SlideShare a Scribd company logo
1 of 14
The Story of: @%#^& - Q? - A!
The Story of: NAT!
Private and Public IPs No private on the internet! Private Computers wants             . They can’t go with their private IPs!!! What is the problem?!
Get public IPs … Well, give me money to buy them.  And I would need new Network cards for them. Are we PRIVATE anymore!?!?!  Gateways! Inspiring! If there is a service in the internet somewhere, a public service, does it care who I am that much?! I GOT IT! Let’s buy one more computer! Ideas!?
The Idea is to put a computer between our private network and the internet. When ever one host in the private zone wants to talk with any host in the internet (upload/download), it asks this computer for doing It. This device is the only one seen from the internet. We will call this device a NATDevice. The delegate!
NAT stands for Network Address Translation.  Translation of address is changing them according to rules. Tow Levels of NAT: Network layer: translates IP (Basic NAT) Transport & Network layer: IP + Port (TCP/UDP)  Referred to as PAT (Port Address Translation) or NAPT. Translation in two directions: SNAT: Translate source address. DNAT: Translate destination address. NAT: features and definitions
Scenario One (Browsing) In this scenario computer A tries to open a webpage on a server through the internet.
Hasan in the Cafiteria! (Port Forwarding) This is the scenario where I am in the cafeteria trying to take of my torrents …  !
Static DNATing for inbound connections. Example: Vuze local connection end-point. Too many outbound connections and we run out of ports in the NAT. E.g. Inconsistent HTTP requests while browsing. NAT table entries with no activity are droped. Some protocols like FTP has got problems!!! Drawbacks:
FTP through NAT
NAT & IPv6
The ENDThank you.

More Related Content

What's hot

IP Address
IP AddressIP Address
IP AddressRahul P
 
03 network services
03 network services03 network services
03 network servicesJadavsejal
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Amna Nawazish
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocolasimnawaz54
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Nigel Bowden
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer routerrishi ram khanal
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfBT Digital
 

What's hot (20)

IP Address
IP AddressIP Address
IP Address
 
ARP
ARPARP
ARP
 
03 network services
03 network services03 network services
03 network services
 
Static NAT
Static NATStatic NAT
Static NAT
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Nat
NatNat
Nat
 
Linux05 DHCP Server
Linux05 DHCP ServerLinux05 DHCP Server
Linux05 DHCP Server
 
Dns server
Dns serverDns server
Dns server
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
Nfs
NfsNfs
Nfs
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdf
 

Similar to Nat presentation

Simplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 TeachersSimplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 Teacherswebhostingguy
 
In Defence of NATs
In Defence of NATsIn Defence of NATs
In Defence of NATsAPNIC
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technologyAnware Kade
 
The Neverending Story: A packet's journey through NYU-NET
The Neverending Story: A packet's journey through NYU-NETThe Neverending Story: A packet's journey through NYU-NET
The Neverending Story: A packet's journey through NYU-NETJiashan Wu
 
How Does The Internet Work? : Notes
How Does The Internet Work? : NotesHow Does The Internet Work? : Notes
How Does The Internet Work? : NotesSubhajit Sahu
 
There and back again
There and back againThere and back again
There and back againJon Spriggs
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
Web Fundaments
Web FundamentsWeb Fundaments
Web Fundamentschungmd
 
Pears
PearsPears
Pearsthips
 
Guide to home networking
Guide to home networkingGuide to home networking
Guide to home networkingDilan Gilluly
 
Computer networks
Computer networksComputer networks
Computer networksJohn Cook
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and SecurityKimmy Chen
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer NetworkingAmit Saha
 

Similar to Nat presentation (20)

Simplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 TeachersSimplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 Teachers
 
In Defence of NATs
In Defence of NATsIn Defence of NATs
In Defence of NATs
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
 
Networking with java
Networking with javaNetworking with java
Networking with java
 
The Neverending Story: A packet's journey through NYU-NET
The Neverending Story: A packet's journey through NYU-NETThe Neverending Story: A packet's journey through NYU-NET
The Neverending Story: A packet's journey through NYU-NET
 
How Does The Internet Work? : Notes
How Does The Internet Work? : NotesHow Does The Internet Work? : Notes
How Does The Internet Work? : Notes
 
There and back again
There and back againThere and back again
There and back again
 
Networking
NetworkingNetworking
Networking
 
Smart (3 files merged)
Smart (3 files merged)Smart (3 files merged)
Smart (3 files merged)
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
Web Fundaments
Web FundamentsWeb Fundaments
Web Fundaments
 
Pears
PearsPears
Pears
 
Guide to home networking
Guide to home networkingGuide to home networking
Guide to home networking
 
Computer networks
Computer networksComputer networks
Computer networks
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Unit III
Unit IIIUnit III
Unit III
 
Assignment 1
Assignment 1  Assignment 1
Assignment 1
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Nat presentation

  • 1. The Story of: @%#^& - Q? - A!
  • 3. Private and Public IPs No private on the internet! Private Computers wants . They can’t go with their private IPs!!! What is the problem?!
  • 4. Get public IPs … Well, give me money to buy them. And I would need new Network cards for them. Are we PRIVATE anymore!?!?! Gateways! Inspiring! If there is a service in the internet somewhere, a public service, does it care who I am that much?! I GOT IT! Let’s buy one more computer! Ideas!?
  • 5. The Idea is to put a computer between our private network and the internet. When ever one host in the private zone wants to talk with any host in the internet (upload/download), it asks this computer for doing It. This device is the only one seen from the internet. We will call this device a NATDevice. The delegate!
  • 6. NAT stands for Network Address Translation. Translation of address is changing them according to rules. Tow Levels of NAT: Network layer: translates IP (Basic NAT) Transport & Network layer: IP + Port (TCP/UDP) Referred to as PAT (Port Address Translation) or NAPT. Translation in two directions: SNAT: Translate source address. DNAT: Translate destination address. NAT: features and definitions
  • 7. Scenario One (Browsing) In this scenario computer A tries to open a webpage on a server through the internet.
  • 8. Hasan in the Cafiteria! (Port Forwarding) This is the scenario where I am in the cafeteria trying to take of my torrents …  !
  • 9.
  • 10.
  • 11. Static DNATing for inbound connections. Example: Vuze local connection end-point. Too many outbound connections and we run out of ports in the NAT. E.g. Inconsistent HTTP requests while browsing. NAT table entries with no activity are droped. Some protocols like FTP has got problems!!! Drawbacks: