Presentation is loading. Please wait.

Presentation is loading. Please wait.

Week Seven Attendance Announcements Current Week Information Upcoming Assignments Review multiple question midterm exam.

Similar presentations


Presentation on theme: "Week Seven Attendance Announcements Current Week Information Upcoming Assignments Review multiple question midterm exam."— Presentation transcript:

1

2 Week Seven Attendance Announcements Current Week Information Upcoming Assignments Review multiple question midterm exam

3 Week Seven Topics Private, public, and NAT addressing Static or Dynamic IP Address Assignment Hierarchical Addressing, route summarization, CIDR Domain Name Server (DNS)

4 Private Addresses What has happened to IPv4 addresses? In 1981, IPv4 Protocol was published. In 1985, about 1/16 of the total IPv4 address space was in use. By mid- 2001, about 2/3 of the total IPv4 address space was in use. Since 2001, Internet service providers have been trying to conserve IP addresses. They have assigned only a subset of addresses to customers. Currently, the number of public IP addresses available is insufficient for assigning addresses for an entire network. The answer to this problem is to assign private addresses within a network and to translate these private addresses to public addresses when Internet connectivity is required.

5 IP Address Design Strategy Are there public, private, or both types of addressing required? How many end systems will need access to the public network? This includes , file transfer, or web browsing. How many end systems require access to visible public network(s). This includes e-commerce, such as web servers, database servers, application servers, and public servers. These end systems require globally unambiguous IP addresses. Where will the boundaries be between private and public IP addresses and how will they be implemented?

6 Private Addresses RFC 1918 sets aside three blocks of private IP addresses: One (1) Class A address Sixteen (16) Class B addresses Two hundred and fifty six (256) Class C addresses These addresses are for private, internal network use only Packets containing these addresses are not routed over the Internet A router should never route RFC 1918 addresses, because ISPs typically configure the border routers to prevent privately addressed traffic from being forwarded

7 Private Addressing – : /12 Where does the /12 come from? 12 bits in common – – – /12

8 Network Address Translation (NAT) NAT is defined by RFC It is the process of swapping one address for another in the IP packet header. NAT is a mechanism for conserving registered IP addresses in large networks and simplifying IP addressing management tasks. In practice, NAT is used to allow hosts that are privately addressed, using RFC 1918 addresses, to access the Internet NAT allows many hosts on an inside network to communicate on the Internet with one valid, assigned IP address

9 Network Address Translation (NAT) NAT provides a level of security for your inside network from the outside world

10 NAT Terminology Inside local IP address: The IP address assigned to a host on the inside network. The address is typically an RFC 1918 address. Inside global IP address: A globally unique IP address (typically assigned by an ISP) that represents one or more inside local IP addresses to the outside world. Outside global IP address: The IP address assigned to a host on the outside network by its owner. The address is globally unique. Outside local IP address: The local IP address assigned to a host on the outside network. In most situations, this address will be identical to the outside global address of that outside device

11 NAT Terminology

12 Static IP Address Assignment An IP address is manually assigned to a device or host The network administrator configures the IP address, default gateway, and name servers manually by entering them into a special file or files on the end system with either a graphical or text interface Static address assignment is an extra burden for the administrator—especially on large-scale networks— who must configure the address on every end system in the network Typically, routers, switches, servers, and printers have IP addresses statically assigned

13 Dynamic IP Address Assignment IP addresses are automatically assigned to the devices Dynamic address assignment relieves the administrator of manually assigning an address to every network device Instead, the administrator must set up a server to assign the addresses. On that server, the administrator defines the address pools and additional parameters that should be sent to the host (default gateway, name servers, time servers, and so forth) On the host, the administrator enables the host to acquire the address dynamically; this is often the default. When IP address reconfiguration is needed, the administrator reconfigures the server, which then performs the host- renumbering task DHCP is the protocol used to distribute these IP addresses

14 Dynamic Host Configuration Protocol (DHCP) DHCP is a superset of the BootP protocol. This means that it uses the same protocol structure as BootP, but it has enhancements added. Both of these protocols use servers that dynamically configure clients when requested. The two major enhancements are address pools and lease time.

15 Dynamic Host Configuration Protocol

16

17 Dynamic Host Configuration Protocol (DHCP) A DHCP Server can provide the following to a client: IP address Gateway address Subnet mask DNS server address Subnet mask Router Domain Name Domain Name Server(s) WINS Server(s)

18 Dynamic Host Configuration Protocol

19 DHCP Operation A client must have DHCP configured when starting the network membership process The client sends a request to a server requesting an IP configuration Sometimes the client may suggest the IP address it wants, such as when requesting an extension to a DHCP lease The client locates a DHCP server by sending a broadcast called a DHCPDISCOVER

20 IP Address Assignments in an Enterprise Network

21 Classless Interdomain Routing (CIDR) CIDR is the abbreviation for “Classless InterdomainRouting” CIDR is pronounced “cider” CIDR replaced the old process of assigning addresses based on Class A, Class B, and Class C.

22 Classless Interdomain Routing (CIDR) A method supported by classless routing protocols, such as OSPF and BGP4, based on the concept of ignoring the IP class of address, permitting route aggregation and VLSM that enable routers to combine routes in order to minimize the routing information that needs to be conveyed by the primary routers. It allows a group of IP networks to appear to other networks as a unified, larger entity. In CIDR, IP addresses and their subnet masks are written as four dotted octets, followed by a forward slash and the numbering of masking bits.

23 Classless Interdomain Routing (CIDR) With CIDR, addresses use bit identifiers, or bit masks, instead of an address class to determine the network portion of an address CIDR uses the /N notation instead of subnet masks CIDR allows for the more efficient allocation of IP addresses Blocks of addresses that match an organization’s needs can be issued

24 Classless Interdomain Routing (CIDR)

25 = / = /24 Note that /22 is not a Class C network, it has a subnet mask of

26 CIDR and Route Aggregation CIDR allows routers to summarize, or aggregate, routing information One address with mask can represent multiple networks This reduces the size of routing tables Supernetting is another term for route aggregation

27 CIDR and Route Aggregation Given four Class C Networks (/24): Identify which bits all these networks have in common /22 can represent all these networks. The router will look at the first 22 bits of the address to make a routing decision

28 CIDR and Route Aggregation

29

30 Route Summarization

31 Importance of Hierarchical Addressing Without summarization, every small change in the network will be propagated (spread) throughout the entire network

32 Importance of Hierarchical Addressing With summarization, small changes in the network aren’t propagated (spread) throughout the entire network

33 Benefits of Summarization

34 Subnet Masks A major network is a Class A, B, or C network Fixed-Length Subnet Masking (FLSM) is when all subnet masks in a major network must be the same Variable-Length Subnet Masking (VLSM) is when subnet masks within a major network can be different. In modern networks, VLSM should be used to conserve the IP addresses Some routing protocols require FLSM; others allow VLSM

35 Dynamic Host Configuration Protocol FLSM requires that all subnets of a major network have the same subnet mask, which therefore results in less efficient address space allocation. The network on the next slide is composed of multiple LANs that are connected by point-to- point WAN links. Because FLSM is used, all subnets have the same subnet mask. This is inefficient, because even though only two addresses are needed on the point-to-point links, a /24 subnet mask with 254 available host addresses is used

36 FLSM

37 VLSM VLSM makes it possible to subnet with different subnet masks and therefore results in more efficient address space allocation. VLSM also provides a greater capability to perform route summarization, because it allows more hierarchical levels within an addressing plan. VLSM requires prefix length information to be explicitly sent with each address advertised in a routing update

38 VLSM

39 Classful and Classless Routing Protocols Classful routing protocols DO NOT send subnet mask information in their routing updates When a router receives a routing update, it simply assumes the default subnet mask (Class A, B, or C) VLSM cannot be used in networks that use Classful routing protocols Classless routing protocols send the subnet mask (prefix length) in their updates VLSM can be used with Classless routing protocols

40 Classful versus Classles

41 Classful Versus Classless When subnet masks aren’t sent in updates, routing problems can occur This particular problem occurs because the two x.x networks are separated by another network. The two networks are discontinuous The network is not hierarchical and appears to be a poor network design, but this may have occurred because two different networks were joined together at a later time

42 Classful and Classless Routing Protocols Classful protocols use address classes (A,B,C) to determine networks because subnet masks are not sent in routing updates

43 Features of Classless Routing Protocols The routing updates include subnet masks. VLSM is supported. Automatic route summarization at the major network boundary is not required, and route summarization can be manually configured. Subnetted networks can be discontinuous

44 Domain Name Server (DNS)

45 Name Resolution with DNS

46 DNS Components Resolver – The DNS client that sends queries to a Name Server Name Servers –The DNS component that responds to queries and has the name to IP address mappings Domain Name Space –The hierarchical system of names used on the Internet

47 Domain Name Space Root Level Domain Top Level Domain and Countries (Australia com edu gov net org ) Second Level Domain ( microsoft franklin cisco ) (Seattle student)

48 Domain Name Space At the top is named root or. TLD is a top level domain The next layer is the second level domain A second level domain may have sub-domains Then you have host names which completely identify a host with the FQDN (Fully Qualified Domain Name)

49 Upcoming Deadlines Assignment 6-1, Concept Questions 5 due October 20, Assignment 8-1, Midterm exam Assignment Network Design Project Phase 2: WAN Network Design due November 10, 2010 Assignement 8-2 Concept Questions 6 due November 3, 2010.


Download ppt "Week Seven Attendance Announcements Current Week Information Upcoming Assignments Review multiple question midterm exam."

Similar presentations


Ads by Google