SlideShare a Scribd company logo
1 of 23
ITP 457
Network Security
Networking Technologies III
IP, Subnets & NAT
Internet Protocol( IP)
 IP handles end-to-end delivery
 Most commonly used network layer protocol
 All traffic on the internet uses IP
Internet Protocol ( IP)
 Upon receiving packet from Transport layer,
IP layer generates a header
 Header includes : source and destination IP
addresses
 Header is added to front of TCP packet to
create a resulting IP packet.
 Purpose of IP is to carry packets end to end
across a network.
IP header
Source IP address
Destination IP address
Data
IP addresses
 Identify each individual machine on the
internet
 32 bits in length
 Hackers attempt to determine all IP address
in use on a target network – “network
mapping”
 Hackers generate bogus packets appearing
to come from a given IP address – “IP
address spoofing”
IP Addresses in depth
 32 bits, with 8 bit groupings
 E.x: 192.168.0.1
 Each number between the dots can be between 0
and 255
 4 billion combinations
 Not really
 Allocated in groups called address blocks
 3 sizes, based on the class of the address
 Class A, Class B, and Class C
Class A Addresses
 Giant organizations
 There are no more available
 All IP addresses are of the form:
0 – 126.x.x.x
x can be between 0 and 255
 The first octet is assigned to the owner, with the rest being freely
distributable to the nodes
 Has a 24 bit address space
 Uses up to half of the total IP addresses available!!!
 Who owns these???
 Internet Service Providers
 Large internet companies
 Google, CNN, WB
Class B Addresses
 Large Campuses or Organizations
 Example: Colleges, including USC
 These are running out!!!
 All Class B Addresses are of the form:
128 - 191.x.x.x
Where x can take any number between 0 and 255
 The first two octets are assigned to the address block owner, with
the last two being freely distributable
 Example: 128.125.x.x  USC
 Example: 169.232.x.x  UCLA
 16-bit address space
 ¼ of all IP addresses belong to Class B Addresses
Class C Addresses
 Small to mid-sized businesses
 A fair number left
 All Class C Addresses have the following
format:
192-232.x.x.x
 The first three octets are assigned, with the
last being freely distributable
 Only 253 distributable addresses within a Class C
Address
Reserved Addresses
 Private Networks (no public connections)
 10.x.x.x
 172.16.x.x
 192.168.x.x
 127.x.x.x – local network (loopback)
 255.255.255.255 – broadcast – sends to
everyone on the network
Netmasks
 IP address has 2 components
 Network address
 Host address
 Determined by the address and the class of
the address
 Example (Class C):
 IP Address: 192.168.3.16
 Network address: 192.168.3
 Host address: 16
Packet Fragmentation
 Various transmission media have different
characteristics
 Some require short packets others require
longer packets
 E.g. satellite – longer packets
 Local LAN – shorter packets
Packet Fragmentation
 To optimize packet lengths for various
communication links, IP offers network elements
(routers and firewalls) the ability to slice up packets
into smaller pieces, a process called fragmentation.
 The end system’s IP layer is responsible for
reassembling all fragments
 Hackers use packet fragmentation to avoid being
detected by Intrusion Detection Systems
Lack of Security in IP
 IP version 4 does not include any security
 All components of packets are in clear text,
nothing is encrypted
 Anything in the header or data segment can
be viewed or modified by the hacker
 TCP/UDP Hijacking
 “Man-in-the-middle” attack
ICMP
 ICMP – Internet Control Message Protocol
 It is the Network Plumber
 Its job is to transmit command and control
information between networks and systems
ICMP examples
 “ping” request = ICMP Echo message
 If the “pinged” system is alive it will respond with
ICMP Echo Reply Message
 Try pinging
 www.google.com
 www.yahoo.com
 www.cnn.com
 Will they all work?
 Some sites have disabled ping. Why?
 Ping-of-death  a ping too big
 Ping flooding  type of denial-of-service attack
Routers and packets
 Routers
 Transfer packets from network to network
 They determine the path that a packet should
take across the network specifying from hop to
hop which network segments the packets should
bounce through as they travel across the network
 Most networks use dynamic routing
 RIP, EIGRP
 We will be discussing these technologies later in
the course
Network address translation
 NAT
 Blocks of addresses are allotted to ISP’s and
organizations
 Classes of IP Addresses
 What happens when we have more
computers than IP Addresses?
 We have a Class C address – allows 253
computers
 Our organization has 1000 computers
 What do we do???
Solution?
 Reserve a range of IP addresses to build
your own IP network
 10.x.y.z - un-routable IP addresses
 172.16.y.z
 192.168.y.z
 How to connect these machines to Internet?
Network Address Translation
 Use a gateway /router to map invalid addresses to
valid IP addresses
 Translates your local address to a routable address
 Router receives one IP Address
 Either dynamically assigns addresses to all the nodes
behind the router, or it is assigned statically using non-
routable addresses
 If dynamic, uses DHCP (Dynamic Host Configuration Protocol)
 When someone inside the network wants to access a
computer outside the local network (the internet), the
request is sent to the router, which uses NAT to send the
request to the internet
NAT and security?
 Does NAT improve security?
 It hides internal IP addresses from hacker
 NAT must be combined with “firewalls” for
optimum security
Firewalls
Firewalls
 Network traffic cops
 Tools that control the flow of traffic going
between networks
 By looking at addresses associated with
traffic, firewalls determine whether
connections should be transmitted or
dropped
 We will cover the setup and configuration of
firewalls in great depth later in class

More Related Content

Similar to Lecture5_IP_NAT.ppt

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Internet protocols
Internet protocolsInternet protocols
Internet protocolsRohit Saini
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfNetworkershome
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Reviewphanleson
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6Rekha Yadav
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxDESTROYER39
 

Similar to Lecture5_IP_NAT.ppt (20)

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
 
Data link layer
Data link layerData link layer
Data link layer
 
IP classes
IP classesIP classes
IP classes
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
15 3
15 315 3
15 3
 
3.Network
3.Network3.Network
3.Network
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
Networking
NetworkingNetworking
Networking
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

Lecture5_IP_NAT.ppt

  • 1. ITP 457 Network Security Networking Technologies III IP, Subnets & NAT
  • 2. Internet Protocol( IP)  IP handles end-to-end delivery  Most commonly used network layer protocol  All traffic on the internet uses IP
  • 3. Internet Protocol ( IP)  Upon receiving packet from Transport layer, IP layer generates a header  Header includes : source and destination IP addresses  Header is added to front of TCP packet to create a resulting IP packet.  Purpose of IP is to carry packets end to end across a network.
  • 4. IP header Source IP address Destination IP address Data
  • 5. IP addresses  Identify each individual machine on the internet  32 bits in length  Hackers attempt to determine all IP address in use on a target network – “network mapping”  Hackers generate bogus packets appearing to come from a given IP address – “IP address spoofing”
  • 6. IP Addresses in depth  32 bits, with 8 bit groupings  E.x: 192.168.0.1  Each number between the dots can be between 0 and 255  4 billion combinations  Not really  Allocated in groups called address blocks  3 sizes, based on the class of the address  Class A, Class B, and Class C
  • 7. Class A Addresses  Giant organizations  There are no more available  All IP addresses are of the form: 0 – 126.x.x.x x can be between 0 and 255  The first octet is assigned to the owner, with the rest being freely distributable to the nodes  Has a 24 bit address space  Uses up to half of the total IP addresses available!!!  Who owns these???  Internet Service Providers  Large internet companies  Google, CNN, WB
  • 8. Class B Addresses  Large Campuses or Organizations  Example: Colleges, including USC  These are running out!!!  All Class B Addresses are of the form: 128 - 191.x.x.x Where x can take any number between 0 and 255  The first two octets are assigned to the address block owner, with the last two being freely distributable  Example: 128.125.x.x  USC  Example: 169.232.x.x  UCLA  16-bit address space  ¼ of all IP addresses belong to Class B Addresses
  • 9. Class C Addresses  Small to mid-sized businesses  A fair number left  All Class C Addresses have the following format: 192-232.x.x.x  The first three octets are assigned, with the last being freely distributable  Only 253 distributable addresses within a Class C Address
  • 10. Reserved Addresses  Private Networks (no public connections)  10.x.x.x  172.16.x.x  192.168.x.x  127.x.x.x – local network (loopback)  255.255.255.255 – broadcast – sends to everyone on the network
  • 11. Netmasks  IP address has 2 components  Network address  Host address  Determined by the address and the class of the address  Example (Class C):  IP Address: 192.168.3.16  Network address: 192.168.3  Host address: 16
  • 12. Packet Fragmentation  Various transmission media have different characteristics  Some require short packets others require longer packets  E.g. satellite – longer packets  Local LAN – shorter packets
  • 13. Packet Fragmentation  To optimize packet lengths for various communication links, IP offers network elements (routers and firewalls) the ability to slice up packets into smaller pieces, a process called fragmentation.  The end system’s IP layer is responsible for reassembling all fragments  Hackers use packet fragmentation to avoid being detected by Intrusion Detection Systems
  • 14. Lack of Security in IP  IP version 4 does not include any security  All components of packets are in clear text, nothing is encrypted  Anything in the header or data segment can be viewed or modified by the hacker  TCP/UDP Hijacking  “Man-in-the-middle” attack
  • 15. ICMP  ICMP – Internet Control Message Protocol  It is the Network Plumber  Its job is to transmit command and control information between networks and systems
  • 16. ICMP examples  “ping” request = ICMP Echo message  If the “pinged” system is alive it will respond with ICMP Echo Reply Message  Try pinging  www.google.com  www.yahoo.com  www.cnn.com  Will they all work?  Some sites have disabled ping. Why?  Ping-of-death  a ping too big  Ping flooding  type of denial-of-service attack
  • 17. Routers and packets  Routers  Transfer packets from network to network  They determine the path that a packet should take across the network specifying from hop to hop which network segments the packets should bounce through as they travel across the network  Most networks use dynamic routing  RIP, EIGRP  We will be discussing these technologies later in the course
  • 18. Network address translation  NAT  Blocks of addresses are allotted to ISP’s and organizations  Classes of IP Addresses  What happens when we have more computers than IP Addresses?  We have a Class C address – allows 253 computers  Our organization has 1000 computers  What do we do???
  • 19. Solution?  Reserve a range of IP addresses to build your own IP network  10.x.y.z - un-routable IP addresses  172.16.y.z  192.168.y.z  How to connect these machines to Internet?
  • 20. Network Address Translation  Use a gateway /router to map invalid addresses to valid IP addresses  Translates your local address to a routable address  Router receives one IP Address  Either dynamically assigns addresses to all the nodes behind the router, or it is assigned statically using non- routable addresses  If dynamic, uses DHCP (Dynamic Host Configuration Protocol)  When someone inside the network wants to access a computer outside the local network (the internet), the request is sent to the router, which uses NAT to send the request to the internet
  • 21. NAT and security?  Does NAT improve security?  It hides internal IP addresses from hacker  NAT must be combined with “firewalls” for optimum security
  • 23. Firewalls  Network traffic cops  Tools that control the flow of traffic going between networks  By looking at addresses associated with traffic, firewalls determine whether connections should be transmitted or dropped  We will cover the setup and configuration of firewalls in great depth later in class