Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

TCP/IP Protocol Suite 1 Chapter 27 Upon completion you will be able to: Next Generation: IPv6 and ICMPv6 Understand the shortcomings of IPv4 Know the IPv6.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
IPv6-The Next Generation Protocol RAMYA MEKALA UIN:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
COS 420 Day 18. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements Submitted but Needs lots of work Individual Project.
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Circuit & Application Level Gateways CS-431 Dick Steflik.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
The OSI Model FTP API 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical HTTP Software.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Address Translation (NAT) CS-480b Dick Steflik.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 24 November 11, 2004.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
© MMII JW RyderCS 428 Computer Networking1 Private Network Interconnection  VPN - Virtual Private Networks  NAT - Network Address Translation  Describe.
TCP/IP Yang Wang Professor: M.ANVARI.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
TCP/IP Protocols Contains Five Layers
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
NAT Network Address Translation. Reading CNI – pp Port Mapping LA – pp NAT.
Lesson 2 Introduction to IPv6.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Chapter 27 IPv6 Protocol.
CMSC Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer NAT, IPv6.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 Addressing, Internetworking. 2 Collection of Subnetworks The Internet is an interconnected collection of many networks.
Protocol Layering Chapter 11.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Computer Networks IPv6. 2 Motivation The primary motivation from changing the IP datagram format is to increase the size of the useable address space.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
An Analysis on NAT Security
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
NAT : Network Address Translation
Internet Protocol Version 6 Specifications
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
IT443 – Network Security Administration Instructor: Bo Sheng
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Topic 5: Communication and the Internet
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Firewalls Purpose of a Firewall Characteristic of a firewall
Working at a Small-to-Medium Business or ISP – Chapter 7
Key concepts covered in Midterm III
NAT (Network Address Translation)‏
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
Network Address Translation (NAT)
Review of Internet Protocols Network Layer
Internet Protocol version 6 (IPv6)
Presentation transcript:

Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT

Network Address Translation What is NAT?  Informally, NAT is a method of connecting multiple computers on a local network to an external network using one IP address.  NAT can be incrementally deployed and only the local network routers need to be modified to implement NAT.  Backbone routers need not be modified.

Network Address Translation : 2000 …… Backbone router … : 3000 … NAT Basic operation: Source -> : 2000 Destn. -> : 600 NAT Source -> : 500 Destn. -> : 600 Source -> : 600 Destn. -> : 500 NAT Source -> : 600 Destn. -> : 2000 Translation Reverse Translation

Network Address Translation Routing across NAT:  Local addresses are hidden from backbone.  Backbone-partitioned networks need special handling using tunneling. Header manipulations:  IP checksum should be changed.  For applications like FTP, application data should be modified which might require changing the TCP sequence no.s and acknowledgement no.s

Network Address Translation  ICMP messages need a lot of modifications when they pass through a NAT – two address modifications and three checksum modifications. Disadvantages:  NAT heavily violates the layering principle by looking into the transport and application layers.  Applications that contain IP address in their data cannot work through NAT unless NAT knows the exact occurrences.

Network Address Translation  NAT reduces the options for providing security because any application data that contains IP addresses cannot be encrypted.  NAT provides privacy by hiding the local addresses but this makes detecting of attacks like mail spam difficult. Conclusion: NAT has several negative characteristics but it could still act as a short-term solution to the address depletion and scaling problems.