Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

University of Kelaniya, Sri Lanka

Dr. Nalin Warnajith


BSc(Kel’ya), PGDipIT(Kel’ya), PhD(Japan),MACS
Senior Lecturer

Software Engineering Teaching Unit


NAT Addresses
• The NAT table also defines the global address seen by
computers outside the network
• Even though each computer within the local network has a
specific IP address, external systems can only see one IP
address when connecting to any of the computers within
the network
• While this aids in network security, it also limits the number
of IP addresses needed by companies and organizations
• Using NAT, even large companies with thousands of
computers can use a single IP address for connecting to the
Internet

SETU, Faculty of Science , University of


Kelaniya, Sri Lanka
Translation Modes
• Dynamic Translation
• large number of internal users share a single external address
• Static Translation
• a block external addresses are translated to a same size block of
internal addresses
• Load Balancing Translation
• a single incoming IP address is distributed across a number of
internal servers
• Network Redundancy Translation
• multiple internet connections are attached to a NAT Firewall that it
chooses and uses based on bandwidth, congestion and availability.
Dynamic NAT
- Dynamic NAT can only be used to establish connections
from within the private network out to the public
network
- A pool of network addresses is maintained
- Each connection is assigned a unique public address
- The maximum number of simultaneous connections is
equal to the number of public addresses in the pool
- This is similar to a one-to-one correspondence between
addresses
- Dynamic NAT allows you to communicate with the
Internet through a dynamic NAT address.

SETU, Faculty of Science , University of


Kelaniya, Sri Lanka
SETU, Faculty of Science , University of
Kelaniya, Sri Lanka
Static NAT
- Static NAT is a simple one-to-one mapping of private and public
addresses
- This is required to support inbound connections from your public
network into your private network
- For each local address defined, there has to be an associated
globally unique address

SETU, Faculty of Science , University of


Kelaniya, Sri Lanka
SETU, Faculty of Science , University of
Kelaniya, Sri Lanka
Networking Devices
• Repeaters
• Hubs
• Bridges
• Switch
• Routers
The purposes of having devices
• they allow a greater number of nodes to be
connected to the network.
• they extend the distance over which a network can
extend.
• they localize traffic on the network.
• they can merge existing networks.
• they isolate network problems so that they can be
diagnosed more easily.
Repeater
• When signals first leave a transmitting station, they
are clean and easily recognizable.
• However, the longer the cable length, the weaker
and more deteriorated the signals become as they
pass along the networking media.
• A repeater can provide a simple solution for this.
Hub
• Multi-port repeaters are often called hubs. Hubs
are very common internetworking devices.
Generally speaking, the term hub is used instead of
repeater when referring to the device that serves
as the center of a star topology network.
What is the disadvantage associated with
using a repeater?
• it can't filter network traffic. Data, sometimes
referred to as bits, arriving at one port of a repeater
gets sent out on all other ports
• data gets passed along by a repeater to all other
LAN segments of a network regardless of whether
it needs to go there or no
What problem could occur as a result of
too much traffic on a network?
• if segments of a network are only connected by
non-filtering devices such as repeaters, this can
result in more than one user trying to send data on
the network at the same time
• If more than one node attempts to transmit at the
same time, a collision will occur.
• When a collision occurs, the data from each device
impact and are damaged
What internetworking device can be used
to filter traffic on the network?
• One way to solve the problems of too much traffic
on a network and too many collisions is to use an
internetworking device called a bridge.
• A bridge eliminates unnecessary traffic and
minimizes the chances of collisions occurring on a
network by dividing it into segments
At what layer of the OSI model do
bridges operate?
• Because bridges operate at the data link layer, layer 2, they
are not required to examine upper-layer information.
How do bridges filter network
traffic?
How are bridge data-forwarding
decisions limited?
• Although bridges use tables to determine whether
or not to forward data to other segments of the
network, the types of comparisons and decisions
they make are relatively low level, simple ones
What types of network traffic
problems is a bridge incapable of
solving?
• Bridges work best where traffic from one segment
of a network to other segments is not too great.
• However, when traffic between network segments
becomes too heavy, the bridge can become a
bottleneck and actually slow down communication.
Ethernet Switch
Switch
Ethernet Switch
• Formally, a switch is just a bridge
• Switch looks at ethernet headers (layer 2)
• ethernet to ethernet only
• Learns what addresses are connected to which
ports
• If destination of packet known, the packet is only
sent to the destination port
Ethernet Switch
• Each port is a separate collision domain
• no daisychain limit
• Can do full duplex
• Often one host per port
• high performance
• Security features

• Dualspeed ‘hub’ includes switch


VLANs

SWITCH

A B C

A, B, C can be customerA, customerB, customerC


or sales, administration, engineering, …
They all share the same network!
Splitting up switches
SWITCH

A B C

• VLANs allow you to split up the network in smaller


network (and divide the switch in smaller parts)
• VLANs identified by a number - vlan 1234
Splitting up switches (2)

SWITCH

A B C

• You can set the VLAN per port


• This is a configuration thing and hence can be
changed dynamically - flexible!
• Network port can be member of multiple VLANs
What are routers?
• Routers are another type of internetworking
device.
• These devices pass data packets between networks
based on network protocol or layer 3 information.
• Routers have the ability to make intelligent
decisions as to the best path for delivery of data on
the network.
What network problems can
routers help resolve?
• The problem of excessive broadcast traffic can be
solved by using a router.
• Routers are able to do this, because they do not
forward broadcast frames unless specifically told to
do so
How do routers work?
• Routers are used to connect two or more networks.
For routing to be successful, each network must
have a unique network number
The port where a router connects to network A
would have an IP address of A5.
The IP address of the router's
second interface would be B5.
The router would determine to send the data from
network A to network B out its port with the IP
address B5.
Routing Table
• a routing table, or routing information base (RIB), is a
data table stored in a router or a
networked computer that lists the routes to particular
network destinations, and in some cases, metrics
(distances) associated with those routes.
• The routing table contains information about the
topology of the network immediately around it. The
construction of routing tables is the primary goal
of routing protocols.

SETU, Faculty of Science , University of


Kelaniya, Sri Lanka
SETU, Faculty of Science , University of
Kelaniya, Sri Lanka
SETU, Faculty of Science , University of
Kelaniya, Sri Lanka
SETU, Faculty of Science , University of
Kelaniya, Sri Lanka

You might also like