Unit-V CN
Unit-V CN
Organization of Domain
It is Very difficult to find out the ip address associated to a website because there are
millions of websites and with all those websites we should be able to generate the ip
address immediately,
there should not be a lot of delay for that to happen organization of database is very
important.
DNS record – Domain name, ip address what is the validity?? what is the time to live
?? and all the information related to that domain name. These records are stored in tree
like structure.
The host request the DNS name server to resolve the domain name. And the name
server returns the IP address corresponding to that domain name to the host so that the
host can future connect to that IP address.
The client machine sends a request to the local name server, which , if root does not
find the address in its database, sends a request to the root name server , which in turn,
will route the query to an intermediate or authoritative name server. The root name
server can also contain some hostName to IP address mappings . The intermediate name
server always knows who the authoritative name server is. So finally the IP address is
returned to the local name server which in turn returns the IP address to the host.
Dynamic Domain Name Space or System (DDNS)
When DNS (Domain Name System) was designed, nobody expected that there would be so
many address changes such as adding a new host, removing a host, or changing an IP address.
When there is a change, the change must be made to the DNS master file which needs a lot of
manual updating and it must be updated dynamically.
Dynamic Domain Name System (DDNS) :
It is a method of automatically updating a name server in the Domain Name Server (DNS),
often in real-time, with the active DDNS configuration of its configured hostnames, addresses,
or other information. In DDNS, when a binding between a name and an address is determined,
the information is sent, usually by DHCP (Dynamic Host Configuration Protocol) to a primary
DNS server.
The primary server updates the zone. The secondary servers are notified either actively or
passively. Inactive notification, the primary server sends a message to secondary servers,
whereas, in the passive notification, the secondary servers periodically check for any changes.
In either case, after being notified about the change, the secondary requests information about
the entire zone (zone transfer).
DDNS can use an authentication mechanism to provide security and prevent unauthorized
changes in DNS records.
Advantages :
1. It saves time required by static addresses updates manually when network configuration
changes.
2. It saves space as the number of addresses are used as required at one time rather than using
one for all the possible users of the IP address.
3. It is very comfortable for users point of view as any IP address changes will not affect any
of their activities.
4. It does not affect accessibility as changed IP addresses are configured automatically against
URL’s.
Disadvantages :
Disadvantages :
1. It is less reliable due to lack of static IP addresses and domain name mappings.
2. Dynamic DNS services alone can not make any guarantee about the device you are
attempting to connect is actually your own.
Uses :
1. It is used for Internet access devices such as routers.
2. It is used for for security appliance manufacturers and even required for IP-based security
appliances like DVRs.
TELNET:
TELNET stands for TErminaL NETwork. It is a type of protocol that enables one computer to
connect to local computer. It is a used as a standard TCP/IP protocol for virtual terminal
service which is given by ISO. Computer which starts connection known as the local
computer. Computer which is being connected to i.e. which accepts the connection known
as remote computer. When the connection is established between local and remote computer.
During telnet operation whatever that is performing on the remote computer will be displayed
by local computer. Telnet operates on client/server principle. Local computer uses telnet client
program and the remote computers uses telnet server program.
TELNET Commands :
Commands of the telnet are identified by a prefix character, Interpret As Command (IAC)
which is having code 255. IAC is followed by command and option codes. Basic format of the
command is as shown in the following figure :
Default Mode :
If there is no other modes are invoked then this mode is used.
Echoing is performed in this mode by client.
In this mode, user types a character and client enchoes the character on the screen but it
does not send it until whole line is completed.
Character Mode :
Each character typed in this mode is sent by client to server.
Server in this type of mode is normally enchoes character back to be displayed on the
client’s screen.
Line Mode :
Line editing like echoing, character erasing etc is done from the client side.
Client will send the whole line to the server.
Electronic Mail (e-mail) is one of most widely used services of Internet. This
service allows an Internet user to send a message in formatted manner (mail) to
the other Internet user in any part of world. Message in mail not only contain text,
but it also contains images, audio and videos data. The person who is sending
mail is called sender and person who receives mail is called recipient. It is just
like postal mail service.
Components of E-Mail System :
The basic components of an email system are : User Agent (UA), Message
Transfer Agent (MTA), Mail Box, and Spool file. These are explained as
following below.
1. User Agent (UA) :
The UA is normally a program which is used to send and receive mail.
Sometimes, it is called as mail reader. It accepts variety of commands for
composing, receiving and replying to messages as well as for manipulation of
the mailboxes.
3. Mailbox :
It is a file on local hard drive to collect mails. Delivered mails are present
in this file. The user can read it delete it according to his/her requirement.
To use e-mail system each user must have a mailbox . Access to mailbox
is only to owner of mailbox.
4. Spool file :
This file contains mails that are to be sent. User agent appends outgoing
mails in this file using SMTP. MTA extracts pending mail from spool file for
their delivery. E-mail allows one name, an alias, to represent several
different e-mail addresses. It is known as mailing list, Whenever user have
to sent a message, system checks recipients’s name against alias database.
If mailing list is present for defined alias, separate messages, one for each
entry in the list, must be prepared and handed to MTA. If for defined alias,
there is no such mailing list is present, name itself becomes naming address
and a single message is delivered to mail transfer entity.
Newsletters: It is studying by Clutch, the newsletter is the most common type of email that are
routinely sent to all mailing list subscribers, either daily, weekly, or monthly. These emails often
contain from the blog or website, links curated from other sources, and selected content that the
company has recently published. Typically, Newsletter emails are sent on a consistent schedule,
and they offer businesses the option to convey important information to their client through a
single source. Newsletters might also incorporate upcoming events or new, webinars from the
company, or other updates.
Lead Nurturing: Lead-nurturing emails are a series of related emails that marketers use to take
users on a journey that may impact their buying behavior. These emails are typically sent over a
period of several days or weeks. Lead-nurturing emails are also known as trigger campaigns,
which are used for solutions in an attempt to move any prospective sale into a completed
purchase and educate potential buyers on the services. These emails are not only helpful for
converting emails but also drive engagement. Furthermore, lead-nurturing emails are initiated by
a potential buyer taking initial action, such as clicking links on a promotional email or
downloading a free sample.
Promotional emails: It is the most common type of B2B (Business to Business) email, which is
used to inform the email list of your new or existing products or services. These types of emails
contain creating new or repeat customers, speeding up the buying process, or encouraging
contacts to take some type of action. It provides some critical benefits to buyers, such as a free
month of service, reduced or omitted fees for managed services, or percentage off the purchase
price.
Standalone Emails: These emails are popular like newsletters emails, but they contain a
limitation. If you want to send an email with multiple links or blurbs, your main call-to-action
can weaken. Your subscriber may skip your email and move on, as they may click on the first
link or two in your email but may not come back to the others.
Transactional: These emails are related to account activity or a commercial transaction and sent
from one sender to one recipient. Some examples of transactional email are purchase
confirmations, password reminder emails, and personalized product notifications. These emails
are used when you have any kind of e-commerce component to your business. As compared to
any other type of email, the transactional email messages have 8x the opens and clicks.
Plain-Text Emails: It is a simple email that does not include images or graphics and no
formatting; it only contains the text. These types of emails may worth it if you try to only ever
send fancy formatted emails, text-only messages. According to HubSpot, although people prefer
fully designed emails with various images, plain text emails with less HTML won out in every
A/B test. In fact, HTML emails contain lower open and click-through rates, and plain text emails
can be great for blog content, event invitations, and survey or feedback requests. Even if you do
not send plainer emails, but you can boost your open and click through rates by simplifying your
emails and including fewer images.
Welcome emails: It is a type of B2B email and common parts of onboarding emails that help
users get acquainted with the brand. These emails can improve subscriber constancy as they
include additional information, which helps to the new subscriber in terms of a business
objective. Generally, welcome emails are sent buyers who got a subscription to a business's opt-
in activities, such as a blog, mailing list, or webinar. Also, these emails can help businesses to
build a better relationship between customers.
Features of MIME –
1. It is able to send multiple attachments with a single message.
2. Unlimited message length.
3. Binary attachments (executables, images, audio, or video files) which may be
divided if needed.
4. MIME provided support for varying content types and multi-part messages.
Working of MIME –
Suppose a user wants to send an email through user agent and it is in a non-ASCII
format so there is a MIME protocol which converts it into 7-bit NVT ASCII format.
Message is transferred through e-mail system to the other side in 7-bit format now
MIME protocol again converts it back into non-ASCII code and now the user agent of
receiver side reads it and then information is finally read by the receiver. MIME header
is basically inserted at the beginning of any e-mail transfer.
MIME with SMTP and POP –
SMTP transfers the mail being a message transfer agent from senders side to the
mailbox of receiver side and stores it and MIME header is added to the original header
and provides additional information. while POP being the message access agent
organizes the mails from the mail server to the receivers computer. POP allows user
agent to connect with the message transfer agent.
MIME Header:
It is added to the original e-mail header section to define transformation. There are five
headers which we add to the original header:
1. MIME Version – Defines version of MIME protocol. It must have the
parameter Value 1.0, which indicates that message is formatted using MIME.
2. Content Type – Type of data used in the body of message. They are of different
types like text data (plain, HTML), audio content or video content.
3. Content Type Encoding – It defines the method used for encoding the message.
Like 7-bit encoding, 8-bit encoding, etc.
4. Content Id – It is used for uniquely identifying the message.
5. Content description – It defines whether the body is actually image, video or audio.
File Transfer Protocol (FTP)
File Transfer Protocol(FTP) is an application layer protocol which moves files between local
and remote file systems. It runs on the top of TCP, like HTTP. To transfer a file, 2 TCP
connections are used by FTP in parallel: control connection and data connection.
FTP Session :
When a FTP session is started between a client and a server, the client initiates a control TCP
connection with the server side. The client sends control information over this. When the
server receives this, it initiates a data connection to the client side. Only one file can be sent
over one data connection. But the control connection remains active throughout the user
session. As we know HTTP is stateless i.e. it does not have to keep track of any user state. But
FTP needs to maintain a state about its user throughout the session.
Data Structures : FTP allows three types of data structures :
1. File Structure – In file-structure there is no internal structure and the file is considered to
be a continuous sequence of data bytes.
2. Record Structure – In record-structure the file is made up of sequential records.
3. Page Structure – In page-structure the file is made up of independent indexed pages.
FTP Commands – Some of the FTP commands are :
USER – This command sends the user identification to the server.
PASS – This command sends the user password to the server.
CWD – This command allows the user to work with a different directory or dataset for file
storage or retrieval without altering his login or accounting information.
RMD – This command causes the directory specified in the path-name to be removed as a
directory.
MKD – This command causes the directory specified in the pathname to be created as a
directory.
PWD – This command causes the name of the current working directory to be returned in the
reply.
RETR – This command causes the remote host to initiate a data connection and to send the
requested file over the data connection.
STOR – This command causes to store a file into the current directory of the remote host.
LIST – Sends a request to display the list of all the files present in the directory.
ABOR – This command tells the server to abort the previous FTP service command and any
associated transfer of data.
QUIT – This command terminates a USER and if file transfer is not in progress, the server
closes the control connection.
FTP Replies – Some of the FTP replies are :
200 Command okay.
530 Not logged in.
331 User name okay, need a password.
225 Data connection open; no transfer in progress.
221 Service closing control connection.
551 Requested action aborted: page type unknown.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
Trivial File Transfer Protocol (TFTP):It is also file transfer protocol without sophisticated
features of FTP.
It is good for simple file transfers, such as during boot time.
It uses UDP as transport layer protocols. Errors in the transmission (lost packets, checksum
errors) must be handled by the TFTP server.
It uses only one connection through well known port 69.
TFTP uses a simple lock-step protocol (each data packet needs to be acknowledged). Thus
the throughput is limited
Anonymous FTP :
Anonymous FTP is enabled on some sites whose files are available for public access. A user
can access these files without having any username or password. Instead, the username is set to
anonymous and password to the guest by default. Here, user access is very limited. For
example, the user can be allowed to copy the files but not to navigate through directories.
The World Wide Web abbreviated as WWW and commonly known as the web. The WWW
was initiated by CERN (European library for Nuclear Research) in 1989.
History:
It is a project created, by Timothy Berner’s Lee in 1989, for researchers to work together
effectively at CERN. is an organisation, named World Wide Web Consortium (W3C), was
developed for further development in web. This organisation is directed by Tim Berner’s Lee,
aka father of web.
System Architecture:
From user’s point of view, the web consists of a vast, worldwide connection of documents or
web pages. Each page may contain links to other pages anywhere in the world. The pages can
be retrieved and viewed by using browsers of which internet explorer, Netscape Navigator,
Google, Chrome, etc are the popular ones. The browser fetches the page requested interprets
the text and formatting commands on it, and displays the page, properly formatted, on the
screen.
The basic model of how the web works is shown in figure below. Here the browser is
displaying a web page on the client machine. When the user clicks on a line of text that is
linked to a page on the abd.com server, the browser follows the hyperlink by sending a
message to the abd.com server asking it for the page.
Here the browser displaying web page om the client machine when the user clicks on a line of
text that is linked to a page on abd.com, the vbrowser follows the hyperlink by sending a
message to abd.com server asking it for the page.
Working of WWW:
The World Wide Web is based on several different technologies : Web browsers, Hypertext
Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
An Web browser is used to access webpages. Web browsers can be defined as programs which
display text, data, pictures, animation and video on the Internet. Hyperlinked resources on the
World Wide Web can be accessed using software interface provided by Web browsers.
Initially Web browsers were used only for surfing the Web but now they have become more
universal. Web browsers can be used for several tasks including conducting searches, mailing,
transferring files, and much more. Some of the commonly used browsers are Internet Explorer,
Opera Mini, Google Chrome.
Features of WWW:
HyperText Information System
Cross-Platform
Distributed
Open Standards and Open Source
Uses Web Browsers to provide a single interface for many services
Dynamic, Interactive and Evolving.
“Web 2.0”
Components of Web
There are 3 components of web:
1. Uniform Resource Locator (URL): serves as system for resources on web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines structure, organisation and content of
webpage.
HTTP stands for HyperText Transfer Protocol. It is invented by Tim Berner. HyperText is the
type of text which is specially coded with the help of some standard coding language called
as HyperText Markup Language (HTML).
The protocols that are used to transfer hypertext between two computers is known as
HyperText Transfer Protocol.
HTTP provides standard between a web browser and web server to establish communication. It
is set of rules for transferring data from one computer to another. Data such as text, images,
and other multimedia files are shared on the World Wide Web. Whenever a web user opens
their web browser, user will indirectly uses HTTP. It is an application protocol which is used
for distributed, collaborative, hypermedia information systems.
How it works ?
First of all, whenever we want to open any website then first we open web browser after that
we will type URL of that website (e.g., www.facebook.com ). This URL is now sent
to Domain Name Server (DNS). Then DNS first check records for this URL in their database,
then DNS will return IP address to web browser corresponding to this URL. Now browser is
able to sent request to actual server.
After server sends data to client, connection will be closed. If we want something else from
server we should have to re-establish connection between client and server.
History ::
Tim Berners Lee and his team at CERN gets credit for inventing original HTTP and
associated technologies.
1. HTTP version 0.9 –
This was first version of HTTP which was introduced in 1991.
If an organization has 1000 of devices then to check all devices, one by one every day,
are working properly or not is a hectic task. To ease these up, Simple Network
Management Protocol (SNMP) is used.
Simple Network Management Protocol (SNMP) –
SNMP is an application layer protocol which uses UDP port number 161/162.SNMP is
used to monitor the network, detect network faults and sometimes even used to
configure remote devices.
SNMP components –
There are 3 components of SNMP:
1. SNMP Manager –
It is a centralised system used to monitor network.It is also known as Network
Management Station (NMS)
2. SNMP agent –
It is a software management software module installed on a managed device.
Managed devices can be network devices like PC, router, switches, servers etc.
3. Management Information Base –
MIB consists of information of resources that are to be managed. These information
is organised hierarchically. It consists of objects instances which are essentially
variables.
SNMP messages –
Different variables are:
1. GetRequest –
SNMP manager sends this message to request data from SNMP agent. It is simply
used to retrieve data from SNMP agent. In response to this, SNMP agent responds
with requested value through response message.
2. GetNextRequest –
This message can be sent to discover what data is available on a SNMP agent. The
SNMP manager can request for data continuously until no more data is left. In this
way, SNMP manager can take knowledge of all the available data on SNMP agent.
3. GetBulkRequest –
This message is used to retrieve large data at once by the SNMP manager from
SNMP agent. It is introduced in SNMPv2c.
4. SetRequest –
It is used by SNMP manager to set the value of an object instance on the SNMP
agent.
5. Response –
It is a message send from agent upon a request from manager. When sent in
response to Get messages, it will contain the data requested. When sent in response
to Set message, it will contain the newly set value as confirmation that the value has
been set.
6. Trap –
These are the message send by the agent without being requested by the manager. It
is sent when a fault has occurred.
7. InformRequest –
It was introduced in SNMPv2c, used to identify if the trap message has been
received by the manager or not. The agents can be configured to set trap
continuously until it receives an Inform message. It is same as trap but adds an
acknowledgement that trap doesn’t provide.
SNMP security levels –
It defines the type of security algorithm performed on SNMP packets. These are used in
only SNMPv3. There are 3 security levels namely:
1. noAuthNoPriv –
This (no authentication, no privacy) security level uses community string for
authentication and no encryption for privacy.
2. authNopriv – This security level (authentication, no privacy) uses HMAC with
Md5 for authentication and no encryption is used for privacy.
3. authPriv – This security level (authentication, privacy) uses HMAC with Md5 or
SHA for authentication and encryption uses DES-56 algorithm.
SNMP versions –
There are 3 versions of SNMP:
1. SNMPv1 –
It uses community strings for authentication and use UDP only.
2. SNMPv2c –
It uses community strings for authentication. It uses UDP but can be configured to
use TCP.
3. SNMPv3 –
It uses Hash based MAC with MD5 or SHA for authentication and DES-56 for
privacy.This version uses TCP. Therefore, conclusion is the higher the version of
SNMP, more secure it will be.
Bluetooth
It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging
data over smaller distances. This technology was invented by Ericson in 1994. It
operates in the unlicensed, industrial, scientific and medical (ISM) band at 2.4 GHz to
2.485 GHz. Maximum devices that can be connected at the same time are 7. Bluetooth
ranges upto 10 meters. It provides data rates upto 1 Mbps or 3 Mbps depending upon
the version. The spreading technique which it uses is FHSS (Frequency hopping spread
spectrum). A bluetooth network is called piconet and a collection of interconnected
piconets is called scatternet.
Bluetooth Architecture:
The architecture of bluetooth defines two types of networks:
1) Piconet
2) Scatternet
Piconet is a type of bluetooth network that contains one primary node called master
node and seven active secondary nodes called slave nodes. Thus, we can say that there
are total of 8 active nodes which are present at a distance of 10 metres. The
communication between the primary and secondary node can be one-to-one or one-to-
many. Possible communication is only between the master and slave; Slave-slave
communication is not possible. It also have 255 parked nodes, these are secondary
nodes and cannot take participation in communication unless it get converted to the
active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can be act
as master or we can say primary in other piconet. This kind of node can receive
message from master in one piconet and deliver the message to its slave into the other
piconet where it is acting as a slave. This type of node is refer as bridge node. A station
cannot be master in two piconets.
Bluetooth protocol stack
1.
Radio (RF) layer:
It performs modulation/demodulation of the data into RF signals. It defines the
physical characteristics of bluetooth transceiver. It defines two types of physical
link: connection-less and connection-oriented.
6. RF comm layer:
It is short for Radio Frontend Component. It provides serial interface with WAP and
OBEX.
7. OBEX:
It is short for Object Exchange. It is a communication protocol to exchange objects
between 2 devices.
8. WAP:
It is short for Wireless Access Protocol. It is used for internet access.
9. TCS:
It is short for Telephony Control Protocol. It provides telephony service.
Advantages:
Low cost.
Easy to use.
It can also penetrate through walls.
It creates an adhoc connection immediately without any wires.
It is used for voice and data transfer.
Disadvantages:
Firewalls
A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security rules it
accepts, rejects or drops that specific traffic.
Accept : allow the traffic
Reject : block the traffic but reply with an “unreachable error”
Drop : block the traffic with no reply
A firewall establishes a barrier between secured internal networks and outside untrusted
network, such as the Internet.
Before Firewalls, network security was performed by Access Control Lists (ACLs)
residing on routers. ACLs are rules that determine whether network access should be
granted or denied to specific IP address.
But ACLs cannot determine the nature of the packet it is blocking. Also, ACL alone does
not have the capacity to keep threats out of the network. Hence, the Firewall was
introduced.
Connectivity to the Internet is no longer optional for organizations. However, accessing
the Internet provides benefits to the organization; it also enables the outside world to
interact with the internal network of the organization. This creates a threat to the
organization. In order to secure the internal network from unauthorized traffic, we need a
Firewall.
How Firewall Works
Firewall match the network traffic against the rule set defined in its table. Once the rule is
matched, associate action is applied to the network traffic. For example, Rules are
defined as any employee from HR department cannot access the data from code server
and at the same time another rule is defined like system administrator can access the data
from both HR and technical department. Rules can be defined on the firewall based on
the necessity and security policies of the organization.
From the perspective of a server, network traffic can be either outgoing or incoming.
Firewall maintains a distinct set of rules for both the cases. Mostly the outgoing traffic,
originated from the server itself, allowed to pass. Still, setting a rule on outgoing traffic is
always better in order to achieve more security and prevent unwanted communication.
Incoming traffic is treated differently. Most traffic which reaches on the firewall is one of
these three major Transport Layer protocols- TCP, UDP or ICMP. All these types have a
source address and destination address. Also, TCP and UDP have port numbers. ICMP
uses type code instead of port number which identifies purpose of that packet.
Default policy: It is very difficult to explicitly cover every possible rule on the firewall.
For this reason, the firewall must always have a default policy. Default policy only
consists of action (accept, reject or drop).
Suppose no rule is defined about SSH connection to the server on the firewall. So, it will
follow the default policy. If default policy on the firewall is set to accept, then any
computer outside of your office can establish an SSH connection to the server. Therefore,
setting default policy as drop (or reject) is always a good practice.
Generations of Firewall
Firewalls can be categorized based on its generation.
1. First Generation- Packet Filtering Firewall : Packet filtering firewall is used to
control network access by monitoring outgoing and incoming packet and allowing
them to pass or stop based on source and destination IP address, protocols and ports.
It analyses traffic at the transport protocol layer (but mainly uses first 3 layers).
Packet firewalls treat each packet in isolation. They have no ability to tell whether a
packet is part of an existing stream of traffic. Only It can allow or deny the packets
based on unique packet headers.
Packet filtering firewall maintains a filtering table which decides whether the packet
will be forwarded or discarded. From the given filtering table, the packets will be
Filtered according to following rules:
1.
1. Incoming packets from network 192.168.21.0 are blocked.
2. Incoming packets destined for internal TELNET server (port 23) are blocked.
3. Incoming packets destined for host 192.168.21.3 are blocked.
4. All well-known services to the network 192.168.21.0 are allowed.
2. Second Generation- Stateful Inspection Firewall : Stateful firewalls (performs
Stateful Packet Inspection) are able to determine the connection state of packet,
unlike Packet filtering firewall, which makes it more efficient. It keeps track of the
state of networks connection travelling across it, such as TCP streams. So the
filtering decisions would not only be based on defined rules, but also on packet’s
history in the state table.
3. Third Generation- Application Layer Firewall : Application layer firewall can
inspect and filter the packets on any OSI layer, up to the application layer. It has the
ability to block specific content, also recognize when certain application and
protocols (like HTTP, FTP) are being misused.
In other words, Application layer firewalls are hosts that run proxy servers. A proxy
firewall prevents the direct connection between either side of the firewall, each
packet has to pass through the proxy. It can allow or block the traffic based on
predefined rules.
Note: Application layer firewalls can also be used as Network Address
Translator(NAT).
4. Next Generation Firewalls (NGFW) : Next Generation Firewalls are being
deployed these days to stop modern security breaches like advance malware attacks
and application-layer attacks. NGFW consists of Deep Packet Inspection,
Application Inspection, SSL/SSH inspection and many functionalities to protect the
network from these modern threats.
Types of Firewall
Firewalls are generally of two types: Host-based and Network-based.
1. Host- based Firewalls : Host-based firewall is installed on each network node
which controls each incoming and outgoing packet. It is a software application or
suite of applications, comes as a part of the operating system. Host-based firewalls
are needed because network firewalls cannot provide protection inside a trusted
network. Host firewall protects each host from attacks and unauthorized access.
2. Network-based Firewalls : Network firewall function on network level. In other
words, these firewalls filter all incoming and outgoing traffic across the network. It
protects the internal network by filtering the traffic using rules defined on the
firewall. A Network firewall might have two or more network interface cards
(NICs). A network-based firewall is usually a dedicated system with proprietary
software installed.
Basic concepts of Cryptography