Tuesday, November 30, 2021

Comparison of LAN MAN WAN | Difference between LAN MAN WAN | Summery of LAN MAN WAN

 

Types of Networks

Computer networks can be categories by their size as well as their purpose. The size of a network can be expressed by the geographic area. Some of the different networks based on size are:

LAN - Local Area Network

MAN - Metropolitan Area Network

WAN - Wide Area Network

LAN (Local Area Network)

A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: school, laboratory, university campus or office building.

MAN (Metropolitan Area Network)

A metropolitan area network (MAN) is a computer network that interconnects with computer in a metropolitan area like city. MAN is a larger than LAN but smaller than the area covered by a WAN. It is also used to interconnection of several local area network.

WAN (Wide Area Network)

A wide area network (WAN) is a computer network that exists over a large-scale geographical area. A WAN connects different networks, including local area networks (LAN) and metropolitan area networks (MAN). It may be located within a state or a country or it may be interconnected around the world.

Summary of LAN – MAN – WAN

Figure: Summary of LAN MAN WAN

Comparison of LAN MAN and WAN


To learn more about Comparison of LAN MAN WAN, Click here

Watch more videos click here.

Types of Network | LAN MAN WAN | Summary of LAN MAN and WAN | Types of network based of geographical area

 

Types of Networks

Computer networks can be categories by their size as well as their purpose. The size of a network can be expressed by the geographic area. Some of the different networks based on size are:

LAN - Local Area Network

MAN - Metropolitan Area Network

WAN - Wide Area Network

LAN (Local Area Network)

Figure: Local Area Network (LAN)

A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: school, laboratory, university campus or office building.

LAN is widely used for shared medium peer-to-peer communications. Using LAN not only computer but access printer, plotter, database server etc. Range of LAN is single building or campus of up to few km in range. The range of LAN is maximum 5 Kms. Speed of LAN 10/100/1000 Mbps. The LAN is used as private network.

MAN (Metropolitan Area Network)

Figure: Metropolitan Area Network

A metropolitan area network (MAN) is a computer network that interconnects with computer in a metropolitan area like city. MAN is a larger than LAN but smaller than the area covered by a WAN. It is also used to interconnection of several local area network. Range of MAN is 10 km to 100 km. Speed of MAN is 100 Mbps. MANs are based on optical-fibre transmission technology an provide high speed interconnection between sites. It can support both data and voice. IEEE standard of MAN is 802.6.

WAN (Wide Area Network)

Figure: Wide Area Network (WAN)

A wide area network (WAN) is a computer network that exists over a large-scale geographical area. A WAN connects different networks, including local area networks (LAN) and metropolitan area networks (MAN). It may be located within a state or a country or it may be interconnected around the world. Range of WAN is beyond 100 km. Speed of WAN is 10 Mbps.

Summary of LAN – MAN – WAN

Figure: Summary of LAN MAN WAN


To learn more about LAN, MAN & WAN, Click here

Watch more videos click here.

Sunday, November 28, 2021

The Network Edge | End system in computer network | Client - Server Architecture

What is End System in network?

Computers connected with network are known as end systems in network. The end system is also known as Host.

For Example, Workstations (PCs / Laptop), TVs and set top boxes, CCTV Cameras, Household Applications, Mobile Phones.

Figure: End System in Computer Network

Categories of Host

Hosts can be further divided into two categories: Client and Server.

Figure: Client and Server in Computer Network

Client Server Architecture:

Client:

The individual workstation in network is called Client. Client send a request to server, when client wants an access server. The software run at the client machine is called as client program. Ex., Browser.

Server:

The central computers which is more powerful than clients, no one access server without authentication. Ex., File server, database server, print server. Server provides services as per client request.

The software run at the server machine is called as server program. Ex., Xampp, File server.

Figure: Client - Server Architecture

Pros and Cons of Client Server Architecture

Pros:

High Security

High Performance

Centralized Backup

Scalability

Cons:

Professional Network Admin required

Server cost is very high

Continuously backup required

To learn more about The Network Edge, Click here

Watch more videos click here.

Saturday, November 27, 2021

Understanding of Network and Internet | Computer Network | Internet | Protocol and Standards | Defacto and Dejure

     What is Network?

A group or system of interconnected people or things. 

Example: Group of People (social media), Railway tracks, Highways, Branch offices connected with Head Office.

Figure: Social media network
Figure: Railway track network

What is Computer Network?

Two or more computer systems connected with each other is known as computer network.

Example: Intranet, Internet.


Figure: Internet and Intranet
 


Figure: Network Topology

What is Internet?

The internet is a type of world-wide computer network. Internet is a “network of networks”. Internet is consisted of academic, business and government networks, which carry various information and services. It is global communication accessed through the web. Internet deals with protocols and standards.

Example: E-mail, Web access and services, file transfer

Protocols:

A protocol is a set of rules that governs data communications. Protocol defines the method of communication, how to communicate, when to communicate etc.

Figure: Protocol Syntax

Syntax: Syntax means format of data or the structure how it is pretend. 

For example, first eight bits for sender address, next eight bits for receiver address, rest of the bits for message/information.

Semantics: Semantics is the meaning of each section of bits e.g. The address bit means the route of transmission or final destination of the message.

Timing: Timing means, at what time data can be sent and how fast data can be sent or received.

Standards:

Standards provide guidelines to the manufacturers, vendors, government agencies and service provider. It ensures that interconnectivity and compatibility of the device. Standards help in maintaining market competitiveness and guarantees interoperability. Data communication standards are of two categories: De facto and De Jure.

De facto: De facto means by facts or by convention. The standards that are not approved by any organization but are widely used are De facto standards. These are established by manufacturers.

De jure: De jure means by law or by regulation. These are the standards that are recognized officially by an organization.

To learn more about Understand of Network and Internet, Click here

Watch more videos click here.

Wednesday, November 10, 2021

Kerberos Realm | Inter-realm Authentication

     What is Kerberos Realm

A full-service Kerberos environment consists of a Kerberos server, a number of clients, all are registered with Kerberos server, a number of application servers, all are sharing keys with Kerberos server. Such an environment is referred to as a Kerberos realm.


Figure: Kerberos Realm

Inter Realm Authentication


To learn more about Kerberos Realm, Click here

Watch more videos click here.

Kerberos Version 4 Message Exchange

     Kerberos Version 4 Message Exchange Scenario

 

Figure : Kerberos Version 4 Message Exchange Scenario


Step – 1: The client sends a message to the AS requesting access to the TGS. It includes a timestamp, so that the AS knows that the message is timely.

Step – 2: The AS responds with a message, encrypted with a key derived from the user’s password (KC), that contains the ticket. The encrypted message also contains a copy of the session key, KC, tgs, where the subscripts indicate that this is a session key for C and TGS. Because this session key is inside the message encrypted with KC, only the user’s client can read it. The same session key is included in the ticket, which can be read only by the TGS. Thus, the session key has been securely delivered to both C and the TGS.

Step – 3: C sends TGS a message that includes the ticket plus the ID of the requested service. In addition, C transmits an authenticator, which includes the ID and address of C’s user and a timestamp. The TGS uses the session key to decrypt the authenticator. The TGS can then check the name and address from the authenticator with that of the ticket and with the network address of the incoming message. If all match, then the TGS is assured that the sender of the ticket is indeed the ticket’s real owner.

Step – 4: Reply message from TGS is encrypted with KC, tgs and includes a session key to be shared between C and the server V, the ID of V, and the timestamp of the ticket. The ticket itself includes the same session key.

Step – 5: When C sends ticket and an authenticator. The server can decrypt the ticket, recover the session key, and decrypt the authenticator.

Step – 6: The server returns the value of the timestamp from the authenticator, incremented by 1, and encrypted in the session key. C can decrypt this message to recover the incremented timestamp. Because the message was encrypted by the session key, C is assured that it could have been created only by V. The contents of the message assure C that this is not a replay of an old reply.


Summery of Kerberos version 4 message exchange scenario


To learn more about Kerberos Version 4 message exchange, Click here

   Watch more videos click here.

Kerberos Version 4 | Kerberos version 4 using authentication and ticket granting server

What is Kerberos?

Kerberos: Kerberos is a network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Different Version of Kerberos Protocols

Using Authentication Server (AS)

 

Step – 1: In this scenario, the user logs on to a workstation and requests access to server V. The client module C in the user’s workstation requests the user’s password and then sends a message to the AS that includes the user’s ID, the server’s ID, and the user’s password. The AS checks its database to see if the user has supplied the proper password for this user ID and whether this user is permitted access to server V. If both tests are passed, the AS accepts the user as authentic and must now convince the server that this user is authentic.

Step – 2: To do so, the AS creates a ticket that contains the user’s ID and network address and the server’s ID. This ticket is encrypted using the secret key shared by the AS and this server. This ticket is then sent back to C. Because the ticket is encrypted, it cannot be altered by C or by an opponent.

Step – 3: With this ticket, C can now apply to V (Server) for service. C sends a message to V containing C’s ID and the ticket. V decrypts the ticket and verifies that the user ID in the ticket is the same as the unencrypted user ID in the message. If these two matches, the server considers the user authenticated and grants the requested service.

Problems:

Problem – 1: Under this scheme, a user would need a new ticket for every different service. If a user wants to access a print server, a mail server, a file server, and so on, the first instance of each access would require a new ticket.

Problem – 2: In this scheme, password is transmitted without encryption. An eavesdropper could capture the password and use any service accessible to the victim.

 

Using Ticket Granting Server (TGS)

Step – 1: The client requests a ticket-granting ticket on behalf of the user by sending its user’s ID to the AS, together with the TGS ID, indicating a request to use the TGS service.

Step – 2: The AS responds with a ticket that is encrypted with a key that is derived from the user’s password (KC), which is already stored at the AS. When this response arrives at the client, the client prompts the user for his or her password, generates the key, and attempts to decrypt the incoming message. If the correct password is supplied, the ticket is successfully recovered. Thus, we have used the password to obtain credentials from Kerberos without having to transmit the password in plaintext. Here, the opponent may be able to reuse the ticket to spoof the TGS. To counter this, the ticket includes a timestamp, indicating the date and time at which the ticket was issued, and a lifetime, indicating the length of time for which the ticket is valid.

Step – 3: The client requests a service-granting ticket on behalf of the user. For this purpose, the client transmits a message to the TGS containing the user’s ID, the ID of the desired service, and the ticket-granting ticket.

Step – 4: The TGS decrypts the incoming ticket using Ktgs and verifies the success of the decryption by the presence of its ID. It checks to make sure that the lifetime has not expired. Then it compares the user ID and network address with the incoming information to authenticate the user. If the user is permitted access to the server V, the TGS issues a ticket to grant access to the requested service.

Step – 5: The client requests access to a service on behalf of the user. For this purpose, the client transmits a message to the server containing the user’s ID and the service-granting ticket. The server authenticates by using the contents of the ticket.

 

Problems

Problem – 1: A network service (the TGS or an application service) must be able to prove that the person using a ticket is the same person to whom that ticket was issued.

Problem – 2: There may be a requirement for servers to authenticate themselves to users. Without such authentication, the false server would then be in a position to act as a real server and capture any information from the user and deny the true service to the user.

Solution

AS provides both the client and the TGS with a secret piece of information in a secure manner. Then the client can prove its identity to the TGS by revealing the secret information—again in a secure manner.  An efficient way of accomplishing this is to use an encryption key as the secure information; this is referred to as a session key in Kerberos.

To learn more about Kerberos Version 4, Click here

   Watch more videos click here.

Kerberos | Kerberos Terminology | Kerberos Working | Characteristics of Kerberos

Kerberos Protocol

What is Kerberos?

Kerberos: Kerberos is a network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

What do the three heads of Kerberos represent?

Kerberos is a three-step security process used for authorization and authentication. The three-heads of Kerberos are:

1-User,

2-KDC-Key Distribution Service (security server) and

3-Services (servers). 

Kerberos is a standard feature of Windows software.

 

Why Kerberos?

Kerberos is an authentication protocol that is used to verify the identity of a user or host. The authentication is based on tickets used as credentials, allowing communication and proving identity in a secure manner even over a non-secure network.

 

Characteristics of Kerberos

Secure: Kerberos should be strong enough that a potential opponent does not find it to be the weak link.

Reliable: For all services that rely on Kerberos for access control, lack of availability of the Kerberos service means lack of availability of the supported services. Hence, Kerberos should be highly reliable and should employ distributed server architecture, with one system able to back up another.

Transparent: Ideally, the user should not be aware that authentication is taking place, beyond the requirement to enter a password.

Scalable: The system should be capable of supporting large numbers of clients and servers. This suggests a modular, distributed architecture.

 

Kerberos Protocol Terminology

Figure : Block Diagram of Kerberos server

Authentication Server (AS): A server that issues tickets for a desired service which are in turn given to users for access to the service.

Client: An entity on the network that can receive a ticket from Kerberos.

Credentials: A temporary set of electronic credentials that verify the identity of a client for a particular service. It also called a ticket.

Credential cache or ticket file: A file which contains the keys for encrypting communications between a user and various network services.

Crypt hash: A one-way hash used to authenticate users.

Key: Data used when encrypting or decrypting other data.

Key distribution centre (KDC): A service that issue Kerberos tickets and which usually run on the same host as the ticket-granting server (TGS).

Realm: A network that uses Kerberos composed of one or more servers called KDCs and a potentially large number of clients.

Ticket-granting server (TGS): A server that issues tickets for a desired service which are in turn given to users for access to the service. The TGS usually runs on the same host as the KDC.

Ticket-granting ticket (TGT): A special ticket that allows the client to obtain additional tickets without applying for them from the KDC.

 

Working of Kerberos

Step 1: (Fig 1)

The AS, receives the request by the client and verifies that the client.

 


Figure : Authentication Service verifies the User ID

Step 2:

Upon verification, a timestamp is created with current time in a user session with expiration date. The timestamp ensures that when 8 hours is up, the encryption key is useless.

Step 3: (Fig 2)


Figure : Authentication Service issues TGT

The key is sent back to the client in the form of a TGT.

Step 4: (Fig 3)


Figure : Client submits TGT to TGS

The client submits the TGT to the TGS, to get authenticated.

Step 5: (Fig. 4)


Figure : TGS grants client the service ticket

The TGS creates an encrypted key with a timestamp and grants the client a service ticket.

Step 6:

The client decrypts the ticket & send ACK to TGS.

Step 7 (Fig. 5)


Figure : Service server decrypt key and check the time stamp

Client sends its own encrypted key to the service server.

The server decrypts the key and check timestamp is still valid or not.

Step 8: (Fig. 6)


Figure : For secret keys communication initiated 

The client decrypts the ticket. If the keys are still valid, communication is initiated between client and server. Now the client is authenticated until the session expires.

 

Is Kerberos symmetric or asymmetric?

Kerberos is capable of both symmetric and asymmetric cryptography.

 

Is Kerberos safe?

Kerberos is more secure than other authentication methods because it does not send plain text pass- words over the network and instead of password uses encrypted tickets.


To learn more about Kerberos Terminology & Working, Click here

   Watch more videos click here.