2. Gateway
A gateway is a network node connecting two
networks that use different protocols.
A node on a network that serves as an entrance
to another network.
In enterprises, The gateway is the computer that
routes the traffic from a workstation to the
outside network that is serving the Web pages.
In homes, the gateway is the ISP that connects
the user to the internet.
3. What is gateway?
Gateway are also known as Protocol Converters and
can operate any network level. The activates of
gateway are more complex than routers or switch as it
works on different protocols.
Router is also gateway, Since it interprets data from
one network protocols to another
Combination of networking hardware and software
that connects two similar kinds of networks.
Popular type of gateways includes:
E-Mail Gateway
IBM Host Gateway
Internet Gateway
LAN Gateway
4. A gateway is an internetworking device that is
capable of joining two different protocol based
network.
5. Functions of gateway
A Gateway can connect the telephone network
to the Internet.
A gateway is always associated with Routers, as
it directs the packets to its destination. On other
hand, you can use it as Proxy Server and
Firewall.
6. Functions of gateway
Web application firewalls filter traffic to and from
a web server and look at application-layer data
Cloud storage gateways translate storage
requests with various cloud storage service API
calls
Cloud bridges connect networks and services
inside a data center to a virtual data center in an
infrastructure as a service environment, or
between IaaS environments
API, SOA or XML gateways manage traffic flowing
into and out of a service, microservices-oriented
architecture or an XML-based web service.
7. Definition of firewall
A firewall is a hardware or software designed to
permit or deny network transmissions based
upon a set of rules and is frequently used to
protect networks from unauthorized access
while permitting legitimate communications to
pass.
Firewalls Can Perform Basic Routing Functions
8. How does a software firewall
work?
Inspects each individual “packet” of data as it arrives at
either side of the firewall
Determines whether it should be allowed to pass
through or if it should be blocked
Focus for security decisions
Stop hackers from accessing your computer
Can enforce security policy
Protects your personal information
Limits your exposure
Blocks “pop up” ads and certain cookies
Can log Internet activity efficiently
Determines which programs can access the Internet
9. Hardware/software firewall
Figure 1: Hardware Firewall.
Hardware firewall providing
protection
to a Local Area Network.
Figure 2: Computer with Firewall
Software.
Computer running firewall software
that provide protection to PC..etc.,
10. Firewall Rules
Allow – traffic that flows automatically
because it has been deemed
Block – traffic that is blocked because it has
been deemed dangerous to your computer
Ask – asks the user whether or not the traffic
is allowed to pass through
11. Types of Firewalls
1. Packet Filtering Firewall
It looks at each packet entering or leaving the
network and accepts or rejects it based on user-
defined rules. Packet filtering is fairly effective and
transparent to users, but it is difficult to configure.
In addition, it is susceptible to IP spoofing.
Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
Filter packets going in both directions
The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP
header
Two default policies (discard or forward)
13. Types of Firewalls
2. Application gateway/ proxy server/ proxy
application gateway
In such type of firewall remote host or network can
interact only with proxy server, proxy server is
responsible for hiding the details of the internal
network
i.e. intranet.
User uses TCP/IP applications, such as FTP and
Telnet servers.
This is very effective, but can impose a performance
degradation.
15. Types of Firewalls
3. Circuit level gateway
It is a stand alone system or application.
It does not permit end-to-end TCP connection. It sets
up 2 TCP connections:
B/w itself and a TCP user on an inner host.
B/w itself and a TCP user on an outer host.
Specialized function performed by an Application-level
Gateway
The gateway typically relays TCP segments from one
connection to the other without examining the
contents
17. Definition of a Bridge
A bridge is a connecting device which has it’s own
processor, memory and two NIC cards, to connect
two portions of a network
Facilitates host to host communication
Operates at the physical as well as data link layer
Bridge is to divide a big network in to smaller sub-
networks
18. How Bridges Work?
Bridges work at the Media Access Control
Sub-layer of the OSI model
.
• Routing table is built to record the segment
no. of
address
.
• If destination address is in the same segment
as the source address, stop transmit
.
• Otherwise, forward to the other segment
19. Bridge at the Last two OSI
Layers
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Bridge
A
Physical layer
Data link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
B
20. Function of a Bridge
As a physical layer device it generates the signal it
receives
As a data link layer device it checks the source and
destination addresses in the frame
It send data frames only to the concerned destination
It minimizes unwanted traffic
It minimizes network congestion
Error links can be identified and then isolated
Security features or access control can be added
It acts as a filter
It maintains a table that maps addresses to ports
21. Characteristics of Bridges
Routing Tables
– Contains one entry per station of network to which bridge
is connected.
– Is used to determine the network of destination station of
a received packet.
Filtering
– Is used by bridge to allow only those packets destined to
the remote network.
– Packets are filtered with respect to their destination and
multicast addresses.
Forwarding
– the process of passing a packet from one network to
another.
Learning Algorithm
– the process by which the bridge learns how to reach
stations on the internetwork.
22. Types of Bridges
Transparent Bridge
– Also called learning bridges
– Build a table of MAC addresses as frames arrive
– Ethernet networks use transparent bridge
– Duties of transparent bridge are : Filtering frames,
forwarding and blocking
Source Routing Bridge
– Used in Token Ring networks
– Each station should determine the route to the
destination when it wants to send a frame and therefore
include the route information in the header of frame.
– Addresses of these bridges are included in the frame.
– Frame contains not only the source and destination
address but also the bridge addresses.
24. Routers versus Bridges
Addressing
Routers are explicitly addressed.
Bridges are not addressed.
Availability
Routers can handle failures in links, stations, and other routers.
Bridges use only source and destination MAC address, which
does not guarantee delivery of frames.
Message Size
Routers can perform fragmentation on packets and thus handle
different packet sizes.
Bridges cannot do fragmentation and should not forward a frame
which is too big for the next LAN.
Forwarding
Routers forward a message to a specific destination.
Bridges forward a message to an outgoing network.
25. Priority
Routers can treat packets according to priorities
Bridges treat all packets equally.
Error Rate
Network layers have error-checking algorithms that
examines each received packet.
The MAC layer provides a very low undetected bit error
rate.
Security
Both bridges and routers provide the ability to put“security
walls” around specific stations.
Routers generally provide greater security than bridges
Because
they can be addressed directly and
They use additional data for implementing security