6.5.2 Subnetting – Dividing Networks into Right Sizes

Download Report

Transcript 6.5.2 Subnetting – Dividing Networks into Right Sizes

Addressing the Network – IPv4
Network Fundamentals – Chapter 6
思科网络技术学院理事会.
http://www.catc.edu.cn
1
Objectives

Explain the structure IP addressing and demonstrate the ability
to convert between 8-bit binary and decimal numbers.

Given an IPv4 address, classify by type and describe how it is
used in the network

Explain how addresses are assigned to networks by ISPs and
within networks by administrators

Determine the network portion of the host address and explain
the role of the subnet mask in dividing networks.

Given IPv4 addressing information and design criteria, calculate
the appropriate addressing components.

Use common testing utilities to verify and test network
connectivity and operational status of the IP protocol stack on a
host.
思科网络技术学院理事会.
http://www.catc.edu.cn
2
Course Index
 6.1 IPv4 Addresses
 6.2 Addresses for Different Purpose
 6.3 Assigning Addresses
 6.4 Is It On My Network?
 6.5 Calculating Addresses
 6.6 Testing the Network Layer
 6.7 Lab and Activities
思科网络技术学院理事会.
http://www.catc.edu.cn
3
6.1 IPv4 Addresses
思科网络技术学院理事会.
http://www.catc.edu.cn
4
6.1.1 The Anatomy of an IPv4 Address
 32bit
 Dotted Decimal
 Network and Host Portions
思科网络技术学院理事会.
http://www.catc.edu.cn
5
6.1.2 Knowing the Number – Binary to Decimal Conversion
思科网络技术学院理事会.
http://www.catc.edu.cn
6
6.1.4 Knowing the Number – Decimal to Binary Conversion
思科网络技术学院理事会.
http://www.catc.edu.cn
7
6.2 Addresses for Different Purpose
思科网络技术学院理事会.
http://www.catc.edu.cn
8
6.2.1 Types of Addresses in an IPv4 network
 Network address - The address by which we refer to the network. It is
the lowest address is reserved for the network address. (All host bits
is 0)
 Broadcast address - A special address used to send data to all hosts
in the network. It is the highest address in the network range. (All host
bits is 1)
 Host addresses - The addresses assigned to the end devices in the
network.
思科网络技术学院理事会.
http://www.catc.edu.cn
9
6.2.2 Calculating Network, Hosts and
Broadcast Addresses
 Network Prefixes
Indicated by the Prefix Length
The number of bits in the address that gives us the network portion.
思科网络技术学院理事会.
http://www.catc.edu.cn
10
6.2.2 Calculating Network, Hosts, and
Broadcast Addresses
思科网络技术学院理事会.
http://www.catc.edu.cn
11
6.2.3 Unicast, Broadcast, Multicast – Types of
Communication
思科网络技术学院理事会.
http://www.catc.edu.cn
12
Limited Local broadcast address
STOP
255.255.255.255
思科网络技术学院理事会.
http://www.catc.edu.cn
13
Directed broadcast address
192.168.20.0
192.168.1.0
192.168.20.255
思科网络技术学院理事会.
http://www.catc.edu.cn
14
6.2.4 Reserved IPv4 Address Range
思科网络技术学院理事会.
http://www.catc.edu.cn
15
6.2.5 Public address and private address
 Public Addresses
 Private address
10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)
172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)
192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)
 NAT
Practice 6.2.5
思科网络技术学院理事会.
http://www.catc.edu.cn
16
6.2.6 Special IPv4 addresses
 Network and Broadcast Addresses
 Default Route:0.0.0.0
 Loopback:127.0.0.0/8
 Link-Local Addresses:169.254.0.0 /16
 TEST-NET Addresses:192.0.2.0 /24
思科网络技术学院理事会.
http://www.catc.edu.cn
17
6.2.7 Legacy IPv4 addressing
思科网络技术学院理事会.
http://www.catc.edu.cn
18
6.3 Assigning Addresses
思科网络技术学院理事会.
http://www.catc.edu.cn
19
6.3.1 Planning to Addresses the Network
 It’s a structure process, should be planned and documented.
Preventing duplication of addresses
Providing and controlling access
Monitoring security and performance
 The different types of hosts within a network
hosts are associated with an IPv4 network by a common network
portion of the address
End devices for users
Servers and peripherals
Hosts that are accessible from the Internet
Intermediary devices
思科网络技术学院理事会.
http://www.catc.edu.cn
20
6.3.1 Planning to Addresses the Network
 Planning to Addresses the Network Considerations
include:
Will there be more devices connected to the network than public
addresses allocated by the network's ISP?
Will the devices need to be accessed from outside the local network?
If devices that may be assigned private addresses require access to
the Internet, is the network capable of providing a Network Address
Translation (NAT) service?
思科网络技术学院理事会.
http://www.catc.edu.cn
21
6.3.2 Static or Dynamic Addressing for End
User Devices
 Addresses for User Devices
Static Assignment of Addresses
Dynamic Assignment of Addresses
DHCP
思科网络技术学院理事会.
http://www.catc.edu.cn
22
6.3.3 Assigning Addresses to Other devices
 Addresses for Servers and Peripherals
 Addresses for Hosts that are Accessible from Internet
 Addresses for Intermediary Devices
 Routers and Firewalls
思科网络技术学院理事会.
http://www.catc.edu.cn
23
6.3.4 & 6.3.5 Who Assigns the Different
Addresses?
 The organization of address management
思科网络技术学院理事会.
http://www.catc.edu.cn
24
6.3.6 Overview of IPv6
 IPv6 Features and Advantages
128-bit hierarchical addressing - to expand addressing
capabilities
Header format simplification - to improve packet handling
Improved support for extensions and options - for increased
scalability/longevity and improved packet handling
Flow labeling capability - as QoS mechanisms
Authentication and privacy capabilities - to integrate security
思科网络技术学院理事会.
http://www.catc.edu.cn
25
6.4 Is It On My Network?
思科网络技术学院理事会.
http://www.catc.edu.cn
26
6.4.1 The subnet mask - Defining the network
and host portions
思科网络技术学院理事会.
http://www.catc.edu.cn
27
6.4.2 ANDing – What is in our network?
 When ANDing between the address and the subnet mask is performed, the
result yields the network address.
 Routers use ANDing to determine an acceptable route for an incoming packet.
 An originating host use ANDing to determine if a packet should be sent
directly to a host in the local network or be directed to the gateway.
思科网络技术学院理事会.
http://www.catc.edu.cn
28
6.4.3 The ANDing Process
 An Exercise of ANDing
思科网络技术学院理事会.
http://www.catc.edu.cn
29
6.5 Calculating Addresses
思科网络技术学院理事会.
http://www.catc.edu.cn
30
6.5.1 Basic Subnetting
 Each interface on a router must have a unique network ID
 Create the subnets by using (borrow) one or more of the host bits
as network bits.
 Subnets number=2^n (n = the number of bits borrowed)
 Host number= 2^n - 2 (n=the number of bits left for hosts)
思科网络技术学院理事会.
http://www.catc.edu.cn
31
6.5.1 Basic Subnetting
 Subnetting Example (4 networks)
思科网络技术学院理事会.
http://www.catc.edu.cn
32
6.5.1 Basic Subnetting
 Subnetting Example (8 networks)
思科网络技术学院理事会.
http://www.catc.edu.cn
33
6.5.2 Subnetting – Dividing Networks into Right Sizes
 Step 1 Determine the Total Number of Hosts
This includes end user devices, servers, intermediate devices,
and router interfaces.
思科网络技术学院理事会.
http://www.catc.edu.cn
34
6.5.2 Subnetting – Dividing Networks into Right Sizes
 Step 2 Determine the Number and Size of the Networks
Consider the number of networks and the size of each required
based on common groupings of hosts.
思科网络技术学院理事会.
http://www.catc.edu.cn
35
6.5.2 Subnetting – Dividing Networks into Right Sizes
 Step 3 Allocating Addresses
思科网络技术学院理事会.
http://www.catc.edu.cn
36
6.5.2 Subnetting – Dividing Networks into Right Sizes
 Subnetting – Spreadsheet, a helpful tool
思科网络技术学院理事会.
http://www.catc.edu.cn
37
6.5.3 Subnetting – Subnetting a Subnet
 Subnetting a subnet, or using Variable Length Subnet
Mask (VLSM) was designed to maximize addressing
efficiency
思科网络技术学院理事会.
http://www.catc.edu.cn
38
6.5.3 Subnetting – Subnetting a Subnet
 VLSM Example
In the example, using a standard subnetting (/26 prefix length)
scheme would be wasteful.
思科网络技术学院理事会.
http://www.catc.edu.cn
39
6.5.3 Subnetting – Subnetting a Subnet
 VLSM Example
Using VLSM
思科网络技术学院理事会.
http://www.catc.edu.cn
40
6.5.3 Subnetting – Subnetting a Subnet
 VLSM Example
Using VLSM
思科网络技术学院理事会.
http://www.catc.edu.cn
41
6.5.4 Determining the Network Address
思科网络技术学院理事会.
http://www.catc.edu.cn
42
6.5.5 Determining the Number of hosts
思科网络技术学院理事会.
http://www.catc.edu.cn
43
6.5.6 Determining Valid Addresses for Hosts
思科网络技术学院理事会.
http://www.catc.edu.cn
44
6.6 Testing the Network Layer
思科网络技术学院理事会.
http://www.catc.edu.cn
45
6.6.1 Ping 127.0.0.1 – Testing the Local Stack
 Ping
It is a utility for testing IP connectivity between hosts.
 Pinging the Local Loopback (127.0.0.1)
A response from 127.0.0.1 indicates that IP is properly installed
on the host.
思科网络技术学院理事会.
http://www.catc.edu.cn
46
6.6.2 Ping gateway
 Testing connectivity to the local LAN
思科网络技术学院理事会.
http://www.catc.edu.cn
47
6.6.3 Ping remote host
 Testing connectivity to remote LAN
思科网络技术学院理事会.
http://www.catc.edu.cn
48
6.6.4 Traceroute (tracert) – Tesing the Path
 It takes advantage of Time to Live (TTL)
思科网络技术学院理事会.
http://www.catc.edu.cn
49
6.6.5 ICMPv4 – The Protocol Supporting
Testing and Messaging
 Internet Control Messaging Protocol (ICMPv4)
ICMP is the messaging protocol for the TCP/IP suite
ICMP provides control and error messages
It is actually a separate Layer 3 protocol of the TCP/IP suite
ICMP messages that may be sent include:
Host conformation
Unreachable Destination or Service
Time exceeded
Route redirection
Source quench
思科网络技术学院理事会.
http://www.catc.edu.cn
50
Summary
思科网络技术学院理事会.
http://www.catc.edu.cn
51
思科网络技术学院理事会.
http://www.catc.edu.cn
52