How the internet works
Contents
How do we connect to the internet?
DDOS stands for Distributed Denial of Service. A DDoS attack is used to slow down or completely deny service to a network or a website. A DDoS attack is achieved via botnets. A DOS attack is used when attacking a network or a system from only one computer. The aim of such attacks is to put a network or a website under such pressure that it cannot deal with it therefore is hugely slowed in service or completely denied of it. The impacts of DDoS is not data theft or loss of information, but to, as the name suggests, deny the access to service. This can still be just as effective because if an online company gets DDoS’ed, the customer might choose to switch providers because simply not affording to wait for the companies’ websites to come back up. There isn’t a way to completely prevent DDoS, but it is possible to make it much harder to DDoS you. Things like server load balancers, anti-DDoS programs or you might contact your ISP provider to reroute your traffic.
Cross site scripting. XSS is when a trusted website is injected with a malicious code, then the other end-users that download from the trusted website, will also download the malicious code, without the packets being checked as it is downloaded from a trusted web page. The injection is often done by sending untrusted information to the web page. For example, a web request. When the web request is sent, the code is inserted into the website if steps are not taken to prevent cross-site scripting. The effects of XSS often range from data theft, scamming and taking control of user’s session.
(downloading)
Drive-by download attacks is somewhat similar to XSS. A malicious code is embedded in the website, and when a user comes upon the website, the code starts scanning your system for security vulnerabilities. When one is found, the malware goes on to infiltrate your system and takes control of it. This might happen for a few reasons. You are often infiltrated because of outdated apps or chats. Firstly, you might not update your softwares enough or you might have plugins in your browser that you are unaware of.
An SQL injections alters the SQL statements in the web application through the attacker-supplied data. Improper construction of SQL statements or insufficient input can lead to being exposed to suck attacks. An SQL injection can result in data theft, loss of control of the website. SQL injections are rated the number one threat to web applications by OWASP.
Computer hackers look for vulnerabilities in the computer code(which makes your computer run) and break in. There are several reasons why a hacker might do so: To cause harm, steal information or simply for fun or practice.
Data theft means unauthorized copying or removal of information from other users or businesses. This can range from your confidential information from a nation-wide enterprise to who you text at 9 pm before going to sleep.
A brute force attack is a method used for data theft, in more detail to crack passwords. (brute force cracking), In a brute force attack, automated software’s are used to generate large amounts of guesses. Brute force attacks are used by hackers to crack encrypted data or to test the security of an organizations network.
The role of web architecture in website communications
In order to communicate with websites, the right web architecture must be in place. Without it, the users will be unable to connect to the internet and web servers would be unable to answer requests. The key architecture used by the web are:
Internet service provider (ISP)
An ISP, as the name suggests, provides you a connection to the internet. An Example of an ISP is BT, Virgin Media. Usually, a monthly payment would have to be issued in order to keep your connection. A router would be sent to you by the ISP in order to connect to the internet.
Web Hosting Services
Web hosting services are provided by companies that are dedicated for hosting websites on their servers. Buying their services would cost, but it would also allow our website to be accessed by everyone on the internet. Different packages exist for the payment, each include different storage amount or expected traffic load that would be handled.
Domain Structure
The web addresses can be broken down into different parts. Let’s take https://www.facebook.com/ as an example. (https://), (www.) and (facebook.com). This allows your web browser to determine what kind of a web site it is. The https protocol tells the browser that there should be a SSL certificate present.
Domain Name Registrars
Domain Name Registrars are companies in charge of selling domain names. These companies are accredited by the Internet Corporation for Assigned names and numbers (ICANN) or a national country code top-level domain. They would sell domains such as “.com” and “.org”.
World Wide Web
The World Wide Web is an information system on the internet that allows files to be connected to other files through hypertext links, allowing users to search for information by moving from one file to another.
TCP/IP Application layer protocols
“The Application layer provides applications with standardized data exchange. The protocols used are: Hypertext transfer protocol (HTTP), File transfer protocol (FTP), post office protocol 3 (POP3), Simple mail transfer protocol (STMP) and simple network management protocol (SNMP).“ –Task 1
I will explain what each of the protocols does.
Hypertext transfer protocol (HTTP)
This protocol is the underlying protocol used for the World Wide Web and the protocol defines how messages are formatted and transmitted along with what actions web servers and browsers should take under specific commands. An example would be: When you enter a URL into your web browser, it actually sends an HTTP command to the web server telling it to find and send the requested web page to the browser.
File Transfer Protocol (FTP)
File Transfer Protocol is a commonly used protocol for file exchange over the internet. FTP uses TCP/IP protocols to enable file transfer. It also uses client-server architecture, therefore functions similar to HTTP. FTP promotes sharing files over the internet via remote computers with reliable and efficient data transfer. FTP functions similar to HTTP because it transfers web pages from a server to user’s browser.
Post Office Protocol 3 (POP3)
The Post Office Protocol 3 is used to retrieve e-mails from the mail server. Most e-mail applications use POP3; however some might use the newer protocol, Internet Message Access Protocol (IMAP). There are two versions of POP, POP2 and POP3. POP2 was standard in the mid-80s and required he SMTP o send messages, however POP3 can function with or without SMTP.
Simple Mail Transfer Protocol (SMTP)
This protocol is used to send e-mail messages between servers. Most e-mail systems use SMTP when sending mail over the internet. The e-mails sent can be retrieved by mail clients using POP/IMAP. Furthermore, SMTP is generally used to send mail from the mail client to the mail server that is why you need to specify both POP and IMAP server and the SMTP server when you configure your e-mail client.
Simple Network Management Protocol (SNMP)
SNMP is a commonly used protocol for network management. It is a suite of protocols that are supported by many devices such as routers, servers or printers. Supported devices are all network-attacked and must be monitored to detect conditions. The conditions need to be addressed for proper, ongoing network and appropriate administration.
Short explanation for OSI 7 layer model
Layer 7 – Application
This layer supports application and end-user processes. This is things like e-mails and web browsers.
Layer 6 – Presentation
The presentation level is responsible for organization of data into a format that can be used by humans.
Layer 5 – Session
This layer allows you to have a multiple browsers and resources open simultaneously without data conflicts in transmission.
Layer 4 – Transport
This layer is the firewall layer. Four switches operate at this level.
Layer 3 – Network
Logical address for a server or work station is managed here. Common protocol is TCP/IP. Routing takes place at this level.
Layer 2 – Data link
Physical address, MAC (Media Access Control) used to identify the device. Frame relay is used here.
Layer 1 – Physical
Cables/Wireless. Encoding bits of data.
OSI model and TCP/IP
Reference: http://fiberbit.com.tw/tcpip-model-vs-osi-model/
Comparing the upper layers
OSI, The session layer allows two stations to hold an ongoing communication channel called a session across the network. However, in TCP/IP, this is not found, its characteristics are provided by the TCP protocol, in the transport layer.
The presentation layer is responsible for data format information for networked communications. It is done by converting data into a human-understood format, so that it is more useful for both sides. This is not found in TCP/IP, in TCP/IP, this function is provided by the Application layer.
Application layer is the top layer of the OSI model. It provides a suite of interfaces for applications to get access to networked services as well as access to the network services that support applications directly. Although the notion of an application process is common to both of them, their approach to constructing application entities is different.
Their approach
ISO Approach
In this model, it is sometimes called the Horizontal approach. OSI asserts that distributed applications work over a strict hierarchy of layers and are constructed from a common tool kit of standardized applications. Each distributed application service selects functions from a large common toolkit of application service element (ASEs) and complements these with application service elements that carry out the specific functions for the end-user service.
TCP/IP Approach
It is sometimes called the Vertical approach. In TCP/IP, each application entity is composed of whatever suite of functions it requires beyond end to end transport to support a distributed communications service. Many of these application processes builds on what it requires and assumes only that an underlying transport mechanism (datagram or connection) will be provided.
Transport layer
The functionality of the transport layer is to provide “transparent transfer of data from a source end open system to a destination end open system” (ISO / IEC 7498: 1984).
Transport is responsible for maintaining and creating the basic end-to-end connection between communication open systems, ensuring that the bits delivered to the receiver are the exact same as the bits transmitted by the sender; in the exact same order and without having been modified, duplicated or being lost.
OSI Transport layer
It consumes the information to be sent and breaks it into individual packets that are sent and put back together into a complete message by the Transport layer at the receiving machine. Also, it is the transport layer’s job to provide a signaling service for the remote node so that the sending node is notified when its data is received successfully by the receiving node. Transport layer protocols include the ability to acknowledge the receipt of a packet; if no acknowledgement is received, the Transport layer protocol can retransmit the packet or time-out the connection and signal an error. Also, transport protocols can mark packets with sequencing information so that the destination machine can properly order the packets if they’re received out-of-sequence. Furthermore, Transport protocols provide facilities for insuring the integrity of packets and requesting retransmission should the packet become stuck when routed.
TCP/IP transport layer
The TCP/IP transport layer defines two standard transport protocols: TCP and UDP, TCP provides a reliable data-stream transmission and UDP is useful in many applications. Main difference between the two, is that UDP does not necessarily provide reliable data-stream transmission. TCP is also responsible for recovering data by providing a sequence of numbers with each packet that it sent, it requires acknowledgement to ensure correct data was recovered. Packets may be retransmitted if errors were detected.
Comparison of both models
UDP and TCP features defined for TCP/IP transport layer corresponds to many of the requirements in the OSI transport layer. However, there is a little bit of a bleed over for requirements in the session layer of OSI because of sequence numbers and port values can help to allow the operating system to keep track of sessions, but many of the TCP and UP functions and specifications from the TCP/IP , map to the OSI transport layer. The TCP/IP and OSI architecture models both employ all connection and connectionless models at transport layer. However, the internet architecture refers to the two models in TCP/IP by the simple terms “connections” and datagrams. But the OSI reference model, with its liking of the “precise” terminology, uses the terms connection-mode and connection-oriented for the connection model and the term connectionless-mode for the connectionless model.
Impacts of DDoS – https://www.globalsign.com/en/blog/denial-of-service-in-the-iot/ (Accessed October 2017)
Ways to prevent DDoS – https://www.tripwire.com/state-of-security/security-awareness/defending-your-network-against-ddos-attacks/ (Accessed October 2017)
What is Cross-site Scripting https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) (Accessed October 2017)
SQL injection https://www.cisco.com/c/en/us/about/security-center/sql-injection.html (Accessed October 2017)
IP address https://www.techopedia.com/definition/2435/internet-protocol-address-ip-address (Accessed November 2017)
Static and dynamic IP http://whatismyip.network/static-ip-vs-dynamic-ip-difference/ (Accessed November 2017)
TCP/IP http://searchnetworking.techtarget.com/definition/TCP-IP (Accessed November 2017)
Web servers http://whatis.techtarget.com/definition/Web-server (Accessed November 2017)
Task 3 https://ryanbibbyproject5.wordpress.com/2015/09/18/task-1-1-web-architecture/
HTTP https://www.webopedia.com/TERM/H/HTTP.html (Accessed November 2017)
FTP https://www.webopedia.com/TERM/F/ftp.html (Accessed November 2017)
POP3 https://www.webopedia.com/TERM/P/POP2.html (Accessed November 2017)
SMTP https://www.webopedia.com/TERM/S/SMTP.html (Accessed November 2017)
SNMP https://technet.microsoft.com/en-us/library/cc776379(v=ws.10).aspx (Accessed November 2017)
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more