Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
HIPAA Security Standards What’s happening in your office?
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Basic Networking Components
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 6: Packet Filtering
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Hub  A hub is a piece of hardware that connects multiple wired devices together on a single network. Hubs work at the physical layer (layer 1) of the.
1 Version 3.0 Module 11 TCP Application and Transport.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Components of wireless LAN & Its connection to the Internet
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
CompTIA Security+ Study Guide (SY0-401)
Networks and Communication
Firewall Techniques Matt Cupp.
Working at a Small-to-Medium Business or ISP – Chapter 8
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
On and Off Premise Secure Access
Wireless LAN Security 4.3 Wireless LAN Security.
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
Presentation transcript:

Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi

Agenda Objective; What is Network Hardware? What is Network Software? Network Hardware; HUB, Switches and Routers; Wireless Access Points; Firewall; Network Access Control; Network Software; Summary. ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi

Objective By the end of this lesson, the student will understand how the hardware and software for networks work. ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi

Pre-assessment What do you know about? Network Hardware and Software; Cisco IOS. ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi

Network Hardware ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi Broadly speaking, there are two types of transmission technology that are in widespread use. They are as follows: Broadcast links; Point-to-point links. HUB In computing, the broadcast is used in hubs (hubs) are connected in LAN. Switches A switch is a device used in computer networks to relay modules (frames) between the various nodes. Routers It’s a device used for switching protocols, communication between different computer networks providing communication between computers apart.

Wireless Access Point ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi It is a device that allows wireless devices to connect to a wired network using Wi- Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network; Wireless has advantages for even fixed devices in some circumstances; Wireless security includes: WPA-PSK, WPA2, IEEE 802.1x/RADIUS, WDS, WEP, TKIP, and CCMP (AES) encryption.

Firewall ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers; Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established; Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.

Network Access Control ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi Mitigation of zero-day attacks: The key value proposition of NAC solutions is the ability to prevent end-stations that lack antivirus, patches, or host intrusion prevention software from accessing the network and placing other computers at risk of cross-contamination of computer worms; Policy enforcement: NAC solutions allow network operators to define policies; Identity and access management: Where conventional IP networks enforce access policies in terms of IP addresses, NAC environments attempt to do so based on authenticated user identities, at least for user end-stations such as laptops and desktop computers. Network Access Control (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

Network Access Control ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi

Network Appliance ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi This equipment is usually based on a software product for general use, but optimized to integrate only the components necessary for its target application. It is the harmonious integration between software and hardware. Types: Firewall; Web Content Filter; Network Access Control.

Network Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi Linux Operational Systems Currently, Linux is a collection of free software (and sometimes non-free) created by individuals, groups and organizations around the world, including the Linux kernel. Companies like Red Hat, SuSE, Mandriva and Ubuntu Linux developer as well as community projects such as Debian or Gentoo, compiling the software and provide a complete, ready for installation and use. Windows Operational Systems It’s most popular operational systems for workstations. Microsoft is currently supporting Windows XP, Vista and Windows 7. For the server side, Microsoft Windows counts with Windows 2003 and 2008 nowadays. Services such as DNS, DHCP, SMTP, Directory Services are supported by Microsoft operational systems. Cisco IOS Cisco IOS (Internetwork Operating System) is the software used on the vast majority of Cisco Systems routers and current Cisco network switches.

Summary This chapter has covered concepts of hardware and software for network. We saw how HUBs, Switches and Routers work. Those are the basic elements on the network. Also, in conjunction with the network devices, we find the security devices, like Firewall and Network Access Control. They have features on the network area as well on the security area. For the supporting the hardware, we need the operational systems on each one, like Linux, Windows or Cisco IOS. The hardware and software work together to make the communication between clients and servers possible. ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi

Questions ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi