Section #6: Addressing



Similar documents
Planning for Information Network

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises a, b, c and d

Networking Basics for Automation Engineers

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

IP Subnetting and Addressing

How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing

Lab IP Addressing Overview

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

PART IV. Network Layer

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

ICS 351: Today's plan

Classful IP Addressing (cont.)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

1. How many unique network IDs are there in class A addresses? # of unique hosts?

How To Make A Network Address Prefix Smaller

CCNA Tutorial Series SUBNETTING

Type of addressing in IPv4

LAN TCP/IP and DHCP Setup

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Source net: Destination net: Subnet mask: Subnet mask: Router Hub

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

IP Addressing A Simplified Tutorial

Variable length subnetting

IP Addressing Introductory material.

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Subnet + CIDR. Internet Networking recitation #1. 11: , Internet Networking,

IP Addressing. IP Addresses. Introductory material.

Number of bits needed to address hosts 8

Pre-lab Preparation: 1. Read thoroughly and prepare the experiment sheet. 2. You must bring a printed copy of this experiment with you to the lab.

Table of Contents 1 IP Addressing Configuration 1-1

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Lab a Basic Subnetting

Chapter 19 Network Layer: Logical Addressing 19.1

Module 4, Assignment 3-2

Scalable Linux Clusters with LVS

5. Classless and Subnet Address Extensions 최 양 희 서울대학교 컴퓨터공학부

Enabling NAT and Routing in DGW v2.0 June 6, 2012

3201 Computer Networks 2014/2015 Handout: Subnetting Question

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Instructor Notes for Lab 3

(Refer Slide Time: 02:17)

Basic Network Configuration

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37

Savera Tanwir. Internet Protocol

VLSM and CIDR Malin Bornhager Halmstad University

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Answers to Sample Questions on Network Layer

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP


SUBNETS, CIDR, AND CLASSLESS ADDRESSING

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

SYMETRIX SOLUTIONS: TECH TIP April 2014

8.2 The Internet Protocol

2. IP Networks, IP Hosts and IP Ports

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

Table of Contents. Cisco IP Addressing and Subnetting for New Users

Question Question Question EdTech 552: Lab 3 Answer Sheet

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

TCP/IP Basis. OSI Model

Configuring Network Address Translation (NAT)

Networking Test 4 Study Guide

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

How Your Computer Accesses the Internet through your Wi-Fi for Boats Router

Exam 1 Review Questions

Internet Addresses (You should read Chapter 4 in Forouzan)

Device Interface IP Address Subnet Mask Default Gateway

Internet Protocol Address

The Subnet Training Guide

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Polycom. RealPresence Ready Firewall Traversal Tips

Network layer: Overview. Network layer functions IP Routing and forwarding

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Chapter 3: IP Addressing and VLSM

Subnetting Examples. There are three types of subnetting examples I will show in this document:

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

Subnetting/Supernetting and Classless Addressing

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Lab#2: IP Addressing and Subnetting

Internetworking and IP Address

We Are HERE! Subne\ng

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Lab Configuring Access Policies and DMZ Settings

Transcription:

Section #6: Addressing Problem 1: Routing entries Consider the following routing table for router A, given in CIDR ( slash-n ) notation: 56.162.0.0/15: Port 0 56.164.0.0/15: Port 1 56.166.0.0/16: Port 2 56.167.0.0/16: Port 3 Default: Port 4 a) What is the range of IP addresses in each of the subnets? Convert each to binary representation and identify what the network prefix is, as well as the subnet mask. 56.162.0.0/15: Binary Representation: 00111000.10100010.0000000.00000000 Subnet Mask: 11111111.11111110.00000000.00000000 (255.254.0.0) Address Range: 56.162.0.0 to 56.163.255.255 (inclusive) 56.164.0.0/15: Binary Representation: 00111000.10100100.0000000.00000000 Subnet Mask: 11111111.11111110.00000000.00000000 (255.254.0.0) Address Range: 56.164.0.0 to 56.165.255.255 (inclusive) 56.166.0.0/16: Binary Representation: 00111000.10100110.0000000.00000000 Subnet Mask: 11111111.11111111.00000000.00000000 (255.255.0.0) Address Range: 56.166.0.0 to 56.166.255.255 (inclusive) 56.167.0.0/16: Binary Representation: 00111000.10100111.0000000.00000000 Subnet Mask: 11111111.11111111.00000000.00000000 (255.255.0.0) Address Range: 56.167.0.0 to 56.167.255.255 (inclusive)

b) Suppose a packet arrives to router A with destination 56.163.17.8. What port will router A send the packet out on? Port 0 c) Draw the LPM (longest prefix match) tree 1 for router A. For brevity, only the 2nd octet is shown in the tree. The 1st octet is 00111000, as above, and the 3rd and 4th octets are wild cards. 1 These trees are equivalent to the tries you may have seen in other courses.

d) Now suppose that Router A is advertising its routes to another router, router B (shown in the diagram below). What routes will Router A advertise? Remember to aggregate routes, if possible. The routing entrys for 56.166.0.0/16 and 56.167.0.0/16 can be aggregated into a single advertisement for 56.166.0.0/15 (in the tree, this is equivalent to combining the two bottom right leafs into their parent node). Then, 56.166.0.0/16 can be combined with 56.164.0.0/16 to create a single advertisement for 56.164.0.0/15. The last subnet cannot be aggregated, leaving 56.164.0.0/14 and 56.162.0.0/15. Problem 2: Network Address Translation and DHCP: What s the difference? You ve been hired by Scott Shenker to set up a network for use by his 32 graduate students. a) Suppose Scott wants to assign each graduate student their own, unique address. What is the smallest address space that will accommodate all of his graduate students? Give an example subnet, in CIDR notation, that will allow exactly one address per graduate student. Scott needs 2^5 = 32 unique addresses, which corresponds to a /27 subnet. Any /27 subnet is an acceptable answer here; for example, 42.76.3.224/27. b) Money is tight and Scott decides to sell half of his address space. i) Assuming Scott owns the subnet you named in part (a), what subnet(s) can Scott sell? Scott can sell either of the /28 subnets associated with the /27 subnet named above. For the example given here, Scott can sell 42.76.3.224/28 or 42.76.3.240/28. ii) Scott insists that he still wants each of his graduate students to get their own, publicly accessible IP address when they are using the network. He also mentions that no more

than half of his graduate students are using the network at any given time. How can you set up his network to meet these requirements? You should set up Scott s network to use DHCP. DHCP assigns temporary addresses to hosts while they are using the network (see lecture slides for details). c) Scott hires a new professor in his lab, Sylvia Ratnasamy. Sylvia needs network addresses for her graduate students, so in his infinite generosity, Scott decides to give all but one of his IP addresses to Sylvia. What should you do now to allow all of Scott s graduate students to access the internet? You should recommend to 31 of Scott s students that they switch advisor to Sylvia. You should set up Scott s network to use network address translation (NAT). A NAT box that sits between Scott s graduate students and the internet assigns each user an internal IP address (there are special IP address blocks designated for internal addressing, e.g. 10.0.0.0/8). When internal users send packets out into the internet, a NAT box translates internal addresses to external addresses using a port mapping. For example, assume the one address Scott kept is 42.76.3.224. If Panda sends a packet from internal address 10.0.0.5, port 33122, the NAT box assigns a port to this connection, e.g., port 100. The NAT box assigns unique ports to each client connection. After choosing a port, the NAT box re-writes the source address in Panda s packet to be 42.76.3.224:100 (IP address 42.76.3.224, port 100), stores this mapping, and sends the packet on its way. When the NAT box receives incoming packets to 42.76.3.224:100, it looks up this address in its map of external to internal addresses, and then rewrites the destination address to be the corresponding internal address, 10.0.0.5:33122. d) Panda, one of Scott s graduate students, likes to run an internet chat application (Pandachat) to chat with other graduate students when he is in the office. Panda-chat listens for incoming chats on port 33122 and displays them on the screen. If the user replies to a chat received using Panda-chat, Panda-chat sends the reply to the IP address and port given in the original chat. i) After you ve implemented your solution in part (c), Panda sends a chat to Colin, who also runs Panda-chat. Colin is not on Scott s network, and has a public IP address (164.23.1.8). Will Panda be able to send a chat message to Colin? If so, explain how this will work. If not, explain why not. Yes. Panda sends the chat to 164.23.1.8:33122, which is a public address. Colin is running Panda-chat on port 33122, so receives the message. ii) Colin replies to Panda s chat. Will Panda receive the reply? If so, explain how this will work. If not, explain why not. Yes. When Panda sent the chat in part (i), the NAT that you configured assigns a public IP address and port to the connection. For example, if Panda s internal address is

10.0.0.5, the NAT might map internal address 10.0.0.5:33122 to external address 42.76.3.224:100 (as in the example in part (c)). When Colin replies to the chat, Pandachat sends Colin s reply to 42.76.3.224:100. The NAT translates this address to 10.0.0.5:33122, which is where Panda-chat is listening for new chats on Panda s machine, so Panda receives the message. iii) Later, Thurston attempts to send a chat to Panda. Thurston also has a public IP address (123.4.5.6). Will Thurston be able to send a chat message to Panda? If so, explain how this will work. If not, explain why not. No, because Thurston has no way of knowing which port to use to send packets to Panda s chat client. The only way Thurston can find this out is if Panda initiates a connection with Thurston (as in part ii). iv) How can you re-configure the network to allow Panda to use Panda-chat? You can set up a port mapping in the NAT box such that packets to port 33122 are always directed to port 33122 on Panda s machine.