TEJ2O
NETWORKING & IP ADDRESSING
NETWORKING & IP ADDRESSING
Networking is the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. The three types of networks are:
the Internet: The network formed by the co-operative interconnection of millions of computers, linked together is called Internet
intranet: Internal private networks built within an organization using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information
extranet:It is the type of network that allows users from outside to access the Intranet of an organization
The main difference between extranets and intranets is that intranets are internal networks that are accessible only to employees, while extranets are extended networks that allow external parties to access certain parts of an organization's intranet. Intranets are used for internal communication, collaboration, and operations management, while extranets are used for external communication and collaboration with customers, suppliers, and partners. Having an extranet makes an organization vulnerable
Examples of different network methods are:
Personal area network (PAN): short range small networks. Typically wireless and allows transfer of data between devices (e.g. cellphone to tablet)
Local area network (LAN), which is usually a small network constrained to a small geographic area. An example of a LAN would be a computer network within a building. The group of computers and devices are connected together by a switch, or stack of switches, using a private addressing scheme as defined by the TCP/IP protocol
Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.
Metropolitan area network (MAN), which is used for medium size area. examples for a city or a state. ISP-level networks
Wide area network (WAN) that is usually a larger network that covers a large geographic area.
All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet). Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs.
All computers on a network have to know how to talk to each other. This requires a 'protocol' (which is a set of rules that dictate how computers can talk to each other). Think of a protocol being like a language. Both computers have to speak the same language. The model used in networking is known as the OSI model which will be discussed in a future topic in the course.
Essentially the way your computer (phone/console/computer/'smart refrigerator' etc...) talks to another computer is that packets of information are created by the computer. They move to the network interface, then across a medium (copper/glass/air) to a receiving network interface that then hands the information 'up' to the relevant application on the next computer.
To find the other computer there are network appliances. A network appliance is one that tells packets of information where to go. Think of appliances as a "Hello Girl" back in the age of manual telephone switching. They take incoming packets of information and read where they're supposed to go and then redirect them on their way towards their destination. The most common appliances we see as consumers are switches and routers.
A switch typically redirects packets in internal networks while a router redirects information across the internet. This is done through routing tables which will be discussed in TEJ3M
The big technological leap forward in networking was the advent of the UTP (unsheilded twisted pair) - most commonly used today as category 5 (or 6).
UTP category and its associated speed
Answer the following on a google doc and submit the share link to Classroom
You may use the following website: http://fcit.usf.edu/network/default.htm
1. What is a computer network?
2. Distinguish between a LAN and a WAN.
3. State the two most important advantages of having a computer network.
4. What is a protocol?
5. State the differences between Ethernet and Fast Ethernet. What is Gigabit Ethernet and what kind of cable does it use?
6. What is networking hardware?
7. What is a NIC? What kind of NIC is most commonly used today?
8. Describe:
a. Switch
b. Router
9. What is network cabling?
10. How many categories of UTP are there? What are their differences?
11. What is a fiber optic cable?
12. What are two advantages or wireless LANs? 2 disadvantages?
13. Distinguish between a peer to peer and a client/server network and state some advantages/disadvantages.
14. Describe the various wireless protocols typically used in home networking (802.11x)
Implemented in 1998, Internet Protocol version 4 addressing was/is a connectionless protocol (a message can be sent from one location to another without a prior connection being formed) for use on packet-switched networks (e.g., Ethernet). It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol (e.g., Transmission Control Protocol). All that to say, 'Information A' goes from one address to another by being broken down into packets, which make their way to the end-address the best they can, then get reassembled into 'Information A' once more.
Interestingly enough, the backbone of the internet, IPv4 is currently being replaced by IPv6 as a default protocol (e.g. Windows 10 by defaults assigns IPv4 and IPv6 address). The top-level IPv4 'exhaustion' occurred in 2011. Reserve addresses were exhausted between 2011 and 2019 depending on the area of the world you were in. Individual ISPs still have pools of unassigned IP addresses, and reclaim them as they are no longer needed by subscribers. Switching equipment to enable IPv6 was no easy task since there was cost associated with it.
An understanding of the way that IPv4 addressing works will help us to understand IPv6 addressing, so let's start there. In IPv4 addressing (let's just refer to it as IP addressing), an IP address is a 32 bit, 4 octet address which is assigned (by who?) to every computer on an IP (ethernet protocol) network.
For example, the host address 192.168.1.1 (which is a very common router address for most home networks) resolves to:
IP addresses conform to the pattern:
octet1.octet2.octet3.octet4
Network and host addresses are like a real-world analogy: street address (ie I live on River Road) vs. street number (I'm at 1633 River Road)
1) Class A: Used by countries or VERY large companies (e.g. Cisco, Microsoft, Dell etc...). These are unique 1st octet ranges (1-> 127). They take the form of:
network.host.host.host
255^3 bits so about 16.5million host addresses
the default subnet mask (which creates subnets, or private addresses within the host network) for these is 255.0.0.0
2) Class B: Used by somewhat large companies. The first octet is in the range of 128-191 and has the pattern:
network.network.host.host
63*255 class B networks which about 16k addresses
subnet mask is 255.255.0.0 so about (255x255) 65k host addresses inside
3) Class C: Used by small companies and individuals. The first octet is in the range 192-223 and has the pattern:
network.network.network.host
254 hosts per network
subnet mask is 255.255.255.0
4) Class D/E: are experimental networks used to multicast
Tools we use in IP networking are:
ipconfig: which gives information about the host computer's network adapters as well as the details of the connection to the ethernet network.
ping: which is a way in which to test the reachability of a host or IP address on a network.
traceroute: is a diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.
There are several network IP addresses that reserved, they are:
10.host.host.host
127.host.host.host
169.host.host.host
192.host.host.host (chances are your home network is something like 192.168.X.X where the subnet IP addresses are likely 192.168.1.X or 192.168.2.X)
https://youtu.be/ThdO9beHhpA
Answer the following on a google doc and submit the share link to Classroom
For each of the following IP addresses, state:
i) class
ii) the arrangement of network and host octets
iii) default subnet mask
iv) network address
v) broadcast address
a) 192.168.2.89
b) 167.89.32.12
c) 24.98.33.111
d) 256.78.123.4
e) 222.47.99.11
Let's use a home network (in IPV4):
Network: 192.168.2.0
Computer 1: 192.168.2.40
Computer 2: 192.168.2.55
Printer 1: 192.168.2.100
In this case, we’re using 24 bits (or three octets) for the network. Notice that every host device in the network has the same first three octets? That’s the network portion of the IP address with a /24 mask.
Network Address: The network bits stay the same. Host bits all resolve to 0
Broadcast Address: Network bits stay the same, host bits all are 1s
Subnet Mask: Network bits binary 1's, Host bits binary 0's
First available address: the first host bit will be 1
e.g. 172.168.14.11
172.168.0.0
172.168.255.255
255.255.0.0
172.168.0.1
e.g. 203.200.0.42
203.200.0.0
203.200.0.255
255.255.255.0
203.200.0.1
https://youtu.be/mJ_5qeqGOaI?si=ANI6Kb8TzPHGZtTx
Answer the following on a google doc and submit the share link to Classroom
For each of the following, state: the address class, the default arrangement of network(N) and host(H) bits, the default subnet mask, the network address, the broadcast address and the first IP address in each network. Please show the binary result
1. 202.22.22.0
2. 5.0.0.0
3. 198.22.22.0
4. 140.90.0.0
5. 150.150.0.0
6. 192.150.10.0
7. 10.0.0.0
8. 225.98.12.0
Evaluation of expectation based partly on Quiz #4
Describes the physical and logical layout of a network
Physical Topology: the actual (scaled) network
Logical Topology: how the various computers are organized from a communications perspective (star topology being common)
Physical network diagram - more like a blueprint
Logical Network diagram - more like a mind-map
Make a sketch (use paper or Packet Tracer or something else) of the physical topology of your home network (more like a blueprint). Include your local Network Address (eg. 192.168.1.0 - you can make this up) on the diagram and addresses of all the devices on your network.
Exemplar
Go to Linksys Emulation(link). For the each of the sections below, take screenshots(PRT SCR button next to the F-keys up top at right OR Windows Snipping Tool) of all relevant steps to document your progress - you can paste the pictures taken into a Google Doc and submit them into Google Classroom.
Complete the following (remember to 'save' icon, between steps for the settings to 'take' in your virtual router):
a) choose the default router IP address to 192.168.1.1
b) choose a default router name to be something relevant to your home location
c) make sure the time is GMT-5 H (eastern US & Canada)
d) under wireless options, choose to make the default SSID something relevant (that is NOT the same name as for the router)
e) choose WPA2 for a wireless security option and type in some passphrase (a word)
f) enable your MAC access filter and allow ONLY the MAC address
70-D4-67-C4-B4-AF
E6-64-DF-D5-61-DB
FC-DD-52-F1-F0-23
g) change the administrative password for the router to something of your choice
h) go into parental controls for access policies and add a local machine (if it were real you'd get IP addresses of local computers).
block the following times: 9:30 pm to 11:30 pm
www.youtube.com
if you can, block port range 150-15000 (which would likely block torrents)
i) gamer settings
-Xbox LIVE requires the following ports to be open:
-Port 88 (UDP)
-Port 3074 (UDP and TCP)
-Port 53 (UDP and TCP)
-Port 80 (TCP)
-go into the port forwarding area for the router and forward the ports listed above to the IP address 192.168.1.14
Answer the same questions for the Asus emulator listed here
Adds to expectation for assignment #13
Head back to your computer in the back.
cable together your computer to the switch on your bench/area
Research how to set up a static IP address on a windows machine
take screenshots of you in the router GUI setting up a static IP for your computer
install Armagetron on your computer (grab it from the google classroom)
set an exception in the windows firewall allowing you to connect to the host of the game
In the same google doc as 13 write up the process along with screenshots. What went well, what went wrong?
Materials:
length of cat6 UTP (unshielded twisted pair): has 4 pairs of copper wires which have colour coding
RJ45 jack
Tools:
scissors
crimper
tester
Steps:
measure cable and add 15% length and cut it
cut away outer coating to expose the twisted pairs. Don't nick the copper cables as you cut away the protective sheath
Put the cable colors in order (what is a straightthrough vs. crossover):
StraightThrough (A-A or B-B)
WG/G/WO/Bl/WBl/O/WBr/Br
Crossover (A-B or B-A)
WO/O/WG/Bl/WBl/G/WBr/Br
Flatten out the wires and trip them so about 2cm of wire are exposed
Slide the RJ45 jack onto the wires (gold side up). The jack should JUST slide down to the cable sheath
Check with your teacher
Crimp and test the cable
Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries. It deals with developing and analyzing protocols that prevents malicious third parties from retrieving information being shared between two entities thereby following the various aspects of information security. Secure Communication refers to the scenario where the message or data shared between two parties can’t be accessed by an adversary. In Cryptography, an Adversary is a malicious entity, which aims to retrieve precious information or data thereby undermining the principles of information security. Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core principles of modern-day cryptography.
sourceNetwork security on the other hand are activities designed to protect the integrity of your network and data. They include both hardware and software technologies. The aim is to stops threats from entering or spreading on your network.
Key Usage: Uses the same secret key for both encryption and decryption.
Speed: Generally faster than asymmetric encryption because it uses shorter keys and simpler algorithms.
Security: Requires secure key distribution, as both parties need the same key.
Examples: Advanced Encryption Standard (AES), Data Encryption Standard (DES).
Use Cases: Ideal for encrypting large amounts of data, as the speed and simplicity are advantageous.
Key Usage: Uses a pair of keys: a public key for encryption and a private key for decryption.
Speed: Slower than symmetric encryption due to more complex algorithms and longer keys.
Security: Enhanced security as the private key never needs to be shared, and the public key can be distributed widely.
Examples: RSA, Diffie-Hellman.
Use Cases: Ideal for secure key exchange and digital signatures
Ever wonder why the password field when using autofill is always a fixed length of * (asterix's)? A hash function takes an input (data of any size) and produces a fixed-size output (the hash or message digest).
They are designed to be one-way, meaning it's computationally infeasible to reverse the process and find the original input from the hash. A good hash function should produce unique hashes for different inputs, and even a small change in the input should result in a drastically different hash.
For example, take into consideration the words password and passw0rd
password might produce the hash "5f4dcc3b5aa765d61d8327deb882cf99",
passw0rd might produce "6c569aabbf7775ef8fc5705a9f1f9b2f"
A bad hash function would only vary the hash based on the change of the one character. For example:
password = 5f 4d cc 3b 5a a7 65 d6
passw0rd = 5f 4d cc 3b 5a 8c 65 d6
In this case it is clear that the 6th character was altered and it's in a hash of hex that is chained to the letters themselves. This would be relatively fast to crack.
The art of hiding data in various types of media (pictures, audio or video). More will be discussed in grade 11
Head to this website
Create a message in the Text Encryption box
Use Encrypt with a custom secret key. Make sure your partner has that same key though a direct google chat message.
Record your encrypted message output to this form for your partner to decipher
Look up the encrypted message from your partner and use the key you both agreed upon to decipher it
while a bit beyond the scope of grade 10, if you'd like to learn about cyber security you can check out this free online course
CIA triad, is a fundamental model in information security that emphasizes the importance of Confidentiality, Integrity, and Availability of data and systems