PPP - Chakarov

Download Report

Transcript PPP - Chakarov

Routing Fundamentals
and Subnets
Introduction to IT and
Communications Technology
CE00378-1
Content










Describe routed protocols
List the steps of data encapsulation in an internetwork as
data is routed to Layer 3 devices
Describe connectionless and connection-oriented
delivery
Name the IP packet fields
Describe how data is routed
Compare and contrast different types of routing protocols
List and describe several metrics used by routing
protocols
List several uses for subnetting
Determine the subnet mask for a given situation
Use a subnet mask to determine the subnet ID
IP Address

A packet of data can be sent to a particular
network by ANDing it with the network Mask
 For
a Class C Address this would be
255.255.255.0
 All of the bits which represent the network ID are
set to 1 the rest are set to 0
 When the IP address converted to binary is AND’d
with the network mask only the Network ID is
displayed
 This network address can then be used for routing
the packet to the correct interface
IP Address

Example
IP address grouping
•All of these addresses can be represented in a routing table by the network address
•192.168.10.0
•Rather than the full 254 addresses which could be added
Routed protocol

A routed protocol
 Is
one where it is used carry out addressing across
the network

The most common example would be IP
Network layer devices in data flow
Decapsulate
Encapsulate
A IP Packet being transferred across a network with three routers
Router protocol stripping

As a packet of information is transported
between two points
 The
level 1 and 2 frame information will be
stripped and replaced
 This can be done due to a different technology
being connected on the next segment of the
journey
 It may be changing the header with the address of
the next point on the route

The IP and above layers (3 to 7) will remain the same
throughout the transport of the packet
Router protocol stripping

Example

Example Continued

Example Continued

Example Continued

Example Continued

Example Continued

Example Continued

Example Continued

Example Continued

Example Continued
Connectionless network services
•In connectionless services the packets are just transferred between devices
•No communications are agreed before sending data, all of the packets may
take different routes to the same destination based on local conditions
•Commonly referred to as Packet switched communications
Connection orientated services
•In connection orientated services, the route is worked out before communications
start
•A telephone network is an example of this
•Commonly referred to as Circuit Switched networks
Network layer fields
•The most common Network layer (Routed) protocol is IPv4 at the moment
•Below is the layout of the protocol with the additional information which needs
to be transferred with the data element
All of the field lengths are fixed except for IP Options and Padding fields
Routing metrics
•The routing metrics are the values which are used to work out the best
route between two points when offered more than one route
•Metrics can be
•Delay
•Hop Count
•Bandwidth
•Load
•Cost
•Reliability
Data encapsulation
Encapsulation
 Is

the adding of information to the packet
Decapsulation
 Is
the removal of this information
Encapsulation
Decapsulation

The network layer routing
•The switch will allow routing in the local LAN
•A packet of information will be forwarded out of a particular interface
based on the MAC address of the device attached to it
•Routers forward based on the IP address (Network layer) information
Layer 2 switching & layer 3 routing
ARP tables & routing tables
Router and switch feature
comparison
Routed protocol
Routing protocol
•A routing protocol is used to work out the best route based on metrics
between multiple points
Routing process
Routing tables
Routing algorithms and metrics
Interior & exterior gateway
protocols
Link-state & distance-vector

Distance Vector protocols

Use the distance, direction and vector to any point in the network

RIP


IGRP


Distance Vector
EIGRP


Distance Vector
Distance Vector
Link State protocols

Send periodic updates to the network regarding the knowledge they
have

OSPF

Link State
IP address bit patterns
IP
Protocols are made up two parts
NETWORK ID and Host ID
Depending on the class is how many bits are represented by each part
IP Subnets

IP Addresses are made up of
 Network
ID
 Host
ID
 Depending on the class this dictates the size of each
element.
 The host ID part though can be split again to extend
the length of the Network ID

Example would be a Class C address by default


Network ID is 24 bits and Host ID is 8 bits
By borrowing bits from the host id the network ID is expanded

The disadvantage is that the number of possible hosts are
reduced hosts
Subdividing the host octets of a class C address
Subdividing the host octets of a class B address
Subdividing the host octets of a class A address
Subnetting chart (bit position and value)
Subnetting chart for a class C address (subnet mask identifier)
Subnetting
Subnetting chart
Subnet scheme
Borrowing 3 bits – therefore subnetwork addresses go up in multiples of 32
Subnetting chart
•The logical ANDing process
•This process is used to work out the network part of the IP address
for routing purposes
Calculating the subnet ID
Summary of lecture

IP Addressing
 Routing
of these protocols
 Subnets Class C
Routing Protocols
 Serial Interfaces for WAN’s
