router, firewall, or switch. The
‘show running-config’ command has no keywords or arguments. It refers to the configuration that is
stored in RAM. The following command can show the building configuration, version, hostname, and
other information.
‘copy running-config startup-config’
The ‘copy running-config startup-config’ command is designed to save the currently running
configuration. The saving is done to the startup configuration file in NVRAM (also known as Non
Volatile Random Access Memory). In case there is a power loss, Non Volatile RAM will preserve the
configuration, which means if you edit something on the router’s configuration, you will not utilize this
particular command and reboot a router, the changes will not be saved.
‘show ip interface’
This command provides numerous functional information about the status and configuration of IP
services and protocols. Thus, you can get details related to all the IP-related characteristics of an
interface, including any secondary addresses that don’t show up by using ‘show interface’. You can
also know the statistics about multicast groups, inbound access, Proxy ARP, and much more. It is
essential to mention that this command as well as ‘show ip interface brief’ is more popular than ‘show
interface’.
‘no shutdown’
171
‘shutdown’ allows to disable an interface and all its functions while ‘no shutdown’ restarts all of it.
Suffice to mention that the command should be utilized in the interface configuration mode, and can
also be used for troubleshooting and new interfaces. There are also no arguments or keywords. On
different interfaces, it can also cause the DTR signal to be dropped or the optical bypass switch.
There are different modes of Cisco routers that allow you to display or modify specific data. Your
ability to move between these different modes is very important to the success of your router
configuration. For instance, when you are logging in, ‘start off’ begins with the user mode, with the
prompt looking like ‘>’. From this point, you will type ‘enable’ in order to move to the privilege mode,
with the prompt ‘#’. When the system is in the privileged mode, everything can be shown, but it will be
impossible to make changes. The next step is to type ‘config terminal’, alternatively, you can simply
type ‘config t’. This will take you to the global configuration mode. From this stage, you can alter the
global parameters. Now, to change a parameter on a specific interface, check the interface
configuration mode that has the ‘interface’ command, for instance, with the prompt showing a router
(config-if)#). From the global configuration mode, you may also go to the router configuration
with the ‘router
{protocol}’ command. You can simply type ‘exit’ to exit any mode.
Debug Command
This command has a wide variety of options, and it doesn’t work on its own. It offers comprehensive
debugging output on a specific protocol, service, or application. For instance, ‘debug ip routing’ will
show each time a route is removed from or added to the router. It is essential to mention that debugging
can be quite precarious as its procedure has priority over the others. You should be ready to disable the
feature with the ‘undebug all’ command or the ‘no debug’ command.
‘Show version’
This command shows the configuration register of a router, such as the last time it was booted, the IOS
file name, the amount of Flash and RAM in the router, the IOS version, and the router model. These are
basically the firmware settings of the router designed for booting up.
‘Show ip route’
This command is used to indicate the current state of the routing table. It shows a list of each network
that the router has the capacity to attain, its metrics, and how to attain it. You can also use ‘clear ip
route’ to clear out the routing table for all routes. Use ‘clear ip route x.x.x’ to clear a single route.
‘x.x.x’ refers to the network you need to clear, for example, you can type ‘clear ip route 192.0.2.1’.
172
IOS Configuration Modes
Cisco IOS software provides access to several different command modes. Each command mode provides
a different group of related commands. For security purposes, Cisco IOS software provides two levels
of access to commands: user and privileged. The unprivileged user mode is called user EXEC mode.
The privileged mode is called privileged EXEC mode and requires a password. The commands
available in user EXEC mode are a subset of the commands available in privileged EXEC mode. Table
C-1 describes some of the most commonly used modes, how to enter the modes, and the resulting
prompts. The prompt helps you identify which mode you are in and, therefore, which commands are
available to you.
Naming Devices
The traditional naming convention of <constituency>-<devicetype>-<building>-<floor>-
<TR>-<order> has been deprecated. See below for more information.
A device is loosely defined as an infrastructure device that is not normally accessed by the general
public, but rather only by IT support staff. For example, this would include network switches and
routers, or security cameras, but not such things as printers. We recommend that IT support groups on
campus adopt this standard, for consistency and usability.
The following naming convention is intended for access layer devices. That is, any device downstream
from a distribution router; dist-rt-mc & dist-rt-phy, currently.
<building>-<devicetype>-<TR>-<order>
Exceptions:
Where:
building is the official University of Waterloo building code where the device is located (or
connected in the case of an AP).
173
Enable secret password - encrypted, limits access to the privileged EXEC mode
VTY password - limits device access using Telnet
As good practice, use different authentication passwords for each of these levels of access.
Although logging in with multiple and different passwords is inconvenient, it is a necessary precaution
to properly protect the network infrastructure from unauthorized access.
Additionally, use strong passwords that are not easily guessed. The use of weak or easily guessed
passwords continues to be a security issue in many facets of the business world.
Consider these key points when choosing passwords:
Note: In most of the labs, we will be using simple passwords such as cisco or class. These passwords
are considered weak and easily guessable and should be avoided in a production environment. We only
use these passwords for convenience in a classroom setting.
As shown in the figure, when prompted for a password, the device will not echo the password as it is
being entered. In other words, the password characters will not appear when you type. This is done for
security purposes - many passwords are gathered by prying eyes.
Console Password
The console port of a Cisco IOS device has special privileges. The console port of network devices
must be secured, at a bare minimum, by requiring the user to supply a strong password. This reduces the
chance of unauthorized personnel physically plugging a cable into the device and gaining device access.
174
The following commands are used in global configuration mode to set a password for the console line:
From global configuration mode, the command line console 0 is used to enter line configuration mode
for the console. The zero is used to represent the first (and in most cases only) console interface for a
router.
To provide additional security, use the enable password command or the enable secret
command. Either of these commands can be used to establish authentication before accessing
privileged EXEC (enable) mode.
Always use the enable secret command, not the older enable password command, if possible. The
enable secret command provides greater security because the password is encrypted. The enable
password command can be used only if enable secret has not yet been set.
The enable password command would be used if the device uses an older copy of the Cisco IOS
software that does not recognize the enable secret command.
The following commands are used to set the passwords:
Router(config)#enable password password Router(config)#enable secret password
Note: If no enable password or enable secret password is set, the IOS prevents privileged EXEC
access from a Telnet session.
Without an enable password having been set, a Telnet session would appear this way: Switch>enable
175
Router(config-if)# ip address ipv4-address subnet-mask
Router(config-if)# ipv6 address ipv6-address/prefix-length
Router(config-if)# no shutdown
Description command is not required to enable an interface, it is good practice to use it. It can be
helpful in troubleshooting on production networks by providing information about the type of network
connected.
no shutdown command activates the interface and is similar to powering on the interface. The interface
must also be connected to another device, such as a switch or a router, for the physical layer to be active.
Configure Router Interface Example
176
To configure the interfaces on R1, use the following commands.
R1> enable
R1# configure terminal
Enter configuration commands, one per line.
End with CNTL/Z.
R1(config)# interface gigabitEthernet 0/0/0
R1(config-if)# description Link to LAN
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# ipv6 address 2001:db8:acad:10::1/64
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)#
*Aug 1 01:43:53.435: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to
down
*Aug 1 01:43:56.447: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to up
*Aug 1 01:43:57.447: %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0/0, changed state to up
R1(config)#
R1(config)#
R1(config)# interface gigabitEthernet 0/0/1
R1(config-if)# description Link to R2
R1(config-if)# ip address 209.165.200.225 255.255.255.252
R1(config-if)# ipv6 address 2001:db8:feed:224::1/64
R1(config-if)# no shutdown
177
R1(config-if)# exit
R1(config)#
*Aug 1 01:46:29.170: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/1, changed state to
down
*Aug 1 01:46:32.171: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/1, changed state to up
*Aug 1 01:46:33.171: %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0/1, changed state to up
R1(config)#
Verify Interface Configuration
There are several commands that can be used to verify interface configuration. The most useful of
these is the show ip interface brief and show ipv6 interface brief commands, as shown in the
example.
178
show ipv6 interface brief
179
Show interfaces
Show ip interface
180
show ipv6 interface
181
182
5.5 Describe the devices of wireless technologies
In addition to the wired network, various technologies exist that allow the transmission of information
between hosts without cables. These are known as wireless technologies.
The electromagnetic spectrum includes such things as radio and television broadcast bands, visible
light, x-rays and gamma-rays. Each of these has a specific range of wavelengths and associated
energies as shown in the diagram.
Some types of electromagnetic waves are not suitable for carrying data. Other parts of the spectrum are
regulated by governments and licensed to various organizations for specific applications. Certain areas
of the spectrum have been set aside to allow public use without the restriction of having to apply for
special permits. The most common wavelengths used for public wireless communications include the
Infrared and part of the Radio Frequency (RF) band.
Infrared
Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles. However,
it is commonly used to connect and move data between devices such as Personal Digital Assistants
(PDAs) and PCs. A specialized communication port known as an Infrared Direct Access (IrDA) port
uses IR to exchange information between devices. IR only allows a one-to-one type of connection.
IR is also used for remote control devices, wireless mice, and wireless keyboards. It is generally used for
short-range, line-of-sight, communications. However, it is possible to reflect the IR signal off objects to
extend the range. For greater ranges, higher frequencies of electromagnetic waves are requiring.
Radio Frequency (RF)
RF waves can penetrate through walls and other obstacles, allowing a much greater range than IR.
Certain areas of the RF bands have been set aside for use by unlicensed devices such as wireless LANs,
cordless phones and computer peripherals. This includes the 900 MHz, 2.4 GHz, and the 5 GHz
frequency ranges. These ranges are known as the Industrial Scientific and Medical (ISM) bands and
can be used with very few restrictions.
Bluetooth is a technology that makes use of the 2.4 GHz band. It is limited to low-speed, short- range
communications, but has the advantage of communicating with many devices at the same
183
time. This one-to-many communications has made Bluetooth technology the preferred method over IR
for connecting computer peripherals such as mice, keyboards and printers.
Other technologies that make use of the 2.4 GHz and 5 GHz bands are the modern wireless LAN
technologies that conform to the various IEEE 802.11 standards. They are unlike Bluetooth technology
in that they transmit at a much higher power level, which gives them a greater range.
184
service provider (ISP) may offer you a wireless router for a small monthly fee. If you've never set up a
Wi-Fi network before, this may be the easiest option.
If you want to buy your own router, we'd recommend spending a little more time researching different
options. Once you've acquired a wireless router, you'll need to connect it to your existing Internet
modem.
Connect an Ethernet cable from your modem to the wireless router (there is usually a short
Ethernet cable included with your wireless router for this purpose).
Plug in the power cable for the wireless router. Wait at least 30 to 60 seconds, and make sure the lights on your
router are working correctly.
Configure your router
1. Once the choice of wireless standard, layout and channel assignment have been made
it is time to configure the AP.
2. Most integrated routers offer both wired and wireless connectivity and serve as the AP
in the wireless network. Basic configuration settings such as passwords, IP addresses,
and DHCP settings are the same whether the device is being used to connect wired or
wireless hosts. Basic configuration tasks, such as changing the default password, should
be conducted before the AP is connected to a live network.
3. When using the wireless functionality of an integrated router, additional configuration
parameters are required, such as setting the wireless mode, SSID, and wireless channels
to be used.
185
Figure 6.2 Linksys Configration window
Wireless Mode
Most home AP devices can support various modes, mainly 802.11b, 802.11g and 802.11n. Although
these all use the 2.4 GHz range, each uses a different technology to obtain its maximum throughput.
The type of mode enabled on the AP depends on the type of host connecting to it. If only one type of
host connects to the AP device, set the mode to support it. If multiple types of hosts will connect, select
mixed mode. Each mode includes a certain amount of overhead. By enabling mixed mode, network
performance will decrease due to the overhead incurred in supporting all modes.
SSID
The SSID is used to identify the WLAN. All devices that wish to participate in the WLAN must use the
same SSID. To allow easy detection of the WLAN by clients, the SSID is broadcast. It is possible to
disable the broadcast feature of the SSID. If the SSID is not broadcast; wireless clients will need to have
this value manually configured.
Wireless Channel
The choice of channel for an AP must be made relative to the other wireless networks around it.
Adjacent BSSs must use non-overlapping channels in order to optimize throughput. Most APs now
offer a choice to manually configure the channel or allow the AP to automatically locate the least
congested channel or locate the one that offers maximum throughput.
186
Figure 6.3: Linksys Basic wirless configration
Configuring the Wireless Client
A wireless host, or STA, is defined as any device that contains a wireless NIC and wireless client
software. This client software allows the hardware to participate in the WLAN. Devices that are STAs
include: PDAs, laptops, desktop PCs, printers, projectors and Wi-Fi phones.
In order for a STA to connect to the WLAN, the client configuration must match that of the AP. This
includes the SSID, security settings, and channel information if the channel was manually set on the
AP. These settings are specified in the client software that manages the client connection.
The wireless client software used can be software integrated into the device operating system, or can be
a stand-alone, downloadable, wireless utility software specifically designed to interact with the wireless
NIC.
Securing Wifi Devices
One of the primary benefits of wireless networking is ease and convenience of connecting devices.
Unfortunately that ease of connectivity and the fact that the information is transmitted through the air
also makes your network vulnerable to interception and attacks.
With wireless connectivity, the attacker does not need a physical connection to your computer or any of
your devices to access your network. It is possible for an attacker to tune into signals from your wireless
network, much like tuning into a radio station.
187
The attacker can access your network from any location your wireless signal reaches. Once they have
access to your network, they can use your Internet services for free, as well as access computers on the
network to damage files, or steal personal and private information.
These vulnerabilities in wireless networking require special security features and implementation
methods to help protect your WLAN from attacks. These include simple steps performed during initial
setup of the wireless device, as well as more advanced security configurations.
One easy way to gain entry to a wireless network is through the network name, or SSID.
All computers connecting to the wireless network must know the SSID. By default, wireless routers
and access points broadcast SSIDs to all computers within the wireless range. With SSID broadcast
activated, any wireless client can detect the network and connect to it, if no other security features are
in place.
The SSID broadcast feature can be turned off. When it is turned off, the fact that the network is there is
no longer made public. Any computer trying to connect to the network must already know the SSID.
Additionally, it is important to change the default setting. Wireless devices are shipped preconfigured
with settings such as SSIDs, passwords, and IP addresses in place. These defaults make it easy for an
attacker to identify and infiltrate a network.
Even with SSID broadcasting disabled, it is possible for someone to get into your network using the
well-known default SSID. Additionally, if other default settings, such as
188
passwords and IP addresses are not changed, attackers can access an AP and make changes themselves.
Default information should be changed to something more secure and unique.
These changes, by themselves, will not protect your network. For example, SSIDs are transmitted in
clear text. There are devices that will intercept wireless signals and read clear text messages. Even with
SSID broadcast turned off and default values changed, attackers can learn the name of a wireless
network through the use of these devices that intercept wireless signals. This information will be used
to connect to the network. It takes a combination of several methods to protect your WLAN.
One way to limit access to your wireless network is to control exactly which devices can gain access to
your network. This can be accomplished through filtering of the MAC address.
MAC Address Filtering
MAC address filtering uses the MAC address to identify which devices are allowed to connect to the
wireless network. When a wireless client attempts to connect, or associate, with an AP it will send
MAC address information. If MAC filtering is enabled, the wireless router or AP will look up its MAC
address a preconfigured list. Only devices whose MAC addresses have been prerecorded in the router's
database will be allowed to connect.
If the MAC address is not located in the database, the device will not be allowed to connect to or
communicate across the wireless network.
There are some issues with this type of security. For example, it requires the MAC addresses of all
devices that should have access to the network be included in the database before connection attempts
occur. A device that is not identified in the database will not be able to
189
connect. Additionally, it is possible for an attacker's device to clone the MAC address of
another device that has access.
Authentication on a WLAN
Another way to control who can connect is to implement authentication. Authentication is the process
of permitting entry to a network based on a set of credentials. It is used to verify that the device
attempting to connect to the network is trusted.
The use of a username and password is a most common form of authentication. In a wireless
environment, authentication still ensures that the connected host is verified, but handles the verification
process in a slightly different manner. Authentication, if enabled, must occur before the client is
allowed to connect to the WLAN. There are three types of wireless authentication methods: open
authentication, PSK and EAP.
Open Authentication
By default, wireless devices do not require authentication. Any and all clients are able to associate
regardless of who they are. This is referred to as open authentication. Open authentication should only
be used on public wireless networks such as those found in many schools and restaurants. It can also be
used on networks where authentication will be done by other means once connected to the network.
190
Figure 6.7: Open Authentication
Encryption On WLAN
Authentication and MAC filtering may stop an attacker from connecting to a wireless network but it
will not prevent them from being able to intercept transmitted data. Since there are no distinct
boundaries on a wireless network, and all traffic is transmitted through the air, it is easy for an attacker to
intercept, or sniff the wireless frames. Encryption is the process of transforming data so that even if it is
intercepted it is unusable.
Wired Equivalency Protocol (WEP)
Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it
travels through the air. WEP uses pre-configured keys to encrypt and decrypt data.
A WEP key is entered as a string of numbers and letters and is generally 64 bits or 128 bits long. In
some cases, WEP supports 256 bit keys as well. To simplify creating and entering these keys, many
devices include a Passphrase option. The passphrase is an easy way to remember the word or phrase
used to automatically generate a key.
In order for WEP to function, the AP, as well as every wireless device allowed to access the network
must have the same WEP key entered. Without this key, devices will not be able to understand the
wireless transmissions.
WEP is a great way to prevent attackers from intercepting data. However, there are weaknesses within
WEP, including the use of a static key on all WEP enabled devices. There are applications available to
attackers that can be used to discover the WEP key. These applications are readily available on the
Internet. Once the attacker has extracted the key, they have complete access to all transmitted
information.
191
One way to overcome this vulnerability is to change the key frequently. Another way is to use a more
advanced and secure form of encryption known as Wi-Fi Protected Access (WPA).
Wi-Fi Protected Access (WPA)
WPA also uses encryption keys from 64 bits up to 256 bits. However, WPA, unlike WEP, generates
new, dynamic keys each time a client establishes a connection with the AP. For this reason, WPA is
considered more secure than WEP because it is significantly more difficult to crack.
In addition to controlling who can gain access to the WLAN and who can make use of transmitted data,
it is also worthwhile to control the types of traffic transmitted across a WLAN. This is accomplished
using traffic filtering.
Traffic filtering blocks undesirable traffic from entering or leaving the wireless network. Filtering is
done by the AP as traffic passes through it. It can be used to remove traffic from, or destined to, a
specific MAC or IP address. It can also block certain applications by port numbers. By removing
unwanted, undesirable and suspicious traffic from the network, more bandwidth is devoted to the
movement of important traffic and improves the performance of the WLAN. For example, traffic
filtering can be used to block all telnet traffic destined for a specific machine, such as an authentication
server. Any attempts to telnet into the authentication server would be considered suspicious and
blocked.
192
Figure 6.9: Wirless Mac filter
193
Self-check questions
Choose the correct Answer and circle the answer
1. Which of the following TCP/ IPprotocols exist at the transport layer of the TCP/ IP
reference model? (Choose two.)
a. HTTP c. TCP
b. FTP d. UDP
2. Which TCP/ IP model layer is responsible for providing the best path through the network?
a. Application c. Internet
b. Transport d. Network access
3. What is the transport layer PDU?
a. Data c. Packet
b. Segment d. Frame
4. Bit What is the correct order of data encapsulation?
a. Data > segment > packet > frame > bit
b. Bit > frame> segment > packet > data
c. Bit > frame > packet > segment > data
d. Data > frame > packet > segment > bit
e. Bit > packet > frame > segment > data
5. What pieces of information is not required for a host to access resources on the local
network?
a. Physical address c. Process number (port)
b. Network address d. None of the above
6. Which of these statements regarding UTP network cabling are false?
a. Uses light to transmit data
b. Susceptible to EMI and RFI
c. Most difficult type of networking cable to install
d. Most commonly used type of networking cable
7. Which of the following are wrongly paired a connecting device and its working layer
a. Router: Network Layer c. Hub : Physical layer
b. Switch (layer 2): Network Layer d. Bridge : Data Link Layer
8. Which of the following does not provide filtering capability
a. Switch c. router
b. Bridge d. Hub
9. Which of the following is wrong regarding the ethernet address(MAC Address)
a. End nodes are identified by their Ethernet Addresses
b. is a unique 8 Byte address.
c. MAC Address is represented in Hexa Decimal format (48 bits)
194
d. The broadcast destination address is a special case of the multicast address in
which all bits are 1s.
10. Which of the following is wrong regarding switched network
a. Circuit switched network - a network in which a dedicated circuit is established
between sender and receiver and all data passes over this circuit.
b. Packet switched network - a network in which all data messages are transmitted
using fixed-sized packages
c. Telephone system is kind of packet switched network
d. Internet on mobiles is kind of packet switched network
11. Which of the following is wrong regarding an IPv4 address
a. is a 32-bit address that defines the connection of a device to the Internet.
b. are unique and universal.
c. Two devices on the Internet can have the same address at the same time.
d. None of the above
12. Which of the following is not a restriction imposed by the internet authorities on classless
address blocks:
a. The addresses in a block must be contiguous, one after another.
b. The number of addresses in a block must be a power of 2 (1, 2, 4, 8 .... ).
c. The first address must be evenly divisible by the number of addresses.
d. All of the above are correct
13. Which of the following is wrong regarding serial communication
a. A single bit will be transferred at a time using the communication channel
b. Bits will be reassembled at the destination
c. Mostly used by computer peripherals like printers,
d. Multiple bits (eg. Eight bits) will be transferred at a same time
14. Which of the following is wrong regarding digital signal
a. Infinitely many levels of intensity over a period of time.
b. Have only a limited number of defined values.
c. It counts but not measures
d. They are much less likely to be degraded by interference (noise).
15. The sharing of a single media for multiple communication in order to utilize the available
bandwidth wisely
a. Multiplexing c. Fiber Optics
b. Digital d. Cabling
16. Multiple signals can simultaneously be transmitted over the same line or channel.
195
a. Frequency-division Multiplexing c. Statistical-division Multiplexing
b. Time-division Multiplexing d. All
17. Computers on the network communicate with each others as equals and each computer is
responsible for making its own resources available to others.
a. Peer-to-peer c. Networking
b. Client/Server d. Cisco
18. Which of the following is not correct
a. In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub/switch.
b. In a star topology ,The devices are directly linked to one another.
c. Unlike a mesh, a star topology does not allow direct traffic between devices.
d. The controller acts as an exchange: If one device wants to send data to another, it
sends the data to the controller, which then relays the data to the connected device
19. Which of the following is not the advantages of using fiber-optic cable over copper cable?
a. Copper is more expensive.
b. Protected from electromagnetic interference.
c. Longer maximum cable length.
d. Greater band width potential.
196
20. ______________ is a system in which a number of independent computers are linked together to share
data and peripherals, such as hard disks and printers
Provide short answer in the space provided
21. ______________is a set of rules that govern data communications. It represents an agreement between
the communicating devices.
22. For the ip address of 205.16.37.39 subnet mask 255.255.255.0
Find
a. The first address________________________________
b. The last address________________________________
c. The number of addresses________________________________
d. Host bits ________________and
e. network bits________________________________
23. The decimal equivalent of the binary number 11011100.00101101.01010110.11011011 is
_________________
24. The binary equivalent of the decimal number 129.11.11.139 is ______________________
• The first thing we see is the Computer Name (having a random name)
– Type the name of the server on the Computer Name text box, for this case name the server as AU-
DC-1
You may see it is not off immediately on the local server, but it will be changed after some moments, or click on the
refresh button on top
Remote management is enabled by default, leave it enabled. With that we may not be at the physical computer, but
we can manage it remotely using commands in a domain environment
• Uses the winrm command
• Then enable Remote Desktop
Disabled by default, so click on it, then click on “Allow remote connections to this computer” option, click ok on
the dialog box, we can then select users of remote desktop, but for now we have no users, so click ok.
• Remote desktop enables us to work on the server remotely
• The next is NIC Teaming, this is about bringing multiple Network Interface Cards together to function as
one network connection (if we have more than 1 network adapters)
The next is Ethernet, by default it takes IP address from a DHCP server, but we don’t want that since we will make
this machine a domain controller, so click on the link (IPV4 address…)
– Then right click on the network adapter, properties, select Internet Protocol version 4 (TCP/IPv4),
then click on properties, and select “Use the following IP address” option, and give the IP address.
Then leave all the rest as default but change the time zone appropriately
1.2 Active Directory Domain Services
Active Directory Domain Services (AD DS) is the server service for security and permissions in a windows
environment.
✓ Used to set up computers and security policy for those computers on the network
✓ Users sign in to a network, then all the policy set up on you will apply, like some things are available,
some are not available to you by that single sign up
• Useful for only for networks with few computers, like less than 10 to 20.
AD is a database that keeps track of a huge amount of stuff and gives us a centralized way to manage all our
network machines, users, and resources.
There are three primary types of items in AD:
✓ Users and groups
▪ We can have multiple domain controllers that all have copies of the same active directory database.
When changes occur, they inform each other about it, in a process called replication
1.4 Domain
A windows server domain is a logical group of computers running versions of the Microsoft windows operating
system that share a central directory database. The machines are all named with part of a domain name like
“AU.EDU.ET” (also called suffix) and are registered in the active directory database so they can be managed
✓ E.g. AU-DC-1.au.edu.et, CL1.au.edu.et, CL2.AU.edu.et, etc
✓ DNS
DNS is a service provided by a server that allows you to find other computers in your network.
DNS allows us to type a friendly name of a machine instead of its IP address, allowing our client to get the IP
address from the DNS server and go find the resource.
✓ Without DNS, active directory will not work
▪ Then comes additional roles and features wizard, click on Add Features, and click Next
▪ Again click next, check on restart if required checkbox, and click on install
Because this DC is the very first one we are installing, we select the last option (add a new forest)
▪ Name it as “au.local”, and click next
Then set functional levels based on how far we install and support previous operating systems.
▪ i.e. what is the oldest DC in the entire forest or in this domain that we have to support
▪ For this case, we don’t have any previous server, so choose the default (Windows Server 2012 R2).
It is a good idea to have an Active Directory integrated DNS for many reasons, so keep the default checked DNS
server
Then type the directory services restore mode password
▪ Which will be used in backup and recovery
Click next, you get a warning about delegation for this DNS server cannot be created… this is because in this
example we used the .local domain, it is saying that it can’t find a DNS server with .local domain, just click next.
▪ It then finds the NetBIOS domain name (for this case AU), and click next
Then it tells you the path where the database and log files will be stored
▪ For production environments, better to separate the database and log files locations to different hard
disks for a better performance.
Now we have installed active directory domain controller, you see that on the dashboard, we have the installed roles
shown. We can add another domain controller for backup purposes, if one DC fails, the other functions.
▪ In production environments, it is recommended to have more than one domain controller.
Install another windows server to act as a second domain controller, name it as AU-DC-2.
Here, the important things we change are:
▪ The IP address: give it another IP from same network
▪ AU-DC-1: 192.168.0.10
▪ AU-DC-2 : 192.168.0.11
▪ Set the DNS server of the later domain controller (AU-DC-2) as the IP address of the first
domain controller because we made AU-DC-1 a DNS server (in addition to making it a DC).
Do this together with when configuring the IP address
When you promote the server to a domain controller, this time select “Add a domain controller to an existing
domain” – the default
To specify the domain information, click on the “Select” button.
▪ Put credentials given in the domain and click Ok
▪ Select the domain from the retrieved ones. Click next, and select DNS server, and also Global catalog
You can also make it a read only domain controller (for security reasons), but here just make it read write (the
default)
▪ Give the DSRM password
Click next, for Replicate from, you can choose the nearest DC if you have multiple DCs, but now leave the default
▪ Click install, and then done.
▪ On the window that comes, on the left column, under Active Directory Users and Computers, you see Saved
Queries and the Domain Name you created earlier (in this case au.local)
▪ Expand the domain name (click on the small triangle before the name)
▪ Builtin
▪ Computers
▪ Domain Controllers
▪ ForeignSecurityPrincipals
▪ Users
▪ Then fill the fields like First name, Last name, etc.
Assume you have a user named John Doe, to create a user account for this person type John as First name, and Doe
as Last name, you see his full name is given by itself
For User logon name, you should first have to plan on what format user logon names should have
In this case for user logon name we will follow First name and the first letter of last name, with no spaces
▪ E.g. JohnD
You see the options “user must change password at next logon”, “user cannot change password”, “password never
expires”, “account is disabled”.
▪ For this case, select password never expires, since this is a test environment
User Properties
▪ After creating the user, you see the new user in the list of users
▪ There you see many tabs, including the General tab, Account tab, etc.
▪ Click on the Account tab, here you see options like setting the logon hours for the user, the computers he is
allowed to logon etc.
▪ For temporary users, we can set the account expire date also.
▪ User templates are used to create other users based on same properties in the future
▪ To create a user template, right click on Users, then New > User
User Template
▪ User templates are used to create other users based on same properties in the future
▪ To create a user template, right click on Users, then New > User
✓ User templates are still a real user accounts, but let us give first name: _Sales_User, last name:
_Template
Assuming we are creating user account template for future sales department staff members. We use the underscore
(_) just to make the template appear first alphabetically (not a must)
✓ Click next, give appropriate password, and password never expires (or the other option also possible)
✓ There you can type in the new password, and also unlock the account (if it is locked for trying many
times with wrong username password)
You can also unlock an account (not reset the password) by right clicking on the user account name, properties, and
then click on Account tab, there click on Unlock account checkbox. To disable an account (like if the user leaves the
organization), right click on the account, then click on Disable account
▪ We can also delete an account by right clicking on it
▪ We can also rename user accounts, like when you want to change the full name or logon name
✓ Assume we have different users, they all work for the same department, and if it is true that they
should have the same access to the same resources on a network, then group account management
becomes important.
It enables us to give permissions to a group, and every user account which is a member of that group will inherit
those permissions.
Types of Groups
There are two types of groups:
✓ Security groups
✓ Distribution group
• Used for activities like email distribution groups and the like
• In exchange environment for e.g. we setup distribution groups, and email to the group other
than typing all the individual users
Group Scopes
On a domain based network, we have 3 types of group scopes
✓ Domain local
✓ Global
✓ Universal
Global groups
✓ Provide domain-centric membership, place all user accounts into Global groups.
Universal groups
✓ Used for the gathering of users and groups from multiple domains throughout the forest
✓ Typically, organizations using WANs should use Universal groups only for relatively static groups in
which memberships change rarely.
In reality, what we mostly deal with is the global group, and the rest are not practiced.
Creating Group Accounts
To create a group, open Active Directory Users and Computers, on the containers list, right click on users, then new,
then select Group.
▪ You get the New Object-Group wizard.
▪ One way is, right click on the group name, select properties, the click on Members tab.
▪ There, type the Add button, there type the user name, and click on Check Names button.
▪ From the populated list, select the right one and click Ok.
▪ The other way to make users be member of a group is go to the user in the Active Directory Users and
Computers, right click on it > properties > click on the Member Of tab, then click on the Add button.
▪ Then type the group name, and click on Check Names, then click ok (with the correct group names
populated)
▪ To add multiple users be members of a group, go to Active Directory Users and Computers, click on Users
container, then press the Control (Ctrl) key and click on the multiple user accounts.
▪ Then type the group name, and click on the check names button
▪ Then click on the member tab, and click on Remove button, click Ok.
▪ This does not deletes the user account, but it only removes its membership from that group
▪ Using the Active Directory users and Computers or the GUI, there is not much more to do with managing
groups
▪ But we can use PowerShell to manage our groups using scripts, or at more enterprise level we use AD
Administrative Center.
▪ First, go to Active Directory Users and Computers, and click on the Computers container
✓ Because we did not add any computer object so far, the container is empty
On the client computer, give it appropriate name (e.g. WIN8-client1), give an IP address from same address pool, for the DNS
server of the client computer, fill the IP address of one of the Domain Controllers
Joining a Computer to a Domain
▪ Usually, a computer account is created when a client computer joins a domain.
▪ To make a computer join a domain, as an example on a windows 8.1 PC, after giving the appropriate IP
address as stated on the previous slide, right click on My Computer, on the system properties, click on
Change Settings, under the Member of, click on Domain, and type the domain name (in our case au.local),
click Ok
▪ On the coming screen, enter either the AD Administrator credentials, or any created user account on the AD
as user name and password.
It then should well come you to the domain, and allow it to restart
▪ On the Domain controller, go to the Active Directory Users and Computers, and if you click on the
Computers container, you see the newly joined computer name listed.
▪ You can also create a computer account before the computer actually joins the domain
✓ To do so, right click on the Computers container > new > computer … (try this by yourself)
✓ Usually used when you want to mass create computer accounts in advance
▪ If you go to the client computer and see it full computer name, it puts the domain name as suffix to the
computer name
✓ E.g. WIN7-Client1.au.local
✓ DNS servers
✓ DNS database
✓ DNS clients
The DNS servers host the DNS database, which is a list of names and the corresponding IP addresses, and DNS
clients get service of name resolution into IP addresses from DNS servers.
If you type a domain name on your browser (like www.xyz.com), that machine is a DNS client.
✓ Because it asks for the IP address of the web server named www.xyz.com from the DNS server.
On our domain controller, we installed DNS as part of installing active directory. To see DNS, go to the active
directory (DC-1), open server manager, tools, and open DNS. On the DNS manager window, you see the domain
controller name on the left pane, under it (when you expand it), you see folders named forward lookup zones,
reverse lookup zones, etc.
Under forward lookup zones, you see the domain name.
✓ If you click it, you see the records on the right, i.e. all the hosts in the domain and their corresponding
IP address.
This DNS was installed as part of the active directory installation process at the beginning of the course.
✓ But the DNS role alone can also be installed just as any other role from the server manager.
Then we have top-level domain, like .com, .org, .net, and so on for those on the Internet, or for internal domains
.local.
Below that we have second-level domain, like the company name, and below that we can have sub domain or series
of sub domains.
As in the example, inside the globomantics domain, we can have a sub-domain called HQ. Though not
recommended, we can further have a sub domain, as in the example, under HQ, called sales. Assuming there is a
computer that exists inside the domain sales named serverA, the fully qualified domain name of serverA is:
serverA.sales.hq.globomantics.com
DNS Query
A query is a request for name resolution directed to a DNS server. Two different types of queries:
✓ Iterative (I will tell you what I know)
✓ These queries can be sent to series of DNS servers till an authoritative answer or an authoritative ‘no’
is found.
Forwarder is a DNS server to which other DNS servers forward queries. Two types of forwarders:
✓ Standard forwarder
• If this DNS server doesn’t know the answer, it asks the forwarder DNS server.
✓ Conditional forwarder
▪ Right click on the server name at the top (AU-DC-1) > properties
▪ Then click on the forwarders tab. There you can click the Edit button and enter the IP address of the
forwarder DNS server.
▪ To configure conditional forwarders, right click on the folder ‘Conditional Forwarders’ (the last folder on the
left pane of the DNS manager.
▪ Select ‘New Conditional Forwarder’ and enter the DNS Domain and the IP address for the server.
DNS Zones
Zone is an area of DNS namespace that a DNS server is authoritative over. Authoritative servers do have the domain
name under their ‘forward lookup zones’ folder by default.
Four zone types:
Primary zone: for which the DNS server has a master copy of the database.
– The server can read and write to the database.
Secondary zone: for which the server has a read only of the database.
Stub zone: A Stub Zone allows for the automatic propagation of delegations to DNS Servers
Active directory integrated: the DNS we get when we install AD DS.
– The database is stored as part of the AD database, and it is replicated between the Ads.
DNS Records
There are different types of DNS records that are used for different purposes.
▪ The common records are:
✓ PTR (Pointer)
✓ NS (Name Server)
✓ MX (Mail Exchanger)
✓ CNAME (Alias)
For example, for www give the name of the web server, since there is no server named www in your company
1.12 Working with Organizational Units (OUs)
Organizational Unit (OU) is a container object in AD DS which is primarily used to help with group policy
application and the delegation of permissions of other AD DS objects.
✓ It is an object designed to be a container of other objects.
We use OU in domains with too many objects in the AD to organize these objects
Because it is difficult to manage them if they are too many and kept in simple alphabetical order
There are two other reasons why we use OUs
✓ To help with group policy application
• Group policy is applied to the various users and computers based on what container they are
in.
• The OUs don’t actually give the permissions, they just help us with the management of those
permissions
Creating OUs
Go to the Domain Controller and open Active Directory Users and Computers
✓ Click on the top level container (the domain name)
✓ You see Domain Controllers are OUs, but the rest are containers
To create your own containers, right click on the domain name (on the left pane of the AD Users and Computers
window) > New > Organizational Unit
Then give it a name
✓ Leave the checked Protect container from accidental deletion on, and click Ok.
Usually, our top level containers are expected to be static (i.e. do not change frequently), like locations
✓ E.g. city of our branch office
Then we organize all our AD objects inside the OU. We can put all the users inside the new OU
To do so, you can drag (or cut and paste) the users you want from the Users or Computers containers to the new OU.
It is just like creating folders and sub folders, so you can create sub OUs under OUs
✓ Under the OU Addis, you can have two OUs named Addis Users and Addis Computers, and then put
the appropriate objects inside them
You can decide what OUs to have and the sub OUs to organize objects in appropriate way based on three main
things
✓ Application of Group Policy Objects
▪ How are our group policy objects going to be applied (we will see about group policy in
coming chapters)
✓ Delegation of Control
✓ Organization
▪ What is the best way to organize objects to easily find things in your company AD?
Decide which one is most important (from the three) and do based on that.
Deleting OU
If you delete an OU, everything inside it will be deleted. The ‘Protect container from accidental deletion’ option
makes follow additional steps to delete an OU. To delete an OU, if you right click on it and select delete, you see a
warning that informs you it is not possible. To change that and delete it, click on View menu (of the AD Users and
Computers), click on Advanced Features. Then right click on the OU > Properties > click on the Object tab > then
uncheck the Protect object from accidental deletion check box, and click ok.
✓ Now you can delete the OU
Delegation of Control
The delegation of control wizard helps us to assign specific privileges to any user, even he/she is not a member of
the administrators group. As an example, we want John Doe to reset passwords of users
✓ He is not an administrator who can do everything but he can only reset passwords
To delegate a user on an OU, right click the OU, select Delegate Control
▪ Click next on the wizard
▪ Type the name of the user to be delegated and click on Check Names
▪ Click next and select the task that this user will be able to do
✓ E.g. Reset user passwords and force password change at next logon
To undo the delegation for a user, make sure the Advanced Features is selected at the View menu, then right click on
the container (OU), click Properties
▪ Click on security tab, click advanced button.
▪ There in the list, find the person you delegated, and double click on it or click on the edit button
▪ Then you uncheck the check boxes, or down click on clear all, and click ok.
To create an item to work with, open the new partition on the server, and create a folder named ‘demo folder’, and
inside this folder create a simple text file named ‘demo file’.
NTFS Permissions
Right click on the file and click on properties, and click on the security tab. There you see an access control list,
which is a list of users and groups
✓ In our server case, you see 3 groups
• The Users group for example has the ability to read & execute, and read.
That means, if a user is member of two groups, and in one group he/she is allowed to have full control, and in the
other group he/she is denied to modify, the deny is effective (more powerful than the allowed full control).
The administrator is by default member of the two groups Administrators and Users.
✓ If you deny one permission in the users group but allow that same permission in the administrators
group, the deny has more power, so he/she will be denied
If you want to add permission to a user or group, click on the edit button, then click on the group or user in the
group or user names, and check in the appropriate check boxes to either allow or deny permissions in the list down
below, and click ok.
If you want to add another user or group, click on the add button, then type the group or user name and click ok.
✓ e.g. add the IT Users group, that we created in the active directory, and allow the group to modify
(that includes permission of the additional 4 permissions below) and click ok.
The previous things were on the file. If you right click a folder, and click on properties, then on security tab, you see
the same things, but also one additional item, called ‘list folder contents’. If you allow permission to list folder
contents, the object can see the contents of that folder, even if they can’t access it.
Sharing
▪ There is another tab, called sharing tab (before the security tab)
✓ Share
✓ Advanced sharing
▪ If you click the advanced sharing, you can check the share check box.
▪ Click on permissions button to set up specific permissions to users/groups, the same way we setup NTFS
permissions
You can add users/groups and specify whether they have read, change or full control access
To access a file over a network, we must share the folder first. When you share the folder, if you limit the
permissions of the folder sharing to specific groups, this also applies to the files inside this folder, even if
users/groups have full control to the files inside the folder
✓ Folder sharing permissions override file security permissions
This way, you can set a folder to be accessible only by some groups/users created in the active directory, and not be
accessed by others.
Instead of going to individual computers and assign static IP address, DHCP allows those IP addresses automatically
be assigned. DHCP works following the 4 processes:
Discover: client locates a DHCP server
▪ Client sends out a broadcast on the network asking if there is any DHCP server.
▪ It is like the DHCP server says “here is an IP address if you want it” to the client.
The server then registers this IP address into its database so that it does not give it to anyone else.
There is a process of DHCP Renewal
✓ Takes place every half time of the lease period
• Request
• Ack
✓ For e.g. if the lease period is 8 days, it is renewed at the 4th day, for a fresh 8 days again (being at the
4th day)
If at the lease renewal day the server does not respond, the client keeps using the IP address for the remaining lease
days
✓ But tries to renew every half of the remaining half time
At the 87.5 % of the life used up, the client makes the renewal process a broadcast, trying to renew the lease by any
DHCP server accessible.If no response still, at the end of the lease period, the client starts the DHCP process again
from the beginning.
1.16 Using DHCP in a Routed Network
If our network is segmented by routers, and the DHCP server is on the other segment of the network, a DHCP
discover broadcast can’t pass the router, since a broadcast can’t pass through a router.
There are the following 3 solutions for this
✓ Put a DHCP server on every network segment
• Or make the router itself a DHCP server, it serves all the segments.
• The relay agent is another computer that knows the IP address of the DHCP server on the
other segment
DHCP is a role, just like other roles.To install a DHCP role, open the server manager
▪ Then click on Add roles and features link on the server manager
▪ Click next, next again and select DHCP from the role list.
▪ Then click Add Features button when Add roles and features wizard comes
▪ After the initial adding features is completed, click on the ‘Complete DHCP configuration’ link.
▪ Click next
▪ At the Authorization step, any DHCP server in the domain must be authorized to start its service
✓ Any DHCP server must be member of the domain, and be authorized to serve as DHCP.
✓ To authorize any DHCP server, you must have an administrator account in the forest.
▪ Click Commit button, and close the wizard, and close the previous wizard also.
▪ Now to configure the DHCP server, click on tools menu at the server manager
▪ Click DHCP
▪ On the DHCP wizard, click on the server name on the left pane
▪ Click next
✓ Any name
▪ Click next, and give the actual range of the IP addresses in the pool
✓ For our example purpose, let the pool start from 192.168.100.30 to 192.168.100.200
✓ You may modify the subnet mask there, if required, and click next
▪ Here type in the IP addresses you do not want the DHCP server give to clients
▪ Type as a range (by typing the start IP and end IP addresses) and click Add button, or just type individual IP
addresses and click Add
▪ Then click next, and specify the lease duration, or leave the default
✓ If in the network the clients move around frequently (changing), from one network to another, make
the lease duration short
✓ If however clients in the network are not changing place frequently, you can make the lease duration
very long
▪ Or even enter all 0 in the 3 fields (days, hours, minutes) to make the lease indefinite (not
lease, but permanent) => not recommended, it has problems
▪ Click next (with the default period of 8 days for our example)
▪ Then comes DHCP options configuration, used to tell clients other important IP addresses in addition to their
own IP address, like the default gateway and DNS servers, click next
▪ Then comes WINS server, leave it blank and click next (almost obsolete feature)
✓ The address leases folder shows you any client that got an IP address fro this pool.
▪ Reservations is not same as exclusion
▪ Exclusion excludes the IP address from being given to clients, but reservation is a way to give an IP address
from the pool to be given only to one client always
✓ You need to know the MAC address of the client to reserve an IP address for it
✓ It is like giving a static address for the client from the server.
▪ We can have additional server scopes, with different address pool, etc.
Self-check questions
I. Circle on the Correct Choice (2 marks each)
1. Which one of the following is the best definition of a server?
a. A network-connected device that provides IP routing to the network
b. A network connected device that provides services to the network and devices on that
network
c. A stand-alone device that is used by a user to perform mathematical analysis
d. A network connected device that is used to access websites using a web browser
2. One of the following is done first
a. Join a domain from a client computer
b. Create a domain
c. Create a group account
d. Create a user account
3. Which one of the following is not an initial (very first) configuration task on a windows
server?
a. Setting the computer name
b. Setting IP address
c. Configure date time
d. Adding the Active Directory Domain Services role
4. One of the following loads automatically on the desktop and is opened by default after
Windows Sever 2012 is powered on
a. Command line (cmd)
b. Control panel
c. Server Manager
d. PowerShell interface
5. Where do you commonly (most of the times) add a record in a DNS server?
a. Forward lookup zone
b. Reverse lookup zone
c. Two way lookup zone
d. None
6. Administrative entity you create on a DNS server to represent a discrete portion of the DNS
namespace.
a. Zone
b. Level
c. Border
d. Area
7. _____________ is another computer that knows the IP address of the DHCP server on the
other segment of the network
a. Relay agent
b. Name resolution
c. Switch
d. None of the above
8. _________________ is what you set up on a DNS server to indicate the other DNS server to
send a request of unknown name.
a. Pointer
b. Forwarder
c. Resolver
d. Finder
9. For which of the following devices the dynamic IP addresses are assigned?
a. Domain controllers
b. Internet web servers
c. Client computers
d. DHCP server
2
10. DNS servers contain DNS database, which contains the list of
a. Only names of the client computers
b. Only the IP addresses of computers
c. Names and the corresponding IP addresses
d. None
11. The .com .net and .org are at
a. Top level domain
b. Second level domain
c. Sub domain
d. Fully qualified domain
12. If you want a client computer to get a known IP address from a DHCP server, and the IP
address should not change (be the same always), you do one of the following on the DHCP
server:
a. Put the address as a router
address
b. Reserve the address
c. Create a separate scope
d. None
13. When you configure the very first domain controller, which option do you use?
a. Add a DC to an existing domain
b. Add a new domain to an existing forest
c. Add a new forest
d. Add a new client
14. What is at the top of the hierarchy tree of Domains?
a. .com
b. Root
c. .net
d. .org
15. What is the IP address pool available for lease to DHCP clients?
a. NAT
b. Scope
c. Lease options
d. IP address pool
16. When you create a user, by default that user will be member of the following security group:
a. Administrators
b. Site managers
c. Domain users
d. Enterprise admins
3
17. One of the following is true about computer accounts in domain controller:
a. When a computer joins a domain, a computer account is created automatically in
the active directory
b. In the active directory, you see list of IP addresses of computers that join the
domain
c. A user must be a domain administrator to login to a computer in a domain
d. None
18. An organizational unit is:
a. An object which is container of other objects
b. Just like a folder in windows explorer
c. Used to delegate permissions over AD objects
d. All
19. A DHCP server gives one of the following to clients
a. IP address for the host
b. Default gateway address
c. DNS server address
d. All
20. One of the following is true:
a. A user can be a member of more than one groups in a domain controller
b. A forest must have at least two domains
c. It is recommended to run too many server roles only on one server
d. None
II. Write the answers only on the spaces provided (1 marks each)
21. Briefly describe the following message types by indicating and their source in DHCP.
a. Discover:
b. Offer:
c. Request:
d. Ack:
4
22. What protocol is used to automatically assign IP addresses and dynamically configure
your hosts’ TCP/IP protocol? ______________________
23. What are the two group account types in active directory?
_______________________________________________________
24. What is the role you add on a server to make it a Domain Controller?
___________________________
25. Write one common user account administrative process you do on a domain controller.
___________________________
Sub theme 3 Computer Security
Learning Objectives of the unit
Be able to understand that information security is concerned with securing all of the information resources, not just hardware
and data.
Be able to understand the three main objectives of information security.
Today, however, with pervasive remote terminal access, communications, and networking, physical measures rarely
provide meaningful protection for either the information or the service. Currently computer security can be defined
as the protection afforded to an automated information system in order to attain the applicable objectives of
preserving the integrity, availability and confidentiality of information system resources (includes hardware,
software, firmware, information/data, and telecommunications)
Confidentiality
Confidentiality is about protecting the information from disclosure to unauthorized parties. Information has value,
especially in today’s world e.g. bank account statements, personal information, credit card numbers, trade secrets,
government documents. Everyone has information they wish to keep a secret. Protecting such information is a very
major part of information security.
Organizations protect against loss of confidentiality with access controls and encryption. A very key component of
protecting information confidentiality would be encryption. Encryption ensures that only the right people (people
who know the key) can read the information. Other ways to ensure information confidentiality include enforcing file
permissions and access control list to restrict access to sensitive information.
For example, users are first required to authenticate and then access is granted to users based on their proven
identity. In short, users are granted access to data via permissions. If users do not have permissions, they are denied
access.
If a system suffers loss of confidentiality, then data has been disclosed to unauthorized individuals. This could be
high level secret or proprietary data.
Integrity
Integrity of information refers to protecting information from being modified by unauthorized parties. Information
only has value if it is correct. Information that has been tampered with could prove costly. For example, if you were
sending an online money transfer for $100, but the information was tampered in such a way that you actually sent
$10,000, it could prove to be very costly for you.
As with data confidentiality, cryptography plays a very major role in ensuring data integrity. Commonly used
methods to protect data integrity include hashing the data you receive and comparing it with the hash of the original
message.
Loss of integrity means that data or an IT system has been modified or destroyed by an unauthorized entity. This
could be the modification of a file, or the change in the configuration to a system that results inaccurate and
unreliable information.
For example, if a file is infected with a virus, the file has lost integrity. Similarly, if a message within an email is
modified in transit, the email has lost integrity.
One of the common ways of ensuring integrity is with hashing. In short, a hash is a number and a hashing algorithm
can calculate a hash for a file or string of data. As long as the data has not changed, the hash will always be the
same. The two primary hashing algorithms used today are Message Digest 5 (MD5) and Secure Hashing Algorithm
1 (SHA-1).
Availability
Availability of information refers to ensuring that authorized parties are able to access the information when needed.
Information only has value if the right people can access it at the right times. Denying access to information has
become a very common attack nowadays.
Other factors that could lead to lack of availability to important information may include accidents such as power
outages or natural disasters such as floods.
How does one ensure data availability? Primary methods that organizations use to protect against loss of availability
are fault tolerant systems, redundancies, and backups.
• Backup is key. Backups ensure that that important data is backed up and can be restored if the original data
becomes corrupt.
• Fault tolerance means that a system can develop a fault, yet tolerate it and continue to operate.
• This is often accomplished with redundant systems such as redundant drives or redundant servers that ensure
data and systems are up and operational when they are needed.
For example, if a Web server is not operational when a customer wants to purchase a product, the Web
server has suffered a loss of availability.
1. Security threats/attacks.
In the context of computer/network security, an attack is an attempt to access resources on a computer or a network
without authorization, or to bypass security measures that are in place.The common types of attacks include:
a. Snooping attacks - This is when someone looks through your files in the hopes of finding something interesting
whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling
bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper
tracked to your bulletin board. Computer snooping on the other hand involves someone searching through your
electronic files trying to find something interesting.
b. Back door Attacks - back door refers to gaining access to a network and inserting a program or utility that
creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain
administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice. There are many
more. Fortunately, most anti-virus software will recognize these attacks.
c. Spoofing Attacks - This is an attempt by someone or something to pretend as someone else. This type of attack is
usually considered as an access attack. The most popular spoofing attacks today are IP spoofing and DNS spoofing.
The goal of IP spoofing is to make the data look like it came from a trusted host when it really didn't. With DNS
spoofing, The DNS server is given information about a name server that it thinks is legitimate when it isn't. This can
send users to a website other than the one they wanted to go to.
d. Packet Sniffing attack A program that captures data as it travels across a network.
e. Man-in-the-Middle Attacks – In cryptography and computer security, it is an attack where the attacker secretly
relays and possibly alters the communication between two parties who believe they are directly communicating with
each other.
This can be fairly sophisticated, this type of attack is also an access attack, but it can be used as the starting point of
a modification attack. This involves placing a piece of software between a server and the user that neither the server
administrators nor the user are aware of. This software intercepts data and then send the information to the server as
if nothing is wrong. The server responds back to the software, thinking it's communicating with the legitimate client.
The attacking software continues sending information to the server and so forth.
f. TCP hijacking attack is a dangerous technique that intruders can use to gain access to Internet servers.
Cracker- A hacker who specializes in “cracking” or discovering system passwords to gain access to computer
systems without authorization. Crash Sudden failure of a computer system, rendering it unusable.
Hacker A person who spends time learning the details of computer programming and operating systems, how to test
the limits of their capabilities, and where their vulnerabilities lie.
g.Denial of Service attack A deliberate action that keeps a computer or network from functioning as intended (for
example, preventing users from being able to log onto the network).
Threat A potential danger to data or systems. A threat agent can be a virus; a hacker;
a natural phenomenon, such as a tornado; a disgruntled employee; a competitor, and other mechanisms.
Risk the probability that a specific security threat will be able to exploit system vulnerability, resulting in damage,
loss of data, or other undesired results. That is, a risk is the sum of the threat plus the vulnerability.
Vulnerability A weakness in the hardware or software or security plan that leaves a system or network open to
threat of unauthorized access or damage or destruction of data.
g. Password Guessing Attacks - This occur when an account is attacked repeatedly. This is accomplished by
sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain
passwords for an access or modification attack. There are three types of password guessing attacks: Today, there are
three common methods used to break into a password-protected system.
A hacker uses a computer program or script to try to log in with possible password combinations, usually starting
with the easiest-to-guess passwords. (So just think: if a hacker has a company list, he or she can easily guess
usernames. If even one of the users has a “Password123”, he will quickly be able to get in.)
2. Dictionary Attack
A hacker uses a program or script to try to login by cycling through combinations of common words. In contrast
with a brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only
those possibilities which are most likely to succeed, typically derived from a list of words.
A hacker uses a program to track all of a user’s keystrokes. So at the end of the day, everything the user has typed—
including their login IDs and passwords—have been recorded. A key logger attack is different than a brute force or
dictionary attack in many ways. Not the least of which, the key logging program used is malware (or a full-blown
virus) that must first make it onto the user’s device (often the user is tricked into downloading it by clicking on a
link in an email). Key logger attacks are also different because stronger passwords don’t provide much protection
against them, which is one reason that multi-factor authentication (MFA) is becoming a must-have for all businesses
and organizations.
With multi-factor authentication (also called two-factor authentication, 2FA, and advanced authentication), a user
is required to not only provide a password to gain access to the system, but also a another security “factor,” like a
unique one-time access code generated from a token device or secure mobile app on their smartphone.
Positive Warnings about password security: Never share your password. Never use the vendor default password
(like Netgear1). Never use an easy-to-guess password (like Password123 or Mike1982).
It is computer program or script that performs an action that intentionally damages a system or data, that performs
another unauthorized purpose, or that provides unauthorized access to the system.
virus: A virus is a small, self-contained piece of computer code hidden within another computer program. Like a
real virus, it can reproduce, infect other computers, and then lie dormant for months or years before it strikes. A
virus is only one of several types of "malicious logic" that It may damage or corrupt data, change data, or degrade
the performance of your system by utilizing resources such as memory or disk space or your entire network.
worm : A computer worm spreads like a virus but is an independent program rather than hidden inside another
program.They are self contained and use the networks to spread, in much the same way viruses use files to spread.
Some people say the solution to viruses and worms is to just not have any files or networks.
logic bomb :A logic bomb is a program normally hidden deep in the main computer and set to activate at some
point in the future, destroying data.
Trojan Horse: A Trojan Horse seems as a legitimate software program. It waits until triggered by some pre-set
event or date and then delivers a payload that may include destroying files or disks. From an information security
point of view, one of the more dangerous types of malicious logic is a Trojan Horse that allows a remote user to
access and control your computer without your knowledge whenever you are on the Internet.
6. Social engineering
Social engineering refers to psychological manipulation of people into performing actions or divulging confidential
information. It is a type of confidence trick for the purpose of information gathering, fraud, or system access.
Mail from a friend (Phishing attempts)- Typically, a phisher sends an e-mail, IM, comment, or text message that
appears to come from a legitimate, popular company, bank, school, or institution.
If a criminal manages to hack or socially engineer one person’s email password they have access to that person’s
contact list as well.
Once the criminal has that email account under their control, they send emails to all the person’s contacts or leave
messages on all their friend’s social pages, and possibly on the pages of the person’s friend’s friends. These
messages may use your trust and curiosity such as:
And, how can Alice be sure that only Bob will see what she encrypted? So far, the only thing we know is that the
user of a given key pair has signed and encrypted the message.
But, is he really the owner? George, for instance, may have sent a message to Bob pretending that he is Alice; Bob
cannot tell whether or not it is Alice or George who is sending the message. The same applies to Bob’s public-key.
This issue is solved by the use of certificates.
What is a Certificate?
A certificate is a piece of information that proves the identity of a public-key’s owner. Like a passport, a certificate
provides recognized proof of a person’s (or entity) identity. Certificates are signed and delivered securely by a
trusted third party entity called a Certificate Authority
(CA). As long as Bob and Alice trust this third party, the CA, they can be assured that the keys belong to the persons
they claim to be.
A certificate contains among other things:
1) The CA’s identity
2) The owner’s identity
3) The owner’s public-key
4) The certificate expiry date
5) The CA’s signature of that certificate
6) Other information that is beyond the scope of this article.
With a certificate instead of a public-key, a recipient can now verify a few things about the issuer to make sure that
the certificate is valid and belongs to the person claiming its ownership:
1) Compare the owner’s identity
2) Verify that the certificate is still valid
3) Verify that the certificate has been signed by a trusted CA
4) Verify the issuer’s certificate signature, hence making sure it has not been altered.
Bob can now verify Alice’s certificate and be assured that it is Alice’s private-key that has been used to sign the
message. Alice must be careful with her private-key and must not divulge how to get to it; by doing so, she is
enforcing one aspect of the non-repudiation feature associated with her digital signature. As will be seen in section
3.2, there is more to consider for effective non-repudiation support.
Note that certificates are signed by a CA, which means that they cannot be altered. In turn, the CA signature can be
verified using that CA’s certificate.
2.1 Certificate validation added to the process
When Alice encrypts a message for Bob, she uses Bob’s certificate. Prior to using the public-key included in Bob’s
certificate, some additional steps are performed to validate Bob’s certificate:
1) Validity period of Bob’s certificate
2) The certificate belongs to Bob
3) Bob’s certificate has not been altered
4) Bob’s certificate has been signed by a trusted CA
Additional steps would be required to validate the CA’s certificate in the case where Alice does not trust Bob’s CA.
These steps are identical to the ones requires to validate Bob’s certificate. In the example below, it is assumed that
both Bob and Alice trust that CA.
Summery
For instance, a real-life example of a cybersecurity incident involved ChatGPT in March 2023. OpenAI admitted to
the breach by releasing a statement acknowledging that credit card information, email IDs, membership numbers,
names, and addresses of some users were visible to other users. This information was available for a nine-hour
window and users who were active during this time risked having their details visible to other users. This breach is
attributed to a bug in the open source AI that was being used by ChatGPT.
Understanding the intricacies of cybersecurity incidents, distinguishing them from security events and other
incidents is crucial.
Difference between a security event and security incident
It is important to know the difference between a security event and a security incident. A security event is an
occurrence in the network that might lead to a security breach. If a security event is confirmed to have resulted in a
breach, the event is termed a security incident. A security incident results in risk or damage to the resources and
assets of an enterprise. Based on the breach detected, sufficient action has to be taken to limit the damage
and prevent the incident from getting worse.
3.2 Security events
Security events are the first step towards identifying a threat or a complete attack. An enterprise might run into
thousands of security events per day. However, not all security events indicate a cyberattack. For example, a user
receiving a spam email triggers a security event. Such events need to be monitored using a SIEM solution to detect
if a security event leads to a security incident.
Some of the most common sources of security events that should be analyzed in a network are explained below.
3.3 Firewalls
A firewall controls traffic to and from the network. Firewall logs provide the first evidence of an intrusion
by attackers. So, security events detected from firewall logs must be carefully monitored. Below are some
of the common security events and incidents that you should monitor from firewall logs.
• Spike in incoming or outgoing traffic: A spike in incoming or outgoing traffic is a critical security event.
On further inspection into the firewall logs, if multiple packets are received from source IP addresses
unknown to your organization, this is a security incident, as it indicates a possible DDoS attack.
• Configuration changes to firewall policies: Changes to firewall configurations are security events, not
incidents. However, if a user whose privileges have been recently escalated tries to change the firewall
configurations, the event is termed a security incident.
Modification to firewall settings: Changes made to firewall rules can be normal events unless they allow
traffic from or to a malicious C2C server or any other malicious source for data
• exfiltration. In such cases, the change becomes a security incident. Therefore, it is necessary to carefully
monitor these changes.
3.4 Critical servers
Critical servers, such as file servers, web servers, and domain controllers, are highly susceptible to attacks, as
compromising these systems means gaining control of the network or data to a large extent. Monitoring all the user
activities and changes to configurations in these servers is critical. Some of the common security events that you
should monitor on critical servers are:
• User logins.
• User permission changes to access the servers.
• Changes to system settings.
• Changes to security configurations.
When the above events, upon investigating, turn out to be from a suspicious source or indicate unusual user
behavior, then they are security incidents.
These are some common events that you should monitor. Depending on the functionality of the servers, you can add
other events for monitoring. For instance, in a web server, it becomes essential for you to monitor the logs for
injection attempts.
Databases
Databases are one of the most common targets for attackers, as they store employee details, confidential business
data, and more. Some of the common security events in databases are:
• Changes to database tables: Changes to the tables in a database by privileged account users are security events. If
such a user goes on to manipulate multiple tables, it is a security incident.
• Changes to user privileges: When a user's privileges are elevated to access database resources, it is a security event.
This becomes a security incident if the user with recently elevated privileges tries to change the privileges of other
users by adding or removing members in the database administrators security group.
• Accessing or extracting sensitive data: Employee biometric information, customer records, and transaction details
are examples of sensitive enterprise information. If a user tries to extract such information from the database, it is a
security incident.
Endpoints
Endpoints such as laptops and desktops generate a huge amount of security events in a single day. Some of the
common security events that you need to monitor from endpoints are:
• Failed login attempts: If a user logs in to their device after repeated failed attempts, it is a security event. If such an
event is followed by the user trying to escalate their privileges, it is a security incident.
• Unauthorized software installations: Downloading and installing unauthorized software on a device is a security
event. If such an application harms the functioning of other applications and causes the device to malfunction, it is
termed a security incident.
Security incidents
A security incident is a security event that damages network resources or data as part of an attack or security threat.
An incident doesn’t always cause direct damage, but it still puts the enterprise's security at risk. For example, a user
clicking on a link in a spam email is a security incident. This incident doesn't directly cause any damage, but it could
install malware that causes a ransomware attack.
Some of the security incidents that you should be monitoring in your network include:
• Traffic from known malicious IP addresses: Several IP addresses are identified as malicious because of suspected
notorious activities carried out through them. The information about malicious IP addresses is called threat
information or a threat feed. To track down traffic from malicious sources, you should configure your security
solution, such as a SIEM tool, to correlate data between these dynamically updated threat feeds and your network
traffic information. If such an IP address is attempting to access the network, your SIEM solution can detect the
attempt and take counteraction immediately.
• Suspicious malware installations on endpoints: Millions of malicious emails with genuine-looking attachments are
sent to people every day. If such an attachment is opened by an unsuspecting user, this might lead to malware being
installed on the device. The attacker may extract sensitive information stored on the user's device through the
malware or gain entry into the enterprise's network resources, either of which make this a security incident.
• Unknown login attempts: Companies use VPN services to help remote users connect to the organization's network.
If a hacker manages to crack the credentials of a remote user, they can enter the network and launch a full-scale
cyberattack. If a user reports that their credentials have been compromised and that they had not logged in to the
network recently, this is a serious security incident requiring rapid response from the IT administrator.
• Privilege escalations: Once an attacker has gained access to the enterprise's network, they can cause only limited
damage by masquerading as the user they impersonate. So, their next step is often privilege escalation. Privilege
escalation allows the attacker to gain more access and, therefore, better control over the network.
• Unauthorized changes to configurations of critical devices: An unauthorized attempt to make changes to critical
services such as firewalls indicates a possible attack on the network, so it’s logged as a security incident.
• Malware infection through removable media: Plugging removable media, such as USB drives and hard drives, into a
workstation can be harmful if the external device contains malware. If an antivirus system detects an external device
containing malware, a security incident is logged.
• Data manipulation in databases: If the data present in an enterprise’s databases is deleted or modified by an
unauthorized user, it is termed a security breach, and the IT administrator must take immediate action to prevent
further damage to the enterprise's network.
Self-check questions
I. Choose the Best Answer by Circling (2pts each).
1. When hackers looks or steal your electronic or paper files with out permission, it is said to be:
A. Back door Attacks
B. Snooping attacks
C. Spoofing Attacks
D. Packet Sniffing attack
2. _______is used to verify the claimed identity of a user, client, and server from illegal individuals.
A. Authorization
B. Encryption
C. Decryption
D. Authentication
3. Before the problem of data security became widely known, most people’s idea of computer security focused
on:
A. Information/data
B. Software
C. Hardware
D. Telecommunications
4. The absence of one of the CIA leads mores to denial of service (DOS).
A. confidentiality
B. availability
C. integrity
D. none
5. When hackers looks or steal your electronic or paper files with out permission, it is said to be:
E. Back door Attacks
F. Snooping attacks
G. Spoofing Attacks
H. Packet Sniffing attack
6. _______is used to verify the claimed identity of a user, client, and server from illegal individuals.
E. Authorization
F. Encryption
G. Decryption
H. Authentication
7. Before the problem of data security became widely known, most people’s idea of computer security focused
on:
E. Information/data
F. Software
G. Hardware
H. Telecommunications
8. The absence of one of the CIA leads mores to denial of service (DOS).
E. confidentiality
F. availability
G. integrity
H. none
II. Answer the following question accordingly
1. Differentiate between computer threat and computer risk.
2 Discuss the three CIAs in detail. What are the risks and solution mechanisms to CIA security?
3 Give at least two examples to show how social engineering matters on information security.
4 Compare and contrast between brute force attack and dictionary attack.
5 Differentiate between computer threat and computer risk.(2pts)
6 Discuss the three CIAs in detail. What are the risks and solution mechanisms to CIA security? (4pts)
7 Give at least two examples to show how social engineering matters on information security.(2pts)
Reference
[1] Routing and Switching Essentials Companion Guide Cisco Networking Academy
[2] Connecting Networks V6 Companion Guide (Cisco Networking Academy)
[3] Switching, Routing, and Wireless Essentials V7. 0 (SRWE) Companion Guide (Cisco Networking Academy)
[4] Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)