CCNA Exploration Network Fundamentals

Slides:



Advertisements
Ähnliche Präsentationen
Cadastre for the 21st Century – The German Way
Advertisements

E-Solutions mySchoeller.com for Felix Schoeller Imaging
H - A - M - L - E - IC T Teachers Acting Patterns while Teaching with New Media in the Subjects German, Mathematics and Computer Science Prof. S. Blömeke,
DNS-Resolver-Mechanismus
Managing the Transition from School-to-Work Empirical Findings from a Mentoring Programme in Germany Prof. i.V. Dr. Martin Lang.
Multi electron atoms Atoms with Z>1 contain >1 electron. This changes the atomic structure considerably because in addition to the electron-nucleus interaction,
Fakultät für informatik informatik 12 technische universität dortmund Specifications Peter Marwedel TU Dortmund, Informatik 12 Graphics: © Alexandra Nolte,
Peter Marwedel TU Dortmund, Informatik 12
Fakultät für informatik informatik 12 technische universität dortmund Hardware/Software Partitioning Peter Marwedel Informatik 12 TU Dortmund Germany Chapter.
Formation of Questions in German
Telling Time in German Deutsch 1 Part 1 Time in German There are two ways to tell time in German. There are two ways to tell time in German. Standard.
Regional Support in the context of LCG/EGEE
NUMEX – Numerical experiments for the GME Fachhochschule Bonn-Rhein-Sieg Wolfgang Joppich PFTOOL - Precipitation forecast toolbox Semi-Lagrangian Mass-Integrating.
Wozu die Autokorrelationsfunktion?
Institut für Verkehrsführung und Fahrzeugsteuerung > Technologien aus Luft- und Raumfahrt für Straße und Schiene Automatic Maneuver Recognition in the.
Institut für Verkehrsführung und Fahrzeugsteuerung > Technologien aus Luft- und Raumfahrt für Straße und Schiene Driving Manoeuvre Recognition > 19. Januar.
Lancing: What is the future? Lutz Heinemann Profil Institute for Clinical Research, San Diego, US Profil Institut für Stoffwechselforschung, Neuss Science.
Three minutes presentation I ArbeitsschritteW Seminar I-Prax: Inhaltserschließung visueller Medien, Spree WS 2010/2011 Giving directions.
Munz – IT/TG - Lörrach. Goals of this intensive lecture To learn: To learn: –What does it means programming in Java ? –What is JAVA good/bad for ? –Which.
Deutsche Gesellschaft für Technische Zusammenarbeit GmbH Integrated Experts as interface between technical cooperation and the private sector – An Example.
Adjektive Endungen von Frau Templeton.
Zu + Infinitiv : eine Erklärung
Laurie Clarcq The purpose of language, used in communication, is to create a picture in the mind and/or the heart of another.
Die Zeit (TIME) Germans are on military time which is 1-24
Institut AIFB, Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 Towards Automatic Composition of Processes based on Semantic.
Sanjay Patil Standards Architect – SAP AG April 2008
| DC-IAP/SVC3 | © Bosch Rexroth Pneumatics GmbH This document, as well as the data, specifications and other information set forth in.
Plural Forms of Nouns & Wie viel? or Wie viele?
Morphology and Syntax More on sentence structure.
BAS5SE | Fachhochschule Hagenberg | Daniel Khan | S SPR5 MVC Plugin Development SPR6P.
Meine Schulfächer.
INTAKT- Interkulturelle Berufsfelderkundungen als ausbildungsbezogene Lerneinheiten in berufsqualifizierenden Auslandspraktika DE/10/LLP-LdV/TOI/
DEUTSCHLAND UND DIE MEDIEN
Guten Morgen!.
Verben Wiederholung Deutsch III Notizen.
Modal Verbs Modal verbs are not action verbs!
Fusszeilentext – bitte in (Ansicht – Master – Folienmaster, 1. Folie oben) individuell ändern! Danach wieder zurück in Normalansicht gehen! 1 OTR Shearography.
Kölner Karneval By Logan Mack
Staatsballett Berlin Ein Verbesserungskonzept für den Social- Media Auftritt Your picture here.
Ein Projekt des Technischen Jugendfreizeit- und Bildungsvereins (tjfbv) e.V. kommunizieren.de Blended Learning for people with disabilities.
The most obvious or direct use of auch is to mean also. Ich möchte auch Gitarre lernen. Auch ich möchte Gitarre lernen. I would like to learn Guitar. Someone.
Nouns. What is a noun O A noun is the name of a person, O place, O animal O or thing.
Design Patterns Ein Muster (pattern) ist eine Idee, die sich in einem praktischen Kontext als nützlich erwiesen hat und dies auch in anderen sein wird.
Talking about yourself
Hätte gern vs. Möchte gern
External Labels – The rules For all external labels the following rules apply (external labels are all labels which are not inside of a shape) - all labels.
© Boardworks Ltd of 8 Time Manner Place © Boardworks Ltd of 8 This icon indicates that the slide contains activities created in Flash. These.
By: Jade Bowerman. German numbers are quite a bit like our own. You start with one through ten and then you add 20, 30, 40 or 50 to them. For time you.
Die Kooperation von Forschungszentrum Karlsruhe GmbH und Universität Karlsruhe (TH) dCache T1 admins and experts Welcome to FZK.
German Early Level The Weather.
Adjectiv Endungen Lite: Adjective following articles and pre-ceeding nouns. Colors and Clothes.
Greetings and goodbyes Deutschland v. USA
Auditors report Marianne Grove Ditlevsen Aarhus School of Business Tartu 2000.
Sentence Structure Subject and verb are always together. Subject and verb are always together. Subject and verb must agree Subject and verb must agree.
German Word Order explained!
Present Tense Most regular verbs follow this pattern:
Separable Verbs Turn to page R22 in your German One Book R22 is in the back of the book There are examples at the top of the page.
1 Intern | ST-IN/PRM-EU | | © Robert Bosch GmbH Alle Rechte vorbehalten, auch bzgl. jeder Verfügung, Verwertung, Reproduktion, Bearbeitung,
1 Stevens Direct Scaling Methods and the Uniqueness Problem: Empirical Evaluation of an Axiom fundamental to Interval Scale Level.
THE PERFECT TENSE IN GERMAN
Adjective Endings Nominative & Accusative Cases describing auf deutsch The information contained in this document may not be duplicated or distributed.
Selectivity in the German Mobility Panel Tobias Kuhnimhof Institute for Transport Studies, University of Karlsruhe Paris, May 20th, 2005.
How to use and facilitate an OptionFinder Audience Response System.
Technische Universität München 1 CADUI' June FUNDP Namur G B I The FUSE-System: an Integrated User Interface Design Environment Frank Lonczewski.
TUM in CrossGrid Role and Contribution Fakultät für Informatik der Technischen Universität München Informatik X: Rechnertechnik und Rechnerorganisation.
THE CONVERSATIONAL PAST
Institut für Nachrichtentechnik U. Reimers Technische Universität Braunschweig The MultiMedia Home Platform (MHP): Hype or Reality ?
© Handwerkskammer für München und Oberbayern, Max-Joseph-Straße 4, München Dietmar Schneider Foreign Trade Department of the Chamber of Trade and.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Modalverben.
Azure Mobile Services Deep dive into node.js scripting
 Präsentation transkript:

CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network – IPv4 CIDR und VLSM s. später. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

IPv4 Address Each device on a network must be uniquely defined. The packets of the communication need to be identified with the source and destination addresses of the two end systems IPv4 is 32 bits in length and difficult for human to remember. Therefore, represent IPv4 addresses using dotted decimal format. 10101100000100000000010000010100 (172.16.4.20) AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Some portion of the high-order bits represents the network address. Network - a group of hosts that have identical bit patterns in the network address portion of their addresses. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

A variable number of bits that are called the host portion of the address. The number of bits used in this host portion determines the number of hosts that we can have within the network. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Binary to Decimal Conversion AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Binary to Decimal Conversion AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Type of Addresses AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Network Prefix How do we know how many bits represent the network portion and how many bits represent the host portion? We use network prefix. The prefix length is the number of bits in the address that gives us the network portion Ex: 172.16.4.0 /24, the /24 tells us that the first 24 bits are the network address. This leaves the remaining 8 bits, the last octet, as the host portion. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

How do we calculate network address, broadcast address and host addresses? AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Type of Communication In an IPv4 network, the hosts can communicate one of three different ways: - Unicast - the process of sending a packet from one host to an individual host - Broadcast - the process of sending a packet from one host to all hosts in the network using broadcast address. Broadcast transmission is used for the location of special services/devices for which the address is not known or when a host needs to provide information to all the hosts on the network. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Multicast – it is designed to conserve the bandwidth of the IPv4 network. It reduces traffic by allowing a host to send a single packet to a selected set of hosts Ex of multicast transmission: Video and audio broadcasts, Routing information exchange by routing protocols, Distribution of software, News feeds Multicast clients need to subscribe to a multicast group using multicast address (224.0.0.0 to 239.255.255.255) AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Multicast Transmission AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Multicast address range is subdivided into different types of addresses: reserved link local addresses, globally scoped addresses and administratively scoped addresses (limited scope addresses). Reserved link local addresses - 224.0.0.0 to 224.0.0.255 . These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a time-to-live (TTL) value of 1. Therefore, a router connected to the local network should never forward them AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Limited scope addresses – limited to a local group or an organization Globally scoped addresses - 224.0.1.0 to 238.255.255.255. They may be used to multicast data across the Internet. For example, 224.0.1.1 has been reserved for Network Time Protocol (NTP) to synchronize the time-of-day clocks of network devices. Limited scope addresses – limited to a local group or an organization AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Reserved IP Addresses Experimental addresses are listed as reserved for future use . Currently, they cannot be used in IPv4 networks. These addresses could be used for research or experimentation AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Private IP Address Most IPv4 host addresses are public addresses There are blocks of addresses that are used in networks that require limited or no Internet access. 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8) 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12) 192.168.0.0 to 192.168.255.255 (192.168.0.0 /16) AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Network Address Translation AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Special IPv4 Addresses Network and Broadcast Addresses- As explained earlier, within each network the first and last addresses cannot be assigned to hosts. These are the network address and the broadcast address, respectively. Default Route - Also presented earlier, we represent the IPv4 default route as 0.0.0.0. The default route is used as a "catch all" route when a more specific route is not available. Loopback - a special address that hosts use to direct traffic to themselves. EX: 127.0.0.1 AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Link-Local Addresses - 169. 254. 0 to 169. 254. 255. 255 Link-Local Addresses - 169.254.0.0 to 169.254.255.255 . These addresses can be automatically assigned to the local host by the operating system in environments where no IP configuration is available. TTL value 1 only. Link-local addresses do not provide services outside of the local network. TEST-NET Addresses - 192.0.2.0 to 192.0.2.255 (192.0.2.0 /24). Set aside for teaching and learning purposes. Unlike the experimental addresses, network devices will accept these addresses in their configurations. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Legacy IPv4 Addressing AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Limitation of Class-based System Classful allocation of address space often wasted many addresses, which exhausted the availability of IPv4 addresses. Ex: a company that had a network with 260 hosts would need to be given a class B address with more than 65,000 addresses. The system that we currently use is referred to as classless addressing. With the classless system, address blocks appropriate to the number of hosts are assigned to companies or organizations without regard to the unicast class AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Planning Address to the Network The allocation of these addresses inside the networks should be planned and documented for the purpose of: - Preventing duplication of addresses - Providing and controlling access - Monitoring security and performance IPv4 add can be assigned to hosts like: - End devices for users - Servers and peripherals - Hosts that are accessible from the Internet - Intermediary devices AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

- Will the devices need to be accessed from outside the local network? An important part of planning an IPv4 addressing scheme is deciding when private addresses are to be used and where they are to be applied. Considerations include: - Will there be more devices connected to the network than public addresses allocated by the network's ISP? - Will the devices need to be accessed from outside the local network? - If devices that may be assigned private addresses require access to the Internet, is the network capable of providing a Network Address Translation (NAT) service? AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Who assign addresses? Internet Assigned Numbers Authority (IANA) ( http://www.iana.net ) is the master holder of the IP addresses. The IP multicast addresses and the IPv6 addresses are obtained directly from IANA. URL for APNIC: http://www.apnic.net AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Role of ISP (http://de.wikipedia.org/wiki/Tier-1) Most companies or organizations obtain their IPv4 address blocks from an ISP. The ISP loans or rents these addresses to the organization. Tier 1 ISP (erster Rang)- directly connected to the Internet backbone. The primary advantages for customers of Tier 1 ISPs are reliability and speed. The drawback for Tier 1 ISP customers is its high cost. Tier 2 ISP - Tier 2 ISPs acquire their Internet service from Tier 1 ISPs. Tier 2 ISPs generally focus on business customers. Slower Internet access and lower reliability than Tier 1 ISPs. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Tier 3 ISP - Tier 3 ISPs purchase their Internet service from Tier 2 ISPs. The focus of these ISPs is the retail and home markets in a specific locale. Tier 3 ISPs often bundle Internet connectivity as a part of network and computer service contracts for their customers. They may have reduced bandwidth and less reliability than Tier 1 and Tier 2 providers, AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

IPv6 Internet Engineering Task Force (IETF) grew concerned about the exhaustion of the IPv4 network addresses and began to look for a replacement for this protocol. Other than this, issues like: Improved packet handling, Increased scalability and longevity, QoS mechanisms and Integrated security are considred. Result: IPv6 AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

To provide these features, IPv6 offers: - 128-bit hierarchical addressing - to expand addressing capabilities - Header format simplification - to improve packet handling - Improved support for extensions and options - for increased scalability/longevity and improved packet handling - Flow labeling capability - as QoS mechanisms - Authentication and privacy capabilities - to integrate security AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Subnet Mask To define the network and host portions of an address, the devices use a separate 32-bit pattern called a subnet mask Ex: 255.255.255.0 (11111111.11111111.11111111.00000000) 1 represents network portion. 0 represents hosts You can use network prefix to represent the same thing. EX: /24 AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Understand AND operation The IPv4 host address is logically ANDed with its subnet mask to determine the network address to which the host is associated. 1 AND 1 = 1 1 AND 0 = 0 0 AND 1 = 0 0 AND 0 = 0 Reasons to use AND: - Routers use ANDing to determine an acceptable route for an incoming packet. - An originating host must determine if a packet should be sent directly to a host in the local network or be directed to the gateway. http://de.wikipedia.org/wiki/Gateway_(Computer) AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Basic Subnetting Given192.168.55.129 /28, answer the followings Class of this IP? Subnet mask in binary format? Number of subnets? [2^N] Number of hosts in each subnet? [2^N] Which subnet is this IP belong to? [AND] What is the broadcast add of this subnet? [Last IP] AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Dividing the Network into Right Sizes AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Subnetting a Subnet - VLSM Subnetting a subnet, or using Variable Length Subnet Mask (VLSM) was designed to maximize addressing efficiency. When identifying the total number of hosts using traditional subnetting, we allocate the same number of addresses for each subnet. If all the subnets have the same requirements for the number hosts, these fixed size address blocks would be efficient. However, most often that is not the case. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Testing the Network – Ping Ping is a utility for testing IP connectivity between hosts. Ping sends out requests for responses from a specified host address. Ping uses a Layer 3 protocol that is a part on the TCP/IP suite called Internet Control Message Protocol (ICMP). Ping uses an ICMP Echo Request datagram. Ping local loopback (127.0.0.1) - A response indicates that IP is properly installed on the host. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Testing the Network – Ping Gateway A ping to the gateway indicates that the host and the router's interface serving as that gateway are both operational on the local network. If failed: - problem with router interface - set the wrong address for the gateway. - router interface may be fully operational but have security applied to it that prevents it from processing or responding to ping requests. - It is also possible that other hosts may have the same security restriction applied. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Traceroute – Test the path Traceroute (tracert) is a utility that allows us to observe the path between these hosts. The trace generates a list of hops that were successfully reached along the path. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

ICMP – Supporting Testing & Messaging ICMP is the messaging protocol for the TCP/IP suite. ICMP provides control and error messages and is used by the ping and traceroute utilities. ICMP messages that may be sent include: Host conformation, Unreachable Destination or Service, Time exceeded, Route redirection & Source quench AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Host Confirmation: An ICMP Echo Message can be used to determine if a host is operational. The host receiving the echo message replies with the ICMP Echo Reply. The ICMP Destination Unreachable can used to notify a host that the destination or service is unreachable. An ICMP Time Exceeded message is used by a router to indicate that a packet cannot be forwarded because the TTL field of the packet has expired. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

A router may use the ICMP Redirect Message to notify the hosts on a network that a better route is available for a particular destination. This message may only be used when the source host is on the same physical network as both gateways. The ICMP Source Quench message can be used to tell the source to temporarily stop sending packets. A destination host may also send a source quench message if datagrams arrive too fast to be processed. When a host receives an ICMP Source Quench message, it reports it to the Transport layer. The source host can then use the TCP flow control mechanisms to adjust the transmission. AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de   

Fachschule für Elektrotechnik The end… Fachschule für Elektrotechnik AK-Automatisierungs und Kommunikationstechnik – TI – Technische Informatik NWT – Netzwerktechnik – www.munz-udo.de