INTERNET FUNDAMENTALS

38

Transcript of INTERNET FUNDAMENTALS

Page 1: INTERNET FUNDAMENTALS
Page 2: INTERNET FUNDAMENTALS

HISTORY OF INTERNET ARPANET

WWW

(World Wide Web)

Search Engines

FTP (File Transfer Protocol)

Social Networking

Page 3: INTERNET FUNDAMENTALS

ARPANETThe Advanced Research Projects Agency Network (ARPANET) was the network that became the basis and technical foundation of the internet . ARPANET was initially funded by the Advance Research Projects Agency (ARPA) of the United States Department of Defence in the 1970s . The initial purpose was to communicate and share computer resources among mainly scientific users at the connected institutions. In the late 1970s the development of the TCP/IP protocols made it possible to expand the size of the network, which now had become a network of networks, in an orderly way.World Wide WebThe World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the internet. English scientist Tim Berners Lee invented the World Wide Web in 1989. He wrote the first web browser computer program in 1990 while employed at CERN in Switzerland.

Page 4: INTERNET FUNDAMENTALS

SEARCH ENGINESThe first few hundred web sites began in 1993 and most of them were at colleges, but long before most of them existed came Archie. The first search engine created was Archie, created in 1990 by Alan Emtage, a student at McGill University in Montreal.  SEARCH ENGINE is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERPs). The information may be a mix of web pages, images, and other types of files.

FILE TRANSFER PROTOCOL (FTP)The formal standard for FTP was published in RFC 765, File Transfer Protocol Specification, June 1980. This was the first standard to define FTP operation over modern TCP/IP. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server.

SOCIAL NETWORKINGSocial networking is the use of internet-based social media programs to make connections with friends, family, classmates, customers and clients. Social networking can occur for social purposes, business purposes or both through sites such as Facebook, Twitter, LinkedIn, Classmates.com and Yelp. Social networking is also a significant target area for marketers seeking to engage users.

Page 5: INTERNET FUNDAMENTALS

INTERNET MANAGEMENT

•Naming and Addressing• IP ADDRESSES:- An Internet Protocol address (IP address) is a numerical label assigned

to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: A name indicates what we seek. An address indicates where it is. A route indicates how to get there.

• GENERIC TOP LEVEL DOMAINS (gTLDS):-• A gTLD (generic top-level domain name) is the top-level domain name of an Internet address

that identifies it generically as associated with some domain class, such as .com (commercial), .net (originally intended for Internet service providers, but now used for many purposes), .org (for non-profit organizations, industry groups, and others),.edu (for educational institutions); and many other.

Page 6: INTERNET FUNDAMENTALS

• Shared Global Services and Operations

• ROOT SERVERS :-A root name server is a name server for the root zone of the Domain Name System (DNS) of the Internet. It directly answers requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for the appropriate top-level domain (TLD). The root name servers are a critical part of the Internet infrastructure because they are the first step in translating (resolving) human readable host names into IP addresses that are used in communication between Internet hosts.

• Country code Top Level Domains (ccTLDs):- A country code top-level domain (ccTLD) is an Internet top-level domain generally used or reserved for a country, sovereign state, or dependent territory identified with a country code. The ccTLD identifies a specific national domicile for an address. (For instance, .fr for France and .mx for Mexico.)

Page 7: INTERNET FUNDAMENTALS

TCP/IP• TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication

language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.

• TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination.

• TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network.

Page 8: INTERNET FUNDAMENTALS

INTERNET PROTOCOL(IP)

• The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.

• The Internet Protocol is responsible for addressing hosts and for routing datagrams (packets) from a source host to a destination host across one or more IP networks. For this purpose, the Internet Protocol defines the format of packets and provides an addressing system that has two functions: Identifying hosts and providing a logical location service.

Page 9: INTERNET FUNDAMENTALS

WIRELESS NETWORKING• Wireless networking is a method by which homes, telecommunications networks and

enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

 Wireless telecommunications networks are generally implemented and administered using radio communication.

WIRELESS NETWORK :-A wireless network is any type of computer network that uses wireless data connections for connecting network nodes. Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. Wireless networks use radio waves to connect devices such as laptops to the Internet, the business network and applications. When laptops are connected to Wi-Fi hot spots in public places, the connection is established to that business’s wireless network.

Page 10: INTERNET FUNDAMENTALS

Types of Wireless Network

Type Range Applications Standards

Personal area network (PAN) Within reach of a person Cable replacement for peripherals Bluetooth, ZigBee, NFC

Local area network (LAN) Within a building or campus Wireless extension of wired network IEEE 802.11 (WiFi)

Metropolitan area network (MAN) Within a city Wireless inter-network

connectivity IEEE 802.15 (WiMAX)

Wide area network (WAN) Worldwide Wireless network access Cellular (UMTS, LTE, etc.)

Page 11: INTERNET FUNDAMENTALS

PACKET SWITCHING • Packet switching is a digital networking communications method that groups all

transmitted data into suitably sized blocks, called packets, which are transmitted via a medium that may be shared by multiple simultaneous communication sessions. Packet switching increases network efficiency, robustness and enables technological convergence of many applications operating on the same network.

• Packets are composed of a header and payload. Information in the header is used by networking hardware to direct the packet to its destination where the payload is extracted and used by application software.

ORIGINAL MESSAGE IS

BROKEN INTO PARTS

ROUTED ACROSS A PATH THAT CAN BE MODIFIED AS

NEEDED

AT THE DESTINATION IT IS REASSEMBLED

Page 12: INTERNET FUNDAMENTALS

AN ANIMATION DEMONSTRATING DATA PACKET SWITCHING ACROSS A NETWORK

Page 13: INTERNET FUNDAMENTALS

CIRCUIT SWITCHING• A type of communications in which a dedicated channel (or circuit) is established for

the duration of a transmission. The most ubiquitous circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call.

• Circuit-switching systems are ideal for communications that require data to be transmitted in real-time. 

• Circuit-switching networks are sometimes called connection-oriented networks. Note, however, that although packet switching is essentially connectionless, a packet switching network can be made connection-oriented by using a higher-level protocol. TCP, for example, makes IP networks connection-oriented.

ORIGINAL MESSAGE

ROUTED ACROSS A PATH A FIXED

PATH

ORIGINAL MESSAGE

Page 14: INTERNET FUNDAMENTALS

DNS(Domain Name System)• The Domain Name System (DNS) maps internet domain names to the internet

protocol (IP) network addresses they represent and enables websites to use names, rather than difficult-to-remember IP addresses.

• A Domain Name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS).

Page 15: INTERNET FUNDAMENTALS

INTERNET SECURITY

Page 16: INTERNET FUNDAMENTALS

IDS(Intrusion Detection System)Intrusion Detection System (IDS) is a software used to determine if a

computer network or server has experienced an unauthorized intrusion. Intrusion is the illegal entry or unwelcome addition into the system.IDS detects these intrusion attempts so that action may be taken to repair the damage

later. IDS monitors network traffic and monitors for suspicious activity and alerts the system or

network administrator.

Page 17: INTERNET FUNDAMENTALS

How IDS works ?

• IDS works with a copy of the traffic. It can detect an attack and send an alert (and take other actions), but it cannot prevent the attack because it does not operate on traffic inline in the forwarding path.

Page 18: INTERNET FUNDAMENTALS

TYPES OF IDS

1. Host Based IDS

2. Network Based IDS

3. Stack Based IDS

4. Signature Based IDS

5. Anomaly Based IDS

Page 19: INTERNET FUNDAMENTALS

Host Intrusion Detection Systems (HIDS) are installed on the individual devices in the network.

HIDS analyzes the incoming and outgoing packets from a particular device.

HIDS is better than Network IDS as a comparison to detecting malicious activities for a particular device.

Fig. - Host Based IDS

HOST BASED IDS

Page 20: INTERNET FUNDAMENTALS

NETWORK BASED IDS

Network Intrusion Detection Systems (NIDS) are monitoring traffic at strategic points on the network.

IDS uses as a dedicated platform for use to analyze all the passing network traffic.

NIDS work with the network and analyses the ethernet packet to be decide to apply rules.

Fig. - Network Based IDS

Page 21: INTERNET FUNDAMENTALS

STACK BASED IDS

Stack IDS is a technology, which are integrated with the TCP/IP stack.

Stack Intrusion Detection System allows the IDS to be watching the packets, than IDS pull the packet from the stack before the os.

Fig. - Stack Based IDS

Page 22: INTERNET FUNDAMENTALS

SIGNATURE BASED IDS• IDS Signature detection work

well with the threads that are already determined or known.

• It implicates searching a series of bytes or sequence that are termed to be malicious.

• One of the most profitable point is that IDS Signatures are easy to apply and develop once you will figure out the sort of network behavior to be find out.

Fig. - Signature Based IDS

Page 23: INTERNET FUNDAMENTALS

ANOMALY BASED IDS Anomaly detection technique is a

centralized process that works on the concept of a baseline for network behavior.

This baseline is a description of accepted network behavior, which is learned or specified by the network administrators, or both.

It’s like a guard dog personally interviewing everyone at the gate before they are let down the drive.

Fig. - Anomaly Based IDS

Page 24: INTERNET FUNDAMENTALS

Intrusion prevention systems (IPS)o Intrusion prevention systems (IPS) also known as intrusion detection and prevention

systems (IDPS), are network security appliances that monitor network and system activities for malicious or harmful activity.

o The main objectives of intrusion prevention systems are:

Identification of malicious activity

Log information about said activity

Attempt to block/stop harmful activity

Report malevolent activity.

Page 25: INTERNET FUNDAMENTALS

How IPS works ?• IPS device operates

in inline mode i.e. because the IPS device is in the actual traffic path. This makes the device more effective against worms and atomic attacks (attacks that are carried out by a single packet).

Page 26: INTERNET FUNDAMENTALS

IPS’S DETECTION METHODS

Signature-based Detection This method of detection utilizes signatures of attack patterns that are

preconfigured and predetermined. A signature-based intrusion prevention system monitors the network traffic for

matches to these signatures. Once a match is found the intrusion prevention system takes the appropriate

action.

Statistical anomaly-based or Knowledge-based DetectionA statistical anomaly-based IDS determines normal network activity like what

sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other .

It alert the administrator or user and prevent malicious contents when anomalous(not normal) traffic is detected .

Page 27: INTERNET FUNDAMENTALS

Intrusion prevention systems can be classified into four different types: Network-based Intrusion Prevention System (NIPS):

It monitors the entire network for suspicious traffic by analysing protocol activity.

 In a NIPS, sensors are located at network borders of the network. Sensors capture all network traffic and analyses the content of individual packets for malicious traffic and prevents them.

Example: Snort (Snort is a free and open source network intrusion prevention system (NIPS) created by Martin Roesch in 1998.Snort is now developed by Source fire.)

Classifications of IPS

Page 28: INTERNET FUNDAMENTALS

Host-based intrusion prevention system (HIPS): It is an installed software package which monitors a single host for suspicious activity by analysing events occurring within that host.Example:  OSSEC ( OSSEC is a free, open source host-based intrusion Prevention system (IDS). It provides intrusion Prevention for most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows OS.)

Wireless intrusion prevention systems (WIPS):monitors a wireless network for suspicious traffic by analysing wireless networking protocols.

Network behaviour analysis (NBA):Examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware and policy violations.

CONTINUE…..

Page 29: INTERNET FUNDAMENTALS

VPN(Virtual Private Network)• What is a VPN ?

A technology that creates a network that is physically public, but virtually private.

VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.

A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.

Page 30: INTERNET FUNDAMENTALS

Types of VPNsRemote access VPN

Intranet VPN

Extranet VPN

Page 31: INTERNET FUNDAMENTALS

REMOTE ACCESS VPN

• A remote-access VPN allows individual users to establish secure connections with a remote computer network. • There are two components required in a remote-access VPN. The first

is a network access server(NAS).• The other required component of remote-access VPNs is client

software

Page 32: INTERNET FUNDAMENTALS

INTRANET VPN

• Intranet VPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.

• The benefits of an intranet VPN are as follows: - Reduces WAN bandwidth costs - Connect new sites easily

Page 33: INTERNET FUNDAMENTALS

Extranet VPN

• Extranet VPNs link customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure using dedicated connections. In this example, the VPN is often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e-commerce.

Page 34: INTERNET FUNDAMENTALS

VPN ADVANTAGES

• Security -- The VPN should protect data while it's traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it.

• Reliability --• Employees and remote offices should be able to connect to the VPN with no trouble at any time

(unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections.

• Cost Savings Eliminating the need for expensive long-distance leased lines Reducing the long-distance telephone charges for remote access. Transferring the support burden to the service providers Operational costs

Page 35: INTERNET FUNDAMENTALS

Disadvantages of VPN

VPNs require detailed understanding of network security issues and careful installation / configuration to ensure sufficient protection on a public network like the Internet.

The reliability and performance of an Internet-based VPN is not under an organization's direct control. Instead, the solution relies on an ISP and their quality of service.

Page 36: INTERNET FUNDAMENTALS

WEB CREATION & HOSTING

REGISTERING A DOMAIN NAME Select a Domain Registrar Check domain availability, register it providing domain owner

details Configure Name Server for your domain that contains the

host details for the domain or sub-domains.

HOSTING THE WEBSITE•Choose a hosting provider. You would get the IP address host computer.•Open DNS server settings that you used while registering the domain.•Map your domain and sub-domains to different hosts (IP Addresses) in DNS Server.

WEBSITE CREATION & HOSTING

Page 37: INTERNET FUNDAMENTALS

CREATE A SIMPLE WEB PAGE

UPLOADING CONTENT TO THE WEBSITE

ENABLING ONLINE PAYMENT

CONTINUE………..

Page 38: INTERNET FUNDAMENTALS