INFOT-3-NETWORKING-1lecture-5-6
INFOT-3-NETWORKING-1lecture-5-6
DIAGRAMMING
& IP
ADDRESSING
Lecture 5 to 6
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Network Diagrams
Network diagram is a visual representation of a computer or
telecommunications network. It shows the components that make up a
network and how they interact, including routers, devices, hubs,
firewalls, etc.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols
S R
Network Switch Network Router
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols
M H
Network Modem Network Hub
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols
S
Mainframes/ Server Nodes/ PC
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols
LAN
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols
Wireless Signals
Media Cable
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Example:
• Create a Schematic Network Diagram of a school with 1 office and 1
computer laboratory
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
LAN LAN
LABORATORY OFFICE
S R
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
• The scenario only stated a network and not specifying if an
internet connection was needed.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Topic 6: IP
ADDRESSING
The three digits in the first octet represent a particular network on the
internet while the rest of the digits represent the actual host address
within the local network, such as a workstation or a server. An IPv6
address represents eight groups of four hexadecimal digits separated
by colons, such as 2620:cc:8000:1c82:544c:cc2e:f2fa:5a9b.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
How do IP addresses
work?
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
IPv4 vs IPv6: What’s the
difference?
• Both IPv4 and IPv6 identify
connected devices on the network.
However, there are slight differences
in the way they operate. IPv6 is the
newer IP version and was
introduced to address the
limitations IPv4 posed on the
availability of IP addresses.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
The following is a list of differences between
IPv4 and IPv6:
• IPv4 is 32-bit, whereas IPv6 is 128-bit.
• In IPv4, binary bits are separated by a dot (.); IPv6 separates binary bits by a colon (:).
• IPv4 follows the numeric addressing method and IPv6 is alphanumeric.
• IPv4 offers 12 header fields and IPv6 offers eight header fields.
• IPv4 has checksum fields but IPv6 doesn't.
• IPv4 supports broadcast address, which is a type of special address that transmits data
packets to every node on the network. IPv6 doesn't support broadcast, but instead uses
a multicast address, which is a logical identifier for a collection of hosts on a network.
• IPv4 supports Variable Length Subnet Mask, but IPv6 doesn't.
• When mapping to media access control addresses, IPv4 uses the Address Resolution
Protocol. IPv6 uses the Neighbor Discovery Protocol, which uses stateless auto-
configuration and address resolution.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Types of
IP
addresses
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
IP address security
• Cybercriminals can exploit an IP address in several ways. Once an IP
address is exposed, it can be used for various malicious purposes.
Therefore, it's best to keep it as private as possible. Hiding the IP
address and accessing the internet securely through a virtual private
network service is a great option and so is masking the IP address by
using a proxy server or a browser, such as Tor, that anonymizes the
web traffic.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Here are some ways cybercriminals can
exploit a stolen IP address:
Download illegal content. Cybercriminals often use stolen and unprotected IP addresses to access and download illegal content. This way they avoid being tracked, as
the IP addresses are traced back to the IP address owners.
Location tracking. Most public addresses can be used to narrow down someone's physical location, such as their city of residence. With some digging, criminals can
even locate the actual home address of an IP address owner.
Distributed denial-of-service attacks. By obtaining an IP address, criminals can carry out targeted DDoS attacks against a network. During these attacks, massive
amounts of fake traffic is generally sent to a website to bring it down.
Send spam. Advertisers can embed tracking programs in online activities and articles that can record IP addresses. The recorded IP addresses are used to generate
spam and to target advertising based on a visitor's browsing history.
Steal identity. Identity theft is on the rise and cybercriminals are always on the lookout for personally identifiable information (PII), such as social security numbers or
mailing addresses. While an IP address isn't technically PII, it can help a cybercriminal gain access to other information. For example, if a cybercriminal obtains a
person's IP address, they can easily track down their ISP and attempt to impersonate them through vishing attacks that can cause the ISP to divulge personal data.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
IP ADDRESSING
Classful Addressing
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Introduction to IP Addressing
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Structure of IP address
➢ Network ID
- identifies network
- Host number is set to all zeros.
➢ Host ID
- identifies host in a network.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Classes of IP
• Class A
• Class B
• Class C
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
1. Class A
NI.HI.HI.HI
1 (1.0.0.1)
126 (126.255.255.254)
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
2. Class B
NI.NI.HI.HI
128 (128.1.0.1)
191 (191.254.255.254
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
3. Class C
NI.NI.NI.HI
192 (192.0.1.1)
223 (223.255.254.254)
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
**Note:
Net ID and Host ID cannot be all zeros or all ones. All zeros used
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Mask
• Filters Net ID from an IP address and produces a Network Address.
• Classes:
1. Class A
• 255.0.0.0
2. Class B
• 255.255.0.0
3. Class C
• 255.255.255.0
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Gateway
• a point of entry to another network
• There are devices that links a network to the another network. (e.g.
Routers)
• so called pathways for the network IP.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Topic 5 and 6 terminate . . .
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL