Internet Address Space Management in Digital
|
|
|
- Lee Dennis
- 9 years ago
- Views:
Transcription
1 S E P T E M B E R NSL Network Note NN-11 Internet Address Space Management in Digital Brian K. Reid Issued: September, 1992 d i g i t a l Network Systems Laboratory 250 University Avenue Palo Alto, California USA
2 The Network Systems Laboratory (NSL), begun in August 1989, is a research laboratory devoted to components and tools for building and managing real-world networks. Current activity is primarily focused on TCP/IP internetworks and issues of heterogeneous networks. NSL also offers training and consulting for other groups within Digital. NSL is also a focal point for operating Digital s internal IP research network (CRAnet) and the DECWRL gateway. Ongoing experience with practical network operations provides an important basis for research on network management. NSL s involvement with network operations also provides a test bed for new tools and network components. We publish the results of our work in a variety of journals, conferences, research reports, and notes. We also produce a number of video documents. This document is a Network Note. We use Network Notes to encompass a broad range of technical material. This includes course material, technical guidelines, example configurations, product and market position reviews, etc. Research reports and technical notes may be ordered from us. You may mail your order to: Technical Report Distribution Digital Equipment Corporation Network Systems Laboratory - WRL University Avenue Palo Alto, California USA Reports and notes may also be ordered by electronic mail. Use one of the following addresses: Digital E-net: Internet: UUCP: DECWRL::NSL-TECHREPORTS [email protected] decwrl!nsl-techreports To obtain more details on ordering by electronic mail, send a message to one of these addresses with the word help in the Subject line; you will receive detailed instructions.
3 Internet Address Space Management in Digital Brian K. Reid September, 1992 Abstract IP/TCP network addressing affords many different schemes for dividing and using the address space in a network. This document describes Digital s IP/TCP address space and the policies and procedures for managing it. Because IP/TCP is an evolving and experimental technology, many of these policies and procedures are motivated more by technological considerations or by a desire to be compatible with the world outside Digital than by traditional Digital procedures. Copyright 1993 Digital Equipment Corporation d i g i t a l Network Systems Laboratory 250 University Avenue Palo Alto, California USA i
4 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 ii
5 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL Table of Contents 1. Introduction Internet addresses Networks and address classes Digital s Internet addressing scheme Subnet masks and broadcast addresses 4 2. The IP/TCP address space database Overall organization Fields in the database Address assignment strategy 9 3. Update procedures Locking and unlocking a database file Update categories Changing a field in an existing entry Assigning a new subnet Moving a subnet to a different facility Decommissioning a subnet Special cases Point-to-point and link addresses Dialup and mobile addresses Off-premises addresses Addresses not in Net Nonstandard subnet masks Periodic housekeeping and report generation Using Palo Alto Computers Changing your password 15 iii
6 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 iv
7 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL List of Figures Figure 1: Internet address format information 1 Figure 2: Internet address formats 2 Figure 3: Division of Net 16 into subnets 3 Figure 4: Pictorial representation of Digital s subnet mask 4 Figure 5: Digital IP address space directory structure 5 Figure 6: Sample entry in subnet address database 6 Figure 7: Summary of fields in address database 10 Figure 8: Allocation sequence for subnets in a new cluster 11 v
8 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 vi
9 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL 1. Introduction This document describes Digital s IP/TCP address space and the policies and procedures for managing it. Because IP/TCP is an evolving and experimental technology, many of these policies and procedures are motivated more by technological considerations or by a desire to be compatible with the world outside Digital than by traditional Digital procedures Internet addresses An IP address is 32 bits long. Each address encodes a network number as well as a host ad- 1 dress.. The network number identifies the administrative entity that owns the address space, and the host address identifies the specific node on that network. It is not possible to tell, just from looking at a 32-bit IP address, which bits of it stand for the network number and which bits of it stand for the host address. This is because many organizations that have large networks have further divided them into subnetworks, and the division of bits between subnetworks and host addresses can be quite arbitrary Networks and address classes There are three classes of ordinary Internet addresses. They differ in terms of the number of bits that are used by each to identify the network number. Those using fewer bits to identify the network number have more bits available for host numbers. Thus, there is a small quantity of very large networks available, a moderate quantity of large networks, and a vast quantity of small networks available. The IP address formats are explained in Table 1 and shown pictorially in Figure 2. The determination of address format is done by the leftmost bits (called the "high-order bits") of the binary form of the address. High- bits of number of number of order address network bits of possible possible range of bits class number host number networks nodes network numbers 0 A ,000,000 1 to B ,000 65, to C ,000, to Figure 1: Internet address format information Addresses whose first three bits are "111" are "extended mode" class D and class E addresses, used for multicast. They are not currently used in Digital, but may be used in the future; in particular, the OSPF routing protocol uses class-d multicast addresses to locate designated routers on a subnet. 1 In the Internet world, a network node is called a HOST 1
10 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 Class A network address: 0 7 bits 24-bit network address Class B network address: bits 16 bits Class C network address: bit network number 8 bits Figure 2: Internet address formats More details of the Internet addressing scheme are contained in RFC791, Internet Protocol, by Jon Postel. IP addresses are normally written down as four decimal numbers separated by periods: Each of the decimal numbers stands for 8 bits of the address. IP network numbers are normally written down as IP addresses with zeros in the "host number" portions. For example, the Class A network 36 is written as " " and the Class B network is written as " ". 2
11 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL 1.3. Digital s Internet addressing scheme As noted in Table 1, a Class A network potentially has 16 million nodes. This is far too many to manage as a single pool. Therefore Digital, like most other owners of Class A networks, has divided its network into subnetworks, each of which is administered separately. Digital has been issued the Class A network number 16, (more properly written as " "). It has been divided into subnets of 8 bits each, allowing 254 nodes per subnet (the use of host address 0 is not recommended, and host address 255 is reserved for broadcast). Figure 3 shows, pictorially, the division of the 32 bits of the IP address into network number (always 16), subnet number (a 12-bit field), a reserved 4-bit guard zone (required to be zero), and an 8-bit node number. 16 SUBNET NODE Figure 3: Division of Net 16 into subnets This scheme immediately provides for 212 (4096) subnets of 8 bits each, which can accommodate one million nodes. When that space becomes cramped, the 4 "reserved" bits can be used for additional subnet numbers, which will yield 216 (65536) subnets of 8 bits each, giving the full 16 million nodes. The 4 bits are being held in reserve in case the Internet technology develops in some direction making it more practical for Digital to use them for some purpose other than subnet or node numbers. The 4096 subnets are divided into 256 "subnet clusters", each of which has 16 subnets. Every subnet cluster belongs to some administrative organization within Digital; no cluster is split between organizations. 3
12 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN Subnet masks and broadcast addresses When a computer or router is looking at an Internet address, it uses a "subnet mask" to decide how to interpret that address. This subnet mask is a 32-bit value, with a "1" bit in every position that is part of the network number, and a "0" bit in every position that is part of the host number. Inside Digital, we use a subnet mask that consists of 24 bits of "1" followed by 8 bits of "0". This mask can be written down either in hexadecimal as "0xffffff00" or in quad decimal as " ". Under certain very special circumstances, with close cooperation with engineering, it is permissible to use other values, but in the overwhelming majority of cases the 24-bit netmask must be used. This 24-bit subnet mask is shown pictorially in Figure 4. Associated with each subnet is its "broadcast address". The broadcast address for a subnet is the address to which a packet is sent if it is supposed to reach every node on the subnet. Normally the broadcast address can be computed by combining the subnet number with the subnet mask: take the subnet number, convert to binary, turn on every bit for which there is a "0" in the subnet mask, and then convert back to decimal. In the ordinary case of a 24-bit subnet mask, this can be accomplished by taking the subnet number and replacing its trailing ".0" with ".255". For example, the subnet " " will have " " as its broadcast address. This is because 255 is the decimal number whose binary equivalent is " ". 16 Subnet Node Network number Node FF FF FF 00 Figure 4: Pictorial representation of Digital s subnet mask 4
13 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL 2. The IP/TCP address space database 2.1. Overall organization The IP/TCP address space database is kept in a hierarchical ULTRIX directory structure whose leaves are ordinary text files. There is one text file for each address cluster. The directory hierarchy currently (April 1991) is shown in Figure 5. db/cranet: db/dsn: db/easynet: db/easynet/corp: db/easynet/eur: db/easynet/gia: db/easynet/us: db/reserve: Figure 5: Digital IP address space directory structure 2.2. Fields in the database Each entry in the subnet database records certain information about the subnet. Figure 6 shows a sample entry, and Figure 7 (page 10) shows a summary of the field information. The named fields in the database have the meanings and purpose shown below. Please refer to the example in Figure 6. 5
14 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 Subnet Status assigned Usage screened Mask Broadcast Netname nsl-zoo-net Site UCH CostCenter 32Q Contact Joe Peck Contact Mike Reilly Badge Badge DTN MS UCH-1 Purpose NSL Zoo (other vendors machines) Remark Not always online ApproxSize 10 ConnectWith NSL router with screen Domains pa.dec.com Created Mon Mar 11 16:33:22 PST 1991 Modified Thu May 9 06:34:16 PDT 1991 Verified End Figure 6: Sample entry in subnet address database Subnet The subnet number without trailing zero bytes. This field should never be changed when editing the database. Required field. Status The "status" of a subnet is whether it belongs to somebody, is reserved for some facility, or is free and available. The field must contain one of the following values: assigned This subnet has been registered and is in use. The rest of the database entry identifies the organization and person to which it has been assigned. free This subnet is free and can be assigned. reserved This subnet is not assigned, but has been reserved for the site identified by the "Site" field. Especially in Europe, the reserved subnets are quite likely to be in use without having been registered, so it is probably not be a good idea to change a reserve assignment without careful checking. Required field. Usage the "usage" of a subnet is whether or not it is connected to the greater network, isolated, or connected with a selective screen. The field must contain one of the following values: 6
15 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL connected This subnet is fully connected to Digital s internet. unconnected This subnet is not connected to Digital s internet. screened This subnet has a partial connection to Digital s internet, so that some packets pass and some do not. Typically a "screened" connection is connected with a screening router. Required field. Mask This is the subnet mask that is in use on the subnet. In all but extraordinary circumstances it must be equal to ". Required field. Broadcast This is the broadcast address that is in use on the subnet. In all but extraordinary circumstances it must be equal to the subnet number with ".255" appended as the node number. Required field. Netname This is the identifier that the owners of the net have chosen to use for it. These identifiers are used only by network diagnostic software in analyzing routing problems, and the details of the netnames do not matter very much. These names should be short, should typically end with the suffix "-net", and should, if possible, be different from one another. Recommended field; not required. Site This is the Digital site identifier for the site at which this subnet is located. If the subnet is a regional backbone and thus spans more than one site, then one of the sites that it connects must be listed. Examples are "MRO4" or "NUO". Required field. CostCenter The Digital cost center number of the cost center owning this subnet. Under rare circumstances a subnet will be shared between cost centers; in this case, the listed cost center should be the cost center in which the subnet manager is employed. Recommended field; not required. The electronic mail address, in Internet syntax2 of the subnet manager. If there is more than one subnet manager or more than one contact address, then each should be listed on a separate line with a separate " " field. The " ," "Contact," "Badge," and "DTN" fields should be in the same order, so that, for example, the second "Badge" field refers to the same person as the second " " field. The address of the primary contact should be listed first. One field is required; additional fields are optional. Contact The name of the subnet manager. If there is more than one subnet manager or more 2 "Internet syntax" means that you have to use the "@" form and not the "::" form of an address, and that ALL-IN-1 addresses need an "@Internet" at the end of them. 7
16 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 than one responsible person, then each should be listed on a separate line with a separate "Contact" field. The " ," "Contact," "Badge," and "DTN" fields should be in the same order, so that, for example, the second "Contact" field refers to the same person as the second " " field. One Contact field is required; additional fields are optional. Badge The badge number of the subnet manager. If there is more than one subnet manager or more than one responsible person, then the badge number of each should be listed on a separate line with a separate "Badge" field. The " ," "Contact," "Badge," and "DTN" fields should be in the same order, so that, for example, the second "Badge" field refers to the same person as the second " " field. If the responsible person is a contractor, then put "none" for the badge number. A blank field means "don t know". Recommended field; not required. DTN The Digital Telephone Network phone number of the subnet manager. If there is more than one subnet manager or more than one responsible person, then the DTN of each should be listed on a separate line with a separate "DTN" field. The " ," "Contact," "Badge," and "DTN" fields should be in the same order, so that, for example, the second "DTN" field refers to the same person as the second " " field. Recommended field; not required. MS Mail stop. The ID mail location of the primary subnet manager. This is rarely used, and can normally be obtained from ELF unless the subnet manager is a contractor. Recommended field; not required. Purpose What this subnet is used for. Why it is needed. Normally this will not be very informative, but when there is more than one subnet per facility, the "Purpose" information is useful to be able to distinguish between them. Optional field. Remark Any additional information that might be useful. Optional field. ApproxSize Your best estimate as to the current size of the network, in number of nodes. Optional field. ConnectWith An explanation of how this network is connected, if at all, to the rest of Digital s Internet. Optional field. Domains The subdomain or subdomains to which this subnet belongs. In all normal circumstances a subnet will belong to exactly one subdomain, though a subdomain can contain several different subnets. If this subnet belongs to a connected domain, then this is a required field. Created The date and time that this entry was first created. This is added automatically by the update software. 8
17 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL Modified The date and time that this entry was last modified. This is added automatically by the update softwware. Verified The date and time that this entry was last verified. Not currently in use Address assignment strategy IP subnet address assignment is not just the simple giving out of numbers. Although IP does not currently support true "area" routing, the job of the router can be greatly simplified if subnet addresses that are physically near each other are close together in binary difference. The more bits that two subnet addresses have in common, the more easily they can be routed or bundled together. If subnet assignment is done "wrong", everything will still work. The routers will require more memory and the route management will be more complex, but nothing will malfunction. If subnet assignment is done "right", then current and future routing performance will be better, complexity will be lower, and there will be more options in future technologies. The goal of the original subnet assignment strategy was to put the primary subnets for big sites into slots in the address space that had a lot of nearby subnets with a large number of bits in common, and to put little sites into "smaller" slots. This is a heuristic and not an algorithm, because "big" and "small" are relative terms, and not every large site will have a large number of IP nodes. A simple procedure for assigning subnets within a cluster that tends to produce better assignments than most others is to sort the subnets in a cluster into decreasing order of expected maximum size, then assign the subnets in increasing order of binary entropy. This means that they are assigned in the order shown in Figure 8. The "relative size" column is an indication of how fully packed it is appropriate to make the cluster. If the first subnet in a cluster is for a facility that is ultimately expected to populate the entire cluster, then it should be given subnet 0 and no further assignments for other facilities should be made to that cluster. If the first facility is expected to use about half the cluster and the second about half the cluster, then they should be given subnets 0 and 128, and no further facility assignments made. And so forth. When additional subnets for the same facility are assigned, they should be assigned to have the largest number of bits in common with the first or primary subnet in that facility. Naturally, as more and more subnets are assigned to a facility, the number of common bits that are possible will decrease. 3. Update procedures In concept, the procedure to update the subnet database is very simple. You log on, locate the file that you need to edit, lock it, edit it, unlock it, and log out. The "lock" and "unlock" steps are kept separate from the "edit" step in order that the locking does not have to be built into the editing program; this permits users to use whatever editing program that they find most comfortable or convenient, without worrying about whether or not it knows how to participate in database locking. 9
18 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN-11 Field name Format or Example Usage Description Subnet Subnet number Required Status Keyword: free, assigned Required reserved, or assigned Usage Keyword: connected, screened Required unconnected, screened Mask Numeric subnet Required mask value Broadcast Numeric Required IP address Netname Alphanumeric nsl-zoo-net Recommended Site Digital UCH Required site code CostCenter Digital 32Q Recommended Cost center Internet-format One required, electronic mail address others optional. Contact Person s name Joe Peck One required, others optional. Badge Digital Recommended; provide badge number one for each "Contact" DTN Digital Telephone Recommended number MS Digital mail stop UCH-1 Recommended Purpose Random text "NSL Zoo (other Optional vendors machines)" Remark Random text Not always online Optional ApproxSize A number 10 Optional ConnectWith Description of a "NSL router Optional router hookup with screen" Domains Name of subdomain(s) pa.dec.com Required if the of dec.com subdomains exist. Created Unix-format date Added automatically Modified Unix-format date Added automatically Verified Figure 7: Summary of fields in address database Not currently used 10
19 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL Subnet allocation relative number sequence size Figure 8: Allocation sequence for subnets in a new cluster The command "locks" will tell you which files, if any, are currently locked. If you try to log out with a file still locked, you will be asked to unlock any locked files before you log out (though if you insist, you can log out even with locked files, by typing the LOGOUT command in upper case) Locking and unlocking a database file The commands "checkout" and "checkin" perform the lock and unlock functions, respectively. If you use "checkout" to check out a file, then it is locked, checked out in your name, until you use "checkin" to unlock it and return it. If you try to check out a file that somebody else has locked, the "checkout" request will fail. The syntax for both commands is the same. Here is an example showing their use to check out, edit, and check in the file holding information for cluster 193. checkout 193 edit 193 checkin
20 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN Update categories There are several different kinds of database update that can be made. All of them basically amount to the same thing, namely changing the contents of a database entry for a subnet, but the procedure involved is slightly different Changing a field in an existing entry Often a subnet manager will change, or a secondary subnet manager will be added. Sometimes a DTN or an address will change. These fields need to be kept up to date. Follow these steps: 1. Determine the subnet cluster number. This is the second number of the subnet address. For example, Subnet is subnet cluster 123. If you don t know the subnet number, the database of subnet numbers is contained in the file "reports/subnets.alpha", i.e. in the file "subnets.alpha" in your subdirectory "reports". 2. Once you have determined the subnet number and are ready to update it, change to the "db" (database) subdirectory, using this command: cd db 3. Check out the file in that subdirectory whose name is the cluster number: checkout Edit the file using the editor of your choice. If you are not sufficiently versed in the ways of ULTRIX to make that choice, use the "edit" command, which will give you the "SEDT" editor. Most VMS users are quite comfortable with it: edit The cluster file contains the database entry for 16 subnets. Locate the correct entry, and edit it as needed. While you are in there, you should doublecheck the DTN and mail stop by using ELF to look up the contact person. 6. Write out the edited file and exit from the editor. 7. Check the file back in: checkin 123 the "checkin" program will say this: RCS/123,v < new revision: 1.3; previous revision: 1.2 enter log message: (terminate with ^D or single. ) >> In response to this, you should type a short note (just a line or two) about what change you have made, and why. The date and time and your identity will be recorded as part of the checking procedure. 8. Return to your top-level directory: cd (typing the "cd" command with no arguments returns you to your original login directory). 12
21 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL Assigning a new subnet Always check existing assignments before making a new one. Sometimes the requestor does not actually need a new subnet, but can share an existing assignment. Sometimes there is a reservation for that facility, in which case you should normally assign the reserved subnet. Once the particulars of the assignment have been made, the details are just the same as those for 3.2.1, "Changing a field in an existing entry," above. Just change the entry from being unassigned to being assigned, and fill in all of the relevant values Moving a subnet to a different facility Moving a subnet to a different facility involves simply editing its "Site" code as stored in the database. There is no need to move the data entry from one cluster file to another Decommissioning a subnet If it should become necessary to decommission a subnet, do this by changing its "Status" field to "free", and adding a note in its "Remark" field. Leave the other information alone. This will provide a record of the most recent use of that subnet, in case vestigial references persist after it has supposedly been decommissioned Special cases Ordinary Internet addresses are assigned to fixed bus media such as Ethernet, CI, FDDI, or token rings. Movable or point-to-point addresses require some extra thought Point-to-point and link addresses Internet devices have a separate IP address for each one of their communications interfaces. This means that each end of a wide-area IP link will have a separate address, because each end of the link connects to a communications interface. While it is possible to configure most brands of IP router to operate wide-area links without addresses, and some brands (e.g. Vitalink) require that the link be run without addresses, it is good network management practice to assign addresses to all WAN links to enable network management software to locate all of the corners of the network. Link addresses should be assigned out of a subnet to which there will never be any subnet routes published. Each administrative group that is responsible for the operation of a collection of subnets with internal point-to-point links should maintain its own unrouted subnet for this purpose. By way of example, CRA uses network for this purpose Dialup and mobile addresses Dialup and mobile connections have the property that they are not always connected to the same physical link. For example, a dialin connection using SLIP or PPP will be connected to a serial line router, but the exact interface on that router to which it is connected will vary depending on the connections that were existing at the time the call was made. 13
22 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN Off-premises addresses In certain cases a Digital subnet is assigned to a location that is not a Digital facility. There are several situations in which this can arise: Demonstration IP networks at trade shows. Network segments at employee residences, typically used with dialup IP or point-topoint links. Digital-owned communications gear on the premises of network common carriers. The assignment of a subnet for off-premises use does not imply approval for it to be connected; the External Access Review Committee (EXARC) must approve all requests for network connections between Digital s internal networks and off-premises networks Addresses not in Net 16 Under certain very rare circumstances it is useful or necessary to assign addresses that are not in Digital s Class A network, Net 16. Examples of appropriate circumstances: Connecting an approved external gateway. Testing of network hardware or software. Networks owned and operated by Digital but used by customers, such as field test or demonstration equipment. Allocation of non-net 16 network numbers is handled through the Corporate Research registrar and is sufficiently specialized that it is not documented here. If you have a valid business need for a network number outside Net 16, contact the CRA registrar Nonstandard subnet masks The technology to use different subnet masks on different portions of Digital s IP network can be made to work in the hands of experts; the use of nonstandard masks is not forbidden, but it is not recommended. When a subnet is assigned, it carries with it a requirement that the 4-bit "reserved" field always be zero. While current plans are that those four bits will be opened up to provide additional subnet capacity for current IP users, they are in fact being held in reserve, which means they are not to be used now. The Telecommunications and Networks group (TaN) in LKG and TAY is experimentally using IP subnet addresses in which the reserved bits are nonzero; all others are required to leave those bits turned off. To do otherwise will seriously jeopardize our ability to do effective wide-area routing. 4. Periodic housekeeping and report generation Each night, a set of reports is produced that summarize the current contents of the address space database. Those reports are mailed to the Registrar list each week, and are made available in the "reports" subdirectory of each user who is authorized to update the database. The reports are as follows: 14
23 NSL NN-11 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL subnets.domains A listing of all subnets that are registered and are properly recorded in the domain name servers (DNS). These subnets are "complete" according to current Digital operations procedures. subnets.connected A listing of all subnets that are registered and which also have packet-level connectivity to the Corporate IP backbone. They do not necessarily have proper domain registration (see above). etc.networks This file is distributed throughout Digital to be used for the list of network names, which on ULTRIX computers is /etc/networks. These names are used only by diagnostic software and are not necessary for the correct operation of a subnet or networked computer. subnets.16 A complete map of the Net 16 address space, showing subnet numbers, allocations, owners, and so forth. This is the only report that shows unused subnets that are available for assignment. subnets.report The list of all assigned subnets and all reserved subnets. This is used to survey the database to locate missing contact information. subnets.registered The list of all assigned (registered) subnets. This is produced primarily for the use of DNRS management and the central DECNET registrar. subnets.alpha Allocated and reserved subnets, shown in alphabetical order by facility code. This is used for determining whether or not a facility has an assignment or a reservation. 5. Using Palo Alto Computers All Palo Alto computers are connected to IP-EASYnet; some are also connected to the Phase- IV DECNET EASYnet. The machine NSL:: is a DECsystem 5500 running ULTRIX. All ULTRIX machines in Palo Alto are in a single cluster. All logins are cluster-wide, though not every machine in the cluster will permit you to do anything once you have logged in Changing your password Passwords for all Palo Alto cluster logins are controlled from a central password database. To change the password for your account you must connect to the database server machine, log on, change your password, and then wait for the change to propagate to the other machines in the cluster. You are also welcome to change your password on other cluster machines, to avoid having to wait for a new central password to propagate to them. To change your password, follow this procedure: 1. Connect to the cluster center machine by typing this command: rlogin palo-alto 15
24 INTERNET ADDRESS SPACE MANAGEMENT IN DIGITAL NSL NN Type the ULTRIX command to set a new password: % passwd Changing password for wade Old password: New password: Retype new password: 3. Log out of the cluster center machine by typing this command: logout The new password will propagate to other machines in the cluster within 4 hours. If you need it changed more quickly than that on some machine, you can use the "passwd" command on the machine where the change is needed. 16
Lab 10.3.5a Basic Subnetting
Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Lab 10.4.1 IP Addressing Overview
Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe
IP Sub Networking Mini Howto
Table of Contents IP Sub Networking Mini Howto...1 Robert Hart, [email protected] 1. Copyright...1 2. Introduction...1 3. The Anatomy of IP numbers...1 4. What are subnets?...1 5. Why subnetwork?...1
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
NETWORK ADMINISTRATION
NETWORK ADMINISTRATION INTRODUCTION The PressureMAP software provides users who have access to an Ethernet network supporting TCP/IP with the ability to remotely log into the MAP System via a network connection,
PART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
SUBNETTING SCENARIO S
SUBNETTING SCENARIO S This white paper provides several in-depth scenario s dealing with a very confusing topic, subnetting. Many networking engineers need extra practice to completely understand the intricacies
IP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
One of the most important topics in any discussion of TCP/IP is IP. IP Addressing
IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address
Subnetting Study Guide
Subnetting Study Guide by Boson Software, LLC An octet is a binary number of 8 bits, with the lowest possible number being 00000000 and the highest possible number being 11111111, or 28. The binary number
Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
Module 2: Assigning IP Addresses in a Multiple Subnet Network
Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations
Lab#2: IP Addressing and Subnetting
IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by
Table of Contents. Cisco IP Addressing and Subnetting for New Users
Table of Contents IP Addressing and Subnetting for New Users...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Additional Information...1 Understanding IP
Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management
Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very
TCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
MECCA: A Message-Enabled Communication and Information System
N O V E M B E R 1 9 9 2 NSL Technical Note TN-10 MECCA: A Message-Enabled Communication and Information System Anita Borg d i g i t a l Network Systems Laboratory 250 University Avenue Palo Alto, California
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
TCP/IP Addressing and Subnetting. an excerpt from: A Technical Introduction to TCP/IP Internals. Presentation Copyright 1995 TGV Software, Inc.
TCP/IP Addressing and Subnetting an excerpt from: A Technical Introduction to TCP/IP Internals Presentation Copyright 1995 TGV Software, Inc. IP Addressing Roadmap Format of IP Addresses Traditional Class
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub
then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY. www.aspetech.com toll-free: 877-800-5221
Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY www.aspetech.com toll-free: 877-800-5221 Advanced Topics IP Subnetting It is almost impossible to lay out an IP network without
TCP/IP Cheat Sheet. A Free Study Guide by Boson Software, LLC
boson_logo_tcpip.pdf 9/23/2010 11:28:19 AM TCP/IP Cheat Sheet A Free Study Guide by Boson Software, LLC Table 1 Address Class Summary Class s Hosts per Range of Network IDs (First Octet) Class A 126 16,777,214
CCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.
APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is
Subnetting. TELE301 Laboratory Manual. 1 In-Class Exercises... 3. 2 Subnetting in IPv6... 4
Subnetting TELE301 Laboratory Manual Contents 1 In-Class Exercises............................. 3 2 Subnetting in IPv6............................. 4 This lab is actually run as a class-tutorial. Thus,
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
IP Subnetting. Subnetting
IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network
Part A:Background/Preparation
Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration
IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:
Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers
CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Outline TCP/IP Protocol Suite 2 5-1 INTRODUCTION The
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
Domain Name System (DNS) Services
12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Chapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
Chapter 19 Network Layer: Logical Addressing 19.1
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that
HP 3000/iX Network Planning and Configuration Guide
HP 3000/iX Network Planning and Configuration Guide HP 3000 MPE/iX Computer Systems Edition 4 36922-90037 E1098 Printed in: U.S.A. October 1998 Notice The information contained in this document is subject
How Subnets Work in Practice. Fred Marshall Coastal Computers & Networks
How Subnets Work in Practice Fred Marshall Coastal Computers & Networks Background There's lots of literature available on how the bit structure of an address can be split up using the subnet mask. Generally,
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
256 4 = 4,294,967,296 ten billion. 256 16 = 18,446,744,073,709,551,616 ten quintillion. IP Addressing. IPv4 Address Classes
IP Addressing With the exception of multicast addresses, Internet addresses consist of a network portion and a host portion. The network portion identifies a logical network to which the address refers,
Classful IP Addressing (cont.)
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
Internet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004
Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Internet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
TCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
Pre-lab Preparation: 1. Read thoroughly and prepare the experiment sheet. 2. You must bring a printed copy of this experiment with you to the lab.
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.5 Subnetting &Variable Length Subnet Mask (VLSM) Objectives 1. To become
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
IP Addressing and Subnetting for New Users
IP Addressing and Subnetting for New Users Document ID: 13788 Contents Introduction Prerequisites Requirements Components Used Additional Information Conventions Understanding IP Addresses Network Masks
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Setting up VPN Access for Remote Diagnostics Support
Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
Subnetting Examples. There are three types of subnetting examples I will show in this document:
Subnetting Examples There are three types of subnetting examples I will show in this document: 1) Subnetting when given a required number of networks 2) Subnetting when given a required number of clients
Service Managed Gateway TM. How to Configure a T1/E1 Connection
Service Managed Gateway TM How to Configure a T1/E1 Connection Issue 1.2 Date 26 August 2008 1 Introduction... 3 1.1 What is T1/E1 technology?... 3 2 Point-to-Point Protocol (PPP) connections... 4 2.1
Configuration of Cisco Routers. Mario Baldi
Configuration of Cisco Routers Basics Static Routing Mario Baldi Politecnico di Torino mario.baldi[at]polito.it http://staff.polito.it/mario.baldi ConfRoutEn - 1 M. Baldi: see page 2 Copyright Notice This
Type of addressing in IPv4
Type of addressing in IPv4 Within the address range of each IPv4 network, we have three types of addresses: Network address - The address by which we refer to the network Broadcast address - A special
The Subnet Training Guide
The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP
Savera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Terminal Server Configuration and Reference Errata
Doc. No. 78-0944-06A0 June 14, 1993 Terminal Server Configuration and Reference Errata This document supplies corrections and additional informaiton for the 9.0 version of the Cisco publication Terminal
DNS and email issues in connecting UNINET-ZA to the Internet
DNS and email issues in connecting UNINET-ZA to the Internet Alan Barrett November 2011 Abstract This article describes some of the activities and configuration relating to the Domain Name System (DNS)
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1
Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg
Prestige 650R-31/33 Read Me First
Prestige 650R-31/33 Read Me First Prestige Rear Panel Connections PORT DSL CONSOLE LAN 10/100M POWER Connect to a telephone jack using a telephone wire. CONNECTION Connect to a serial port (COM port) on
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Prestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40
Prestige 623R-T ADSL Dual-link Router Quick Start Guide Version 3.40 February 2004 Introducing the Prestige The Prestige 623R-T ADSL Dual-link Router is the ideal all-in-one device for small networks connecting
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
TCP/IP Drill Pack. By Donna Warren. Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19
TCP/IP Drill Pack By Donna Warren Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19 Drill 1: OSI vs DOD and the TCP/IP Protocol Suite Complete the following chart. On the next page give a brief
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
