The Internet and Its Uses - Genesee Community College
Download
Report
Transcript The Internet and Its Uses - Genesee Community College
Chapter 6
Addressing The
Network – IPv4
Modified by Profs. Chen and Cappellino
Objectives
In this chapter, you will learn to:
Explain the structure IP addressing and demonstrate
the ability to convert between 8-bit binary and decimal
numbers.
Given an IPv4 address, classify by type and describe
how it is used in the network.
Explain how addresses are assigned to networks by
ISPs and within networks by administrators.
Determine the network portion of the host address and
explain the role of the subnet mask in dividing
networks.
Given IPv4 addressing information and design criteria,
calculate the appropriate addressing components.
Use common testing utilities to verify and test network
connectivity and operational status of the IP protocol
stack on a host.
The Anatomy of an IPv4 Address
At the Network layer, the packets need to be identified with
the _________________________ of the two end systems.
Each
device on a network must be ________________________
Each address is ________________________________
___________ use the addresses in _______________ format
__________ represent IPv4 addresses using _________________
Easier to remember and work with
Addresses expressed as dotted decimals separate each
decimal number with a dot
Dotted
Each byte of the binary pattern, called an ______________.
decimal address: ______________________________
An octet = _________________ = one decimal number of the address
Binary address (32- bit address):
10101100 00010000
00000100 00010100
The Anatomy of an IPv4 Address cont.
Network Portions
For
each IPv4 address, some portion of the high-order
bits represents the network address.
A _____________________________________
_____________________________________________
____________________________________________
Host Portions
The
number of bits used in this host portion ________
_____________________________________________
___________________________________________
For example, to assign a unique address to 200 hosts, we would use
the entire last octet. With 8 bits, a total of 256 different bit patterns can
be achieved. This would mean that the bits for the upper three octets
would represent the network portion.
Note: Calculating the number of hosts and
determining which portion of the 32 bits refers to
the network will be covered later in this chapter.
Please see the board for…
Binary to Decimal and
Decimal to Binary
conversions…
Types of Addresses in an IPv4 Network
Within the IPv4 network, there are _____ types of addresses:
________________
- The address by which we refer to the network
______________________ - A special address used to send data to all
hosts in the network
______________________ - The unique addresses assigned to the
end devices in the network
Network Address 10.0.0.0 /24
Example:
All
shown below is "the 10.0.0.0 network."
hosts in the 10.0.0.0 / 24 network will have the same network bits.
The lowest address is reserved for the network address.
This address has a 0 for each host bit in the host portion of the address.
Types of Addresses in an IPv4 Network cont..
Broadcast Address
A
special address that ______
_________________________
_________________________
The broadcast address uses
the highest address in the
network range.
This is the address in which the bits
in the ________________________
Example:
For the network
10.0.0.0 /24 the broadcast
address would be 10.0.0.255
Host Addresses
______________
between the
network address and the
broadcast address _________
________________________
Network Prefixes
How do we know how many bits represent the
network portion and how many bits represent the
host portion?
A
prefix length.
The ____________________________
______________________________________
For
example, in 172.16.4.0 /24, the /24 is the prefix
length. This leaves the remaining 8 bits, the last octet,
as the host portion.
Prefix values vary and ____________________
____________________ _________________
________________________ for each network.
Example…
Calculating Network, Hosts, and Broadcast Address
For example: 172.16.20.0 /25. (32 – 25 = 7 bits)
Network Address:
With
a 25 bit prefix, the last 7 bits are host bits.
To represent the network address, all of these host bits
are '0'.
This makes the network address 172.16.20.0 /25.
First Host Address:
This is always ______________________________.
In this case, the ______________________________
This makes the lowest host address is 172.16.20.1.
Broadcast Address
__________________________________________
This makes the broadcast address is 172.16.20.127.
Last Host Address:
The
_______________________________________
________________________________________
It means the lowest host bit is a '0' and all other host bits
as '1s'.
This makes the highest host address 172.16.20.126.
Note: when working these problems- you need only expand from the
divided octet to the end of the address (no need to expand all)
IPv4 Communication via
Unicast, Broadcast, or Multicast
_________ - _______________________
__________________________________
__________
address is the address of the __________
host and the _______________ address is the address
of the _____________________ device
Can be routed through an internetwork
Considered normal host-to-host communication
Throughout the course,
communications are assumed
Unicast unless otherwise noted
IPv4 Communication via
Unicast, Broadcast, or Multicast
______________________-__________________________
___________________________________________
Source
address used is that of the originating host
Uses a special broadcast address destined for the destination devices
All
hosts that receive a broadcast packet, process the packet as if it
were a _______________________________
Broadcast transmission is used for purposes such as
Mapping
upper layer addresses to lower layer addresses (_______)
Requesting an address (________________)
______________________________ by routing protocols
When a host needs information, the host sends a request,
called a query, to the broadcast address.
All
hosts in the network receive and process this query.
One or more of the hosts with the requested information will ________,
typically using ____________________.
Broadcast Traffic cont…
Broadcast packets usually ________________
_______________ (aka limited broadcast).
There are __________________________:
________________ sent to all hosts on a _______________.
Useful for sending a broadcast to all hosts on a non-local network.
Routers do not forward directed broadcasts by default, they may be configured
to do so.
For example, for a host outside of the network to communicate with
the hosts within the 172.16.4.0 /24 network, the destination address of
the packet would be 172.16.4.255.
____________________ used for communication to hosts
_______________________________
Routers do not forward this broadcast to other directly connected networks
Routers form the boundary for a broadcast domain.
These packets use a destination IP address 255.255.255.255.
Broadcast traffic should be limited so it does not adversely
affect network or device performance
IPv4 Communication via
Unicast, Broadcast, or Multicast
______________ transmission is designed to conserve
bandwidth of the network.
It
is the ______________________________________________
______________________________
The source host can send a single packet that can reach thousands of
destination hosts both locally and through an internetwork
Can someone give an example of multicast transmission?
Multicast clients and multicast group
__________________________________________________
called _______________________________________.
are
The multicast clients use services initiated by a client program to subscribe to the
multicast ____________ a group that _________________________________.
Each
multicast group is represented by a single multicast destination
address.
Hosts within a multicast group process packets addressed to a multicast address as
well as packets addressed to its uniquely allocated unicast address.
IPv4 has set aside a special block of addresses from 224.0.0.0 to
239.255.255.255 for multicast groups addressing.
Reserved IPv4 Address Ranges
The IPv4 address range is 0.0.0.0 to 255.255.255.255.
Unicast ________________ Addresses
_________________ Addresses
Host address range of _____________________________
within this range are many addresses that are already
reserved for special purposes as we will see next section…
Experimental address range __________________________
Reserved for research or experimentation but may be converted
to usable addresses in the future
Multicast Addresses
SEE NEXT SLIDE…
Reserved IPv4 Address Ranges cont...
Multicast Addresses
_________________________________________
Multicast addresses subdivided into:
________________________________
The multicast addresses
224.0.0.0 to 224.0.0.255.
Addresses used for multicast groups on a local network
Routers use this type of multicast transmission to exchange routing
information
___________________________________:
The globally scoped
addresses are 224.0.1.0 to 238.255.255.255.
Used to ____________________________________
__________________
addresses AKA Administratively scoped:
The multicast addresses 239.0.0.0 to 239.255.255.255
_____________________________________________
Public and Private Addresses
___________________ Addresses
Used
by networks that are _____________________________
Addresses must be __________________ to the Internet
______________________ addresses
Addresses
that are _____________________________________
________________________________________
Private address blocks :
10.0.0.0 to 10.255.255.255 (_______________________)
172.16.0.0 to 172.31.255.255 (___________________________)
192.168.0.0 to 192.168.255.255 (_____________________________)
Hosts
in _________________ may use the ________________
private addresses.
The hosts within the private networks use IP addresses that are
_________________________________________
The ____________ or firewall device at the perimeter of these
private networks __________________________ these addresses.
Network Address Translation (___)
______________________________________
________________ for communicating to
outside networks and across the Internet
translates
private addresses to public addresses
The NAT can be implemented- by a device such
as a router- at the edge of the private network.
NAT will be covered in detail
in a subsequent course.
Special IPv4 Addresses
Certain addresses cannot be assigned to hosts or can be
assigned but with restrictions.
Review: Describe the _______ and _________ Addresses
Can
not be assigned to hosts
_____________________________
The
default route is _____________________________The default route is __________________________________.
Reserves all addresses in the 0.0.0.0 - 0.255.255.255 range so
those addresses can not be assigned to hosts
_____________________________A
reserved address which hosts use to ____________________
The loopback address __________________________.
You can ping the loopback address to ____________________
_____________________________________
Also used to test if the NIC on that device is functioning
Addresses
in 127.0.0.0 to 127.255.255.255 are all reserved
Special IPv4 Addresses cont…
______________________Addresses
Reserved
addresses that can be ____________________
_______________________________ if needed
Address block 169.254.0.0 to 169.254.255.255
(_____________) are reserved as link-local addresses.
Address block used when a host __________ automatically
obtain an address from a ____________________
If this address appears in our configuration- tell us there’s a good
chance something is wrong with the DHCP server
Hosts
using link-local addresses can only _____________
________________________________
__________________________Addresses
Reserved for __________________________________
In documentation, network examples etc.
Address block 192.0.2.0 to 192.0.2.255 (______________)
Network devices will accept these addresses in their configurations
but will not appear on the Internet
Legacy IPv4 Addressing- Classes
Address ranges used to be grouped into specific
sizes: class A, class B, class C, class D (multicast),
and class E (experimental) addresses.
Known as _______________________________
Defined
_________________________ as well as
_____________________________________
Classes – cont…
Class A Blocks
Used for extremely large networks with more than 16 million host
addresses.
____________________________________
first octet indicating the network portion of the address
remaining three octets used for host portion
128
possible class A networks, 0.0.0.0 /8 to 127.0.0.0 /8 excluding
reserved addresses- 0. network, 10. network and the 127. network -- why?
Few companies could have or would need an entire class A address
Class B Blocks
Support
the moderate to large size networks with more than 65,000
host addresses
_____________________________________
first two octets indicating the network portion of the address
remaining two octets used for host portion
Approximately
16,000 public class B networks, 128.0.0.0 /16 to
191.255.0.0 /16- excluding which addresses??
Legacy IPv4 Addressing
Class C Blocks
Used
for small networks with a maximum of 254 hosts.
__________________________________
first three octets indicating the network portion of the address
last octet used for host portion
Approximately
2 million class C networks, 192.0.0.0 /16 to
223.255.255.0 /16 excluding reserved addresses- Which ones??
Limitations to the Class-based System
_____________________________________________
which
exhausted the availability of IPv4 addresses.
Classful system began phasing out in the late 1990s
______________________ Addressing
The
system we __________________________________
_________________________________________ are assigned to
companies or organizations without regard to the unicast class.
Planning to Address the Network
The allocation of addresses inside the network
needs to be planned and documented for the
purpose of:
________________________________________
Each host in an internetwork must have a unique address.
______________________________________
Especially important for hosts providing resources both internally and
externally
__________________________________________
If we have proper planning and documentation of the network
addressing, we can analyze traffic patterns and identify problems
Within a network, there are different types of hosts.
What are some examples?
Planning to Address the Network
An important part of planning an
IPv4 addressing scheme is
deciding _______________
________________________
If
there are more devices than
available public addresses, only
those devices that will directly
access the Internet - such as web
servers - require a public address.
________________________
could be used for the rest
Another consideration- will
devices need to be accessed
from outside the local network?
Static or Dynamic Addressing for End User Devices
With a _______________________
_______________________________
________________ for a host (figure).
Necessary
to ___________________ of
statically assigned IP address
Static address advantages:
Used
when addresses should not change
________________________________
________________ that need to be
accessible to clients on the network.
Additionally,
static assignment of
addressing information ____________
______________________________
Disadvantage: it can be_________________
to enter the information on each host.
Static or Dynamic Addressing for End User Devices
____________________________
_______________________________
_______________________ and other
configuration information to hosts
because it ____________________
_________________________
The
configuration of the DHCP server
requires the definition of a block of address,
called an ____________________
Pool should exclude any addresses used by
devices in manual assignment
Benefit of DHCP is that an address is
_______________________________
______________________________
When
no longer needed by a host,
addresses can be returned to the pool for
reuse.
Assigning Addresses to Devices other than hosts
Recall: addresses for servers and
peripherals should be _________________.
Predictable
necessary
addresses for these devices are
Hosts (usually servers) that are accessible
from Internet must have a ___________
__________________________
If
using private addressing within the network,
the router or firewall at the perimeter of the
network must be configured to translate the
internal address of the server into a public
address
Assigning Addresses to other Devices
(cont.)
Intermediary devices are a concentration point for network
traffic.
Almost
all traffic within a network or between two networks passes
through an intermediary device
Either for device management or for their operation- these
intermediary devices should be __________________________
layer 3 address
Best practices is to assign these devices a network block in a different
range than user device addresses
_______________________________________________
_______________________________________
Each
interface is in a different network and serves as the gateway
for the hosts in that network.
The router interface uses _____________________________ in
the network and this should be __________________ throughout all
networks in the company
Many packets flow through a router’s interfaces so routers play a
key role in _____________________________________
Good example graphic…
Who Assigns the Different Address?
A company that wishes to have network hosts accessible from the
Internet must have a block of public addresses assigned.
Internet Assigned Numbers Authority (______________)
(http://www.iana.net) is the master holder of the IP addresses.
In the mid-1990’s remaining IPv4 addresses were allocated to five
other registries to manage for regional areas.
The 5 Regional Internet Registries (RIRs) are:
ISPs
To get access to the Internet, we have to connect
our network to the Internet using an Internet Service
Provider (ISP).
_____________________________________________
___________________, etc.
Most companies obtain their IPv4 address blocks on
loan from an ISP.
If
an ISP is changed, the new ISP will provide new
addresses from their address blocks.
ISPs are designated by a ______________ based
on their proximity to the Internet backbone.
Lower
tiers connect to the backbone via the next higher
tier up
See three tier graphic on
next slide
Which ISP tier are we looking for…
Which tier would be most
reliable?
Which tier offers primarily
only Internet connectivity and
support?
Which tier is most expensive?
Which tier offers the most
services to it’s customers?
Overview of IPv6
IPv6 came about as a result of the depletion of IPv4 addresses and offers
the following features:
________________________________
- to expand addressing capabilities
Header format simplification - to _____________________________
Improved support for extensions and options - for increased
__________/longevity and ____________________________________
Flow labeling capability - as QoS mechanisms
Authentication and privacy capabilities - to ________________________
IPv6 is a complete Layer 3 protocol suite including new routing protocols etc.
Transition to IPv6 is slow as new ways of dealing with IPv4 challenges keep
it a widely used protocol suite.
Subnet Mask – Defining the network and Host Portions
A subnet mask is ____________________
Recall: IPv4 address has a network
portion and a host portion.
To _____________________________,
the devices use a separate 32-bit pattern
called a subnet mask.
We express the subnet mask in the same
dotted decimal format as the IPv4 address.
A
__________________ in a bit position
represents the ___________________
______________________ in a bit position
represents the ___________________
As shown, a /24 prefix is expressed as a
subnet mask: 255.255.255.0
(11111111.11111111.11111111.00000000)
The
zeroes represent the host portion of the
address
NOTE: the ________________________
___________________________________
__________________________________
ANDing – What is in our network?
Use the logical operator AND to _________
____________ when ANDing is _________
_________________________________
Host
address is ANDed with its subnet mask
to determine the network address to which
the host is associated.
The AND Operation
[true AND true = true]
[true AND false = false]
[false AND true = false]
[false AND false = false]
Host bits of a subnet mask are represented
by 0’s so the host portion of the address will
always be 0’s thereby giving us our network
address
All the bits of the subnet mask that indicate
___________________________
ANDing
will result in bits that are identical to
the original network portion of the address
When is ANDing used?
As a packet arrives at a router, the __________________
on the _______________________________________
_________________________________________
The
resulting network address is compared to possible routes from
the routing table to determine an acceptable route
An __________________________________________
__________________________ with it’s own subnet mask
The
host can then decide if a packet should be sent to a host in the
local network or be sent to the gateway.
If the host network and destination network addresses do not match, the
packet is sent to the gateway.
ANDing used in network
May
need to determine what network a host is on or if two hosts are
on the same network.
May need to use ANDing to troubleshoot routing issues
No calculators of any kind are permitted during certification exams
Example: Given 172.16.4.35/27
What is the Network Address?
First convert the IP address and Subnet Mask into binary
IP address
172.16.20.35
Subnet mask – how do we get the subnet mask value?
255.255.255.224
Network address
172.16.20.32
Basic Subnetting
Subnetting allows for ____________________
________________ from a single address block.
smaller
divisions of networks
A.K.A. ______________________
Recall from Chpt. 5: subnets are created by
using one or more host bits as subnet bits.
Subnetting works by _____________________
to _____________________________________
of the address to create additional network bits.
The
more host bits used, the more subnets that can
be defined.
fewer host addresses are available per subnet.
Advantages of Subnetworks
Subnet addresses provide ________
and are assigned locally by a network
administrator.
Improve ________________ through
better use of host addressing
Can __________________________
on a subnetted network
________________________
into smaller,
more efficient and manageable subnets
Subnet Addresses
Includes ___________ portion plus a ________
field and a ________________ field.
Bits are borrowed from the host field and are
designated as the subnet field.
Network
Subnet
Original Host portion (field)
Host
Subnet Example
Network
S
Network
S
H
H
Network
H
H
Host
H
H
Say Two Bits are Borrowed from the Host Field to
form a third layer of hierarchy - A Subnet Field
Subnets Created
Network
S
Network
S
H
H
Network
H
H
Host
H
H
The number of Subnets Created is calculated using the
following formula:
# of Subnets Created = ______________
Subnets created after borrowing
S
S
H
H
H
H
H
H
Borrow 2 Bits = 22= 4 Subnets
S
S
S
H
H
H
H
H
Borrow 3 Bits = 23= 8 Subnets
S
S
S
S
H
H
H
H
Borrow 4 Bits = 24= 16 Subnets
How Many Hosts Per Subnet?
Network
S
Network
S
H
H
Network
H
H
Host
H
H
How is the number of Hosts per subnet
calculated?
# Hosts = 26 = 64 hosts/subnet?
?
How Many Usable Hosts/Subnet?
6 Host Bits Remain = 26 = 64 Hosts
If there are 6 Host Bits remaining you do NOT
get 64 Hosts/Subnet. Why?
Each subnet has its own ______________
______________________ - Both of these
______________________________________!
Thus only _____ Usable Hosts are available.
6 Host Bits Remain = 26-2 = ____
Usable Hosts
SUMMARY: Formulas to Remember!
# Usable Subnets = 2# Borrowed Bits
# Usable Hosts/Subnet =
2# Host Bits Remaining-2
Remember to subtract 2 for the Subnetwork
Address and Subnetwork Broadcast Address.
Example- 205.16.12.0
Requirement is 3 subnets
What is the default subnet mask?
This
could also be written 205.16.12.0/24
Borrow 2 bits for the subnet mask
NNNNNNNN.NNNNNNNN.NNNNNNNN.
SShhhhhh
Example- 205.16.12.0 cont…
What is the subnet mask (including
borrowed bits)?
11111111.11111111.11111111.11000000
Value of the 4th octet=
27+26
= 128+64 = 192
255.255.255.192
The Default
Resulting from the
subnet
Step by Step EXAMPLE #2
We will subnet the IP address:
199.14.17.0
NOTE: For the reminder of the example,
we will focus only the forth octet
Step #1
Determine the default subnet mask
Default subnet mask:
Step #2
You will be given the number of subnets
needed. Use this info to determine how
many bits to borrow from the host field.
Requirement:
6
subnets
Step #3
Figure the actual number of subnets by
borrowing bits from host field.
Let’s see how many subnets we will have
by borrowing 3 bits from the host.
Step #3 continued…
199.14.17.0
SSS
8 subnets
How did we get 8?
HHHHH
30 hosts for
each subnet
How did we get 30?
Step #3 continued…
Recall:
You cannot use the first and last address
within each subnet- they are reserved!
One
is the broadcast address and one is the
network address.
Step #4
Determine the subnet mask.
Default subnet
mask for given
example
255.255.255.0
BIT VALUE OF
4TH OCTET
SSS
111
128
64
HHHHH
00000
32
Where S represents the borrowed bits for
subnetting.
Step #4 continued…
Add the place values of S together to get
the last octet decimal value of the subnet
mask.
128 + 64 + 32 = 224
The subnet mask is: 255.255.255.224
The subnet mask is used to reveal the
subnet and host address fields in IP
addresses.
Step 5
Determine the ranges of host addresses
for each subnet.
Step 5 continued…
Subnet # Subnet Bits Host Bits
0
000
00000-11111
1
001
00000-11111
2
010
00000-11111
3
011
00000-11111
4
100
00000-11111
5
101
00000-11111
6
110
00000-11111
7
111
00000-11111
In Decimal
.0 -.31
.32 - .63
.64 - .95
.96 - .127
.128 - .159
.160 - .191
.192 - .223
.224 - .255
Cont. on next slide…
Step 5 continuedIn Decimal
Focusing in on the decimal portion…
Network
Address
Host Range
199.14.17.0/27
199.14.17.1 - .30
199.14.17.31
.32 - .63
199.14.17.32/27
199.14.17.33 - .62
199.14.17.63
.64 - .95
199.14.17.64/27
199.14.17.65 - .94
199.14.17.95
.96 - .127
199.14.17.96/27
199.14.17.97 - .126
199.14.17.127
.128 - .159
199.14.17.128/27
199.14.17.129 - .158
199.14.17.159
.160 - .191
199.14.17.160/27
199.14.17.161 - .190
199.14.17.191
.192 - .223
199.14.17.192/27
199.14.17.193 - .222
199.14.17.223
.224 - .255
199.14.17.224/27
199.14.17.225 - .254
199.14.17.255
.0 -.31
Broadcast
Address
25 -2 = 30 hosts
Subnetting and VLSM
Network administrators need to devise an internetwork
addressing scheme to accommodate the maximum
number of hosts for each network.
Point-to-point WAN links, only require a
_____________________
Large building or department LAN, may need to accommodate
_________________________________
Must also take into account projected future growth
_______________________________________ is an
efficient addressing scheme for network admins. to use
when breaking down a large network
Also referred to as using Variable Length Subnet Mask
(________)
VLSM was designed to ___________________________
If all the subnets have the same requirements for the number
hosts, these fixed size address blocks would be efficient. (see
example to come…)
When using VLSM
(or subnetting a subnet)…
First consider the ________________________
_______________________________ including
devices, servers, router interfaces etc
Next, consider the _______________________
____________________________ required
based on common groupings of hosts.
Next, we need to start allocating addresses
We
start with the ___________________________
__________________________________________
Pre- VLSM example
Using “traditional”
subnetting
• waste of 28 host addresses
from each subnet to simply
address three point-to-point
WAN networks
•NO ROOM FOR NETWORK
GROWTH!
See next slide for a better way …
Same scenario now using VLSM
Break the address into subnets of varying
sizes
Use one of the three subnets which had
previously been used to assign to a WAN
link, and subnet it again with a 30-bit mask
See the next slide and the board for
details…
VLSM example #1
VLSM example #1 cont…
Questions:
Could
we have selected ANY subnet to divide
down further or did we NEED to choose
subnet #6?
Why was /27 chosen to begin with?
Why was /30 subsequently chosen?
Graphic for Example #2 to follow…
500
200
Subnetting and VLSM – Example #2
In our example, the total number of hosts required by the
entire corporate network including devices, servers, router
interfaces etc is 800 hosts
To
accommodate 800 hosts, we use binary arithmetic to allocate a
______________________________________________________
_______________________________________
Next, we consider the number of networks and the size of
each required based on common groupings of hosts.
In
our example: The company has 4 locations (4 LANs).
Each WAN link is a network. We create subnets for the WAN that
interconnect different geographic locations.
Now we will need to start allocating addresses __________
_______________________________________________
_____________________________________________
See graphic on next slide
Where shall we start?
500
Recall:
Number of
network bits
200
See board to understand this example…
What is Ping?
Ping is a utility for _____________________
_________________________________
Ping
uses a _____________ that is a part on the TCP/IP
suite called Internet Control Message Protocol (______).
Ping uses an ________________________ datagram.
If the host receives the Echo request, it ___________
________________________________ datagram.
Ping measures the time required for the reply and
______________________________________
Recall: Pinging the Local Loopback- _______ tests
the internal configuration of IP on the local host.
A
_________________________________________
_________________________________________
Response is _____________________________________, or
gateways are _________________________________.
Ping Gateway – Testing Connectivity to the Local LAN
Use ping to test the _______________
________________________________
_______________________ the IP
address of the __________________
A
ping to the gateway indicates that the host
and the router's interface serving as that
gateway are both operational on the local
network.
If gateway address does not respond:
Try _____________________________ in
the local network.
If the gateway does not respond but another
host does, possible ________________
____________________________________
___ serving as the gateway.
If
If ________________ to that interface, that
may ________________________ or
responding to ping requests.
either the gateway or another host responds, then the local
hosts can successfully communicate over the local network.
Ping Remote Host – Testing Connectivity to Remote LAN
You can also __________________________
______________________________________
If
this ping is successful, it means that we have verified
our host's communication on the local network, all the
way through to the network of the remote host.
Remember, ____________________________
________________________________________
_________ into or out of the corporate network.
Lack
of a ping response could be due to security
restrictions and not because of non-operational
elements of the networks.
Tracertout (tracert) – Testing the Path
Traceroute (tracert) is ______________________
__________________________________
___________________________________
that were
successfully reached along the path.
Used for ______________________________
If
the data fails at some hop along the way, we have the
address of the last router where the problem occurred or
security restrictions are
Round Trip Time (RTT)
__________________________________________
and for the response from the host to return.
An ________________ (*) is used to indicate a
_____________________________
What do you think a high response time indicates?
Tracertout (tracert) – Testing the Path
Time to Live (TTL)
Used
to ________________
_________________________
When the TTL reaches zero, a
router will not forward the packet
and the packet is dropped.
The ____________________
_______________________
will be sent to the originating
host and contain the IP address
of the router that responded.
Sample Traceroute.
ICMPv4 – The Protocol Supporting Testing and Messaging
Although IPv4 is not a reliable protocol, it does
_______________________________________
about issues related to the processing of IP
packets under certain conditions- to be sent, using
ICMPv4
__________________________________
and are
often not allowed for security reasons.
ICMP messages that may be sent include the
following five:
1.
Determines if a host is
basis of the ping utility.
operational
ICMPv4 messages cont…
2.
Used
to notify the sending host that the destination or
service is unreachable
Destination Unreachable codes indicating why the
packet could not be delivered are:
0 = net unreachable
1 = host unreachable
2 = protocol unreachable
3 = port unreachable
3.
Used
by the router to indicate that a packet cannot be
forwarded because the TTL field has expired.
ICMP Time Exceeded message also sent to the source
host to inform the host of the reason the packet was
dropped.
ICMPv4 messages cont…
4.
A
router may use the ICMP Redirect Message to notify
the hosts on a network that a _____________________
for a particular destination.
5.
Can
be used to tell the source to temporarily _______
______________________________ due to a lack of
buffer space in which to receive incoming packets
Also notifies the source host for every message that it
discards due to the lack of buffer space
A destination host may send a source quench message
if datagrams arrive too fast to be processed.
The Transport layer at the source host end can use the
TCP flow control mechanisms to adjust the transmission.