0% found this document useful (0 votes)
7 views

INFOT-3-NETWORKING-1lecture-5-6

The document covers network diagramming and IP addressing, explaining the components of a network and their interactions through visual representations. It details the structure and types of IP addresses, including the differences between IPv4 and IPv6, as well as the security implications of IP addresses. Additionally, it discusses classful addressing and the role of gateways in networking.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

INFOT-3-NETWORKING-1lecture-5-6

The document covers network diagramming and IP addressing, explaining the components of a network and their interactions through visual representations. It details the structure and types of IP addresses, including the differences between IPv4 and IPv6, as well as the security implications of IP addresses. Additionally, it discusses classful addressing and the role of gateways in networking.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

NETWORK

DIAGRAMMING
& IP
ADDRESSING
Lecture 5 to 6

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Network Diagrams
Network diagram is a visual representation of a computer or
telecommunications network. It shows the components that make up a
network and how they interact, including routers, devices, hubs,
firewalls, etc.

What is a Network Diagram. (n.d.). Lucidchart. https://www.lucidchart.com/pages/network-


diagram#:~:text=A%20network%20diagram%20is%20a,%2C%20hubs%2C%20firewall
s%2C%20etc.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
• Here, we are going to tackle standard and
basic network diagramming. Also in this
state, your brains will be squeezed-out on
modelling and schematic case studies.
• Although, this topic requires Topic 6 to be
fully modelled.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols

S R
Network Switch Network Router

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols

M H
Network Modem Network Hub

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols

S
Mainframes/ Server Nodes/ PC

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols

LAN

LAN/ WAN/ MAN Internet/ ISP

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols

Twisted Pair/ Fiber/ Coax

Wireless Signals
Media Cable

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Symbols

User Mobile Phone Laptop

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Example:
• Create a Schematic Network Diagram of a school with 1 office and 1
computer laboratory

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
LAN LAN

LABORATORY OFFICE
S R

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
• The scenario only stated a network and not specifying if an
internet connection was needed.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Topic 6: IP
ADDRESSING

Classes and Classful Addressing


UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
• An Internet Protocol (IP) address is a unique numerical
What is an IP identifier for every device or network that connects to
the internet. Typically assigned by an internet service
address (Internet provider (ISP), an IP address is an online device address
used for communicating across the internet.
Protocol
address)?

Yasar, K. (2023, January 31). IP address (Internet Protocol address). WhatIs.com.


https://www.techtarget.com/whatis/definition/IP-address-Internet-Protocol-
Address#:~:text=An%20Internet%20Protocol%20(IP)%20address,for%20communicating
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
%20across%20the%20internet.
• There are two versions of IP addresses that are commonly used on the
internet: IPv4 and IPv6. An IPv4 address is expressed as a set of four
dotted decimal numbers, where each octet is separated by a period,
such as 192.168.35.4.

The three digits in the first octet represent a particular network on the
internet while the rest of the digits represent the actual host address
within the local network, such as a workstation or a server. An IPv6
address represents eight groups of four hexadecimal digits separated
by colons, such as 2620:cc:8000:1c82:544c:cc2e:f2fa:5a9b.
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
How do IP addresses
work?

• An IP address is part of the TCP/IP suite of protocols. It


works behind the scenes, helping devices and websites
connect with each other on the internet.
• Every time a request is made to access a website, the
requesting computer needs to know where the website
resides and how to reach it. This is where the IP address
comes into play. The requesting computer connects to the
network router, which connects to the web server where
the website lives. The web server then pulls the website
information and sends it back to the requesting computer.
Each device in this process -- including the computer,
router and web server -- carries a uniquely identifiable IP
address, without which the transfer of information will not
take place.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
IPv4 vs IPv6: What’s the
difference?
• Both IPv4 and IPv6 identify
connected devices on the network.
However, there are slight differences
in the way they operate. IPv6 is the
newer IP version and was
introduced to address the
limitations IPv4 posed on the
availability of IP addresses.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
The following is a list of differences between
IPv4 and IPv6:
• IPv4 is 32-bit, whereas IPv6 is 128-bit.
• In IPv4, binary bits are separated by a dot (.); IPv6 separates binary bits by a colon (:).
• IPv4 follows the numeric addressing method and IPv6 is alphanumeric.
• IPv4 offers 12 header fields and IPv6 offers eight header fields.
• IPv4 has checksum fields but IPv6 doesn't.
• IPv4 supports broadcast address, which is a type of special address that transmits data
packets to every node on the network. IPv6 doesn't support broadcast, but instead uses
a multicast address, which is a logical identifier for a collection of hosts on a network.
• IPv4 supports Variable Length Subnet Mask, but IPv6 doesn't.
• When mapping to media access control addresses, IPv4 uses the Address Resolution
Protocol. IPv6 uses the Neighbor Discovery Protocol, which uses stateless auto-
configuration and address resolution.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Types of
IP
addresses

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
IP address security
• Cybercriminals can exploit an IP address in several ways. Once an IP
address is exposed, it can be used for various malicious purposes.
Therefore, it's best to keep it as private as possible. Hiding the IP
address and accessing the internet securely through a virtual private
network service is a great option and so is masking the IP address by
using a proxy server or a browser, such as Tor, that anonymizes the
web traffic.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Here are some ways cybercriminals can
exploit a stolen IP address:
Download illegal content. Cybercriminals often use stolen and unprotected IP addresses to access and download illegal content. This way they avoid being tracked, as
the IP addresses are traced back to the IP address owners.

Location tracking. Most public addresses can be used to narrow down someone's physical location, such as their city of residence. With some digging, criminals can
even locate the actual home address of an IP address owner.

Distributed denial-of-service attacks. By obtaining an IP address, criminals can carry out targeted DDoS attacks against a network. During these attacks, massive
amounts of fake traffic is generally sent to a website to bring it down.

Send spam. Advertisers can embed tracking programs in online activities and articles that can record IP addresses. The recorded IP addresses are used to generate
spam and to target advertising based on a visitor's browsing history.

Steal identity. Identity theft is on the rise and cybercriminals are always on the lookout for personally identifiable information (PII), such as social security numbers or
mailing addresses. While an IP address isn't technically PII, it can help a cybercriminal gain access to other information. For example, if a cybercriminal obtains a
person's IP address, they can easily track down their ISP and attempt to impersonate them through vishing attacks that can cause the ISP to divulge personal data.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
IP ADDRESSING
Classful Addressing

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Introduction to IP Addressing

• An IP address is a unique global address for a network interface

• is a 32 bit long identifier

• encodes a network number (network prefix) and a host number

• also known as dotted decimal notation

• used to locate host in a network

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Structure of IP address
➢ Network ID
- identifies network
- Host number is set to all zeros.
➢ Host ID
- identifies host in a network.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Classes of IP
• Class A
• Class B
• Class C

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
1. Class A
NI.HI.HI.HI
1 (1.0.0.1)

126 (126.255.255.254)

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
2. Class B
NI.NI.HI.HI
128 (128.1.0.1)

191 (191.254.255.254

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
3. Class C
NI.NI.NI.HI
192 (192.0.1.1)

223 (223.255.254.254)

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
**Note:

Net ID and Host ID cannot be all zeros or all ones. All zeros used

as Network Address. All one’s used as Broadcast Address.

127.0.0.1 -> loopback address or so called the local host. It is

used by the computer to test the connectivity.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Mask
• Filters Net ID from an IP address and produces a Network Address.

• Classes:
1. Class A
• 255.0.0.0

2. Class B
• 255.255.0.0

3. Class C
• 255.255.255.0

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Gateway
• a point of entry to another network
• There are devices that links a network to the another network. (e.g.
Routers)
• so called pathways for the network IP.

• ** A router has an IP address that becomes a gateway when if it has a


client.

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL
Topic 5 and 6 terminate . . .

UA_INFOT3_LectureNotes_CCS_MC_SECUGAL

You might also like