Advertisement
Guest User

Untitled

a guest
Dec 8th, 2014
152
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 42.83 KB | None | 0 0
  1. Week 1
  2. IP Address
  3. IPv4 (32 bit), IPv6 (128 bit)
  4. Static (entered manually)
  5. DHCP (dynamic)
  6. Ipconfig to find your address
  7. College only uses IPv4
  8. 169 is invalid IP, it is merely placeholder while unable to find a real one
  9. Network Models
  10. OSI Model
  11. Ideal
  12. 7. Application
  13. PDU: Data
  14. Defines rules (protocols) for applications to use the web
  15. Some Protocols include:
  16. HTTP, DNS, DHCP
  17. 6. Presentation
  18. Common representation of data to enable devices to communicate
  19. Some protocols include
  20. MPEG, QuickTime, JPEG
  21. 5. Session
  22. Organize dialogue and manage data exchanges
  23. 4. Transport
  24. PDU: Segment
  25. IP Address + Port Number = socket
  26. Takes apart and reassembles data segments
  27. Some protocols include
  28. TCP
  29. UDP
  30. 3. Network
  31. PDU: Packet
  32. IP address to exchange individual pieces of data over the network between identified end addresses
  33. Some protocols include
  34. IPv4, IPv6, IPX, Appletalk, ICMP
  35. Router is a layer 3 device
  36. 2. Data Link
  37. PDU: Frame
  38. Addressing is MAC address (physical)
  39. It exchanges data frames between end devices over common media
  40. Switches are a layer 2 device
  41. Some protocols include
  42. Ethernet, Token Ring, Wireless, Frame Relay
  43. 1. Physical
  44. PDU: Bit
  45. Transmission over the medium (copper, fibre, air waves)
  46. Repeater and hubs are layer 1 devices
  47. Cables
  48. UTP, STP, CAT5, etc
  49. Signalling, voltages, bandwidth
  50. TCP/IP Model
  51. What is actually implemented
  52. 4. Application
  53. 3. Transport
  54. 2. Internet
  55. 1. Internet Access
  56. OSI TCP/IP
  57. Application Application
  58. Presentation
  59. Session
  60. Transport Transport
  61. Network Internet
  62. Datalink Network Access
  63. Physical
  64.  
  65. Protocols
  66. Pre-established rules to communicate properly
  67. Technology independent  they don’t care what technology they run through
  68. Each application has its own protocol
  69. Application layer (data)
  70. http, https, smtp, ftp, pop, dns, dhcp, VoIP
  71. Transport Layer (segments)
  72. TCP, UDP
  73. Internet Layer (packets)
  74. IPv4, IPv6, ICMP
  75. Network Access Layer (frames)
  76. Ethernet (LAN), PPP, Frame Relay (WAN), ARP
  77. Standards
  78. IETF
  79. Anything that is software tends to be these guys
  80. Layers 7 through 3 of OSI model
  81. IEEE
  82. Anything that is electrical tends to be these guys
  83. Addressing
  84. Layer 4 (transport layer – end devices)
  85. Port numbers for delivery to correct application.
  86. Layer 3 (Network Layer – routers)
  87. IP addresses for delivery of a message to the correct network
  88. IP addresses have the network and device address
  89. Layer 2 (Data Link Layer – switches)
  90. MAC address for delivery of a message to correct device within the same network
  91. Week 2
  92. Circuit Switched Networks
  93. Reserve dedicated channel for entire communication
  94. Think old telephone lines
  95. Inefficient use of resources and are not fault tolerant
  96. Packet Switched Networks
  97. No dedicated channel, it is all virtual
  98. Communications get broken into small pieces of data (segmented)
  99. Each packet goes through a different route over the network to be reassembled at destination
  100. Seeks most efficient route over network
  101. In TCP can retransmit dropped packets
  102. It multiplexes (breaks up and orders data across medium to be sent out )
  103. Four Key characteristics of A Network
  104. Fault Tolerance
  105. If cable or communication breaks another piece of hardware can replace it on the fly
  106. Scalable
  107. Can add more users, put more traffic, and expand without having to rebuild
  108. Quality of Service
  109. Guarantees certain levels of service
  110. Can buffer messages when network is congested
  111. Identify specific services to prioritize communication
  112. Security (CIA)
  113. Confidentiality
  114. Information is only revealed to intended source
  115. Integrity
  116. Data arrives as is
  117. Availability
  118. Service must be available so must have alternate routes set up
  119. Logical versus Physical topography
  120. Physical
  121. Location of equipment, wires, end devices
  122. Logical
  123. Represent different information, how computers are connected, the networks they belong to
  124. Network Types
  125. LAN
  126. Network infrastructure that provides access to users
  127. Usually managed/owned by one organization
  128. High speed access
  129. WAN
  130. Network that provides access to other networks across far distances
  131. Third parties usually involved
  132. Connects LANs at slower speeds
  133. Home Network
  134. Switch
  135. Portion of router
  136. Access point (for wireless signal)
  137. Router
  138. Switch
  139. DHCP server
  140. Provisions IP addresses
  141. NAT
  142. Associates your IP with a public IP as well as port numbers
  143.  
  144. Translates private addresses to public
  145. Only internet IP is known to outside networks all private sockets are hidden
  146. Routers maps these connections keeping track of which port is associated with internal and external same with IPs
  147.  
  148. Nested infrastructures
  149. Internet
  150. Worldwide collection of interconnected networks
  151. Extranet
  152. Computer network that allows controlled access to specific authorized users
  153. Intranet
  154. Often used for private connection of LANs and WANs
  155. Usually employees or tied to the organization somehow
  156. Encapsulation/De-encapsulation
  157. Encapsulation
  158. Process of preparing data for sending
  159. Adds layer specific header/addressing information
  160. Each layer of the TCP/IP model has its own specific addressing information
  161. Data  Segment  Packet  Frame  Bit
  162. Think KFC
  163. Chicken (data)  pieces cut up (segment)  the bucket (packet)  the plate (packet)  frame (on your fork)  bit (chewed off bit in your mouth that’s totally finger licking good)
  164. De-encapsulation
  165. Process received data
  166. Each layer examines the specific tag and passes up to next layer
  167. Original data is reassembled
  168. TCP/IP Protocols
  169. Segmentation of messages into small pieces
  170. Reassembly of messages at the destination
  171. Connection establishment and tear down for TCP communication
  172. Flow control for TCP communication
  173. Lab 2
  174. Simplex
  175. Communication over network that is one-way only
  176. Example: broadcast radio
  177. Half-Duplex
  178. Two-way communication but must take turns
  179. Example: Walkie talkie
  180. Full-Duplex
  181. Full two-way communication
  182. Example: Modern Ethernet
  183. Framing
  184. Taking a piece of information from the upper layer and encapsulating it with layer specific information
  185. Protocols
  186. Pre-established rules that govern communication
  187. Point-to-point connection
  188. Communication between two nodes and endpoints (two end devices)
  189. Point-to-multipoint connection
  190. Communication between one node to many
  191. Attenuation
  192. The farther you are from the source the more noise on the line
  193.  
  194. Lab 3
  195. Cables
  196. Straight-through cables
  197. Use for switch to router
  198. Computer to switch
  199. Computer to hub
  200. Crossover cable
  201. Switch to switch
  202. Switch to hub
  203. Hub to hub
  204. Router to router
  205. How to get to network settings
  206. Start  Run  ncpa.cpl
  207. Wireshark
  208. Capture  Options  choose interface
  209. Top Pane
  210. Packet list
  211. Middle pane
  212. Packet Details
  213. Lower Pane
  214. Packet bytes
  215. ICMP
  216. Ping format
  217. Type,
  218. In the code it goes from 1 to 16 from echo reply to information reply
  219. code
  220. from 1 to 12 and says what happened
  221. from net unreachable to destination host unreachable for type of service
  222. checksum
  223. Eagle Server
  224. Virtual machine running as a server
  225. Eagle server to router
  226. Straight through
  227. Router to router
  228. Cross over
  229.  
  230. Week 3
  231. Layer 1. Physical Layer
  232. Terminology
  233. Analog Signal
  234. Continuous, no breaks or interruptions
  235. Digital Signal
  236. Not continuous but more approximations pending on the bit value representing them
  237. ASCII
  238. American Standard code for Information Interchange
  239. Can only have a maximum of 256 different values
  240. UTF-8
  241. Replaced it as it is now the multilingual standard
  242. Bit (b)
  243. Basic unit of information it is a 0 or 1
  244. Byte (B)
  245. Also known as an octet
  246. It is the most common unit of code
  247. Digital Transmission
  248. Physical transfer of data over point-to-point or point-to-multipoint communication
  249. Cooper, optical, or wireless transmission
  250. The message is represented via a sequence of pulses representing a 0 or 1
  251. Modulation
  252. Process of varying one or more properties of periodic waveforms
  253. Takes an analog waveform and finds a way to digitize and convey it to another source
  254. There are several ways in doing this
  255. PSK (phase-shift keying)
  256. Digital modulation that changes the phase of a reference signal (carrier wave)
  257. I have no idea
  258. FSK (frequency-shift keying)
  259. Frequency modulation is encoding information by varying the frequency of the wave
  260. ASK (amplitude-shift keying)
  261. Varying the strength of the carrier in proportion to the waveform being sent
  262. QAM (quadrature amplitude modulation)
  263. Combines two shift keys
  264. Line code
  265. Digital baseband is a code chosen within baseband transmission
  266. Ethernet uses linecode
  267. Carrier Signal
  268. Carrier is a waveform that is modulated with an input signal to convey information
  269. Carrier is to transmit information through space
  270. it is much higher in frequency than the input signal
  271. input signal (what you want to transmit) + carrier (type of transmission) = modulated signal (signal sent modulated over media)
  272. Keying
  273. Modulation forms where modulating signal takes one of a specific number of values at all times
  274. Modem
  275. Modulator-demodulator
  276. Modulates signals to encode digital information and demodulates signals to decode to transmitted information
  277. Bit rate (b/s)
  278. Bits over a unit of time
  279. Symbol rate (baud rate – Bb/s)
  280. Number of symbol changes made to the transmission medium per second using digitally modulated signal or line code
  281. Symbol is measured in “baud”
  282. L = 2n (symbol is 2 to the power of n (bits per symbol)
  283. So a baud rate of 8 would have three bits (0,0,0 has 8 possible values)
  284. Baud is essentially the possible amount of changes in value
  285. Baseband
  286. Signalling processing baseband are transmitted without modulation
  287. No shift in range of frequencies of the signal
  288. This is LAN (local area network). Doesn’t need modulation since it isn’t worrying so much about attenuation
  289. Digital baseband transmission
  290. Line coding
  291. Aims to transfer a digital bit stream
  292. Broadband
  293. Wide bandwidth data transmitted over multiple signals and traffic types simultaneously
  294. Can do so over different “channels”
  295. Payload
  296. The cargo that you want to transmit
  297. Bandwidth
  298. The capacity of a medium to carry data. This is the raw data in ideal situations
  299. Throughput
  300. Measure of the transfer of bits across the media over a given amount of time
  301. This takes into account traffic and distance
  302. Goodput
  303. Measure of usable data transferred over given time
  304. Takes into account all the application processing, encapsulation, etc
  305. Compression
  306. Lossy
  307. Inexact approximations of data
  308. Used to reduce time data takes to send and assemble
  309. Lossless
  310. Perfectly reconstructed in exactly the manner it was de-assembled
  311. Synchronization
  312. Devices must be able to accurately interpret 0s and 1s so there’s two ways of sending the clock to synchronize
  313. Asynchronous
  314. Two clocks
  315. Synchronous
  316. One clock
  317. Clock is embedded with data
  318. Manchester
  319. Return to Zero
  320. 4B5B
  321. Data Rate Limits
  322. Shannon capacity C
  323. Bit Rate = C = B*log2¬(1 + SNR)
  324. Nyquist bit rate
  325. Bit Rate = 2*B*log2L
  326. Physical Layer Tasks
  327. Takes frame from Data Link Layer
  328. Sees the frames as bits, not structure
  329. Represents bits as signals and sends them to the media
  330. Encoding and Signalling
  331. NRZ (Never return to zero)
  332. Very simple 1 is high, 0 is low
  333. Voltage does not return to zero
  334. Problems
  335. Long string of 0s or 1s can cause sync errors
  336. Problems with interference
  337. Manchester
  338. Voltage changes in the middle of each bit period
  339. Rising means 1, falling means 0
  340. Change between period is ignored
  341. The transition matters, not the voltage
  342. Not efficient for higher speeds
  343. Fast Ethernet
  344. 100BaseT
  345. Coding 4B5B
  346. Bits are grouped then coded
  347. 4 bit to 5 bit
  348. Each possible 4 bit pattern as its own code
  349. Extra bits for error transmission or start/end transmissions
  350. Coaxial Cable
  351. Central conductor  insulation  copper braid  shield  outer jacket
  352. Think TV cable
  353. Pros
  354. High frequency radio/video signals
  355. Used for antennas and cable TV
  356. Formally used in Ethernet LAN but UTP was cheaper and more efficient
  357. UTP Cable
  358. Unshielded Twisted Pair
  359. 8 wires twisted together into 4 pairs with an outer jacket
  360. Commonly used for Ethernet LANs
  361. RJ45 Connectors is what is usually used for Ethernet
  362. Straight through
  363. Connect devices of different types
  364. Crossover
  365. Connect devices of same type
  366. STP (Shielded Twisted Pair
  367. Wires are shielded against noise
  368. Much more expensive than UTP
  369. Used for 10Gbps Ethernet
  370. Copper
  371. Signals are affected by
  372. Attenuation
  373. Signals lose strength as it travels
  374. Noise
  375. Electrical signals on copper
  376. Electromagnetic (EMI)
  377. Radio Frequency
  378. Crosstalk (from other wires)
  379. Mitigating noise
  380. Metal shielding around cables
  381. Twisting pair of wires cancels effects
  382. Avoid areas of problem
  383. Careful termination
  384. Incorrect installation
  385. Could become lightning rod for noise
  386. Incorrect termination
  387. UTP length
  388. Cannot exceed 100M in total length
  389. Permeant cable cannot exceed 90m
  390. Gives 10m for patch cables at work area
  391. Fibre Optic
  392. Uses light signals for 1s and 0s
  393. Two technologies
  394. Single Mode
  395. More expensive
  396. Uses laser for transmitting
  397. Convert light to electricity
  398. Up to 100KMs
  399. Multimode
  400. Less expensive
  401. Uses LED
  402. Convert light to electricity
  403. Few KM distance
  404. No RFI/EMI noise problems
  405. Full duplex requires two fibre strands
  406. Wireless
  407. Electromagnetic signals at radio and microwave fervencies
  408. No cost of installing cables
  409. Hosts free to move around
  410.  
  411. Lab 4
  412. Ethernet
  413. Most common LAN technology
  414. Different media
  415. Copper cable, optical fibre
  416. Ethernet Frame
  417. Frame Header
  418. Preamble Start of frame delimiter Destination Address Source Address Length Packet Data Frame Check sequence
  419. Timing and Start Addresses Layer 3 protocol Packet Check and stop
  420. Packet Trailer
  421. Error Detection Frame Stop
  422.  
  423.  
  424. Frame Fields
  425. Preamble
  426. Wake up call
  427. Help synchronization and show where frame starts
  428. Destination
  429. MAC address of destination
  430. Source
  431. MAC address of sender
  432. Length/type
  433. Length of packet
  434. Type
  435. 0800 IPv4
  436. 0806 ARP
  437. 86DD IPv6
  438. Data
  439. Layer 3 protocol data unit (usually IP)
  440. If packet is less than 46 bytes padding is applied
  441. Trailer
  442. FCS, CRC information for corrupt frames
  443.  
  444. Ethernet
  445. MAC address is unique to every NIC
  446. Burned into ROM but copied into RAM
  447. First three bytes identify the manufacturer
  448. Organizational Unique Identifier (OIC)
  449. This is the physical address per se
  450. Switch reads destination MAC to forward the frame
  451. It is 12 hex digits
  452. MAC is 48 bits
  453. Unicast, Multicast, broadcast
  454. Unicast
  455. Message for one particular host
  456. Broad cast
  457. 255. All hosts on a network
  458. Multicast
  459. For a group of devices
  460. Address Resolution Protocol (ARP)
  461. Allows a device to discover the MAC addresses on the same-subnet
  462. ARP requests do not pass the router
  463.  
  464. Week 4
  465. Layer 2
  466. At each hop a new media dependent frame is created while the original packet is unchanged
  467. A hop is on each router
  468. The PDU is frame
  469. Most widely used Layer 2 Standard – Ethernet
  470. Layer 2 is about delivery of messages between devices connected to the same network segment
  471. Its primary function is to move messages throughout the network to their intended destination using the MAC addresses
  472. Media
  473. Copper, fibre, wireless
  474. Deals with MAC addresses
  475. Switch is a layer 2 device
  476. Forward frames only to destination
  477. Minimize connections and give more bandwidth
  478. Every port has its own bandwidth (every port is its own collision domain)
  479. Hub is a layer 1 device
  480. Receives a bit and retransmit the frame to all outgoing ports
  481. One collision domain
  482. Wireless access point is a layer 2 device
  483. Bridge is a layer 2 device
  484. Layer 2 Services
  485. Links upper layers (Network and Transport) to Physical media
  486. Logical link control (LLC)
  487. Sets up the frame header and trailer to encapsulate the packet
  488. Controls the hardware at Physical layer
  489. Marking the start and end of a message
  490. Detecting and sometimes corrects errors in transmission
  491. Media Access control (MAC)
  492. adds layer 2 devices, marks frame start and end
  493. process of controlling when nodes (end devices) can transmit on physical media
  494. layer 2 supports logical topologies
  495. Network Topography
  496. Logical (Data Link)
  497. Represent how data link layer sees other devices
  498. Physical
  499. Represents how devices are physically inter-connected
  500. Point-to-point
  501. End device  network  end device
  502. Multi-Access
  503. A data-bus (think Christmas lights) with nodes connecting to it
  504. Contention based (collisions)
  505. Controlled (high overhead)
  506. Ring
  507. A ring of nodes connected to one another
  508. Protocol and standards
  509. IEE (for all)
  510. 802.2 Logical Link Control
  511. 802.3 Ethernet (probably key to remember)
  512. 802.5 Token Ring
  513. 802.11 Wi-Fi (probably key to remember
  514. Media Independence
  515. Data Link layer handles the media on behalf of the Upper Layers
  516. It is what bridges hardware and software
  517. Multi-Access Topology
  518. Contention Based (collisions)
  519. No control at all would cause frames to be corrupted due to collisions
  520. Examples
  521. Ethernet
  522. Trailer is the frame check sequence
  523. CRC is cyclic redundancy check
  524. Foot print of frame
  525. First thing device does is that it verifies CRC
  526. If matches there was no corruption
  527. Wireless
  528. Controlled (high overhead)
  529. Must use ways to prevent collisions
  530. Examples
  531. Token Ring, FDDI
  532. The Frame
  533. For Ethernet: See Lab 4
  534. Wi-Fi Frame
  535. Preamble PLCP Header MPDU (Mac PDU)
  536. Frame Control Duration ID Add 1 Add 2 Add 3 Sequence control Add 4 Frame Body FCS
  537. Add = address
  538. LAN wireless protocol
  539. Fragile environment
  540. A lot of collisions
  541. Every transmission needs to be acknowledged
  542. Un acknowledged frames are retransmitted
  543. Lots of control mechanisms in frame
  544. CSMA/CD
  545. Host does not know about the line being in use
  546. Many collisions are the result of delays as it takes time for signals to travel
  547. If there is no carrier it will send but doesn’t know the frame is on the wire
  548. Used only for Ethernet
  549. Smallest legal byte size on frame is 64
  550. Anything less will be dropped thinking it was merely a fragment from collisions
  551. Listens before transmitting
  552. If signal is detected it will wait and return to listen
  553. If no signal is detected it will transmit then listen for collisions
  554. This is a backoff algorithm
  555. CS
  556. Carrier sense
  557. Listen to see if signals are on cable
  558. MA
  559. Multiple access
  560. Hosts share same cable
  561. CD
  562. Collision detection
  563. Collision domain
  564. Hub
  565. is essentially “one wire” so every interface of a hub is considered one collision domain
  566. Forwards frames through all ports except incoming
  567. Switch
  568. Every port on a switch is its own collision domain
  569. Forwards frames only to the destination once address is known
  570. A switch has five functions
  571. Selective forwarding
  572. Through its switching table
  573. Builds addresses with MAC and IPs
  574. Learning
  575. Learns addresses as they become known
  576. Flooding
  577. Sends addresses out every port if it doesn’t know destination
  578. Aging
  579. Deletes addresses not in use over a time
  580. Filtering
  581. When knows address will only use that address
  582. When addresses are set as “only allowed” it will only take info from those addresses (all addresses are MAC )
  583. Router
  584. A router is essentially a layer 3 switch and each output is a new network therefore new collision domain
  585. CRC
  586. Is calculated at each device
  587. Once per hub
  588. Twice per router
  589. Lab 6
  590. IP
  591. Internet protocol
  592. ICMP
  593. Ping
  594. TTL
  595. Time-to-live
  596. For the IP packet it is a number
  597. TTL decrements at each hop (router)
  598. When it hits zero packet is dropped
  599. Prevents indefinite forwarding
  600. Router
  601. Sole purpose is to pass traffic from one network to another
  602. Connects two networks together
  603. Four types of routing protocols
  604. Dynamic
  605. Learns on the fly
  606. Static
  607. Never changes
  608. Default
  609. Default gateway
  610. If no addresses are known will send traffic out this route
  611. Directly Connected
  612. Wired to router
  613. Arp cache
  614. MAC to IP
  615.  
  616. Week 7
  617. Layer 3 Network / Internet Layer
  618. Layer 3 Role
  619. Provide addressing scheme to identify networks/individual hosts
  620. Encapsulate segment from layer 4 into a packet
  621. Direct packets through the network
  622. De-encapsulate and give it to layer 4
  623. Layer 3 protocols
  624. IPv4
  625. Most common
  626. IPv6
  627. Successor of IPv4
  628. ICMP (ping)
  629. IP characteristics
  630. Designed with low overhead for speed
  631. Connectionless (does not wait for acknowledgement)
  632. Best effort (similar to UDP)
  633. Independent of media
  634. Layer 3 Encapsulation
  635. Segment is encapsulated with IP header and trailer
  636. Packing routing
  637. Responsible for sending to other routers
  638. Iv4 Header Fields
  639. Byte 1 Byte 2 Byte 3 Byte4
  640. Version IHL Type of Service Packet Length
  641. Identification Flag Fragment Offset
  642. Time to Live Protocol Header Checksum
  643. Source Address
  644. Destination Address
  645. Options Padding
  646. IPv4 Header Fields
  647. Source and destination IP which is 32 bit
  648. Destination address
  649. Time to live
  650. Protocol
  651. Which protocol is being used
  652. Quality of Service
  653. Prioritizes traffic
  654. Header Checksum
  655. Checking to see if the header has been corrupted
  656. Flag
  657. Only used in exceptional cases for error detection
  658. Version
  659. IPv4 or IPv6
  660. Header length
  661. Packet length
  662. Including the header
  663. Splitting up networks
  664. Too large to manage efficiency so break it up
  665. Too much broadcast traffic causes congestion
  666. Too many addresses for switch to remember
  667. Lack of security
  668. Splitting up the networks – how?
  669. Geographically
  670. Different sites
  671. Purpose
  672. What software is shared between organizations
  673. Ownership
  674. Different companies or departments on their own server
  675. IPv4 Address Anatomy
  676. Hierarchical addresses
  677. 32 bits
  678. 4 octets
  679. Written in decimal format
  680. Network part is the host
  681. Prefix mask says how many bits represent network
  682. Length of network can vary
  683. Anatomy of a Subnet Mask
  684. Subnet mask
  685. 32 bits
  686. 1s indicate network bits
  687. 0s indicate host bits
  688. Mask is always from left to right
  689. Default Gateway
  690. Each PC is configured with an IP address and default gateway
  691. Router default gateway is the IP address of a router port on the same network as the PC
  692. Router’s job to handle messages to other networks
  693. Hops
  694. Packet may pass through many routers on its journey
  695. Each router is a hop
  696. Routing Table
  697. Each router has its own routing table that has the known networks
  698. Router looks at the IP address of a packet then decides which network address it is on
  699. If it knows the address it sends it
  700. If it doesn’t know the address it sends to default gateway
  701. If it doesn’t have a default gateway then it doesn’t send the packet merely drops it
  702. Directly connected sources show up as C
  703. Statically configured is shown as S
  704. Default configured by admin is S*
  705. Learned from another router using RIP is R
  706. Routing Process
  707. De-encapsulates the frame
  708. Extracts destination IP from the packet
  709. Performs look up of routing table
  710. Static Routes Dynamic Routes
  711. Entered by Administrator Learned from other routers
  712. Time consuming, different for each router Start the protocol (DHCP) and it runs by itself
  713. Must be updated if routes change Automatically updates itself
  714. Little processing More processing
  715. No bandwidth is used Uses bandwidth
  716. Gives nothing away Gives away information
  717.  
  718. IPv6
  719. IPv4 issues
  720. Depletion
  721. Lack of end to end connectivity
  722. Internet routing table expansion
  723. Fix
  724. Increased address space
  725. Improved packet handling
  726. Elimination need for NAT
  727. Integrated security
  728. IPv6 Packet
  729. Version Traffic Class Flow Label
  730. Payload Length Next Header Hop Limit
  731. Source IP Address
  732. Destination IP Address
  733.  
  734. IPv6 Improvements
  735. Improvements over IPv4 header
  736. Better routing efficiency and performance
  737. No requirements for processing checksums
  738. Simplified
  739. Flow label field as per-flow processing to let routers know to send as is
  740. IPv6 Fields
  741. Header Fields
  742. Version
  743. IPv6 (0110)
  744. Traffic Class
  745. It is used for congestion control. Essentially priority
  746. Flow Label
  747. Real time applications to send router information to forward as is without storing
  748. Payload Length
  749. How big the packet is
  750. Next Header
  751. Indicates the data type of the payload is carrying
  752. Public Address
  753. Modified IPv4 blocked out a couple of addresses to use over the internet
  754. Cannot send packets that have a source or destination IP with a private address
  755.  
  756. Lab 7
  757. A subnet mask with /24 is the same as a subnet mask as 255.255.255.0 which is the same as 11111111111111111111111100000000 (32 network bits, 8 host bits)
  758. IPv4 Addressing Conversion
  759. 32 bit IPv4 binary to dotted decimal
  760. 0.0.0.0
  761. Three different types of addresses
  762. Network Address
  763. Address that is the network statement
  764. All addresses within the same network share this address
  765. Host Addresses
  766. All addresses assigned to the host in the network
  767. Broadcast address
  768. Sends to all hosts within the network
  769. Calculations
  770. Network address
  771. All host bits are 0s
  772. Broadcast
  773. All host bits are 1s
  774. Host address
  775. Network +1 to broadcast -1
  776. Number of hosts in network = 2 32-n=h-2
  777. Perform calculations for 192.168.15.100/24
  778. Network address (all host bits are 0)
  779. 192.168.15.0
  780. Broadcast address (all host bits are 1s)
  781. 192.168.15.255
  782. Host range
  783. 192.168.15.1 to 192.168.15.254
  784. Perform calculations for 172.16.10.254/16
  785. Host address
  786. Network + 1 to broadcast -1
  787. 2 32-16=16-2
  788. 192.168.1.100/25 to binary
  789. 11000000.10101000.00000001.00000000
  790. 192.168.1.128 is the network address
  791. Because the last 00000000 becomes 10000000
  792. Range becomes 192.168.1.129 to 192.168.1.254
  793. Basic Subnetting
  794. Allows creating multiple networks from a single address block to maximize address efficiency
  795. Every borrowed bit becomes a set of subnets 2b
  796. Subnet masks
  797. Masks Number of hosts Host bits
  798. 255.255.255.0 254 hosts 8
  799. 255.255.255.128 126 hosts 7
  800. 255.255.255.192 62 hosts 6
  801. 255.255.255.224 30 hosts 5
  802. 255.255.255.240 14 hosts 4
  803. 255.255.255.248 6 hosts 3
  804. 255.255.255.252 3 hosts 2
  805. Network address will always be an even number
  806. First host is always an odd number
  807. Last usable address always an even number
  808. Max you can have is /30 because after that it is too few digits
  809. To calculate quickly the next subnet you just add the amount of the next 1
  810. So for a /25 subnet it ends at 191 as its broadcast address
  811. So for a /25 you merely add 64 (the value of the next bit) to get the next subnet, and so on
  812. /27 would have 8 subnets (0, 32, 64, 96, 128, 160, 192, 224
  813. 192.168.0.64/27 (11000000.10101000.00000000.010 00000)
  814. First usable is .65 (11000000.10101000.00000000.010 00001)
  815. Last usable is .94 (11000000.10101000.00000000.010 11110)
  816. Broadcast is .95 (11000000.10101000.00000000.010 11111)
  817. 256
  818. /25 /26 /27 /28 /29 /30 /31 /32
  819. Network Size 128 64 32 16 8 4 2 1
  820. .128 .192 .224 .240 .248 .252 .254 .255
  821. Subnets 2 4 8 16 32 64
  822.  
  823. Special addresses
  824. Network and broadcast
  825. First and last address of any network
  826. Default route
  827. All zeros. It is a catch all
  828. Loop back
  829. 127.0.0.1/8
  830. Talks to yourself
  831. Testing
  832. Link Local
  833. 169.254.0.0/16
  834. Test-NET
  835. 192.0.2.0/24
  836. Teaching and learning
  837. IPv4 Addressing
  838. Classful Legacy
  839. Class A, B, C, D
  840. CIDR/Classless
  841. Method of allocating addresses via subnetting
  842. NAT (Network Address Translation)
  843. Allows hosts on private network to “borrow” public address for communicating with outside networks
  844. NAT translate source IP/source port in layer 3 and 4 PDU and maps it in its table
  845. Communication Types
  846. Unicast
  847. One to one
  848. HTTP, HTTPS
  849. Broadcast
  850. One to all of same network
  851. ARP
  852. Directed
  853. To network broadcast address
  854. Multicast
  855. One to many networks
  856. SSDP, IPTV
  857. Tracert
  858. Traceroute is a computer network diagnostics tool for displaying route path and measuring delays
  859. IPv4 and IPv6 Coexistance
  860. Dual-Stack
  861. Tunnelling
  862. Translation
  863. IPv6 Address Anatomy
  864. 128 bit
  865. Written in hextets xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
  866. IPv6 Prefix Length
  867. Used to indicate network portion
  868. IPv6 Representation
  869. Rule1: omit all leading 0s
  870. Rule2: Omit all zero segments (::)
  871. IPv6 Address Types
  872. Unicast
  873. Uniquely identifies an interface of an IPv6 address
  874. Global Unicast
  875. Similar to IPv4 public
  876. Global unicast are 001 or 2000::/3
  877. 2001:0DB8::/32 isfor documentation only
  878. Link Local
  879. Used to communicate with other devices on same link
  880. Link == subnet == network segment
  881. Fe80::/10 is for link-local only
  882. Loopback
  883. Used by host to send packet to itself
  884. ::1/128
  885. Unspecified Address
  886. ::/128
  887. Cannot be assigned
  888. Used only as source address when it doesn’t matter to the destination
  889. Unique Local
  890. Similar to IPv4 private
  891. FC00:/7 to FDFF::/7
  892. IPv4 Embedded
  893. Help transition from IPv4 to IPv6
  894. Multicast
  895. Used to send a single packet to multiple destinations
  896. Only seen as destination address
  897. FF00::/8
  898. Assigned Multicast
  899. Reserved for predefined group of devices
  900. FF02::1 all-node multicast group
  901. All IPv6 enabled devices join this group
  902. FF02::2 all-routers multicast group
  903. Solicited node multicast
  904. FF02::1 to FF::/104
  905. Anycast
  906. Any unicast address that can be assigned to multiple devices
  907. Stateless DHCP  determines interface ID by EUI-64
  908. Stateful DHCP  interface ID assigned by DHCPv6
  909. % special identifier and is known as a zone index
  910. Broadcast Domain
  911. MAC FF:FF:FF:FF:FF
  912. Router is the endpoint of the broadcast domain
  913. Router divides networks into broadcast domains
  914. AC Intranet Private
  915. Private network is your personal IP
  916. Internet is the public IP
  917. NAT translates all this
  918. A SRC
  919. 10.70.172.22
  920. Port 1026 DST
  921. 79.125.225.143
  922. Port 80 SRC
  923. 205.211.150.161
  924. 1026
  925.  
  926. Week 9
  927. 802.11
  928. More commonly known as WiFi
  929. Operates at Physical layer MAC sublayer
  930. CSMA/CA
  931. Operates like a hub
  932. Shares the same features as a hub
  933. All nodes connected to access point in same collision domain
  934. Frame Control Field
  935. Protocol version Type Subtype To DS From DS More Fragments Retry Power Management More Data WEP Order
  936. BSS Identfier (BSSID)
  937. Uniquely identifies each beacon
  938. Destination Address
  939. Indicates the MAC address of the final destination to receive the frame
  940. Source Address
  941. Indicates the mac address of the original source that created and transmitted the frame
  942. Receiver Address
  943. Indicates the MAC address of the next immediate station (STA) on wireless medium to receive frame
  944. Transmitter Address
  945. Indicates MAC address of the station that transmitted the frame onto the wireless medium
  946. Two forms of WiFi
  947. Ad-hoc mode
  948. Client to client (peer to peer)
  949. No central Wireless Access point
  950. Know as independent Basic Service Set (IBSS)
  951. Infrastructure mode
  952. Consist of at least one wireless client (station) and one wireless access point (AP)
  953. The AP is a bridge to the wired LAN or other wireless STA
  954. Extended Service Set (ESS)
  955. Enterprise level (like Algonquin)
  956. Set of two or more wireless access points connected to the same wired network that shares the same logical network segment and SSID
  957. Basic Service Set (BSS)
  958. Single AP
  959. Small office home office
  960. Terminology
  961. SSID
  962. Service set identifier is the name of the network
  963. It is the name displayed by the Beacon to let networks know its existence
  964. Beacon
  965. Transmitted by an AP ten times per second
  966. Advertises existence of AP on particular channel(s)
  967. Access Point (AP)
  968. Layer 2 device that acts as the bride between wireless clients and wired network
  969. Bridge
  970. Network layer 2 device that interconnects two dissimilar network types together using the LLC sublayer
  971. Station (STA)
  972. Is a device that has the capability to use 802.11 protocol
  973. Could be a laptop, desktop, etc
  974. Distribution System (DS)
  975. Wireless disruption system is enabling the wireless interconnection of access points
  976. Allows networks to expand without wired backbone
  977. Collision Avoidance
  978. Wireless device employ this by signalling reediness to transmit data
  979. Wait to be acknowledged by central controller (AP) before transmitting
  980. When acknowledged it will send
  981. When it sends it transmits jamming signal to allow its own free air space
  982. If it detects collision it will fall to wait for a random time
  983. Standards
  984. 802.11a
  985. 5GHz max of 54Mb/s
  986. Smaller coverage area but less interference
  987. 802.11b
  988. 2.4GHz max of 11Mb/s
  989. Longer range but more interference
  990. 802.11g
  991. 2.4GHz max of 54Mb/s
  992. Longer range but more interference
  993. Operates of frequency range of b but with bandwidth of a
  994. 802.11n
  995. 2.4GHz or 5GHz max of 100Mb/s to 600Mb/s
  996. Backwards compatible with a, b, g
  997. 801.11ac
  998. Simultaneous 2.4GHz and 5GHz max of 450Bm/s to 1.3Gb/s
  999. Backwards combatable with a, g, b, n
  1000. 802.11ad
  1001. 2.4GHz, 5GHz, 60GHz max of 7Gb/s
  1002. 2.4GHz
  1003. Most used frequency
  1004. Divided between 11 overlapping channels (3 non overlapping at most)
  1005. 1, 6, 11
  1006. 5GHz
  1007. 23 non overlapping channels
  1008. 1 channel is 54MB/s and have to occupy 5 to 6 channels
  1009. Dual-Band AP
  1010. Operate in both 2.4GHz and 5GHz band
  1011. Mixed Mode AP
  1012. Supports different 802.11 versions
  1013. Degradation of throughput though since it is sending both 2.4GHz and 5GHz at once
  1014. Basic Setup/Security
  1015. Authentication
  1016. PSK
  1017. Pre-shared key
  1018. Vulnerable to password cracking
  1019. PSK is personal
  1020. EAP
  1021. Enterprise authentication server
  1022. Encryption
  1023. WEP
  1024. Wired equivalent privacy
  1025. Vulnerable and has been cracked
  1026. WPA
  1027. WiFi Protected Access
  1028. Vulnerable and used TKIP
  1029. WPA2
  1030. WiFi Protected Access II
  1031. Replaced WPA
  1032. Used AES encryption which is approved by the department of defence
  1033. Basic security
  1034. Change router’s password
  1035. Change SSID
  1036. Turn on security  WPA2-PSK using AES encryption
  1037. MAC filtering
  1038. WiFi Protected Setup
  1039. WPS network security allows users to easily secure home network without accessing router’s configuration screens or know passphrase
  1040. Week 10
  1041. Layer 4 Transport Layer (segment)
  1042. Defines three general functions
  1043. Segmentation
  1044. Breaking conversations into small pieces
  1045. Reassembly at receiving end
  1046. Multiplexing
  1047. Interleaving the small pieces into shared network
  1048. Identification of segment to be reassembled in correct order
  1049. Error checking
  1050. Made sure that data integrity has been kept
  1051. Some functions the layer 4 transport layers help facilitate
  1052. Email
  1053. Messaging
  1054. Web surfing
  1055. Download
  1056. Layer 4 protocols provide
  1057. Connection-oriented conversations
  1058. Reliable delivery
  1059. Ordered data reconstruction
  1060. Flow control
  1061. Two most common layer 4 protocols
  1062. UDP (non reliable) 8 bytes
  1063. User datagram protocol
  1064. Connectionless
  1065. Best effort
  1066. Low overhead
  1067. Only implements the basic functions
  1068. TCP (reliable) 20 bytes
  1069. Transmission Control Protocol
  1070. Connection oriented
  1071. Guaranteed delivery
  1072. High overhead
  1073. Implement the advanced functions
  1074. Application Port Numbers
  1075. Protocol Purpose Port TCP/UDP
  1076. HTTP Web browsing 80 TCP
  1077. HTTPS Secure Web Browsing 443 TCP
  1078. DNS Reaching dns server to translate IP to English for instance changing the www.google.com to the IP address 53 both
  1079. SMTP Sending email 25 TCP
  1080. Pop3 Receiving email 110 TCP
  1081. telnet Unsecure version of ssh 23 TCP
  1082. FTP File transferring. Operates with two posts. One to send commands, and one to transfer data 21/20 TCP
  1083. DHCP/DHCPv6 Configures the IP addressing in both IPv4 or IPv6 67/68 UDP
  1084. Source and Destination Port
  1085. The destination port is the port of the user that is randomly chosen after the well known ports
  1086. Well known ports are between 0-1023
  1087. Client Server
  1088. Source Destination
  1089. 4456 80
  1090. |Source | destination | data |
  1091. 4456|80|DATA
  1092. |destination|source|data
  1093. 80|4456|data
  1094. TCP/UDP Headers
  1095. TCP segment
  1096. Source port, destination port
  1097. Sequence number
  1098. Acknowledgment number
  1099. Header length, reserved, code bits window
  1100. Checksum urgent
  1101. Options, if any
  1102. Application layer data
  1103. UDP
  1104. Source and destination port
  1105. Length, check sum
  1106. Application layer data
  1107.  
  1108. TCP Protocol Overview
  1109. Implements advanced functions to ensure reliable and guaranteed end to end delivery
  1110. Establishing a Session
  1111. Ensures the application is ready to receive the data
  1112. Same order delivery
  1113. Ensures that the segments are reassembled into the proper order
  1114. Reliable delivery
  1115. Means lost segments are resent so the data is received complete
  1116. Flow control
  1117. Manages data delivery if there is congestion on the host
  1118. Reliability
  1119. TCP connection establishment (SYN)
  1120. TCP segment reassembly
  1121. TCP Acknowledgment and Windowing
  1122. TCP Retransmission
  1123. TCP Congestion control
  1124. Connection teardown (FIN)
  1125. TCP Connection Establishment
  1126. Three-Way Handshake (two channels)
  1127. Send SYN
  1128. Send SYN, ACK
  1129. ACK
  1130. Client
  1131. Selects a source port
  1132. Determines initial sequence number
  1133. Determines destination port and IP (socket)
  1134. Sends segment to server (remote host) with “SYN” flag set
  1135. Server (remote host)
  1136. Determines it’s initial sequence number
  1137. Sends segment to “client” with “SYN” and “ACK” flag set
  1138. Client
  1139. Sends segment to Server with ACK flag set
  1140. Segment Reassembly
  1141. TCP Sequence Number
  1142. TCP Segment ACk and Window Size
  1143. TCP Acknowledgment Number
  1144. Window size determines the number of bytes sent before an acknowledgment is expected
  1145. Acknowledgement number is the number of the next expected byte
  1146. TCP Retransmission
  1147. If ACK is not received in time out period then segment is retransmitted
  1148. Role of sender to track ACKs and retransmit unACK segments
  1149. If this keeps happening window size may be smaller
  1150. TCP ACK and Windowing Summary
  1151. Sequence number is assigned to each byte
  1152. Sender waits for positive acknowledgment of receipt
  1153. If ACK is not received in time out period then segment(s) are retransmitted
  1154. Receiver buffers data and passes it in correct order to application
  1155. ACKs are piggybacked on return transmissions
  1156. TCP Connection Tear-down
  1157. FIN-ACK
  1158. Receive FIN+ACK send FIN+ACK
  1159. FIN + ACK
  1160. Send ACK
  1161. Receive ACK
  1162. Netstat
  1163. Demonstration of netstat
  1164. Netstat –boa
  1165. Gives process identification and sockets that each application is using
  1166. Proto Local Address Foreign Address State PID
  1167. The protocol used. The program that wants access The :## is the port number. This is the address it is bound to. This is where you listen from The computer connected to when it is sent. This is what will reply to you Listening it is a server, established it is connected Corresponds with the task manager. It is the process ID
  1168. TCP 0.0.0.0:80 HouleASUS LISTENING 2524
  1169. TCP [AppleMobileDeviceService.exe 127.0.0.1 : 27015 www:49159 ESTABLISHED 1852
  1170. TCP [Skype.exe] 10.70.197.193: 59718 157.56.116.200: 1350 ESTABLISHED 2524
  1171.  
  1172. Week 10
  1173. Application
  1174. Provide the data
  1175. Application layer
  1176. Prepared the data over the network
  1177. Application Layer Protocols
  1178. Hypertext Transfer Protocol (HTTP)
  1179. Transfer files that make up webpages
  1180. Secure HTTP (HTTPS)
  1181. Secure transmission
  1182. Post Office Protocol (POP)
  1183. Inbound mail delivery
  1184. Simple Mail Transfer Protocol (SMTP)
  1185. Outbound mail delivery
  1186. Domain Name Service (DNS)
  1187. Server friendly name to IP and vice versa
  1188. Dynamic Host Configuration Protocol (DHCP)
  1189. Enables devices on network to obtain an IP address
  1190. Telnet
  1191. Provide remote access (command line) to servers and networking devices
  1192. File Transfer Protocol (FTP)
  1193. Interactive file transfers between systems
  1194. Server Message Block (SMB)
  1195. File sharing adopted by Microsoft
  1196. Gnutella
  1197. P2P
  1198.  
  1199. Applications
  1200. Provide users with way to create the data
  1201. Email, web browsers, file sharing, word, excel, skype
  1202. Application layer services
  1203. Provides interface to the network
  1204. Prepares the data according to protocol specific steps
  1205. Application protocols
  1206. Define the type and syntax of messages
  1207. Define meaning of any informational fields
  1208. Defines the request formats and expected responses
  1209.  
  1210. WWW Services and HTTP
  1211. When user types in an URL it is actually using three different commands
  1212. HTTP
  1213. Protocol
  1214. www.cisco.com
  1215. Server name
  1216. Web-server.htm
  1217. Specific file name requested
  1218. HTTP
  1219. Specifies a request/response
  1220. GET
  1221. Request for data
  1222. POST and PUT
  1223. Send messages to upload to the server
  1224. Server Response Status Code
  1225. 1xx: Informational
  1226. Request received, continuing process
  1227. 2xx: success
  1228. Action was received, understood, accepted
  1229. 3xx: Redirection
  1230. Further action must be taken to complete request
  1231. 4xx: client error
  1232. Request contains bad syntax cannot be fulfilled
  1233. 5xx: Server error
  1234. Server failed to fulfill apparently valid request
  1235.  
  1236. Application Types
  1237. Client/Server (Master/Slave) Applications
  1238. Describes relationship between two computer programs
  1239. One makes the request of the other program while the other is subservient to the other’s said request
  1240. Centralized dedicated servers
  1241. Repositories of information
  1242. Runs processes that listen to and service requests
  1243. P2P Application
  1244. Peer-to-peer communications in a model of same capabilities that either can initiate communication
  1245. Decentralized non dedicated
  1246. Desktops used as client
  1247. DNS Protocol
  1248. Domain name service
  1249. DNS is a client/server service but a little different in that the DNS client runs as a service itself
  1250. Supports name resolution for network applications that need it
  1251. nslookup in commandline
  1252. server provides name resolution using name daemon
  1253. looks in its own records for name to IP address table, if it can’t find it will send a request
  1254. ipconfig /displaydns will show cached dns entries
  1255. Hierarchical system
  1256.  
  1257. Top level domains
  1258. .ca, .jp (representing contries )
  1259. .com for commercial
  1260. .org for organization
  1261. Secondary level domains
  1262. All companies registered to the address
  1263. Google would be the secondary domain to the first level .com
  1264.  
  1265. Email uses both PoP and SMTP
  1266. PoP is used to receive email
  1267. Receive, fetch, read
  1268. Will launch USER, ASS, RETR, QUIT
  1269. SMTP used to transfer mail
  1270. Used to send mail
  1271. If the mail is local it will delivery to the site
  1272. If it is not local SMTP server will seek to find the server (rogers, gmail, Hotmail, etc) and do a DNS lookup to find it
  1273.  
  1274. FTP
  1275. Port 21 is the command/control port
  1276. Takes the commands to upload or download
  1277. Port 20 is the data port
  1278. To transfer the data
  1279. FTP is not firewall friendly
  1280. By default FTP is in active mode
  1281. Different port different socket the port will attempt to talk to you
  1282. Firewall blocks it since the active mode by default unless you create a rule to allow it
  1283. Best to configure FTP to passive mode
  1284. Sends a request from file rather than FTP server
  1285. Since it originates from inside the firewall it’s safe
  1286.  
  1287. Security
  1288. The Tenets of Security
  1289. Confidentiality
  1290. Integrity
  1291. Availability
  1292. Definitions
  1293. Asset
  1294. What we are trying to protect
  1295. Vulnerability
  1296. Weakness or flaw
  1297. Threat
  1298. What we are trying to protect against (exploits)
  1299. Security controls
  1300. Safeguards to avoid, counteract, minimize security risks
  1301. Risk
  1302. Potential for loss, damage, destruction
  1303. Vulnerabilities and mitigating them
  1304. Security program
  1305. Policies
  1306. IT security
  1307. Management controls
  1308. Technical safeguards
  1309. Operational safeguards
  1310. Physical security
  1311. Don’t let random people with USB keys access information
  1312. Awareness/Training
  1313. Security Screening
  1314. Network Device Security Measures
  1315. Physical Security
  1316. Protects against
  1317. Hardware threats
  1318. Environmental threats
  1319. Electrical threats
  1320. Maintenance threats
  1321. Limit damage to equipment
  1322. Lock up equipment and prevent unauthorized access
  1323. Monitor and control entry with electronic logs
  1324. Use security camera
  1325. Network Threats
  1326. Malicious code
  1327. Virus
  1328. Software used to infect a computer
  1329. Buried in an existing program
  1330. When program is executed virus code is activated and copies itself to other programs
  1331. Worm
  1332. Does not require host program
  1333. Enters a computer through vulnerability in system and takes advantage of file-transport or information-transport features on systems
  1334. Trojan horse
  1335. Reconnaissance attacks
  1336. Unauthorized discovery and mapping of systems, services, vulnerabilities
  1337. Access attacks
  1338. Unauthorized manipulation of data, system access, user privileges
  1339. Denial of service
  1340. Disabling or corruption of networks, systems, services
  1341. Social engineering
  1342. Firewalls
  1343. Types
  1344. Packet filtering
  1345. Prevents or allows access based on IP or MAC address
  1346. Application filtering
  1347. Prevents or allows access by specifying application types on port numbers
  1348. URL filtering
  1349. Prevents or allows access to websites based upon URLs or keywords
  1350. Stateful packet inspection
  1351. Incoming packets must be legitimate responses to requests from internal hosts
  1352. Unsolicited packets are blocked unless permitted specifically
  1353. Encryption
  1354. Symmetric
  1355. Confidentiality
  1356. AES, 3DES, Blowfish
  1357. Asymmetric (Public-key cryptography)
  1358. authentication
  1359. Digital signature algorithm
  1360. Hash
  1361. Integrity
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement