Subnetting,Supernetting, VLSM & CIDR



Similar documents
Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network Layer: Address Mapping, Error Reporting, and Multicasting

8.2 The Internet Protocol

04 Internet Protocol (IP)

Lecture Computer Networks

Troubleshooting Tools

Network layer: Overview. Network layer functions IP Routing and forwarding

Technical Support Information Belkin internal use only

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP addressing and forwarding Network layer

IP - The Internet Protocol

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

NETWORK LAYER/INTERNET PROTOCOLS

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Instructor Notes for Lab 3

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Unix System Administration

Lecture 8. IP Fundamentals

IP Addressing A Simplified Tutorial

Internet Protocols. Addressing & Services. Updated:

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Internet Protocols Fall Lectures 7-8 Andreas Terzis

- IPv4 Addressing and Subnetting -

RARP: Reverse Address Resolution Protocol

Компјутерски Мрежи NAT & ICMP

Internet Addresses (You should read Chapter 4 in Forouzan)

(Refer Slide Time: 02:17)

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

PART IV. Network Layer

Network Layer: Network Layer and IP Protocol

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Future Internet Technologies

IP Subnetting and Addressing

Ethernet. Ethernet. Network Devices

ICS 351: Today's plan

Internet Control Protocols Reading: Chapter 3

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

IP Addressing Introductory material.

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IP address format: Dotted decimal notation:

Subnetting/Supernetting and Classless Addressing

Transport and Network Layer

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

IP Routing Features. Contents

SLIP and PPP. Gursharan Singh Tatla

NetFlow Subinterface Support

2. IP Networks, IP Hosts and IP Ports

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Data Link Protocols. TCP/IP Suite and OSI Reference Model

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com

Datacommunication. Internet Infrastructure IPv4 & IPv6

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

High-Level Data Link Control

How do I get to

ACHILLES CERTIFICATION. SIS Module SLS 1508

Savera Tanwir. Internet Protocol

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Introduction to IP networking

Module 2: Assigning IP Addresses in a Multiple Subnet Network

AS/400e. TCP/IP routing and workload balancing

Internet Architecture and Philosophy

TCP/IP Network Essentials. Linux System Administration and IP Services

Network Security TCP/IP Refresher

Introduction to Analyzer and the ARP protocol

IP Subnetting. Subnetting

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

iseries TCP/IP routing and workload balancing

Internet Protocols. Background CHAPTER

Chapter 4 Network Layer

Chapter 11. User Datagram Protocol (UDP)

Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37

IP Addressing. IP Addresses. Introductory material.

Internet Protocol Address

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Networking Test 4 Study Guide

Chapter 13 Internet Protocol (IP)

Computer Networks/DV2 Lab

Chapter 9. IP Secure

Additional Information: A link to the conference website is available at:

LAB THREE STATIC ROUTING

CCNA Tutorial Series SUBNETTING

Basic Operation & Management of TCP/IP Networks

Transcription:

Subnetting,Supernetting, VLSM & CIDR

WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion

CLASSFULL ADDRESSING IP address space is divided into five classes: A, B, C, D, and E.

Network and Host IDs Each IP address is divided into two parts Network part, defined by netid identifies a network Host part, defined by hostid identifies a host within a network

Class A Address 0 NET HOST HOST HOST Network Bits = 7 No.of Networks = 2 7 1 = 127 Host Bits = 24 No.of Host/NW = 2 24 2 = 16 Million Range : 0.0.0.0 to 127.255.255.255

Class B Address 10 NET NET HOST HOST Network Bits = 14 No.of Networks = 2 14 1 = 16,383 Host Bits = 16 No.of Host/NW = 2 16 2 = 65,234 Range : 128.0.0.0 to 191.255.255.255

Class C Address 110 NET NET NET HOST Network Bits = 21 No.of Networks = 2 21 1 = 2 Million Host Bits = 8 No.of Host/NW = 2 8 2 = 254 Range : 192.0.0.0 to 223.255.255.255

Special Purpose IP Addresses Private IP Address Default NW Address Broadcast Address Loopback Address

Private IP Addresses Private addresses are not recognized globally Private address often used together with NAT techniques

Other Special Addresses There are several addresses within each class that are reserved for such special purposes as broadcast.

Direct Broadcast Direct broadcast sends a message to all the hosts within a specific network. Direct broadcast address consists of network id followed by all 1s.

Limited Broadcast Limited broadcast sends a message to all the hosts within THIS network. Limited broadcast address consists of all 1s.

This Host on This network The network address that consists of all 0s indicates this host on this network. Used at the bootstrap time when host does not know its IP address. This address is used as a source address in limited broadcast message to determine its IP address. Can only be used as a source address.

Specific Host on This network The network address that consists of all 0s for netid and specific value for hostid is destined to a specific host on THIS network Used a host to send a message to another host on same network. This address can only be used as destination Usually class A addresses

Loopback Address IP address with first byte value of 127 is used for the loopback address. Packets with such destination address never leave the machine Loopback can be used only as destination address Loopback is class A address which reduces the number of class A addresses by 1 block Loopback address can be used for Testing IP software, Sending a message between client and server programs located on the same machine, etc

SUBNETTING & NETMASKS

SUBNETTING WHAT Subnetting is dividing a network into several smaller parts (subnets), each having its own sub-network address. Traditional Internet uses two-level address hierarchy: netids and hostids Subnetting provides another, third, level of hierarchy. Network Portion Subnet Portion Host Portion

SUBNETTING WHY More EFFICIENT & STRUCTURED utilization of IP Address In subnets we use Subnet Mask or NetMask

SUBNET MASK OR NETMASK WHAT A Bit stream of Contiguous ONES & ZEROS WHY Its used to determine network part of the address for a given IP address.

SUBNET MASK OR NETMASK TYPES Natural / Default Network Mask Custom / Subnet Mask

Creating Subnets Using Masks WE EXTEND THE NETWORK PORTION INTO HOST Mask is a 32 bit number that consists of Consecutive 1s indicating bits that belong to the network part of address followed by Consecutive 0s indicating bits that do not belong to network part of the address Bit-wise AND operation between the IP address and mask results in the network part of the address

Subnet Masks Subnet masks operate the same way as default masks. Unlike default classful masks, subnet masks are required to identifying the subnetwork.

SUPERNETTING

SUPERNETTING Supernetting is combining several small networks (e.g. of class C) into a big one to create a large range of addresses.

Supernetting In supernetting, the first address of the supernet and the supernet mask define the range of addresses. CIDR notation is applicable to suppernetting as well. For example: 201.12.192.3/21 Shows that address belongs to supernet of class C networks with mask 255.255.248.0 Since 248 = 11111000, 8 class C networks were combined together to create a supernet.

VLSM Variable Length Subnet Mask

VLSM - Purpose To increase usability of Subnets Using classical subnetting the subnets are of same size Using VLSM the subnets can be of VARIABLE SIZE

VLSM Eg : a Class C, NW need to be divided into 110,45,50 Hosts? Available Options 1 : Natural NW Mask Class C is 255.255.255.0 Which will provide nothin but 254 hosts under 1 NW

VLSM Eg : a Class C, NW need to be divided into 110,45,50 Hosts? Available Options 2 : The Subnet Mask of the form 255.255.255.X X(in Binary) X No of Subnets No of Hosts 1000 0000 128 2 128 1100 0000 192 4 64 1110 0000 224 8 32 1111 0000 240 16 16 1111 1000 248 32 8 1111 1100 252 64 4

VLSM -option Eg : a Class C, NW need to be divided into 110,45,50 Hosts? > Hierarchical Subnetting

ARP ARP Cache Package

Encapsulation of ARP packet

Hardware Type Protocol Type Hardware Length Protocol Length Sender Hardware address Operation Sender Protocol address Target Hardware address Target Protocol address

ARP Packet Format Hardware Type Protocol Type Hardware Length Protocol Length Sender Hardware address Operation Sender Protocol address Target Hardware address Target Protocol address

Proxy ARP

ARP Package

ARP Package Cache Table Queues Output Module Input Module Cache Control Module

ARP Cache Table STATE H/W Type Protcol Type H/W Length Protcol Length I/F Num Q Num Attempt TO H/W Addr Protcl Addr Res Pen Free

ICMP Internet Control Message Protocol

Why ICMP

What it Does IP Deficiencies Lack of Error Control Lack of Assistance Mechanisms I C M P Error Reporting Query Messages

ICMP TYPES OF MESSAGES MESSAGE FORMAT ERROR REPORTING MSG QUERY MSG ICMP PACKAGE

ICMP Encapsulation

ICMP Encapsulation ARP Reply / Request

ICMP TYPES OF MESSAGES MESSAGE FORMAT ERROR REPORTING MSG QUERY MSG ICMP PACKAGE

ICMP TYPES OF MESSAGES

ICMP MESSAGE TYPES

ICMP MESSAGE FORMAT ERROR REPORTING MSG QUERY MSG

General format of ICMP messages Category Type Message Error Reporting Messages Query Messages 3 Destination Unreachable 4 Source Quench 11 Time Exceed 12 Parameter Problem 5 Redirection 8 / 0 Echo Req / Rep 13 / 14 Timestamp Req / Rep

ICMP MESSAGE FORMAT ERROR REPORTING MSG QUERY MSG

Error Reporting Messages ICMP always reports error messages to the original source 1. No ICMP error message for a datagram carrying an ICMP error message. 2. No ICMP error message for a fragmented datagram that is not the first fragment. 3. No ICMP error message for a datagram having a multicast address. 4. No ICMP error message for a datagram with a special address such as 127.0.0.0 or 0.0.0.0.

Error reporting message Types

Destination Unreachable

CODE 0 : Network Unreachable CODE 1 : Host unreachable CODE 2 : Protocol Unreachable CODE 3 : Port Unreachable CODE 4 : Fragmentation is required, but DF (do not Frag) is enabled CODE 5 : Source routing enabled, but couldn t accomplish CODE 6 : Dest N/W is unknown CODE 7 : Dest Host is unknown CODE 8 : Source Host Isolated CODE 9 : Dest N/W is administratively Prohibited CODE 10 : Dest Host is administratively Prohibited

CODE 11 : Network Unreachable for a specified type of service CODE 12 : Host Unreachable for a specified type of service CODE 13 : Communication administratively prohibited (administrative filtering prevents packet from being forwarded) CODE 14 : Host precedence violation (permission denied for the combination of host or network and port) CODE 15 : Precedence cutoff in effect (precedence of datagram is below the level set by the network administrators)

CODE 11 : Network Unreachable for a specified type of service CODE 12 : Host Unreachable for a specified type of service CODE 13 : Communication administratively prohibited (administrative filtering prevents packet from being forwarded) CODE 14 : Host precedence violation (permission denied for the combination of host or network and port) CODE 15 : Precedence cutoff in effect (precedence of datagram is below the level set by the network administrators)

Error reporting message Types

Source Quench

Source Quench A source quench message informs the source that a datagram has been discarded due to congestion in a router or the destination host. The source must slow down the sending of datagrams until the congestion is relieved. One source quench message is sent for each datagram that is discarded due to congestion.

Error reporting message Types

Time Exceeded

Time Exceeded Whenever a router decrements a datagram with a time to live value to zero, it discards the datagram and sends a time exceeded message to the original source. When the final destination does not receive all of the fragments in a set time, it discards the received fragments and sends a timeexceeded message to the original source.

Error reporting message Types

Parameter problem message Code 0 : Error on Header (Value of pointer points to the byte with problem) Code 1 : Options missing

Error reporting message Types

Redirection Message

Redirection Concept

Query message Types

Echo Request Reply Message

Echo Request Reply An echo request message can be sent by a host or router. An echo reply message is sent by the host or router which receives an echo request message. Echo request and echo reply messages can be used by network managers to check the operation of the IP protocol. Echo request and echo reply messages can test the reachability of a host. This is usually done by invoking the ping command.

Timestamp Request Reply Message

Timestamp Request Reply Message Timestamp request and timestamp reply messages can be used to calculate the round trip time between a source and a destination machine even if their clocks are not synchronized. The timestamp request and timestamp reply messages can be used to synchronize two clocks in two machines if the exact one way time duration is known.

Checksum In ICMP the checksum is calculated over the entire message (header and data).

Lets have an example of checksum calculation for a simple echorequest message. We randomly chose the identifier to be 1 and the sequence number to be 9. The message is divided into 16 bit (2 byte) words. The words are added together and the sum is complemented. Now the sender can put this value in the checksum field.

DEBUGGING TOOLS Ping Traceroute

PING The ping program to test the server fhda.edu. The result is shown below $ ping fhda.edu PING fhda.edu (153.18.8.1) 56 (84) bytes of data. 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=0 ttl=62 time=1.91 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=1 ttl=62 time=2.04 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=2 ttl=62 time=1.90 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=3 ttl=62 time=1.97 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=4 ttl=62 time=1.93 ms

PING 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=5 ttl=62 time=2.00 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=6 ttl=62 time=1.94 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=7 ttl=62 time=1.94 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=8 ttl=62 time=1.97 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=9 ttl=62 time=1.89 ms 64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=10 ttl=62 time=1.98 ms --- fhda.edu ping statistics --- 11 packets transmitted, 11 received, 0% packet loss, time 10103ms rtt min/avg/max = 1.899/1.955/2.041 ms

Traceroute We use the traceroute program to find the route from the computer voyager.deanza.edu to the server fhda.edu : $ traceroute fhda.edu traceroute to fhda.edu (153.18.8.1), 30 hops max, 38 byte packets 1 Dcore.fhda.edu (153.18.31.254) 0.995 ms 0.899 ms 0.878 ms 2 Dbackup.fhda.edu (153.18.251.4) 1.039 ms 1.064 ms 1.083 ms 3 tiptoe.fhda.edu (153.18.8.1) 1.797 ms 1.642 ms 1.757 ms

ICMP PACKAGE

SLIP & POINT TO POINT PROTOCOL

Serial Line IP Protocol SLIP - SLIP is a standard protocol for point-topoint serial connections, using TCP/IP. SLIP was a predecessor of PPP. PROBLEM WITH SLIP PROTOCOL No Error detection. It supports only IP. It is not possible to dynamically assign the address during the set up. Slip does not provide any Authentication. It is not approved internet standard.

POINT TO POINT PROTOCOL PPP provides router to router and host to network connections over synchronous and asynchronous circuits. SERVICES PROVIDED BY PPP: The PPP protocol can operate over a full duplex point to point transmission link as well as over asynchronous links. The PPP was an improvement over the SLIP.

PPP TRANSITIONSTATES 1.DEAD: It means that the link is not being used. 2.ESTBLISHING: When one of the end machine starts the communication, the connection goes into the establishing state. 3.AUTHENATICATING: The user sends the authenticate request packet & includes the user name & password. 4.NETWORKING: The exchange of user control and data packets can started. 5.TERMINATING: The users sends the terminate the link. With the reception of the terminate.

PPP STACK PPP is a data link protocol. But it uses stack of other protocols in order to establish the link, to authenticate the users and to carry the network layer data. 1.Link Control Protocol (LCP). 2.Authenticating Protocols. 3.Network Control Protocols (NCP).

PPP Stack

PPP STACK FLAG: The PPP frame always begins & Ends with the Boundary 01111110 ADDRESS: Since PPP is used for a point to point connection, it uses the broadcast address used in most LAN to avoid a data link address in the protocol. CONTROL: This field uses the value 11000000 to show that the frame does not contain any sequence numbers and Its Independent PROTOCOL: It defines what type of data is being carried in the data field DATA FIELD: It carries the user data or other information. FCS: The Frame Check Sequence is simply a2 or 4 byte CRC used for error detection