You are on page 1of 32

UNDERSTANDING NETWORK PROTOCOLS

Archie Bianes Liezl Marie Lagrimas Irish Mae Lirio Karen Joy Samera

DEFINITION OF NETWORK PROTOCOLS


A

network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.

Packet Switching - any protocol that breaks files into packets.

EXAMPLES OF NETWORK PROTOCOL

HYPER TEXT TRANSFER PROTOCOL (HTTP)

is a method of transmitting the information on the web.

POST OFFICE PROTOCOL (POP)

is use to retrieve emails from the remote server over the TCP/IP connection.

INTERNET MESSAGE ACCESS PROTOCOL(IMAP)

is used to access the emails on the remote servers. The email messages are generally stored on the email server and the users generally retrieve these message whether by the web browser or email clients

POST OFFICE PROTOCOL VS. INTERNET MESSAGE ACCESS PROTOCOL

SIMPLE MAIL TRANSFER PROTOCOL (SMTP)

is a protocol that is used to send the email messages between the servers.

FILE TRANSFER PROTOCOL (FTP)

is used to transfer (upload/download) data from one computer to another over the internet or through computer network.

USER DATAGRAM PROTOCOL (UDP)

is a most important protocol of the TCP/IP suite and is used to send the short messages known as datagram.

DOMAIN NAMING SERVICE (DNS)

An Internet protocol and distributed database, provides more English like names for IP addresses.

TELNET

Is a protocol that allows for one machine to connect to another computer on the Internet.

WORLD WIDE WEB (WWW)

A protocol that uses hypertext accessed by using a browser.

links

and

TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)


-is the basic communication language or protocol of the Internet. Transmission Control Protocol(higher layer) -manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. Internet Protocol(lower layer) -handles the address part of each packet so that it gets to the right destination.

TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)

STANDARD PROTOCOL ARCHITECTURES


Two

approaches (standard)
Reference Model

OSI

never used widely but well known


TCP/IP

Protocol Suite

most widely used

OSI REFERENCE MODEL


Open

Systems Interconnection Reference model


provides a general framework for standardization defines a set of layers and services provided by each layer one or more protocols can be developed for each layer

Developed

by the International Organization for Standardization (ISO)


also published by ITU-T Telecommunications Union) (International

layered model
Seven layers seven has been presented as the optimal number of layer

Delivered

too late (published in 1984)

by that time TCP/IP started to become the de facto standard

Although

no OSI-based protocol survived, the model is still valid (in the textbooks)

OSI - THE LAYER MODEL


Each layer performs a subset of the required communication functions Each layer relies on the next lower layer to perform more primitive functions Each layer provides services to the next higher layer Changes in one layer should not require changes in other layers

THE OSI ENVIRONMENT

OSI LAYERS (1)

Physical Physical interface between devices Characteristics Mechanical - interface specs Electrical - voltage levels for bits, transmission rate Data Link Basic services: error detection and control, flow control at the link level (point to point) Higher layers may assume error free transmission Later a sub layer is added to Data Link Layer MAC (Medium Access Control) sub layer to deal with broadcast networks

OSI LAYERS (2)

Network

Transfer of information through communication network

network related issues

Network nodes (relays/routers) should perform switching and routing functions QoS (Quality of Service) and congestion control are also addressed in this layer Several other internetworking issues

e.g. differences in addressing, max. data length, etc.

Higher layers do not need to know about underlying networking technology Not needed on direct links

OSI LAYERS (3)


Transport

End to end exchange of data In sequence, no losses, no duplicates If needed, upper layer data are split into smaller units
Control of dialogues
whose turn to talk? Dialogue discipline (full-duplex, half-duplex)

Session

Checkpointing and recovery

OSI LAYERS (4)


Presentation

Data formats Data compression Encryption

Application

Support for various applications

RISKS
Availability Integrity Confidentiality

Access to personal information Could be high risk.

Degree of reliance on IT - Could be high risk.

Unauthorized access Could be high risk.

CONTROLS

Ensuring the confidentiality of data through the application of a cryptographic algorithm or a secret key. Assuring the integrity of data through the application of a message authentication code (MAC), checksum is sent with the data. Providing peer authentication to ensure that network traffic and data are sent from the expected host. Providing replay protection to assure that the same data is not delivered multiple times and that the data is delivered in an acceptable order. Providing traffic analysis protection by obscuring the identities of the endpoints and the size of the data. Providing access control by assuring that only authorized users can access particular network resources.

NETWORK PERFORMANCE AUDIT


Before conducting a network performance audit, internal auditors need to understand how the network operates. The best way to do this is by requesting a copy of the company's network diagram. In addition, auditors need to identify any critical business applications that reside within the network and the network components that support them, as well as determine each application's network bandwidth use.

Network

Bandwidth Use When assessing the application's network bandwidth use, the auditor should conduct a network traffic analysis that identifies:
The average amount of data flowing within the network (i.e., overall bandwidth use). The data's packet size distribution. The type of data flow within the network. The data's error rate.

1.

2. 3. 4.

NETWORK DEVICES CONFIGURATION


Auditors need to review the configuration of all network devices (e.g., routers and printer settings). When reviewing the configuration of network devices, auditors need to:

Check for routes that cause bandwidth choking or clogging of network traffic due to the use of only one gateway. Identify all network users and their level of network access. Determine if access control lists configured properly and are enabled. (ACLs) are

Identify whether network administrators are monitoring and tracking changes made to ACLs. Determine whether the company uses a switch port analyser or remote network monitoring specification. Identify if network administrators are tracking and limiting changes to the overall network.

NETWORK APPLICATIONS CONFIGURATION


In terms of reviewing the configuration of network applications, (e.g., determining whether the server application is excessively querying clients) auditors need to:
1.

First understand the importance and role of the network device within the organization's network topology. Be aware of best practices for network devices in general.

2.

3.

Identify whether each component and subcomponent of the network are missing, applied incorrectly, or used inappropriately.

END OF REPORT Thank you! :)

You might also like