Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lec1: Experiment Designing the network, IP addressing and Subnets, designing using Variable Length Subnet Mask Dr. Mohamed Abd-Eldayem References: CCNA.

Similar presentations


Presentation on theme: "Lec1: Experiment Designing the network, IP addressing and Subnets, designing using Variable Length Subnet Mask Dr. Mohamed Abd-Eldayem References: CCNA."— Presentation transcript:

1 Lec1: Experiment Designing the network, IP addressing and Subnets, designing using Variable Length Subnet Mask Dr. Mohamed Abd-Eldayem References: CCNA Curriculum CCNA Command Quick Reference by Scott Epson

2 Network Devices Comparison
L3 Switch - Router Bridge Work on Layer 3 (Network Layer) of the OSI model Work on Layer 2 (Data Link Layer) of the OSI model Uses the IP address (Logical Address) for locating devices in the network. Uses the MAC address (physical address) to locate devices in the network Connects multiple network segments together Connect two similar network segments together Saves the bandwidth of the network because it establishes a direct link between the source and the destination address Waste the bandwidth of the network because it broadcast messages

3 IP address VS. MAC address
Is a 32-bit (logical address) that is assigned to devices attached to the network by network devices such as switch. Used in layer 3 (Network Layer) of the OSI model Is a (physical address) that is written on the network card of devices (permanent address). Used in layer 2 (Data Link Layer) of the OSI model

4 2.1 Ethernet Switching 2.1 Layer 2 bridging
00000CBBBBBB

5 2.1 Layer 2 bridging (A -> B)
The bridge has just been started so the bridge table is empty. The bridge just waits for traffic on the segment. When traffic is detected, it is processed by the bridge. Host A is pinging Host B. Data is transmitted on the entire collision domain (segment1), both the bridge and Host B process the packet. Bridge Table Port MAC Address

6 2.1 Layer 2 bridging (A -> B)
The bridge adds the source address of the frame (Host A) to its bridge table. Since the frame was received on port 1, the frame must be associated with port 1 in the table. The destination address of the frame is checked against the bridge table. Since the address is not in the table, the frame is forwarded to the other segment (Segment2). Bridge Table Port MAC Address Port 1 00000CAAAAAA

7 2.1 Layer 2 bridging (A -> B)
Host C & D discards the received frame as they were not the intended destination. Host B processes the ping request and transmits a ping reply back to Host A. The data is transmitted over the whole collision domain. Both Host A and the bridge receive the frame and process it. The bridge Adds the source address of the replay frame to its bridge table (Host B). Check the destination address of the frame against the bridge table. Since the address is found in the table at port 1 the frame is not forwarded. Bridge Table Port MAC Address Port 1 00000CAAAAAA 00000CBBBBBB

8 2.1 Layer 2 bridging (A -> C)
Host A ping Host C. the frame is transmitted on the entire collision domain (segment1) Both the bridge and Host B process the frame. Host B discards the frame as it was not the intended destination. The Bridge renew the source address of the frame (Host A) in the bridge table because it is already entered. The destination address of the frame (Host C) is checked against the bridge. Since the address is not in the table, the frame is forwarded to the other segment (Segment2)

9 2.1 Layer 2 bridging (A -> C)
Host C processes the ping request and transmits a ping reply back to Host A. The data is transmitted over the whole collision domain (Segment 2). Host D discards the frame, as it was not the intended destination.

10 2.1 Layer 2 bridging (A -> C)
The bridge adds the source address of the frame (Host C) to its bridge table. The frame must be associated with port 2 in the table. The destination address of the frame (Host A) is checked against the bridge. The address is in the table but it is associated with port 1, so the frame is forwarded to the other segment (Segment1). Bridge Table Port MAC Address Port 1 00000CAAAAAA 00000CBBBBBB Port 2 00000CCCCCCC

11 A bridge has only two ports and divides a collision domain into two parts, but it do not affect the logical or Layer 3 addressing. Thus, a bridge will divide a collision domain but has no effect on a logical or broadcast domain.

12 2.2 Switch operation A switch is simply a bridge with many ports. When only one node (computer) is connected to a switch port, the collision domain on the shared media contains only two nodes. Most switches are capable of supporting full duplex (means that data can be transmitted in both directions on the medium at the same time)

13 Revision: Converting Decimal To Binary
Example convert the decimal number 198 to binary number? Decimal Number Divisor Reminder 198 2 99 1 49 24 12 6 3 Decimal: 198 Binary: The binary number is the reminder written from the bottom to the top

14 Revision: Converting Binary To Decimal
Converting the binary number to decimal number 1 + 0 x 20 + 1 x 21 + 1 x 22 + 0 x 23 + 0 x 24 + 0 x 25 + 1 x 26 1 x 27 128 + = 198 Number Decimal

15 IP Address An IP address is four bytes (octets). Each contains eight bits (total of 32 bits in length). Each octet is a number from 1 to 254. IP addresses are usually given as dotted decimal notation.

16 Class A, B, C, D, and E IP addresses
IP addresses are divided into five classes: Class A addresses are assigned to larger networks. Class B addresses are used for medium-sized networks. Class C for small networks. Class D used by multicast group. Class E reserved by research groups Each class uses a different combination of octets to indicate the number of the network and the number of the host. The first step in determining which part of the address identifies the network and which part identifies the host is identifying the class of an IP address.

17 IP Classes Class A Class B Class C

18 2.4 Reserved IP addresses:
Network address – Used to identify the network itself An IP address that has binary 0s in all host bit positions is reserved for the network address. Ex.: The network. Data that is sent to any host on that network (ex: hosts number ) will be seen outside of the local area network as The only time that the host numbers matter is when the data is on the local area network. Broadcast address – Used for broadcasting packets to all the devices on a network The broadcast address. Data that is sent to the broadcast address will be read by all hosts on that network ( ).

19 Host & Network Portions for the different classes
First octet Example Network Part Host part Number of Networks Number of Hosts * A 1-126 xxx.xxx.xxx.xxx 126 (23*23*23)-2 = B 16,384 (23*23)-2 = 65,534 C 2 million (23)-2 = 254 The first address ( xxx.xxx.xxx.0) & the last address (xxx.xxx.xxx.111) are reserved for the network ( xxx.xxx.xxx.0) for the network & (xxx.xxx.xxx.111) for broadcasting

20 Unicast Broadcast Multicast
Unicast packets are sent from single host to another single host. Broadcast is when a single device is transmitting a message to all other devices in a given address range. Multicast enables a single device to communicate with a specific set of hosts, not defined by any standard IP address and mask combination.  There is one device transmitting a message destined for one receiver. This broadcast could reach all hosts on the subnet, all subnets, or all hosts on all subnets. Broadcast packets have the host (and/or subnet) portion of the address set to all ones. Communication resembles a conference call. Anyone from anywhere can join the conference, and everyone at the conference hears what the speaker has to say. The speaker's message isn't broadcasted everywhere, but only to those in the conference call itself.

21 Example1 72.255.255.255 LAN What is the Network address? 72.0.0.0
To which class this network belongs? Class A because network number = 72 72 ϵ {1-126} What is the broadcast address? What is the IP addresses of the hosts? IP Address of host1: IP Address of host2: IP Address of host3: IP Address of host4: Host2: Host1: Host4: Host3: LAN

22 What is subnetting? Subnetting is the process of borrowing bits from the HOST bits, in order to divide the larger network into small subnets. Subnetting does NOT give you more hosts, but actually costs you hosts (decrease number of hosts). You lose two host IP Addresses for each subnet, and perhaps one for the subnet IP address and one for the subnet broadcast IP address.

23 Why Do We Use Subnetting?
A company uses two or more types of LAN technology (for example, Ethernet, Token Ring) on their network or different physical media (such as Ethernet, FDDI, WAN, etc.)   Two network segments are restricted by distance limitations (for example, remote offices linked via point-to-point circuit).  Segments need to be localized for network management reasons (accounting segment, sales segment, etc.). Hosts which dominate most of the LAN bandwidth need to be isolated. Security. The most common reason is to control network traffic.

24 How it works? The IP address is split into a network and host portion.
The network portion always remains fixed for a particular network, while the remaining bits which make up the host portion can be altered to give the range of addresses to assign to hosts. To determine where the network portion ends and the host portion begins, a subnet mask is used.

25 Subnet Mask A subnet mask is used to separate a network number from the host number in an IP address. 255 represents a network and 0 represents a host. Default subnet masks: Class A Class B Class C 11/9/2018 Fatimah Al-Akeel - Network 9

26 Steps to Solve Subnetting Questions
Look at the MSB (Most Significant Bit) of the IP, Identify the Class(A, B or C), then determine the number of bits assigned to the Network Portion (8 for class A, 16 for Class B and 24 for Class C) Ex.: IP= , Class = B, N =16 bits Look at Subnet Mask (SM), the number of zeros identify the Host portion Ex. SM = , H=8 bits Look at IP and SM together, The portion Between the Network and Host portions is the Sub Network portion. Ex. IP= SM = = N = 16 SN = 8 H= 8

27 Steps to Solve Subnetting Questions
Identify the Subnet ID: By doing (IP address ) AND (Mask) Subnet ID = Identify Broadcast address: By changing all bits of host portion in Subnet ID to 1’s. Broadcast address = Identify the First IP address: Change the LSB of host portion in Subnet ID to 1. First IP address = Identify the Last IP address: Subtract 1 from host portion of Broadcast address. Last IP address =

28 Example (1) Given the following IP address with a subnet mask of determine: Network Address Default subnet mask Broadcast address of the network Subnet ID Broadcast address of the subnet. First & last host address in the subnet.

29 Example (1) Network Address
To determine the network address we have to determine the class of the IP address  38 ϵ {1-126} Class A In class A network portion is the first octet & the remaining three octets for the host are zeros. Network Address:

30 Example (1) Default subnet mask Broadcast address of the network
For Class A addresses, default subnet mask is: Broadcast address of the network Changing all the host bits to 1 give you the broad cast address: Broadcast Address =

31 Example (1) Subnet ID: IP 00100110.00001001.11010011 . 00010011
First: Determine the following bits in the following order: Network portion (N) (Fixed depends on the IP class) Subnet portion (S) (From the end of the network portion to the last bit in the mask with the value 1) Host portion (H) (The remaining bits after the subnet portion) IP Mask S = 20 H=4 N = 8

32 Example (1) Second: Do the AND operation between the IP address & the mask IP Mask ______________________________________________ Subnet ID Subnet ID in decimal = AND

33 Example (1) Broadcast address of the subnet.
To get the broad cast address replace the host bits in the subnet ID with 1s Subnet ID Broadcast Address Broadcast Address in decimal Host bits

34 Example (1) First & last host address in the subnet.
To get the first address replace all the host bits with zeros except the last bit replace it with one as follows: Subnet ID First Host Address First Host Address in decimal Host bits Host bits

35 Example (1) First & last host address in the subnet.
To get the last address replace all the host bits with ones except the last bit replace it with zero as follows: Subnet ID Last Host Address Last Host Address in decimal Host bits Host bits

36 Example (2): IP=182.250.200.028, SM= 255.255.255.248 H= 3 N = 16
Class of the IP is B Network Address= Default Subnet Mask of the IP = Broadcast address of the network = Subnet ID = Broadcast address of the subnet = First IP address = Last IP address = SN = 13 H= 3 N = 16

37 In Decimal Example (2): IP=182.250.200.28, SM= 255.255.255.248
Class of the IP is B Network Address= Default Subnet Mask of the IP = Broadcast address of the network = Subnet ID = Broadcast address of the subnet = First IP address = Last IP address =

38 Demonstrating the different type of IPs in Example (2)
Subnet ID: First IP: Last IP: Network Address:

39 Public and private IP addresses
Public IP addresses are unique and it must be obtained from an Internet service provider (ISP) RFC 1918 sets aside three blocks of IP addresses for private, internal use. These three blocks consist of one Class A, a range of Class B addresses, and a range of Class C addresses. Addresses that fall within these ranges are not routed on the Internet backbone. Internet routers immediately discard private addresses.

40 Public and private IP addresses
If addressing a nonpublic intranet, a test lab, or a home network, private addresses can be used instead of globally unique addresses. Connecting a network using private addresses to the Internet requires translation of the private addresses to public addresses. This translation process is referred to as Network Address Translation (NAT).

41

42 For any IP address, if the subnet mask is the default IP address of that class then there is no subnetting

43 Establishing the subnet mask address
Selecting the number of bits to use in the subnet process will depend on the maximum number of hosts required per subnet. Most Significant Bit (MSB) Least Significant Bit (LSB) The last two bits in the last octet, regardless of the IP address class, may never be assigned to the subnetwork. The subnet mask gives the router the information required to determine in which network and subnet a particular host resides.

44 Establishing the subnet mask address
If three bits were borrowed, the mask for a Class C address would be This mask may also be represented, in the slash format, as /27. The number following the slash is the total number of bits that were used for the network and subnetwork portion To determine the number of bits to be used, the network designer needs to calculate how many hosts the largest subnetwork requires and the number of subnetworks needed.

45 Subnetting chart

46 Ex1. : A network requires 30 hosts and five subnetworks. IP = 192. 168
Ex1.: A network requires 30 hosts and five subnetworks. IP = , Class C Using the subnetting chart, by consulting the row titled ”Usable hosts”, the chart indicates that for 30 usable hosts three bits are required. This creates, six usable subnetworks. Number of usable subnets= two to the power of the assigned subnet bits or borrowed bits, minus two (reserved addresses for subnetwork id and subnetwork broadcast) usable subnets =(2 borrowed bits) – 2 = (23) – 2 = 6 Number of usable hosts= two to the power of the bits remaining, minus two (reserved addresses for subnet id and subnet broadcast) usable hosts= (2 remaining host bits) – 2 = (25) – 2 = 30

47 Ex1. : A network requires 30 hosts and five subnetworks. IP = 192. 168
Ex1.: A network requires 30 hosts and five subnetworks. IP = , Class C

48 Subnetting Class A and B networks
The available bits for assignment to the subnet field in a Class A address is 22 bits while a Class B address has 14 bits. Assigning 12 bits of a Class B address to the subnet field creates a subnet mask of or /28. Assigning 20 bits of a Class A address to the subnet field creates a subnet mask of or /28. class of address needs to be subnetted: Total subnets = 2 the bits borrowed Total hosts= 2 the bits remaining Usable subnets = 2 the bits borrowed Usable hosts= 2 the bits remaining - 2

49


Download ppt "Lec1: Experiment Designing the network, IP addressing and Subnets, designing using Variable Length Subnet Mask Dr. Mohamed Abd-Eldayem References: CCNA."

Similar presentations


Ads by Google

玻璃钢生产厂家无锡独特玻璃钢座椅雕塑辛集玻璃钢雕塑艺术玻璃钢手加工雕塑6商场镜面美陈耐腐蚀玻璃钢雕塑服务至上云南玻璃钢雕塑哪家便宜长沙市玻璃钢雕塑模型厂家商场雪景主题美陈安徽孔子玻璃钢雕塑沈阳小区玻璃钢雕塑制作鄂州玻璃钢卡通雕塑玻璃钢创意雕塑造型玻璃钢鹿雕塑原理鹤壁玻璃钢卡通雕塑铸造工艺优惠的玻璃钢人物雕塑玻璃钢雕塑质保台州景观玻璃钢雕塑多少钱美陈玻璃钢雕塑哪家便宜玻璃钢桃子雕塑选哪家杭州河源玻璃钢动物雕塑兴宁玻璃钢头像雕塑玻璃钢雕塑销售的主要对象东莞玻璃钢动物雕塑推荐货源重庆多彩玻璃钢雕塑价位洛阳铜玻璃钢人物雕塑加工石家庄中式玻璃钢雕塑青海玻璃钢雕塑材质台州玻璃钢人物雕塑批发玻璃钢佛像雕塑哪里的好新乡玻璃钢雕塑制作厂家香港通过《维护国家安全条例》两大学生合买彩票中奖一人不认账让美丽中国“从细节出发”19岁小伙救下5人后溺亡 多方发声单亲妈妈陷入热恋 14岁儿子报警汪小菲曝离婚始末遭遇山火的松茸之乡雅江山火三名扑火人员牺牲系谣言何赛飞追着代拍打萧美琴窜访捷克 外交部回应卫健委通报少年有偿捐血浆16次猝死手机成瘾是影响睡眠质量重要因素高校汽车撞人致3死16伤 司机系学生315晚会后胖东来又人满为患了小米汽车超级工厂正式揭幕中国拥有亿元资产的家庭达13.3万户周杰伦一审败诉网易男孩8年未见母亲被告知被遗忘许家印被限制高消费饲养员用铁锨驱打大熊猫被辞退男子被猫抓伤后确诊“猫抓病”特朗普无法缴纳4.54亿美元罚金倪萍分享减重40斤方法联合利华开始重组张家界的山上“长”满了韩国人?张立群任西安交通大学校长杨倩无缘巴黎奥运“重生之我在北大当嫡校长”黑马情侣提车了专访95后高颜值猪保姆考生莫言也上北大硕士复试名单了网友洛杉矶偶遇贾玲专家建议不必谈骨泥色变沉迷短剧的人就像掉进了杀猪盘奥巴马现身唐宁街 黑色着装引猜测七年后宇文玥被薅头发捞上岸事业单位女子向同事水杯投不明物质凯特王妃现身!外出购物视频曝光河南驻马店通报西平中学跳楼事件王树国卸任西安交大校长 师生送别恒大被罚41.75亿到底怎么缴男子被流浪猫绊倒 投喂者赔24万房客欠租失踪 房东直发愁西双版纳热带植物园回应蜉蝣大爆发钱人豪晒法院裁定实锤抄袭外国人感慨凌晨的中国很安全胖东来员工每周单休无小长假白宫:哈马斯三号人物被杀测试车高速逃费 小米:已补缴老人退休金被冒领16年 金额超20万

玻璃钢生产厂家 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化