vault backup: 2024-10-16 09:12:37
This commit is contained in:
@@ -0,0 +1,49 @@
|
||||
# Module Structure
|
||||
|
||||
## T1
|
||||
|
||||
- Networking Fundamentals
|
||||
- Coursework 50%
|
||||
|
||||
## T2
|
||||
|
||||
- Focus on Security
|
||||
- Exam 50%
|
||||
|
||||
# MAC (Medium Access Control) Protocol
|
||||
|
||||
- Physical to NIC
|
||||
- Checks if packet is for current NIC
|
||||
- Does packet contain error?
|
||||
|
||||
# LANs
|
||||
|
||||
## Hub
|
||||
|
||||
- Passive Device, sees incoming signals on one port and retransmits same signals on all other outputs.
|
||||
- Half-Duplex
|
||||
- Broadcast
|
||||
- Doesn't need to understand what is transmitting
|
||||
|
||||
## Switch
|
||||
|
||||
- Where possible, retransmit signals to appropriate destination
|
||||
- Must understand packet format and extract destination address
|
||||
- Good switches can support multiple simultaneous conversations between disjoint pairs
|
||||
- Modern switches can support full-duplex communication
|
||||
|
||||
## Repeater
|
||||
|
||||
- Joins 2 identical LANs to form a larger LAN
|
||||
- Unintelligent, just retransmits
|
||||
- Repeater creates a "collision domain"
|
||||
|
||||
## Bridge
|
||||
|
||||
- Forms a single Logical LAN from 2 Physical LANs
|
||||
- Only retransmits packets on bridged LAN if necessary. (Reduces load, increases efficiency, allows parallelism)
|
||||
- Will use MAC protocol of dest network to ensure full retransmission.
|
||||
|
||||
## Router / Gateway
|
||||
|
||||
- Interconnects two different LANs to form a WAN
|
@@ -0,0 +1,83 @@
|
||||
# #ALOHA
|
||||
|
||||
Multiple access protocol for transmission of data via a shared network channel. Operated in the medium access control layer ( MAC layer ). Using this protocol, several data streams originating from multiple nodes are transferred through a multi-point transmission channel.
|
||||
Each node transmits a frame without trying to detect whether transmission channel is idle or busy. If channel is idle, frames are successful. If two frames occupy the channel simultaneously, collision of frames will occur and both will be discarded. These frames will then be retransmitted
|
||||
|
||||
1. Uses contention to manage access to bus
|
||||
- Sender transmits packet whenever they want
|
||||
- Wait for maximum RT propagation delay
|
||||
- If no ack, wait random time and resend
|
||||
2. Recipient ack valid packets and discards invalid packets
|
||||
3. Slotted ALOHA divides up channel into time slots ( equal in size to maximum packet transmission time )
|
||||
4. Sender can only start transmitting at a slot boundary
|
||||
- Prevents 2 packets that "just" overlap ( either 100% overlap or none )
|
||||
|
||||
# #CSMA/CD ( Carrier Sense Multiple Access with Collision Detection )
|
||||
|
||||
### Carrier Sense Multiple Access
|
||||
|
||||
- Check bus before transmission
|
||||
- If free, transmit
|
||||
- If not free, wait
|
||||
- for random time, and try again (non-persistent)
|
||||
- until bus is free (1-persistent)
|
||||
|
||||
### With Collision Detection
|
||||
|
||||
- If we notice someone else has started transmission soon after transmission, stop and wait
|
||||
- For a bus, unexpected voltage swings indicate collision
|
||||
- For a star, activity on more than one port indicates collision
|
||||
- Attenuation of voltages may make collisions harder to detect, standards like Ethernet set limits to cable length.
|
||||
|
||||
# #Ethernet
|
||||
|
||||
- Ethernet is a generic name for any product that implements IEEE 802.3
|
||||
- Originally 10Mbps (Manchester Encoding) using Bus topology, with a coax cable and BNC connectors
|
||||
- Then 100Mbps (4B5B Encoding) using a Star topology, with Cat5 or Cat6 (twisted-pair) cables and RJ-45 connectors.
|
||||
- Then 1Gbps (if twisted pair then 125MBaud, 8b/baud, full duplex over 4 twisted pairs)
|
||||
- Then 10Gbps (using fibre cables up to 40km) but only in p2p mode (so no collisions possible)
|
||||
- Every Ethernet card has a globally unique 48-bit address hard-coded into it, known as the MAC address. Blocks of addresses are allocated to the card manufacturer.
|
||||
|
||||
## Ethernet Packet Format
|
||||
|
||||
- 8B preamble (10101010\*7 10101011)
|
||||
- 6B - source addr
|
||||
- 6B - dest addr
|
||||
- 2B - data length
|
||||
- 0-1500B - data
|
||||
- 0-46B - padding
|
||||
- 4B - CRC
|
||||
- 12B - interframe gap
|
||||
- Ethernets "maximum" packet size is 1518 bytes (but not really with Jumbo Frames)
|
||||
- Ethernets minimum packet size is 64 bytes
|
||||
- 18 bytes overhead
|
||||
|
||||
# #WLAN
|
||||
|
||||
- Uses radio waves as transmission medium
|
||||
- Logically equivalent to Bus topology
|
||||
- One node transmits a broadcast, everyone receives it shortly after
|
||||
- Physically equivalent to Star topology
|
||||
- Through the AP in the "middle" is not creating a WLAN (like a hub / switch), but rather a bridge between WLAN and something else (usually wired, but phones may create a bridge from Wi-Fi to 4G)
|
||||
- Speed is usually slower than with LAN, but is catching up.
|
||||
|
||||
## 802.11
|
||||
|
||||
- Uses frequencies in the 2.4, 5, and 6GHz bands
|
||||
- Range of the order of 100 meters
|
||||
- Developing standard
|
||||
- 802.11a (54Mbps) and 802.11b (11Mbps) old, but legacy supported.
|
||||
- 802.11g (54Mbps) is a 2003 standard still widely used
|
||||
- 802.11n (300Mbps+) is more recent
|
||||
- Many more protocol subvariations
|
||||
- CSMA/CA - Carrier Sense Multiple Access with Collision Avoidance
|
||||
- Rather than Collision Detection
|
||||
- Radio Waves attenuate by the inverse square law. Therefore if you were to listen while transmitting in the CSMA/CD way, your own transmissions would dominate
|
||||
- It is possible a collision is not detectable
|
||||
|
||||
# #WAN
|
||||
|
||||
- LANs do not cope with large no. users.
|
||||
- CSMA/CD - more users implied more collisions, less efficiency and more delays
|
||||
- LANs do not cope with large geographic sizes
|
||||
- CSMA/CD - imposes limits on RTT
|
@@ -0,0 +1,22 @@
|
||||
# IPv4 Address
|
||||
|
||||
- 32-bit
|
||||
- 2^32 4,294,967,296 possible addresses under IPv4 - now ran out.
|
||||
- Can be referred to in binary, hex, octal, dotted decimal and decimal.
|
||||
- 10.10.10.10 (Dotted Decimal)
|
||||
- 00001010.00001010.00001010.00001010 (Decimal)
|
||||
- Structured to aid routing
|
||||
- Network Number (globally unique, find correct network)
|
||||
- Host Number (locally unique, find correct node)
|
||||
- ^ outdated
|
||||
- No. bits allocated to each part varies depending on how many host numbers needed (see: subnetting, netmask)
|
||||
- Nodes with the same network number are on same network, and vice versa.
|
||||
- Network number tells transmitter which case is true.
|
||||
|
||||
## Classful IP Addresses
|
||||
|
||||

|
||||
|
||||
- A and B have large address ranges.
|
||||
- Either need multiple network numbers, or use subnets to pretend you have multiple network numbers
|
||||
- One LAN per building, big network likely to be split into smaller networks. (Subnets)
|
52
Networking and Security/Week 3/Workshop 3 - Subnetting.md
Normal file
52
Networking and Security/Week 3/Workshop 3 - Subnetting.md
Normal file
@@ -0,0 +1,52 @@
|
||||
66.77.88.0/21
|
||||
01000010 01001101 01011|000 00000000
|
||||
01000010 01001101 0101|111 11111111
|
||||
Address Pool: 66.77.88.0 -> 66.77.95.255
|
||||
|
||||
| Subnet | Hosts | Addresses | Bits Required | Netmask | CIDR Netmask |
|
||||
| ------ | ----- | --------- | ------------- | --------------- | ------------ |
|
||||
| A | 23 | 25 | 5 | 255.255.255.224 | /27 |
|
||||
| B | 4 | 6 | 3 | 255.255.255.248 | /29 |
|
||||
| C | 18 | 20 | 5 | 255.255.255.224 | /27 |
|
||||
| D | 31 | 33 | 6 | 255.255.255.192 | /26 |
|
||||
| E | 73 | 75 | 7 | 225.255.255.128 | /25 |
|
||||
|
||||
Subnet E: 66.77.88.0/25
|
||||
Range: 66.77.88.1 - 66.77.88.126
|
||||
Broadcast: 66.77.88.127
|
||||
"Last" IP: 66.77.88.1
|
||||
|
||||
Subnet D: 66.77.88.128/26
|
||||
Range: 66.77.88.129 - 66.77.88.190
|
||||
Broadcast: 66.77.88.191
|
||||
"Last" IP: 66.77.88.129
|
||||
|
||||
Subnet A: 66.77.88.192/27
|
||||
Range: 66.77.88.193 - 66.77.88.222
|
||||
Broadcast: 66.77.88.223
|
||||
"Last" IP: 66.77.88.193
|
||||
|
||||
Subnet C: 66.77.88.224/27
|
||||
Range: 66.77.88.225 - 66.77.88.254
|
||||
Broadcast: 66.77.88.255
|
||||
"Last" IP: 66.77.88.225
|
||||
|
||||
Subnet B: 66.77.89.0/29
|
||||
Range: 66.77.89.1 - 66.77.89.7
|
||||
Broadcast: 66.77.89.8
|
||||
"Last" IP: 66.77.89.7
|
||||
|
||||
Free Space: 66.77.89.9
|
||||
End of Network: 66.77.95.254
|
||||
|
||||
Router IPs:
|
||||
1:
|
||||
A: 66.77.88.193
|
||||
B: 66.77.89.1
|
||||
C: 66.77.88.225
|
||||
2:
|
||||
C: 66.77.88.226
|
||||
D: 66.77.88.129
|
||||
3:
|
||||
D: 66.77.88.130
|
||||
E: 66.77.89.1
|
16
Networking and Security/Week 4/Lecture 8.md
Normal file
16
Networking and Security/Week 4/Lecture 8.md
Normal file
@@ -0,0 +1,16 @@
|
||||
| OSI | Internet 4 Layer | Protocols |
|
||||
| --------------------------- | ------------------- | --------------------------------------- |
|
||||
| Application<br>Presentation | Application | HTTP<br>SMTP<br>Telnet |
|
||||
| Session<br>Transport | Host2Host Transport | TCP, UDP |
|
||||
| Network | Internet | IP, ICMP |
|
||||
| Data Link<br>Physical | Network Access | PPP<br>IP-over-ADSL<br>IP-over-Ethernet |
|
||||
|
||||
# Internet Protocol version 4
|
||||
|
||||
- Connectionless packet oriented service
|
||||
- Unreliable service, no guarantee of delivery
|
||||
- Best effort, no error recovery
|
||||
|
||||
All packets routed independently
|
||||
- Routers examine destination IP address and choose best route to forward packet
|
||||
- Big packets fragmented, fragments routed separately
|
126
Networking and Security/Week 4/Workshop 4 - Routing.md
Normal file
126
Networking and Security/Week 4/Workshop 4 - Routing.md
Normal file
@@ -0,0 +1,126 @@
|
||||
|
||||
| ubnet | Hosts | Addresses | Bits Required | Netmask | CIDR Netmask |
|
||||
| ----- | ----- | --------- | ------------- | --------------- | ------------ |
|
||||
| A | 23 | 25 | 5 | 255.255.255.224 | /27 |
|
||||
| B | 4 | 6 | 3 | 255.255.255.248 | /29 |
|
||||
| C | 18 | 20 | 5 | 255.255.255.224 | /27 |
|
||||
| D | 31 | 33 | 6 | 255.255.255.192 | /26 |
|
||||
| E | 73 | 75 | 7 | 225.255.255.128 | /25 |
|
||||
Subnet E: 66.77.88.0/25
|
||||
Range: 66.77.88.1 - 66.77.88.126
|
||||
Broadcast: 66.77.88.127
|
||||
"Last" IP: 66.77.88.1
|
||||
|
||||
Subnet D: 66.77.88.128/26
|
||||
Range: 66.77.88.129 - 66.77.88.190
|
||||
Broadcast: 66.77.88.191
|
||||
"Last" IP: 66.77.88.129
|
||||
|
||||
Subnet A: 66.77.88.192/27
|
||||
Range: 66.77.88.193 - 66.77.88.222
|
||||
Broadcast: 66.77.88.223
|
||||
"Last" IP: 66.77.88.193
|
||||
|
||||
Subnet C: 66.77.88.224/27
|
||||
Range: 66.77.88.225 - 66.77.88.254
|
||||
Broadcast: 66.77.88.255
|
||||
"Last" IP: 66.77.88.225
|
||||
|
||||
Subnet B: 66.77.89.0/29
|
||||
Range: 66.77.89.1 - 66.77.89.7
|
||||
Broadcast: 66.77.89.8
|
||||
"Last" IP: 66.77.89.7
|
||||
Broadcast: 66.77.88.127
|
||||
"Last" IP: 66.77.88.1
|
||||
|
||||
Subnet D: 66.77.88.128/26
|
||||
Range: 66.77.88.129 - 66.77.88.190
|
||||
Broadcast: 66.77.88.191
|
||||
"Last" IP: 66.77.88.129
|
||||
|
||||
Subnet A: 66.77.88.192/27
|
||||
Range: 66.77.88.193 - 66.77.88.222
|
||||
Broadcast: 66.77.88.223
|
||||
"Last" IP: 66.77.88.193
|
||||
|
||||
Subnet C: 66.77.88.224/27
|
||||
Range: 66.77.88.225 - 66.77.88.254
|
||||
Broadcast: 66.77.88.255
|
||||
"Last" IP: 66.77.88.225
|
||||
|
||||
Subnet B: 66.77.89.0/29
|
||||
Range: 66.77.89.1 - 66.77.89.7
|
||||
Broadcast: 66.77.89.8
|
||||
"Last" IP: 66.77.Broadcast: 66.77.88.127
|
||||
"Last" IP: 66.77.88.1
|
||||
|
||||
Subnet D: 66.77.88.128/26
|
||||
Range: 66.77.88.129 - 66.77.88.190
|
||||
Broadcast: 66.77.88.191
|
||||
"Last" IP: 66.77.88.129
|
||||
|
||||
Subnet A: 66.77.88.192/27
|
||||
Range: 66.77.88.193 - 66.77.88.222
|
||||
Broadcast: 66.77.88.223
|
||||
"Last" IP: 66.77.88.193
|
||||
|
||||
Subnet C: 66.77.88.224/27
|
||||
Range: 66.77.88.225 - 66.77.88.254
|
||||
Broadcast: 66.77.88.255
|
||||
"Last" IP: 66.77.88.225
|
||||
|
||||
Subnet B: 66.77.89.0/29
|
||||
Range: 66.77.89.1 - 66.77.89.7
|
||||
Broadcast: 66.77.89.8
|
||||
"Last" IP: 66.77.89.7
|
||||
|
||||
Internet Connected Router = Y
|
||||
|
||||
Network
|
||||
Network Number
|
||||
Default Route
|
||||
A
|
||||
66.77.88.128/26
|
||||
66.77.88.129
|
||||
B
|
||||
66.77.89.0/29
|
||||
66.77.89.1
|
||||
C
|
||||
66.77.88.224/27
|
||||
66.77.88.225
|
||||
D
|
||||
66.77.88.128/26
|
||||
66.77.88.128
|
||||
E
|
||||
66.77.88.0/25
|
||||
66.77.88.189.7
|
||||
|
||||
Internet Connected Router =Y
|
||||
|
||||
Network
|
||||
Network Number
|
||||
Default Route
|
||||
A
|
||||
66.77.88.128/26
|
||||
66.77.88.129
|
||||
B
|
||||
66.77.89.0/29
|
||||
66.77.89.1
|
||||
C
|
||||
66.77.88.224/27
|
||||
66.77.88.225
|
||||
D
|
||||
66.77.88.128/26
|
||||
66.77.88.128
|
||||
E
|
||||
66.77.88.0/25
|
||||
66.77.88.1
|
||||
Internet Connected Router = Y
|
||||
|
||||
| Network | Network Number | Default Route |
|
||||
| ------- | --------------- | ------------- |
|
||||
| A | 66.77.88.128/26 | 66.77.88.129 |
|
||||
| B | 66.77.89.0/29 | 66.77.89.1 |
|
||||
| C | 66.77.88.224/27 | 66.77.88.225 |
|
||||
| D | 66.77.88.128/26 | 66.77.88.128 |
|
||||
| E | 66.77.88.0/25 | 66.77.88.1 |
|
Reference in New Issue
Block a user