xPxFxCxTFarhhirdanaeedkrInwy’lietals’erl’ Msn(Mso Seta Pnercuev)bye (rHLAA)N

Review from Module 6

Review: The Gang Recaps Module 6  

Previous Concepts

The New Problem

We have connectivity, but...

Learning Outcomes

Learning Outcomes  

After completing this module, you will be able to:

1 Security and Time Services

1.1 TLS and Time Synchronization

This section introduces foundational security and timing services that support trusted communication and coordinated distributed systems.

Section 7.1: Security and Time (Charlie Work)  

"cTuehmeusic...Gang    Secures    the  Network     "

Title slide introducing security and time synchronization services that enable trusted communication and coordinated operations across distributed systems.

Core Concepts

TLS: Transport Layer Security  

Definition

TLS is a cryptographic protocol designed to provide:

1.

Encryption: Privacy (No eavesdropping).

2.

Integrity: Data has not been changed.

3.

Authentication: Verifying identity.

Analogy: Mac’s "Ocular Patdown"

Mac assesses a threat (Authentication), ensures they aren’t carrying weapons (Integrity), and clears them for entry.

xMxPVEaaerncccifrykyp(etTtedLS )

Warning

SSL is insecure. Always use TLS 1.2 or 1.3.

TLS 1.3 Handshake: The Process  

CS123Ele...nir C S FcevleinryneierviptrntershteHHedeedDlll(Raoloet(+aaCdyipK)heeyrs)+Cert

Technical Steps

1.

Client Hello: "I speak these ciphers."

2.

Server Hello: "Use this one. Here is my Cert."

3.

Key Exchange: Generating session keys.

4.

Finished: Secure tunnel up.

Analogy

The "Secret Handshake" before the gang discusses the scheme.

Certificates and Trust  

Digital Certificates (X.509)

Binds an identity (Domain Name) to a Public Key.

Self-Signed Certificates

Signed by itself, not a trusted CA.

PCVVbxaNaEyd:lidRLdw:IFetyw 2I’sw0EE.p25Dn’sa-2cd0ryPdy2pus6tb.com

Analogy: Bird Law

A Certificate is a contract. You need a Judge (CA) to enforce it. Charlie’s "Bird Law" (Self-Signed) is not recognized in court.

NTP: Network Time Protocol  

Definition

Protocol used to synchronize clocks.

Stratum Levels

Hierarchy of distance from source.

SxSxStttrraraatututmmum12((GP0ooadgdley’)s)

Analogy: Charlie Work

Charlie ensures all clocks match so the bar opens exactly at 11 AM.

NTP Architecture: Hierarchy  

Best Practice Setup

Don’t have every PC query the internet.

1.

Router queries Public NTP (pool.ntp.org).

2.

Switch queries Router.

3.

PC/Server queries Switch/Router.

This creates a single internal time source.

IxCxxnotreerRnouetter NTP

Precision Time Protocol (PTP)  

When Milliseconds Aren’t Good Enough

NTP is accurate to milliseconds (ms). PTP (IEEE 1588) is accurate to microseconds (μs) or even nanoseconds.

Use Cases

Analogy: The Nightman Cometh

In a musical, lights and audio must sync perfectly. Being off by 1ms ruins the show.

μs

Case Study: Dennis & The Paddy’s Time Heist  

Case Study: "The Gang’s POS System Fails"
Paddy’s POS system is rejecting credit cards with error: "Certificate not yet valid."

Facts:

"The computer thinks the internet hasn’t been invented yet!" - Charlie

Review Questions

1.

Why does the wrong date break TLS?

2.

What protocol is missing?

3.

How do we fix it permanently?

Case Study Solution: The Paddy’s Time Heist  

Solution: "The Gang Learns About Time"

1.

Validity: The system thinks it is 1970. The certificate (from 2024) is "from the future" and thus invalid.

2.

Protocol: NTP (Network Time Protocol).

3.

Fix: Configure the POS to sync with pool.ntp.org.

The Fix

# chrony.conf server 0.pool.ntp.org iburst

Lesson

If time is broken, Security is broken. (Logs, Auth, and Certs all fail).

2 Web and File Services

2.1 HTTP, HTTPS, and File Access

This section surveys web and file-service protocols, secure transfer options, and storage access patterns used in modern networks.

Section 7.2: Web and File Services (Dennis’s Domain)  

"The    Gang    Goes   Online   "

Title slide transitioning to web and file service protocols, covering how modern networks transport web content, files, and storage access securely and efficiently.

What we will cover

HTTP: Hypertext Transfer Protocol  

What is it?

The language web browsers use to request webpages.

Analogy: Shouting in the Bar

If Charlie shouts "What is the Wi-Fi password?" across the bar, everyone hears it.

The Conversation (Request/Response)

Browser (GET): GET /menu.html HTTP/1.1 Host: www.paddyspub.com Server (Response): HTTP/1.1 200 OK Content-Type: text/html <html><body><h1>Wolf Cola</h1>...

xxSentopenly

HTTPS: HTTP Secure  

What is it?

HTTP inside a secure, encrypted tunnel (TLS).

Analogy: The Back Office

Dennis takes the customer into the back office and locks the door to discuss "business."

xxTExLnScrTyputnnedelData

HSTS

HTTP Strict Transport Security: A rule servers send to browsers saying "Never talk to me on Port 80 again. Only use Port 443."

HTTP Versions: Evolution of Speed  

Why do we keep changing it?

The internet got heavier (images, videos). We needed faster ways to load pages.

HTTP/1.1 (1997)

"One at a time."

HTTP/2 (2015)

"Multiplexing."

HTTP/3 (2022)

"QUIC (UDP)."

FTP: File Transfer Protocol  

What is it?

A protocol specifically for uploading/downloading files.

The Problem

FTP sends your Username and Password in plain text! If Frank is sniffing the network, he gets your password immediately.

Active vs. Passive

xxPASV Mode (Safe)

Secure File Transfer: Don’t use FTP!  

SFTP (SSH File Transfer)

Recommended Standard.

FTPS (FTP over SSL)

The Old Way.

Exam Tip

If you see SFTP, think SSH (Port 22). If you see FTPS, think SSL (Certificates).

SMB: Server Message Block  

What is it?

Windows File Sharing. This is what you use when you access a "Shared Folder" on the office network.

Security Warning: SMBv1

SMB Version 1 is extremely dangerous.

Storage: NAS vs. SAN  

Where does the data live?

When the server’s hard drive is full, we buy dedicated storage.

NAS (Network Attached Storage)

"The Shared Box"

SAN (Storage Area Network)

"The Virtual Disk"

NAS Use Case: "The Evidence Locker"  

Scenario

Dennis needs a place to store his... "videotapes."

1.

He buys a Synology NAS.

2.

He plugs it into the Paddy’s Switch.

3.

He creates a shared folder: \\NAS\Evidence.

4.

He sets permissions so only he can delete files.

RAID (Redundancy)

Dennis uses RAID 1 (Mirroring) inside the NAS.

xSRyAnIoDl1oOgKy NAS

Databases: Frank’s "Cooked Books"  

SQL (Relational)

Structured Tables. Like an Excel sheet with strict rules.

NoSQL (Non-Relational)

Unstructured Data. Like a box of receipts.

Security

Never expose your database port (e.g., 3306) to the internet. Hackers will brute-force the password in seconds. Keep it behind the firewall!

Case Study: Charlie’s Rat Removal Website  

Case Study: "The Gang Gets Hacked"
Charlie launches charliesratremoval.com (Port 80). He collects credit card payments for his services. It works fine when he tests it locally. However:

Discussion

1.

Why was Frank able to steal the data?

2.

What port/protocol must Charlie enable?

3.

What does Charlie need to install?

Case Study Solution: Charlie’s Rat Removal  

Solution: "The Gang Encrypts"

1.

Vulnerability: HTTP (Port 80) sends data in Cleartext.

2.

Fix: Enable HTTPS on Port 443.

3.

Requirement: A TLS Certificate (e.g., Let’s Encrypt).

The Fix

$ sudo apt install certbot $ sudo certbot –apache

Result

Frank opens Wireshark again. He only sees encrypted garbage.

Section 7.3: Email & Voice (The Conspiracy)  

xM"IOAInuIgoctLtogRbmoOoiiOxennMsggfullofPepe!"

This email architecture diagram illustrates the mailroom metaphor for email services: incoming messages arrive from the blue arrow on the left and outgoing messages depart via the green arrow on the right. The mailroom (represented by a building icon) represents the mail server components. This simple model shows that email systems have asymmetric infrastructure for receiving and sending, with separate roles for inbox access versus message transmission.

Agents

Protocols

SMTP: Simple Mail Transfer Protocol  

Sending Mail

SMTP is a Push protocol.

Spam Prevention

Use SPF, DKIM, DMARC to prove identity. These prevent spoofing by using DNS records and cryptographic signatures.

The Conversation

S: 220 paddys.com ESMTP C: HELO google.com S: 250 Hello C: MAIL FROM: <dee@paddys.com> C: RCPT TO: <waitress@coffee.com> C: DATA C: Subject: Bird C: . S: 250 Ok: queued

Receiving Mail: IMAP vs. POP3  

IMAP (Sync)

"The Cloud" (143/993)

POP3 (Download)

"Local Only" (110/995)

xxxIMIMAAPP

VoIP: Voice Over IP (The Gang Starts a Call Center)  

What is VoIP?

Sending voice as UDP packets.

Bandwidth

Codec Speed
G.711 64 Kbps
G.729 8 Kbps

Streaming 4K video kills VoIP (Jitter).

xxIUnDtPerPnacektets

VoIP Protocols: SIP vs. RTP  

SIP (Session Initiation)

"The Setup" (5060/5061).

RTP (Real-time Transport)

"The Stream" (UDP).

xSxxIRRIPnviTingPSteSertvereram

VoIP Infrastructure: Power and VLANs  

PoE (Power over Ethernet)

Sends power down the cable.

Voice VLANs

xPxxVVoLLEAANN S2010witch

Case Study: The Gang’s Call Center  

Case Study: "Dee Sounds Like a Robot"
The Gang installs a cheap VoIP system to sell "Wolf Cola."

Discussion Questions

1.

What network phenomenon is causing the stuttering?

2.

Why does Mac’s download affect the phones?

3.

What technology allows voice to skip the line?

Case Study Solution: The Gang’s Call Center  

Solution: "The Gang Learns QoS"

1.

Issue: Jitter (Latency variation). Real-time voice cannot tolerate delays.

2.

Cause: Congestion. Mac is filling the bandwidth pipe, forcing voice packets to wait in the buffer.

3.

Fix: Voice and video traffic should be on a separate VLAN. The voice VLAN should implement QoS (Quality of Service) to ensure it has higher priority than best-effort traffic (like game downloads).

QoS Configuration

NGVPeaoritwmicoroeeitrkyPipe

3 High Availability and Recovery

3.1 Resilience Planning and Redundancy

The final section focuses on resilience planning and redundancy mechanisms that reduce downtime and improve service continuity.

High Availability: "The Show Must Go On"  

Concepts

Availability Metrics

Target Downtime/Year
99% 3.65 days
99.9% 8.76 hours
99.999% 5 minutes

  IfPrimarydies,
xPxSHSrieceaecmonronardtbdyaea(ryatryA(tctSaivtakeens)dobyve)r!

DR Metrics: RTO vs. RPO  

How much does Frank lose?

When the server crashes, two clocks start ticking.

RPO (Recovery Point)

"Data Loss Tolerance"

RTO (Recovery Time)

"Downtime Tolerance"

TCRRBRimRPTaeeAOOckstS((uorHDDpeaodtawLntoimses))

DR Sites: Paddy’s Pub 2 (Electric Boogaloo)  

Cold Site

"Empty Warehouse"

Warm Site

"Storage Unit"

Hot Site

"The Franchise"

xCxWxHoaoldrtm

Fault Tolerance: RAID  

RAID (Redundant Array of Independent Disks) combines multiple physical drives into one logical unit for redundancy and/or performance.

RAID 0 (Striping)

"Charlie Special"

RAID 1 (Mirroring)

"Dennis System"

RAID 5 (Parity)

"The Gang Share"

DDDPiiiasssrkkkity123protectsdata

FHRP: First Hop Redundancy Protocols  

The Problem

If the main router (Gateway) dies, the bar loses internet.

The Solution: Virtual IP

Two routers share ONE IP address.

IxAxSVxGnctIattanPteivdewrebany.1ye:t 10.1.1.1

Case Study: Frank’s "Foolproof" Plan  

Case Study: "The Gang Needs 5 Nines"
Frank demands 99.999% availability for his gambling ring.

Current Setup:

Frank’s Budget: $50.

Discussion

1.

Is "Five Nines" realistic?

2.

Identify the SPOF (Single Point of Failure).

3.

Suggest a realistic fix.

Solution: The "Good Enough" Plan  

Solution: "Frank Compromises"

1.

Reality Check: 99.999% costs thousands (redundant ISPs, generators).

2.

SPOF: The router, the power, and Charlie.

3.

Realistic Fix:

xCxUloPuSdBBaattckeruyp

Module Summary

Module 7.0 Summary  

Key Concepts:

High Availability & Disaster Recovery:

Conclusion

This module covered essential application and infrastructure services: TLS and NTP for security and timing, HTTP/FTP/SMB for web and file services, email protocols and VoIP for communication, and RAID/clustering/disaster recovery strategies for high availability and business continuity. In the next module, we’ll explore network operations, monitoring, and management practices.