IP Addressing A Simplified Tutorial
|
|
- Jesse Grant
- 2 years ago
- Views:
Transcription
1 Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID Avaya Labs 1
2 All information in this document is subject to change without notice. Although the information is believed to be accurate, it is provided without guarantee of complete accuracy and without warranty of any kind. It is the user s responsibility to verify and test all information in this document. Avaya shall not be liable for any adverse outcomes resulting from the application of this document; the user must take full responsibility. 2
3 Companion document LANs and VLANs: A Simplified Tutorial 3
4 Introduction The purpose of this tutorial is to give the newcomer to data networking a basic understanding of IP addressing. The following topics are covered. IP addressing fundamentals Classful IP addressing Subnet masks Variable length subnet masks (VLSM) Classless inter-domain routing (CIDR) Routing and routing protocols 4
5 IP Addressing Fundamentals 5
6 OSI and TCP/IP OSI Reference Model 7 Application 6 Presentation 5 Session TCP/IP Application Terms used in this tutorial 4 Transport Host to Host TCP port, UDP port (TCP/UDP) 3 Network Internet (IP) IP address 2 Data Link Network Interface MAC address 1 Physical This table is presented for reference purposes. The first column shows the 7-layer OSI Reference Model, which is a model used to design protocols that make networking possible. The second column shows the TCP/IP protocol stack in reference to the OSI model. TCP/IP is the prevalent protocol stack for data networking. The third column shows that an IP address is a layer 3 (L3) address, as well as its relationship to the MAC address and TCP/UDP port, which are not covered in this tutorial. 6
7 Anatomy of an IP address The IP address is a 32-bit address that consists of two components. One component is the network portion of the address, consisting of the network bits. The network bits make up the left portion of the address. They consist of the first bit up to some boundary, to be discussed later. The second component is the host portion of the address, consisting of the host bits. The host bits make up the right portion of the address. They consist of the remaining bits not included with the network bits. 7
8 The mask The network portion of the address is separated from the host portion of the address by a mask. The mask simply indicates how many bits are used for the network portion, leaving the remaining bits for the host portion. A 24-bit mask indicates that the first 24 bits of the address are network bits, and the remaining 8 bits are host bits. A 16-bit mask indicates that the first 16 bits of the address are network bits, and the remaining 16 bits are host bits. And so forth The difference between a network mask and a subnet mask will be explained as this tutorial progresses. 8
9 Quick lesson in binary math Binary math is based on powers of 2, as opposed to powers of 10 for decimal math. Whereas decimal math has a 1s place, 10s place, 100s place, and so forth Binary math has a 1s place, 2s place, 4s place, 8s place, and so forth. Given an octet (8 bits), when a bit in the octet is set (1) its value is 128 = left-most bit (most significant bit) = = next bit = = next bit = = next bit = = next bit = = next bit = = next bit = = right-most bit (least significant bit) = 2 0 When a bit in an octet is not set (0) its value is zero. The decimal value of an octet is the sum of each set bit s value = = = = = = 255 9
10 Dotted decimal notation Machines read the IP address as a stream of 32 bits. However, for human consumption, the IP address is written in dotted decimal notation. The 32-bit address is divided into 4 groups of 8 bits (an octet or a byte). Each octet is written as a decimal number ranging from 0 to 255. The decimal numbers are separated by periods, or dots. 10
11 Network, host, and broadcast addresses For a given IP network the network bits remain fixed and the host bits vary. the network address is the one that results when all the host bits are not set (the result of performing an AND operation on the address and its mask). the broadcast address is the one that results when all the host bits are set. host addresses are those that result with all remaining combinations of the host bits. The next two slides show examples of how to determine the various addresses for two networks. 11
12 24-bit mask ( ) 12
13 16-bit mask ( ) 13
14 Significance of IP networks and hosts An IP host is any device with an IP address, such as a PC. Multiple hosts reside on a given IP network or subnet (short for subnetwork). Subnets will be discussed later. A group of IP networks is an internetwork, with the largest internetwork being the Internet. What is typically called a data network is technically an internetwork, because multiple IP networks are connected together by routers. This internetwork contains 6 IP networks. Note that even a link between routers is a network. 14
15 Physical network vs. IP network In terms of physical connectivity, it is common to see these terms used. The term network here describes as a whole the connected devices that make up this data network. To be more precise, these terms are used to describe physical connectivity. Each physical segment has a separate logical IP network or subnet. 15
16 Formula to determine number of hosts on a given network Given that there are N host bits in an address, the number of hosts for that network is 2 N - 2. Two addresses are subtracted for the network address and the broadcast address. 8 host bits: = 254 hosts 16 host bits: = hosts 24 host bits: = hosts As this tutorial progresses, it will become apparent how networks are typically sized so that there is a manageable number of hosts. 16
17 Public addresses Most IP addresses are public addresses. Public addresses are registered as belonging to a specific organization. Internet Service Providers (ISP) and extremely large organizations in the U.S. obtain blocks of public addresses from the American Registry for Internet Numbers (ARIN Other organizations obtain public addresses from their ISPs. There are ARIN counterparts in other parts of the world, and all of these regional registration authorities are subject to the global Internet Assigned Numbers Authority (IANA Public IP addresses are routed across the Internet, so that hosts with public addresses may freely communicate with one another globally. No organization is permitted use public addresses that are not registered with that organization! 17
18 Private addresses RFC 1918 designates the following as private addresses. Class A range: through Class B range: through Class C range: through Private addresses may be used by any organization, without any requirement for registration. Because private addresses are ambiguous - can t tell where they re coming from or going to because anyone can use them - private addresses are not permitted to be routed across the Internet. ISPs block private addresses from being routed across their infrastructure. Note: The use of private addresses, network address translation (NAT), and proxy servers solved the IP address shortage problem for the short and medium terms. The projected long-term solution is IPv6. These topics will not be discussed here. 18
19 Classful IP Addressing and its Shortcomings 19
20 Three main classes Class A networks First octet values range from 1 through 126. First octet starts with bit 0. Network mask is 8 bits, written /8 or through are class A networks with hosts each. Class B networks First octet values range from 128 through 191. First octet starts with binary pattern 10. Network mask is 16 bits, written /16 or through are class B networks, with hosts each. Class C networks First octet values range from 192 through 223. First octet starts with binary pattern 110. Network mask is 24 bits, written /24 or through are class C networks, with 254 hosts each. 20
21 Two additional classes, and reserved addresses Class D addresses First octet values range from 224 through 239. First octet starts with binary pattern Class D addresses are multicast addresses, which will not be discussed in this tutorial. Class E addresses Essentially everything that s left. Experimental class, which will not be discussed in this tutorial. Reserved addresses is the default IP address, and it is used to specify a default route. The default route will be discussed later. Addresses beginning with 127 are reserved for internal loopback addresses. It is common to see used as the internal loopback address on many devices. Try pinging this address on a PC or Unix station. 21
22 The need to improve IP addressing efficiency As IP networking and internetworking progressed, it became very apparent that class A and B networks were simply too large. 254 hosts on one network segment is manageable, but hosts or more on a single network segment is difficult to manage. This would result in class A and B networks not being fully utilized, meaning that not all the host addresses would get used. Or it would result in more hosts being put onto a single network segment than could reasonably be managed. For these and other reasons, there was a need to improve the efficiency of IP addressing. That is, to provide a way to limit the number of host addresses per network segment to what is actually needed, regardless of the network class. This need was met progressively through the conceptions of subnet masks, variable-length subnet masks, and classless inter-domain routing. 22
23 Subnet Masks 23
24 Extending the classful network mask Subnet masks are used to make classful networks more manageable and efficient, by creating smaller subnets and reducing the number of host addresses per subnet to what is actually required. Subnet masks were first used on class boundaries. Example Take class A network with network mask Add additional 8 subnet bits to network mask. New subnet mask is New subnets are , , , and so on with host addresses per subnet. Still too many hosts per subnet. Example Take class A network with network mask Add additional 16 subnet bits to network mask. New subnet mask is New subnets are , , ,, , , ,, , , , and so on with 254 host addresses per subnet. 24
25 Subnetting continued Example Take class B network with network mask Add additional 8 subnet bits to network mask. New subnet mask is New subnets are , , , and so on with 254 host addresses per subnet. As shown in these examples A class A network can be subnetted to create 256 (2 8 ) /16 subnets. A class A network can be subnetted to create (2 16 ) /24 subnets. A class B network can be subnetted to create 256 (2 8 ) /24 subnets. Note: Technically there really is no such thing as a classful subnet or classful subnet mask. However, terms such as class C subnet and class C subnet mask are used routinely to describe a class A or B network that has been subnetted with a 24-bit mask. 25
26 Terminology check By now it should be apparent that the terms network and subnet technically mean two different things. However, it is both common and somewhat accepted to use the terms interchangeably in casual communication. If there is a more general term of the two, it is network. It should also be apparent by now that the terms network mask and subnet mask technically mean two different things. But again, it is both common and somewhat accepted to use the terms interchangeably in casual communication. The term mask is a general term that is commonly used because of its ambiguity. The proper terms are used more consistently in formal communication. 26
27 Variable-length Subnet Masks (VLSM) 27
28 Improving the efficiency of subnet masks VLSM removed the class boundary restriction of traditional subnet masks. With VLSM a network of any class can be subnetted to almost any size. The next series of slides shows examples of VLSM. 28
29 Successive subnets w/ a 26-bit subnet mask The next four slides show a class A network subnetted with a 26-bit subnet mask. Successive subnets are shown; that is, the network addresses are shown in sequence. These slides show that in the same address space as a /24 network or subnet with 254 host addresses, four smaller /26 subnets can be created, each with 62 host addresses. 29
30 1. 26-bit subnet mask ( ) 30
31 2. 26-bit subnet mask ( ) 31
32 3. 26-bit subnet mask ( ) 32
33 4. 26-bit subnet mask ( ) 33
34 Successive subnets w/ a 23-bit subnet mask The next four slides show the same class A network as in the previous slides, but with a 23-bit subnet mask. Successive subnets are shown; that is, the network addresses are shown in sequence. A /23 subnet has 510 host addresses, and this is arguably the largest number of hosts to practically put on a LAN segment. The next larger subnet (22-bit subnet mask) has 1022 host addresses. As explained in the companion document, LANs and VLANs: A Simplified Tutorial, all IP hosts must transmit ARP broadcasts. In addition, IP hosts participate in other exchanges that require broadcasts, and some applications are very broadcast-intensive. A thousand or so hosts transmitting frequent broadcasts to all other hosts on a LAN segment can be very taxing on network and host devices. There are also other reasons, in addition to broadcasts, why a thousand endpoints on one LAN segment would not be desirable. 34
35 1. 23-bit subnet mask ( ) 35
36 2. 23-bit subnet mask ( ) 36
37 3. 23-bit subnet mask ( ) 37
38 4. 23-bit subnet mask ( ) 38
39 Successive subnets w/ a 30-bit subnet mask The next four slides show the same class A network as in the previous slides, but with a 30-bit subnet mask. Successive subnets are shown; that is, the network addresses are shown in sequence. A /30 subnet has two host addresses, and this is the smallest permissible subnet. A /31 subnet has only two addresses because there is only one host bit. This would allow for a network address and a broadcast address and no host addresses. /30 subnets are commonly used for point-to-point links, such as WAN links, because there are only two hosts on the network segment. 39
40 1. 30-bit subnet mask ( ) 40
41 2. 30-bit subnet mask ( ) 41
42 3. 30-bit subnet mask ( ) 42
43 4. 30-bit subnet mask ( ) 43
44 Classless Inter-domain Routing (CIDR) 44
45 Supernetting Very simply stated, CIDR is combining two or more classful networks to create a supernetwork. The most common use of CIDR for actual addressing is to combine two or more class C networks to create a /23 or /22 supernet. For example, the class C networks and could be combined to create /23. The class C networks and could be combined to create /23. These two examples are illustrated in the following slides. 45
46 1. Supernet w/ 23-bit mask ( ) 46
47 2. Supernet w/ 23-bit mask ( ) 47
48 CIDR observations There really is no significant difference between the /23 supernet examples just shown and the /23 subnet examples shown previously. Both networks utilize the same 23-bit mask. Both networks have 510 host addresses. The only difference is that a class A network was subnetted in one set of examples, and two class C networks were supernetted in the other. As with all things in IP addressing, supernets must fall on bit boundaries. There must be a power of 2 number (2, 4, 8, ) of networks in a supernet. A /23 supernet must include two class C networks. A /22 supernet must include four class C networks. For example, it is not possible to create a supernet that includes just and To include both these networks the mask must be 22 bits, and a 22-bit mask must also include the networks and Although the term supernet is used in this tutorial to explain CIDR, this term is not commonly used in casual communication. Instead, most will simply use the term network. 48
49 Routing and Routing Protocols 49
50 The IP header This tutorial will not cover the entire IP header, but it is presented here for reference. For this section it is important to note that every IP packet has an IP header, and therefore has a source and destination IP address. The source address belongs to the host that originated the IP packet. The destination address belongs to the host, or hosts if the packet is a broadcast, that is to receive the IP packet. 50
51 IP routing defined IP routing is the process of delivering IP packets from one IP network to another. Routing is the core function of a router. To forward an IP packet from one IP network to another, a router must know how to route that packet to its destination. If a router is directly connected to a packet s destination network, the router can independently forward the packet to that network. If a router is not directly connected to a packet s destination network, the router must know the next-hop router to which the packet must be forwarded. IP hosts participate in routing to a much lesser degree. Hosts on any given IP network can independently communicate with one another. Hosts on different IP networks, however, must communicate through an IP gateway, or router. A host must be aware of its gateway or gateways. 51
52 Anatomy of a route In general, a route consists of a destination and a gateway. If a host or router is only capable of classful routing, its route table will have two fields. destination gateway Such a device can only route to classful networks, using the classful network mask. Because there can be only one classful network mask based on the destination IP address, there is no need to explicitly specify the mask. If a host or router is capable of classless routing, its route table will have three fields. destination mask gateway Such a device can route to both classful networks and classless subnets. This requires that a mask be explicitly specified. Most devices are capable of classless routing. 52
53 Default address, route, and gateway The default address is This address encompasses all IP addresses. The default address is used to specify a default route, which is the route to be taken when no other more specific route is available. For example: destination gateway address-of-router-on-this-network destination mask gateway addr-of-router-on-this-net As shown here, the mask for a default route is The gateway used for the default route is the default gateway. 53
54 Static routing Static routes are manually entered into a router or host. An administrator must know the internetwork layout and the paths that exist between networks. Then the administrator must program each router in the internetwork with the proper routes to get from any given network to any other network. The hosts obtain their routes manually or via DHCP. 54
55 Dynamic routing Dynamic routes are routes learned via one or more routing protocols. Routing protocols are used by routers to inform one another of the IP networks accessible to them. There are classful routing protocols, such as RIPv1, that do not transmit masks in their routing updates - the classful network mask is implied. There are also classless routing protocols, such as OSPF, that do transmit masks in their routing updates. Dynamic routing is much too complex a subject to be covered in this tutorial. Suffice it to say that OSPF is the most prevalent standard routing protocol today, and likely the most prevalent routing protocol overall. Routing protocols typically do not apply to hosts. Hosts obtain their routes by manual configuration or by DHCP. 55
56 Static vs. dynamic routing One difference between static routes and dynamic routes is that one is entered in manually and the other is learned and/or calculated dynamically. The big differentiator, however, is in how the routers adapt to sporadic changes in network topology caused by outages. A statically routed network has almost no way of adapting to temporary topology changes. But routing protocols are designed for this purpose. A key factor in designing networks and choosing a routing protocol is convergence time, which is the time it takes for the network as a whole to discover its topology and reach a steady state. In general, the shorter the convergence time the better. A network that converges quickly can better compensate for unexpected outages. 56
57 One last note about route tables In addition to destination, mask, and gateway, most routers have one other field in their route tables, which was not previously mentioned. This field is a source field, which indicates how a route was obtained, whether statically or by a routing protocol. Although the source of a route is very significant for network administration, it is not the focus of this tutorial. This tutorial is more concerned with the route itself, and not necessarily how it was obtained. 57
58 Routing example This example applies regardless of how the routes were learned. 58
59 Routing analysis Hosts P and Q Hosts P and Q have only one way to get off their networks, and that is to forward traffic to the router connected to their respective networks. These hosts each have a default route to a default gateway - router X or Z. Router X Router X has interfaces directly connected to networks A, B, and C, so it can route traffic between these networks w/o additional configurations. This router has only one option to get to other networks, and that is to forward traffic to router Y. So it has a default route to router Y. Router Z Router Z has interfaces directly connected to networks D, E, and F, so it can route traffic between these networks w/o additional configurations. This router has only one option to get to other networks, and that is to forward traffic to router Y. So it has a default route to router Y. Router Y Router Y automatically knows how to route traffic between networks C and D. To get to networks A and B, this router forwards traffic to router X. To get to networks E and F, this router forwards traffic to router Z. One of these routes could be made the default route. 59
60 Routing example with IP addresses added The routing analysis in the previous slide still applies. 60
61 Routing observations In the preceding diagram, the network could not have worked with classful routing. Without subnet masks, router Y would have a route to class A network via gateway This would result in all 10.x.x.x packets, that traverse router Y, being forwarded to router Z. For example, router Z would forward destination x packets to router Y, and router Y would return them to router Z. This is because router Y has no way to distinguish between and without a subnet mask. Destination x packets within router X - that is, those sourced from x - would not be affected by this phenomenon. 61
62 Route summarization Where VLSM and CIDR become truly powerful is in route summarization. This example shows 32 individual routes being summarized to a single route using a 19-bit mask, and 16 individual routes being summarized to a single route using a 20-bit mask. Route summarization results in greater routing efficiency, as each route adds a processor burden to the router. 62
63 Route summarization analysis The supernet /19 (mask ) covers addresses through While such a supernet would not be practical to service a single LAN segment, a summarized route to this supernet covers all possible addresses in the 32 individual class C networks /24 through /24. 63
64 Route summarization analysis continued The subnet /20 (mask ) covers addresses through While such a subnet would not be practical to service a single LAN segment, a summarized route to this subnet covers all possible addresses in the 16 individual subnets /24 through /24. 64
65 Routes w/ multiple IP gateways This is an example of a LAN segment that has two IP gateways to two different parts of the data network. In this configuration it is preferable that each host have two different routes - a default route to the default gateway, and a network route to the second gateway. 65
66 ICMP Redirects If the host does not have a network route to the second gateway, it can learn host routes from ICMP Redirect messages. 66
67 ICMP Redirect analysis The route learned via an ICMP Redirect message is a host route, which is a route to an individual host rather than to a network or subnet. A host route has a 32-bit mask ( ), which means that all the bits in the IP address are fixed. This makes sense because a typical network or subnet mask fixes the network bits and allows the host bits to vary. With a 32-bit mask there are no bits left to vary, so the only valid address with this mask is the single address. Thinking along these lines the mask for the default route also makes sense, because this mask allows all the bits to vary, meaning that every address is included with this mask. In most implementations the host route learned via an ICMP Redirect message is a temporary route. It remains in the route table for a few minutes and then times out. 67
68 Recommended reading RFC Internet Standard Subnetting Procedure RFC Classless Inter-Domain Routing (CIDR) RFC Address Allocation for Private Internets 68
69 2002 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. or Avaya ECS Ltd., a wholly owned subsidiary of Avaya Inc. and may be registered in the US and other jurisdictions. All trademarks identified by and are registered trademarks or trademarks, respectively, of Avaya Inc. All other registered trademarks or trademarks are property of their respective owners. 69
Objectives. Explain the different classes of IP addresses Configure IP addresses Subdivide an IP network
IP Addressing Objectives Explain the different classes of IP addresses Configure IP addresses Subdivide an IP network CCNA Guide to Cisco Networking Fundamentals, Fourth Edition 2 Objectives (continued)
LESSON Networking Fundamentals. Understand IPv4
Understand IPv4 Lesson Overview In this lesson, you will learn about: APIPA addressing classful IP addressing and classless IP addressing gateway IPv4 local loopback IP NAT network classes reserved address
3 IP Addressing. Version 2.1 T.O.P. BusinessInteractive GmbH Page 1 of 25
3 IP Addressing Version 2.1 T.O.P. BusinessInteractive GmbH Page 1 of 25 3 IP Addressing...1 3.1 The IP Address (1/4)...3 3.1 The IP Address (2/4)...3 3.1 The IP Address (3/4)...5 3.1 The IP Address (4/4)...6
Pre-assessment Questions
Pre-assessment Questions 1. Which of the following is NOT part of a data packet? a. Body b. Header c. Checksum d. Trailer 2. Which of the following protocol enables communication between applications running
Module 2: Assigning IP Addresses in a Multiple Subnet Network
Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations
IP Addressing. TomBrett.ie
IP Addressing An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Autumn Oct 21, Oct 21, 2004 CS573: Network Protocols and Standards 1 Oct 21, 2004 CS573: Network Protocols and Standards 2
IPv4 IP: Addressing, ARP, Routing Protocols and Standards Autumn 2004-2005 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics Subnetting and Supernetting ICMP Address Translation (NAT) Dynamic
Chapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols IP Version 4 The most commonly used network layer protocol is IP, or the Internet Protocol. As its name would indicate, IP is the protocol used on
Data & Computer Communications. Lecture 8. Network Layer: Logical addressing. In this lecture we will cover the following topics:
Data & Computer Communications MSCEG 425 Lecture 8 Network Layer: Logical addressing Fall 2007 1 0. Overview In this lecture we will cover the following topics: 14.Network Layer: Logical addressing 14.1
Network Layer (3): Subnetting
1 Network Layer (3): Subnetting Required reading: Kurose 4.4.2 CSE 3214, Winter 2016 Instructor: N. Vlajic 1. Introduction 2. Network Layer Protocols in the Internet 2.1 IPv4 2.2 IP Addressing and Subnetting
Chapter 2 NETWORK LAYER
Chapter 2 NETWORK LAYER This chapter provides an overview of the most important and common protocols associated with the TCP/IP network layer. These include: Internet Protocol (IP), Routing protocols Routing
Advanced IP Addressing
Advanced IP Addressing CS-765 A Aspects Of Systems Administration Spring-2005 Instructure: Jan Schauman Stevens Institute Of Technology, NJ. Prepared By: Modh, Jay A. M.S. NIS SID: 999-14-0352 Date: 05/02/2005
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics
Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe
IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
Chapter 6 Network Communications and Protocols
Chapter 6 Network Communications and Protocols Objectives Explain the function of protocols in a network Describe common protocol suites Guide to Networking Essentials, Fifth Edition 2 Protocols Strictly
Planning the Addressing Structure
Planning the Addressing Structure Working at a Small-to-Medium Business or ISP Chapter 4 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name,
PART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
CCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
OSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
IP ADDRESSING ARCHITECTURE
IP ADDRESSING ARCHITECTURE Table Of Contents General IP Addressing Architecture Forms of IP Addresses Special forms of IP Addresses IP Addresses assignment example IP Subnetting IP Subnetting example IP
Lab 10.4.1 IP Addressing Overview
Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe
IP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Internet Protocol version 4
Internet Protocol version 4 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 Table of Contents IP Addressing Class-based IP addresses
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
The notation w.x.y.z is used when referring to a generalized IP address and shown in Figure 3.
IP Addressing Each TCP/IP host is identified by a logical IP address. The IP address is a network layer address and has no dependence on the data link layer address (such as a MAC address of a network
Module 6. Internetworking. Version 2 CSE IIT, Kharagpur
Module 6 Internetworking Lesson 2 Internet Protocol (IP) Specific Instructional Objectives At the end of this lesson, the students will be able to: Explain the relationship between TCP/IP and OSI model
Understanding the TCP/IP Internet Layer
Lesson 4 Understanding the TCP/IP Internet Layer Overview Objectives There are various aspects to IP addressing, including calculations for constructing an IP address, classes of IP addresses designated
IP Address. Heng Sovannarith
IP Address Heng Sovannarith heng_sovannarith@yahoo.com Introduction An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. Every machine on the Internet
Introduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 6 : VLSM and CIDR Chapter 7 : RIPv2 Chapter 1 2 VLSM and CIDR Routing
Networking Basics. Version: 447. Copyright 2007-2010 ImageStream Internet Solutions, Inc., All rights Reserved.
Version: 447 Copyright 2007-2010 ImageStream Internet Solutions, Inc., All rights Reserved. Table of Contents Networking Basics...1 Networking Basics...1 Introduction...1 Network Addressing...1 IP Addressing...1
TCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing
CE363 Data Communications & Networking Chapter 6 Network Layer: Logical Addressing TCP/IP and OSI model APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT NETWORK Host-Network TRANSPORT NETWORK DATA
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
Subnetting IPv4 and IPv6
Subnetting IPv4 and IPv6 Advanced Networking: Routing & Switching 1 Chapter 9 Copyleft 2013 Hacklab Cosenza (http://hlcs.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
GeorgeAlmeida.com. Learn IP Subnetting in 15 minutes
GeorgeAlmeida.com Learn IP Subnetting in 15 minutes George Almeida 3-8-2015 Contents Preface... 2 Terms and Definitions... 3 Introduction... 3 Obtaining an IP Address for the Internet... 4 Verifying TCP/IP
http://computernetworkingnotes.com/ccna-study-guide/basic-of-network-addressing.html
Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer on network has an IP address that represent its location on network. Two version
Internet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
Network and Host Addresses 1.3. 2003, Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4
IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a 32-bit logical address known as an IP address. This topic introduces the components of an IP address.
Objectives. Upon completing this chapter, you will be able to
1358_fmi.book Page 30 Thursday, May 27, 2004 2:21 PM Objectives Upon completing this chapter, you will be able to Create and configure IPv4 addresses Understand and resolve IP addressing crises Assign a
Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management
Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Network layer. Data Link Layer Network Interface Card TCP 1 TCP 2 UDP. TCP IP Interface UDP IP Interface RSVP ARP ICMP
Network layer The Network Layer ( layer 3 ) is made of IP and a large number of auxiliary protocols. Some of the auxiliary protocols do not fit very well into the OSI stack structure. Application Application
Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Outline TCP/IP Protocol Suite 2 5-1 INTRODUCTION The
Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University
Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to
Lab#2: IP Addressing and Subnetting
IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
CHAPTER 2 LITERATURE REVIEW
CHAPTER 2 LITERATURE REVIEW 2.1 Routing Process Routers are amongst the most crucial components of the internet, as each bit of information on the internet passes through many routers [2]. Routing is the
Chapter 19 Network Layer: Logical Addressing 19.1
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
CONFIGURING TCP/IP ADDRESSING AND SECURITY
1 Chapter 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security
Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010
IPv4 Addressing There are several non-profit organizations in the world that have the authority for assigning IP addresses to institutions that need access to the Internet. These organizations are (for
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Networking IP and Convergence: Advanced TCP
coursemonster.com/me Networking IP and Convergence: Advanced TCP View training dates» Overview This is an in depth technical course that covers the TCPIP protocols in more detail than the Introduction
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Classful IP Addressing (cont.)
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.
APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is
The Subnet Training Guide
The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP
VLSM CERTIFICATION OBJECTIVES Q&A. Two-Minute Drill Self Test VLSM 8.02 Route Summarization
8 VLSM CERTIFICATION OBJECTIVES 8.01 VLSM 8.02 Route Summarization Q&A Two-Minute Drill Self Test 228 Chapter 8: VLSM In Chapter 7, you were introduced to IP addressing and subnetting, including such topics
IP Subnetting. Subnetting
IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network
IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification
IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services IP Networking,
Ch.9 Classless And Subnet Address Extensions (CIDR)
CSC521 Communication Protocols 網 路 通 訊 協 定 Ch.9 Classless And Subnet Address Extensions (CIDR) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Review Of Relevant Facts 3. Minimizing Network Numbers
256 4 = 4,294,967,296 ten billion. 256 16 = 18,446,744,073,709,551,616 ten quintillion. IP Addressing. IPv4 Address Classes
IP Addressing With the exception of multicast addresses, Internet addresses consist of a network portion and a host portion. The network portion identifies a logical network to which the address refers,
WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know
WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3
TCP/IP NETWORK DESIGN
CHAPTER 8 TCP/IP NETWORK DESIGN Concepts Reinforced Classful addressing Subnet masks Concepts Introduced Classless addressing Reserved subnets Extended Network Prefixes Route summarization Internet structure
CS5008: Internet Computing
CS5008: Internet Computing Lecture 10: IP Part II IP Addressing A. O Riordan, 2009, latest revision 2016 Some slides based on Fitzgerald and Dennis, and Tanenbaum IP Address Notation IPv4 addresses are
IP: Internet Addressing
IP: Internet Addressing 1 Topics Covered Introduction Addresses for the Virtual Internet The IP Addressing Scheme The IP Address Hierarchy Original Classes of IP Addresses Dotted Decimal Notation Division
Lab 3-1 assignment check list **Please post your answers on the bulletin board. **
Lab 3-1 assignment check list **Please post your answers on the bulletin board. ** Lab 3.1 o Questions 3.1.1 Lab 3.2 o Questions 3.2.1 Lab 3.3 o Questions 3.3.1 o Questions 3.3.2 o Questions 3.3.3 Lab
We Are HERE! Subne\ng
TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
IP Addressing IP Addressing Tópicos Avançados de Redes
IP Addressing 1 IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting CIDR IP Version 6 addresses 2 IP Addresses 32 bits version (4
Part2. Chapter 8. Advanced TCP/IP Network Design - CLASSLESS ADDRESSING AND VARIABLE- LENGTH SUBNET MASKS
Part2 Chapter 8 Advanced TCP/IP Network Design - CLASSLESS ADDRESSING AND VARIABLE- LENGTH SUBNET MASKS Variable-Length Subnet Masks Variable-length subnet masks specified how a single network ID could
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
IP Basics Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA
IP Basics Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA hervey@nsrc.org Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of
Chapter 3: IP Addressing and VLSM
Chapter 3: IP Addressing and VLSM QUESTION 54 What is the principle reason to use a private IP address on an internal network? A. Subnet strategy for private companies. B. Manage and scale the growth of
SOLUTIONS PRODUCTS TECH SUPPORT ABOUT JBM Online Ordering
SOLUTIONS PRODUCTS TECH SUPPORT ABOUT JBM Online Ordering SEARCH TCP/IP Tutorial This tutorial is intended to supply a brief overview of TCP/IP protocol. Explanations of IP addresses, classes, netmasks,
Introduction to Computer Networking
Introduction to Computer Networking Dale Callahan, Ph.D., P.E. 6.1 Review MODULE 6: IP Addressing Scheme As explained in module 4, an IP address is a 32-bit number (4 bytes) that is used to identify a
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
COMP9332 Network Routing & Switching
COMP9332 Network Routing & Switching IPv4 Addressing http://www.cse.unsw.edu.au/~cs9332/ 1 Lecture overview Key concepts Classful addressing Network mask Subnetting Supernetting Classless addressing Reference:
9025- TCP/IP Networking. History and Standards. Review of Numbering Systems. Local Signaling. IP Addressing
9025- TCP/IP Networking History and Standards ARPA NCP TCP, IP, ARPANET PARC Collaborative Network Requirements One Protocol? Peer-to-Peer Protocols Documentation and RFCs RFC Categories Where to Find
Network Layer: Logical Addressing
CHAPTER 19 Network Layer: Logical As we discussed in Chapter 2, communication at the network layer is host-to-host (computer-to-computer); a computer somewhere in the world needs to communicate with another
CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
Objectives. Introduction. Classful IP Addressing. IPv4 Classful Addressing Structure (RFC 790)
1 Objectives VLSM and CIDR Routing Protocols and Concepts Chapters 6 and 7 Compare and contrast classful and classless IP addressing. Review VLSM and explain the benefits of classless IP addressing. Describe
IP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Module 1. IP/MAC Addresses and TCP/IP Suite
Module 1 IP/MAC Addresses and TCP/IP Suite Dr. Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Module 1 Topics 1.1 MAC Address 1.2 Class-based IP
VLSM and CIDR Malin Bornhager Halmstad University
VLSM and CIDR Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Classless routing VLSM Example of a VLSM calculation 2 Classless routing CIDR (Classless