Cybercrime Responders: Network Basics
Cybercrime Responders: Network Basics
Table of Contents
1. Introduction to Computer Networks ........................................................................... 4
2. Classification of Networks ............................................................................................ 7
2.1. Geographical Range Driven Networks .................................................................. 7
2.2. Transmission Driven Networks ............................................................................. 9
2.3. Peer to Peer and Client-Server Networks ............................................................. 11
2.4. Private and Public Driven Networks: .................................................................. 12
2.5. Storage Driven Networks: ................................................................................... 13
3. Network Topology ...................................................................................................... 15
4. The Open Systems Interconnection (OSI) Model ...................................................... 18
5. Basic Networking Devices .......................................................................................... 21
5.1. Concept of Physical Addressing in Networks – MAC Addresses ........................ 23
6. Introduction to IP Address ......................................................................................... 25
6.1. Concept of Logical Addresses in a Network – IP Address .................................. 25
6.2. IP Addressing in Computer Networks................................................................. 26
7. Communication Protocols .......................................................................................... 29
8. Introduction to Domain Name System, Uniform Resource Locator and Website ... 31
9. Reference: .............................................................. Error! Bookmark not defined.
2|Page
Introduction to Computer Networks
3|Page
Introduction to Computer Networks
Computer Networks can classify further into two categories: Standalone Systems and
Networked Systems. The main features of the two are as follows:
4|Page
Introduction to Computer Networks
5|Page
Introduction to Computer Networks
6|Page
Introduction to Computer Networks
2. Classification of Networks
Networks can be classified based on the various parameters. Some of these are as
follows:
7|Page
Introduction to Computer Networks
8|Page
Introduction to Computer Networks
continents. These network types can be connected over wired medium such
as leased lines, fibre optics or over wireless medium such as radio towers or
satellites.
9|Page
Introduction to Computer Networks
10 | P a g e
Introduction to Computer Networks
11 | P a g e
Introduction to Computer Networks
12 | P a g e
Introduction to Computer Networks
13 | P a g e
Introduction to Computer Networks
2. Storage Area Network (SAN): Storage Area Network -SAN is used for
transferring data between the servers and the storage devices fiber channel
and switches. In SAN, data is identified by disk block. When you use a SAN,
devices connected to the network do not use any local storage.
14 | P a g e
Introduction to Computer Networks
3. Network Topology
Network topology is defined as the arrangement of a network covering all of its nodes
and connections between nodes. There are majorly four types of network topologies
that are described below.
Now, let us look at the disadvantages of bus topology. In bus topology if you face
any issue, it is difficult to identify problems in case of network issues. In
addition, it is difficult troubleshoot individual devices if you are facing a device
issue. Further, adding additional devices can slowdown the network.
In a ring network, server is not required to connect computers and all computers
have an equal access to the resources. However, in case of a unidirectional ring
topology, data transfer can be slow as it must pass through all the nodes.
15 | P a g e
Introduction to Computer Networks
3. Star Topology: Star Topology is a network where all nodes or computers are
connected to a central server or hub. In star topology, if one device or cable fails
then all others continue to work making this a reliable topology. It is a high-
performing topology as data collisions do not occur.
16 | P a g e
Introduction to Computer Networks
17 | P a g e
Introduction to Computer Networks
1. Physical Layer: The physical layer is literally the physical hardware that makes
up the network. This layer has several major functions, including defining
physical specifications, protocols, transmission mode and network’s topology.
2. Data Link Layer: The data link layer is where switches operate and provides a
reliable link between two directly connected nodes. The data link layer is also
responsible for detecting and possibly fixing any packet errors that may form on
the physical layer.
3. Network Layer: The network layer is where routers operate. A router is a
hardware device that forwards packets of information between computers on a
network and is responsible for sending and receiving packets from the Internet.
So, the origin and destination of these packets is determined by the IP address of
your router.
4. Transport Layer: The transport layer is responsible for the logistics of the
session. For example, the transport layer would be responsible for determining
what and how much information is transferred between the operating system and
the web server.
5. Session Layer: The session layer is responsible for creating and maintaining
sessions between the operating system on the presentation layer and other, third
party machines.
6. Presentation Layer: The presentation layer is where the operating system lies.
This operating system could be Windows, OS X, a Unix based operating system
or one of the many others available.
7. Application Layer: The application layer is where the user inputs data and
receives the output. The application layer is usually software that is run off the
18 | P a g e
Introduction to Computer Networks
local machine, however this depends on the network architecture. The software
could be cloud based, meaning it runs off a server in a remote location and data
is transferred over the internet, or the software could be run on a local server.
19 | P a g e
Introduction to Computer Networks
20 | P a g e
Introduction to Computer Networks
21 | P a g e
Introduction to Computer Networks
22 | P a g e
Introduction to Computer Networks
There are steps that you need to follow for finding the MAC address of a device.
These steps are different for different environment: Windows, Linux, Apple,
Android, and iPhone or iPad.
Windows Environment
1. Click on Start and type “cmd” to find the Command Prompt. Press “Enter”
to open the Command Prompt.
2. Type the command “getmac” or “ipconfig/all”. getmac provides a list of
MAC addresses of communication devices. ipconfig/all provides a list of
compatible network configurations and their MAC addresses.
Linux Environment
1. Open “Terminal”.
2. Type the command “ifconfig-a”.
23 | P a g e
Introduction to Computer Networks
Android Devices
1. Tap on “Settings.”
2. Tap on “About Phone”.
3. Tap on “Status”.
4. MAC addresses are listed in for Wi-Fi and Bluetooth adaptors.
iPhone/iPad Devices
1. Tap on “Settings”.
2. Tap on “General”.
3. Tap on “About”.
4. MAC addresses are listed in for Wi-Fi and Bluetooth adaptors.
24 | P a g e
Introduction to Computer Networks
6. Introduction to IP Address
The Internet is a worldwide network of unrelated computers that can only
communicate using Internet Protocol. And, every machine participating in a computer
network, that uses the Internet Protocol for communication, has a unique identifying
number, called an Internet Protocol address (IP address). We can also say that an IP
address is the logical address that identifies a machine on a network.
IP addresses are unique, which means each address defines one, and only one,
connection to internet. No two devices on the internet can have same IP address at
same time. IP addressing was designed to allow a host on one network to Communicate
with a host on a different network.
25 | P a g e
Introduction to Computer Networks
Windows Environment
26 | P a g e
Introduction to Computer Networks
1. Click on Start and type “cmd” to find the Command Prompt. Press
“Enter” to open the Command Prompt.
2. Type the command “ipconfig” to get the private IP address.
Linux Environment
1. Open “Terminal”.
2. Type the command “ifconfig” to find the private IP address.
Android Devices
1. Tap on “Settings”.
2. Tap on “About Phone”.
3. Tap on “Status”.
4. IP addresses are listed.
iPhone/iPad Devices
1. Tap on “Settings”.
2. Tap on “General”.
3. Tap on “About”.
4. IP addresses are listed.
27 | P a g e
Introduction to Computer Networks
Here are the steps to follow for finding Public IP Address of a Device Connected to
a Network:
28 | P a g e
Introduction to Computer Networks
7. Communication Protocols
A communication protocol is a set of rules that allow two devices in a network to
transmit information over a physical medium.
The protocol defines the rules, syntax, semantics of communication and possible error
recovery approaches. Communication protocols can be implemented in hardware,
software or a combination of both. Here are two common types of communication
protocols:
Some of the key terms that are required to understand communication protocols are
described as follows:
1. Ports: The ports are communication endpoints which are associated to various
services provided by communication protocols. For example, if someone sends
an email it uses SMTP port number 25. Similarly, if someone tries to access any
secured website it uses HTTPS, which runs on port number 443. Each port
29 | P a g e
Introduction to Computer Networks
identifies with a specific process or type of network service and is denoted with
a 16-bit unsigned integer.
• Port numbers range from 0 to 65535.
• Port numbers ranging from 0 to 1023 are commonly used ports and have
pre-defined services attached.
• Port number ranging from 1024 to 65535 are open ports and are available
for general use by applications.
2. Subnets and Subnetting: A subnetwork is a logical division of an IP network
or a network within a network. The act of dividing a network into two or more
networks is called subnetting. The purpose of subnetting is to improve the
efficiency of networks without passing through unnecessary networking devices
to reach their destination.
3. Subnet Mask: A subnet mask is like an IP address but only for internal usage
within a network.
4. Network Address Translation (NAT): Network address translation (NAT)
is a method of mapping multiple computers or network devices with multiple IP
addresses in a computer network to a single IP address on the internet. This
allows:
• Multiple IP addresses within the computer network to be mapped to a
single IP address that acts like the receptionist.
• Any communication to happen from the internet with the devices in the
network to reach the common single IP address.
• Routers to carry out NAT with other networking devices such as firewalls
and switches also supporting NAT.
30 | P a g e
Introduction to Computer Networks
31 | P a g e
Introduction to Computer Networks
A URL contains of multiple parts that help access specific resources from a computer
network. These are: Protocol, Top Level Domain, Domain name and Sub-domain.
1. Protocol: HTTP, HTTPS, FTP or similar that defines the set of rules for
information exchange.
2. Top Level Domain: This is the common domain to which the URL falls
such as .com or .edu.
3. Domain name: This is the name of the resource that is being accessed for
example google or amazon.
4. Sub-domain: This the sub-domain under the common domain through
which resource will be accessed such as www.
Website
A website can be accessed using URLs, which are mapped to IP addresses and help in
locating the websites on the computer network. Websites contain pages called as “Web
pages” that are essentially a collection of text, multimedia and links to other pages and
arranged in a uniform format to make it easy for users to access the resources they
need. There are two types of websites:
1. Accessible All websites that are accessible to general public are part of
the internet and use the World Wide Web or www for short.
32 | P a g e
Introduction to Computer Networks
33 | P a g e
Introduction to Computer Networks
34 | P a g e