Networking lolol By Muhammad Mubarik LAYERSS!!!! • Layers are the building blocks of all the networking systems in the world. • They divide the network system into different sections according to their functions so that when a problems rises in a computer system, only a single layer has to be dealt with, not all of them. • Layers are used in several networking models, such as the OSI model. • Network, data link, and physical usually correspond to functions related to hardware. Application, presentation and session usually correspond to functions in a software Amazing vid on layes: https://www.youtube.com/watch?v=Ilk7UXzV_Qc Advantages of layers • • • • • • Easy to manage Greater understanding of each layer Common language for each layer Makes protocol design easier A manufacturer can focus on technologies of a particular layer Products of different manufacturers can work together (data is transmitted as 0’s and 1’s and can therefore be reassembled in a suitable form) • Technology advances of a layer are independent of technology advancements of other layers (wireless technology advances are not dependent on advances of media format compression (GIF) • Chilling on the weekend like usual • Watch spongebob and scooby dooby doo • She took the wires to my play station she doing too much • I didn’t wipe my but I just pooped and got up VPN VPN?!?! • A virtual private network makes a tunnelled network connection through the internet or any other public network. It is considered ideal for establishing a secure connection between private networks with remote users and remote sites. • A VPN enabled a device to exchange data across the internet as if it was directly connected to a private network. • Users can use a VPN to access data, files, databases and resources that are stored in their compiler at work from their compiler at home. VPN users can exchange data maintaining privacy through the use of a tunnelling protocol and various security procedures. How to setup a VPN Requirements: Hardware and software requirements• Internet Access • VPN Softwares (client side and server side). • VPN Routers • VPN Appliances (network device with enhanced security features) • VPN Concentrators (a single device to handle a large number of incoming VPN tunnels) • VPN Servers VPN Tunneling: Process by which VPN packets reach their intended destination. Securing a VPN is necessary since all the traffic on the VPN must be encrypted, authenticated, and then sent along virtual tunnels. Secure VPN Technologies: 1. Internet Protocol Security Protocol (IPSec). This system functions in both transport and tunnel mode. It allows the secure transmission of data over public IP-based networks. It uses standards encryption algorithm to provide confidentiality. 2. Secure Sockets Layer (SSL) 3.0 or Transport Layer Security (TLS) with encryption. VPNs based on these technologies are much simpler than IPSec based VPNs. The yse of this technology does not require special client software because all web servers and web browsers support this method of providing a VPN. • All traffic on the VPN relies on the security of a provider’s network to protect the network. Modern service providers office different solutions which can generally be seperated into 2 layer solutions and 3 layer solutions. Some examples of trusted 2 layer solutions are Asynchronous Transfer Mode circuits and Frame Relay Circuits. • There is also a Hybrid VPN system in which both secure and trusted technologies are used. Different Types of VPNs • Site to Site VPN: Between different sites. VPN gateways are used. • Remote Access VPN: Connects individual host to private networks and facilitates teleworkers who need to access their company’s network securely using the internet. Every host has VPN client software installed. Advantages of a VPN • • • • • • • • • • • • • • Easier Communication. More secure internet connections (useful for corporate world). Decreases operational costs versus traditional Wide Area Networks. Employees can work remotely. Extends inclusivity to individuals in geographically restrained areas. Offers the flexibility to employees to take advantage of the company’s Intranet over an existing internet connection. Offers global networking opportunities. Reduces environmental footprint. If you fall in love with a girl who lives in Iceland, then you can change your location to Iceland and make her believe that you guys have a chance of a future. Only until you both video call and turns out she’s from Nigeria as she was also using a VPN. Shes also not white (negative social impact; Increases misinformation). Accessing webpages which are restricted in your country due to socio-ethnic reasons. Watching The Vampire Diaries on Netflix America (increases accessibility to certain contents). Participating in a global drug trade such as the hard crack trade. (does soft crack even exist anymore??). This has a major negative impact on the political state of the world as the exchange of sensitive materials such as hard crack decreases productivity. This can enable a digitalised modern day opium trade such as the one in 1839. It helps hackers mask their actual location when hacking large corporations. Nefarious purposes. • Thanks • Informative Vid on How to Set up a VPN (with reference to IB Computer Science Syllabus): https://www.youtube.com/watch?v=BBJa32lCaaY