6 Networking Part2

download 6 Networking Part2

of 69

Transcript of 6 Networking Part2

  • 8/2/2019 6 Networking Part2

    1/69

    Computer Networking Part 2

    andInternet Safe Suring

    CS 1

    Rick Graziani

    Cabrillo College

    Spring 2006

  • 8/2/2019 6 Networking Part2

    2/69

    Rick Graziani [email protected] 2

    Review

    Network LANs IP Configuration Internet

    TCP/IP DSL/Cable Modem with a Router

  • 8/2/2019 6 Networking Part2

    3/69

    Rick Graziani [email protected] 3

    What is a network?

    A computer network is a series of computers and other devicesinterconnected by communication paths.

    Computer networks include: LANs and WANshttp://www.albany.edu

  • 8/2/2019 6 Networking Part2

    4/69

    Rick Graziani [email protected] 4

    LAN Local Area Network

    A LAN: Operates within a limited geographical area

    Controlled by local administration

    Allows local users to:

    Share printers

    Access local file servers with software and data

    Access the Internet

  • 8/2/2019 6 Networking Part2

    5/69

    Rick Graziani [email protected] 5

    Creating an Ethernet Network

    To start, your computer must have an Ethernet Network Interface Card (NIC).

    Ethernet NICs have an RJ-45 interface or port. Hubs and Switches are used to connect computers, printers and other devicesin the Ethernet LAN.

    Ethernet cables, i.e. Cat-5 or Cat-6 cables (Category 5, Category 6) are usedto connect computers to the hubs and switches.

    Cat-5 cable connects computer NIC to hub or switch.

  • 8/2/2019 6 Networking Part2

    6/69

    Rick Graziani [email protected] 6

    IP Configuration

    To communicate with other computerson your network you need to properlyconfigure:

    IP Address (of your computer)

    Subnet Mask (of your computer)

    To communicate with computersoutside your network you need toproperly configure:

    Default Gateway IP Address

    To be able to use domain names, like

    www.cabrillo.edu, instead of IPaddresses you need to properlyconfigure:

    DNS (Domain Name System)Server IP Address

  • 8/2/2019 6 Networking Part2

    7/69Rick Graziani [email protected] 7

    IP Configuration: Default Gateway

    Any information that needs to be sent to IP Addresses outside your

    network is sent to the Default Gateway or Router.

    To the Internet192.168.1.10

    192.168.1.1

  • 8/2/2019 6 Networking Part2

    8/69Rick Graziani [email protected] 8

    IP Configuration: DNS

    Hey, 207.62.87.54, what is the IPAddress for www.yahoo.com?

    It is 66.94.230.47

    YahooWebServer

    Hey, 66.94.230.47,please send me yourweb page.

    Here, 192.168.1.10,here is my web page.

  • 8/2/2019 6 Networking Part2

    9/69Rick Graziani [email protected] 9

    Setting the IP Configuration Information

    IP information can be configured: Statically

    Dynamically

    Using a DHCP (Dynamic Host Configuration

    Protocol) Server

  • 8/2/2019 6 Networking Part2

    10/69Rick Graziani [email protected] 10

    IP Configuration: Dynamic Configuration

    Im booting up, if there is a DHCP

    Server out there, I need my IPConfiguration Information!

    DHCPServer

    Here is your IPAddress, SubnetMask, IP Address for

    the Default Gateway(router), and IPAddress for the DNSServer!

    Wh i h

  • 8/2/2019 6 Networking Part2

    11/69Rick Graziani [email protected] 11

    What is theInternet?

    The Internet was originally designed by DARPA (DefenseAdvanced Research Projects Agency) in response to the

    U.S.S.R. launching Sputnik, the first satellite. Out of this came the Internet, a way for computers to

    communicate from different parts of the world.

    These computers can be any type of computer using anytype of operating system, as long as they are using theprotocol TCP/IP.

  • 8/2/2019 6 Networking Part2

    12/69Rick Graziani [email protected] 12

    What is TCP/IP? What is a protocol?

    A protocol is nothing more than an agreement or rules togovern a way of communicating.

    The sender and receiver, and everyone in between, must

    agree on the rules, the protocol.

    The actual letter(data) is inside(encapsulated)the envelope.

  • 8/2/2019 6 Networking Part2

    13/69Rick Graziani [email protected] 13

    What is TCP/IP? What is a protocol?

    Protocol: An agreed form of communications.

  • 8/2/2019 6 Networking Part2

    14/69Rick Graziani [email protected] 14

    YahooWeb

    Server

    Source IP Address:192.168.1.10

    Destination IP Address:

    66.94.230.47

    Destination IP Address:192.168.1.10

    Source IP Address:66.94.230.47

    192.168.1.10 66.94.230.47

    Inside envelope:Request for webpage

    Inside envelope:Web page

  • 8/2/2019 6 Networking Part2

    15/69Rick Graziani [email protected] 15

    DSL or Cable Modem: No Router

    204.180.205.1Public Address

    Hacker can only get to publicaddress and not private address

    DSL or CableModem

    Routers can help protect your DSL or Cable ModemNetwork.

  • 8/2/2019 6 Networking Part2

    16/69Rick Graziani [email protected] 16

    When using NAT (Network

    Address Translation, theRouter helps hide yournetwork from attackers.

    204.180.205.1

    Public Address

    192.168.1.10Private Address

    Hackers can only get to public

    addresses and not private addresses

    DSL or Cable Modem: With a Router

    Internet

  • 8/2/2019 6 Networking Part2

    17/69Rick Graziani [email protected] 17

    Bandwidth

    Bandwidth - The amount of information that can flow through anetwork connection in a given period of time.

    Usually measured in bits per second (bps) bps: bits per second

    Kbps: thousands of bits per second

    Mbps: millions of bits per second

  • 8/2/2019 6 Networking Part2

    18/69Rick Graziani [email protected] 18

    Networking Part 2

    Circuit Switching versus Packet Switching Wireless Careers in Information Technology

  • 8/2/2019 6 Networking Part2

    19/69Rick Graziani [email protected] 19

    WAN Link Options

  • 8/2/2019 6 Networking Part2

    20/69Rick Graziani [email protected] 20

    Circuit Switched

    Circuit Switching: A form of data communication which establishes a

    single connection or circuit between source and destination to carry thedata stream.

    Like a conventional telephone system. When a subscriber makes a telephone call the dialed number is used

    to set switches in the exchanges along the route of the call so thatthere is a continuous circuit from the originating caller to that of thecalled party.

  • 8/2/2019 6 Networking Part2

    21/69Rick Graziani [email protected] 21

    Packet Switching

    Frame Relay,X.25, ATM

    Packet Switching: A form of data communications which breaksa data stream into small sections, sends them separately by thebest available channels and reassembles the original datastream at its destination.

    An alternative is to allocate the capacity to the traffic only when itis needed, and share the available capacity between many

    users.

  • 8/2/2019 6 Networking Part2

    22/69Rick Graziani [email protected] 22

    Wireless Access Point

    A wireless access point is a device that connectswireless devices (laptops, etc.) to a wired network, usuallyan Ethernet LAN.

  • 8/2/2019 6 Networking Part2

    23/69Rick Graziani [email protected] 23

    Wireless Access Point

    In our example the wireless access point (AP) will include aRouter.

  • 8/2/2019 6 Networking Part2

    24/69Rick Graziani [email protected] 24

    Putting it together

    Exactly the same as connecting a router without an AP.

  • 8/2/2019 6 Networking Part2

    25/69

    Rick Graziani [email protected] 25

    Configuring the AP and Router

    Wireless Settings:

    SSID (Service Set Identifier) Name of your network Security: WPA, WEP, or none

    Router settingsinclude: IP Address,Subnet Mask,Default Gateway,and DNS Serverinformation

  • 8/2/2019 6 Networking Part2

    26/69

    Rick Graziani [email protected] 26

    SSID

    The SSID is what will be displayed when people withwireless computers are looking for a wireless LAN.

  • 8/2/2019 6 Networking Part2

    27/69

    Rick Graziani [email protected] 27

    Linksys WRT54G

    Router Information

    IP Address from ISP Connects to your DSL/Cable Modem NAT (Network Address Translation)

    Local Network

    Switch or Hub Connect wired computers DHCP Server (optional)

    Wireless

    SSID: MyHomeNetwork DHCP Server: (optional) Channel: 11

    Encryption Function: WPA

    MAC address forAPs IP address

  • 8/2/2019 6 Networking Part2

    28/69

    Rick Graziani [email protected] 28

    You choose

    There are many resources to discuss the possible healthrisks or wireless LANs.

    As a networking and WLAN user and instructor I have myown thoughts which I will share.

    If you are concerned, then research the information andcome to your own conclusions.

    The following information is from my own research andexperience.

  • 8/2/2019 6 Networking Part2

    29/69

    Rick Graziani [email protected] 29

    Wireless Frequency

    Wireless APs operate at:

    2.4 GHz

    5 GHz

    2 GHZ! Thats the same as my microwave oven, isnt that dangerous? Answer: No.

    Electromagnetic waves happen naturally. Light is an electromagnetic wave

    It is not the frequency, but the wattage, the power.

    Any electromagnetic wave can be dangerous with too muchpower.

    A 25 watt light bulb is safe, but it wouldnt be safe at 250,000watts

    Wireless access points generate signals at 1/10th of a watt.

    Like all electromagnetic waves, the signal does not fade in alinear manner, but inversely as the square of the distance.

  • 8/2/2019 6 Networking Part2

    30/69

    Rick Graziani [email protected] 30www.britishlibrary.net

  • 8/2/2019 6 Networking Part2

    31/69

    Rick Graziani [email protected] 31

    Inverse square law

    Double the distance of the wireless link, we receive only of theoriginal power.

    Triple the distance of the wireless link, we receive only 1/9 the originalpower.

    Move 5 times the distance, signal decreases by 1/25.

    Point A

    2 times the distance the power of Point A

    10 20 30 40 50 100

    3 times the distance1/9 the power of Point A

    5 times the distance1/25 the power of Point A

    10 times the distance1/100 the power of A

  • 8/2/2019 6 Networking Part2

    32/69

    Rick Graziani [email protected] 32

    Putting it in some perspective

    Measurements from an antenna transmitting 100mW at 1 inch

    Remember a milliwatt is 1/1,000thof a Watt Microwave oven typically operates at 1,000 watts in a confined space.

    1 100 mW 1/10th watt

    2 25 mW 1/40th watt

    4 6.25 mW 1/166th watt

    8 1.56 mW 1/1000th watt

    16 0.39 mW 4/10,000th watt

    32 0.097 mW 1/10,000th watt

    64 (5.3 ft) 0.024 mW 2/100,000th watt

    128 (10.6 ft) 0.006 mW 6/1,000,000th watt

    256 (21.3 ft) 0.0015 mW 15/10,000,000th watt

    Light bulbs would also be dangerous the were 10,000 to1,000,000,000,000 stronger.

    A 250,000 watt up to a 250,000,000,000,000 watt light bulb would alsobe dangerous.

  • 8/2/2019 6 Networking Part2

    33/69

    Rick Graziani [email protected] 33

  • 8/2/2019 6 Networking Part2

    34/69

    Rick Graziani [email protected] 34

    Wireless Security Everyone can hear

    Others can hear or capture your information.

    Wireless signals are propagated, sent, similar to our voicesound waves.

  • 8/2/2019 6 Networking Part2

    35/69

    Rick Graziani [email protected] 35

    Wireless Security Everyone can hear

    If we dont want them to understand what they hear, we can encrypt or

    code the information. As long a our wireless computer and access point are using the same

    encryption algorithm, such as WEP or WPA.

  • 8/2/2019 6 Networking Part2

    36/69

    Rick Graziani [email protected] 36

    Wireless Security - WPA

    WPA (WiFi Protected Access) is currently the best option.

    The password is configured on both the wireless access point and thecomputer.

  • 8/2/2019 6 Networking Part2

    37/69

    Rick Graziani [email protected] 37

    Wireless Security

    Without any security, anyone can: Use your wireless access point to access your network

    and the Internet.

    Capture your information from your wireless computer.

  • 8/2/2019 6 Networking Part2

    38/69

    Rick Graziani [email protected] 38

    Wireless Security

    DriftNetCommView

    Wi l S i

  • 8/2/2019 6 Networking Part2

    39/69

    Rick Graziani [email protected] 39

    Wireless Security

    Your web browsing or email access should already be secured.

    Look for the lock

  • 8/2/2019 6 Networking Part2

    40/69

    Rick Graziani [email protected] 40

    C i I f i T h l

  • 8/2/2019 6 Networking Part2

    41/69

    Rick Graziani [email protected] 41

    Careers in Information Technology

    C t S t S i li t

  • 8/2/2019 6 Networking Part2

    42/69

    Rick Graziani [email protected] 42

    Computer Support Specialist

    Installing computer hardwareand software.

    Troubleshooting Maintenance and upgrades

    N t ki S t Ad i i t t

  • 8/2/2019 6 Networking Part2

    43/69

    Rick Graziani [email protected] 43

    Networking: System Administrator

    Installing, configuring, and maintaining network servers UNIX, LINUX, Microsoft Web, DNS, DHCP, Mail Servers Backup and recovery, user administration

    Security

    N t ki N t k T h i i /A l t

  • 8/2/2019 6 Networking Part2

    44/69

    Rick Graziani [email protected] 44

    Networking: Network Technician/Analyst

    Install, manage, troubleshoot network infrastructure: Routers, Switches, Cables, Wireless Access Points

    Issues: Security, Quality of Service, Video On Demand,

    Voice over IP

    K i t h l

  • 8/2/2019 6 Networking Part2

    45/69

    Rick Graziani [email protected] 45

    Keeping up on technology

    Wireless Security

  • 8/2/2019 6 Networking Part2

    46/69

    Internet: Safe Surfing

    S f S fi

  • 8/2/2019 6 Networking Part2

    47/69

    Rick Graziani [email protected] 47

    Safe Surfing

    Adware

    Pop-ups Spyware

    Blocking Pop-ups

    Java Traps or Pop-Up Hell Spyware

    Blocking Spyware

    Cookies Virus Protection Spam

    Blocking Spam

    Adware

  • 8/2/2019 6 Networking Part2

    48/69

    Rick Graziani [email protected] 48

    Adware

    Adware or advertising-supported software is any software applicationin which advertisements are displayed while the program is running.

    Displays the ads in pop-up windows or through a bar that appears on acomputer screen.

    Adware helps recover programming development costs, and helps tohold down the price of the application for the user (even making it freeof charge)and, of course, it can give programmers a profit, whichhelps to motivate them to write, maintain, and upgrade valuablesoftware.

    What are Pop ups? (Wikipedia org)

  • 8/2/2019 6 Networking Part2

    49/69

    Rick Graziani [email protected] 49

    What are Pop-ups? (Wikipedia.org)

    Pop-up ads are a form of online advertising on the Web where certainwebsites open a new web browser window to display advertisements.

    Usually generated by JavaScript A less intrusive variation on the pop-up window is the pop-under

    advertisement.

    This opens a new browser window, but in the background, so as

    not to interrupt the user's page-view.

    From Gain Publishing:

  • 8/2/2019 6 Networking Part2

    50/69

    Rick Graziani [email protected] 50

    gwww.gainpublishing.com/ about/

    What are Pop ups? (Wikipedia org)

    http://www.gainpublishing.com/about/http://www.gainpublishing.com/about/
  • 8/2/2019 6 Networking Part2

    51/69

    Rick Graziani [email protected] 51

    What are Pop-ups? (Wikipedia.org)

    For early advertising-supported websites, banner ads were sufficientrevenue generators.

    But in the wake of the dot com crash, prices paid for banneradvertising clickthroughs decreased and many vendors began toinvestigate more effective advertising methods.

    Pop-up ads by their nature are difficult to ignore or overlook, and areclaimed to be more effective than static banner ads.

    Pop-ups have a much higher click rate than web banner ads do.

    What are Pop ups? (Wikipedia org)

  • 8/2/2019 6 Networking Part2

    52/69

    Rick Graziani [email protected] 52

    What are Pop-ups? (Wikipedia.org)

    Most users regard pop-ups as a nuisance. In the early 2000s, all major web browsers except Internet Explorer

    allowed the user to block pop-ups almost completely.

    In 2004, Microsoft released Windows XP SP2, which added pop-upblocking to Internet Explorer.

    Some users install non-Microsoft ad-blocking software instead. Advertisers continually seek ways to circumvent such restrictions. Many of the latest pop-ups are created using Flash and have extensive

    animation and trickery.

    Ultimateirony!

  • 8/2/2019 6 Networking Part2

    53/69

    Rick Graziani [email protected] 53

    From Microsoft

  • 8/2/2019 6 Networking Part2

    54/69

    Rick Graziani [email protected] 54

    From Microsoft

    With Windows XP Service Pack 2 (SP2) Internet Explorer allows youto prevent most pop-up windows from appearing over pages you wantto view while you're using the Internet.

    When you install SP2, Pop-up Blocker is turned on in Internet Explorerand set to the medium setting, which means it will block mostautomatic pop-ups.

    Block Pop-up Windows with Internet

  • 8/2/2019 6 Networking Part2

    55/69

    Rick Graziani [email protected] 55

    p pExplorer

    http://www.microsoft.com/windowsxp/using/web/sp2_popupblocker.mspx

    C/NET Pop ups mean more $$$

  • 8/2/2019 6 Networking Part2

    56/69

    Rick Graziani [email protected] 56

    C/NET Pop-ups mean more $$$

    Publishers willingly allow pop-ups or pop-unders because theycommand higher prices, and they're in high demand byadvertisers.

    Ad executives say they can cost advertisers about $10 perthousand sent for top-rated sites.

    That compares with between $2 and $3 per thousand for astatic banner ad that appears on the same popular site.

    The Web sites that sold or disseminated the most pop-up adsin the month of April 2005 include CNN.com, ESPN.com,Excite.com, Weather.com, and The New York Times.

    Java Trap or

  • 8/2/2019 6 Networking Part2

    57/69

    Rick Graziani [email protected] 57

    pPop-up Hell

    Pornographic websites are among the most common users of pop-upads.

    Some particularly vicious types of pop-up ads have been specificallydesigned to "hijack" a user's Internet session.

    As each window is closed by the user it activates another window --sometimes indefinitely.

    Usually the only way to stop this is to close the browser. Mouse Trapping: Another variation of pop-up fills an entire screen

    with an ad or Web page, removing any menu bars or other on-screen

    icons by which the user can close the window.

    What are Pop-ups? (Wikipedia org)

  • 8/2/2019 6 Networking Part2

    58/69

    Rick Graziani [email protected] 58

    What are Pop-ups? (Wikipedia.org)

    Pop-up ads can also be spawned as a separate process (that is to say,apart from the browser) on the user's local computer.

    This is typically because of a spyware infestation, or because the userhas voluntarily (or involuntarily) installed adware.

    Spyware (Wikipedia org)

  • 8/2/2019 6 Networking Part2

    59/69

    Rick Graziani [email protected] 59

    Spyware (Wikipedia.org)

    Spyware is computer software that gathers and reports information

    about a computer user without the user's knowledge or consent. May perform many different functions, including:

    the delivery of unrequested advertising (pop-up ads in particular),

    harvesting private information

    re-routing page requests to illegally claim commercial site referal fees Spyware as a category overlaps with adware Spyware or Malware in a broader sense can include: adware, remote

    access trojans (RATs), keystroke loggers, denial-of-service (DoS) attackagents, probe tools, and other backdoor network threats (including most

    popular remote access tools).

    Fighting Spyware

  • 8/2/2019 6 Networking Part2

    60/69

    Rick Graziani [email protected] 60

    Fighting Spyware

    Spybot (www.safer-networking.org) PestPatrol (www.pestpatrol.com)

    Cookies

  • 8/2/2019 6 Networking Part2

    61/69

    Rick Graziani [email protected] 61

    Cookies

    A cookie is information sent by a

    server to a browser and then sentback to the server each time itaccesses that server.

    They were invented by LouMontulli, a former employee ofNetscape Communications.

    Amongst other uses, cookiesenable websites to be customizedfor individual users oncebrowsing patterns have beenestablished.

    Cookies can however causepotential security problems asinformation such as credit carddetails might be collected via acookie.

    Cookies can however, only store

    information that you provide.

    Cookies - Purpose

  • 8/2/2019 6 Networking Part2

    62/69

    Rick Graziani [email protected] 62

    Cookies - Purpose

    Typically this is used to authenticate or identify a registered user of aweb site as part of their first login process or initial site registrationwithout requiring them to sign in again every time they access that site.

    Other uses are maintaining a "shopping basket" of goods selected forpurchase during a session at a site, site personalization (presentingdifferent pages to different users), and tracking a particular user's

    access to a site.

    Cookies - Permissions

  • 8/2/2019 6 Networking Part2

    63/69

    Rick Graziani [email protected] 63

    Cookies - Permissions

    A browser may or may not allow the use of cookies. The user can usually choose a setting. Microsoft Internet Explorer

    Tools > Internet Options > Privacy Tab

    Use slider to set options, or use advanced options

    Virus Protection

  • 8/2/2019 6 Networking Part2

    64/69

    Rick Graziani [email protected] 64

    Virus Protection

    In computer security technology, a virus is a self-replicating program that spreads by inserting copies ofitself into other executable code or documents

    Spam (Wikipedia)

  • 8/2/2019 6 Networking Part2

    65/69

    Rick Graziani [email protected] 65

    Spam (Wikipedia)

    Spamming is the act of sending unsolicited electronic messages inbulk.

    The most common form of spam is that delivered in e-mail as a form ofcommercial advertising.

    Spamming has been considered by various commercial, government,and independent entities to be one of the foremost social problemsfacing electronic media today.

    Many attempts have been made to curb this problem including e-mailfiltering, contractual measures such as Internet Service Providers'acceptable-use policies, laws such as the Can Spam Act of 2003 and

    market pressures such as boycotts of those who use or support spam.

    CAN-SPAM Act of 2003 (Wikipedia)

  • 8/2/2019 6 Networking Part2

    66/69

    Rick Graziani [email protected] 66

    CAN SPAM Act of 2003 (Wikipedia)

    The CAN-SPAM Act of 2003, signed into law by President Bush on

    December 16, 2003, establishes the first national standards for thesending of commercial e-mail and requires the Federal TradeCommission (FTC) to enforce its provisions.

    The bill's full name is an acronym: Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003.

    It also requires the FTC to promulgate rules to shield consumers fromunwanted mobile service commercial messages.

    The bill permits e-mail marketers to send unsolicited commercial e-mailas long as it contains all of the following:

    an opt-out mechanism;

    a functioning return e-mail address;

    a valid subject line indicating it is an advertisement; and the legitimate physical address of the mailer.

    The legislation also prohibits the sale or other transfer of an e-mailaddress obtained through an opt-out request. It criminalizes the useof automated means to register for multiple e-mail accounts from

    which to send spam. It prohibits sending sexually-oriented spamwithout clear markin s.

    Anti-Spam

    http://www.giantcompany.com/?PID=A22227
  • 8/2/2019 6 Networking Part2

    67/69

    Rick Graziani [email protected] 67

    Anti Spam

    Spammers obtain e-mail addresses by a number of means: Web pages

    guessing common names at known domains "e-pending"

    searching for e-mail addresses corresponding to specific persons

    Many e-mail spammers go to great lengths to conceal the origin of theirmessages.

    Spoofing e-mail addresses - spammer modifies the e-mail messageso it looks like it is coming from another e-mail address.

    Among the tricks used by spammers to try to circumvent the filters is tointentionally misspell common spam filter trigger words, ie. "viagra"might become "vaigra", or by inserting other symbols within the word,i.e. "v/i/a/g./r/a".

    Spam

    http://www.giantcompany.com/?PID=A22227http://www.giantcompany.com/?PID=A22227http://www.giantcompany.com/?PID=A22227
  • 8/2/2019 6 Networking Part2

    68/69

    Rick Graziani [email protected] 68

    Spam

  • 8/2/2019 6 Networking Part2

    69/69

    Internet: Safe Surfing

    CS 1Rick Graziani

    Spring 2006