Uploaded by Muhammad Mubarik Malik

CS Networking Presentation

advertisement
Networking
lolol
By Muhammad Mubarik
LAYERSS!!!!
• Layers are the building
blocks of all the networking
systems in the world.
• They divide the network
system into different
sections according to their
functions so that when a
problems rises in a
computer system, only a
single layer has to be dealt
with, not all of them.
• Layers are used in several
networking models, such as
the OSI model.
• Network, data link, and
physical usually correspond
to functions related to
hardware. Application,
presentation and session
usually correspond to
functions in a software
Amazing vid on layes:
https://www.youtube.com/watch?v=Ilk7UXzV_Qc
Advantages of layers
•
•
•
•
•
•
Easy to manage
Greater understanding of each layer
Common language for each layer
Makes protocol design easier
A manufacturer can focus on technologies of a particular layer
Products of different manufacturers can work together (data is transmitted
as 0’s and 1’s and can therefore be reassembled in a suitable form)
• Technology advances of a layer are independent of technology
advancements of other layers (wireless technology advances are not
dependent on advances of media format compression (GIF)
• Chilling on the weekend like usual
• Watch spongebob and scooby dooby doo
• She took the wires to my play station she doing too much
• I didn’t wipe my but I just pooped and got up
VPN
VPN?!?!
• A virtual private network makes a tunnelled network connection
through the internet or any other public network. It is considered
ideal for establishing a secure connection between private networks
with remote users and remote sites.
• A VPN enabled a device to exchange data across the internet as if it
was directly connected to a private network.
• Users can use a VPN to access data, files, databases and resources
that are stored in their compiler at work from their compiler at home.
VPN users can exchange data maintaining privacy through the use of a
tunnelling protocol and various security procedures.
How to setup a VPN
Requirements:
Hardware and software requirements• Internet Access
• VPN Softwares (client side and server side).
• VPN Routers
• VPN Appliances (network device with enhanced security features)
• VPN Concentrators (a single device to handle a large number of incoming
VPN tunnels)
• VPN Servers
VPN Tunneling: Process by which VPN packets reach their intended
destination.
Securing a VPN is necessary since all the traffic on the VPN must be
encrypted, authenticated, and then sent along virtual tunnels.
Secure VPN Technologies:
1. Internet Protocol Security Protocol (IPSec). This system functions in
both transport and tunnel mode. It allows the secure transmission
of data over public IP-based networks. It uses standards encryption
algorithm to provide confidentiality.
2. Secure Sockets Layer (SSL) 3.0 or Transport Layer Security (TLS) with
encryption. VPNs based on these technologies are much simpler
than IPSec based VPNs. The yse of this technology does not require
special client software because all web servers and web browsers
support this method of providing a VPN.
• All traffic on the VPN relies on the security of a provider’s network to
protect the network. Modern service providers office different
solutions which can generally be seperated into 2 layer solutions and
3 layer solutions. Some examples of trusted 2 layer solutions are
Asynchronous Transfer Mode circuits and Frame Relay Circuits.
• There is also a Hybrid VPN system in which both secure and trusted
technologies are used.
Different Types of VPNs
• Site to Site VPN:
Between different sites.
VPN gateways are used.
• Remote Access VPN:
Connects individual
host to private
networks and facilitates
teleworkers who need
to access their
company’s network
securely using the
internet. Every host has
VPN client software
installed.
Advantages of a VPN
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Easier Communication.
More secure internet connections (useful for corporate world).
Decreases operational costs versus traditional Wide Area Networks.
Employees can work remotely.
Extends inclusivity to individuals in geographically restrained areas.
Offers the flexibility to employees to take advantage of the company’s Intranet over an existing internet
connection.
Offers global networking opportunities.
Reduces environmental footprint.
If you fall in love with a girl who lives in Iceland, then you can change your location to Iceland and make her
believe that you guys have a chance of a future. Only until you both video call and turns out she’s from
Nigeria as she was also using a VPN. Shes also not white (negative social impact; Increases misinformation).
Accessing webpages which are restricted in your country due to socio-ethnic reasons.
Watching The Vampire Diaries on Netflix America (increases accessibility to certain contents).
Participating in a global drug trade such as the hard crack trade. (does soft crack even exist anymore??). This
has a major negative impact on the political state of the world as the exchange of sensitive materials such as
hard crack decreases productivity. This can enable a digitalised modern day opium trade such as the one in
1839.
It helps hackers mask their actual location when hacking large corporations.
Nefarious purposes.
• Thanks
• Informative Vid on How to Set up a VPN (with reference to IB
Computer Science Syllabus):
https://www.youtube.com/watch?v=BBJa32lCaaY
Download