SlideShare uma empresa Scribd logo
1 de 27
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Network Fundamentals
Abdelkhalik Elsaid Mosa
abdu.elsaid@yahoo.com
http://abdelkhalik.staff.scuegypt.edu.eg/
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
IP v4
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
IP v4
32 Bits
255 255 255 255
Dotted Decimal Network Host
11111111 11111111 11111111 11111111
192 168 171 221
11000000 10101000 10101011 11011101
Maximum
Binary
Ex. Decimal
Ex. Binary
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Types of addresses in IP v4 network
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Types of addresses in IP v4 network
• Network address: The address by which we refer to the network,
all host bits are “0”.
• Broadcast address: A special address used to send data to all
hosts in the network, all host bits are “1”.
• Host addresses: The addresses assigned to the end devices in the
network “values between network and broadcast”.
192 168 171 0
11000000 10101000 10101011 00000000
192 168 171 255
11000000 10101000 10101011 11111111
192 168 171 From 1 to 254
11000000 10101000 10101011 00000001 to11111110
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Types of addresses in IP v4 network
• Prefix Length: the number of bits in the address that gives us the
network portion. Ex: 192.168.171.221/24
• Subnet Mask: consists of 32 bits and uses 1s to represent
network portion and 0s to represent host portion.
Ex: 255.255.255.0
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Unicast, Multicast, Broadcast – Types of Communication
• Unicast: the process of sending a packet from one host to an
individual host “One-to-One”.
• Multicast: the process of sending a packet from one host to a
selected group of hosts “One-to-Many”.
Multicast clients: Hosts that wish to receive multicast data, and
must subscribe to a Multicast Group.
• Broadcast: the process of sending a packet from one host to all
hosts in the network “One-to-All”.
1.Directed Broadcast: is sent to all hosts on a specific network.
Ex: 192.168.171.255/24
2.Limited Broadcast: is used for communication that is limited to
the hosts on the local network. Ex: 255.255.255.255
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Reserved IP v4 address range
•Host Addresses: 0.0.0.0 to 223.255.255.255
Within this range there are many addresses that are already
reserved for special purposes.
•Multicast Addresses (224.0.0.0 to 239.255.255.255):
1.Reserved link local addresses: 224.0.0.0 to 224.0.0.255.
Used for multicast groups on a local network.
2.Globally scoped addresses: 224.0.1.0 to 238.255.255.255.
Used to multicast data across the Internet.
3.Administratively scoped addresses: 239.0.0.0/8 (limited scope).
Used by ISPs to send multicast data to their subscribers.
•Experimental Addresses: 240.0.0.0 to 255.255.255.254 (RFC 3330).
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Public and Private addresses
• Public addresses: designated for use in networks that are
accessible on the Internet.
• Private addresses: used for internal networks and not routable
on the Internet.
The private address blocks are:
1. 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)
2. 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)
3. 192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)
NAT allows the hosts in the network to "borrow" a public
address for communicating to outside networks.
http://whatismyipaddress.com/
http://show-ip.net/
http://www.whatismyip.com/
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Public and Private addresses
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Special IP v4 Addresses
• Network and Broadcast Addresses:
Within each network the first and last addresses cannot be
assigned to hosts.
• Default Route: 0.0.0.0, all (0.0.0.0 /8) address block is reserved.
The default route is used as a "catch all" route when a more
specific route is not available.
• Loopback: 127.0.0.0 - to - 127.255.255.255.
Hosts use loopback to direct traffic to themselves.
• Link-Local Addresses: 169.254.0.0 to 169.254.255.255
Automatically assigned by OS where no IP config. is available.
• TEST-NET Addresses: 192.0.2.0 to 192.0.2.255 (192.0.2.0 /24).
is set aside for teaching and learning purposes.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Special IP v4 Addresses
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Classful Addressing
Classful allocation of address space often wasted many addresses, which exhausted
the availability of IPv4 addresses. Classless Addressing solves this problem
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Fill in the information…
1. 192.168.1.3 Class ------- Default Mask: ---------------
Network: ------------------- Broadcast: -------------------
Hosts: ----------------------through-----------------------
2. 1.12.100.31 Class ------- Default Mask: ---------------
Network: ------------------- Broadcast: --------------------
Hosts: ----------------------through-----------------------
3. 172.30.77.5 Class ------- Default Mask: ---------------
Network: ------------------- Broadcast: -------------------
Hosts: ----------------------through-----------------------
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Who assigns the different addresses?
• Internet Assigned Numbers Authority (IANA), www.iana.net.
• IANA is the master holder of the IP addresses
• Registration companies, called Regional Internet Registries (RIRs),
manage the IP address space.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
ISPs
• Tier 1 ISPs provides reliability and speed.
• Tier 2 ISPs generally focus on business customers.
• Tier 3 ISPs is the retail and home markets in a specific locale.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Overview of IP v6
• IPv6 is not merely a new Layer 3 protocol - it is a new protocol
suite, ICMPv6, and new routing protocols.
 Large address space
 No need for NAT/PAT
 Improved Packet Handling through header simplification.
 QoS Mechanisms.
 Security
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Overview of IP v6
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
ANDing- What is our network?
• The IPv4 host address is logically ANDed with its subnet mask to
determine the network address to which the host is associated.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Basic Subnetting
• Subnetting: Creating multiple logical networks from a single
address block.
• No. of subnets: 2n where n = the number of bits borrowed.
Dividing networks based on:
1. geographic location
2. Purposes
3. ownership
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Basic Subnetting – Borrowing 2 bits (4-Subnets)
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Basic Subnetting – Borrowing 3 bits (8-Subnets)
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
VLSM – Subnetting a subnet
• was designed to maximize addressing efficiency.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Testing the local stack
• Ping: is a utility for testing IP connectivity between hosts.
Uses ICMP.
If the host Echo request, The destination responds with an
ICMP Echo Reply datagram.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Traceroute (tracert) – Testing the path
• tracert: utility that allows us to observe the path between source
and destination.
generates a list of hops that were successfully reached along
the path.
• RTT (Round Trip Time): is the time a packet takes to reach the
remote host and for the response from the host to return.
An asterisk (*) is used to indicate a lost packet.
• If TTL=0 then
The router drops the packet and sends an ICMP Time Exceeded
message addressed to the originating host.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
ICMP v4
• ICMP is the messaging protocol for the TCP/IP suite.
• ICMP provides control and error messages and is used by the
ping and traceroute utilities.
• ICMP messages that may be sent include:
Host confirmation
Unreachable Destination or Service
0 = net unreachable, 1 = host unreachable, 2 = protocol unreachable,
3 = port unreachable
Time exceeded
Route redirection
Source quench
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Router and types
Router and types Router and types
Router and types
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Subnetting
SubnettingSubnetting
Subnetting
 
200 301-ccna
200 301-ccna200 301-ccna
200 301-ccna
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Ip address
Ip address Ip address
Ip address
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 

Destaque

Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)Abdelkhalik Mosa
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerAbdelkhalik Mosa
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Networkyusufd
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
Analog communications lab
Analog communications labAnalog communications lab
Analog communications labVishal kakade
 
Analog communications lab
Analog communications labAnalog communications lab
Analog communications labVishal kakade
 
Unit 1 network models & typical examples(part b)
Unit 1 network models & typical examples(part b)Unit 1 network models & typical examples(part b)
Unit 1 network models & typical examples(part b)Vishal kakade
 
A new precision peak detector full wave rectifier
A new precision peak detector full wave rectifierA new precision peak detector full wave rectifier
A new precision peak detector full wave rectifierVishal kakade
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkAbdelkhalik Mosa
 
Pulse modulation (pam)
Pulse modulation (pam)Pulse modulation (pam)
Pulse modulation (pam)Vishal kakade
 
Pulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulationPulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulationVishal kakade
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
Pulse amplitude modulation
Pulse amplitude modulationPulse amplitude modulation
Pulse amplitude modulationVishal kakade
 

Destaque (20)

Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
IPv6
IPv6IPv6
IPv6
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
 
Basics of LTE
Basics of LTEBasics of LTE
Basics of LTE
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
Analog communications lab
Analog communications labAnalog communications lab
Analog communications lab
 
Unit 0 introduction
Unit 0 introductionUnit 0 introduction
Unit 0 introduction
 
Analog communications lab
Analog communications labAnalog communications lab
Analog communications lab
 
Unit 1 network models & typical examples(part b)
Unit 1 network models & typical examples(part b)Unit 1 network models & typical examples(part b)
Unit 1 network models & typical examples(part b)
 
A new precision peak detector full wave rectifier
A new precision peak detector full wave rectifierA new precision peak detector full wave rectifier
A new precision peak detector full wave rectifier
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Pulse modulation (pam)
Pulse modulation (pam)Pulse modulation (pam)
Pulse modulation (pam)
 
Pulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulationPulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulation
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Pulse amplitude modulation
Pulse amplitude modulationPulse amplitude modulation
Pulse amplitude modulation
 

Semelhante a Network Fundamentals: Ch6 - Addressing the Network IP v4

Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptanwarkade1
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptEsubesisay
 
Conceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoConceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoEdgardo Scrimaglia
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Edgardo Scrimaglia
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-finalTaymoor Nazmy
 
2 networking
2 networking2 networking
2 networkingLen Bass
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfssuser2d7235
 

Semelhante a Network Fundamentals: Ch6 - Addressing the Network IP v4 (20)

Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Conceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoConceptos ipv6, direccionamiento
Conceptos ipv6, direccionamiento
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Web technology
Web technologyWeb technology
Web technology
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
2 networking
2 networking2 networking
2 networking
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
 

Mais de Abdelkhalik Mosa

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Abdelkhalik Mosa
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Abdelkhalik Mosa
 

Mais de Abdelkhalik Mosa (9)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Network Fundamentals: Ch6 - Addressing the Network IP v4

  • 1. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals Abdelkhalik Elsaid Mosa abdu.elsaid@yahoo.com http://abdelkhalik.staff.scuegypt.edu.eg/
  • 2. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy IP v4
  • 3. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy IP v4 32 Bits 255 255 255 255 Dotted Decimal Network Host 11111111 11111111 11111111 11111111 192 168 171 221 11000000 10101000 10101011 11011101 Maximum Binary Ex. Decimal Ex. Binary
  • 4. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Types of addresses in IP v4 network
  • 5. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Types of addresses in IP v4 network • Network address: The address by which we refer to the network, all host bits are “0”. • Broadcast address: A special address used to send data to all hosts in the network, all host bits are “1”. • Host addresses: The addresses assigned to the end devices in the network “values between network and broadcast”. 192 168 171 0 11000000 10101000 10101011 00000000 192 168 171 255 11000000 10101000 10101011 11111111 192 168 171 From 1 to 254 11000000 10101000 10101011 00000001 to11111110
  • 6. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Types of addresses in IP v4 network • Prefix Length: the number of bits in the address that gives us the network portion. Ex: 192.168.171.221/24 • Subnet Mask: consists of 32 bits and uses 1s to represent network portion and 0s to represent host portion. Ex: 255.255.255.0
  • 7. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Unicast, Multicast, Broadcast – Types of Communication • Unicast: the process of sending a packet from one host to an individual host “One-to-One”. • Multicast: the process of sending a packet from one host to a selected group of hosts “One-to-Many”. Multicast clients: Hosts that wish to receive multicast data, and must subscribe to a Multicast Group. • Broadcast: the process of sending a packet from one host to all hosts in the network “One-to-All”. 1.Directed Broadcast: is sent to all hosts on a specific network. Ex: 192.168.171.255/24 2.Limited Broadcast: is used for communication that is limited to the hosts on the local network. Ex: 255.255.255.255
  • 8. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Reserved IP v4 address range •Host Addresses: 0.0.0.0 to 223.255.255.255 Within this range there are many addresses that are already reserved for special purposes. •Multicast Addresses (224.0.0.0 to 239.255.255.255): 1.Reserved link local addresses: 224.0.0.0 to 224.0.0.255. Used for multicast groups on a local network. 2.Globally scoped addresses: 224.0.1.0 to 238.255.255.255. Used to multicast data across the Internet. 3.Administratively scoped addresses: 239.0.0.0/8 (limited scope). Used by ISPs to send multicast data to their subscribers. •Experimental Addresses: 240.0.0.0 to 255.255.255.254 (RFC 3330).
  • 9. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Public and Private addresses • Public addresses: designated for use in networks that are accessible on the Internet. • Private addresses: used for internal networks and not routable on the Internet. The private address blocks are: 1. 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8) 2. 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12) 3. 192.168.0.0 to 192.168.255.255 (192.168.0.0 /16) NAT allows the hosts in the network to "borrow" a public address for communicating to outside networks. http://whatismyipaddress.com/ http://show-ip.net/ http://www.whatismyip.com/
  • 10. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Public and Private addresses
  • 11. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Special IP v4 Addresses • Network and Broadcast Addresses: Within each network the first and last addresses cannot be assigned to hosts. • Default Route: 0.0.0.0, all (0.0.0.0 /8) address block is reserved. The default route is used as a "catch all" route when a more specific route is not available. • Loopback: 127.0.0.0 - to - 127.255.255.255. Hosts use loopback to direct traffic to themselves. • Link-Local Addresses: 169.254.0.0 to 169.254.255.255 Automatically assigned by OS where no IP config. is available. • TEST-NET Addresses: 192.0.2.0 to 192.0.2.255 (192.0.2.0 /24). is set aside for teaching and learning purposes.
  • 12. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Special IP v4 Addresses
  • 13. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Classful Addressing Classful allocation of address space often wasted many addresses, which exhausted the availability of IPv4 addresses. Classless Addressing solves this problem
  • 14. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Fill in the information… 1. 192.168.1.3 Class ------- Default Mask: --------------- Network: ------------------- Broadcast: ------------------- Hosts: ----------------------through----------------------- 2. 1.12.100.31 Class ------- Default Mask: --------------- Network: ------------------- Broadcast: -------------------- Hosts: ----------------------through----------------------- 3. 172.30.77.5 Class ------- Default Mask: --------------- Network: ------------------- Broadcast: ------------------- Hosts: ----------------------through-----------------------
  • 15. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Who assigns the different addresses? • Internet Assigned Numbers Authority (IANA), www.iana.net. • IANA is the master holder of the IP addresses • Registration companies, called Regional Internet Registries (RIRs), manage the IP address space.
  • 16. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy ISPs • Tier 1 ISPs provides reliability and speed. • Tier 2 ISPs generally focus on business customers. • Tier 3 ISPs is the retail and home markets in a specific locale.
  • 17. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Overview of IP v6 • IPv6 is not merely a new Layer 3 protocol - it is a new protocol suite, ICMPv6, and new routing protocols.  Large address space  No need for NAT/PAT  Improved Packet Handling through header simplification.  QoS Mechanisms.  Security
  • 18. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Overview of IP v6
  • 19. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy ANDing- What is our network? • The IPv4 host address is logically ANDed with its subnet mask to determine the network address to which the host is associated.
  • 20. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Basic Subnetting • Subnetting: Creating multiple logical networks from a single address block. • No. of subnets: 2n where n = the number of bits borrowed. Dividing networks based on: 1. geographic location 2. Purposes 3. ownership
  • 21. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Basic Subnetting – Borrowing 2 bits (4-Subnets)
  • 22. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Basic Subnetting – Borrowing 3 bits (8-Subnets)
  • 23. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy VLSM – Subnetting a subnet • was designed to maximize addressing efficiency.
  • 24. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Testing the local stack • Ping: is a utility for testing IP connectivity between hosts. Uses ICMP. If the host Echo request, The destination responds with an ICMP Echo Reply datagram.
  • 25. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Traceroute (tracert) – Testing the path • tracert: utility that allows us to observe the path between source and destination. generates a list of hops that were successfully reached along the path. • RTT (Round Trip Time): is the time a packet takes to reach the remote host and for the response from the host to return. An asterisk (*) is used to indicate a lost packet. • If TTL=0 then The router drops the packet and sends an ICMP Time Exceeded message addressed to the originating host.
  • 26. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy ICMP v4 • ICMP is the messaging protocol for the TCP/IP suite. • ICMP provides control and error messages and is used by the ping and traceroute utilities. • ICMP messages that may be sent include: Host confirmation Unreachable Destination or Service 0 = net unreachable, 1 = host unreachable, 2 = protocol unreachable, 3 = port unreachable Time exceeded Route redirection Source quench
  • 27. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy