Introduction to Network. Topics



Similar documents
Communications and Networking

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Networking Basics for Automation Engineers

Transport and Network Layer

White Paper How to Remotely Access Ethernet I/O Over the Internet

Network Layers. CSC358 - Introduction to Computer Networks

IP Phone Presence Setup

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

2. IP Networks, IP Hosts and IP Ports

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

How To Configure A Vyatta As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net (Dspv) On A Network With A D

Protocols. Packets. What's in an IP packet

Introduction to Network Operating Systems

Load Balance Mechanism

Savvius Insight Initial Configuration

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

IP address format: Dotted decimal notation:

Technical Support Information Belkin internal use only

IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy. and of course there can be sub-sub-!!

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Linking 2 Sites Together Using VPN How To

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Mail Server Scenarios and Configurations

TCP/IP Basis. OSI Model

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Using MIS 3e Chapter 6A Appendix

Using VDOMs to host two FortiOS instances on a single FortiGate unit

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

How To Configure A Network Monitor Probe On A Network Wire On A Microsoft Ipv6 (Networking) Device (Netware) On A Pc Or Ipv4 (Network) On An Ipv2 (Netnet) Or Ip

NETWORK SETUP GLOSSARY

Computer Networks: Domain Name System

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Network layer: Overview. Network layer functions IP Routing and forwarding

UIP1868P User Interface Guide

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Multi-Homing Security Gateway

Chapter 16 Route Health Injection

IP Address: the per-network unique identifier used to find you on a network

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Packet Sniffing and Spoofing Lab

How to Configure an Initial Installation of the VMware ESXi Hypervisor

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)

Protocol Rollback and Network Security

IP Addressing Introductory material.

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

MS Skype for Business and Lync. Integration Guide

Broadband Phone Gateway BPG510 Technical Users Guide

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Basic Network Configuration

How do I get to

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

IP Addressing. IP Addresses. Introductory material.

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Creating Custom Nameservers Contents

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Packet filtering and other firewall functions

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Data Communication Networks and Converged Networks

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

Configuring Network Address Translation (NAT)

04 Internet Protocol (IP)

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

EXPLORER. TFT Filter CONFIGURATION

Understand Names Resolution

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Life of a Packet CS 640,

hp ProLiant network adapter teaming

Introduction to Network Security Lab 1 - Wireshark


Non-authoritative answer: home.web.cern.ch canonical name = drupalprod.cern.ch. Name: drupalprod.cern.ch Address:

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Proxy Server, Network Address Translator, Firewall. Proxy Server

Quick Start Guide. Sendio System Protection Appliance. Sendio 5.0

Exterior Gateway Protocols (BGP)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

What communication protocols are used to discover Tesira servers on a network?

BT Internet Connect Global - Annex to the General Service Schedule

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth.

Using IPM to Measure Network Performance

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

How do I configure multi-wan in Routing Table mode?

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Transcription:

Introduction to Security Chapter 3 The Internet 1 Topics The Internet Addressing Client Routing 2

The Internet User s View Internet 3 National, International, and large regionalisps ISP ISP ISP The Internet Hierarchy ISP Regional or localisps Organizations or local ISPs 4

Internet Addressing Different address types Hardware address spoofing IP address Spoofing IP address Space 5 Application Addressing 6

User A Application A1 on PortP1 D1, "Hello" User B Application A1 on PortP2 "Hello" Different Address Types D1, P2, Hello C1, "Hello" TCP TCP D1, TCP, Payload Intermediate System Intermediate System C1, Payload IP - C1 IP - R1 IP - R2 IP -D1 HW2, IP, Payload TCP, C1, Payload Physical HW1 Physical HW2 Physical HW3 Physical HW4 Computer C1 The Internet Computer D1 HW2, HW1, IP, Payload HW4, HW3, IP, Payload 7 Address spoofing Who can generate the address? Spoofing is the ability to change the address Who can see (sniff) the traffic? 8

IP address Spoofing and Sniffing Message will get to John From: Mary To: John Alice John Return message will go back to Alice Computer A Internet Computer B From: D To: A Computer C Computer D Mary 9 IP Address Space In Version 4 the IP address is 32 Bits Total IP address space is 4,294,967,296 10

IP addresses The IP address is written as a four-tuple where each tuple is in decimal and are separated by a "." (called a dot). When talking about an address you pronounce the word dot. So 129.186.5.102 is pronounced 129 dot 186 dot 5 dot 102 11 IP Addressing 12

Machine names The format for the machine name is: machine.domain Where: machine is unique to the domain or subdomain. and domain is a single domain or a series of subdomains. 13 Domain Name Conversion Now lets look at how we can convert a machine name into an IP address. There are two ways that this conversion can take place. The first is to use a table on each host which maintains the mapping between names and IP addresses. This method required very large tables and made it hard to update. The second, and preferred, method is to use a nameserver. The nameserver is actually a set of nameservers each having authority over different domains and subdomains. 14

DNS Model Root Root Root First Level First Level What is the IP address of vulcan.dougj.net DNS DNS IP address of vulcan.dougj.net DNS dougj.net DNS DNS Send mail to: admin@vulcan.dougj.net 15 Client Model Full name:server.dougj.net IP address: Listening Port: 80 Client A Application W1 Client B Internet Application W2 Client C Application W3 16

Client model 1 2 Client 1 Client 2 open_socket () listen(port A) fd = accept() open_socket () listen(port B) fd = accept() open_socket() connect(ip, Port) open_socket() connect(ip, Port) TCP TCP IP = B IP = A Physical Physical Source IP = A Dest IP = B Source Port = Ephemeral Dest Port = A Source IP = B Dest IP = A Source Port = A Dest Port = Ephemeral 17 Client Model Packets from client to server Source IP Destination IP Source Port Destination Port Packets from server to client Source IP Destination IP Source Port Destination Port Client s IP address s IP address Ephemeral port s port number (often well known) s IP address Client s IP address s port number (often well known) Ephemeral port 18

User 1 User 2 Client A Stream A Stream B Stream C Web W1 Multiple Connections The Internet Stream D Web W2 Client B Stream E User 3 User 4 19 Multiple Connections Stream Source IP Destination IP Source Port Destination Port A A W1 Ephemeral A1 80 B A W1 Ephemeral A2 80 C A W1 Ephemeral A3 80 D B W1 Ephemeral B1 80 E B W2 Ephemeral B2 80 20

Routing All hosts and gateways store routing tables Each row in the route table contains: Destination address or address range Next hop for that destination address range The physical interface to use for that address range. (ie: which Ethernet card to use) Example: Destination Next Interface 129.186.4.0 129.186.5.254 en0 21 Routing R1 R2 Host H1 R3 R4 R5 22

Dynamic vs Static Static Tables built at system configuration time. Used in small networks or networks with only one way out Dynamic Tables are modified based on network parameters Used in larger networks with multiple paths 23 Routing Example 24