03 Ch03 Network Overview - Unlocked
03 Ch03 Network Overview - Unlocked
Chapter 3
Network Overview
Objectives
• Describe the TCP/IP protocol stack
• Explain the basic concepts of IP addressing
1
3/18/2024
Overview of TCP/IP
• Language used by computers
• Transmission Control Protocol/Internet Protocol (TCP/IP)
o Most widely used
2
3/18/2024
3
3/18/2024
4
3/18/2024
Summary of Layers
TCP/IP Model
• TCP/IP stack
o Four distinct layers
Network
Internet
Transport
Application
5
3/18/2024
Protocols
6
3/18/2024
7
3/18/2024
8
3/18/2024
9
3/18/2024
Addressing
Addressing (continued)
• Application-Specific Addresses: Some applications have user-friendly addresses
that are designed for that specific application.
• Examples include the e-mail address (for example, [email protected]) and the
Universal Resource Locator (URL) (for example, www.mhhe.com). The first defines
the recipient of an e-mail; the second is used to find a document on the World Wide
Web. These addresses, however, get changed to the corresponding port and logical
addresses by the sending computer.
10
3/18/2024
Addressing (continued)
• The physical address, also known as the link address, is the address of a node as
defined by its LAN or WAN. It is included in the frame used by the data link layer. It is
the lowest-level address.
• The size and format of these addresses vary depending on the network. For example,
Ethernet uses a 6-byte (48-bit) physical address that is printed on the network
interface card (NIC).
Addressing (continued)
11
3/18/2024
12
3/18/2024
IP Addresses
• IP addresses are classified into
5 classes based on the
first octet value
IP Address Classes
13
3/18/2024
• Example: ellington.cs.virginia.edu
• Network address is: 128.143.0.0 (or 128.143)
• Host number is: 137.144
• Netmask is: 255.255.0.0 (or ffff0000)
• Prefix or CIDR notation: 128.143.137.144/16
• Network prefix is 16 bits long
14
3/18/2024
15
3/18/2024
• b. The last address ORing the given addresses with the complement of the mask
16
3/18/2024
17
3/18/2024
192.169.0.0 – 223.255.255.255
18
3/18/2024
Types of NAT
• [1] Static NAT:
• Static address translation (static NAT) assigns one public IP address to one private IP
address
• Commonly used for servers that need to be accessed by external devices or for devices that
must be accessible by authorized personnel when offsite
• One-to-one address mapping between local and global addresses
Types of NAT
• [2] Dynamic NAT:
• Dynamic NAT assigns a public IP address from a
pool of addresses to each packet that originates
from a device that has a private IP address
assigned when that packet is destined to a
network outside the company.
• Addresses are assigned on a first-come, first
serve basis
• The number of internal devices that can transmit
outside the company is limited to the number of
public IP addresses in the pool.
19
3/18/2024
Types of NAT
• [3] Port Address Translation (PAT):
• PAT (otherwise known as NAT overload) can use one public IPv4 address to allow thousand
of private IPv4 addresses to communicate with outside network devices.
• Uses port numbers to track the session
Types of NAT
• [3] Port Address Translation (PAT):
• Next Available Port
PAT tries to preserve the original source port
number.
If that port number is already used, PAT will
assign the first available port number for the
appropriate port group
o 0 - 511
o 512 - 1023
o 1024 - 65,535
When there are no more port numbers
1. Notice how traffic is
available, PAT moves to the next public IP from two different internal
address in the pool if there is one. 2. Notice how PAT uses the devices using the same
same public address, but port number.
two different port numbers.
20
3/18/2024
TCP Protocol
• TCP is a reliable, connection-oriented delivery service:
o Connection-oriented means that a connection must be established before hosts
can exchange data.
o Reliability is achieved by assigning a sequence number to each segment
transmitted
o TCP peers, the two nodes using TCP to communicate, acknowledge segment
transmitted
o A TCP (segment is the protocol data unit (PDU) consisting of the TCP header and
the TCP payload, as presented in the next figure. For each TCP segment sent
containing data, the receiving host must return an acknowledgment (ACK). If an
ACK is not received within a calculated time, the TCP segment is retransmitted
UDP Protocol
• UDP provides a connectionless datagram service that offers unreliable, best-effort
delivery of data transmitted in message. This means that neither the arrival of datagram nor
the correct sequencing of delivered packets is guaranteed. So, it does not retransmit lost
data.
• UDP messages consist of a UDP header and a UDP payload, as presented in next figure.
• Application use UDP if they do not require an acknowledgment of receipt of data, and they
typically transmit amount of data at one time.
• NetBIOS name service, NetBIOS datagram service, and SNMP are examples of services
and applications that use UDP
21
3/18/2024
22
3/18/2024
Value 32 16 8 4 2 1
Flag Reserved Nounce CWR Echo Urgent Ack Push Reset Syn Fin
0 1 0 1 0 0
1 2 3
4 5 6
23
3/18/2024
TCP/IP Communication
24
3/18/2024
o Users can use the Add or Insert Packet command in Edit menu or Toolbar to create a new
packet, Colasoft Packet Builder provides several common-used packet format- Ethernet
Packet, ARP Packet, IP Packet, TCP Packet and UDP Packet.
o If Colasoft Capsa has been installed, users can also send packets in Capsa to Packet Builder
on the fly.
o Colasoft Packet Builder supports auto-checksum feature, users can enable this feature by
check the Checksum button in toolbar, Packet Builder will calculates the IP, TCP, ICMP, and
UDP checksum automatically every time when changing packet data (see the below
figure).sion hijacking, an attack that relies on guessing the ISNs of TCP packets.
25
3/18/2024
26