Introduction - Eastern Illinois University

Download Report

Transcript Introduction - Eastern Illinois University

School of Business
Eastern Illinois University
Review for Exam 4
© Abdou Illia, Fall 2004
School of Business
Eastern Illinois University
The Internet
3
The Internet addressing system

Network deliver messages based on network
addresses
–
Host
The Internet has two addressing systems for hosts
 IP addresses. Example: 139.67.8.3
 Host names (or domain names or Unique Resource
Locators). Example: eiu.edu
Host
IP Address

4
IP addresses
–
–
–
Are really strings of 32 bits (1s and 0s)
 Example: 10000000101010100001000100001101
Usually represented by four number segments separated
by dots: dotted decimal notation
 Example: 128.171.17.13
Official addresses for hosts
127.18.47.145
127.47.17.47
5
Assigning Parts

Most Organizations have multiple Segments
within the Organizational Network

So, usually Local Part is broken in two parts
–
–
a Segment Part to represent each segment
Remaining Bits are the Host Part, designating a
particular station on that segment
Local Part
Network Part
Segment Part
IP Address (32 bits total)
Host Part
6
IP address
Position Place Value
Bit Decimal
(N)
(2N)
Binary
10100011
=
Decimal
163
Note: Starts with 0
7
6
5
4
3
2
1
0
128
64
32
16
8
4
2
1
1
0
1
0
0
0
1
1
128
0
32
0
0
0
2
1
163
7
Network classes

The value of the first octet in an IP address
determines the Network class
Class
Leftmost
bits
Class A 0xxx
Class B 10xx
Class C 110x
Network Part
Length
Address range
8 bits
16 bits
24 bits
0.x.x.x to 127.x.x.x
128.0.x.x to 191.255.x.x
192.0.0.x to 223.255.255.x
Position
(N)
1)
For each of the following IP
addresses, give the class and the
network bits.
10101010111110000101010100000001
01010100111110000101010100000001
2)
To which class belong Eastern’s
network? (Net. Part =139.67)
7
6
5
4
3
2
1
0
Place Value
(2N)
128
64
32
16
8
4
2
1
Bit
Decimal
Summary Questions
8
1.
a) Distinguish between IP address and host name. b)
Which is the official address of a host? c) Does a
server host need an IP address? d) Does your home
PC need an IP address when you are on the Internet?
e) Does a server host need a host name? f) Does
your home PC need a host name when you are on
the Internet?
2.
Using the conversion system on slide #10, convert
the following IP address to dotted decimal notation:
10101010 11110000 11001100 01010101. (Spaces
are included to facilitate reading.)
9
Summary Questions
3.
a) What are the three parts in IP addresses? b) What part(s)
do border routers look at to determine whether the
destination host is within the network or outside of it?
4.
a) Who assigns the Network part? b) The Segment part? c)
The Host part?
5.
a) When do we need DNS? b) What information do you send
in a DNS request message? c) What information do you
receive in a DNS response message?
4.
a) What is autoconfiguration? b) What information do we get
back, at a minimum, in an autoconfiguration response
message? c) What other information may we get back?
Contoso Inc. is a small company with two departments (Marketing
and Sales). In order to take advantage of the growing global market,
the company decided to setup a commercial website. For that, 10
Contoso Inc. applied for a domain name and a network part to use for
assigning IP addresses to its existing server and workstations. The
Registrar assigned the Network Part 137.75 to the company. As the
assistant of the network administrator at Contoso Inc., you are
responsible for assigning IP addresses to the company’s server and
workstations. Six workstations and the server are located in the
Marketing department. The other workstations are located in the Sales
department. Based on your knowledge about Network parts, Segment
parts and Host parts, assign IP addresses so that we can easily know
the location of a computer based on its IP address.

Computer 1 located in the Marketing department:

Computer 2 located in the Sales department:

Server:

Computer 3 located in the Sales department:
Note: The Network part should be same for all computer at Contoso
Inc. Computers in the same department should have the same Segment
part.
School of Business
Eastern Illinois University
Security
12
Summary Questions

Name a few kinds of systems attacks
Answer (Security, Slide #3): Denial of Service attacks, Malicious
content attacks and Intercepting messages.

Distinguish between Denial-of-Service (DoS) attack and Distributed
Denial-of-Service (DDoS) attack
Answer (Security, Slides #4, 5): In DoS attack, the attacker sends a
stream of messages to the victim (usually a server) from a single
computer connected to the network. In DDoS, the attacker hacks into
multiple clients and plants Zombie programs on them. Then, he sends
commands to Zombie programs which execute the attacks.

Name some techniques usually used to protect a communication
against Intercepting messages.
Answer: Symmetric key encryption/decryption and Public key
encryption/decryption
Summary Questions

13
Jason sends a message to Kristin using public key encryption. (a) What
key will Jason use to encrypt the message? (b) What key will Kristin
use to decrypt the message? (c) What key will Kristin use to encrypt
the reply? (d) What key will Jason use to decrypt the reply? (e) Can the
message and reply be long messages? Explain.
Answer:
a) Jason will encrypt the message with Kristin’s public key.
b) Kristin will use her own private key to decrypt the message.
c) Kristin will use Jason’s public key to encrypt the reply.
d) Jason will use his own private key to decrypt the reply.
e) No, public key encryption can only encrypt short messages.

Does public key encryption have a problem with secure key exchange
for the public key? Explain.
Answer: There is no problem distributing the public key, because it does
not have to be distributed securely. You can even find companies’
public keys on their website.
14
Summary Questions
1.
Briefly describe the various types of malicious content
attacks
Answer: See slide #6
1.
What headers and messages do Packet filter firewalls
examine?
Answer:
2.
See slide #10
a) What part of a packet do Application firewalls examine?
b) What do they look for?
Answer: a) Application layer messages.
b) They look for illicit content.