Preview

cs601

Satisfactory Essays
Open Document
Open Document
427 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cs601
CS610-Computer Networks

Lecture No.38

Lecture Handout
Computer Networks
Lecture No. 38

VARIANTS OF NAT:
There are also some variants of NAT due to some of its drawbacks.
The basic NAT simply changes IP addresses. But Network Address and Port
Translation (NAPT) (which is another modified form of NAT) changes IP addresses and protocol port numbers too. It is the most popular form of NAT.
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

NETWORK ADDRESS AND PORT TRANSLATION (NAPT):
It is by far the most popular form of NAT that can change TCP or DP protocol port numbers as well as IP addresses.
It allows multiple computers at site to communicate with single destination as well as multiple users on given computer to communicate with same destination.

EXAMPLE NAPT TRANSLATION TABLE:
An example NAPT translation table is shown in the figure below. We can see that not only the private addresses but also the port numbers are translated too.

Figure 38.1

Each entry in the table records protocol port numbers as well as IP address. The port numbers are reassigned to avoid conflicts.

129
© Copyright Virtual University of Pakistan

CS610-Computer Networks

Lecture No.38

TCP SPLICING:
A popular use of NAPT is TCP Splicing. It interconnects two independent TCP connections and performs segment rewriting. It is extremely efficient and avoids overhead of extracting data from one connection and sending to the other. It uses extended translation table.

TWICE NAT:
Basic NAT does not work well for communication initiated from the Internet.
Twice NAT allows a site to run servers. It requires the DNS to interact with the NAT device. Twice NAT fails if an application uses the IP addresses instead of Domain Name.

CAT:
Cable TV providers offering Internet services through Cable Modems propose it.
It includes NAPT plus additional functionality. The

You May Also Find These Documents Helpful

  • Satisfactory Essays

    CS320 Lab1

    • 874 Words
    • 3 Pages

    3. Create a list of authors that displays the last name followed by the first name for each…

    • 874 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this way TCP/IP are interconnected. Simply put, TCP is responsible for breaking data down into IP packets…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    11. If a computer is found to have an IP address of 169.254.1.1, what can you assume…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Hcs 320

    • 2178 Words
    • 9 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2178 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for accepting incoming HTTP client connections and for delivering data packets to clients that are streaming by using HTTP.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cu700

    • 274 Words
    • 2 Pages

    Agreeing objectives is essential for a team or individual to know what they are focusing on to avoid wasting resources and time. Deadlines strongly affect what you research, for example, if a deadline of one week is agreed for writing a newspaper, you wouldn’t want to include today’s news as it would be very outdated by the time of publication.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    The significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol is to ensure a connection is made before transmitting data such as SSH and HTTP. FTP, Telnet, HTTP, HTTPS, SMTP, POP3, IMAP, SSH use TCP as a transport protocol.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The forwarding process requires a translation: forwarding uses IP addresses, and a frame transmitted across a physical network that contains the MAC address of the next hop. The IP software translates the next-hop IP address to an equivalent MAC address (Comer, 2009).…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    The most common use of private addresses is in residential networks, since most Internet service providers (ISPs) only allocate a single publicly routable IP address to each residential customer, but many homes have more than one computer or other Internet connected device, such as smartphones. In this situation, a network address translator (NAT/PAT) gateway is usually used to provide Internet connectivity to multiple hosts.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Hacking2E Lab07 AW

    • 330 Words
    • 2 Pages

    3. How many different source IP host address did you capture in your protocol capture?…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    192.168.1.1, this may seem like an ordinary IP address. However it is not so ordinary. This is the IP address used by several network brands like Linksys and others as an access point. This IP serves as a WLAN to route the requests of sevreal routers. The routers’ admin access needs to be configured on this IP address. By doing this configuration firms allow the network administrators to configure the networks and routers owned by them. This IP is used for several purposes which include – managing security options, IP QoS, DSL, ADSL, Network management, DNS, LAN, WAN, proxy, WLAN settings, MAC, WPS block and several other options.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In the Screenshot above, cdn2 has a different IP (54.230.2.234) in one case and cdn0 also has a different IP (54.230.3.190) for three different objects. o Now, because we parse har file w.r.t host name and pcap w.r.t IP, all three of cdn0, cdn2, cdn3 have same TCP connections in the table as they have same IPs. o Better way to read this would be to consider only non-zero download size connections for each of these three domains. Haven’t implemented it to avoid irregularity in the table.…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    MPLS intro from cicso

    • 23391 Words
    • 94 Pages

    It supports the creation of different routes between a source and a destination on a purely router-based…

    • 23391 Words
    • 94 Pages
    Powerful Essays