SlideShare uma empresa Scribd logo
1 de 113
TCP/IP Basics




  Chapter 7
Objectives
• Describe how the Internet Protocol works
• Explain CIDR and subnetting
• Describe the functions of static and dynamic
  IP addresses
Overview
Moving up the OSI Layers
• Chapters 3 through 6 detailed Layers 1 and 2
• Ethernet network technology
• Now explore the software side of networking
  – Individual rule is a protocol
  – A protocol suite is a set of rules
• Begin with Internet Protocol (IP) of TCP/IP
Three Parts to Chapter 7
• IP in Depth
• CIDR and Subnetting
• Using IP Addresses
IP in Depth
IP in Depth
• TCP/IP suite supports both simple and
  complex networks
  – Small LAN
  – Multiple LANs interconnected into a WAN
• TCP/IP on LAN over Ethernet
  – On small network, sending computer broadcasts
    using MAC address ff-ff-ff-ff-ff-ff to obtain
    recipient’s MAC address
  – Broadcasting is disastrous to a large network
Figure 7.2 PC broadcasting for a MAC address
Figure 7.3 Broadcasting won’t work for the

            entire Internet
• TCP/IP on LAN over Ethernet
  – IP addressing overcomes limits of Ethernet MAC
    addresses
     • Unique IP address per host
     • Unique address per logical network
     • Communicate between LANs without broadcasts
• IP Addresses (IPv4 only]
  – 32-bit value
     • Example: 11000000101010000000010000000010
     • Broken into four groups of eight
       11000000.10101000.00000100.00000010
     • Each 8-bit value convertsed into a decimal number
       between 0 and 255
• Binary to Decimal Conversion
     Binary        Decimal       Binary     Decimal
    00000000           0         11111000    248
    00000001           1         11111001    249
    00000010           2         11111010    250
    00000011           3         11111011    251
    00000100           4         11111100    252
    00000101           5         11111101    253
    00000110           6         11111110    254
    00000111           7         11111111    255
    00001000           8
   skip a bunch   skip a bunch
• IP Addresses (IPv4 only]
  – Converted:
    11000000101010000000010000000010
    is displayed as 192.168.4.2 in dotted decimal
    notation (dotted-octet numbering system)
  – Know how to convert dotted decimal to binary
    and back
     • Every OS has a calculator
• Using a Calculator for conversion
  – Decimal to binary
     • Enter value in decimal view
     • Switch to binary view to convert value
     • Leading zeroes do not display in Calculator
     • Leading zeroes important when working with IP
       addresses
Figure 7.4 Macintosh OS X Calculator in
           Programmer mode
Figure 7.5 Converting decimal to binary with

            Windows Vista’s Calculator
• Every MAC address must be unique
• Every IP address must be unique
Figure 7.6 Small network with both IP

            and MAC addresses
• Utilities for displaying IP and MAC addresses
  – Every OS has at least one GUI tool
     • Mac OS X system’s Network utility
     • Windows Local Area Connection Properties
  – Every OS has a command-line utility
     • Windows has IPCONFIG
     • UNIX/Linux/Mac use IFCONFIG
Figure 7.7 Macintosh OS X Network utility
Figure 7.8 ipconfig/all
Figure 7.9 IFCONFIG in Ubuntu
• IP Addresses in Action
  – IP must do three things
     1. Give each LAN its own identifier
     2. Allow routers connecting LANs to use network
        identifiers to send packets to the right network
     3. Give each computer a way to understand when a
        packet is intended for a computer on the local LAN or
        for a computer on the WAN
1. IP must give each LAN its own identifier
  – Network IDs
     • All computers on same LAN must have same network ID
     • Each computer on same LAN must have a unique host ID
     • Example: 192.168.5.x represents addresses in Figure 7.10
        – Network address of this network is 192.168.5.0 (assuming a 24-
          bit mask)
        – Network ID plus Host ID = one IP address.
Figure 7.10 IP addresses for a LAN
2. IP must allow routers connecting LANs to use
   network identifiers to send packets to the
   right network
  – Interconnecting
     •   Requires a router connection
     •   Router requires a network connection and IP
         address on each LAN
         – IP address of router’s connection to a LAN is the
           default gateway for that LAN
         – Network administrators often give lowest host
           address in the network to the router
Figure 7.11 LAN with router
– Interconnecting (cont.)
   • Router uses a built-in router table
      – Uses this to determine where to send packets
      – How router uses routing table:

    Everything for 192.168.5.0   Everything else goes out
    goes out 192.168.5.1         14.23.54.223
Figure 7.12 Router diagram
Figure 7.13 LAN, router, and the Internet
– Interconnecting (cont.)
   • Limitations of using 192.168.5.0 as host ID
      – Limited to 192.168.5.1 through 192.168.5.254
        (254 addresses)
   • Network ID of 170.45.0.0 has a total of 65,534 hosts
   • Network ID of 12.0.0.0 has a total of 16.7 million hosts
   • Network IDs allow router to connect multiple LANs to a
     WAN
3. IP must give each computer a way to
   understand when a packet destination
   is local or on the WAN
  – Subnet Mask
     • Sending to host on same network: broadcast for MAC address
     • Sending to host on another network: send to default gateway
     • Sending computer uses subnet mask to determine where to send
       packet
     • Example of a subnet mask using dotted-octet binary notation:
       11111111.11111111.11111111.00000000
     • Example of the same subnet mask using dotted decimal notation:
       255.255.255.0
Figure 7.14 The three amigos, separated by
            walls or miles
Figure 7.15 Sending a packet remotely
– Subnet Mask (cont.)
  • Line up an IP address with a corresponding subnet mask
    in binary
     – Portion of IP address that aligns with the ones of the
       subnet mask is the network ID of the IP address.
     – Portion of IP address that aligns with the zeroes of the
       subnet mask is the HostID of the IP address
Dotted         Binary
             Decimal

IP address  192.168.5.23    11000000.10101000.00000101.00010111
Subnet mask 255.255.255.0   11111111.11111111.11111111.00000000
Network ID  192.168.5.0            11000000.10101000.00000101.x
Host ID     x.x.x.23               x.x.x.00010111
– Subnet Mask (cont.)
  • Sending computer compares the destination IP address
    to its own IP address using the subnet mask
  • If the destination IP address matches the computer IP
    wherever there’s a 1 in the subnet mask, sending
    computer knows the address is local
  • If the destination IP address does not match the sending
    computer’s IP wherever there’s a 1 in the subnet mask,
    sending computer knows the address is remote
Figure 7.16 Comparing addresses
– Subnet Mask (cont.)
  • When the destination address is local, the sending
    computer sends out an Address Resolution Protocol
    (ARP) broadcast to determine the destination computer’s
    MAC address
  • The ARP packet contains the sending computer’s IP
    address as well as the destination address
  • Destination computer responds to the ARP request by
    sending an ARP response containing its MAC address
  • Sending computer can now send data packets to
    destination
Figure 7.17 Sending an ARP
Figure 7.19 Computer B responds
– Subnet Mask (cont.)
  • When the sending computer discovers that the
    destination address does not have the same network
    ID as itself, then it must send the packet beyond the
    local network
  • The packet must be sent to the default gateway
  • Sending computer must ARP for the MAC address of the
    default gateway
Figure 7.20 Comparing addresses again
Figure 7.21 Sending an ARP to the gateway
– Subnet Mask (cont.)
    • Some valid subnet masks

11111111111111111111111100000000 = 255.255.255.0
11111111111111110000000000000000 = 255.255.0.0
11111111000000000000000000000000 = 255.0.0.0


    • Shorthand for subnet mask
11111111111111111111111100000000 = /24 (24 ones)
11111111111111110000000000000000 = /16 (16 ones)
11111111000000000000000000000000 = /8 (8 ones)
– Subnet Mask (cont.)
   • An IP address followed by the / and a
     number describes the IP and the
     address in one statement
201.23.45.123/24 = IP address plus subnet mask
IP address = 201.23.45.123
Subnet mask = 255.255.255.0


184.222.4.36/16 = IP address plus subnet mask
IP address = 184.222.4.36
Subnet mask = 255.255.0.0
– Subnet Mask (cont.)
  • Network administrators must enter correct IP address
    and subnet mask when configuring a network card
  • The networking software does the rest
  • If you want a computer to work in a routed network,
    you must configure the computer correctly with an IP
    address, subnet mask, and default gateway
– Class IDs
   • No two devices on the Internet can share the same IP
     address
   • Internet Assigned Number Authority (IANA) tracks and
     disperses IP addresses in chunks called class licenses
       – Oversees several Regional Internet Registries (RIRs)
       – RIRs in turn pass out IP addresses to large ISPs
       – ISPs pass out IP addresses to most end users
First Decimal                               Hosts per
          Value (range) Addresses                     Network ID
Class A     1 – 126     1.0.0.0 – 126.255.255.255      16,277,214
Class B     128 – 191   128.0.0.0 – 191.255.255.255    65,534
Class C     192 – 223   192.0.0.0 – 223.255.255.255    254
Class D     224 – 239   224.0.0.0 – 239.255.255.255    Multicast
Class E     240 – 255   240.0.0.0 – 255.255.255.255    Reserved



                    IP Address Classes
– Class IDs – More about Class D and E
   • Three ways to send a packet
      – Broadcast to every computer on the LAN
      – Unicast from one computer to another computer
      – Multicast from one computer to a group
          » Uncommon between computers
          » Often used by routers
– Class IDs – The state of IP address
   • IP class licenses were allocated too generously at first
   • Unallocated IP addresses became scarce
   • IP class licenses concept did not scale well
      – If you needed 2000 IP addresses you had to take a single
        Class B or eight Class C licenses
   • Solution
      – New method for generating blocks of IP addresses
      – Classless Inter-Domain Routing (CIDR)
CIDR and Subnetting
• CIDR and Subnetting Overview
  – CIDR based on subnetting
  – Subnetting chops up a single class of IP addresses
    into multiple smaller groups
  – CIDR and subnetting are virtually the same thing
  – Subnetting done by an organization on a block of
    addresses to create multiple subnetworks
  – CIDR done by an ISP on a block of addresses to
    create multiple subnets to pass out to customers
• Subnetting
  – More efficient use of IP addresses than class
    licenses
  – Enables separation of networks for security
  – Enables bandwidth control
  – Subnet mask is cornerstone of subnetting
     • Extend subnet masks of /8, /16, or /24 subnet by
       adding more ones (removing equal number of zeroes).
• Subnetting the Internet Café
  – 50 computers
     • 40 public computers
     • 10 back office computers
     • 10 wireless clients (maximum)
  – Network ID 192.168.4/24
  – Must prevent people using the public system from
    accessing private machines
Figure 7.22 Layout of the network
• Subnetting the Internet Café (cont.)
  – Begin with the given subnet mask and move it to
    the right until you have the number of subnets you
    need
  – Forget the dots
     • Don’t be limited to /8, /16, /24 networks
     • Network IDs do not need to end on the dots
     • Create subnets of /26, /27, /22, etc.
• Subnetting the Internet Café (cont.)
  – 192.168.4/24
  – Change a zero to a one in the subnet mask
  – /24 becomes a /25 subnet

     11111111111111111111111110000000
• Calculating Hosts
  – Hosts on a /24 network
  – 192.168.4.1 to 192.168.4.254 = 254 hosts
  – Calculate in binary
     • In a /24 network 8 binary digits are used for the host ID
     • 00000001 to 11111110 = 254 hosts
     • 2(number of zeroes in the subnet mask) – 2
     • 28 – 2 = 254 total hosts
  – Memorize the formula
• Calculating Hosts (cont.)
  – Hosts on a /16 network
     • In a /16 network 16 zeroes are part of the host ID
     • 0000000000000001 to 1111111111111110 = 65,534
       hosts
     • 2(number of zeroes in the subnet mask) – 2
     • 216 – 2 = 65,534 total hosts
• Calculating Hosts (cont.)
  – Hosts on a /26 network
     • In a /26 network 6 zeroes are part of the host ID
     • 000001 to 111110 = 62 hosts
     • 2(number of zeroes in the subnet mask) – 2
     • 26 – 2 = 62 total hosts
• Your First Subnet
  – Convert the 192.168.4/24 net ID into three
    network IDs
  – Write out the subnet mask in binary
  – Place a line at the end of the ones
Figure 7.23 Step 1 in subnetting
• Your First Subnet (cont.)
  – Draw a second line one digit to the right
  – Three areas (a Mike Trick, not official terms)
     • Subnet mask (SM)
     • Network ID extension (NE)
     • Hosts (H)
  – This is now a /25 subnet mask
Figure 7.24 Organizing the subnet mask
• Your First Subnet (cont.)
  – A subnet mask is always 32 binary digits long
  – A string of ones followed by a string of zeroes
    11111111111111111111111110000000
  – Put periods between every eight digits
    11111111.11111111.11111111.10000000
  – Then convert to dotted decimal
  – The resulting subnet mask:
    255.255.255.128
• Your First Subnet (cont.)
  – Get used to the idea of subnet masks that use
    more than 255s and 0s (in dotted decimal form)
  – Examples of legitimate subnet masks
     • 255.255.255.224
       11111111.11111111.11111111.11100000
     • 255.255.128.0
       11111111.11111111.10000000.00000000
     • 255.248.0.0
       11111111.11111000.00000000.00000000
• Rules for Calculating Subnets
  1. Starting with a beginning subnet mask, you
     extend the subnet extension until you have the
     number of subnets you need
  2. You cannot have an NE of all zeroes or all ones,
     so you calculate the number of subnets using this
     formula:
     new subnets = 2(number of zeroes in the subnet mask) – 2
  3. You cannot have a single-character network ID
     extension. You always start by moving the
     subnet at least two digits
• Calculating Subnets (cont.)
  – Rules 2 and 3 explained
     •   Adding just a single digit to the beginning subnet mask
         only gives you two network IDs: a zero and a one
     •   You cannot have a network ID extension of all zeroes or
         all ones
     •   Therefore, you need rule 3
Figure 7.25 Organizing the subnet mask
Figure 7.26 Single-digit network ID extensions
            are not allowed
• Calculating Subnets (cont.)
  – Subnet /24 to /26
  – Adds two digits, creating four new network IDs
    (two of which are not usable)
  – Convert the original network ID to binary and
    add the four different network ID extension to
    the end
  – The possible NEs in binary are 00, 01, 10, 11
  – Can’t have all zeroes, can’t have all ones
  – Therefore, only two new networks (01 and 10)
Figure 7.27 Creating the new network IDs
Figure 7.28 New network ID address ranges
• Calculating Subnets (cont.)
  – The new network IDs in decimal
    192.168.4.64/26
         hosts = 192.168.4.65 – 192.168.4.126
    192.168.4.128/26
         Hosts = 192.168.4.129 – 192.168.4.191
Figure 7.29 Two networks using the two network IDs
• Calculating Subnets (cont.)
  – The Internet Café needs three subnets
  – How large a network ID extension is needed?
  – Two NE digits = 22 – 2 = 2 network IDs
  – Three NE digits = 23 – 2 = 6 network IDs
  – Therefore, you need to extend the NE three
    digits to get at least three network IDs
  – Three are wasted
• Calculating Subnets (cont.)
  – Create a /27 subnet by moving the NE over three
    digits
  – Calculate the host address ranges for each usable
    new subnet
  –   192.168.4.32/27 (192.168.4.33–192.168.4.62)
  –   192.168.4.64/27 (192.168.4.65–192.168.4.94)
  –   192.168.4.96/27 (192.168.4.97–192.168.4.126)
  –   192.168.4.128/27 (192.168.4.129–192.168.4.158)
  –   192.168.4.160/27 (192.168.4.161–192.168.4.190)
  –   192.168.4.192/27 (192.168.4.193–192.168.4.222)
Figure 7.30 Moving the network ID extension

           three digits
Figure 7.31 Two of the six network ID address ranges
Manual Binary to Dotted Decimal Conversion
•
                                                 Write bit values in decimal from left to right
    –
                                                 Take binary value of one dotted octet portion and place ones and
    –                                            zeroes under appropriate positions
        128    64    32    16   8   4   2   1
          1     0     0     1   0   1   1   0
                                                 Add the decimal values that have a 1 underneath
    –
        128+16+4+2 = 150
• Manual Dotted Decimal to Binary Conversion
  – Start with bit values beginning with 128
  – Place decimal value above the first value on the
    left which it exceeds and subtract and place a one
    to represent this binary value

    221
    128    64    32    16     8    4    2    1
     93
      1
• Manual Dotted Decimal to Binary Conversion
  – Place the remainder above the next bit value that
    it exceeds (Place a zero in positions that are
    skipped)
    221    93          29    13     5        1
    128    64    32    16     8     4   2    1
     93    29          13     5     1        0

      1     1     0     1      1    1    0    1


  – Decimal 221 = binary 11011101
• CIDR: Subnetting in the Real World
  – Two situations in which subnetting takes place
    •   ISPs (Large ones)
        –   Receive class licenses from IANA
        –   Subnet those class licenses for customers
    •   Very large customers
        –   Take subnets from ISPs
            (sometimes already subnetted class licenses)
        –   Make their own subnets
• CIDR: Subnetting in the Real World (cont.)
  – Why learn subnetting?
     •   CompTIA Network+ exam requires it
     •   There’s a good chance you’ll contact an ISP and get
         CIDR addresses
         –   Think of subnets in terms of CIDR values like
             /8, /22, /26, and so on
     •   More advanced IT certifications (Cisco, Microsoft,
         etc.) require this knowledge
Using IP Addresses
• Overview of Using IP Addresses
  – Assigning IP addresses to computers
  – Specialty IP addresses
• Assigning an IP address, subnet mask, and
  default gateway
  – Static addressing
    •   Type in all the information
  – Dynamic addressing
    •   Server program automatically passes out the information
        to computers on the network
• Static IP Addresses
  – Manually type in all IP information
     • What are you typing in?
     • Where do you type it?
  – Assuming a Class C license for 197.156.4/24
     • You can do whatever you want with your own network ID
     • Use legit IP address and mask for network ID
     • Every IP address must be unique
     • You don’t have to use the numbers in order
     • You don’t have to use 197.156.4.1 as default gateway
Figure 7.32 A small network
• Static IP Addresses (cont.)
  – Network techs’ set of principles
     • Give the default gateway the first host IP address in the
       network ID
     • Try to use the IP addresses in some kind of sequential
       order
     • Try to separate servers from clients
         – Servers host addresses: 197.156.4.10 to 197.156.4.19
         – Client host addresses: 197.156.4.200 to 197.156.4.254
     • Write down whatever you do so person who comes after
       you understands what you did
• Static IP Addresses (cont.)
  – Give each computer an IP address, subnet mask,
    and default gateway
     • In Windows use the Internet Protocol Version 4 (TCP/IPv4)
       Properties dialog box
     • In Macintosh OS X, run the Network utility in System
       Preferences
     • In UNIX/Linux use the command-line IFCONFIG command
Figure 7.33 Entering static IP information in
  Windows Internet Protocol Version 4 (TCP/IPv4)
  Properties
Figure 7.34 Entering static IP information in
            the OS X Network utility
Figure 7.35 IFCONFIG command to set
            static IP address
Figure 7.36 Ubuntu’s Network Configuration utility
• Static IP Addresses (cont.)
  – After adding IP information to at least two systems,
    verify with the PING command
  – Successful PING confirms two systems can
    communicate
  – If the PING is not successful
     • Check your IP settings
     • Check connections, driver, etc.
  – Static addressing used for most critical systems
  – Most systems today use dynamic IP addressing
Figure 7.37 Two PINGs (successful PING on top,
            unsuccessful PING on bottom)
• Dynamic IP Addressing
  – Dynamic Host Configuration Protocol (DHCP)
     • More popular form of dynamic IP addressing
     • Bootstrap Protocol (BOOTP) older version
  – Automatically assigns an IP address whenever a
    computer connects to the network
  – DHCP uses a simple process
     • Computer is configured to use DHCP
     • Every OS has a method to tell computer to use DHCP
     • Windows setting: Obtain an IP address automatically
Figure 7.38 Setting up for DHCP
• How DHCP Works
  – DHCP Server is configured to pass out IP addresses
     • Scope = range of IP addresses
     • Subnet mask for scope
     • Default gateway for scope
     • Gives out other information (detailed in later chapters)
• How DHCP Works (cont.)
  – When DHCP client boots up it broadcasts a
    DHCP discovery packet
    • Discovery packet asks “Are there any DHCP servers
      out there?”
    • DHCP server responds with a DHCP offer
    • DHCP clients responds with a DHCP request
    • DHCP server responds with a DHCP acknowledge
      and maintains a database of the MAC addresses
      of DHCP clients along with the IP information assigned
      to each
    • DHCP client accepts with a DHCP lease
Figure 7.39 Computer sending out a DHCP
            discovery message
Figure 7.40 DHCP server sending DHCP offer
Figure 7.41 DHCP request and DHCP acknowledge
• How DHCP Works (cont.)
  – DHCP Lease
    • Set for a fixed amount of time
    • Usually 5 to 8 days
    • At the end of the lease time, DHCP client makes
      another DHCP discovery message
    • DHCP server looks at the MAC address, comparing
      it to its database of leases
    • Unless another computer has taken the lease, server
      will give the client the same IP information, including
      the same IP address
• Living with DHCP
  – Possible problems
     • DHCP client tries to get a DHCP address and fails
     • Symptoms
        – OS will post an error
        – DHCP client will have an address in the 169.254/16
          network ID
        – Can access local computers, but cannot connect to
          Internet
Figure 7.42 DHCP error in Ubuntu Linux
• Living with DHCP
  – Automatic Private IP Addressing (APIPA)
     • Addresses in the 169.254/16 network ID that a DHCP
       client will assign to itself when it fails to find a DHCP
       server
     • Allows computers on same LAN to communicate (if
       they are using APIPA)
     • APIPA does not provide default gateway, so clients
       using APIPA cannot access the Internet
     • Use available tool to see IP settings
     • If you see an APIPA address, you know you have a
       DHCP problem
• Living with DHCP
  – Reestablish the lease manually
  – In Windows
     • Ipconfig/renew
  – On a Macintosh
     • Go to System Preferences and use the Network utility
  – May need to force computer to release its lease
     • Windows command line: ipconfig /release
            ipconfig /renew
     • Release in Linux: sudo ifconfig eth0 down
     • Renew in Linux: sudo ifconfig eth0 up
Figure 7.43 Network utility in System Preferences
• Special IP Addresses
  – Loopback = 127.0.0.1
     • Use to send packets from your NIC to itself
     • Test NIC’s capability to send and receive packets:
             ping 127.0.0.1
  – Private IP addresses
     • 10.0.0.0 through 10.255.255.255 (1 Class A license)
     • 172.16.0.0. through 172.31.255.255 (16 Class B licenses)
     • 192.168.0.0 through 192.168.255.255 (256 Class C licenses)
  – All other IP addresses are public IP addresses

Mais conteúdo relacionado

Mais procurados

Uccn1003 -may10_-_lect03a_-_lan_design_issues
Uccn1003  -may10_-_lect03a_-_lan_design_issuesUccn1003  -may10_-_lect03a_-_lan_design_issues
Uccn1003 -may10_-_lect03a_-_lan_design_issuesShu Shin
 
Internal & External of Routers
Internal & External of RoutersInternal & External of Routers
Internal & External of RoutersKishore Kumar
 
Uccn1003 -may10_-_lect03c_-_ip_subnets_rules
Uccn1003  -may10_-_lect03c_-_ip_subnets_rulesUccn1003  -may10_-_lect03c_-_ip_subnets_rules
Uccn1003 -may10_-_lect03c_-_ip_subnets_rulesShu Shin
 
Uccn1003 -may10_-_lect02b2_-_lan_basic_in_packet_tracer
Uccn1003  -may10_-_lect02b2_-_lan_basic_in_packet_tracerUccn1003  -may10_-_lect02b2_-_lan_basic_in_packet_tracer
Uccn1003 -may10_-_lect02b2_-_lan_basic_in_packet_tracerShu Shin
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsHarsh Mehta
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003  -may10_-_lect02a_-_intro_to_networking_commands_softwareUccn1003  -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_softwareShu Shin
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSamiteshg
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3VISHNU N
 

Mais procurados (20)

IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Uccn1003 -may10_-_lect03a_-_lan_design_issues
Uccn1003  -may10_-_lect03a_-_lan_design_issuesUccn1003  -may10_-_lect03a_-_lan_design_issues
Uccn1003 -may10_-_lect03a_-_lan_design_issues
 
Internal & External of Routers
Internal & External of RoutersInternal & External of Routers
Internal & External of Routers
 
Uccn1003 -may10_-_lect03c_-_ip_subnets_rules
Uccn1003  -may10_-_lect03c_-_ip_subnets_rulesUccn1003  -may10_-_lect03c_-_ip_subnets_rules
Uccn1003 -may10_-_lect03c_-_ip_subnets_rules
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Uccn1003 -may10_-_lect02b2_-_lan_basic_in_packet_tracer
Uccn1003  -may10_-_lect02b2_-_lan_basic_in_packet_tracerUccn1003  -may10_-_lect02b2_-_lan_basic_in_packet_tracer
Uccn1003 -may10_-_lect02b2_-_lan_basic_in_packet_tracer
 
Subnets
SubnetsSubnets
Subnets
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003  -may10_-_lect02a_-_intro_to_networking_commands_softwareUccn1003  -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 

Semelhante a Networking Chapter 7

Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Ahmed El-Arabawy
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptssuserde23af
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.ArcyJeromeGallardo2
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting Saad Tanvir
 
Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05gameaxt
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basicstmavroidis
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sirsharifbdp
 

Semelhante a Networking Chapter 7 (20)

Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Subnetting
SubnettingSubnetting
Subnetting
 
Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05
 
Mod6
Mod6Mod6
Mod6
 
Addressing
AddressingAddressing
Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
lecture 6.pptx
lecture 6.pptxlecture 6.pptx
lecture 6.pptx
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 

Mais de mlrbrown

Cso gaddis java_chapter15
Cso gaddis java_chapter15Cso gaddis java_chapter15
Cso gaddis java_chapter15mlrbrown
 
Cso gaddis java_chapter14
Cso gaddis java_chapter14Cso gaddis java_chapter14
Cso gaddis java_chapter14mlrbrown
 
Cso gaddis java_chapter13
Cso gaddis java_chapter13Cso gaddis java_chapter13
Cso gaddis java_chapter13mlrbrown
 
Cso gaddis java_chapter12
Cso gaddis java_chapter12Cso gaddis java_chapter12
Cso gaddis java_chapter12mlrbrown
 
Cso gaddis java_chapter11
Cso gaddis java_chapter11Cso gaddis java_chapter11
Cso gaddis java_chapter11mlrbrown
 
Cso gaddis java_chapter10
Cso gaddis java_chapter10Cso gaddis java_chapter10
Cso gaddis java_chapter10mlrbrown
 
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptCso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptmlrbrown
 
Cso gaddis java_chapter8
Cso gaddis java_chapter8Cso gaddis java_chapter8
Cso gaddis java_chapter8mlrbrown
 
Cso gaddis java_chapter7
Cso gaddis java_chapter7Cso gaddis java_chapter7
Cso gaddis java_chapter7mlrbrown
 
Cso gaddis java_chapter6
Cso gaddis java_chapter6Cso gaddis java_chapter6
Cso gaddis java_chapter6mlrbrown
 
Cso gaddis java_chapter5
Cso gaddis java_chapter5Cso gaddis java_chapter5
Cso gaddis java_chapter5mlrbrown
 
Cso gaddis java_chapter4
Cso gaddis java_chapter4Cso gaddis java_chapter4
Cso gaddis java_chapter4mlrbrown
 
Cso gaddis java_chapter3
Cso gaddis java_chapter3Cso gaddis java_chapter3
Cso gaddis java_chapter3mlrbrown
 
Cso gaddis java_chapter2
Cso gaddis java_chapter2Cso gaddis java_chapter2
Cso gaddis java_chapter2mlrbrown
 
Cso gaddis java_chapter1
Cso gaddis java_chapter1Cso gaddis java_chapter1
Cso gaddis java_chapter1mlrbrown
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15mlrbrown
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14mlrbrown
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13mlrbrown
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
 

Mais de mlrbrown (20)

Cso gaddis java_chapter15
Cso gaddis java_chapter15Cso gaddis java_chapter15
Cso gaddis java_chapter15
 
Cso gaddis java_chapter14
Cso gaddis java_chapter14Cso gaddis java_chapter14
Cso gaddis java_chapter14
 
Cso gaddis java_chapter13
Cso gaddis java_chapter13Cso gaddis java_chapter13
Cso gaddis java_chapter13
 
Cso gaddis java_chapter12
Cso gaddis java_chapter12Cso gaddis java_chapter12
Cso gaddis java_chapter12
 
Cso gaddis java_chapter11
Cso gaddis java_chapter11Cso gaddis java_chapter11
Cso gaddis java_chapter11
 
Cso gaddis java_chapter10
Cso gaddis java_chapter10Cso gaddis java_chapter10
Cso gaddis java_chapter10
 
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptCso gaddis java_chapter9ppt
Cso gaddis java_chapter9ppt
 
Cso gaddis java_chapter8
Cso gaddis java_chapter8Cso gaddis java_chapter8
Cso gaddis java_chapter8
 
Cso gaddis java_chapter7
Cso gaddis java_chapter7Cso gaddis java_chapter7
Cso gaddis java_chapter7
 
Cso gaddis java_chapter6
Cso gaddis java_chapter6Cso gaddis java_chapter6
Cso gaddis java_chapter6
 
Cso gaddis java_chapter5
Cso gaddis java_chapter5Cso gaddis java_chapter5
Cso gaddis java_chapter5
 
Cso gaddis java_chapter4
Cso gaddis java_chapter4Cso gaddis java_chapter4
Cso gaddis java_chapter4
 
Cso gaddis java_chapter3
Cso gaddis java_chapter3Cso gaddis java_chapter3
Cso gaddis java_chapter3
 
Cso gaddis java_chapter2
Cso gaddis java_chapter2Cso gaddis java_chapter2
Cso gaddis java_chapter2
 
Cso gaddis java_chapter1
Cso gaddis java_chapter1Cso gaddis java_chapter1
Cso gaddis java_chapter1
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 

Último

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Networking Chapter 7

  • 1. TCP/IP Basics Chapter 7
  • 2. Objectives • Describe how the Internet Protocol works • Explain CIDR and subnetting • Describe the functions of static and dynamic IP addresses
  • 4. Moving up the OSI Layers • Chapters 3 through 6 detailed Layers 1 and 2 • Ethernet network technology • Now explore the software side of networking – Individual rule is a protocol – A protocol suite is a set of rules • Begin with Internet Protocol (IP) of TCP/IP
  • 5. Three Parts to Chapter 7 • IP in Depth • CIDR and Subnetting • Using IP Addresses
  • 7. IP in Depth • TCP/IP suite supports both simple and complex networks – Small LAN – Multiple LANs interconnected into a WAN
  • 8. • TCP/IP on LAN over Ethernet – On small network, sending computer broadcasts using MAC address ff-ff-ff-ff-ff-ff to obtain recipient’s MAC address – Broadcasting is disastrous to a large network
  • 9. Figure 7.2 PC broadcasting for a MAC address
  • 10. Figure 7.3 Broadcasting won’t work for the entire Internet
  • 11. • TCP/IP on LAN over Ethernet – IP addressing overcomes limits of Ethernet MAC addresses • Unique IP address per host • Unique address per logical network • Communicate between LANs without broadcasts
  • 12. • IP Addresses (IPv4 only] – 32-bit value • Example: 11000000101010000000010000000010 • Broken into four groups of eight 11000000.10101000.00000100.00000010 • Each 8-bit value convertsed into a decimal number between 0 and 255
  • 13. • Binary to Decimal Conversion Binary Decimal Binary Decimal 00000000 0 11111000 248 00000001 1 11111001 249 00000010 2 11111010 250 00000011 3 11111011 251 00000100 4 11111100 252 00000101 5 11111101 253 00000110 6 11111110 254 00000111 7 11111111 255 00001000 8 skip a bunch skip a bunch
  • 14. • IP Addresses (IPv4 only] – Converted: 11000000101010000000010000000010 is displayed as 192.168.4.2 in dotted decimal notation (dotted-octet numbering system) – Know how to convert dotted decimal to binary and back • Every OS has a calculator
  • 15. • Using a Calculator for conversion – Decimal to binary • Enter value in decimal view • Switch to binary view to convert value • Leading zeroes do not display in Calculator • Leading zeroes important when working with IP addresses
  • 16. Figure 7.4 Macintosh OS X Calculator in Programmer mode
  • 17. Figure 7.5 Converting decimal to binary with Windows Vista’s Calculator
  • 18. • Every MAC address must be unique • Every IP address must be unique
  • 19. Figure 7.6 Small network with both IP and MAC addresses
  • 20. • Utilities for displaying IP and MAC addresses – Every OS has at least one GUI tool • Mac OS X system’s Network utility • Windows Local Area Connection Properties – Every OS has a command-line utility • Windows has IPCONFIG • UNIX/Linux/Mac use IFCONFIG
  • 21. Figure 7.7 Macintosh OS X Network utility
  • 23. Figure 7.9 IFCONFIG in Ubuntu
  • 24. • IP Addresses in Action – IP must do three things 1. Give each LAN its own identifier 2. Allow routers connecting LANs to use network identifiers to send packets to the right network 3. Give each computer a way to understand when a packet is intended for a computer on the local LAN or for a computer on the WAN
  • 25. 1. IP must give each LAN its own identifier – Network IDs • All computers on same LAN must have same network ID • Each computer on same LAN must have a unique host ID • Example: 192.168.5.x represents addresses in Figure 7.10 – Network address of this network is 192.168.5.0 (assuming a 24- bit mask) – Network ID plus Host ID = one IP address.
  • 26. Figure 7.10 IP addresses for a LAN
  • 27. 2. IP must allow routers connecting LANs to use network identifiers to send packets to the right network – Interconnecting • Requires a router connection • Router requires a network connection and IP address on each LAN – IP address of router’s connection to a LAN is the default gateway for that LAN – Network administrators often give lowest host address in the network to the router
  • 28. Figure 7.11 LAN with router
  • 29. – Interconnecting (cont.) • Router uses a built-in router table – Uses this to determine where to send packets – How router uses routing table: Everything for 192.168.5.0 Everything else goes out goes out 192.168.5.1 14.23.54.223
  • 31. Figure 7.13 LAN, router, and the Internet
  • 32. – Interconnecting (cont.) • Limitations of using 192.168.5.0 as host ID – Limited to 192.168.5.1 through 192.168.5.254 (254 addresses) • Network ID of 170.45.0.0 has a total of 65,534 hosts • Network ID of 12.0.0.0 has a total of 16.7 million hosts • Network IDs allow router to connect multiple LANs to a WAN
  • 33. 3. IP must give each computer a way to understand when a packet destination is local or on the WAN – Subnet Mask • Sending to host on same network: broadcast for MAC address • Sending to host on another network: send to default gateway • Sending computer uses subnet mask to determine where to send packet • Example of a subnet mask using dotted-octet binary notation: 11111111.11111111.11111111.00000000 • Example of the same subnet mask using dotted decimal notation: 255.255.255.0
  • 34. Figure 7.14 The three amigos, separated by walls or miles
  • 35. Figure 7.15 Sending a packet remotely
  • 36. – Subnet Mask (cont.) • Line up an IP address with a corresponding subnet mask in binary – Portion of IP address that aligns with the ones of the subnet mask is the network ID of the IP address. – Portion of IP address that aligns with the zeroes of the subnet mask is the HostID of the IP address
  • 37. Dotted Binary Decimal IP address 192.168.5.23 11000000.10101000.00000101.00010111 Subnet mask 255.255.255.0 11111111.11111111.11111111.00000000 Network ID 192.168.5.0 11000000.10101000.00000101.x Host ID x.x.x.23 x.x.x.00010111
  • 38. – Subnet Mask (cont.) • Sending computer compares the destination IP address to its own IP address using the subnet mask • If the destination IP address matches the computer IP wherever there’s a 1 in the subnet mask, sending computer knows the address is local • If the destination IP address does not match the sending computer’s IP wherever there’s a 1 in the subnet mask, sending computer knows the address is remote
  • 40. – Subnet Mask (cont.) • When the destination address is local, the sending computer sends out an Address Resolution Protocol (ARP) broadcast to determine the destination computer’s MAC address • The ARP packet contains the sending computer’s IP address as well as the destination address • Destination computer responds to the ARP request by sending an ARP response containing its MAC address • Sending computer can now send data packets to destination
  • 42. Figure 7.19 Computer B responds
  • 43. – Subnet Mask (cont.) • When the sending computer discovers that the destination address does not have the same network ID as itself, then it must send the packet beyond the local network • The packet must be sent to the default gateway • Sending computer must ARP for the MAC address of the default gateway
  • 44. Figure 7.20 Comparing addresses again
  • 45. Figure 7.21 Sending an ARP to the gateway
  • 46. – Subnet Mask (cont.) • Some valid subnet masks 11111111111111111111111100000000 = 255.255.255.0 11111111111111110000000000000000 = 255.255.0.0 11111111000000000000000000000000 = 255.0.0.0 • Shorthand for subnet mask 11111111111111111111111100000000 = /24 (24 ones) 11111111111111110000000000000000 = /16 (16 ones) 11111111000000000000000000000000 = /8 (8 ones)
  • 47. – Subnet Mask (cont.) • An IP address followed by the / and a number describes the IP and the address in one statement 201.23.45.123/24 = IP address plus subnet mask IP address = 201.23.45.123 Subnet mask = 255.255.255.0 184.222.4.36/16 = IP address plus subnet mask IP address = 184.222.4.36 Subnet mask = 255.255.0.0
  • 48. – Subnet Mask (cont.) • Network administrators must enter correct IP address and subnet mask when configuring a network card • The networking software does the rest • If you want a computer to work in a routed network, you must configure the computer correctly with an IP address, subnet mask, and default gateway
  • 49. – Class IDs • No two devices on the Internet can share the same IP address • Internet Assigned Number Authority (IANA) tracks and disperses IP addresses in chunks called class licenses – Oversees several Regional Internet Registries (RIRs) – RIRs in turn pass out IP addresses to large ISPs – ISPs pass out IP addresses to most end users
  • 50. First Decimal Hosts per Value (range) Addresses Network ID Class A 1 – 126 1.0.0.0 – 126.255.255.255 16,277,214 Class B 128 – 191 128.0.0.0 – 191.255.255.255 65,534 Class C 192 – 223 192.0.0.0 – 223.255.255.255 254 Class D 224 – 239 224.0.0.0 – 239.255.255.255 Multicast Class E 240 – 255 240.0.0.0 – 255.255.255.255 Reserved IP Address Classes
  • 51. – Class IDs – More about Class D and E • Three ways to send a packet – Broadcast to every computer on the LAN – Unicast from one computer to another computer – Multicast from one computer to a group » Uncommon between computers » Often used by routers
  • 52. – Class IDs – The state of IP address • IP class licenses were allocated too generously at first • Unallocated IP addresses became scarce • IP class licenses concept did not scale well – If you needed 2000 IP addresses you had to take a single Class B or eight Class C licenses • Solution – New method for generating blocks of IP addresses – Classless Inter-Domain Routing (CIDR)
  • 54. • CIDR and Subnetting Overview – CIDR based on subnetting – Subnetting chops up a single class of IP addresses into multiple smaller groups – CIDR and subnetting are virtually the same thing – Subnetting done by an organization on a block of addresses to create multiple subnetworks – CIDR done by an ISP on a block of addresses to create multiple subnets to pass out to customers
  • 55. • Subnetting – More efficient use of IP addresses than class licenses – Enables separation of networks for security – Enables bandwidth control – Subnet mask is cornerstone of subnetting • Extend subnet masks of /8, /16, or /24 subnet by adding more ones (removing equal number of zeroes).
  • 56. • Subnetting the Internet Café – 50 computers • 40 public computers • 10 back office computers • 10 wireless clients (maximum) – Network ID 192.168.4/24 – Must prevent people using the public system from accessing private machines
  • 57. Figure 7.22 Layout of the network
  • 58. • Subnetting the Internet Café (cont.) – Begin with the given subnet mask and move it to the right until you have the number of subnets you need – Forget the dots • Don’t be limited to /8, /16, /24 networks • Network IDs do not need to end on the dots • Create subnets of /26, /27, /22, etc.
  • 59. • Subnetting the Internet Café (cont.) – 192.168.4/24 – Change a zero to a one in the subnet mask – /24 becomes a /25 subnet 11111111111111111111111110000000
  • 60. • Calculating Hosts – Hosts on a /24 network – 192.168.4.1 to 192.168.4.254 = 254 hosts – Calculate in binary • In a /24 network 8 binary digits are used for the host ID • 00000001 to 11111110 = 254 hosts • 2(number of zeroes in the subnet mask) – 2 • 28 – 2 = 254 total hosts – Memorize the formula
  • 61. • Calculating Hosts (cont.) – Hosts on a /16 network • In a /16 network 16 zeroes are part of the host ID • 0000000000000001 to 1111111111111110 = 65,534 hosts • 2(number of zeroes in the subnet mask) – 2 • 216 – 2 = 65,534 total hosts
  • 62. • Calculating Hosts (cont.) – Hosts on a /26 network • In a /26 network 6 zeroes are part of the host ID • 000001 to 111110 = 62 hosts • 2(number of zeroes in the subnet mask) – 2 • 26 – 2 = 62 total hosts
  • 63. • Your First Subnet – Convert the 192.168.4/24 net ID into three network IDs – Write out the subnet mask in binary – Place a line at the end of the ones
  • 64. Figure 7.23 Step 1 in subnetting
  • 65. • Your First Subnet (cont.) – Draw a second line one digit to the right – Three areas (a Mike Trick, not official terms) • Subnet mask (SM) • Network ID extension (NE) • Hosts (H) – This is now a /25 subnet mask
  • 66. Figure 7.24 Organizing the subnet mask
  • 67. • Your First Subnet (cont.) – A subnet mask is always 32 binary digits long – A string of ones followed by a string of zeroes 11111111111111111111111110000000 – Put periods between every eight digits 11111111.11111111.11111111.10000000 – Then convert to dotted decimal – The resulting subnet mask: 255.255.255.128
  • 68. • Your First Subnet (cont.) – Get used to the idea of subnet masks that use more than 255s and 0s (in dotted decimal form) – Examples of legitimate subnet masks • 255.255.255.224 11111111.11111111.11111111.11100000 • 255.255.128.0 11111111.11111111.10000000.00000000 • 255.248.0.0 11111111.11111000.00000000.00000000
  • 69. • Rules for Calculating Subnets 1. Starting with a beginning subnet mask, you extend the subnet extension until you have the number of subnets you need 2. You cannot have an NE of all zeroes or all ones, so you calculate the number of subnets using this formula: new subnets = 2(number of zeroes in the subnet mask) – 2 3. You cannot have a single-character network ID extension. You always start by moving the subnet at least two digits
  • 70. • Calculating Subnets (cont.) – Rules 2 and 3 explained • Adding just a single digit to the beginning subnet mask only gives you two network IDs: a zero and a one • You cannot have a network ID extension of all zeroes or all ones • Therefore, you need rule 3
  • 71. Figure 7.25 Organizing the subnet mask
  • 72. Figure 7.26 Single-digit network ID extensions are not allowed
  • 73. • Calculating Subnets (cont.) – Subnet /24 to /26 – Adds two digits, creating four new network IDs (two of which are not usable) – Convert the original network ID to binary and add the four different network ID extension to the end – The possible NEs in binary are 00, 01, 10, 11 – Can’t have all zeroes, can’t have all ones – Therefore, only two new networks (01 and 10)
  • 74. Figure 7.27 Creating the new network IDs
  • 75. Figure 7.28 New network ID address ranges
  • 76. • Calculating Subnets (cont.) – The new network IDs in decimal 192.168.4.64/26 hosts = 192.168.4.65 – 192.168.4.126 192.168.4.128/26 Hosts = 192.168.4.129 – 192.168.4.191
  • 77. Figure 7.29 Two networks using the two network IDs
  • 78. • Calculating Subnets (cont.) – The Internet Café needs three subnets – How large a network ID extension is needed? – Two NE digits = 22 – 2 = 2 network IDs – Three NE digits = 23 – 2 = 6 network IDs – Therefore, you need to extend the NE three digits to get at least three network IDs – Three are wasted
  • 79. • Calculating Subnets (cont.) – Create a /27 subnet by moving the NE over three digits – Calculate the host address ranges for each usable new subnet – 192.168.4.32/27 (192.168.4.33–192.168.4.62) – 192.168.4.64/27 (192.168.4.65–192.168.4.94) – 192.168.4.96/27 (192.168.4.97–192.168.4.126) – 192.168.4.128/27 (192.168.4.129–192.168.4.158) – 192.168.4.160/27 (192.168.4.161–192.168.4.190) – 192.168.4.192/27 (192.168.4.193–192.168.4.222)
  • 80. Figure 7.30 Moving the network ID extension three digits
  • 81. Figure 7.31 Two of the six network ID address ranges
  • 82. Manual Binary to Dotted Decimal Conversion • Write bit values in decimal from left to right – Take binary value of one dotted octet portion and place ones and – zeroes under appropriate positions 128 64 32 16 8 4 2 1 1 0 0 1 0 1 1 0 Add the decimal values that have a 1 underneath – 128+16+4+2 = 150
  • 83. • Manual Dotted Decimal to Binary Conversion – Start with bit values beginning with 128 – Place decimal value above the first value on the left which it exceeds and subtract and place a one to represent this binary value 221 128 64 32 16 8 4 2 1 93 1
  • 84. • Manual Dotted Decimal to Binary Conversion – Place the remainder above the next bit value that it exceeds (Place a zero in positions that are skipped) 221 93 29 13 5 1 128 64 32 16 8 4 2 1 93 29 13 5 1 0 1 1 0 1 1 1 0 1 – Decimal 221 = binary 11011101
  • 85. • CIDR: Subnetting in the Real World – Two situations in which subnetting takes place • ISPs (Large ones) – Receive class licenses from IANA – Subnet those class licenses for customers • Very large customers – Take subnets from ISPs (sometimes already subnetted class licenses) – Make their own subnets
  • 86. • CIDR: Subnetting in the Real World (cont.) – Why learn subnetting? • CompTIA Network+ exam requires it • There’s a good chance you’ll contact an ISP and get CIDR addresses – Think of subnets in terms of CIDR values like /8, /22, /26, and so on • More advanced IT certifications (Cisco, Microsoft, etc.) require this knowledge
  • 88. • Overview of Using IP Addresses – Assigning IP addresses to computers – Specialty IP addresses
  • 89. • Assigning an IP address, subnet mask, and default gateway – Static addressing • Type in all the information – Dynamic addressing • Server program automatically passes out the information to computers on the network
  • 90. • Static IP Addresses – Manually type in all IP information • What are you typing in? • Where do you type it? – Assuming a Class C license for 197.156.4/24 • You can do whatever you want with your own network ID • Use legit IP address and mask for network ID • Every IP address must be unique • You don’t have to use the numbers in order • You don’t have to use 197.156.4.1 as default gateway
  • 91. Figure 7.32 A small network
  • 92. • Static IP Addresses (cont.) – Network techs’ set of principles • Give the default gateway the first host IP address in the network ID • Try to use the IP addresses in some kind of sequential order • Try to separate servers from clients – Servers host addresses: 197.156.4.10 to 197.156.4.19 – Client host addresses: 197.156.4.200 to 197.156.4.254 • Write down whatever you do so person who comes after you understands what you did
  • 93. • Static IP Addresses (cont.) – Give each computer an IP address, subnet mask, and default gateway • In Windows use the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box • In Macintosh OS X, run the Network utility in System Preferences • In UNIX/Linux use the command-line IFCONFIG command
  • 94. Figure 7.33 Entering static IP information in Windows Internet Protocol Version 4 (TCP/IPv4) Properties
  • 95. Figure 7.34 Entering static IP information in the OS X Network utility
  • 96. Figure 7.35 IFCONFIG command to set static IP address
  • 97. Figure 7.36 Ubuntu’s Network Configuration utility
  • 98. • Static IP Addresses (cont.) – After adding IP information to at least two systems, verify with the PING command – Successful PING confirms two systems can communicate – If the PING is not successful • Check your IP settings • Check connections, driver, etc. – Static addressing used for most critical systems – Most systems today use dynamic IP addressing
  • 99. Figure 7.37 Two PINGs (successful PING on top, unsuccessful PING on bottom)
  • 100. • Dynamic IP Addressing – Dynamic Host Configuration Protocol (DHCP) • More popular form of dynamic IP addressing • Bootstrap Protocol (BOOTP) older version – Automatically assigns an IP address whenever a computer connects to the network – DHCP uses a simple process • Computer is configured to use DHCP • Every OS has a method to tell computer to use DHCP • Windows setting: Obtain an IP address automatically
  • 101. Figure 7.38 Setting up for DHCP
  • 102. • How DHCP Works – DHCP Server is configured to pass out IP addresses • Scope = range of IP addresses • Subnet mask for scope • Default gateway for scope • Gives out other information (detailed in later chapters)
  • 103. • How DHCP Works (cont.) – When DHCP client boots up it broadcasts a DHCP discovery packet • Discovery packet asks “Are there any DHCP servers out there?” • DHCP server responds with a DHCP offer • DHCP clients responds with a DHCP request • DHCP server responds with a DHCP acknowledge and maintains a database of the MAC addresses of DHCP clients along with the IP information assigned to each • DHCP client accepts with a DHCP lease
  • 104. Figure 7.39 Computer sending out a DHCP discovery message
  • 105. Figure 7.40 DHCP server sending DHCP offer
  • 106. Figure 7.41 DHCP request and DHCP acknowledge
  • 107. • How DHCP Works (cont.) – DHCP Lease • Set for a fixed amount of time • Usually 5 to 8 days • At the end of the lease time, DHCP client makes another DHCP discovery message • DHCP server looks at the MAC address, comparing it to its database of leases • Unless another computer has taken the lease, server will give the client the same IP information, including the same IP address
  • 108. • Living with DHCP – Possible problems • DHCP client tries to get a DHCP address and fails • Symptoms – OS will post an error – DHCP client will have an address in the 169.254/16 network ID – Can access local computers, but cannot connect to Internet
  • 109. Figure 7.42 DHCP error in Ubuntu Linux
  • 110. • Living with DHCP – Automatic Private IP Addressing (APIPA) • Addresses in the 169.254/16 network ID that a DHCP client will assign to itself when it fails to find a DHCP server • Allows computers on same LAN to communicate (if they are using APIPA) • APIPA does not provide default gateway, so clients using APIPA cannot access the Internet • Use available tool to see IP settings • If you see an APIPA address, you know you have a DHCP problem
  • 111. • Living with DHCP – Reestablish the lease manually – In Windows • Ipconfig/renew – On a Macintosh • Go to System Preferences and use the Network utility – May need to force computer to release its lease • Windows command line: ipconfig /release ipconfig /renew • Release in Linux: sudo ifconfig eth0 down • Renew in Linux: sudo ifconfig eth0 up
  • 112. Figure 7.43 Network utility in System Preferences
  • 113. • Special IP Addresses – Loopback = 127.0.0.1 • Use to send packets from your NIC to itself • Test NIC’s capability to send and receive packets: ping 127.0.0.1 – Private IP addresses • 10.0.0.0 through 10.255.255.255 (1 Class A license) • 172.16.0.0. through 172.31.255.255 (16 Class B licenses) • 192.168.0.0 through 192.168.255.255 (256 Class C licenses) – All other IP addresses are public IP addresses

Notas do Editor

  1. Teaching Tip In a tour de force, the author used less than 250 words on Page 137 to describe two decades of network protocol history and introduce two Key Terms (protocol and protocol suite). This reflects the new CompTIA exam objectives’ focus on the most important protocol suite, TCP/IP. The other protocol suites are just history. IP works at Layer 3 (Network) This chapter deals with IP addressing (IPv4 now – IPv6 in Chapter 13).
  2. Teaching Tip Point out that the use of the term IP in this chapter refers to IPv4, unless otherwise stated.
  3. This entire chapter focuses on IPv4
  4. The Windows GUI utility, Internet Protocol Version 4 (TCP/IPv4) , will be discussed later in the Chapter.
  5. Yes, this is at the Windows command prompt! The CMD window has been modified to have a white background and black text. It is a nice touch, but students might be a bit confused. This is an excellent opportunity to tell them that they will often encounter customized desktops, and they should learn to find and recognize their favorite tools regardless of how they appear.
  6. Teaching Tip The three “jobs” of IP listed above are detailed in the next three sections titled Network IDs, Interconnecting, and Subnet Mask.
  7. Teaching Tip The author is building up to explaining network mask, so avoid going into detail at this point. However, be careful how you explain things so far. The book says that you cannot have an address that ends with a zero, but the rule being applied here is that the Host ID cannot be all one’s, nor can it be all zeroes – in binary . This all depends on the masking, so proceed carefully. All will be revealed.
  8. Note: This is why default gateway is part of IP configuration.
  9. While the above example is fine for teaching this concept, later in the chapter (after page 153), come back to this example and have the students explain why a /25 subnet would not be used. See rule #3 on Page 153 in the Chapter: You cannot have a single-character network ID extension. You always start by moving the subnet at least two digits.
  10. Teaching Tip There is a small error in Figure 7.31 on Page 155. The last digit of the next-to-the-last line should be a zero. This could be a teaching opportunity: ask the students to discover the error.
  11. There are several ways to access the Properties of Internet Protocol Version 4 (TCP/IPv4). Vista instructions for just one way to get there: open the Start Menu , right click on Network and select Properties . In the Network and Sharing Center select Manage network connections . Right-click Local Area Connection and select Properties . If the User Account Control window pops up, select Continue . In the Local Area Connection Properties dialog box scroll (if necessary) to Internet Protocol Version 4 (TCP/IPv4) and carefully click on the words (not the check box). Click the Properties button. This will show the TCP/IPv4 Properties.
  12. Even though by convention we use 127.0.0.1 as the loopback address, the entire 127.0.0.0/8 subnet is reserved for loopback! You can use any address in the 127.0.0.0/8 subnet as a loopback address