Computer Networking Fundamentals (3 Days)

£1,795.00

Category:

Description

The importance of understanding networks from the bottom up in this Network Connected Age

There is a growing demand for qualified network engineers in today’s marketplace. Many IT specialists have spent time learning to code, build hardware and/or develop web based systems but all too often they have neglected to get a grasp on how computers transmit information over networks. This course provides an in-depth study of computer, communications and networks. This module will introduce the concepts and principles of computer networks to guide the installation and maintenance of modern, high quality reliable networks. In addition, attendees will be given the opportunity to learn how to configure and test networks, deploy network based software applications and resolve network infrastructural problems. Students will have an in-depth knowledge of basic skills in networking, and an appreciation for emerging themes that could impact networking in the future. Students will be introduced to packet sniffing software which allows deep analysis of the underlying network.

In a nutshell

This course provides an in-depth hands-on approach to transmitting packets over modern networks. This course will introduce the concepts and principles of configuring & understanding computer networks. In addition, students will be given the opportunity to learn how to configure and test networks, deploy packet sniffers, work with network based software applications and resolve network problems. Students will have an in-depth knowledge of core skills in computer network systems along with an appreciation for emerging themes that could impact networks of the future. Each module includes a practical component where command line, application tools and packet sniffing is used to demonstrate the concepts outlined earlier.

Syllabus

1: INTRODUCTION TO NETWORKS

1.1 USES OF COMPUTER NETWORKS – 1.2 NETWORK HARDWARE – 1.3 NETWORK SOFTWARE – 1.4 REFERENCE MODELS – 1.5 EXAMPLE NETWORKS – 1.6 NETWORK STANDARDIZATION

This module introduces Business & Home Applications, Mobile Users & Social Issues surrounding networks. We briefly introduce Personal Area, Local Area, Metropolitan Area & Wide Area Networks alongside Internetworks. Next we examine Protocol Hierarchies, Design Issues for the Layers, Connection-Oriented Versus Connectionless Service, Service Primitives & the Relationship of Services to Protocols. We first meet the OSI Reference Model and the TCP/IP Reference Model which is the model used in this course. We compare the OSI and TCP/IP Reference Models and we also critique the OSI & TCP Model and Protocols. We introduce the Internet, Third-Generation Mobile Phone Networks, Wireless 802.11 LANS, RFID and Sensor Networks. Finally we discuss Who’s Who in the Telecommunications World, International Standards World and Internet Standards World. 

2 PACKET ANALYSIS AND TAPPING INTO THE WIRE

We cover Packet Analysis and Packet Sniffers, Evaluating a Packet Sniffer, How Packet Sniffers,  Work, How Computers Communicate, Protocols, The Seven-Layer OSI Model, Data Encapsulation, Network Hardware, Traffic Classifications, Broadcast Traffic, Multicast Traffic and Unicast Traffic. We also cover Living Promiscuously, Sniffing Around Hubs, Sniffing in a Switched Environment, Port Mirroring, Hubbing Out, Using a Tap, ARP Cache Poisoning, Sniffing in a Routed Environment and Sniffer Placement in Practice.

3 SNIFFING TRAFFIC WITH WIRESHARK

We cover an Introduction to Wireshark, Installing Wireshark, Wireshark Fundamentals, Your First Packet Capture, Wireshark’s Main Window, Wireshark Preferences, Packet Color Coding and do live sniffing in the lab.

4: THE PHYSICAL LAYER

4.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION – 4.2 GUIDED TRANSMISSION MEDIA – 4.3 WIRELESS TRANSMISSION – 4.4 COMMUNICATION SATELLITES – 4.5 DIGITAL MODULATION AND MULTIPLEXING – 4.6 THE PUBLIC SWITCHED TELEPHONE NETWORK – 4.7 THE MOBILE TELEPHONE SYSTEM – 4.8 CABLE TELEVISION

This module begins with an introduction to Fourier Analysis, Bandwidth-Limited Signals and the Maximum Data Rate of a Channel. We look at physical media such as Magnetic Media, Twisted Pairs, Coaxial Cable, Power Lines & Fiber Optics. Next, we cover the Electromagnetic Spectrum, Radio Transmission, Microwave Transmission, Infrared Transmission & Light Transmission. Communication satellites covers Geostationary, Medium-Earth Orbit and Low-Earth Orbit Satellites. Satellites versus Fiber is discussed. We look at Baseband & Passband Transmission, Frequency, Time and Code Division Multiplexing. It is important to look at the Structure & the Politics of Telephones, the Local Loop: Modems, ADSL, and Fiber, Trunks, Multiplexing & Switching. Related to this is a look at First-Generation (1G) Mobile Phones: Analog Voice, Second-Generation (2G) Mobile Phones: Digital Voice and Third-Generation (3G) Mobile Phones: Digital Voice and Data. We end with a look at Community Antenna Television, Internet over Cable, Spectrum Allocation, Cable Modems & ADSL Versus Cable. 

6: THE MEDIUM ACCESS CONTROL SUBLAYER

6.1 THE CHANNEL ALLOCATION PROBLEM – 6.2 MULTIPLE ACCESS PROTOCOLS – 6.3 ETHERNET – 6.4 WIRELESS LANS – 6.5 BROADBAND WIRELESS – 6.6 BLUETOOTH – 6.7 RFID – 6.8 DATA LINK LAYER SWITCHING

This module looks at Static Channel Allocation, Assumptions for Dynamic Channel Allocation, ALOHA, Carrier Sense Multiple Access Protocols, Collision-Free protocols, Limited-Contention Protocols, Wireless LAN Protocols, Classic Ethernet Physical Layer, Classic Ethernet MAC Sublayer Protocol, Ethernet Performance, Switched Ethernet, Fast Ethernet, Gigabit & 10 Gigabit Ethernet and a retrospective on Ethernet. With regards Wireless, we look at the 802.11 Architecture and Protocol Stack, 802.11 Physical Layer & MAC Sublayer Protocol along with the 802.11 Frame Structure and a comparison of 802.16 with 802.11 and 3G. Bluetooth is covered with regards the 802.16 Architecture and Protocol Stack, 802.16 Physical Layer, MAC Sublayer Protocol, Frame Structure, Architecture, Applications, Buetooth Protocol Stack, Radio Layer, Link Layers & Frame Structure. RFID is introduced through the EPC Gen 2 Architecture, Physical Layer and Tag Identification Layer. Finally we look at the uses of Bridges, learning bridges, spanning tree bridges, repeaters, hubs, switches, routers, gateways and Virtual LANs.

7: THE NETWORK LAYER

7.1 NETWORK LAYER DESIGN ISSUES – 7.2 ROUTING ALGORITHMS – 7.3 CONGESTION CONTROL ALGORITHMS – 7.4 QUALITY OF SERVICE – 7.5 INTERNETWORKING – 7.6 THE NETWORK LAYER IN THE INTERNET

We begin by covering Store-and-Forward Packet Switching, services provided to the Transport Layer, Implementation of Connectionless Service & the Connection-Oriented Service plus a comparison of Virtual-Circuit and Datagram Networks. We introduce the Optimality Principle, Shortest Path Algorithm, Flooding, Distance Vector Routing, Link State Routing, Hierarchical Routing, Broadcast Routing, Multicast Routing, Anycast Routing, Routing for Mobile Hosts and Routing in Ad Hoc Networks. We look at Approaches to Congestion Control, Traffic-Aware Routing, Admission Control, Traffic Throttling and Load Shedding. Next we examine Application Requirements, Traffic Shaping, Packet Scheduling, Admission Control, Integrated Services and Differentiated . We examine how Networks Differ and how Networks Can Be Connected, Tunneling, Internetwork Routing and Packet Fragmentation. We delve into the IP Version 4 Protocol, IP Addresses, IP Version 6, Internet Control Protocols, Label Switching and MPLS, OSPF–An Interior Gateway Routing Protocol, BGP–The Exterior Gateway Routing Protocol, Internet Multicasting and Mobile IP. 

8: THE TRANSPORT LAYER

8.1 THE TRANSPORT SERVICE – 8.2 ELEMENTS OF TRANSPORT PROTOCOLS – 8.3 CONGESTION CONTROL ALGORITHMS – 8.4 THE INTERNET TRANSPORT PROTOCOLS: UDP – 8.5 THE INTERNET TRANSPORT PROTOCOLS: TCP – 8.6 PERFORMANCE ISSUES

We start off looking at services provided to the Upper Layers, Transport Service Primitives and Berkeley Sockets. Next we discuss Addressing, Connection Establishment & Release, Flow Control and Buffering, Multiplexing and Crash Recovery. We examine Desirable Bandwidth Allocation, Regulating the Sending Rate and Wireless Issues. Ne introduce UDP, Remote Procedure Call and the Real-Time Transport Protocol. Next is TCP where we examine the TCP Service, TCP Protocol, TCP Segment Header, TCP Connection Establishment, TCP Connection Release, TCP Connection Management Modeling, TCP Transmission Policy, TCP Timer Management, TCP Congestion Control and the Future of TCP. Finally we look at Performance Problems in Computer Networks, Network Performance Measurement, Host Design for Fast Networks, Fast Segment Processing and Header Compression. 

9: THE APPLICATION LAYER

9.1 DNS–THE DOMAIN NAME SYSTEM – 9.2 ELECTRONIC MAIL – 9.3 THE WORLD WIDE WEB – 9.4 REALTIME AUDIO AND VIDEO – 9.5 CONTENT DELIVERY AND PEER-TO-PEER

We start by looking at the DNS Name Space, Resource Records, Name Servers, Architecture and Services, The User Agent, Message Formats, Message Transfer, Final Delivery, Architectural Overview, Static Web Pages, Dynamic Web Pages and Web Applications, HTTP–The HyperText Transfer Protocol, Mobile Web and Web Search. We look at multimedia by an introduction to Digital Audio, Audio Compression, Streaming Audio, Internet Radio, Voice over IP, Introduction to Video, Video Compression and Video on Demand. Finally we look into Server Replication, Content Delivery Networks, Peer-to-Peer Networks and Overlay Networks.

10: NETWORK SECURITY

10.1 CRYPTOGRAPHY – 10.2 SYMMETRIC-KEY ALGORITHMS – 10.3 PUBLIC-KEY ALGORITHMS – 10.4 DIGITAL SIGNATURES – 10.5 MANAGEMENT OF PUBLIC KEYS – 10.6 COMMUNICATION SECURITY – 10.7 AUTHENTICATION PROTOCOLS – 10.8 EMAIL SECURITY – 10.9 WEB SECURITY – 10.10 SOCIAL ISSUES
We begin with an introduction to Cryptography and discuss substitution Ciphers, Transposition Ciphers, One-Time Pads, Two Fundamental Cryptographic Principles, DES–The Data Encryption Standard, AES–The Advanced Encryption Standard, Cipher Modes, Other Ciphers, Cryptanalysis, RSA, Other Public-Key Algorithms, Symmetric-Key Signatures, Public-Key Signatures, Message Digests and the Birthday Attack. We then discuss Certificates, X.509, Public Key Infrastructures, IPsec Firewalls, Virtual Private Networks and Wireless Security. Authentication is a core aspect of security so we examine Authentication Based on a Shared Secret Key, Establishing a Shared Key: The Diffie-Hellman Key Exchange, Authentication Using a Key Distribution Center, Authentication Using Kerberos and Authentication Using Public-Key Cryptography. Finally we look at PGP–Pretty Good Privacy, S/MIME, Threats, Secure Naming, SSL–The Secure Sockets Layer and Mobile Code Security.

 

 

Additional information

Equipment to bring

Students should bring their own laptop but we can also provide a laptop in many cases. Some of the course exercises are based on Windows, while others focus on Linux. VMware Player or VMware Workstation is used for the class. We can provide it on the day. If you plan to use a Macintosh, please make sure you bring VMware Fusion, along with a Windows guest virtual machine.

You will also be required to disable your anti-virus tools temporarily for some exercises, so make sure you have the anti-virus administrator permissions to do so. Do not plan on just killing your anti-virus service or processes, because most anti-virus tools still function, even when their associated services and processes have been terminated. For many enterprise-managed clients, disabling your anti-virus tool may require a different password than the Administrator account password. Please bring that administrator password for your anti-virus tool. We will provide you with a copy of the attack tools to experiment with during the class and to take home for later analysis.

Who should attend?

We welcome anyone with some background in an aspect of IT/computing. Ideally the person is an IT professional but we can tailor aspects of the material to suit the strength of the attendee. We particularly welcome networking specialists, coders, under-graduates and post-graduates, professionals who need to build deeper technical skills and those looking to move into a computer networks related area.

Why choose this course?

This course offers in-depth technical excellence along with industry-leading methodologies to examine networks from the bottom up.

We provide theoretical in-depth notes on networks and testing networks alongside cutting edge lab classes to demonstrate the tools.

We go deep into the tools arsenal with numerous hands-on exercises that show subtle, less well-known and undocumented features that are useful for those who wish to simply know more about networks.

We show how the tools interrelate with each other in an overall testing process by focusing on the workflow of professional penetration testers and ethical hackers, proceeding step by step and discussing the most effective means for conducting projects.

We show how penetration testing and ethical hacking should fit into a comprehensive enterprise information security program.

Location & Dates:

We generally run our courses in local hotels or training centres but we can also visit your company and conduct the training there. We are flexible. We also can do weekends.

Email us at info@wirelessnetworksecuritycourses.com with your preferred date(s) for training.