HUB
Networks using a Star
topology require a central point for the devices to connect. Originally this
device was called a concentrator since it consolidated the cable runs from all
network devices. The basic form of concentrator is the hub.
The hub is a hardware device that contains multiple, independent ports that
match the cable type of the network. Most common hubs interconnect Category 3
or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC
hubs also exist. The hub is considered the least common denominator in device
concentrators. Hubs offer an inexpensive option for transporting data between
devices, but hubs don't offer any form of intelligence. Hubs can be active or
passive.
An active
hub strengthens and regenerates the incoming signals before sending
the data on to its destination.
Passive hubs do nothing with the signal.
Ethernet Hubs
An Ethernet hub is
also called a multiport repeater. A repeater is a device that amplifies a
signal as it passes through it, to counteract the effects of attenuation. If,
for example, you have a thin Ethernet network with a cable segment longer than
the prescribed maximum of 185 meters, you can install a repeater at some point
in the segment to strengthen the signals and increase the maximum segment
length. This type of repeater only has two BNC connectors, and is rarely seen
these days.
8 Port mini Ethernet Hub
The hubs used on UTP
Ethernet networks are repeaters as well, but they can have many RJ45 ports instead
of just two BNC connectors. When data enters the hub through any of its ports,
the hub amplifies the signal and transmits it out through all of the other
ports. This enables a star network to have a shared medium, even though each
computer has its own separate cable. The hub relays every packet transmitted by
any computer on the network to all of the other computers, and also amplifies
the signals.
The maximum segment
length for a UTP cable on an Ethernet network is 100 meters. A segment is
defined as the distance between two communicating computers. However, because
the hub also functions as a repeater, each of the cables connecting a computer
to a hub port can be up to 100 meters long, allowing a segment length of up to
200 meters when one hub is inserted in the network.
Multistation Access Unit
A Multistation
Access Unit (MAU) is a special type of hub used for token ring
networks. The word "hub" is used most often in
relation to Ethernet networks, and MAU only refers to token ring networks. On
the outside, the MAU looks like a hub. It connects to multiple network devices,
each with a separate cable.
Unlike a hub that uses
a logical bus topology over a physical star, the MAU uses a logical ring
topology over a physical star.
When the MAU detects a
problem with a connection, the ring will beacon. Because it uses a physical
star topology, the MAU can easily detect which port the problem exists on and
close the port, or "wrap" it. The MAU does actively regenerate
signals as it transmits data around the ring.
Switches
Switches
are a special type of hub that offers an additional layer of intelligence to
basic, physical-layer repeater hubs. A switch must be able to read the MAC
address of each frame it receives. This information allows switches to repeat
incoming data frames only to the computer or computers to which a frame is
addressed. This speeds up the network and reduces congestion.
Switches
operate at both the physical layer and the data link layer of the OSI Model.
Bridges
A bridge is
used to join two network segments together, it allows computers on either
segment to access resources on the other. They can also be used to divide large
networks into smaller segments. Bridges have all the features of repeaters, but
can have more nodes, and since the network is divided, there is fewer computers
competing for resources on each segment thus improving network performance.
Bridges
can also connect networks that run at different speeds, different topologies,
or different protocols. But they cannot, join an Ethernet segment with a Token
Ring segment, because these use different networking standards. Bridges operate
at both the Physical Layer and the MAC sublayer of the Data Link layer. Bridges
read the MAC header of each frame to determine on which side of the bridge the
destination device is located, the bridge then repeats the transmission to the
segment where the device is located.
Routers
Routers
Are networking devices used to extend or segment networks by forwarding packets
from one logical network to another. Routers are most often used in large
internetworks that use the TCP/IP protocol suite and for connecting TCP/IP
hosts and local area networks (LANs) to the Internet using dedicated leased
lines.
Routers
work at the network layer (layer 3) of the Open Systems Interconnection (OSI)
reference model for networking to move packets between networks using their
logical addresses (which, in the case of TCP/IP, are the IP addresses of
destination hosts on the network). Because routers operate at a higher OSI
level than bridges do, they have better packet-routing and filtering
capabilities and greater processing power, which results in routers costing
more than bridges.
Routing tables
Routers
contain internal tables of information called routing tables that keep track of
all known network addresses and possible paths throughout the internetwork,
along with cost of reaching each network. Routers route packets based on the
available paths and their costs, thus taking advantage of redundant paths that
can exist in a mesh topology network.
Because
routers use destination network addresses of packets, they work only if the
configured network protocol is a routable protocol such as TCP/IP or IPX/SPX.
This is different from bridges, which are protocol independent. The routing
tables are the heart of a router; without them, there's no way for the router
to know where to send the packets it receives.
Unlike
bridges and switches, routers cannot compile routing tables from the
information in the data packets they process. This is because the routing table
contains more detailed information than is found in a data packet, and also
because the router needs the information in the table to process the first
packets it receives after being activated. A router can't forward a packet to
all possible destinations in the way that a bridge can.
·
Static routers: These must have
their routing tables configured manually with all network addresses and paths
in the internetwork.
·
Dynamic routers: These
automatically create their routing tables by listening to network traffic.
·
Routing tables are the means by which
a router selects the fastest or nearest path to the next "hop" on the
way to a data packet's final destination. This process is done through the use
of routing metrics.
·
Routing metrics which are the means of
determining how much distance or time a packet will require to reach the final
destination. Routing metrics are provided in different forms.
·
hop is simply a router that the packet must
travel through.
·
Ticks measure the time it takes to traverse a
link. Each tick is 1/18 of a second. When the router selects a route based on
tick and hop metrics, it chooses the one with the lowest number of ticks first.
You
can use routers, to segment a large network, and to connect local area segments
to a single network backbone that uses a different physical layer and data link
layer standard. They can also be used to connect LAN's to a WAN's.
Brouters
Brouters
are a combination of router and bridge. This is a special type of equipment
used for networks that can be either bridged or routed, based on the protocols
being forwarded. Brouters are complex, fairly expensive pieces of equipment and
as such are rarely used.
A
Brouter transmits two types of traffic at the exact same time: bridged traffic
and routed traffic. For bridged traffic, the Brouter handles the traffic the
same way a bridge or switch would, forwarding data based on the physical
address of the packet. This makes the bridged traffic fairly fast, but slower
than if it were sent directly through a bridge because the Brouter has to
determine whether the data packet should be bridged or routed.
Gateways
A
gateway is a device used to connect networks using different protocols.
Gateways operate at the network layer of the OSI model. In order to communicate
with a host on another network, an IP host must be configured with a route to
the destination network. If a configuration route is not found, the host uses
the gateway (default IP router) to transmit the traffic to the destination
host. The default t gateway is where the IP sends packets that are destined for
remote networks. If no default gateway is specified, communication is limited
to the local network. Gateways receive data from a network using one type of
protocol stack, removes that protocol stack and repackages it with the protocol
stack that the other network can use.
Examples
·
E-mail
gateways-for example, a gateway that receives Simple Mail Transfer Protocol
(SMTP) e-mail, translates it into a standard X.400 format, and forwards it to
its destination
·
Gateway
Service for NetWare (GSNW), which enables a machine running Microsoft Windows
NT Server or Windows Server to be a gateway for Windows clients so that they
can access file and print resources on a NetWare server
·
Gateways
between a Systems Network Architecture (SNA) host and computers on a TCP/IP
network, such as the one provided by Microsoft SNA Server
·
A
packet assembler/disassembler (PAD) that provides connectivity between a local
area network (LAN) and an X.25 packet-switching network
CSU / DSU (Channel Service Unit / Data Service Unit)
A CSU/DSU is
a device that combines the functionality of a channel service unit (CSU) and a
data service unit (DSU). These devices are used to connect a LAN to a WAN, and
they take care of all the translation required to convert a data stream between
these two methods of communication.
A DSU provides
all the handshaking and error correction required to maintain a connection
across a wide area link, similar to a modem. The DSU will accept a serial data
stream from a device on the LAN and translate this into a useable data stream
for the digital WAN network. It will also take care of converting any inbound
data streams from the WAN back to a serial communication.
A CSU is
similar to a DSU except it does not have the ability to provide handshaking or
error correction. It is strictly an interface between the LAN and the WAN and
relies on some other device to provide handshaking and error correction.
NICs (Network Interface Card)
Network
Interface Card, or NIC is a hardware card installed in a computer so it can
communicate on a network. The network adapter provides one or more ports for
the network cable to connect to, and it transmits and receives data onto the
network cable.
Wireless
Lan card
Every
networked computer must also have a network adapter driver, which controls the
network adapter. Each network adapter driver is configured to run with a certain
type of network adapter.
Network
card
Network
Interface Adapter Functions
Network interface adapters perform a variety of functions that are crucial to getting data to and from the computer over the network.
Network interface adapters perform a variety of functions that are crucial to getting data to and from the computer over the network.
These
functions are as follows:
Data
encapsulation
The network interface adapter and its driver are responsible for building the frame around the data generated by the network layer protocol, in preparation for transmission. The network interface adapter also reads the contents of incoming frames and passes the data to the appropriate network layer protocol.
The network interface adapter and its driver are responsible for building the frame around the data generated by the network layer protocol, in preparation for transmission. The network interface adapter also reads the contents of incoming frames and passes the data to the appropriate network layer protocol.
Signal
encoding and decoding
The network interface adapter implements the physical layer encoding scheme that converts the binary data generated by the network layer-now encapsulated in the frame-into electrical voltages, light pulses, or whatever other signal type the network medium uses, and converts received signals to binary data for use by the network layer.
The network interface adapter implements the physical layer encoding scheme that converts the binary data generated by the network layer-now encapsulated in the frame-into electrical voltages, light pulses, or whatever other signal type the network medium uses, and converts received signals to binary data for use by the network layer.
transmission
and reception
The primary function of the network interface adapter is to generate and transmit signals of the appropriate type over the network and to receive incoming signals. The nature of the signals depends on the network medium and the data-link layer protocol. On a typical LAN, every computer receives all of the packets transmitted over the network, and the network interface adapter examines the destination address in each packet, to see if it is intended for that computer. If so, the network interface adapter passes the packet to the computer for processing by the next layer in the protocol stack; if not, the network interface adapter discards the packet.
The primary function of the network interface adapter is to generate and transmit signals of the appropriate type over the network and to receive incoming signals. The nature of the signals depends on the network medium and the data-link layer protocol. On a typical LAN, every computer receives all of the packets transmitted over the network, and the network interface adapter examines the destination address in each packet, to see if it is intended for that computer. If so, the network interface adapter passes the packet to the computer for processing by the next layer in the protocol stack; if not, the network interface adapter discards the packet.
Data
buffering
Network interface adapters transmit and receive data one frame at a time, so they have built-in buffers that enable them to store data arriving either from the computer or from the network until a frame is complete and ready for processing.
Network interface adapters transmit and receive data one frame at a time, so they have built-in buffers that enable them to store data arriving either from the computer or from the network until a frame is complete and ready for processing.
Serial/parallel
conversion
The communication between the computer and the network interface adapter runs in parallel, that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network communications, however, are serial (running one bit at a time), so the network interface adapter is responsible for performing the conversion between the two types of transmissions.
The communication between the computer and the network interface adapter runs in parallel, that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network communications, however, are serial (running one bit at a time), so the network interface adapter is responsible for performing the conversion between the two types of transmissions.
Media
access control
The network interface adapter also implements the MAC mechanism that the data-link layer protocol uses to regulate access to the network medium. The nature of the MAC mechanism depends on the protocol used.
The network interface adapter also implements the MAC mechanism that the data-link layer protocol uses to regulate access to the network medium. The nature of the MAC mechanism depends on the protocol used.
Network protocols
A
networked computer must also have one or more protocol drivers (sometimes
called a transport protocol or just a protocol). The protocol driver works
between the upper-level network software and the network adapter to package
data to be sent on the network.
In
most cases, for two computers to communicate on a network, they must use
identical protocols. Sometimes, a computer is configured to use multiple
protocols. In this case, two computers need only one protocol in common to
communicate. For example, a computer running File and Printer Sharing for
Microsoft Networks that uses both NetBEUI and TCP/IP can communicate with
computers using only NetBEUI or TCP/IP.
ISDN (Integrated Services Digital Network) adapters
Integrated
Services Digital Network adapters can be used to send voice, data, audio, or
video over standard telephone cabling. ISDN adapters must be connected directly
to a digital telephone network. ISDN adapters are not actually modems, since
they neither modulate nor demodulate the digital ISDN signal.
Like
standard modems, ISDN adapters are available both as internal devices that
connect directly to a computer's expansion bus and as external devices that
connect to one of a computer's serial or parallel ports. ISDN can provide data
throughput rates from 56 Kbps to 1.544 Mbps (using a T1 carrier service).
ISDN
hardware requires a NT (network termination) device, which converts network
data signals into the signaling protocols used by ISDN. Some times, the NT
interface is included, or integrated, with ISDN adapters and ISDN-compatible
routers. In other cases, an NT device separate from the adapter or router must
be implemented. ISDN works at the physical, data link, network, and transport
layers of the OSI Model.
WAPs (Wireless Access Point)
A
wireless network adapter card with a transceiver sometimes called an access
point, broadcasts and receives signals to and from the surrounding computers
and passes back and forth between the wireless computers and the cabled
network.
Access
points act as wireless hubs to link multiple wireless NICs into a single
subnet. Access points also have at least one fixed Ethernet port to allow the
wireless network to be bridged to a traditional wired Ethernet network.
Modems
A
modem is a device that makes it possible for computers to communicate over telephone
lines. The word modem comes from Modulate and Demodulate. Because standard
telephone lines use analog signals, and computers digital signals, a sending
modem must modulate its digital signals into analog signals. The computers
modem on the receiving end must then demodulate the analog signals into digital
signals.
Modems
can be external, connected to the computers serial port by an RS-232 cable or
internal in one of the computers expansion slots. Modems connect to the phone
line using standard telephone RJ-11 connectors.
Transceivers (media converters)
Transceiver
short for transmitter-receiver, a device that both transmits and receives
analog or digital signals. The term is used most frequently to describe the
component in local-area networks (LANs) that actually applies signals onto the
network wire and detects signals passing through the wire. For many LANs, the
transceiver is built into the network interface card (NIC). Some types of
networks, however, require an external transceiver.
In
Ethernet networks, a transceiver is also called a Medium Access Unit (MAU).
Media converters interconnect different cable types twisted pair, fiber, and
Thin or thick coax, within an existing network. They are often used to connect
newer 100-Mbps, Gigabit Ethernet, or ATM equipment to existing networks, which
are generally 10BASE-T, 100BASE-T, or a mixture of both. They can also be used
in pairs to insert a fiber segment into copper networks to increase cabling
distances and enhance immunity to electromagnetic interference (EMI).
Firewalls
In
computing, a firewall is a piece of hardware and/or software which functions in
a networked environment to prevent some communications forbidden by the
security policy, analogous to the function of firewalls in building
construction.
A
firewall has the basic task of controlling traffic between different zones of
trust. Typical zones of trust include the Internet (a zone with no trust) and
an internal network (a zone with high trust). The ultimate goal is to provide
controlled connectivity between zones of differing trust levels through the
enforcement of a security policy and connectivity model based on the least
privilege principle.
There
are three basic types of firewalls depending on:
·
whether
the communication is being done between a single node and the network, or
between two or more networks
·
whether
the communication is intercepted at the network layer, or at the application
layer
·
whether
the communication state is being tracked at the firewall or not
With
regard to the scope of filtered communication these firewalls are exist:
·
Personal
firewalls, a software application which normally filters traffic entering or
leaving a single computer through the Internet.
·
Network
firewalls, normally running on a dedicated network device or computer
positioned on the boundary of two or more networks or DMZs (demilitarized
zones). Such a firewall filters all traffic entering or leaving the connected
networks.
In
reference to the layers where the traffic can be intercepted, three main
categories of firewalls exist:
·
network
layer firewalls An example would be iptables.
·
application
layer firewalls An example would be TCP Wrapper.
·
application
firewalls An example would be restricting ftp services through /etc/ftpaccess
file
These
network-layer and application-layer types of firewall may overlap, even though
the personal firewall does not serve a network; indeed, single systems have
implemented both together.
There's
also the notion of application firewalls which are sometimes used during wide
area network (WAN) networking on the world-wide web and govern the system
software. An extended description would place them lower than application layer
firewalls, indeed at the Operating System layer, and could alternately be
called operating system firewalls.
Lastly,
depending on whether the firewalls track packet states, two additional
categories of firewalls exist:
·
stateful
firewalls
·
stateless
firewalls
Network layer
firewalls
Network
layer firewalls operate at a (relatively low) level of the TCP/IP protocol
stack as IP-packet filters, not allowing packets to pass through the firewall
unless they match the rules. The firewall administrator may define the rules;
or default built-in rules may apply (as in some inflexible firewall systems).
A
more permissive setup could allow any packet to pass the filter as long as it
does not match one or more "negative-rules", or "deny
rules". Today network firewalls are built into most computer operating
system and network appliances.
Modern
firewalls can filter traffic based on many packet attributes like source IP
address, source port, destination IP address or port, destination service like
WWW or FTP. They can filter based on protocols, TTL values, netblock of
originator, domain name of the source, and many other attributes.
Application-layer
firewalls
Application-layer
firewalls work on the application level of the TCP/IP stack (i.e., all browser
traffic, or all telnet or ftp traffic), and may intercept all packets traveling
to or from an application. They block other packets (usually dropping them
without acknowledgement to the sender). In principle, application firewalls can
prevent all unwanted outside traffic from reaching protected machines.
By
inspecting all packets for improper content, firewalls can even prevent the
spread of the likes of viruses. In practice, however, this becomes so complex
and so difficult to attempt (given the variety of applications and the diversity
of content each may allow in its packet traffic) that comprehensive firewall
design does not generally attempt this approach.
Proxies
A
proxy device (running either on dedicated hardware or as software on a
general-purpose machine) may act as a firewall by responding to input packets
(connection requests, for example) in the manner of an application, whilst
blocking other packets.
Proxies
make tampering with an internal system from the external network more
difficult, and misuse of one internal system would not necessarily cause a
security breach exploitable from outside the firewall (as long as the
application proxy remains intact and properly configured). Conversely,
intruders may hijack a publicly-reachable system and use it as a proxy for their
own purposes; the proxy then masquerades as that system to other internal
machines. While use of internal address spaces enhances security, crackers may
still employ methods such as IP spoofing to attempt to pass packets to a target
network.
No comments:
Post a Comment