The Internet as a network – Security.

Authors Avatar

B. Halai - 9917398

The Internet as a network – Security

Bharat Halai - 9917398

Advanced Topics in Networks, first assignment, University of East London, Dagenham, Essex

Abstract

With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-billion pound organisation. This was certainly not expected.

Keywords: Internet

Introduction

With the recent explosion of the Internet into the global market many of its disadvantages have been blown into proportion. Initially it started off as a military system whereby machines would be linked together using lines so that information can be successfully shared among military machines during wars. It has since then outgrown this objective and is now being extensively used to share general information from simple text documents to providing live feed and updates for customers who are home users to multi-trillion pound organisation. This was certainly not expected.

Being public, the Internet like any road or highway is available to be used by any and every one. Therefore with anything that is public there is an element of security that needs to be acknowledged. It is commonly known that the Internet is unsecure due to the design and nature of it. In order to understand it is best if we start from the basics of the Internet and how it works.

Essentially the Internet is two machines talking to each other, one obtaining information from the other to either provide this information to its operator or to carry out tasks that it may need to complete:

Line of communication

The line of communication does to have to necessarily be a physical connection from point to point, it could be a connection of several million of metres working of a connectionless network therefore travelling over several other network. This is the problem, the fact that this information travels over different networks making it prone to attacks. With one computer communicating with another it has a set of rules (could be loosing related to a language) known as a set of protocols, a set of rules that govern the way that a device communicates with another. The most widely used protocol if known as TCP/IP.

TCP/IP

Transmission Control Protocol with Internet Protocol consists of four layers that all work together to produce the end result of a packet reaching the destination from the host:

Join now!

Application layer – consist of applications and processes that use the network

Host-to-host layer – provides the end to end data delivery mechanisms

Internetwork layer – defines the datagram and handles the routing of data

Network access layer – consists of routines for accessing physical networks                        [1]

Each layer in the stack has to add its own control information such as destination address, routing controls and checksum, these ensure proper delivery of information from source to destination. This information is usually referred to as a header and/or a trailer as it is placed in front or behind the data ...

This is a preview of the whole essay