Introduction to Computer Networks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In the context of computer networks, what does the term 'computer network' refer to?

  • A single computer with multiple functions.
  • A collection of autonomous computers interconnected by a single technology. (correct)
  • A group of computers connected via copper wire only.
  • A network that only uses fiber optics for communication.

Which of the following is NOT a typical medium used for connecting computers in a network?

  • Fiber optics
  • Smoke signals (correct)
  • Microwaves
  • Copper wire

What is the primary advantage of resource sharing in a business computer network?

  • Reducing the number of computers needed.
  • Making all programs, equipment, and data available to anyone on the network regardless of physical location. (correct)
  • Isolating each computer to prevent information leaks.
  • Limiting data access to a select few.

In the client-server model, what is the role of the 'client'?

<p>To request information or services from another device. (A)</p> Signup and view all the answers

What is a key characteristic of a peer-to-peer (P2P) network?

<p>Each connected device can act as both a client and a server. (B)</p> Signup and view all the answers

Which of the following activities is commonly associated with mobile users on computer networks?

<p>Reading and sending email, surfing the web, and playing games from various locations. (B)</p> Signup and view all the answers

What benefit do wireless networks provide to businesses with fleets of vehicles, such as trucks and taxis?

<p>They help in keeping in contact with their home base. (A)</p> Signup and view all the answers

What is 'm-commerce' primarily used for in the context of mobile phones?

<p>Authorizing payments for small items via short text messages. (D)</p> Signup and view all the answers

What is the function of 'sensor networks'?

<p>To gather and wirelessly relay information about the physical world. (C)</p> Signup and view all the answers

What is 'distributed processing' in the context of computer networks?

<p>Dividing a task among multiple computers. (D)</p> Signup and view all the answers

What is the role of protocols in a network?

<p>To govern how devices communicate with each other. (D)</p> Signup and view all the answers

What is the primary function of the OSI model?

<p>To provide a networking framework for implementing protocols in layers. (C)</p> Signup and view all the answers

Which layer of the OSI model is responsible for converting bits into physical signals suitable for transmission?

<p>Physical Layer (D)</p> Signup and view all the answers

What function does the Data Link layer perform in the OSI model?

<p>Managing physical addressing and packaging bits into data frames. (C)</p> Signup and view all the answers

Which layer adds the concept of routing to network communications?

<p>Network Layer (A)</p> Signup and view all the answers

Which of the following is the main function of the Transport Layer in the OSI model?

<p>Delivering data across network connections with error recovery and flow control. (B)</p> Signup and view all the answers

What is the primary role of the Session Layer in the OSI model?

<p>To manage the sequence and flow of events that initiate and tear down network connections. (A)</p> Signup and view all the answers

What is the main function of the Presentation Layer in the OSI model?

<p>Handling syntax processing of message data, such as format conversions and encryption/decryption. (A)</p> Signup and view all the answers

Which layer of the OSI model provides network services to end-user applications?

<p>Application Layer (D)</p> Signup and view all the answers

What are the three key objectives at the heart of computer security?

<p>Confidentiality, integrity, and availability (B)</p> Signup and view all the answers

What does 'data confidentiality' ensure?

<p>Data is protected from unauthorized access or disclosure. (D)</p> Signup and view all the answers

What does 'system integrity' refer to?

<p>A system performing its intended function without unauthorized manipulation. (D)</p> Signup and view all the answers

What is the purpose of 'security mechanisms' in the OSI security architecture?

<p>To detect, prevent, or recover from security attacks. (A)</p> Signup and view all the answers

What characterizes a 'passive attack'?

<p>It attempts to learn or make use of information without affecting system resources. (A)</p> Signup and view all the answers

What is a 'masquerade' attack in the context of network security?

<p>Pretending to be a different entity. (A)</p> Signup and view all the answers

Flashcards

Computer Network

A collection of autonomous computers interconnected by a single technology, enabling them to exchange information.

Resource Sharing

The practice of sharing programs, equipment, and data across a network, making them accessible to anyone regardless of physical location.

Client-Server Model

A model where one device (client) requests information from another device (server), which responds to the request.

Peer-to-Peer Network

A network where connected devices can share resources without a dedicated server, functioning as both client and server.

Signup and view all the flashcards

Network

Devices connected by communication links, enabling them to send and receive data.

Signup and view all the flashcards

Distributed Processing

Distributing a task among multiple computers in a network, rather than relying on a single machine.

Signup and view all the flashcards

Main components of computer network

Devices, medium, rules, and messages

Signup and view all the flashcards

Protocols

The rules that govern how networked devices communicate with each other.

Signup and view all the flashcards

TCP/IP (Transmission Control Protocol/Internet Protocol)

Standard suite of protocols that is the industry standard

Signup and view all the flashcards

Network Components

Internet, intranet, and extranet applications, network components are being exposed more and more seriously to malicious

Signup and view all the flashcards

Computer Network

A set of connected computers that can share resources.

Signup and view all the flashcards

OSI Model

A networking framework that implements protocols in layers, dividing network architecture into 7 layers for teaching.

Signup and view all the flashcards

Physical Layer (Layer 1)

Defines the physical connection between a host and a network, converting bits into physical signals.

Signup and view all the flashcards

Data Link Layer

The layer that checks for transmission errors and packages bits into data frames, managing physical addressing such as MAC addresses.

Signup and view all the flashcards

Network Layer

Adds routing above the Data Link layer, examining source and destination addresses to determine if data has reached its final destination.

Signup and view all the flashcards

Transport Layer

Delivers data across network connections and different protocols supporting a range of capabilities.

Signup and view all the flashcards

Session Layer

Manages the sequence and flow of events

Signup and view all the flashcards

Presentation Layer

Handles syntax processing of message data

Signup and view all the flashcards

Application Layer

Supplies network services to end-user applications, using protocols that work with user's data.

Signup and view all the flashcards

Computer Security

Security goals: integrity, availability, and confidentiality

Signup and view all the flashcards

Data Confidentiality

Assures that private information is not made available or disclosed to unauthorized users.

Signup and view all the flashcards

Data Integrity

Assures that data/programs are changed only in authorized ways.

Signup and view all the flashcards

Authenticity

The property of being genuine and being able to be verified

Signup and view all the flashcards

Accountability

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

Signup and view all the flashcards

Security service

These services are intended to counter security attacks.

Signup and view all the flashcards

Study Notes

  • The unit aims to provide an in-depth understanding of network and security issues and teach students to use available tools for detecting, responding to, and recovering from security incidents.

Introduction to Computer Networks

  • Computer networks are defined as collections of autonomous computers interconnected by a single technology, enabling information exchange through various methods like copper wire, fiber optics, microwaves, infrared, and communication satellites.
  • Networks vary in size and shape, often connecting to form larger networks, with the Internet being a prime example of a network of networks.
  • The lecture will cover the uses of computer networks, their key components, classification, software, and reference models.

Uses of Computer Networks

  • Interacting with others is a fundamental human need, nearly as vital as sustaining life, making communication highly important.
  • Communication methods continually evolve, extending beyond face-to-face conversations with breakthroughs like the printing press and television enhancing communication.
  • Early data networks were confined to exchanging character-based information; today's networks support diverse data types across various devices.

Business Applications

  • Businesses utilize numerous computers for tasks like product design, brochure creation, and payroll management.
  • Connecting these computers enables information distribution across the company, facilitating resource sharing regardless of physical location
  • A company's information system is conceptualized as databases accessed remotely by employees via servers.
  • Centrally housed servers maintained by system administrators store data, which employees access through client machines for tasks like constructing spreadsheets.
  • In the client/server model, the client requests information, and the server responds, connected through a network.
  • A prevalent example is a web application where the server dynamically generates web pages from a database based on client requests.
  • Client-server models are suitable whether clients and servers are in the same building or geographically distant.
  • The detailed client-server model involves processes on both client and server machines, with the client sending a message and awaiting a reply.

Home Applications

  • Internet access enables home users to connect remotely for accessing information, communicating, and e-commerce.
  • Remote access includes web surfing for both informational and recreational purposes, covering diverse topics.
  • While much is accessed via the client-server model, peer-to-peer communication presents an alternative information access method.
  • Peer-to-peer networks allow resource sharing without a dedicated server; each connected device can act as both client and server.
  • In peer-to-peer networks, any member can communicate with others, lacking a strict client-server division.
  • Peer-to-peer networks decentralize resources; instead of relying on dedicated servers, information resides on connected devices.
  • P2P networks typically lack centralized user accounts, which complicates security and access policy enforcement, requiring individual configuration on each device.

Mobile Users

  • Mobile computers are a fast-growing sector surpassing desktop sales, enabling users to perform tasks like emailing, streaming, gaming, and web browsing from anywhere.
  • Connectivity to the Internet drives mobile usage, with wireless networks like cellular and 802.11 hotspots providing essential access.
  • Wireless networks benefit transportation, military, and service industries by maintaining contact with bases.
  • The convergence of phones and the Internet has led to smartphones, which offer both mobile phone and computer capabilities.
  • Modern phones support fast data via 3G/4G networks, handling calls and internet use while automatically switching between networks for optimal service.
  • Mobile phones use GPS for location-dependent services like maps, directions, and local searches.
  • Mobile commerce (m-commerce) has emerged, using text messages for payment authorization.
  • Sensor networks consist of wirelessly connected nodes gathering and relaying environmental data, integrated into items like cars to collect data on location, speed, and efficiency.

Social Issues

  • Computer networks enable widespread content distribution, mirroring the impact of the printing press but introducing social, political, and ethical challenges.
  • Online platforms allow individuals to share views, but issues like copyright, cookies, and spam can arise.

Networks

  • A network comprises devices (nodes) connected by communication links, where nodes can be computers, printers, or any device capable of data exchange.
  • Networks employ distributed processing by dividing tasks among multiple computers, where separate machines handle subsets of a process instead of one large machine managing all aspects.

The Elements of Computer Network

  • Common networking devices are represented by icons in this graphically oriented subject.
  • Devices originate messages and include computers and IP phones typically connected by LAN media.
  • Intermediate devices direct and manage messages across the network, with common symbols representing switches, firewalls, and routers.
  • Key networking symbols:
    • Switch for interconnecting local area networks.
    • Firewall for network security.
    • Router for directional message across networks.
    • Wireless Router for home networks.
    • Cloud for a group of networking devices.
    • Serial Link for WAN interconnection.
  • Devices need interconnection, either wired or wireless. Wired connects with copper or fiber optics; wireless utilizes the atmosphere.
  • Industry standard TCP/IP governs how networked devices communicate using rules and protocols.

Introduction to Network Security

  • Enterprise networks are vulnerable to malicious activities and unintentional breaches with the expansion of internet, intranet, and extranet applications.
  • Computer networks are sets of connected computers (nodes) sharing resources via cabling or wireless connections.
  • The OSI model is used to understand network workings.

Open Systems Interconnection (OSI) Model

  • The OSI model is defines a networking framework that uses a layered approach, used as a teaching tool, and logically divides network structure in 7 layers
  • Lower layers handle electrical signals and data routing; higher layers manage requests, responses, data representation, and network protocols.
  • The OSI model acts as a standard architecture for network systems.

Physical Layer (Layer 1)

  • Defines the physical host to network connection and convert bits to physical signaling.
  • Device drivers for communication hardware function at this layer.
  • Hubs and repeaters are standard network devices and cable connectors.
  • When obtaining data from the Physical layer, the Data Link layer checks for physical transmission errors and packages bits in data "frames".
  • The Data Link layer also manages physical addressing schemes, such as MAC addresses for Ethernet networks, controlling access of any various network devices to the physical medium.
  • The "Media Access Control" sub layer and the "Logical Link Control" sub layer make up the Data Link layer.

Network Layer

  • The Network layer uses routing the above the Data Link Layer.
  • When data arrives; examines source and destination addresses to determine if the destination is reached.
  • Otherwise the network layer updates the destination before moving to lower layers.
  • Logical addresses are maintained for routing and are mapped with physical ones.
  • Address Resolution Protocol (ARP) is accomplished through IP networking.

Transport Layer

  • Transfers data across network connections.
  • TCP and UDP are transport layer 4 network protocol examples.
  • Capabilities like error recovery, flow control, and re-transmission are supported by other transport protocols.

Session Layer

  • Manages the order and flow of events of tearing down and initiating network connections at Layer 5.
  • Supports multiple connection types dynamically.

Presentation Layer

  • In the OSI model, it converts syntax, processes message data by conversion and encryption needed by the application layer, at Level 6

Application Layer

  • Supplies network services to end-user applications.
  • Protocols operate with user data
  • HTTP packages data for sending and receiving web content.

Computer Security

  • Computer security preserves data integrity, availability, and confidentiality in information systems.
  • This definition introduces three key objectives that are at the heart of (goals of) computer security:
    • Confidentiality to private or confidential information is not made available or disclosed to unauthorized individuals.
    • Privacy assurances include personal data being collected, stored, and shared to who and why.
    • Integrity - Data and systems performing intended functions in specified and authorized manners unimpaired from free or deliberate unauthorized manipulation.
    • Availability - systems work promptly, and service is not denied to those authorized.
  • The CIA triad model gives policies for information security within an organization. These include confidentiality, integrity and availability.
  • Additional concepts are needed to complete the image, although the CIA Triad model is well established.

Additional Computer Security Definitions

  • Authenticity: Property of being genuine, verified, and trusted; inspires confidence in validity which each input originated from.
  • Accountability: Generates security which traces actions to an entity and enables nonrepudiation, deterrence, intrusion detection, and legal action.

Security Architecture for OSI

  • ITU's X.800 recommendation defines OSI security architecture useful for providing security.
  • Computer and communications vendors developed security features for their products and services related to structured definition and mechanisms due to it being developed as an international standard
  • The OSI security architecture focuses on security attacks, mechanisms, and services.
    • Security attack - compromises the security through any action of owned information
    • Security Mechanism - a process that is designed to detect, prevent, or recover from a security attack
    • Security Service - enhance the security of the data processing systems and the information transfers of an organization.
    • Threat - A potential for violation of security circumstance, capability, action, or event that could cause harm.
    • Attack - Assault on system security, that is an intelligent act that is a deliberate attempt evade security services.

Security Attacks

  • X.800 classifies security attacks as passive or active.
  • Passive attacks aims learn or make use of information from the system but does not affect system resources
  • Active Attacks - alter system resources or affect the operation.

Passive Attacks

  • Consists of eavesdropping on communications to obtain underlying transmitted information that are difficult to detect.
  • Release message of Contents can contain electronic mail, sensitive information, which allows to prevent learning the contents.
  • Traffic analysis uses encryption contents where if captured cannot extract data, however pattern can be seen from location, identity and the observation of messages. This information can guess the nature of the communications.

Active Attacks

  • Involve the creation of a false stream or modification of the data stream and can be subdivided into four categories.
  • Masquerade - pretending to perform entity.
  • Replay - passively capture results in a data unit.
  • Modification of messages - Altering legitimate messages that delays the orders of things
  • Denial of service facilities - prevents normal use or communication management which is difficult due to potential vulnerabilities.

Achieving Network Security

  • ITU X.800 security architecture provides protocols to achieve methods in network security.
  • Includes Encipherments which converts data into a secret form using symmetric/asymmetric keys.
  • Digital Signatures are electronic versions used provide authentication of data/data origin integrity, and nonrepudiation services
  • Access Control: Used for determine/enforce entity through identification/authentication rights, which may use privileges and firewalls.
  • Authentication: These mechanisms provide identification of a principle by cryptographic and password techniques.
  • Traffic Padding: Provides protection from traffic analysis - several networks include padding to protect the communication.
  • Routing Control - allows one to select a route for data dynamically/statically, especially from malicious exploits.

Network Security Attacks

  • Common Vulnerability involves both wireless and wired networks through "unauthorized access".
  • Wireless networks are less secure due to easy access:
    • Sniffing - Steal packet data to gain valuable information
    • DOS (Denial of Service): flooding with medium spurious packets for legitimate users.
    • Spoofing - claiming identities to steal data for unauthorized hosts and launch man in the middle attacks.
    • Eavesdropping - Unauthorized interaction is disclosed/exchanged through network communications.
    • Logon Abuse - successful attacks uses user authentication and gets access/control mechanism and gains more privileged accesses and control.
    • Intrusion Attack - Attack targets gained access of unauthorizes to the network.
    • Hijacking Attacks - Attack tempts system access using someone else's existing connection.
    • Application Attacks - Exploit weaknesses of the application layer by injecting remote command execution structure into queries.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser