Netwoking 1
Netwoking 1
Resolver:
Role: Acts as a DNS client, sending mapping requests to DNS servers.
Process:
o Queries the local DNS server.
o If the local server cannot resolve the query, it refers the resolver to other
servers.
o The resolver checks the response and delivers the result to the requesting
process.
Mapping Names to Addresses:
Process:
o For generic domains: The resolver sends a query to the local DNS server. If
unresolved locally, the query is referred to other servers.
o For country domains: The process is similar.
Mapping Addresses to Names:
PTR Query:
Client sends an IP address to be mapped to a domain name.
DNS uses the inverse domain, reversing the IP address and appending "in-addr.arpa".
Local DNS resolves the query.
Resolution Types:
1. Recursive Resolution:
o Process:
Client requires the local server to provide the requested mapping or
an error message.
Query forwarded from local DNS to root name server, then to top-
level domain server, and so on until resolved.
Response travels back through the chain to the client.
2. Iterative Resolution:
o Process:
Each server that cannot resolve the query sends the IP address of the
next server.
The client repeats the query to each referred server until the mapping
is resolved.
Caching Mechanism:
Function: Speeds up resolution by storing mapping information in cache memory.
Issue: Cached mappings can become outdated; servers must periodically purge
expired entries.
Comparison of Iterative and Recursive Resolution:
Query Each server sends the IP Only the local server sends
Propagation address of the next server the query to the next server
Cache Usage Lower cache hit rate Higher cache hit rate
Property Iterative Resolution Recursive Resolution
Key Components:
1.DHCP Server: Manages IP addresses and configuration information.
2.DHCP Client: Device receiving configuration from the server.
3. DHCP Relay: Communicates between clients and server.
4.IP Address Pool: Range of IP addresses managed by the server.
5. Subnets: Smaller network segments for traffic management.
6. Lease: Duration for which an IP address is assigned to a device.
7.DNS Servers and Default Gateway: Additional configurations provided by DHCP.
8.Options: Additional settings like subnet mask, domain name, and time server
information.
DHCP Operation (DORA Process):
1. DHCP Discover: Client broadcasts to find DHCP servers.
2. DHCP Offer: Server responds with an available IP address.
3. DHCP Request: Client requests to lease the offered IP address.
4. DHCP Acknowledgment (ACK): Server confirms and assigns the IP address.
Additional DHCP Messages:
DHCP Negative Acknowledgment (NAK): Sent when the server cannot assign an IP
address.
DHCP Decline: Sent by the client if the offered IP address is already in use.
DHCP Release: Client releases the IP address back to the server.
DHCP Inform: Client requests additional configuration parameters without a new IP
address.
Security Considerations:
Limited IP Addresses: Prevent IP exhaustion from attacks.
Fake DHCP Servers: Protect against unauthorized servers providing incorrect IP
information.
DNS Access: Ensure proper network restrictions to prevent data access issues.
Advantages of DHCP:
Centralized management and automation of IP address assignment.
Simplifies adding new devices to the network.
Efficient IP address reuse and management.
Supports dynamic updates and failover for redundancy.
Disadvantages of DHCP:
Potential IP conflicts.
Clients may accept configurations from unauthorized servers.
Network access depends on the availability of a DHCP server.
6.PPTP VPN:
o Purpose: Uses Point-to-Point tunnelling Protocol for simple and
fast VPN connection.
o Security: Less secure due to weaker encryption.
7. L2TP VPN:
o Purpose: Uses Layer 2 tunnelling Protocol, often with IPSec for added
security.
o Security: More secure than PPTP but still has vulnerabilities.
OpenVPN:
o Purpose: Open-source, highly configurable, uses SSL/TLS for secure
connections.
o Security: Considered very secure with advanced features.
VPN Protocols:
1. IPSec (Internet Protocol Security):
Modes: Transport Mode (encrypts data packets) and tunnelling Mode (encrypts
entire packets).
2. L2TP (Layer 2 tunnelling Protocol):
Purpose: Often combined with IPSec for secure tunnelling.
3. PPTP (Point-to-Point tunnelling Protocol):
Purpose: Uses PPP for encryption; less secure compared to others.
4.SSL/TLS (Secure Sockets Layer / Transport Layer Security):
Purpose: Secures connections through web browsers; used for online transactions.
5.SSH (Secure Shell):
7.HTTP/HTTPS
Hypertext Transfer Protocol Secure (HTTPS):
Definition: HTTPS is a secure variant of HTTP, used for secure communication and
data transfer between a web browser and a website.
Purpose: Ensures the encryption of sensitive information like passwords and contact
details during transmission.
Differences between HTTP and HTTPS:
HTTP:
o Stands for Hypertext Transfer Protocol.
o URL begins with "http://".
o Works at the Application Layer.
o Faster speed.
HTTPS:
o Stands for Hypertext Transfer Protocol Secure.
o URL begins with "https://".
o Works at the Transport Layer.
o Slower speed due to encryption.
How HTTPS Works:
Communication: Establishes secure communication using SSL (Secure Socket Layer)
and TLS (Transport Layer Security).
Encryption: Adds a layer of SSL/TLS over the conventional HTTP protocol, ensuring
data is encrypted during transmission.
Secure Socket Layer (SSL):
Role: Ensures secure and reliable data transfer between communicating systems.
SSL Certificate: Uses a digital certificate to establish a secure communication link.
Encryption in HTTPS:
Private Key: Used for decryption, resides on the server-side, controlled by the
website owner.
Public Key: Used for encryption, accessible to all users communicating with the
server.
Advantages of HTTPS:
Secure Communication: Provides encryption during transmission.
Data Integrity: Ensures data cannot be read or modified if compromised.
Privacy and Security: Prevents attackers from passively accessing exchanged data.
Faster Performance: Encrypts data and reduces its size for faster transmission.
Network Address Translation (NAT) translates IP addresses to enable traffic from one host to appear
as if it's coming from another, solving various network issues with straightforward configuration.
Key Concepts:
1. Uses of NAT:
o Translation of Non-Unique to Unique Addresses: Common in household
routers for converting private internal addresses to public Internet addresses.
o Address Range Transition: Useful during company IP address reorganization
or mergers to handle overlapping addresses.
o TCP Load Sharing: Distributes traffic among multiple servers using a single
public address translated to several internal addresses in a round-robin
fashion.
2. Inside and Outside Addresses:
Inside Local Address: Address within the organizational network.
Inside Global Address: Internal address as seen from outside the network.
Outside Local Address: External address as seen within the organizational network.
Outside Global Address: External address as seen from outside the organizational
network.
3. NAT Types:
Static NAT: Maps a single internal address to a single external address.
Dynamic NAT: Maps an internal address (or addresses) to a pool of external
addresses.
Overloading (PAT): Multiple internal hosts share a single external address using
different port numbers.
Configuration Steps:
1. Static NAT Configuration:
o Enter global configuration mode.
o Configure static NAT translation.
o Configure the inside and outside NAT interfaces.
2. Dynamic NAT Configuration:
o Enter global configuration mode.
o Configure a dynamic NAT address pool.
o Define addresses to be translated using an access list.
o Configure the dynamic NAT translation.
o Configure the inside and outside NAT interfaces.
3. TCP Load Balancing Configuration:
o Enter global configuration mode.
o Configure the NAT address pool for load balancing.
o Define the virtual address using an access list.
o Configure TCP server load balancing.
o Configure the inside and outside NAT interfaces.
9.Firewall in Computer Network
What is a Firewall?
A network security device (hardware or software) that monitors and controls
incoming and outgoing traffic.
Acts as a barrier between a trusted internal network and untrusted external
networks.
Actions:
o Accept: Allows traffic.
o Reject: Blocks traffic and sends an “unreachable error” response.
o Drop: Blocks traffic with no response.
10 .3-way handshake
Explanation of the three-way handshake via TCP/IP:
Overview:
Audience: Individuals familiar with TCP/IP.
Topic: Process of TCP three-way handshake during connection establishment and
termination.
TCP Control Bits:
URG: Urgent Pointer field significant
ACK: Acknowledgment field significant
PSH: Push Function
RST: Reset the connection
SYN: Synchronize sequence numbers
FIN: No more data from sender
Scenarios for Three-Way Handshake:
1. Establishing a connection (active open).
2. Ending a connection (active close).
Connection Establishment (Three-Way Handshake):
1. Frame 1 (Client to Server):
o Client sends a SYN segment to the server.
o Details:
Sequence Number: Client's Initial Sequence Number (ISN) + 1.
Flags: SYN
Acknowledgment: 0
Option: Maximum Segment Size (MSS).
2.Frame 2 (Server to Client):