ccna exploration1 chapter 6: addressing the network · pdf fileccna exploration1 chapter 6:...
Post on 06-Mar-2018
232 Views
Preview:
TRANSCRIPT
1© 2004, Cisco Systems, Inc. All rights reserved.
CCNA Exploration1 Chapter 6:Addressing the Network – IPv4
LOCAL CISCO ACADEMY ELSYS TUINSTRUCTOR: STELA STEFANOVA
PDF created with pdfFactory Pro trial version www.pdffactory.com
222© 2004, Cisco Systems, Inc. All rights reserved.
Objectives• Explain the structure IP addressing and demonstrate the
ability to convert between 8-bit binary and decimal numbers;
• Given an IPv4 address, classify by type and describe how it is used in the network;
• Explain how addresses are assigned to networks by ISPs and within networks by administrators;
• Determine the network portion of the host address and explain the role of the subnet mask in dividing networks;
• Given IPv4 addressing information and design criteria, calculate the appropriate addressing components;
• Use common testing utilities to verify and test networkconnectivity and operational status of the IP protocol stack on a host.
PDF created with pdfFactory Pro trial version www.pdffactory.com
333© 2004, Cisco Systems, Inc. All rights reserved.
IP Addressing StructureDotted decimal structure of a binary IP address
PDF created with pdfFactory Pro trial version www.pdffactory.com
444© 2004, Cisco Systems, Inc. All rights reserved.
IP Addressing StructureOctet• a byte of the binary patterns representing IPv4 addresses;Dotted Decimal• binary patterns representing IPv4 addresses are expressed as dotted decimals by separating each octet, with a dot;Example:• address 10101100000100000000010000010100 is expressed in dotted decimal as: 172.16.4.20Network Address• for each IPv4 address, some portion of the high-order bits; • at Layer 3, we define a network as a group of hosts that have identical bit patterns in the network address portion of their addresses. Host Portion• a variable number of bits of the 32 bits IPv4 address that determines the number of hosts within the network.
PDF created with pdfFactory Pro trial version www.pdffactory.com
555© 2004, Cisco Systems, Inc. All rights reserved.
IP Addressing Structure8-bit binary in network addressing and conversion of 8-bit binary to decimal
PDF created with pdfFactory Pro trial version www.pdffactory.com
666© 2004, Cisco Systems, Inc. All rights reserved.
Positional notation
Positional notation• means that a digit represents different values
depending on the position it occupies;• the value that a digit represents is that value
multiplied by the power of the base, or radix, represented by the position the digit occupies.
Positional notation in the base 10 number system
• Example: 245 represents: 245 = (2 * 10^2) + (4 * 10^1) + (5 * 10^0) or245 = (2 * 100) + (4 * 10) + (5 * 1)
PDF created with pdfFactory Pro trial version www.pdffactory.com
777© 2004, Cisco Systems, Inc. All rights reserved.
Binary Numbering SystemBinary Numbering System• radix is 2;• each position represents increasing powers of 2;• in 8-bit binary numbers, the positions represent these quantities:
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0128 64 32 16 8 4 2 1
• the base 2 numbering system only has two digits: 0 and 1;• a 1 in each position means that we add the value for that position
to the total;• there is a 1 in each position of an octet. The total is 255.
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255• a 0 in each position indicates that the value for that position is
not added to the total;• a 0 in every position yields a total of 0.
0.128 + 0.64 + 0.32 + 0.16 + 0.8 + 0.4 + 0.2 + 0.1 = 0
PDF created with pdfFactory Pro trial version www.pdffactory.com
888© 2004, Cisco Systems, Inc. All rights reserved.
Binary to Decimal ConversionConverting 8-bit binary to decimal
PDF created with pdfFactory Pro trial version www.pdffactory.com
999© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Binary to Dotted Decimal Notation
Steps:• Divide the 32
bits into 4 octets;
• Convert each octet todecimal;
• Add a "dot" between each decimal.
Converting 8-bit binary to decimal
PDF created with pdfFactory Pro trial version www.pdffactory.com
101010© 2004, Cisco Systems, Inc. All rights reserved.
Binary to Decimal Conversion Activity
Convert the given binary number shown in bit field to a decimal value
PDF created with pdfFactory Pro trial version www.pdffactory.com
111111© 2004, Cisco Systems, Inc. All rights reserved.
Decimal to binary conversionDecimal to 8-bit binary conversion
PDF created with pdfFactory Pro trial version www.pdffactory.com
121212© 2004, Cisco Systems, Inc. All rights reserved.
Decimal to binary conversions
172.16.4.20
PDF created with pdfFactory Pro trial version www.pdffactory.com
131313© 2004, Cisco Systems, Inc. All rights reserved.
Decimal to binary conversions
172.16.4.20
PDF created with pdfFactory Pro trial version www.pdffactory.com
141414© 2004, Cisco Systems, Inc. All rights reserved.
Decimal to binary conversions
172.16.4.20
PDF created with pdfFactory Pro trial version www.pdffactory.com
151515© 2004, Cisco Systems, Inc. All rights reserved.
Decimal to binary conversions
Converting decimal to 8-bit binary
PDF created with pdfFactory Pro trial version www.pdffactory.com
161616© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Address Types
Types of addresses:
• Network address
• Broadcast address
• Host address
PDF created with pdfFactory Pro trial version www.pdffactory.com
171717© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Address Types
Network address• is a standard way to refer to a network;• within the IPv4 address range of a network, the lowest address is reserved for the network address;• has a 0 for each host bit in the host portion of the address.Prefix length• is the number of bits in the address that gives the network portion;For example:• in 172.16.4.0 /24, - the /24 is the prefix length -the first 24 bits are the network address.
PDF created with pdfFactory Pro trial version www.pdffactory.com
181818© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Address TypesSubnet mask• consists of 32 bits;• uses 1s and 0s to indicate which bits of the address are network bits and which bits are hosts bitsBroadcast address• a special address for each network that allows communication to all the hosts in that network;• uses the highest address in the network range.Host address• every end device requires a unique address to deliver a packet to that host;• in IPv4 addresses - assign the values between thenetwork address and the broadcast address to the devices in that network.
PDF created with pdfFactory Pro trial version www.pdffactory.com
191919© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Address Types
PDF created with pdfFactory Pro trial version www.pdffactory.com
202020© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Network AddressNetwork address - the address used to refer to the network
PDF created with pdfFactory Pro trial version www.pdffactory.com
212121© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Broadcast AddressBroadcast address - a special address used to send data to all hosts in the network
PDF created with pdfFactory Pro trial version www.pdffactory.com
222222© 2004, Cisco Systems, Inc. All rights reserved.
Host Address
Host Address - every end device requires a unique address
PDF created with pdfFactory Pro trial version www.pdffactory.com
232323© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Address Types
24 bits network address prefix
PDF created with pdfFactory Pro trial version www.pdffactory.com
242424© 2004, Cisco Systems, Inc. All rights reserved.
IPv4 Address Types
27 bits network address prefix
PDF created with pdfFactory Pro trial version www.pdffactory.com
252525© 2004, Cisco Systems, Inc. All rights reserved.
Calculating the IPv4 Address TypesCalculating network, broadcast
and host addresses
PDF created with pdfFactory Pro trial version www.pdffactory.com
262626© 2004, Cisco Systems, Inc. All rights reserved.
Classify and Define IPv4 AddressesDetermine the network, broadcast and host addresses for a given address and prefix combination
PDF created with pdfFactory Pro trial version www.pdffactory.com
272727© 2004, Cisco Systems, Inc. All rights reserved.
Type of Communications – Unicast, Broadcast, Milticast
Types of communication in the Network Layer:
• Unicast - the process of sending a packet from one host to an individual host
• Broadcast - the process of sending a packet from one host to all hosts in the network
• Multicast - the process of sending a packet from one host to a selected group of hosts
PDF created with pdfFactory Pro trial version www.pdffactory.com
282828© 2004, Cisco Systems, Inc. All rights reserved.
Type of Communications – Unicast, Broadcast, Milticast
Unicast communication
• the process of sending a packet from one host to an individual host
• is used for the normal host-to-hostcommunication in both a client/server and a peer-to-peer network;
Unicast packets
• use the host address of the destinationdevice as the destination address;
• can be routed through an internetwork.
PDF created with pdfFactory Pro trial version www.pdffactory.com
292929© 2004, Cisco Systems, Inc. All rights reserved.
Type of Communications – Unicast, Broadcast, Milticast
Broadcast transmission• is used to send packets to all hosts in the network, a packet uses a special broadcast address;• is used for the location of special services/devices for which the address is not known or when a host needs to provide information to all the hosts on the network;Examples for broadcast transmission:
- Mapping upper layer addresses to lower layer addresses;- Requesting an address;- Exchanging routing information by routing protocols.
Query• when a host needs information, the host sends a request, to the broadcast address;• received and processed by all hosts in the network; • one or more of the hosts with the requested information will respond, typically using unicast.
PDF created with pdfFactory Pro trial version www.pdffactory.com
303030© 2004, Cisco Systems, Inc. All rights reserved.
Type of Communications – Unicast, Broadcast, MilticastBroadcast packets• are usually restricted to the local network;• the restriction is dependent on the configuration of the router that borders the network and the type of broadcast;Types of broadcasts - directed and limited broadcasts.Directed broadcast• is sent to all hosts on a specific network.• is useful for sending a broadcast to all hosts on a non-local network;• For example: for a host outside of the network to communicate with the hosts within the 172.16.4.0 /24 network, the destination address of the packet would be 172.16.4.255.Limited broadcast• is used for communication that is limited to the hosts on the local network;• destination IPv4 broadcast address 255.255.255.255;• do not forwarded by the router.
PDF created with pdfFactory Pro trial version www.pdffactory.com
313131© 2004, Cisco Systems, Inc. All rights reserved.
Type of Communications – Unicast, Broadcast, Milticast
Multicast Transmission• is designed to conserve the bandwidth of the IPv4 network;• reduces traffic by allowing a host to send a single packet to a selected set of hosts. Examples of multicast transmission:
- Video and audio broadcasts;- Routing information exchange by routing protocols;- Distribution of software;- News feeds.
Multicast Clients• hosts that wish to receive particular multicast data;• use services initiated by a client program to subscribe to themulticast group. Multicast group• is represented by a single IPv4 multicast destination address;• IPv4 has set aside a special block of addresses from 224.0.0.0 to 239.255.255.255 for multicast groups addressing.
PDF created with pdfFactory Pro trial version www.pdffactory.com
323232© 2004, Cisco Systems, Inc. All rights reserved.
Type of Communications – Unicast, Broadcast, Milticast
PDF created with pdfFactory Pro trial version www.pdffactory.com
333333© 2004, Cisco Systems, Inc. All rights reserved.
Reserved IPv4 Address rangesExperimental Addresses• reserved for special purposes;• IPv4 experimental address range 240.0.0.0 to 255.255.255.254;• are listed as reserved for future use RFC 3330;• could be converted to usable addresses;• cannot be used in IPv4 networks;• used for research or experimentation. Multicast Addresses• reserved for special purposes;• IPv4 multicast address range 224.0.0.0 to 239.255.255.255;• different types of multicast addresses:
- reserved link local addresses;- globally scoped addresses;- administratively scoped addresses (limited scope addresses).
PDF created with pdfFactory Pro trial version www.pdffactory.com
343434© 2004, Cisco Systems, Inc. All rights reserved.
Reserved IPv4 Address rangesReserved link local addresses• IPv4 multicast addresses 224.0.0.0 to 224.0.0.255;• are to be used for multicast groups on a local network;• Packets to these destinations are always transmitted with a
time-to-live (TTL) value of 1 and a router connected to the local network should never forward them;
• used in routing protocols using multicast transmission to exchange routing information.
Globally scoped addresses• are 224.0.1.0 to 238.255.255.255;• used to multicast data across the Internet;• For example, 224.0.1.1 has been reserved for Network Time
Protocol (NTP) to synchronize the time-of-day clocks of network devices.
Host Addresses• address range of 0.0.0.0 to 223.255.255.255;• used for IPv4 hosts;
PDF created with pdfFactory Pro trial version www.pdffactory.com
353535© 2004, Cisco Systems, Inc. All rights reserved.
Reserved IPv4 Address ranges
Reserved IPv4 Address ranges
PDF created with pdfFactory Pro trial version www.pdffactory.com
363636© 2004, Cisco Systems, Inc. All rights reserved.
Public Address and Private Address
Public address• vast majority of the addresses in the IPv4 unicast
host range;• are assigned by InterNIC;• are designed to be used in the hosts that are
publicly accessible from the Internet;Private Addresses• blocks of addresses that are used in networks
that require limited or no Internet access.Private address blocks:• 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)• 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)• 192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)
PDF created with pdfFactory Pro trial version www.pdffactory.com
373737© 2004, Cisco Systems, Inc. All rights reserved.
Public Address and Private AddressPrivate Addresses• need not be unique among outside networks;• hosts that do not require access to the Internet;• many hosts in different networks may use the same private
space addresses;• the router or firewall device at the perimeter of these private
networks must block or translate these addresses. Network Address Translation (NAT)• services to translate private addresses to public addresses;• hosts on a privately addressed network can have access to
resources across the Internet;• can be implemented on a device at the edge of the private
network;• allows the hosts in the network to "borrow" a public
address for communicating to outside networks;
PDF created with pdfFactory Pro trial version www.pdffactory.com
383838© 2004, Cisco Systems, Inc. All rights reserved.
Public Address and Private AddressPrivate address
PDF created with pdfFactory Pro trial version www.pdffactory.com
393939© 2004, Cisco Systems, Inc. All rights reserved.
Public Address and Private Address
Determine a public and private IPv4 Addresses
PDF created with pdfFactory Pro trial version www.pdffactory.com
404040© 2004, Cisco Systems, Inc. All rights reserved.
Special IPv4 AddressesNetwork and Broadcast Addresses• first and last addresses cannot be assigned to hosts;• first address - network address; last address - broadcast address.Default Route• IPv4 default route as 0.0.0.0;• is used as a "catch all" route when a more specific route is not
available;• reserved address block 0.0.0.0 - 0.255.255.255 (0.0.0.0 /8).Loopback• IPv4 loopback address 127.0.0.1;• hosts use to direct traffic to themselves;• creates a shortcut method for TCP/IP applications and services that
run on the same device to communicate with one another;• can be ping to test the configuration of TCP/IP on the local host.• addresses 127.0.0.0 to 127.255.255.255 are reserved.
PDF created with pdfFactory Pro trial version www.pdffactory.com
414141© 2004, Cisco Systems, Inc. All rights reserved.
Special IPv4 AddressesLink-Local Addresses• address block 169.254.0.0 to 169.254.255.255 (169.254.0.0 /16);• can be automatically assigned to the local host by the
operating system in environments where no IP configuration is available;
• used in a small peer-to-peer network or for a host that could not automatically obtain an address from a Dynamic Host Configuration Protocol (DHCP) server.
TEST-NET Addresses• address block 192.0.2.0 to 192.0.2.255 (192.0.2.0 /24);• is set aside for teaching and learning purposes;• can be used in documentation and network examples;• network devices will accept these addresses in their
configurations;• used with the domain names example.com or example.net in
RFCs, vendor, and protocol documentation;• should not appear on the Internet.
PDF created with pdfFactory Pro trial version www.pdffactory.com
424242© 2004, Cisco Systems, Inc. All rights reserved.
Special IPv4 AddressesSpecial reserved IPv4 addresses
PDF created with pdfFactory Pro trial version www.pdffactory.com
434343© 2004, Cisco Systems, Inc. All rights reserved.
Classes of IPv4 Addresses
Class A Blocks• designed to support extremely large networks
with more than 16 million host addresses;• use a fixed /8 prefix with the first octet to
indicate the network address;• remaining three octets were used for host
addresses; • required that the most significant bit of the
high-order octet be a zero;• there were only 128 possible class A
networks;• address block - 0.0.0.0 /8 to 127.0.0.0 /8;
PDF created with pdfFactory Pro trial version www.pdffactory.com
444444© 2004, Cisco Systems, Inc. All rights reserved.
Classes of IPv4 Addresses
Class B Blocks• designed to support the needs of moderate to
large size networks with more than 65,000 hosts; • used the two high-order octets to indicate the
network address;• other two octets specified host addresses;• the most significant two bits of the high-order
octet were 10;• address block - 128.0.0.0 /16 to 191.255.0.0 /16;• slightly more efficient allocation of addresses
than class A;• equally divided 25% of the total IPv4 address
space among approximately 16,000 networks.
PDF created with pdfFactory Pro trial version www.pdffactory.com
454545© 2004, Cisco Systems, Inc. All rights reserved.
Classes of IPv4 AddressesClass C Blocks• the most commonly available of the historic address
classes;• intended to provide addresses for small networks
with a maximum of 254 hosts;• used a /24 prefix;• used only the last octet as host addresses;• three high-order octets used to indicate the network
address;• using a fixed value of 110 for the three most
significant bits of the high-order octet;• address block - 192.0.0.0 /16 to 223.255.255.0 /16;• occupied only 12.5% of the total IPv4 address space;• could provide addresses to 2 million networks.
PDF created with pdfFactory Pro trial version www.pdffactory.com
464646© 2004, Cisco Systems, Inc. All rights reserved.
Legacy IPv4 AddressesRFC 1700 grouped the unicast ranges into specific classes of the IPv4 addresses - class A, class B, and class C
classfuladdressing
PDF created with pdfFactory Pro trial version www.pdffactory.com
474747© 2004, Cisco Systems, Inc. All rights reserved.
Classes of IPv4 Addresses
Limits to the Class-based System• classful allocation of address space often
wasted many addresses, which exhausted the availability of IPv4 addresses;
• for example: a company that had a network with 260 hosts would need to be given a class B address with more than 65,000 addresses;
Classless Addressing• address blocks appropriate to the number of
hosts are assigned to companies or organizations without regard to the unicastclass.
PDF created with pdfFactory Pro trial version www.pdffactory.com
484848© 2004, Cisco Systems, Inc. All rights reserved.
Planning to Address the Network
Allocation of Network layer addresses inside the networks:• should be planned and documented for the purpose of:
- Preventing duplication of addresses;- Providing and controlling access;- Monitoring security and performance.
Preventing Duplication of Addresses• each host in an internetwork must have a uniqueaddress;• without the proper planning and documentation of these network allocations, we could easily assign an address to more than one host.
PDF created with pdfFactory Pro trial version www.pdffactory.com
494949© 2004, Cisco Systems, Inc. All rights reserved.
Planning to Address the Network
Providing and Controlling Access
• access to the resources can be controlled by the Layer 3 address;• if the addresses for these resources are not planned and documented, the security and accessibility of the devices are noteasily controlled;• For example, if a server has a random address assigned, blocking access to its address is difficult and clients may not be able to locate this resource.
PDF created with pdfFactory Pro trial version www.pdffactory.com
505050© 2004, Cisco Systems, Inc. All rights reserved.
Planning to Address the NetworkMonitoring Security and Performance • need to monitor the security and performance of the network hosts and the network as a whole;Assigning Addresses within a Network• hosts are associated with an IPv4 network by a common network portion of the address;Examples of different types of hosts:
• End devices for users• Servers and peripherals• Hosts that are accessible from the Internet• Intermediary devices
• each of these different device types should beallocated to a logical block of addresses within the address range of the network.
PDF created with pdfFactory Pro trial version www.pdffactory.com
515151© 2004, Cisco Systems, Inc. All rights reserved.
Private Addresses
Private Address
PDF created with pdfFactory Pro trial version www.pdffactory.com
525252© 2004, Cisco Systems, Inc. All rights reserved.
Public Addresses
Public Address
PDF created with pdfFactory Pro trial version www.pdffactory.com
535353© 2004, Cisco Systems, Inc. All rights reserved.
Static AddressesStatic Assignment of Addresses• the network administrator must manually configure the
network information for a host;• includes entering the host IP address, subnet mask, and
default gateway. Static addresses• are useful for printers, servers, and other networking
devices that need to be accessible to clients on the network;
• if hosts normally access a server at a particular IP address, it would cause problems if that address changed;
• can provide increased control of network resources;• can be time-consuming to enter the information on each
host. • it is necessary to maintain an accurate list of the IP
address assigned to each device;
PDF created with pdfFactory Pro trial version www.pdffactory.com
545454© 2004, Cisco Systems, Inc. All rights reserved.
Static Addresses
Static Assignment of Addresses
PDF created with pdfFactory Pro trial version www.pdffactory.com
555555© 2004, Cisco Systems, Inc. All rights reserved.
Dynamic AddressesDynamic Assignment of Addresses• using Dynamic Host Configuration Protocol (DHCP)DHCP• enables the automatic assignment of addressing information
such as IP address, subnet mask, default gateway, and other configuration information;
• is generally the preferred method of assigning IP addresses to hosts on large networks;
• reduces the burden on network support staff and virtually eliminates entry errors.
Configuration of the DHCP server• defined address pool to be assigned to the DHCP clients on a
network;• the address is not permanently assigned to a host but is only
"leased" for a period of time;• the address is returned to the pool for reuse, if the host is
powered down or taken off the network.
PDF created with pdfFactory Pro trial version www.pdffactory.com
565656© 2004, Cisco Systems, Inc. All rights reserved.
Dynamic Addresses
IPconfig /all command
PDF created with pdfFactory Pro trial version www.pdffactory.com
575757© 2004, Cisco Systems, Inc. All rights reserved.
Assigning Addresses to Other Devices
Addresses for Servers and Peripherals• any network resource (a server or a printer) should
have a static IPv4 address;• servers and peripherals are a concentration point for
network traffic;Addresses for Hosts that are accessible from Internet• In most internetworks, only a few devices are
accessible by hosts outside of the corporation;• are usually servers of some type;• the IPv4 addresses for these devices should be static;• servers accessible by the Internet, each of these must
have a public space address associated with it;
PDF created with pdfFactory Pro trial version www.pdffactory.com
585858© 2004, Cisco Systems, Inc. All rights reserved.
Assigning Addresses to Other DevicesAddresses for Intermediary DevicesIntermediary devices:• are assigned Layer 3 addresses either for the device
management or for their operation;• should have predictable addresses;• addresses are typically assigned manually;Hubs, switches, and wireless access points:
- do not require IPv4 addresses to operate as intermediary devices;- need to have assigned addresses - to access as hosts, to configure, monitor, or troubleshoot network operation.
Routers and Firewalls• have an IPv4 address assigned to each interface;• each interface is in a different network and serves as the
gateway for the hosts in that network;• typically, the router interface uses either the lowest or highest
address in the network.
PDF created with pdfFactory Pro trial version www.pdffactory.com
595959© 2004, Cisco Systems, Inc. All rights reserved.
Assigning Addresses to Other DevicesTypes of addresses that should be assigned to devices other than end user devices
PDF created with pdfFactory Pro trial version www.pdffactory.com
606060© 2004, Cisco Systems, Inc. All rights reserved.
Assigning AddressesInternet Assigned Numbers Authority (IANA) - http://www.iana.net• is the master holder of the IP addresses;• IP multicast addresses and the IPv6 addresses are obtained
directly from IANA;• all IPv4 address space was managed directly by the IANA;Regional Internet Registries (RIRs)• AfriNIC (African Network Information Centre) - Africa Region
http://www.afrinic.net• APNIC (Asia Pacific Network Information Centre) - Asia/Pacific
Region http://www.apnic.net• ARIN (American Registry for Internet Numbers) - North America
Region http://www.arin.net• LACNIC (Regional Latin-American and Caribbean IP Address
Registry) - Latin America and some Caribbean Islands http://www.lacnic.net
• RIPE NCC (Reseaux IP Europeans) - Europe, the Middle East, and Central Asia http://www.ripe.net
PDF created with pdfFactory Pro trial version www.pdffactory.com
616161© 2004, Cisco Systems, Inc. All rights reserved.
Assigning AddressesRegional Internet Registries (RIRs)
PDF created with pdfFactory Pro trial version www.pdffactory.com
626262© 2004, Cisco Systems, Inc. All rights reserved.
ISP TiersInternet Service Providers (ISPs)• generally supply a small number of usable IPv4 addresses(6 or 14) to their customers as a part of their services;• have their own set of internal data networks to manage Internet connectivity and to provide related services.ISP Services• DNS services, e-mail services, website. ISP Tiers• ISPs are designated by a hierarchy based on their level of connectivity to the Internet backbone;• each lower tier obtains connectivity to the backbone via a connection to a higher tier ISP;Tier 1 ISPs• at the top of the ISP hierarchy;• are large national or international ISPs that are directly connected to the Internet backbone;Customers of Tier 1 ISPs• are lower-tiered ISPs;• are large companies and organizations;
PDF created with pdfFactory Pro trial version www.pdffactory.com
636363© 2004, Cisco Systems, Inc. All rights reserved.
Tier 1 ISPsTier 1 ISPs• engineer highly reliable connections and services;• uses multiple connections to the Internet backbone to support reliability;• the primary advantages for Tier 1 ISP customers are reliability and speed;• the drawback for Tier 1 ISP customers is its high cost.
PDF created with pdfFactory Pro trial version www.pdffactory.com
646464© 2004, Cisco Systems, Inc. All rights reserved.
Tier 2 ISPsTier 2 ISPs• acquire their Internet service from Tier 1 ISPs;• generally focus on business customers.• offer more services than the other two tiers of ISPs;• the primary disadvantage is slower Internet access;• have lower reliability than Tier 1 ISPs.
PDF created with pdfFactory Pro trial version www.pdffactory.com
656565© 2004, Cisco Systems, Inc. All rights reserved.
Tier 3 ISPsTier 3 ISPs• purchase their Internet service from Tier 2 ISPs;• the focus is the retail and home markets in a specific locale;• Tier 3 customers primary need is connectivity and support;• are often good choices for small to medium size companies.
PDF created with pdfFactory Pro trial version www.pdffactory.com
666666© 2004, Cisco Systems, Inc. All rights reserved.
Internet Protocol (IPv6)IPv6 features:• creating expanded addressing capabilities;• improved packet handling;• increased scalability and longevity;• QoS mechanisms;• integrated security;IPv6 offers:• 128-bit hierarchical addressing - to expand addressing capabilities;• header format simplification - to improve packet handling;• improved support for extensions and options - for increased scalability/longevity and improved packet handling;• flow labeling capability - as QoS mechanisms• authentication and privacy capabilities - to integrate security.
PDF created with pdfFactory Pro trial version www.pdffactory.com
676767© 2004, Cisco Systems, Inc. All rights reserved.
Internet Protocol (IPv6)
IPv6
• New protocols at various layers of the stack have been developed to support this new protocol;
• there is a new messaging protocol (ICMPv6).
IPv6
• is not merely a new Layer 3 protocol;
• is a new protocol suite;
PDF created with pdfFactory Pro trial version www.pdffactory.com
686868© 2004, Cisco Systems, Inc. All rights reserved.
Subnet mask - Determine the network portion of the host address
Subnet mask• is used to create and specify the network and hostportions of an IP address;• a separate 32-bit pattern;• is express in the same dotted decimal format as the IPv4 address;• is created by placing a binary 1 in each bit position that represents the network portion and placing a binary 0 in each bit position that represents the host portion;• For example: host 172.16.4.35 /27:IP address 172.16.20.3510101100.00010000.00010100.00100011subnet mask 255.255.255.22411111111.11111111.11111111.11100000network address 172.16.20.3210101100.00010000.00010100.00100000
PDF created with pdfFactory Pro trial version www.pdffactory.com
696969© 2004, Cisco Systems, Inc. All rights reserved.
Subnet mask - Determine the network portion of the host address
Prefix and Subnet mask:• are different ways of representing the same thing -the network portion of an address
24 prefix is expressed as a subnet mask 255.255.255.0 (11111111.11111111.11111111.00000000).
PDF created with pdfFactory Pro trial version www.pdffactory.com
707070© 2004, Cisco Systems, Inc. All rights reserved.
Subnet Mask and ANDing ProcessSubnet mask and ANDing process to extract the network address from the IP address
Reasons to use ANDing
• Routers use ANDingto determine anacceptable route for an incoming packet;• An originating host must determine if a packet should be sent directly to a host in the local network or be directed to the gateway.
PDF created with pdfFactory Pro trial version www.pdffactory.com
717171© 2004, Cisco Systems, Inc. All rights reserved.
Subnet Mask and ANDing Process
PDF created with pdfFactory Pro trial version www.pdffactory.com
727272© 2004, Cisco Systems, Inc. All rights reserved.
Subnet Mask and ANDing Process
Steps in the ANDing of an IPv4 host address and subnet mask
PDF created with pdfFactory Pro trial version www.pdffactory.com
737373© 2004, Cisco Systems, Inc. All rights reserved.
Basic Subnetting
Subnetting
• allows for creating multiple logical networks from a single address block;• is create by using one or more of the host bits as network bits;• is done by extending the mask to borrowsome of the bits from the host portion of the address to create additional network bits;• more host bits used, the more subnets can be defined;
PDF created with pdfFactory Pro trial version www.pdffactory.com
747474© 2004, Cisco Systems, Inc. All rights reserved.
Basic Subnetting
Example 1:
Borrow one bit from the host portion
Number of subnets
2^1 = 2Number of hosts per subnet
2^7 - 2 = 126
PDF created with pdfFactory Pro trial version www.pdffactory.com
757575© 2004, Cisco Systems, Inc. All rights reserved.
Basic SubnettingCalculating number of subnets
number of subnets = 2^n where n = number of bits borrowed
Number of hosts per networknumber of hosts = 2^n – 2where n = the number of bits left for hosts
PDF created with pdfFactory Pro trial version www.pdffactory.com
767676© 2004, Cisco Systems, Inc. All rights reserved.
Basic SubnettingExample 2:
Borrow two bits from the host portion
Number of subnets
2^2 = 4Number of hosts per subnet
2^6 - 2 = 62
PDF created with pdfFactory Pro trial version www.pdffactory.com
777777© 2004, Cisco Systems, Inc. All rights reserved.
Basic Subnetting
Example 3:
Borrow three bits from the host portion
Number of subnets
2^3 = 8Number of hosts per subnet
2^5 - 2 = 30
PDF created with pdfFactory Pro trial version www.pdffactory.com
787878© 2004, Cisco Systems, Inc. All rights reserved.
Basic Subnetting
Example 3: Addressing Scheme
PDF created with pdfFactory Pro trial version www.pdffactory.com
797979© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting
STEP1. Determine the Total Number of Hosts
• consider the totalnumber of hostsrequired by the entire corporate internetwork
• must use a block of addresses that is largeenough to accommodate alldevices in all thecorporate networks(end user devices, servers, intermediate devices, and router interfaces).
PDF created with pdfFactory Pro trial version www.pdffactory.com
808080© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting
STEP2. Determine the Number and Size of the Networks• subnet the network to overcome issues with location, size,
and control;• in designing the addressing, the factors for grouping the
hosts must be considered :- Grouping based on common geographic location;- Grouping hosts used for specific purposes;- Grouping based on ownership.
• each WAN link is a network;• hosts in a common geographic location typically comprise a
single block of addresses - may need to subnet this block to form additional networks at each location;
• need to create subnetworks at the different locations that have hosts for common user needs;
• Need to have subnetworks for special hosts such as servers.
PDF created with pdfFactory Pro trial version www.pdffactory.com
818181© 2004, Cisco Systems, Inc. All rights reserved.
SubnettingSTEP2. Determine the Number and Size of the NetworksNetwork diagram• useful tool in the address planning process;• allows to see the networks and make a more accurate count.
PDF created with pdfFactory Pro trial version www.pdffactory.com
828282© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting
STEP3. Allocating AddressesProcess of Allocating Addresses:• begins by allocating network addresses for
locations of special networks;• starts with the locations that require the most
hosts and work down to the point-to-point links;• ensures that large enough blocks of addresses
are made available to accommodate the hosts and networks for these locations;
• plan carefully to ensure that the address blocks assigned to the subnet do not overlap.
PDF created with pdfFactory Pro trial version www.pdffactory.com
838383© 2004, Cisco Systems, Inc. All rights reserved.
SubnettingSTEP3. Allocating Addresses
Allocated blocks of addresses - four locations, WAN links.
PDF created with pdfFactory Pro trial version www.pdffactory.com
848484© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting
Spreadsheet
• helpful tool in the planning process;
• can place the addresses in columns to visualize the allocation of the addresses.
PDF created with pdfFactory Pro trial version www.pdffactory.com
858585© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a SubnetsSubnetting a subnets• the further division of the addresses; • the creation of new, smaller networks from a given
address block is done by extending the length of the prefix - adding 1s to the subnet mask;
• for each bit borrowed, we double the number of networks;
• For example:- use 1 bit - have the potential to divide that block into two smaller networks;- if 2 bits are borrowed - can provide for 4 unique patterns to represent networks 00, 01, 10, and 11;- 3 bits would allow 8 blocks.
PDF created with pdfFactory Pro trial version www.pdffactory.com
868686© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting the Subnets
Example:• divide the corporate HQ into two networks.
PDF created with pdfFactory Pro trial version www.pdffactory.com
878787© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Subnetting a subnets orVariable Length Subnet Mask (VLSM)
• designed to maximize addressing efficiency;
PDF created with pdfFactory Pro trial version www.pdffactory.com
888888© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Subnet requirement - 7 subnets:
• one for each of the four LANs;
one for each of the three WANs.
PDF created with pdfFactory Pro trial version www.pdffactory.com
898989© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Given IP address - 192.168.20.0• need to borrow 3 bits from the host bits in the last octet to
meet the subnet requirement of seven subnetsSubnet mask
- 255.255.255.224 is represented with the /27;- 11111111.11111111.11111111.11100000;
Number of hosts• five bits will allow up to 30 hosts per subnet;WAN Addresses• only two addresses are needed in each subnet for the WAN
links;• there are 28 unused addresses in each of the three WAN
subnets that have been locked into address these address blocks.
PDF created with pdfFactory Pro trial version www.pdffactory.com
909090© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Getting More Subnet for Less Hosts• Starting with the original subnets and gained additional,
smaller, subnets to use for the WAN links;• Creating smaller each subnet is able to support 2 hosts
leaves the original subnets free to be allotted to other devices and prevents many addresses from being wasted.
• to provide address blocks for the WANS with twoaddresses each, we will borrow three additional host bits to be used as network bits.
Address:• 192.168.20.192 - in Binary:
11000000.10101000.00010100.11000000Mask:• 255.255.255.252 - 30 Bits in binary:
11111111.11111111.11111111.11111100
PDF created with pdfFactory Pro trial version www.pdffactory.com
919191© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
PDF created with pdfFactory Pro trial version www.pdffactory.com
929292© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Scenario following requirements:• AtlantaHQ - 58 host addresses• PerthHQ - 26 host addresses• SydneyHQ - 10 host addresses• CorpusHQ - 10 host addresses• WAN links - 2 host addresses (each)
Given address block - 192.168.15.0 /24,
PDF created with pdfFactory Pro trial version www.pdffactory.com
939393© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a SubnetsInefficient subnetting
PDF created with pdfFactory Pro trial version www.pdffactory.com
949494© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Inefficient subnetting
PDF created with pdfFactory Pro trial version www.pdffactory.com
959595© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
AtlantaHQ LAN - 58 hosts• calculating a subnet from the original 192.168.15.0 /24block to accommodate the largest LAN;• required borrowing an additional 2 host bits, to use a /26bit mask.
192.168.15.0 would be subnetted:
Subnet 0: 192.168.15.0 /26 host address range 1 to 62
Subnet 1: 192.168.15.64 /26 host address range 65 to 126
Subnet 2: 192.168.15.128 /26 host address range 129 to 190
Subnet 3: 192.168.15.192 /26 host address range 193 to 254
PDF created with pdfFactory Pro trial version www.pdffactory.com
969696© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
PerthHQ LAN - 28 host addresses(including router interface)
• begin with next available address of 192.168.15.64to create an address block for this subnet;• by borrowing one more bit, we are able to meet the needs of PerthHQ while limiting the wasted addresses;• subnet mask: /27• subnetwork address : 192.168.15.64 /27• host address range: 65 to 94
PDF created with pdfFactory Pro trial version www.pdffactory.com
979797© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
SydneyHQ LAN and CorpusHQ LAN - 10 host addresses
• the subnetting requires us to borrow another bit, to extend the mask to /28;• starting with address 192.168.15.96, • address blocks:
Subnet 0: 192.168.15.96 /28host address range 97 to 110
Subnet 1: 192.168.15.112 /28host address range 113 to 126
• the blocks provide 14 addresses for the hosts and router interfaces on each LAN.
PDF created with pdfFactory Pro trial version www.pdffactory.com
989898© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a SubnetsWAN Links – 2 host addresses
• for point-to-point WAN links only two addresses are required;• borrow 2 more bits;• to use a /30 mask;• using the next available 192.168.15.128 addresses;• address blocks:
Subnet 0: 192.168.15.128 /30host address range 129 to 130
Subnet 1: 192.168.15.132 /30host address range 133 to 134
Subnet 2: 192.168.15.136 /30host address range 137 to 138
PDF created with pdfFactory Pro trial version www.pdffactory.com
999999© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
Using VLSM – more efficient
PDF created with pdfFactory Pro trial version www.pdffactory.com
100100100© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
PDF created with pdfFactory Pro trial version www.pdffactory.com
101101101© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a SubnetsVLSM Chart
PDF created with pdfFactory Pro trial version www.pdffactory.com
102102102© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
VLSM Chart
PDF created with pdfFactory Pro trial version www.pdffactory.com
103103103© 2004, Cisco Systems, Inc. All rights reserved.
Subnetting a Subnets
VLSM Chart
PDF created with pdfFactory Pro trial version www.pdffactory.com
104104104© 2004, Cisco Systems, Inc. All rights reserved.
Determining Network Addresses
PDF created with pdfFactory Pro trial version www.pdffactory.com
105105105© 2004, Cisco Systems, Inc. All rights reserved.
Calculating Number of Hosts
PDF created with pdfFactory Pro trial version www.pdffactory.com
106106106© 2004, Cisco Systems, Inc. All rights reserved.
Determining Valid Address for Hosts
PDF created with pdfFactory Pro trial version www.pdffactory.com
107107107© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Network Layer - Ping commandPing command• is a utility for testing IP connectivity between hosts;• sends out requests for responses from a specified host address;• uses a Layer 3 protocol that is a part on the TCP/IP suite called Internet Control Message Protocol (ICMP)• uses an ICMP Echo Request datagram.• If the host at the specified address receives the Echo request, it responds with an ICMP Echo Reply datagram;• measures the time required for the reply for each packet sent. • provides a display of the time between the ping being sent and the response received. This is a measure of the network performance;• has a timeout value for the response. If a response is not received within that timeout, ping gives up and provides a message indicating that a response was not received.• provides an output with the summary of the responses that includes the success rate and average round-trip time to the destination.
PDF created with pdfFactory Pro trial version www.pdffactory.com
108108108© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Local Stack - Ping Loopback
Pinging the Local Loopback
• testing the internal configuration of IP on the local host;• ping the special reserve address of local loopback127.0.0.1; • a response from127.0.0.1 indicates that IP is properly installed on the host;• the response comes from the Network layer.
PDF created with pdfFactory Pro trial version www.pdffactory.com
109109109© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Connectivity of Local LAN -Ping Gateway
Ping command• to verify that a local host can communicate with a gateway across a local area network
Ping to the gateway: • indicates that the host and the router's interfaceserving as that gateway are bothoperational on the local network
PDF created with pdfFactory Pro trial version www.pdffactory.com
110110110© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Connectivity of Remote LAN
Ping command• to verify that a local host can communicate via a gateway to a device in remote network
PDF created with pdfFactory Pro trial version www.pdffactory.com
111111111© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Path - Traceroute Command
Tracert /traceroute Command
• to observe the path between two devicesas they communicate;• generates a list of hops that were successfully reached along the path;• provides round trip time (RTT) for each hop along the path and indicates if a hop fails to respond;• makes use of a function of the Time to Live (TTL) field in the Layer 3 header and ICMP Time Exceeded Message.
PDF created with pdfFactory Pro trial version www.pdffactory.com
112112112© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Path - Traceroute CommandRound Trip Time (RTT)• is the time a packet takes to reach the remote host and for the
response from the host to return. An asterisk (*) is used to indicate a lost packet.
Time to Live (TTL)• Traceroute makes use of a function of the Time to Live (TTL)
field in the Layer 3 header and ICMP Time Exceeded Message;• TTL field is used to limit the number of hops that a packet can
cross;• When a packet enters a router, the TTL field is decremented
by 1;• Router when TTL = 0:
- will not forward the packet and the packet is dropped. - sends an ICMP Time Exceeded message addressed to
the originating host. This ICMP message will contain the IP address of the router that responded.
PDF created with pdfFactory Pro trial version www.pdffactory.com
113113113© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Path - Traceroute CommandTraceroute• Sends first sequence of messages
with TTL = 1;• TTL to time out the packet at the first
router;• router then responds with an ICMP
Time Exceeded Message;• Traceroute now has the address of
the first hop.
Traceroute• progressively increments the TTL
field (2, 3, 4...) for each sequenceof messages;
• this provides the trace with the address of each hop as the packets timeout further down the path;
PDF created with pdfFactory Pro trial version www.pdffactory.com
114114114© 2004, Cisco Systems, Inc. All rights reserved.
Testing the Path - Traceroute Command
Traceroute• The TTL field continues to
be increased until the destination is reached or it is incremented to a predefined maximum.
Traceroute• The final destination is reached and the host responds with:• a ICMP Port Unreachable message or• a ICMP Echo Reply message.
PDF created with pdfFactory Pro trial version www.pdffactory.com
115115115© 2004, Cisco Systems, Inc. All rights reserved.
Internet Control Message Protocol - ICMP v4
Internet Control Message Protocol - ICMP v4• is the messaging protocol for the TCP/IP suite;• provides control and error messages;• is used by the ping and traceroute utilities;Types of ICMP messages • Host conformation;• Unreachable Destination or Service;• Time exceeded;• Route redirection;• Source quench.
PDF created with pdfFactory Pro trial version www.pdffactory.com
116116116© 2004, Cisco Systems, Inc. All rights reserved.
ICMP v4 Messages
Host Confirmation
• the local host sends an ICMPEcho Request to a host;• the host receiving the echo message replies with the ICMP Echo Reply;
Host Confirmation• An ICMP Echo Message can be used to determine if a host is operational;
PDF created with pdfFactory Pro trial version www.pdffactory.com
117117117© 2004, Cisco Systems, Inc. All rights reserved.
ICMP v4 Messages
Unreachable Destination or Service• can used to notify a host that the
destination or service is unreachable;• when a host or gateway receives a
packet that it cannot deliver, it maysend an ICMP Destination Unreachable packet to the host originating the packet;
• the Destination Unreachable packet will contain codes that indicate why the packet could not be delivered.
PDF created with pdfFactory Pro trial version www.pdffactory.com
118118118© 2004, Cisco Systems, Inc. All rights reserved.
ICMP v4 MessagesDestination Unreachable codes:• 0 = net unreachable• 1 = host unreachable• 2 = protocol unreachable• 3 = port unreachable• net unreachable and host unreachable
(code 0, 1) - are responses from a routerwhen it cannot forward a packet;
• protocol unreachable and port unreachable (codes 2, 3) - are used by an end host to indicate that the TCP segment or UDP datagram contained in a packet could notbe delivered to the upper layer service.
PDF created with pdfFactory Pro trial version www.pdffactory.com
119119119© 2004, Cisco Systems, Inc. All rights reserved.
ICMP v4 MessagesTime Exceeded Message• is used by a router to indicate that a packet cannot be
forwarded because the TTL field of the packet has expired;• sends by router to the source host to inform the host of the
reason the packet was dropped. Route Redirection Message• is used by a router to notify the hosts on a network that a
better route is available for a particular destination;• may only be used when the source host is on the same
physical network as both gateways;• If a router receives a packet for which it has a route and for
which the next hop is attached to the same interface as the packet arrived, the router may send an ICMP Redirect Message to the source host. This message will inform thesource host of the next hop contained in a route in therouting table.
PDF created with pdfFactory Pro trial version www.pdffactory.com
120120120© 2004, Cisco Systems, Inc. All rights reserved.
ICMP v4 MessagesSource Quench Message• can be used to tell the source to temporarily
stop sending packets;• if a router does not have enough buffer space
to receive incoming packets, a router will discard the packets;
• is sent by the router to source hosts for every message that have been discarded;
• can be send by the destination host if datagrams arrive too fast to be processed;
• when a host receives an ICMP Source Quenchmessage, it reports it to the Transport layer. The source host can then use the TCP flow control mechanisms to adjust thetransmission.
PDF created with pdfFactory Pro trial version www.pdffactory.com
121121121© 2004, Cisco Systems, Inc. All rights reserved.
Summary
PDF created with pdfFactory Pro trial version www.pdffactory.com
© 2004, Cisco Systems, Inc. All rights reserved.
PDF created with pdfFactory Pro trial version www.pdffactory.com
top related