InternetSecurityInternetSecurity Dr. ClincyLecture1 CONNECTING DEVICES.

Slides:



Advertisements
Similar presentations
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Advertisements

TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Chapter 19 Network Layer: Logical Addressing Stephen Kim.
1 Computer Communication & Networks Lecture 17 & 18 Network Layer: Logical Addressing Waleed Ejaz.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
IP Suite© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
TCP/IP Protocol Suite 1 Chapter 4 Objectives Upon completion you will be able to: IP Addresses: Classful Addressing Understand IPv4 addresses and classes.
Introduction to TCP/IP
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 PART IV NETWORK LAYER.
Subnetting.
7/3/2015 Unit-3 : Network Layer 1 CS 1302 Computer Networks — Unit - 3 — — Network Layer — Text Book Behrouz.A. Forouzan, “Data communication and Networking”,
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 19 Network Layer Logical Addressing © 2012 by McGraw-Hill Education. This is proprietary material.
IP-adresses and subnet masks. Figure 19.9 Dotted-decimal notation.
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
1 Kyung Hee University Part 4 : Network Layer. 2 Kyung Hee University Role and Position of Network Layer o Network layer in the Internet model is responsible.
1 Computer Communication & Networks Lecture 20 Network Layer: IP and Address Mapping (contd.) Waleed.
CSISCSIS Dr. ClincyLecture1 SUPERNETTING Although class A and B addresses are dwindling – there are plenty of class C addresses The problem with C addresses.
CS8640CS8640 Dr. ClincyLecture1 Cover BOOTP/DHCP.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
TCP/IPTCP/IP Dr. ClincyLecture1 Chapter 5: Addressing (Part 2 of 3) Agenda Special Addresses Classful - Subnetting Classful - Supernetting.
CS4500CS4500 Dr. ClincyLecture1 Lecture #2 Chapter 5: Addressing (Part 2 of 3)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Page 1 Network Addressing CS.457 Network Design And Management.
CS4500CS4500 Dr. ClincyLecture1 Lecture #6 Chapter 5: Addressing (part 1 of 3) Address Structure Classful Addressing Number Systems (Appendix B) Mask –
Chapter 5 IPv4 Address.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Network Layer PART IV.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
IP ADDRESSING Lecture 2: IP addressing Networks and Communication Department 1.
CS4500CS4500 Dr. ClincyLecture1 Lecture #1 Chapter 5: Addressing (part 1 of 3)
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
UNIT 4 NETWORK LAYER. Position of network layer 7/8/2016 UNIT-3 : NETWORK LAYER 2.
Chapters 4 & 5 Addressing Part 2 of 2
4.3 Network Layer Logical Addressing
IP: Addressing, ARP, Routing
Chapter 6 Delivery & Forwarding of IP Packets
Network Layer, and Logical Addresses
Chapter 21 Address Mapping
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
PART IV Network Layer.
4 Network Layer Part I Computer Networks Tutun Juhana
Chapter 7: The Infamous IP
BOOTP and DHCP Objectives
Net 323: NETWORK Protocols
CS 457 – Lecture 10 Internetworking and IP
Chapter 5 Addressing Dr. Clincy Lecture.
NAT/ARP/RARP (Ch 5 & 8) Dr. Clincy Lecture.
8PM – Quickly Overview Final Project
Chapter 7: The Infamous IP
Chapters 4 & 5 Addressing Will go over Exam 2
Ch 3: Underlying Technologies (remainder)
Wide Area Networks and Internet CT1403
CPEG512 Advanced Computer Networks
Data Communications and Networking
Introduction to Networks
Presentation transcript:

InternetSecurityInternetSecurity Dr. ClincyLecture1 CONNECTING DEVICES

InternetSecurityInternetSecurity Dr. ClincyLecture2 Repeater Operates at the physical layer – layer 1 Receives the signal and regenerates the signal in it’s original pattern Is there a difference between a regen or repeater and an amp ?? A repeater forwards every bit; it has no filtering capability

InternetSecurityInternetSecurity Dr. ClincyLecture3 Bridge Operates at both the physical and data link layers At layer 1, it regenerates the signal. At layer 2, it checks the Tx/Rx physical address (using a bridge table) Example Below: If packet arrives to bridge-interface #1 for either of the 71….. stations, the packet is dropped because the 71…. Stations will see the packet If packet arrives to bridge-interface #2 for either of the 71….. stations, the packet is forwarded to bridge-interface #1 With such an approach, the “bridged” network segments will acted as a single larger network What is a “smart” bridge ??

InternetSecurityInternetSecurity Dr. ClincyLecture4 Routing example LAN 1 LAN2 Routers can change the physical address of a packet Example: as a packet flow from LAN 1 to LAN 2 In LAN 1, the source address is the Tx’s address and the destination address is the Router’s interface address In LAN 2, the source address is the Router’s interface address and the destination address is the Rx’s address

InternetSecurityInternetSecurity Dr. ClincyLecture5 Network Addressing

InternetSecurityInternetSecurity Dr. ClincyLecture6 Recall: physical address is needed on a local perspective Recall: logical (or IP) address is needed on a global perspective Therefore, both addresses are needed Likewise, there is a need to map the logical address to it’s corresponding physical address (and vice versa) The mapping can be “static” or “dynamic” in nature Recall- Physical and Logical Addresses

InternetSecurityInternetSecurity Dr. ClincyLecture7 The IP Address has 3 notations: Binary, Dotted-decimal and HexadecimalThe IP Address has 3 notations: Binary, Dotted-decimal and Hexadecimal Binary: 4 Octets:Binary: 4 Octets: Dotted-Decimal (or dot notation): IP Addresses For Dotted-Decimal, each number can range from 0 to 255 Hexadecimal: D EA

InternetSecurityInternetSecurity Dr. ClincyLecture8 IP Addresses: Classful Addressing When IP addressing was first started, it used a concept called “classful addressing”. A newer concept called “classless addressing” is slowly replacing it though. Regarding “classful addressing”, the address space is divided into five classes: A, B, C, D and E. Class# of addressesPercent of the Space A2 31 = % B2 30 = % C2 29 = % D2 28 = % E2 28 = %

InternetSecurityInternetSecurity Dr. ClincyLecture9 Netid and hostid A, B and C class-addresses are divided into network id and host id For Class A, Netid=1 byte, Hostid = 3 bytes For Class B, Netid=2 bytes, Hostid = 2 bytes For Class C, Netid=3 bytes, Hostid = 1 byte

InternetSecurityInternetSecurity Dr. ClincyLecture10 Blocks in class A Class A has 128 blocks or network ids First byte is the same (netid), the remaining 3 bytes can change (hostids) Network id 0 (first), Net id 127 (last) and Net id 10 are reserved – leaving 125 ids to be assigned to organizations/companies Each block contains 16,777,216 addresses – this block should be used by large organizations. How many Host can be addressed ???? The first address in the block is called the “network address” – defines the network of the organization Example Netid 73 is assigned Last address is reserved Recall: routers have addressees

InternetSecurityInternetSecurity Dr. ClincyLecture11 Blocks in class B Class B is divided into 16,384 blocks (65,536 addresses each) 16 blocks are reserved First 2 bytes are the same (netid), the remaining 2 bytes can change (hostids) For example, Network id covers addresses to Network id is the last netid for this block Example Netid is assigned Last address is reserved Recall: routers have addresses

InternetSecurityInternetSecurity Dr. ClincyLecture12 Blocks in class C Class C is divided into 2,097,152 blocks (256 addresses each) 256 blocks are reserved First 3 bytes are the same (netid), the remaining 1 byte can change (hostids) For example, Network id covers addresses to

InternetSecurityInternetSecurity Dr. ClincyLecture13 Network Addresses The network address is the first address. The network address defines the network to the rest of the Internet. Given the network address, we can find the class of the address, the block, and the range of the addresses in the block Given the network address , find the class, the block, and the range of the addresses. Solution The class is A because the first byte is between 0 and 127. The block has a netid of 17. The addresses range from to Given the network address , find the class, the block, and the range of the addresses. Solution The class is B because the first byte is between 128 and 191. The block has a netid of The addresses range from to Given the network address , find the class, the block, and the range of the addresses. The class is C because the first byte is between 192 and 223. The block has a netid of The addresses range from to Solution

InternetSecurityInternetSecurity Dr. ClincyLecture14Mask A mask is a 32-bit binary number that gives the first address in the block (the network address) when bitwise ANDed with an address in the block. Given the network address, we can easily determine the block and range of addresses Suppose given the IP address, can we determine the network address (beginning of the block) ? To route packets to the correct network, a router must extract the network address from the destination IP address For example, given , we know this is a class B, therefore is the netid and is the network address (starting address of the block) How would we EXTRACT the network address from the IP address? We would use a MASK.

InternetSecurityInternetSecurity Dr. ClincyLecture15 SUBNETTING When we talked about CLASSFUL addressing – we realized the problem of wasted host addresses and depleting available network addresses. Why wasted addresses ? Because there is a single “owner” of the entire block – block can’t be shared with other “owners” In subnetting, a network is divided into several smaller “autonomous or self-contained” networks called subnetworks or subnets – each subnet will have it’s own set of addresses Typically, there are 2 steps in reaching a destination: first we must reach the network (netid) and then we reach the destination (hostid) With subnets, there could be atleast 3 steps, (1) netid, (2) subnet id, and (3) hostid

InternetSecurityInternetSecurity Dr. ClincyLecture16 A network with two levels of hierarchy (not subnetted) The 2 level approach is not enough some times – you can only have 1 physical network – in example, all host are at the same level – no grouping

InternetSecurityInternetSecurity Dr. ClincyLecture17 A network with three levels of hierarchy (subnetted) With subnetting, hosts can be grouped (0-63)(64-127) ( ) ( )

InternetSecurityInternetSecurity Dr. ClincyLecture18 SUPERNETTING Although class A and B addresses are dwindling – there are plenty of class C addresses The problem with C addresses is, they only have 256 hostids – not enough for any midsize to large size organization – especially if you plan to give every computer, printer, scanner, etc. multiple IP addresses Supernetting allows an organization the ability to combine several class C blocks in creating a larger range of addresses Note: breaking up a network = subnetting Note: combining Class-C networks = supernetting

InternetSecurityInternetSecurity Dr. ClincyLecture19 CLASSLESS ADDRESSING Recall the problems with Classful addressing – you have to get a predefined block of addresses – in most cases, the block is either too large or too small In the 1990’s, ISP came into prominence – they provide Internet access for individuals to midsize organizations that don’t want sponsor their own Internet service (ie. , etc). The ISP’s are granted several B and C blocks of addresses and they subdivide their address space into groups of 2, 4, 8, 16, etc.. – blocks can be variable length Because of the up rise of ISP’s, in 1996, the Internet Authorities announced a new architecture called Classless Addressing (making classful addressing obsolete)

InternetSecurityInternetSecurity Dr. ClincyLecture20 NETWORK ADDRESS TRANSLATION (NAT) Network Address Translation (NAT) allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with another site. The site must have only one single connection to the global Internet through a router that runs NAT software. The routers only 2 address: (1) the global IP address and (2) one private address

InternetSecurityInternetSecurity Dr. ClincyLecture21 IP datagram IP datagram is variable length consisting of two parts (header, data) Header is bytes & contains routing and deliver info Ver – version of IP HLEN – header length – total length of the header field (in 4-byte words or units) Service type – now called Differentiated Services – tells the service type (ie. ftp, dns, telnet, etc..) – will come back to this Total length – defines the total length of the datagram including the header – need this to determine if padding is needed – recall Ethernet frame can range bytes – so if the IP datagram is less than 46 bytes (need padding) Identification – used for fragmentation – networks that are not able to encapsulate the full IP datagram will need to fragment – will come back to this Flags – used for fragmentation – will come back to this Fragmentation offset – used for fragmentation – will come back to Time to live – datagram life time as it travels – used to control the number of hops (routers) a datagram can traverse – fix infinite loop problems Protocol – defines the higher level protocol (ie. TCP, UDP, ICMP, ICMP, etc..) that’s using the service of the IP layer – since the IP Muxes data from the Transport layer – this field is used to demux

InternetSecurityInternetSecurity Dr. ClincyLecture22 Dynamic Mapping: ARP and RARP ARP: maps the logical address to the physical address (given logical, find physical) RARP: maps the physical address to the logical address (given physical, find logical) ARP/RARP use unicast & broadcast physical addresses (from earlier lectures, recall the formats of the broadcast/unicast addresses)

InternetSecurityInternetSecurity Dr. ClincyLecture23 BOOTP Each station connected to the Internet must know: It’s IP address It’s subnet mask The IP address of a router The IP address of a name server Typically, this info is stored in the computer’s config file and retrieved during boot-strap time What happens if a computer boots-up for the first time or if a computer is diskless ? Will need an ARP/RARP like protocol to get the needed info BOOTP – stands for Bootstrap Protocol – is a C/S protocol setup to provide the info above

InternetSecurityInternetSecurity Dr. ClincyLecture24 DHCP Although BOOTP provides more information to the client, the physical-to- logical address mapping is static – this mapping must be pre-determined The Dynamic Host Configuration Protocol (DHCP) was devised to extend BOOTP DHCP server has 2 DBs: (1) one DB statically binds the physical and IP addresses (so it can provide the BOOTP type service), (2) a second DB contains a pool of IP addresses (making the assignment of IP addresses dynamic) Therefore, when a client sends a request, the DHCP server first checks its static DB and a permanent (static) IP address is returned. If the physical-to- logical relationship doesn’t exist, it then sends an un-used IP address from it’s second DB. The dynamic IP addresses have a time limit

InternetSecurityInternetSecurity Dr. ClincyLecture25 Recall -Domain Name System (DNS) As we mentioned before, the IP address is used to uniquely identify hosts connected to the Internet (specifically “connections”) The actual IP address is hard to memorize or identify with People prefer names instead of addresses Therefore, we need a way of mapping a name to an address (or vice versa) In the old days, this mapping was done by each host and the host would update this file from a Master file Today, the Internet is too global and large for this approach One approach: have one computer holding these mappings (problem: too many hits – concentrated traffic congestion ) Actual approach: replicate the mappings across distributed computers – the computer needing the info goes to the closest server – approach called DOMAIN NAME SYSTEM (DNS)

InternetSecurityInternetSecurity Dr. ClincyLecture26 Mobile IP Approach - Big Picture Given the agent discovery and registration have occurred, a mobile host now communicate with a remote host (1A) Remote host send packet to mobile host as if mobile host is in its home network (1B) The packet is intercepted by the home agent acting on behalf of the mobile host (2) The home agent then sends the packet to the foreign host via tunneling (encapsulate the IP packet into another packet that has Tx & Rx addresses for the home agent and foreign agent) (3) The foreign agent then decapsulate the packet from the IP packet and consult a registry that cross-referenced the source address of the packet (the mobile host’s home address) with the local care-of address of the mobile host (4) When the mobile host wants to reply back to the remote host, it sends it in the normal manner using the destination address of the packet as now the source address of the reply