Site icon Tutorial

Networking

Go back to Tutorial

A network is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information. Networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. A host device on a network can be computers, servers, laptops, Personal Digital Assistants (PDAs), or anything a person uses to access the network. Network devices are hubs, repeaters, bridges, switches, router and firewall.

Network Models (Peer-to-Peer and Client-and-Server)

The term computer network model defines the category in which a computer network can be grouped into. Networks are divided into peer to peer and client-server.

Peer To Peer Networks

When nodes or workstations perform the same communication functions, they are referred to as peers, in this network model, both server and client operations are performed by the same computer. Each user administers his/her workstation and the resources in it. There are no dedicated servers and no hierarchy among the computers. All the computers are equal and therefore are known as peers. Each computer functions as both a client and a server, and there is no administrator responsible for the entire network. The user on each computer determines which data on that computer is shared on the network.

Security is also managed by the user of the devices. This model is not quite secure and is suited for a small computer networks (with 10 computers or less) where users do not want to share files. User’s files are decentralized – they are not stored in a single location.

Client Server Networks

This network model offers centralized access to services and devices. One computer plays the role of a server. It is the most common type of network architecture today that provides centralized data storage, security, manning of applications and network administration. Most servers have operating system like Windows NT/2003 or later, Linux, Novel Netware etc.

Network Types (LAN,WAN,MAN,PAN)

Different types of networks are distinguished based on their size (the number of nodes), their data transfer speed, and their reach. Private networks are networks that belong to a single organization. There are usually of three categories

There are two other types of networks as PANs (Personal Area Network), which are limited few feets, and CANs (Campus Area Networks), which are the same as MANs (with bandwidth limited between each of the network’s LANs).

LAN

It’s a group of computers which all belong to the same organization, and which are linked within a small geographic area using a network, and often the same technology (usually Ethernet). Data transfer speeds over a local area network can be up to 10 Mbps, 1 Gbps and 10 Gbps. LAN can reach to 100 or even 1000 users. LAN can be sub-divided as per the services that it provides and operating modes into, a “peer-to-peer” network (having no central computer and each computer has the same role) and a “client/server” network (with a central computer for services to users).

MAN

MANs (Metropolitan Area Networks) connect multiple geographically nearby LANs to one another (over an area of few kilometres) at high speeds. Thus, a MAN lets two remote nodes communicate as if they were part of the same local area network. A MAN is made from switches or routers connected to one another with high-speed links (usually fiber optic cables or microwave).

WAN

A WAN (Wide Area Network or extended network) connects multiple LANs to one another over vast geographic distances. The speed available on a WAN varies depending on the cost of the connections (which increases with distance) and may be low. WANs operate using routers, which can “choose” the most appropriate path for data to take to reach a network node. The most well-known WAN is the Internet.

Internet connection (DSL, Cable, Serial Link)

The need for speed has changed the options available to consumers and businesses. The connection speeds will change over time and also between Internet Service Providers (ISP). Various internet connection technologies have different characteristics and are discussed.

Dial-up Internet Access

It is called as dial-up access and is economical but slow. Users connect by a modem linked to PC by dialing a phone number (from ISP) but tying up phone line. It is an analog connection as data is sent over an analog, public-switched telephone network. The modem converts received analog data to digital and vice versa. Due to telephone lines usage, the quality of the connection is not always good and data rates are limited. The connection speeds range from 2400 bps to 56 Kbps.

ISDN – Integrated Services Digital Network

It is an international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires and speeds are from 64 Kbps to 128 Kbps.

B-ISDN – Broadband ISDN – Broadband ISDN is similar in function to ISDN but it transfers data over fiber optic telephone lines, not normal telephone wires. SONET is the physical transport backbone of B-ISDN. Broadband ISDN has not been widely implemented.

DSL – Digital Subscriber Line

DSL uses existing telephone line and gives internet simultaneously with telephone service without tying up phone line. Two main categories of DSL for home are called ADSL and SDSL. All types of DSL technologies are collectively called xDSL with speeds from 128 Kbps to 9 Mbps.

ADSL – Asymmetric Digital Subscriber Line – ADSL is the most commonly deployed types of DSL in North America. It supports data rates of from 1.5 to 9 Mbps when receiving data or downstream rate and from 16 to 640 Kbps when sending data or the upstream rate.

ADSL+2 – ADSL Extension – An extension to ADSL broadband technology with faster download speeds though similar as ADSL. Both use a special filter on a telephone line to split existing telephone lines (POTS) between regular telephone (voice) and ADSL+2.

Cable – Broadband Internet Connection

It uses a cable modem for Internet connection over cable TV lines. It works by using TV channel space for data transmission, with certain channels used for downstream transmission, and other channels for upstream transmission. As, the coaxial cable is used so, greater bandwidth is present. Cable speeds range from 512 Kbps to 20 Mbps.

Wireless Internet Connections

Wireless Internet, or wireless broadband is the newest Internet connection types. It uses radio frequency bands for transmission. It provides an always-on connection which can be accessed from anywhere but within a network coverage area hence, it is not present in some areas. It is usually more expensive and mainly available in metropolitan areas by cellular operators using 2Gor 3G.

T-1 Lines – Leased Line

T-1 lines are a leased line option connecting to the Internet backbone with a dedicated phone connection supporting data rates of 1.544Mbps. A T-1 line consists of 24 individual channels, each supporting 64Kbits per second and can be configured to carry voice or data traffic. One or some of individual channels can be taken, and called as fractional T-1access.

T-3 Lines – Dedicated Leased Line – T-3 lines are similar to T-1 with data rates of about 43 to 45 Mbps. It consists of 672 individual channels, each of which supports 64 Kbps.

Network Media

Network media is the actual path over which data travels as it moves from one component to another. The network transmission medium carry signals between computers. There is a variety of media that meet the varying needs and sizes of networks and the common types are coaxial, twisted-pair, unshielded twisted-pair, shielded twisted-pair, fiber-optic and wireless

Coaxial Cable

It has a hollow outer cylindrical conductor that surrounds a single inner wire made of two conducting elements usually copper and surrounding it, is a layer of flexible insulation. Over this insulating material is a woven copper braid or metallic foil that acts both as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, can help reduce the amount of outside interference. Covering this shield is the cable jacket.

It supports 10 to 100 Mbps and is more costly than UTP but, can be cheaper for a physical bus topology as less cable will be needed. Coaxial cable can be cabled over longer distances than twisted-pair cable usually 500m compared to 100m for UTP. The largest diameter (1 cm) coaxial cable is referred as Thicknet but, it is too rigid to install easily due to its thickness. A connection device called vampire tap connect network devices to Thicknet by attachment unit interface (AUI). Similarly, coaxial cable with an outside diameter of only 0.35 cm is referred as Thinnet and used with networks with many twists and turns. Thinnet uses BNC (British Naval Connector or Bayonet Neill Concelman) connectors which are a male type mounted at each end of a cable.

Twisted-Pair Cable

Twisted-pair cable is a type of cabling that is used for telephone communications and Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs are twisted to provide protection against crosstalk, the noise generated by adjacent pairs. Using cancellation with twisting the wires, self-shielding for wire pairs within the network media is provided. Two basic types of twisted-pair cable exist of unshielded twisted pair (UTP) and shielded twisted pair (STP).

Unshielded Twisted-Pair (UTP) Cable

It relies on cancellation effect by the twisted wire pairs to limit signal degradation due to electromagnetic interference (EMI) and radio frequency interference (RFI). The number of twists in the wire pairs varies to reduce crosstalk between the pairs. UTP cable has four pairs of either 22- or 24-gauge copper wire. UTP external diameter is 0.43 cm and is easy to install and less expensive than other types of media. It is installed by a Registered Jack 45 (RJ-45) connector. UTP cable is more prone to electrical noise and interference also, the distance between signal boosts is shorter for UTP than others. Commonly used types of UTP cabling are as follows:

Shielded Twisted-Pair (STP) Cable

Each of four pair of STP wires is wrapped in a metallic foil and then are wrapped in an overall metallic foil thus, reducing electrical noise within the cable (pair-to-pair coupling, or crosstalk) and from outside the cable (EMI and RFI). It is installed with STP data connector but, is more expensive and difficult to install. It’s speed and throughput are from 10 to 100 Mbps with maximum cable length to 100 m.

Fiber Optic Cable

It is a flexible, transparent fiber made of glass (silica) or plastic, thicker than a human hair. It functions as a waveguide to transmit light between the two ends of the fiber. It enables transmission over longer distances and at higher data rates. Optical fibers have a transparent core surrounded by a transparent cladding material with a lower index of refraction. Light is kept in the core by total internal reflection. This causes the fiber to act as a waveguide. Fibers supporting many propagation paths are multi-mode fibers (MMF) and a single mode are called single-mode fibers (SMF). MMF has a wider core diameter, and is used for short-distance but SMF are used for links longer than 1 km. Each fiber can carry many independent channels, each using a different wavelength of light. Speed varies from 5Mbps to 50Gbps and newer are in Tbs.

Wireless

It avoids using cables by using radio communication. It is used by two-way radios, GPS units, cellular telephones, personal digital assistants (PDAs), wireless networking, wireless computer mice or keyboards or headsets, satellite television and cordless telephones. IEEE 802.x (Wi-fi) standards are used for wireless computer network and are of different speeds and coverage area as 802.11 a/b/g/n.

Layered Network Model

The layered network model defines a networking framework for implementing protocols in different layers. Control is passed from one layer to the next, starting at the top most layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

The International Standards Organization (ISO) defined a seven-layer model to standardize networking processes. The benefits to layering networking protocol specifications are many including

TCP/IP Protocol Architecture

TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocols are maintained by the (IETF) or Internet Engineering Task Force. The Internet protocol suite and the layered protocol stack design were in use before the OSI model was established. It has four abstraction layers, each with its own protocols. It has four abstraction layers, each with its own protocols. From highest to lowest, the layers are

Application Layer

It contains all protocols and methods of process-to-process communications across an Internet Protocol (IP) network. Its methods use the underlying transport layer protocols to establish host-to-host connections. Both TCP/IP and the OSI model specify a group of protocols and methods identified by the name application layer. The following protocols are described in the application layer of the Internet protocol suite.

Transport Layer

The transport layer or layer 4 provides end-to-end communication services for applications by providing services like connection-oriented data stream support, reliability, flow control, and multiplexing. It is contained in the TCP/IP as TCP and in the OSI model as transport layer.

The Transmission Control Protocol (TCP) is used for connection-oriented transmissions, whereas the connectionless User Datagram Protocol (UDP) is used for simpler messaging transmissions. TCP has stateful design for reliable transmission and data stream services. Various services provided by a transport-layer protocol include

Internet Layer or IP Layer

It is a group of internetworking methods, protocols, and specifications used to transport datagrams (packets) from the originating host across network, to destination host specified by a network address (IP address). It facilitates internetworking or connecting multiple networks by gateways.

Internet-layer protocols use IP-based packets and have three functions, for outgoing packets, select the next-hop host (gateway) and transmit the packet to this host by passing it to the appropriate link layer implementation; for incoming packets, capture packets and pass the packet payload up to the appropriate transport-layer protocol, if appropriate. In addition it provides error detection and diagnostic capability. The Version 4 of the IP (IPv4), IP is capable of automatic fragmentation or de-fragmentation of packets, based on the maximum transmission unit (MTU) of link elements.

It is not responsible for reliable transmission and offers “best effort” delivery hence, no proper arrival making network resilient and assigning reliability provision to higher level protocols. In IPv4 (not IPv6), a checksum is used to protect the header of each datagram.

Network Access Layer

It is the lowest layer which provides the means for the system to deliver data to the other devices on a directly attached network. It defines how to use the network to transmit data and thus, must know the details of the underlying network to correctly format the data being transmitted to comply with the network constraints. The TCP/IP Network Access Layer has the functions of all three lower layers of OSI (Network, Data Link, and Physical).

Functions performed at this level include encapsulation of IP datagrams into the frames transmitted by the network, and mapping of IP addresses to the physical addresses used by the network. One of TCP/IP’s strengths is its universal addressing scheme. The IP address must be converted into an address appropriate for physical network over which the datagram is transmitted.

Devices at different layers

Devices at different layers of TCP/P network model are

Data Encapsulation

It is a method for communication protocols to logically separate functions in the network and abstracts it from their underlying structures by inclusion or information hiding within higher level objects. Link encapsulation by the physical layer allows local area networking by higher layers and IP provides global addressing of individual computers; UDP adds application or process selection, i.e., the port specifies the service such as a Web or TFTP server.

The more abstract layer is called the upper layer protocol while the more specific layer is called the lower layer protocol. Encapsulation is a characteristic feature of most networking models, including the OSI Model and TCP/IP suite of protocols. An image of encapsulation of application data descending through the layers.

Internet Protocol

The OSI physical layer and data link layer do not define how to deliver data between devices interconnected with multiple devices. The OSI network layer provides the end-to-end delivery of data between endpoints with any type of physical network in between. The network layer specifies data routing. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on the addresses. For this purpose, IP defines datagram structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram source and destination. OSI network layer has following functions which include

IP Routing

Data packet is routed from source to destination by passing through one or more routers and networks. The IP Routing protocols enable routers to build up a forwarding table to relate an final destination address with next hop addresses. Various protocols used in routing are BGP (Border Gateway Protocol), IS-IS (Intermediate System – Intermediate System), OSPF (Open Shortest Path First) and RIP (Routing Information Protocol).

IP routing is done on a hop-by-hop basis. IP does not know the complete route to any destination (except directly connected). IP routing provides the IP address of the next-hop router to which the data is sent and the next-hop router is assumed to be closer to destination. IP routing performs the following actions

If none of the steps works, the datagram is undeliverable. If the undeliverable datagram was generated on this host, a “host unreachable” or “network unreachable” error is normally returned to the application that generated the datagram. Each entry in routing table has

IP routing protocols load routing tables with valid, loop-free routes and involves functions as

Every routing protocols publicizes it’s routes as

IP Addressing

An IP address is a 32 bit binary number, looks like the following

00000100 10000000 00000011 00000001

It is divided into four 8-bit chunks, called octet, and represented into decimal number for humans to understand like 4.128.3.1 An IP address consists of two parts

Hosts on a network can communicate with devices in the same network by MAC address but for different networks, a router to move data is needed. Each LAN has a unique network ID and all hosts on that network have same network ID but different host ID. A network ID enables a router to put a packet onto the correct network segment. To decide which network is correct, the router looks up a routing table, which is a table contains entries for network addresses (network ID + all host bits set to 0). Each network interface uses a unique IP address.

IP addresses are broken into classes to accommodate different sizes of networks as

The block at the beginning and end of each class is called network address and broadcast address, respectively. These two special IP addresses are reserved and detailed as

The list of the Class A, B, C, D, E IP address is summarized as

Class Leading bits Start End Network Bits Host Bits
A 0.0.0.0 127.255.255.255 8 24
B 10 128.0.0.0 191.255.255.255 16 16
C 110 192.0.0.0 223.255.255.255 24 8
D 1110 224.0.0.0 239.255.255.255

The Internet Corporation for Assigned Network Numbers (ICANN, www.icann.org) is in charge for universal IP address assignment and ICANN, assigns regional authority to other cooperating organizations.

Host & Router Routing

Host Routing – Hosts actually use some simple routing logic when choosing where to send a packet. This two-step logic is as follows

Router Routing – When a router gets a packet that is not destined for it, the router deliver it to either the destination host or to another router, as per the logic

DNS

It is an Internet service to translate domain names into IP addresses as, domain names are alphabetic, they’re easy to remember but internet is based on IP addresses. A DNS service translates the name into the corresponding IP address like, the domain name www.example.com might translate to 198.105.232.4. The DNS system is an network as, if one DNS server doesn’t know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

A DNS lookup can be bypassed by giving IP address instead of domain name. DNS works in an complex and hierarchical manner. After connecting the PC or network node to Internet service provider (ISP) or WiFi network, the modem or router assigns a network address to node and sends network configuration about one or more DNS servers to use.

DNS identifies by domain names that are organized as a tree or in hierarchical manner according to organizational or administrative boundaries. Each node of the tree, called a domain, is given a label. The domain name of the node is the concatenation of all the labels on the path from the node to the root node like network.support.vskills.in

For administrative purpose, domain name space is divided into DNS zones, each starting at a node and extending down to the leaf node or to nodes where other zones start. A DNS zone is a portion of the global DNS name space for which administrative responsibility has been delegated. The data for each zone is stored in a name server, which answers queries about the zone using the DNS protocol. A zone and a domain are different as a zone consists of discrete or contiguous portion of the domain tree, which can map exactly to a single domain or include only part of a domain. On the other hand, every node in the DNS tree is a domain, even if it has no subdomains. Any computer registered to join the Domain Name System can act as a DNS server. A DNS server contains a database of network names and address for other Internet hosts. DNS servers are organized in a hierarchy structure. At its top level, the root zone or root domain “.” is administered by a set of 13 root nameserver clusters distributed throughout the world. DNS protocol use both TCP and UDP ports — port 53/tcp and port 53/udp.

The Name Resolution process is done as

Repeating the previous step to progress down the name, until the final step which would, rather than generating the address of the next DNS server, return the final address sought.

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network protocol to automatically assign an IP address and other network configuration to a computer from a defined range of numbers (i.e., a scope) configured for a given network. DHCP assigns an IP address when a system is started as

A computer is manually configured to use specified IP address but it can result in error or inattention to detail resulting in IP address conflict hence, DHCP is used. DHCP server uses three methods for allocating IP-addresses as

DHCP uses two ports destination UDP port 67 for sending data to the server, and UDP port 68 for data to the client. DHCP communications are connectionless in nature. DHCP clients and servers on the same subnet communicate via UDP broadcasts else for different subnets, a DHCP Helper or DHCP Relay Agent is used.

Internet

The World Wide Web (also called WWW or the Web), is a system of interlinked hypertext documents accessed via the Internet. With a web browser, user can view web pages with text, images, videos and other multimedia content, and navigate between them via hyperlinks. Hence, user can jump from one document to another simply by clicking on hot spots or hyperlinks. There are several applications called Web browsers that make it easy to access the World Wide Web like Mozilla Firefox, Google chrome and Microsoft’s Internet Explorer.

Web servers are computer systems with web server software running on them and having web sites or information in the form of web pages, which is accessible over internet.

User locates the server, the specific web page, and the protocol to get data from server by using DNS (getting server’s IP address from the server’s name) and HTTP (used for web page reply and request and hyper linking).

HTTP (Hyper Text Transfer Protocol), HTTPS & SSL

HyperText Transfer Protocol or HTTP is the protocol used by the World Wide Web and defined by RFC 2616. It specify message formatting and transmission with actions Web servers and browsers should take in response to various commands.

An HTTP session is a sequence of network request-response transactions. An HTTP client or user sends a request by establishing a Transmission Control Protocol (TCP) connection to a particular port on a server (port 80). An HTTP server listening on that port waits for a client’s request message. Upon receiving the request, the server sends back a status line, such as “HTTP/1.1 200 OK”, and a message of its own. The body of this message is typically the requested resource, although an error message or other information may also be returned.

HTTP defines several commands and responses and the most frequent the HTTP GET request with the filename, is sent from client to get a file from a web server. Server confirms by sending an HTTP GET response with a return code of 200 (meaning “OK”) and the file’s contents. HTML specifies Web pages formatting and display. HTTP is a stateless protocol. A stateless protocol does not require the HTTP server to retain information or status about each user for the duration of multiple requests. However, some web applications implement states or server side sessions using one or more of the following methods

HTTPS

Hypertext Transfer Protocol Secure (HTTPS) is used for secure communication on Internet. It is layering addition of the HTTP on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. HTTPS provides authentication of the web site and associated web server communicating with. It provides bidirectional encryption of communications between a client and server. HTTPS encrypts the HTTP protocol including the request URL, query parameters, headers, and cookies.

Internet Terms (Hypertext, URL, Domain Name)

The World Wide Web (WWW) is a subset of the Net–a collection of interlinked documents that work together using a specific Internet protocol called Hypertext Transfer Protocol (HTTP). Web pages are written in Hypertext Markup Language (HTML), which tells the Web browser what to display. The significant feature of the Web is its ability to link pages to one another. Just click a link, and you’re at a Web site on the other side of the world hence, this moving around by clicking is called as ‘Surfing’.

Hypertext

Hypertext is text which contains links to other texts. Linking to objects whether text, pictures, music, programs, and so on can be creatively linked to each other. The hypertext pages are activated by a mouse click, key press sequence or by touching the screen.

URL

Uniform Resource Locator (URL) is the global address of documents and other resources on the World Wide Web. On the web, each web page has the URL which is in the address bar of browser as illustrated.

Some key parts to the URL are the protocol, the domain name and the file path.

Protocol – It is usually the “http”, followed by “://”, though it can be “https”, “ftp”, or other things. It is the method to get the information from a server. Web pages use the Hypertext Transfer Protocol (HTTP). It is the method how the information is given.

Hostname or Domain Name This is usually everything after “://” but before the next “/”, if there is one. It is usually the domain name. A hostname like “www.example.com” can be further broken down into the top-level domain (“com”), the domain name (“example.com”), and the sub domain (“www”). It is also called the host address and can also be a number called an IP address. All computers on Internet have an IP address which is a set of 12 digits separated by a period. A domain name is converted into IP address for getting the web page by a domain name server (DNS), which has directory of domain names and the corresponding IP addresses.

An organization can register for a domain name, selecting one of the top-level specifications mentioned above that describes it best, and then preceding it with a recognizable version of its name. For example, the ABC Software Systems company will have a domain name like abc.com. From there, it can divide itself into sub domains, extending the organization chart to department levels, or it can just give all of its computers names in the abc.com domain.

File Path – It is anything that appears after the “/” or after the hostname, but before a possible “?”. An example would be “games/images/display.html”. It can be quite long. It can have a filename (“display.html” in the previous example), or just be one or more directories (“games/images/” in that example). This denotes what file to display at that site. It always begins with a forward slash character and may consist of one or more directory names. It usually correspond to the directory structure of the web site

Every file on the Web has its URL to be accessed by web server and if a file has no URL, the web server will then

ISP (Internet Service Provider)

An ISP (Internet Service Provider) is a company which provides internet access to other companies or individuals. An ISP maintains connections to other networks and ISPs, acting as a router for internet traffic between a customer’s computer and any other machine also connected to the internet anywhere else in the world.

Web Browser

It is application software, which is used to locate, retrieve and also display content on the World Wide Web, including Web pages, images, video and other files. As a client/server model, the browser is the client run on a computer that contacts the Web server and requests information. The Web server sends the information back to the Web browser which displays the results on the computer or other Internet-enabled device that supports a browser.

Today’s browsers are fully-functional software which interpret and display HTML and HTML 5 Web pages, applications, JavaScript, AJAX and other content hosted on Web servers. Many browsers offer plug-ins which extends the capabilities of a browser like the flash plug-in.

Commonly used browsers are Mozilla Firefox from Mozilla Foundation with the latest release is version 21 and Internet Explorer from Microsoft and the latest release is version 11. Other major browsers include Google Chrome, Apple Safari and Opera.

A number of browsers are used to access the Web on a mobile device. These mobile browsers ( also called as “Microbrowser”) are optimized to display Web content on smaller mobile device screens and to also perform using less computing power and memory capacity compared to a desktop or laptop computers. Mobile browsers are typically “stripped down” versions of Web browsers and offer fewer features in order to run well on mobile devices.

Virtual Private Networks (VPN)

It is the extension of a private network having links across shared or public networks like the Internet. It enables data transfer between two nodes across a shared or public network in a manner that emulates the properties of a point-to-point private link by encapsulating or wrapping with a header that provides routing information allowing it to traverse the shared or public network and encrypted for confidentiality to make data indecipherable if intercepted. It uses the encryption keys. The part of VPN connection in which the private data is encapsulated is known as the tunnel. The portion of the connection in which the private data is encrypted is known as the virtual private network (VPN) connection.

VPN connects users to a remote network or connect multiple networks together or access resources on remote networks. VPN users get the impression of being directly connected to the central network via a point-to-point link. They are classified as

VPN uses following protocols for security

Firewalls

A firewall is used to help keep a network secure by controlling the incoming and outgoing network traffic after analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. It can either be software-based or hardware-based and it acts as a bridge between an internal network which is assumed secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions. Various criteria are used by firewall for data filtering as

The level of security setting for the firewall is based on security threats to be addressed as higher security level usually limits internet connectivity. There are several types of firewall techniques as

Firewalls also use a DMZ (demilitarized zone), which is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data.

Go back to Tutorial

Exit mobile version