Instructor’s Manual
Module A
Networking Concepts
Overview
The broad goal of this module is to review networking concepts. Because the review is
designed to prepare the student to deal with networking concepts in the security context,
there are many notes about the security implications of networking individual concepts.
Therefore, it is suggested that this Module is reviewed before Chapter 3, which is the first
chapter to deal with networking concepts.
Teaching Suggestions
Special Issues
If your students do not have networking as a prerequisite or co-requisite, this material may
be challenging for them. However, without a decent knowledge of networking, it is
impossible to master security today.
Even students who have had a networking course will probably find that they have
forgotten much of what they learned, so even they will be challenged. And they may not
have seen some topics introduced here, such as TCP sequence numbers and
acknowledgement numbers, which are important in networking.
Teaching the Material
Flow of Material
The module starts with a sampling of networks to show the main elements of
networks.
, Network protocols and vulnerabilities are covered next. This is a pure security topic.
The next topic is core layers in layered standards architecture. This section divides
network protocols into single-network protocols, Internet protocols, and application
protocols.
The next section introduces the OSI and TCP/IP standards architectures. It discusses
the hybrid TCP/IP-OSI standards architecture that most real organizations use.
The following section looks at physical and data link layer standards, including
switch operation, transmission media, and switch supervisory standards.
Next is a discussion of the standards used in Internetworking. This is followed by
sections on the Internet Protocol (IP), TCP, UDP, and TCP/IP supervisory standards.
Although these are being listed in a single bullet point, they collectively make up the
majority of the chapter.
The final section covers application standards in general and looks specifically at
HTTP, HTML, e-mail, Telnet, FTP, and SSH. It notes the security issues regarding this
standard.
Covering the Material
This is pretty much a lecture module.
Assigning Homework
To focus students, you can assign specific Test Your Understanding questions, Hands-On
Projects, Project Questions, and end-of-chapter questions they should master or even hand
in as homework. You can also specify questions or parts of questions they do not have to
master. Multiple choice and true/false questions in the testbank are tied to specific parts of
specific questions, so creating multiple guess questions on exams is relatively
straightforward.
, Answer Key
Module A
Networking Concepts
Introduction
1. a) What is an octet?
A collection of 8 bits
b) What is a host?
Any device with an IP address
c) Is a home PC connected to the Internet a host?
Yes
d) Distinguish between the terms internet and Internet.
When the term is spelled with a lowercase “i,” it refers to any internet or the
internet layer. When it is spelled with an uppercase “I,” it refers to the global
Internet.
A Sampling of Networks
A Simple Home Network
2. a) What are the functions of an access router? Explain each function in one sentence.
It is a switch, a wireless access point (sometimes), a router to connect the
firm to the Internet, a DHCP server, and a NAT provider.
b) Describe the technology of 4-pair UTP wiring.
A UTP cord contains eight copper wires organized as four pairs. The two
wires of each pair are twisted around each other several times an inch to
reduce interference.
, c) What is an Internet access line?
A transmission line that connects a home or business to its Internet service
provider
d) What is a broadband modem?
A broadband modem transmits signals over a broadband access line.
e) Why is wireless transmission dangerous?
Eavesdroppers can intercept wireless transmissions.
A Building LAN
3. a) What is a local area network?
A local area network (LAN) is a network that operates on the customer’s
premises.
b) What is the customer premises?
The land and buildings owned by the corporations
c) Distinguish between workgroup switches and core switches.
Workgroup switches connect users to the network. Core switches connect
switches to other switches.
d) Why is UTP dangerous?
It is easy to tap and generates signals that can be picked up even without
tapping the UTP cord.
e) Why is 802.1X needed?
Most switches today have 802.1X capability that requires any device
connecting to a wall jack to authenticate itself before being allowed to
transmit beyond the switch.
A Firm’s Wide Area Networks (WANs)
4. a) Distinguish between LANs and WANs.
LANs operate within a company’s premises. WANs connect different
premises.
b) Why do companies use carriers for WAN transmission?
They lack the right of way to lay communication facilities between sites.
c) What two WAN technologies are illustrated in the figure (Figure A-4)?
Point-to-point networks and public switched data networks (Frame Relay)
d) Why is carrier WAN traffic generally considered safe?
Access to the network is limited, and internal routing is hidden.
Module A
Networking Concepts
Overview
The broad goal of this module is to review networking concepts. Because the review is
designed to prepare the student to deal with networking concepts in the security context,
there are many notes about the security implications of networking individual concepts.
Therefore, it is suggested that this Module is reviewed before Chapter 3, which is the first
chapter to deal with networking concepts.
Teaching Suggestions
Special Issues
If your students do not have networking as a prerequisite or co-requisite, this material may
be challenging for them. However, without a decent knowledge of networking, it is
impossible to master security today.
Even students who have had a networking course will probably find that they have
forgotten much of what they learned, so even they will be challenged. And they may not
have seen some topics introduced here, such as TCP sequence numbers and
acknowledgement numbers, which are important in networking.
Teaching the Material
Flow of Material
The module starts with a sampling of networks to show the main elements of
networks.
, Network protocols and vulnerabilities are covered next. This is a pure security topic.
The next topic is core layers in layered standards architecture. This section divides
network protocols into single-network protocols, Internet protocols, and application
protocols.
The next section introduces the OSI and TCP/IP standards architectures. It discusses
the hybrid TCP/IP-OSI standards architecture that most real organizations use.
The following section looks at physical and data link layer standards, including
switch operation, transmission media, and switch supervisory standards.
Next is a discussion of the standards used in Internetworking. This is followed by
sections on the Internet Protocol (IP), TCP, UDP, and TCP/IP supervisory standards.
Although these are being listed in a single bullet point, they collectively make up the
majority of the chapter.
The final section covers application standards in general and looks specifically at
HTTP, HTML, e-mail, Telnet, FTP, and SSH. It notes the security issues regarding this
standard.
Covering the Material
This is pretty much a lecture module.
Assigning Homework
To focus students, you can assign specific Test Your Understanding questions, Hands-On
Projects, Project Questions, and end-of-chapter questions they should master or even hand
in as homework. You can also specify questions or parts of questions they do not have to
master. Multiple choice and true/false questions in the testbank are tied to specific parts of
specific questions, so creating multiple guess questions on exams is relatively
straightforward.
, Answer Key
Module A
Networking Concepts
Introduction
1. a) What is an octet?
A collection of 8 bits
b) What is a host?
Any device with an IP address
c) Is a home PC connected to the Internet a host?
Yes
d) Distinguish between the terms internet and Internet.
When the term is spelled with a lowercase “i,” it refers to any internet or the
internet layer. When it is spelled with an uppercase “I,” it refers to the global
Internet.
A Sampling of Networks
A Simple Home Network
2. a) What are the functions of an access router? Explain each function in one sentence.
It is a switch, a wireless access point (sometimes), a router to connect the
firm to the Internet, a DHCP server, and a NAT provider.
b) Describe the technology of 4-pair UTP wiring.
A UTP cord contains eight copper wires organized as four pairs. The two
wires of each pair are twisted around each other several times an inch to
reduce interference.
, c) What is an Internet access line?
A transmission line that connects a home or business to its Internet service
provider
d) What is a broadband modem?
A broadband modem transmits signals over a broadband access line.
e) Why is wireless transmission dangerous?
Eavesdroppers can intercept wireless transmissions.
A Building LAN
3. a) What is a local area network?
A local area network (LAN) is a network that operates on the customer’s
premises.
b) What is the customer premises?
The land and buildings owned by the corporations
c) Distinguish between workgroup switches and core switches.
Workgroup switches connect users to the network. Core switches connect
switches to other switches.
d) Why is UTP dangerous?
It is easy to tap and generates signals that can be picked up even without
tapping the UTP cord.
e) Why is 802.1X needed?
Most switches today have 802.1X capability that requires any device
connecting to a wall jack to authenticate itself before being allowed to
transmit beyond the switch.
A Firm’s Wide Area Networks (WANs)
4. a) Distinguish between LANs and WANs.
LANs operate within a company’s premises. WANs connect different
premises.
b) Why do companies use carriers for WAN transmission?
They lack the right of way to lay communication facilities between sites.
c) What two WAN technologies are illustrated in the figure (Figure A-4)?
Point-to-point networks and public switched data networks (Frame Relay)
d) Why is carrier WAN traffic generally considered safe?
Access to the network is limited, and internal routing is hidden.