From 0d59e38cde7abde43b895b45b2db6aeacf834c46 Mon Sep 17 00:00:00 2001
From: Andre Noll
IP addresses are a global resource, so each address must only be +assigned to at most one device. The Internet Assigned Numbers +Authority (IANA) coordinates who is entitled to use any given +range of IPv4 addresses. However, a number IP ranges, for example the +ranges 10.0.0.0-10.255.255.255 and 192.168.0.0-192.168.255.255, are +reserved for local use only so that these addresses can be assigned +in multiple local networks without interfering with each other.
+ +In a network which contains only local addresses, the devices +can communicate with each other, but they will not be able to access +public world-wide services. To illustrate how NAT works around this +restriction, consider a desktop computer in a local network which +intents to perform a web search by contacting a public web server +which is not a member of the local network.
+ +The desktop is configured to route packets which are not +destined for the local network through a dedicated machine, called +the router. The router has two IP addresses: one address +in the local network and a public NAT address. As traffic passes +from the desktop through the router to the web server, the router +alters the source address of each IP packet (the local address of the +desktop) to the public NAT address of the router, and keeps track of +all thusly forwarded connections. When a reply arrives at the router, +it uses the connection tracking data stored during the outbound phase +to determine the address in the local network to which to forward the +reply. This time the router alters the destination address +of the packet to the local address of the desktop and forwards the +packet to the desktop via the local network.
+ +NAT can be seen as providing a kind of privacy mechanism because +machines on the internet cannot monitor which hosts are sending and +receiving traffic. They only see the NAT address. NAT has also +downsides though: Pinpointing the source of a problem becomes harder, +and encryption becomes more difficult. For example you can not encrypt +the IP address because the router must be able to change it.
+ EXERCISES()The desktop is configured to route packets which are not destined -for the local network through a dedicated machine, called the -router. In particular, all internet traffic is sent to the router. -The router has two IP addresses: one address in the local network -and a public NAT address. As traffic passes from the desktop through -the router to the web server in the internet, the source address of -each IP packet (the local address of the desktop) is changed on the -fly to the public NAT address of the router. The router tracks each -active connection. When a reply arrives at the router, it uses the -connection tracking data stored during the outbound phase to determine -the address in the local network to which to forward the reply. This -time it overwrites the destination address of the IP packet with the -local address of the desktop.
- -NAT can be seen as providing a kind of privacy mechanism because -machines on the internet cannot monitor which hosts are sending and -receiving traffic. They only see the NAT address. NAT has also -downsides though: Pinpointing the source of a problem becomes harder, -and encryption becomes more difficult. For example you can not encrypt -the IP address because the router must be able to change it.
- -») - HOMEWORK(« Run tracepath wikipedia.org
. Explain how this command
works and how it can be used to identify networking problems.
@@ -433,11 +440,10 @@ HOMEWORK(«
SECTION(«Application Layer»)
-Application layer protocols define how the server side of a network -service communicates with clients that connect to the server by -connecting a specific TCP or UDP port. Services are often associcated -with port numbers which can be registred at the Internet Assigned -Numbers Authority (IANA).
+Application layer protocols define how the server side of +a network service communicates with clients that connect to the +server by connecting a specific TCP or UDP port. Services are often +associcated with port numbers which can be registred at the IANA.
Examples for application layer protocols which are employed on top of TCP are the Hypertext Transfer Protocol (HTTP, port 80) -- 2.39.5