Title: DCN : Section 7
1DCN Section 7
2Learning Objectives
- Introduction to Internet and classful IP
addressing - Internet and Intranet
- Understand of subnet and subnet mask
- Understand the relationship between domain name
and DNS - Introduction to the components of Intranet such
as web servers, routers and proxy service - Familiar with with TCP/IP protocol suite
- Introduction to security issues, such as
cryptography, PKI and CA, etc.
3Internet (1)
- The Internet is
- A network of networks.
- Connecting networks from homes, schools, and
businesses worldwide. - A decentralized, global collection of networks
using TCP/IP suite protocols for communication. - The Internet (capital I) refers to a specific WAN
made up of many interconnected networks around
the globe, including servers and routers.
4Internet (2)
- The Internet provides the following
- A global collection of text files, multimedia
files, etc. - A collection of network services interconnected
by a system of hypertext documents. - Web browsers to access WWW
- Hypertext documents formatted in HTML supported
by Internet WWW servers.
5Internet (3)
6Internet Addressing
7Internet Scaling Problems (1)
- IP version 4 (IPv4) addressing mechanism for
addressing packets and directing information on a
network. - The current IPv4 defines 232 (4,294,967,296)
addresses available. - IP addressing shortage has caused the following
- Continuing depletion of IP v4 address space
- Difficulty in routing traffic between more
networks on the Internet Super Highway.
8Internet Scaling Problems (2)
- The address shortage problem is aggravated by the
fact that portions of the IP addresses have not
been efficiently allocated due to the significant
amount of organizations have their own IP
addresses. - Also, the traditional model of classful
addressing does not allow the address space to be
used to its maximum potential. - The long term solution to these problems can be
deployed IPv6.
9Classful IP Addressing (1)
- A unique IP address for each network
- The 32 bits are divided into network number and
host number. - Two-level Address Structure
- The network number (also called network-prefix)
identifies the network on which the host resides. - The host number identifies the particular host on
the given network.
10Classful IP Addressing (2)
- All hosts on a given network share the same
network number, but have a unique host number. - Any two hosts on different networks may possess
different network number, but may have the same
host number.
11Classful IP Addressing (3)
- Developed to support different size of networks.
It is decided that the IP address space should be
divided into classes. - Addressing scheme of each class specifies a
boundary between the network number and the host
number at a different point within the 32-bit
address. - Connecting the private network to the Internet,
however, requires using a registered IP address
to avoid duplicates.
12Classful IP Addressing (4)
- To prevent duplication, an organisation called
Internet Information Center (InterNIC) assigns
Internet addresses to organizations and
individuals that requires an Internet site. - IP address space was divided primarily into
- Class A for network with more than 216 hosts
- Class B for network with between 28 and 216
hosts - Class C for network with fewer than 28 hosts
13Classful IP Addressing (5)
- The host calculation requires that 2 is
subtracted because of the all 0s (this network)
and all 1s (broadcast) host numbers cannot be
assigned to individual hosts.
14Class A Networks (/8 Prefixes)
- Each Class A (/8) network address has a 8-bit
network -prefix with the highest order bit is set
to zero and a 7-bit network number, followed by
24-bit host number. - A maximum of 126 (27-2) /8 networks can be
defined. - The calculation requires that the 2 is subtracted
because the /8 network 0.0.0.0 is reserved for
use as the default route and /8 network 127.0.0.0
(also written 127.0.0.0/8) has been reserved.
15Class A Networks (/8 Prefixes)
- Each /8 supports a maximum of 16,777,214 (224-2)
hosts per network. - Since the /8 address block contains 231
(2,147,483,648) individual addresses and the IPv4
address space a max of 232 (4,294,967,296)
addresses, the /8 address space is 50 of the
total address space.
16Class B Networks (/16 Prefixes)
- Each Class B (/16) network address has a 16-bit
network-prefix, with the two highest order bits
set to 1-0, and a 14-bit network number, followed
by a 16-bit host number. - A maximum of 16,384 (214) /16 networks can be
defined with up to 65,534 (216-2) hosts per
network. - Since the entire /16 address block containing
230 (1,073,741,824) addresses, it represents 25
of the total IPv4 address space.
17Class C Networks (/24 Prefixes)
- Each Class C (/24) network address has a 24-bit
network-prefix, with the three highest order bits
set to 1-1-0, and a 21-bit network number,
followed by a 8-bit host number. - A maximum of 2,097,152 (221) /24 networks can be
defined with up to 254 (28-2) hosts per network. - Since the entire /24 address block containing
229 (536,870,912) addresses, it represents 12.5
of the total IPv4 address space.
18 Other Classes
- There are two additional classes Class D and
E. - Class D addresses have their leading four bits
set to 1-1-1-0. It is used to Support IP
multicasting. - Class E addresses have their leading four bits
set to 1-1-1-1. It is used for research and
experimental purposes
19Dotted Decimal Notation (1)
- To make Internet address easier for human users
to read and write, it can be expressed as 4
decimal numbers, each separated by a dot. This is
called dotted decimal notation. - It divides the 32-bit Internet address into four
8-bit (byte) fields and specifies the value of
each field.
20Dotted Decimal Notation (2)
- /8 (A) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx
- /16 (B) 128.0.xxx.xxx through 191.255.xxx.xxx
- /24(C) 192.0.0.xxx through 223.255.255.xxx
- xxx represents the host number field, which is
assigned by the local network administrator. - Note that 127.xxx.xxx.xxx has been reserved for
looping test purpose.
21Problems of two-level classical hierarchy (1)
- The present two-level classical hierarchy faces
the problem of - Global routing tables were beginning to grow very
fast. - Local administrators had to request another
network before a new network could be installed
at their own site. - Subnetting, which supports three-level hierarchy,
was introduced. - It increases addressing capacity.
- It divides private network into smaller
components, called subnets.
22Problems of two-level classical hierarchy (2)
23Subnets (1)
- Based on a three-level hierarchy a network
number, a subnet number, and a host number
created from the bits allocated for your host
number. - Subnetting attacked the expanding routing table
problem by ensuring that the subnet structure is
NEVER visible outside of the organizations
private network. (ie Subnet number of a network
is not advertised to external networks).
24Subnets (2)
- It routes from a public network to any subnet of
an IP address is the same, regardless of the
subnet on which the destination host resides. - It is used the same network number but different
subnet numbers. - Routers in private network must differentiate
between each subnet. - All of the subnets in the organisation are
collected into a single routing table entry.
25Subnets (3)
- Router is set to accept all traffic from the
Internet to your designated IP address (for
example, 132.132.0.0). - Traffic is received and forwarded to the interior
subnets you have set up (for example,
132.132.32.0, 132.132.64.0, 132.132.96.0,
132.132.128.0 and ...., which are using 3-bit in
the third octet of the IP as subnets).
26Subnets (4)
- Internet routers use only the network-prefix of
the destination address for routing traffic to a
subnet configuration. - Routers use the extended network-prefix to route
traffic between subnets. - Extended network prefix consists of the class
network prefix and the subnet number. - Extended network prefix is identified by a subnet
mask.
27Using Subnet Masks (1)
- If you are given a network address
132.132.0.0/16, the default subnet mask for /16
(class B) is to be 255.255.0.0. - The host ID can be ranged from 132.132.0.1 to
132.132.255.254. - A total of 216-2 (65534) hosts can be placed to
this network. - ( network-prefix) ( host
) - 132.132.0.0/16 10000100.10000100. 00000000.
00000000 - subnet mask 10000100.10000100. 00000000.
00000000
28Using Subnet Masks (2)
- You are also given a network address
132.132.0.0/16 and want to use the first 3 bits
of third octet to represent the subnet number. - Since 823, three bits are required to achieve
eight subnets. - This network is subnetting a /16 so it will need
three more bits, or /19, as the extended
network-prefix. - A 19-bit extended network-prefix can be expressed
in 255.255.224.0.
29Using Subnet Masks (3)
- The eight subnet numbers are given below. The
19-bit extended network-prefix has been shown
italics. - subnet 0 10000100.10000100. 00000000. 00000000
- 132.132.0.0/19
- subnet 1 10000100.10000100. 00100000. 00000000
- 132.132.32.0/19
- subnet 2 10000100.10000100. 01000000. 00000000
- 132.132.64.0/19
- subnet 3 10000100.10000100. 01100000. 00000000
- 132.132.96.0/19
- subnet 4 10000100.10000100. 10000000. 00000000
- subnet 5 10000100.10000100. 10100000. 00000000
- subnet 6 10000100.10000100. 11000000. 00000000
- subnet 7 10000100.10000100. 11100000. 00000000
30Using Subnet Masks (4)
- subnet 4 10000100.10000100. 10000000. 00000000
- 132.132.128.0/19
- subnet 5 10000100.10000100. 10100000. 00000000
- 132.132.160.0/19
- subnet 6 10000100.10000100. 11000000. 00000000
- 132.132.192.0/19
- subnet 7 10000100.10000100. 11100000. 00000000
- 132.132.224.0/19
31Using Subnet Masks (5)
- An easy way to check if the subnets are correct
is to ensure they are multiples of the subnet1
address. In this case, they are of multiples of
32 0, 32, 64, 96, 128, . - The lowest and highest number of subnet will not
be used. In fact, there are only SIX possible
subnets in the above case. - In general,
- Possible subnets 2 (number of masked bits) - 2
- Possible hosts per subnet 2 (number of masked
bits) - 2
32Using Subnet Masks (6)
- After two examples, we have done the following
- Set the subnet mask bits to 1 if your network
treats the corresponding bit in the IP address as
part of the extended network prefix - Set the subnet mask bits to 0 if your network
treats the bit as part of the host number. - The internal network address is the logical AND
of the subnet mask with the IP address. - The host number within the subnet is the
remaining host address portion of the IP address.
33DNS (1)
- Because IP addresses are hard to remember, the
text version of the IP address is always used.
This text version is called a domain name. - For example, the IP address 198.105.232.4 would
be translated to microsoft.com - To translate and track domain names, InterNIC
uses the Domain Name Service (DNS).
34DNS (2)
- DNS is a set of distributed databases containing
IP addresses and their corresponding domain
names. - DNS, with servers located all over the Internet,
performs the translation back and forth between
names and numbers. - A user can type in a domain name instead of the
IP address.
35DNS (3)
36Domain Name (1)
- DNS uses several levels of naming conventions,
each of which is called a domain. - A domain refers to a group of computers and
devices on a network that is administered as a
unit with common rules and procedures. - Top-Level Domain (TLD) it indicates the class of
institution, such as .com, .edu, .gov, .org - Second-Level Domain (SLD) it is registered by an
organisation or entity by InterNIC, such as ibm,
microsoft
37Domain Name (2)
38Domain Name (3)
39World Wide Web (1)
- The collection of hyperlinked documents
accessible on the Internet is known as the World
Wide Web, WWW, W3 or simply Web. - A Web site is where a related collection of web
pages or files stored on a web server. - Web Browser a client program which requests a
web page from a web server and displays it on the
local computer
40World Wide Web (2)
- Uniform resource locator (URL) it is the address
of a file accessible on the WWW, such as an HTML
web pages or any file supported by the HTTP.
41Intranet
- It is used to be an internal corporate network
enhanced with Internet technology, such as
adopting a WWW browser, email and newsgroup
system. - It emphasizes in secured against inappropriate
access, such as password control. - So that, it is often connected to outside
Internet via a firewall and/or a router for
protecting any intruders attack.
42Web Server
- Application that publishes HTML and other types
of documents on the World Wide Web. - It receives an HTTP, FTP, or other type of
request for a document from a browser, it
responds by sending the document to the browser. - A secure web server is a server on the WWW that
supports one or more of the major security
protocols such as Secure Socket Layer (SSL) or
HTTPS.
43Firewall
- A firewall sets an electronic boundary that
prevents unauthorized users from accessing
certain location on a network - It can examine each packet in the stream to see
whether if the sender is authorized access - It is designed to control the flow of packets
based on the source, destination, port and packet
type information in each packet - It can be implemented in hardware, software, or a
combination of both.
44Router
- A router is a device that connects two or more
networks. - It sorts addressed data packets and sends them to
the correct destinations with the built-in
routing table. - It can connect networks that use different
network adapters or transmission media as long as
both sides of connection use same protocols.
45Proxy Server
- It is used to overcome delays, slower response
times, and security concerns. - Traffic problems are partly due to the repeated
retrieving of objects from remote Web servers. - Caching frequently requested Internet
information. - It reduces the number of times the same
information is accessed over an Internet
connection, the download time, and the load on
the remote server.
46Proxy Service Benefits (1)
- It reduces WAN traffic to the Internet and on the
primary Web server by providing local LAN access
to cached information. - It reduces the load on Web Internet servers and
increases Internet and intranet performance. - It enhances intranet security with access control
and content filtering, which can avoid users to
indecent web sites.
47Proxy Services Benefits (2)
- It distributes LAN client requests across
multiple proxy servers, for example, FTP requests
on one server and HTTP requests on another
server. - Proxy servers receive your requests, check for
authorization, then go to get information. If
you are not authorized, your request will be
denied. - ISPs can use proxy servers to stop users from
going to certain sites, too.
48OSI Model versus TCP/IP
49TCP/IP Suite of Protocols (1)
- TCP/IP is the Internet suites of network
protocols that allows different computers to
communicate. - Underneath TCP/IP, there are various media
protocols that help move the data over the
various networks on the Internet. - TCP/IP also works in conjunction with the
following protocols for specific applications.
50TCP/IP Suite of Protocols (2)
- FTP (File Transfer Protocol) for file transfer
- HTTP (HyperText Transfer Protocol) for browsing
in WWW - HTTPS (http with Secure Socket Layer) for secure
data transfer in WWW - NNTP (Network News Transfer Protocol) for news
group reading - SMTP (Simple Mail Transfer Protocol) for
delivering e-mail
51TCP/IP Suite of Protocols (3)
- TCP/IP stands for Transmission Control
Protocol/Internet Protocol. - It is the most popular open-system (non
proprietary protocol suite. - It can be used to communicate across any set of
interconnected networks and is suited for LAN and
WAN communication.
52TCP/IP Suite of Protocols (4)
- Roughly correspond to a network communications
model defined by the International Organization
for Standardization (ISO) called the OSI model. - TCP/IP Suite of Protocols can map to a four-layer
conceptual model, which is known as DARPA model
Application, Transport, Internet and Network
Interface. - Each layer in the DARPA model corresponds to one
or more layers of the seven-layer OSI model.
53TCP/IP Protocol Layers (1)
54TCP/IP Protocol Layers (2)
- User applications communicate with the top layer
of the protocol suite. - Top-level protocol layer on the source computer
passes information to the lower layers of the
protocol stack, which in turn pass it to the
physical network. - Physical network transfers the information to the
destination computer.
55Network Interface Layer
- It is responsible for placing TCP/IP packets on
the network medium and receiving packets. - It was designed to be independent of the network
access method, frame format and medium. - In this way, TCP/IP can be used to connect
different network types, such as Ethernet, Token
ring, X.25 or Frame Relay. - It encompasses the Data Link and Physical layers
of OSI model.
56Internet Layer (1)
- It is responsible for addressing, packaging and
routing functions. The core protocols are ARP,
ICMP and IP. - Address Resolution Protocol (ARP) it is to map
the Internet Layer address to the network
Interface Layer address, such as a hardware
address. - Internet Control Message Protocol (ICMP) it is
to provide diagnostic functions and reporting
errors or conditions between hosts and routers.
57Internet Layer (2)
- Internet Protocol (IP) it is a routing protocol
and responsible for IP providing packet delivery
services (routing) between hosts. - All packets are delivered by the IP datagram
delivery service.
58Internet Layer (3)
- IP will always make a best effort attempt to
deliver a packet. - All packets are transmitted independently of any
other packets and IP does not attempt to recover
from errors.
59Internet Layer (4)
- The acknowledgement of packets and recovery is
the responsibility of a higher-layer protocol,
such as TCP. - The Internet Layer is analogous to the Network
Layer of the OSI model.
60Internet Layer (5)
- Applications using the IP datagram delivery
service expect to receive replies from the
destination node. - Packet takes the form called IP datagram.
- The datagram consists of a header and a data
section. - Header section contains the header information,
the source IP address, the destination IP address
and options.
61Internet Layer (6)
62Transport Layer (1)
- It is consisted of two protocols, UDP and TCP.
- UDP provides a one-to-one or one-to-many,
unreliable and connectionless delivery service to
send and receive messages. - TCP provides a one-to-one, connection-oriented,
reliable communications for byte stream-delivery
services on top of the IP datagram delivery
service. - The transport layer encompasses the
responsibilities of the OSI Transport Layer
63Transport Layer (2)
- Applications can be identified through protocol
ports. - Two types of protocol ports
- Well-known port assignments
- port numbers between 1 and 1,023 for particular
applications - For example, 20 and 21 for FTP, 23 for Telnet, 80
for HTTP - Dynamically bound ports
- port number 1,024 to 65,535
64Transport Layer (3)
65Transport Layer (4)
- TCP segments are encapsulated in an IP datagram.
- TCP buffers the stream by waiting for enough data
to fill a large datagram before sending the
datagram. - At the receiving end, TCP checks successive
sequence numbers to ensure that all the segments
are received and processed in the order of the
sequence numbers.
66Transport Layer (5)
- The receiving end sends an acknowledgment to the
sender for the segments received. - TCP enables the sender to have several
outstanding segments before the receiver must
return an acknowledgment. - If the sender does not receive an acknowledgment
for a segment within a certain time, it
retransmits that segment as a recovery.
67 Application Layer (1)
- It provides applications the ability to access
the services of the other layer. - It defines the protocols that applications use to
exchange data. - The Application Layer is analogous to the
Application, Presentation and Session Layers of
the OSI model. - The most widely used protocols here are HTTP,
FTP, SMTP, Telnet, DNS and SNMP.
68 Application Layer (2)
- The HyperText Transfer Protocol (HTTP) it is
used to transfer files that make up the web pages
. - File Transfer Protocol (FTP) it is used for
interactive file transfer. - Simple Mail Transfer Protocol (SMTP) it is used
for the transfer of mail messages and attachments.
69 Application Layer (3)
- Telnet a terminal emulation protocol, for remote
login to network hosts. - DNS it is used to resolve a host name to an IP
address. - SNMP it is used between network management
console and network devices (routers, bridges) to
collect and exchange network management
information.
70Security Issues on Internet
- Since Internet is an open accessed network, there
are insufficient security protection for
confidential data. - Data protection is to be essential and
cryptography have to be enforced. - Cryptography uses mathematical algorithms and
processes to convert intelligible plaintext into
unintelligible cliphertext, and vice versa.
71Cryptography (1)
- Cryptography will depend very much on encryption
and decryption mechanisms. - To encrypt the plaintext to ciphertext, the
originator of the plaintext applies a
mathematical formula that uses encryption key.
The recipient of the ciphertext then use the same
encryption key to decrypt. - There are two kinds of cryptography present
secret key and public key cryptography.
72Cryptography (2)
- There are some other applications of
cryptography - Data encryption is for confidentiality.
- Digital signatures are to provide accountability
and verify data integrity. - Digital certificates are used for authenticating
people, applications and services, and for access
control (authorization).
73Secret key Cryptography (1)
- The sender (originator) and receiver (recipient)
use the same or called symmetrical key for both
encryption and decryption purpose. - In large scale applications, many clients or
users need to have the same secret key. - Since encryption is presumably not available
prior to key distribution, network based key
distribution is not a secure option.
74Secret key Cryptography (2)
- Owing to the disadvantage of key distribution
among the receivers, secret key cryptography is
not a secure way to protect data or message. - The most common system is data encryption
standard (DES) and is called symmetrical
cryptography.
75Public Key Cryptography (1)
- It will uses pairs of keys a widely available
public key, and a different private key known
only to the person, application or service that
owns the keys. - Public key can be transmitted unencrypted over
insecure lines. - Private key must be kept secret.
- Since this pair of keys is asymmetrical, it is
called asymmetrical cryptography.
76Public Key Cryptography (2)
77Public Key Cryptography (3)
78Benefits of Public Key Cryptography (1)
- The primary benefit is that it allows users who
have no preexisting security arrangement to
exchange messages securely. - The need for sender and receiver to share secret
keys via some secure channel is eliminated. - All communications involve only public keys, and
no private key is ever transmitted or shared. -
It is much more safe.
79Benefits of Public Key Cryptography (2)
- Public key cryptography requires a public key
infrastructure (PKI) for managing digital
certificates (or e-cert) and encryption keys for
people, programs and systems. - It provides confidentiality, authentication,
access control, data integrity, and
accountability.
80Digital Signature (1)
- Digital signatures enable the receivers of
information to verify the authenticity of the
informations origin and also verify the
information is intact. - Thus public key digital signature provides
authentication and data integrity. - A digital signature also provides
non-repudiation, which means that it prevents the
sender from claiming that he or she did not
actually send the information.
81Digital Signature (2)
- It serves the same purpose as a handwritten
signature. - However, a handwritten signature is easy to
counterfeit. - It is superior to a handwritten signature in that
it is nearly impossible to counterfeit, plus it
attests to the contents of the information as
well as to the identity of the signer.
82Digital Signature (3)
83Digital Certificate
- A digital certificate (or called e-cert) is an
electronic file issued and digitally signed by a
Certification Authority (CA), vouching for the
identity of the certificate holder. - It usually contains a serial number, an
expiration date, the information about the
rights, uses, and privileges associated with the
certificate, together with information about the
CA who issued the certificate.
84Certification Authority (1)
- A Certification Authority (CA), or called
Certificate Authority, is an organization, such
as Hongkong Post, that issues independently
authenticated digital certificates for use by
individuals or organizations. - The Electronic Transactions Bill was passed by
the Legislative Council on 5 January 2000 and was
published in the Gazette on 7 January 2000. The
Bill aims to provide a legal framework to ensure
the conduct of electronic transactions is in a
secure and trusted environment.
85Certification Authority (2)
- Hongkong Post Launches Public Certification
Services. - Hongkong Post has become the first public
certification authority in Hong Kong to build a
Public Key Infrastructure (PKI). - It issues digital certificates, namely Hongkong
Post e-Cert.
86Certification Authority (3)
- CA manages the keys and digital certificates used
to implement cryptography within applications
such as - Web browsers and web servers for authentication
and confidentiality - Secure network communications via protocol such
as SSL for applications like online banking and
online shopping and - Functions such as digitally signed documents or
code.
87Certification Authority (4)
88Certification Authority (5)
89Certification Authority (6)