Network Security
Network Security
Network Models:
A network model defines the architecture of a network and how devices
communicate. The two primary models are:
1. OSI Model: 7 layers (Physical, Data Link, Network, Transport,
Session, Presentation, Application) defining standardized
communication.
2. TCP/IP Model: 4 layers (Network Access, Internet, Transport,
Application) designed for practical implementation in the internet.
Cryptography:
The practice of securing communication by encoding data to protect it
from unauthorized access.
Types of Cryptography:
1. Symmetric Key Cryptography: Uses a single shared key for both
encryption and decryption (e.g., AES, DES).
2. Asymmetric Key Cryptography: Uses a public key for encryption
and a private key for decryption (e.g., RSA, ECC).
3. Hash Functions: Produces a fixed-length hash value from data for
integrity verification (e.g., SHA, MD5).
Network Devices:
1. Router: Connects multiple networks and routes data packets
between them.
2. Switch: Connects devices in a LAN and forwards data based on
MAC addresses.
3. Hub: Broadcasts data to all devices in a network; less efficient than
a switch.
4. Modem: Converts digital signals to analog for internet access and
vice versa.
5. Access Point: Provides wireless connectivity to devices in a
network.
6. Firewall: Protects the network by filtering incoming and outgoing
traffic.
Congestion Control:
Congestion control manages network traffic to prevent overloading and
ensure efficient data transfer by avoiding congestion, packet loss, and
delays.
Methods:
1. Slow Start: Gradually increases the sending rate until congestion is
detected.
2. Congestion Avoidance: Adjusts the rate based on network
conditions to avoid congestion.
3. Fast Retransmit & Recovery: Quickly retransmits lost packets
and recovers from congestion.
4. AIMD (Additive Increase/Multiplicative Decrease): Increases
the rate slowly and decreases it quickly when congestion occurs.
5. ECN (Explicit Congestion Notification): Routers signal
congestion, allowing senders to adjust their rates without packet loss.
Types of Ciphers:
1. Substitution Cipher: Each element of the plaintext is replaced by
another (e.g., Caesar Cipher).
2. Transposition Cipher: The positions of characters in the plaintext
are rearranged (e.g., Rail Fence Cipher).
3. Stream Cipher: Encrypts data one bit or byte at a time (e.g., RC4).
4. Block Cipher: Encrypts data in fixed-size blocks (e.g., AES, DES).
5. Hybrid Cipher: Combines both symmetric and asymmetric
encryption (e.g., RSA with AES).
Classful Addressing:
Classful addressing divides IP address space into fixed classes (A, B, C,
etc.) with predefined subnet masks, leading to inefficient IP address
allocation.
Multiplexing:
Multiplexing is a technique used to combine multiple signals or data
streams into one shared medium or channel, allowing efficient use of
resources and reducing the need for multiple transmission lines.
Types of Multiplexing:
1. Time Division Multiplexing (TDM): Allocates specific time slots
to each signal.
2. Frequency Division Multiplexing (FDM): Divides the available
bandwidth into frequency bands, each carrying a separate signal.
3. Wavelength Division Multiplexing (WDM): Similar to FDM, but
used in optical fiber communications by multiplexing different light
wavelengths.
4. Code Division Multiplexing (CDM): Uses unique codes to
distinguish multiple signals transmitted over the same channel.
Network Delays:
Network delays refer to the time it takes for data to travel from the
sender to the receiver across a network. These delays can occur due to
various factors in the transmission process.
In-Order Delivery:
In-order delivery ensures that data packets are delivered to the receiver
in the same sequence in which they were sent, maintaining the correct
order of transmission.
Key Points:
• Used in protocols like TCP to guarantee that all packets are
received in the correct order.
• Ensures reliable communication, preventing data corruption or
confusion.
• If packets arrive out of order, they are buffered and reassembled in
the correct sequence before being delivered to the application.
Network:
A network is a collection of interconnected devices (computers, servers,
routers) that communicate with each other to share resources and
information. It can be local (LAN) or span larger areas (WAN).
Internet:
The internet is a global network of networks that connects millions of
private, public, academic, business, and government networks. It enables
worldwide communication and access to services like the web, email, and
file sharing.