Presentation is loading. Please wait.

Presentation is loading. Please wait.

思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.

Similar presentations


Presentation on theme: "思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6."— Presentation transcript:

1 思科网络技术学院理事会. http://www.catc.edu.cn 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6

2 2 思科网络技术学院理事会. http://www.catc.edu.cn Objectives  Explain the structure IP addressing and demonstrate the ability to convert between 8-bit binary and decimal numbers.  Given an IPv4 address, classify by type and describe how it is used in the network  Explain how addresses are assigned to networks by ISPs and within networks by administrators  Determine the network portion of the host address and explain the role of the subnet mask in dividing networks.  Given IPv4 addressing information and design criteria, calculate the appropriate addressing components.  Use common testing utilities to verify and test network connectivity and operational status of the IP protocol stack on a host.

3 3 思科网络技术学院理事会. http://www.catc.edu.cn Course Index  6.1 IPv4 Addresses  6.2 Addresses for Different Purpose  6.3 Assigning Addresses  6.4 Is It On My Network?  6.5 Calculating Addresses  6.6 Testing the Network Layer  6.7 Lab and Activities

4 思科网络技术学院理事会. http://www.catc.edu.cn 4 6.1 IPv4 Addresses

5 5 思科网络技术学院理事会. http://www.catc.edu.cn 6.1.1 The Anatomy of an IPv4 Address  32bit  Dotted Decimal  Network and Host Portions

6 6 思科网络技术学院理事会. http://www.catc.edu.cn 6.1.2 Knowing the Number – Binary to Decimal Conversion

7 7 思科网络技术学院理事会. http://www.catc.edu.cn 6.1.4 Knowing the Number – Decimal to Binary Conversion

8 思科网络技术学院理事会. http://www.catc.edu.cn 8 6.2 Addresses for Different Purpose

9 9 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.1 Types of Addresses in an IPv4 network  Network address - The address by which we refer to the network. It is the lowest address is reserved for the network address. (All host bits is 0)  Broadcast address - A special address used to send data to all hosts in the network. It is the highest address in the network range. (All host bits is 1)  Host addresses - The addresses assigned to the end devices in the network.

10 10 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.2 Calculating Network, Hosts and Broadcast Addresses  Network Prefixes Indicated by the Prefix Length The number of bits in the address that gives us the network portion.

11 11 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.2 Calculating Network, Hosts, and Broadcast Addresses

12 12 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.3 Unicast, Broadcast, Multicast – Types of Communication

13 13 思科网络技术学院理事会. http://www.catc.edu.cn Limited Local broadcast address STOP 255.255.255.255

14 14 思科网络技术学院理事会. http://www.catc.edu.cn Directed broadcast address 192.168.20.255 192.168.20.0 192.168.1.0

15 15 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.4 Reserved IPv4 Address Range

16 16 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.5 Public address and private address  Public Addresses  Private address 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8) 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12) 192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)  NAT Practice 6.2.5

17 17 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.6 Special IPv4 addresses  Network and Broadcast Addresses  Default Route:0.0.0.0  Loopback:127.0.0.0/8  Link-Local Addresses:169.254.0.0 /16  TEST-NET Addresses:192.0.2.0 /24

18 18 思科网络技术学院理事会. http://www.catc.edu.cn 6.2.7 Legacy IPv4 addressing

19 思科网络技术学院理事会. http://www.catc.edu.cn 19 6.3 Assigning Addresses

20 20 思科网络技术学院理事会. http://www.catc.edu.cn 6.3.1 Planning to Addresses the Network  It’s a structure process, should be planned and documented. Preventing duplication of addresses Providing and controlling access Monitoring security and performance  The different types of hosts within a network hosts are associated with an IPv4 network by a common network portion of the address End devices for users Servers and peripherals Hosts that are accessible from the Internet Intermediary devices

21 21 思科网络技术学院理事会. http://www.catc.edu.cn 6.3.1 Planning to Addresses the Network  Planning to Addresses the Network Considerations include: Will there be more devices connected to the network than public addresses allocated by the network's ISP? Will the devices need to be accessed from outside the local network? If devices that may be assigned private addresses require access to the Internet, is the network capable of providing a Network Address Translation (NAT) service?

22 22 思科网络技术学院理事会. http://www.catc.edu.cn 6.3.2 Static or Dynamic Addressing for End User Devices  Addresses for User Devices Static Assignment of Addresses Dynamic Assignment of Addresses DHCP

23 23 思科网络技术学院理事会. http://www.catc.edu.cn 6.3.3 Assigning Addresses to Other devices  Addresses for Servers and Peripherals  Addresses for Hosts that are Accessible from Internet  Addresses for Intermediary Devices  Routers and Firewalls

24 24 思科网络技术学院理事会. http://www.catc.edu.cn 6.3.4 & 6.3.5 Who Assigns the Different Addresses?  The organization of address management

25 25 思科网络技术学院理事会. http://www.catc.edu.cn 6.3.6 Overview of IPv6  IPv6 Features and Advantages 128-bit hierarchical addressing - to expand addressing capabilities Header format simplification - to improve packet handling Improved support for extensions and options - for increased scalability/longevity and improved packet handling Flow labeling capability - as QoS mechanisms Authentication and privacy capabilities - to integrate security

26 思科网络技术学院理事会. http://www.catc.edu.cn 26 6.4 Is It On My Network?

27 27 思科网络技术学院理事会. http://www.catc.edu.cn 6.4.1 The subnet mask - Defining the network and host portions

28 28 思科网络技术学院理事会. http://www.catc.edu.cn 6.4.2 ANDing – What is in our network?  When ANDing between the address and the subnet mask is performed, the result yields the network address.  Routers use ANDing to determine an acceptable route for an incoming packet.  An originating host use ANDing to determine if a packet should be sent directly to a host in the local network or be directed to the gateway.

29 29 思科网络技术学院理事会. http://www.catc.edu.cn 6.4.3 The ANDing Process  An Exercise of ANDing

30 思科网络技术学院理事会. http://www.catc.edu.cn 30 6.5 Calculating Addresses

31 31 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.1 Basic Subnetting  Each interface on a router must have a unique network ID  Create the subnets by using (borrow) one or more of the host bits as network bits.  Subnets number=2^n (n = the number of bits borrowed)  Host number= 2^n - 2 (n=the number of bits left for hosts)

32 32 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.1 Basic Subnetting  Subnetting Example (4 networks)

33 33 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.1 Basic Subnetting  Subnetting Example (8 networks)

34 34 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.2 Subnetting – Dividing Networks into Right Sizes  Step 1 Determine the Total Number of Hosts This includes end user devices, servers, intermediate devices, and router interfaces.

35 35 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.2 Subnetting – Dividing Networks into Right Sizes  Step 2 Determine the Number and Size of the Networks Consider the number of networks and the size of each required based on common groupings of hosts.

36 36 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.2 Subnetting – Dividing Networks into Right Sizes  Step 3 Allocating Addresses

37 37 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.2 Subnetting – Dividing Networks into Right Sizes  Subnetting – Spreadsheet, a helpful tool

38 38 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.3 Subnetting – Subnetting a Subnet  Subnetting a subnet, or using Variable Length Subnet Mask (VLSM) was designed to maximize addressing efficiency

39 39 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.3 Subnetting – Subnetting a Subnet  VLSM Example In the example, using a standard subnetting (/26 prefix length) scheme would be wasteful.

40 40 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.3 Subnetting – Subnetting a Subnet  VLSM Example Using VLSM

41 41 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.3 Subnetting – Subnetting a Subnet  VLSM Example Using VLSM

42 42 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.4 Determining the Network Address

43 43 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.5 Determining the Number of hosts

44 44 思科网络技术学院理事会. http://www.catc.edu.cn 6.5.6 Determining Valid Addresses for Hosts

45 思科网络技术学院理事会. http://www.catc.edu.cn 45 6.6 Testing the Network Layer

46 46 思科网络技术学院理事会. http://www.catc.edu.cn 6.6.1 Ping 127.0.0.1 – Testing the Local Stack  Ping It is a utility for testing IP connectivity between hosts.  Pinging the Local Loopback (127.0.0.1) A response from 127.0.0.1 indicates that IP is properly installed on the host.

47 47 思科网络技术学院理事会. http://www.catc.edu.cn 6.6.2 Ping gateway  Testing connectivity to the local LAN

48 48 思科网络技术学院理事会. http://www.catc.edu.cn 6.6.3 Ping remote host  Testing connectivity to remote LAN

49 49 思科网络技术学院理事会. http://www.catc.edu.cn 6.6.4 Traceroute (tracert) – Tesing the Path  It takes advantage of Time to Live (TTL)

50 50 思科网络技术学院理事会. http://www.catc.edu.cn 6.6.5 ICMPv4 – The Protocol Supporting Testing and Messaging  Internet Control Messaging Protocol (ICMPv4) ICMP is the messaging protocol for the TCP/IP suite ICMP provides control and error messages It is actually a separate Layer 3 protocol of the TCP/IP suite ICMP messages that may be sent include: Host conformation Unreachable Destination or Service Time exceeded Route redirection Source quench

51 51 思科网络技术学院理事会. http://www.catc.edu.cn Summary

52 52 思科网络技术学院理事会. http://www.catc.edu.cn


Download ppt "思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6."

Similar presentations


Ads by Google