+ All Categories
Home > Education > Computer Networking basics

Computer Networking basics

Date post: 18-Jul-2015
Category:
Upload: akhil-kaushik
View: 202 times
Download: 0 times
Share this document with a friend
Popular Tags:
58
By: Akhil Kaushik Assistant professor, CSE Deptt
Transcript

By: Akhil KaushikAssistant professor, CSE Deptt

Email stands for Electronic Mail

Email is very quicker than snail mail

It is basically an informal mail formats most popular over the internet

Ex: Yahoo, Gmail, Rediff, Hotmail, etc

3Akhil Kaushik

As Email is an informal method of communication, a lot of abbreviations & slangs are used

Ex: LOL = Lots Of Laughter IMHO = In My Humble Opinion BRB = Be Right Back BTW = By The Way

4Akhil Kaushik

Smiley Meaning Smiley Meaning:- ) I’m happy =):- ) Uncle Sam:- ( I’m sad ;- ) I’m winking: - ( o ) I’m yelling : + ) Big nose:- )) Double chin :- {) Mustache8 - ) Wears Glass C : -) Large brain

5Akhil Kaushik

Sending a message to many people was inconvenient

Message had no internal structure

Sender never knew if a mail was delivered

Forwarding emails was not easy

Hard to create & send mails containing a mixture of text, drawings, facsimile & voice

6Akhil Kaushik

Mailboxes: to store & manage incoming email Mailing List : a list of email addresses Carbon copies: cc Blind carbon copies: bcc High-priority emails Encrypted emails Alternative recipient if original sender is not

available Ability to read boss’s email if he is away

7Akhil Kaushik

Email normally consists of:1. User Agent: which allow people to read and

send email- Local programs, interface b/w user & email

system

2. Message Transfer Agent: which move the message from source to destination - Daemons, runs at the background

8Akhil Kaushik

Composition: process of creating emails

Transfer: moving emails from sender to receiver, also establish connection

Reporting: tell the sender what hap to email

Displaying: incoming emails so users can read it

Disposit ion: what user does after receiving email

9Akhil Kaushik

1. Internet Message Access Protocol (IMAP):It is a standard protocol for accessing email from local server. (Port no-143)

It is a client/server based protocol in which email is received and held for us by the mail server

We don’t need to transfer files on local pc from mail server every time

Akhil Kaushik 10

2. Post Office Protocol (POP):POP provides a simple, standardized

way for users to access mailboxes and download messages to their computers (Port no-110)

In POP, all the messages will be downloaded to the local pc from the mail server

Thus after messages have been downloaded, internet connection can be terminated

Akhil Kaushik 11

3. Simple Mail Transfer Protocol (SMTP):SMTP is used by Mail Transfer

Agent(MTA) to deliver our email to recipient’s mail server.

(Port no-25)

SMTP is used only for sending emails, not for receiving them

SMTP also works on the client server basis

Akhil Kaushik 12

WWW is an architectural framework for accessing documents which are spread out over a no. of machines over internet

It a web of pages of information which is spread around the world

People have become aware of power of internet thru’ WWW

Akhil Kaushik 14

It began in 1989 at CERN, the European center for nuclear research

It was designed to get collaboration of scientists from across the globe

It provides info to user on every subject It is basically a client server architecture The web pages are written in HTML or Java It also supports hypermedia i.e. hypertext pages

with audio, video or animation

Akhil Kaushik 15

WWW is a collection of standard protocols or instructions, sent back & forth over internet to gain access to information

Internet is a network of networks – a more physical entity

Akhil Kaushik 16

Client looks at web as vast world wide collection of documents called pages

Links: Each page may contain links or pointers to related pages anywhere in world

Hypertext: Pages which point to other pages

Browser: Interface used for viewing pages. It fetches requested page and displays them

Akhil Kaushik 17

Every website has a server process

It is listening to port 80 on which incoming clients (browsers) are connected

Once connection is established, client sends a request and server replies for that

The protocol used for defining legal request and replies in HTTP

Akhil Kaushik 18

URL has 3 parts:1. Name of protocol (ex: html)2. Name of machine where page is located3. Name of file containing page

Ex: http://wwww4.org/www/project.html http-name of protocol

wwww4.org – name of machine www/project.html – name of file

Akhil Kaushik 19

Browser determine the URL Browser asks DNS for IP address of URL Browser establishes a TCP connection to port 80

on m/c with the resolved IP address Browser then sends a command for file The specified m/c sends the requested file TCP connection is released Browser displays all text in the file Browser establishes a new TCP connection to

port 80 to fetch and display every images

Akhil Kaushik 20

Akhil Kaushik 21

Multimedia means combination of 2 or more continuous media

Media components maybe:1. Text2. Images or Graphics3. Animation4. Sound5. Video

Akhil Kaushik 22

Multimedia applications are classified into two types:

1. Based on timing considerations (Delay Sensitive)

2. Based on data loss tolerance (Loss Tolerant)

Akhil Kaushik 23

Multimedia applications are categorized into three classes:

1. Streaming stored audio/ video: Ex- Stored audio songs, famous lectures, etc

2. Streaming l ive audio/ video: Ex- Internet radio, Cricket match broadcast

3. Interactive audio/ video: Ex- Internet teleconferencing and internet telephony

Akhil Kaushik 24

Expectations of multimedia from internet are:-

1. Real time characteristics2. High bandwidth3. Multicasting support4. Error characteristics of medium5. Security6. Mobility7. Session individually

Akhil Kaushik 25

“Searching the internet requires part ski l ls, part luck & l i t t le bit of art ”

Search engine is a software program that searches for sites based on words that you designate as search terms

Search engines look thru’ their own database of info to find what you are looking for

Search engines don’t search the entire web page, thus they make overlook the info

Akhil Kaushik 27

Search engines automatically create web site listings by using spiders that crawl “web pages”, index their info and optimally follows that site’s links to other pages

Spiders return to already crawled websites looking for updates or changes

Ex: Google, Altavista, Yahoo, AOL, MSN, etc

Akhil Kaushik 28

It is a search tool that sends user requests to several other search engines and/or databases and aggregates the result into a single list or displays them according to their source

It enable users to enter search criteria once & access several search engines simultaneously

It has a virtual database to compile the result

Akhil Kaushik 29

Akhil Kaushik 30

E-com stands for electronic commerce

E-com refers to all commerce transactions conducted over the internet

E-com includes online banking, investing, bill paying, buying & selling online

Ex: e-bay, paying phone bill by credit card

Akhil Kaushik 31

E-com grew b/w 1993 & 2000 and influenced the mainstream business

To a customer, most popular use of e-com is showing online catalogue, selecting items online & paying it electronically i.e. retail purchase

E-com become feasible when browsers included a security feature for transactions

Akhil Kaushik 32

Credit cards are convenient for making large purchases, but they incur overhead as user have to enter credit card details

Many groups have proposed an alternative known as digital money or digital cash, which is electronically equivalent of cash that people carry with them to make small purchases & have less overhead

Akhil Kaushik 33

An easy way to understand digital cash is in form of debit card

A person begins with electronic visit to bank to authorize a withdrawal from their bank account and place the money in digital wallet

Bank returns the wallet, which users store on their pc and specify them to make electronic payment

Akhil Kaushik 34

Whenever user sends data online, there are 2 possibilities:

1. Automated security: It requires encryption i.e. browser automatically encrypts the message before sending it

2. Warning: If the browser doesn’t have specified secure transfer, it issues a warning. Then, it depends on user to send data or not

Akhil Kaushik 35

The most widely used technology is Secure Socket Layer

When the browser encrypts info, process is entirely hidden from the user

A user must look at security icon displayed by browser (picture of padlock either locked or unlocked) to check if encryption is used

Akhil Kaushik 36

Here, 2 different keys are used for encryption & decryption

Before encryption, browser must obtain app. Encryption key of server and must verify authenticity of both server & key

All steps are automatically done by the browser w/o bothering the user

Akhil Kaushik 37

It is a mechanism for authentication

It allows a receiver to know who sent a given electronic document in the same way as conventional signature

It is created by encrypting info about document using the sender’s private key

Akhil Kaushik 38

Digital signature is different from digit ized signature, which is merely a scanned version of conventional signature

Another difference b/w digital signature & digitized signature is that digital signature can’t be duplicated

Akhil Kaushik 39

It refers to the structured transmission of data b/w organizations by electronic means

It is used to transfer electronic documents from one pc to another, i.e. from one trading partner to another trading partner

It is more than emails and is normally not used for monetary transactions

Akhil Kaushik 40

EDI implies a sequence of strictly formatted messages between two parties

In EDI, the usual processing of received messages is by computer only

Human intervention in the processing of a received message is typically intended only for error conditions, for quality review, and for special situations

Akhil Kaushik 41

As electronic data & financial data can be crucial for a company, security is a major aspect for network

Organizations face a lot of threat to security of their info on the n/w, like:

1. Data may be stolen, misused or altered2. Attack on hardware 3. Crash the systems, etc

Akhil Kaushik 43

Confidential i ty : Data is kept private

Authenticity: Verifying the identity of communicating party

Authority: Data only for authorized users

Integrity: Data is not altered

Availabil i ty: Data is available when required

Akhil Kaushik 44

a) Physical Security Threatb) Software Security Threatc) Inconsistent Usage Threat (Passwords)d) Denial of service attacke) Virus, worms & Trojan horsesf) Data diddling & data destructiong) Unauthorized Access

- Hacking- Shoulder surfing- Spoofing

Akhil Kaushik 45

Cryptography word is derived from the Greek word kruptos, meaning hidden

The art and science of keeping messages secure by altering or transforming them

It provides privacy, authorization & authentication

It avoids eavesdropping & data diddling

Akhil Kaushik 46

Plaintext - Text that is in readable form Cipher text - Results from plaintext by applying

the encryption key Encryption - Process of converting plain text into

cipher text. Decryption - Process of converting cipher text

back to plain text. Key - Rules used to convert a plain text into

cipher text.

Akhil Kaushik 47

Also known as “Private Key Encryption”

In this cryptography, the same key is used for encryption & decryption

Ex: 1. DES (Data Encryption Standard), 2. AES (Advanced Encryption Standard)

The prevalent issue here is the distribution of the secret key to the receiver

Akhil Kaushik 48

Akhil Kaushik 49

Also known as “Public Key Encryption”.

In this cryptography, different keys are used for encryption & decryption at both ends

Example: 1. RSA (Rivest Shamir Adleman) 2. Diffie-Hellman Algorithm

The primary concern here is the complexity of the encryption & decryption process

Akhil Kaushik 50

Akhil Kaushik 51

Firewall is a software/ hardware which enforces an access control policy b/w an internal n/w in an organization & internet

It can also be used b/w 2 parts of same internal n/w

A firewall blocks some traffic & permits some, based on policy specified

Akhil Kaushik 53

It can’t protect against attacks that don’t go thru’ firewall

It can’t protect against traitors or idiots inside the n/w

It can’t protect against bad things being allowed thru’ them. Ex: Trojan horse use IRC protocol

Akhil Kaushik 54

Application/ Proxy Gateways: First firewall

Considered most secure

Slowest of all

They run a special s/w called “proxy server”, that runs on Application layer of OSI model

Akhil Kaushik 55

Packet Filtering: Here, routers have ACLs turned on Every data packet must pass thru’ firewall and

access lists

Circuits Gateways: Least used & least secured firewall as it do not

check data in the packet It used to make LAN invisible behind it

Akhil Kaushik 56

Stateful packet Inspection: It checks contents of packet to know type of

communication More rigorous in packet inspections

Internet Connection Firewall: ICF is used by Windows XP It means ports on firewall are checked It prevents hackers to from scanning the pc

Akhil Kaushik 57

Akhil Kaushik 58


Recommended