Este documento discute conceitos fundamentais de redes de computadores, incluindo modelos de rede OSI e TCP/IP, componentes de comunicação, tipos de endereços e protocolos de rede. Ele também fornece detalhes sobre configuração de ligações de rede, incluindo topologias, categorias de rede e organizações que estabelecem padrões de rede.
3. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Configuração das ligações de RedeConfiguração das ligações de Rede
• Componentes de comunicação
• Fluxo de Dados; Tipos de conexão; Topologia Fisica;
Categorias de Rede; ISP-NAPs;
• Conceito de tarefas distribuidas por camadas
• Organizações que estabelecem padrões e Padrão Internet
• Arquitectura do modelo OSI e Decomposição OSI
• Arquitectura do modelo TCP/IP e e Decomposição TCP/IP
• Relação do modelo TCP/IP com o modelo OSI
• Tipos de Endereços TCP/IP
• ARP/RARP e TCP/UDP
• Componentes de comunicação
• Fluxo de Dados; Tipos de conexão; Topologia Fisica;
Categorias de Rede; ISP-NAPs;
• Conceito de tarefas distribuidas por camadas
• Organizações que estabelecem padrões e Padrão Internet
• Arquitectura do modelo OSI e Decomposição OSI
• Arquitectura do modelo TCP/IP e e Decomposição TCP/IP
• Relação do modelo TCP/IP com o modelo OSI
• Tipos de Endereços TCP/IP
• ARP/RARP e TCP/UDP
9. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Categorias de Rede
Existem duas categorias principais de rede, redes locais e redes de ampla
abrangência, geográficamente distribuidas.
A categoria na qual um a rede pertence é determinada pelo seu tamanho.
LAN: Uma rede local privada que interliga dispositivos num escritório, prédio.
O tamanho é limitado a alguns quilômetros, utiliza apenas um tipo de transmissão.
A topologia mais comum é a de Barramento, Anel, ou Estrela.
WAN: Uma rede de ampla abragência que possibilita transmissão por grandes
áreas geográficas.
Assume duas formas WAN Comutada e WAN Ponto-a-Ponto.
WAN comutada: rede complexa que conecta os sistemas finais e, geralmente,
é formada por um Router – um dispositivo de conexão entre redes – que se
conecta a outra LAN ou WAN.
WAN ponto-a-ponto: contituida por uma linha alugada que conecta um
computador ou uma LAN a um provedor de serviços de Internet (ISP).
28. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
A camada de aplicação fornece interface com o utilizador e suporte aos serviços.
Exemplo: um programa de tratamento de mensagens (X.400); serviços de directorias (X.500); transferência,
acesso e gestão de arquivo (FTAM).
A camada de aplicação fornece interface com o utilizador e suporte aos serviços.
Exemplo: um programa de tratamento de mensagens (X.400); serviços de directorias (X.500); transferência,
acesso e gestão de arquivo (FTAM).
Camada de Aplicação do modelo OSI
Tarefas na camada de Aplicação:
Terminal de rede virtual para acesso remoto; Transferência, acesso e gestão de
ficheiros; Serviço de correio eletrónico; Serviços de directoria para acesso a dados
distribuidos.
31. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Relação do modelo TCP/IP com o modelo OSI
TCP/IP:
O modelo OSI nunca foi adoptado na práctica, mas os nomes e os números das
camadas perduraram para outros modelos.
O Conjunto de protocolos TCP/IP embora baseado no seu próprio modelo
estabelece definição na relação comparativa que mantêm com o modelo OSI.
Conjunto Protocolar TCP/IPTCP/IPOSI
TCPTCP UDPUDP
EthernetEthernet Frame
Relay
Frame
Relay
Token
Ring
Token
Ring ATMATM
ApplicationApplication
TransportTransport
Network
Interface
Network
Interface
HTTPHTTP
ApplicationApplication
TransportTransport
NetworkNetwork
Data-LinkData-Link
PresentationPresentation
SessionSession
PhysicalPhysical
InternetInternet
FTPFTP
SMTPSMTP
DNSDNS
POP3POP3
SNMPSNMP
IPv6IPv6IPv4IPv4
ARPARP IGMP
IGMP
ICMPICMP
36. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Endereçamento IPv4Endereçamento IPv4
• Estrutura IPv4
• Relação da notação binária para decimal
• Arquitectura de Endereçamento IPv4 por classe
• Classes de Endereços
• Netid / Hostid
• Conçeito de Máscara nos endereços e a Mascara de Rede
• Comunicação na mesma rede
• Comunicação entre redes
• Gateway pré-definido
• Determinar endereçamento IP para rede local ou rede remota
• Identificação do Endereço de Rede; Broadcast; Loopback
• Estrutura IPv4
• Relação da notação binária para decimal
• Arquitectura de Endereçamento IPv4 por classe
• Classes de Endereços
• Netid / Hostid
• Conçeito de Máscara nos endereços e a Mascara de Rede
• Comunicação na mesma rede
• Comunicação entre redes
• Gateway pré-definido
• Determinar endereçamento IP para rede local ou rede remota
• Identificação do Endereço de Rede; Broadcast; Loopback
57. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Exemplos de endereços num bloco Classless
Um bloco de endereços foi atribuido a uma pequena organização.
Um dos endereços é 205.16.37.39/28. Qual o primeiro endereço do bloco?
Pergunta:Pergunta:
A representação binária do endereço é 11001101 00010000 00100101 00100111
Configurando-se em 0 os 32−28 bits 11001101 00010000 00100101 0010000
Ou 205.16.37.32.
Resposta:Resposta:
Qual o último endereço do bloco?
Pergunta:Pergunta:
A representação binária do endereço é 11001101 00010000 00100101 00100111
Configurando-se em 1 os 32−28 bits 11001101 00010000 00100101 00101111
Ou 205.16.37.47.
Resposta:Resposta:
Qual o número de endereços disponiveis para o bloco?
Pergunta:Pergunta:
O valor de n=28 o que significa que o número de endereços é:
2 32−28
ou 16.
Resposta:Resposta:
58. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Determinar endereços num bloco Classless
Outra forma de determinar os endereços Classless é representar a mascara em
número binário de 32-bits.
No exemplo 205.16.37.39/28 a máscara /28 pode ser representada como:
11111111 11111111 11111111 11110000 (vinte oito 1s e quatro 0s).
Primeiro endereço: Operador Lógico AND entre endereços e máscara.
AND feito bit a bit, resultado lógico entre dois bits é 1 AND 1 = 1; qualquer outro é 0.
Último endereço: OR entre endereços atribuidos com complemento da máscara.
OR feito bit a bit, resultado entre dois bits é 0 OR 0 = 0; qualquer outro é 1.
O complemento dum número encontra-se mudando cada 1 para 0 e cada 0 para 1.
Número de endereços: complementando-se a mascara, interpretada como número
decimal e adicionando-se 1.
59. CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Exemplos de endereços num bloco Classless
Um bloco de endereços foi atribuido a uma pequena organização.
Um dos endereços é 205.16.37.39/28. Qual o primeiro endereço do bloco?Pergunta:Pergunta:
Primeiro endereço: Operador Lógico AND entre endereços e máscara.
AND feito bit a bit, resultado lógico entre dois bits é 1 AND 1 = 1; qualquer outro é 0
Resposta:Resposta:
Qual o último endereço do bloco?Pergunta:Pergunta:
Último endereço: OR entre endereços atribuidos com complemento da máscara.
OR feito bit a bit, resultado entre dois bits é 0 OR 0 = 0; qualquer outro é 1.
O complemento dum número encontra-se mudando cada 1 para 0 e cada 0 para 1.
Resposta:Resposta:
Qual o número de endereços disponiveis para o bloco?Pergunta:Pergunta:
Número de endereços: mascara complementar em número décimal + 1.
Resposta:Resposta:
Describe the areas for which each standards body provides standards. Provide an example for each standards body:
•IETF – Internet RFCs (TCP/IP)
•W3C – World wide web development (HTML, HTTP)
•IEEE – Ethernet (802.3), Wi-Fi (802.11)
•ITU – H.323 (Videoconferencing protocol), Modem standards (V.92)
Question: Why would you want to know which organization is responsible for defining a particular network standard?
Answer: When troubleshooting a problem, you go to the organization’s Web site to get detailed information about the network standard.
Describe the areas for which each standards body provides standards. Provide an example for each standards body:
•IETF – Internet RFCs (TCP/IP)
•W3C – World wide web development (HTML, HTTP)
•IEEE – Ethernet (802.3), Wi-Fi (802.11)
•ITU – H.323 (Videoconferencing protocol), Modem standards (V.92)
Question: Why would you want to know which organization is responsible for defining a particular network standard?
Answer: When troubleshooting a problem, you go to the organization’s Web site to get detailed information about the network standard.
Describe the four layers of the TCP/IP model. Do not go into depth describing each protocol because that is covered in later topics.
Describe the benefits of using a layered approach to development.
This module covers only IPv4. IPv6 is covered in “Module 6, IPv6 Fundamentals.”
Question: Why is understanding the TCP/IP architecture beneficial to you?
Answer: Understanding the overall communication process used by TCP/IP protocols can be useful for troubleshooting and understanding the communication process used by applications.
Describe how the layers of the TCP/IP model correspond with the layers of the Open System Interconnection (OSI) model. Use brief examples of specific protocols to help students understand.
Question: Why is it useful to know how the TCP/IP model relates to the OSI model?
Answer: It allows you to understand the functionality performed by TCP/IP protocols and compare them to other protocols and hardware devices.
Describe how the layers of the TCP/IP model correspond with the layers of the Open System Interconnection (OSI) model. Use brief examples of specific protocols to help students understand.
Question: Why is it useful to know how the TCP/IP model relates to the OSI model?
Answer: It allows you to understand the functionality performed by TCP/IP protocols and compare them to other protocols and hardware devices.
Describe how the layers of the TCP/IP model correspond with the layers of the Open System Interconnection (OSI) model. Use brief examples of specific protocols to help students understand.
Question: Why is it useful to know how the TCP/IP model relates to the OSI model?
Answer: It allows you to understand the functionality performed by TCP/IP protocols and compare them to other protocols and hardware devices.
Describe how the layers of the TCP/IP model correspond with the layers of the Open System Interconnection (OSI) model. Use brief examples of specific protocols to help students understand.
Question: Why is it useful to know how the TCP/IP model relates to the OSI model?
Answer: It allows you to understand the functionality performed by TCP/IP protocols and compare them to other protocols and hardware devices.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
Work through the example in this topic to ensure that students understand the basic concept of binary numbers and how they are converted to dotted decimal notation.
Show students how to perform this calculation by using the calculator. Briefly explain manual conversion.
Question: Why should you understand the binary representation of IP addresses?
Answer: When performing complex subnetting, where an octet in the subnet mask is divided between the network ID and the host ID, you can easily see how the process works and correct mistakes. In binary representation, there is a logical flow. In dotted decimal notation, the logical flow is less obvious.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
At this time, students need to understand that the 255 in a subnet mask indicates that an octet is part of the network number and what a valid subnet mask looks like. Binary subnet masks with non-255 values are covered in “Module 6: Creating IPv4 Address Spaces.”
Explain that when a subnet mask is configured incorrectly, a computer may not be able to communicate with computers on other networks.
Question: If a computer has an IP address of 172.31.99.220 and a subnet mask of 255.255.0.0, what is the network ID and host ID?
Answer: The network ID is 172.31.0.0 and the host ID is 0.0.99.220
Describe the process for IPv4 communication within a single network. Point out the source and destination IP and MAC addresses to students.
Question: What effect will an incorrectly configured default gateway have on communication within a single network?
Answer: There is no effect because a router is not used during communication within a single network.
Explain to students that a default gateway is required to communicate with non-local networks. Discuss some indications that a default gateway is configured incorrectly:
•You are able to communicate with some internal resources but not others.
•You are able to communicate with internal resources but not the Internet.
If necessary, describe briefly to students that Dynamic Host Configuration Protocol (DHCP) is used to assigned IP address information to clients automatically on the network. DHCP is covered in more detail in “Lesson 4: Dynamic IP Addressing” later in this module.
Question: What symptom will occur if computers are not configured correctly with a default gateway?
Answer: If the default gateway is configured incorrectly a computer will not be able to communicate outside of the local network.
Describe the process for IPv4 communication between networks. Point out the source and destination IP and MAC addresses to students.
Question: Why does a computer use its own subnet mask to determine that the destination computer is on a different network?
Answer: The computer has only its own configuration information to perform the calculations. The source computer does not have access to the subnet mask of the destination computer.
Many students are not comfortable with binary math. ANDing is the correct term for the binary math that is performed. However, the important thing for students to understand is that:
1 in the subnet mask corresponds with a bit in the network ID.
0 in the subnet mask corresponds with a bit in the host ID.
Question: Do you need to know binary math to understand subnetting?
Answer: No. Subnetting is based on identifying patterns. In most cases, recognizing that any bit in the subnet mask with a value of 1 is part of the network ID is sufficient.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Describe each of the Internet Protocol version 4 (IPv4) address classes to students. Also mention to students the reserved internal network address ranges:
•10.0.0.0-10.255.255.255
•172.16.0.0-172.31.255.255
•192.168.0.0-192.168.255.255
Question: Why is it important to know the IPv4 address classes?
Answer: By knowing IPv4 address classes, you will be able to identify the associated default subnet mask.
Many students are not comfortable with binary math. ANDing is the correct term for the binary math that is performed. However, the important thing for students to understand is that:
1 in the subnet mask corresponds with a bit in the network ID.
0 in the subnet mask corresponds with a bit in the host ID.
Question: Do you need to know binary math to understand subnetting?
Answer: No. Subnetting is based on identifying patterns. In most cases, recognizing that any bit in the subnet mask with a value of 1 is part of the network ID is sufficient.
Many students are not comfortable with binary math. ANDing is the correct term for the binary math that is performed. However, the important thing for students to understand is that:
1 in the subnet mask corresponds with a bit in the network ID.
0 in the subnet mask corresponds with a bit in the host ID.
Question: Do you need to know binary math to understand subnetting?
Answer: No. Subnetting is based on identifying patterns. In most cases, recognizing that any bit in the subnet mask with a value of 1 is part of the network ID is sufficient.
Many students are not comfortable with binary math. ANDing is the correct term for the binary math that is performed. However, the important thing for students to understand is that:
1 in the subnet mask corresponds with a bit in the network ID.
0 in the subnet mask corresponds with a bit in the host ID.
Question: Do you need to know binary math to understand subnetting?
Answer: No. Subnetting is based on identifying patterns. In most cases, recognizing that any bit in the subnet mask with a value of 1 is part of the network ID is sufficient.
Many students are not comfortable with binary math. ANDing is the correct term for the binary math that is performed. However, the important thing for students to understand is that:
1 in the subnet mask corresponds with a bit in the network ID.
0 in the subnet mask corresponds with a bit in the host ID.
Question: Do you need to know binary math to understand subnetting?
Answer: No. Subnetting is based on identifying patterns. In most cases, recognizing that any bit in the subnet mask with a value of 1 is part of the network ID is sufficient.
Many students are not comfortable with binary math. ANDing is the correct term for the binary math that is performed. However, the important thing for students to understand is that:
1 in the subnet mask corresponds with a bit in the network ID.
0 in the subnet mask corresponds with a bit in the host ID.
Question: Do you need to know binary math to understand subnetting?
Answer: No. Subnetting is based on identifying patterns. In most cases, recognizing that any bit in the subnet mask with a value of 1 is part of the network ID is sufficient.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Most students should be familiar with the concept of a subnet, so try not to spend too much time on this topic. The main point to reinforce is the concept of subnetting. Review the considerations and steps for creating a subnet, and emphasize that students will base their subnetting implementations on the organization's network requirements.
Question: What is the minimum number of subnets required for a company with three physical locations?
Answer: Three subnets are required. One subnet is required for each location so that routers can control packet movement between the locations.
Use the animated slide to describe the relationship between the number of subnets and the number of hosts. Emphasize to students that in a subnet mask, expressed in binary notation, a 1 represents a bit in the network ID, and a 0 represents a bit in the host ID. Relate this back to the 255 and 0 used in simple networks.
Question: Which is more important, allowing the number of hosts to grow or allowing the number of subnets to grow?
Answer: This depends on the growth patterns of your network. If the number of subnets is too small, you can add an additional IP address range. If the number of hosts is too small, you can use multiple subnets.
Explain that stateful autoconfiguration uses a protocol, such as Dynamic Host Configuration Protocol version 6 (DHCPv6), while stateless autoconfiguration is performed based on router advertisements.
The autoconfigured address states are similar to a DHCPv4 lease time. You can describe these states as being a lease time with two levels. Describe each state to students.
Question: If the IPv6 address of a host has entered the deprecated state, can it continue to communicate on the network?
Answer: Yes. A host can still use a deprecated IPv6 address, but will attempt to renew the address.
Follow the process diagram and explain the steps. Ensure students understand that, in most cases, the stateful address configuration protocol with be DHCPv6. However, depending on the organization, it may be simpler to allow router advertisements to configure hosts than implementing a specific DHCPv6 server. Or a DHCPv6 server may be used only to deliver additional options such as DNS server.
DHCPv6 is used by clients when:
•No router advertisement response is received during autoconfiguration:
A router is not able to provide stateless configuration
•The managed address flag is set in the router advertisement:
The router advertisement is set by an administrator to instruct the computer to obtain a stateful address.
•The other stateful configuration flag is set in the router advertisement:
The router advertisement is configured by an administrator to instruct the computer to obtain configuration settings by using a stateful address configuration protocol.
Question: Who configures the router advertisements?
Answer: The network administrator is responsible for configuring IPv6 routers appropriately. This includes configuring the settings such as autonomous flag, managed address configuration flag, and other stateful configuration flags.