SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Addressing the Network
– IPv4

Network Fundamentals – Chapter 6

ITE I Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Identify the structure IP addressing and demonstrate the ability
to convert between 8-bit binary and decimal numbers.



Identify an IPv4 address, classify by type and describe how it is
used in the network



Identify how addresses are assigned to networks by ISPs and
within networks by administrators



Identify the network portion of the host address and explain the
role of the subnet mask in dividing networks.



Given IPv4 addressing information and design criteria, calculate
the appropriate addressing components.



Identify common testing utilities to verify and test network
connectivity and operational status of the IP protocol stack on a
host.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
IP Addressing Dotted decimal Structure
 An IP address structure in dotted decimal form can be
seen by inspecting the TCP/IP properties of a PC as
below:

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
IP Addressing Dotted Binary Structure
 Dotted decimal IP addresses can be expressed in dotted
binary form. Each octet is simply converted to its binary
equivalent

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
8 bit Binary to decimal conversion
 1 Write down the 8 bit binary number
 2 Write down the decimal value above each bit
 3 Add only decimal values above a 1 bit (Ignore values above 0 bits)
 4 The total for all 8 bits is decimal number

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Decimal to Binary (using short division)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Decimal to Binary (using short division)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Decimal to 8- bit binary

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Network, Broadcast and host Addresses
An address can represent:
 The Network only (Network Address, Wire Address)
 All hosts i.e. PC’s, Servers, Printers, Router interfaces on the network (Broadcast
Address) e.g DHCP request, ARP request or Routing update (RIP)
 A single host on the network (Host Address)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
Example
 Determine the network, broadcast and host addresses
for a given address and prefix combination

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
Example
 172.16.4.32/28 (28 Network bits 4 Host bits)
 Network address is 172.16.4.32
 Subnet mask is 255.255.255.240
 First Useable host address is 172.16.4.33
 Last Useable host address is 172.16.4.46
 Broadcast address is 172.16.4.47 i.e. all host bits are
set to 1

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
Calculations (Convert both numbers to Binary)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Calculations (Work out the range of numbers
in the host portion)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Calculation (Add the host values to the
complete address)

Useable addresses = Total addresses – 2
= 24- 2 (where 4 is the number of bits in host portion)
= 16 - 2
= 14

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Address communication types
 Unicast – 1 to 1 communication
 Broadcast 1 to all network host communication
(Directed or Limited)
 Multicast 1 to a group of hosts on the network
communication

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
IPv4 Addresses usage
 Address ranges reserved for special purposes in the
IPv4 protocol
Legacy Class A,B and
C Used for hosts
Multicast address used
for Routing Protocols
Exchange, Software
distribution, Audio and
Video Broadcasts

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Public and Private addresses
 Public addresses can move across the internet in
packets
 Private address must remain within a network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
Classes of IPv4 Addresses
 Packets with Private address (Link-Local and Test –
Net) are not routed on the internet

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
Classify and Define IPv4 Addresses
 In the early 1980s IPv4 addresses were divided into
classes

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
Assigning Addresses
 Addresses can be public or private and assigned
manually, automatically by server or automatically by
hosts operating systems in a peer to peer network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20
Configuring Addresses
 TCP/IP setting allows to setting of IP addresses

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21
Assigning Addresses
 Network hardware can have IPv4 addresses also

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22
IANA, Regional agencies and ISPs
 Internet Assigned Number Authority (IANA), Internet
regional agencies and ISPs manage the allocation of IP
addresses to organisations
IANA manage addresses overall and the registries manage the addresses for
particular geographic regions

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

23
ISPs and the Internet Backbone
 All ISPs are connected to the internet back. Tier1
directly, Tier 2 through Tier 1 and Tier 3 through Tier 2
 The bigger the company the closer it is to the back
bone

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

24
The subnet mask can be used to find the
network for an IP address
To calculate the network address of a given
IP address the logic ANDing of any 2 bit
values must be understood
AND Truth table for two bit values

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

25
Logically AND each bit in the IP address with
its subnet mask bit, the result is the network
bit

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

26
Another Example

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

27
Subnetting a Network address
 Subnetting is the process of borrowing bits from the left hand
side of the host portion of the address and subnet mask and
reassigning them as network bits, in order to create smaller
subnets within a network address. Networks can be subnetted
on the basis of subnets required or hosts per subnet

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

28
Subnetting use a table

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

29
Subnetting a Network address
 Extend the subnet mask to divide a network into
smaller networks

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

30
Subnetting Starting point
To begin we have the address 192.168.1.0/24.This gives
us 1 network of 28 = (256 – 2) = 254 useable hosts

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

31
Subnetting – decide the network needs
 The network requires 2 separate networks for each router interface
 We therefore borrow 1 bit from the host portion of the subnet mask
changing it from /24 to /25
 Borrowing 1 bit gives 21 = 2 networks

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

32
Subnetting- look at the host portion
 The new host portion is now 7 bits wide. This give us 2 1 = 2 networks each of
 27=128 – 2= 126 useable hosts
 The addresses for each subnet can be determined by the decimal weighted value of the
last subnet mask network bit

This bit has been borrowed
from the host portion and
converted to a network bit
ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

33
Subnetting – examine the octet
 Each octet in an IP address and subnet mask have bits worth:
128 64 32 16 8 4 2 1
1
Octet of subnet mask)

0

0

0 0 0 0 0 (4th

 In the example we can see that the decimal weighted value is 128.
 This means that our subnet addresses will increase in steps of 128
hosts
 This gives the 2 subnet addresses of: (Note 2 subnets because 1 bit was
borrowed i.e. 21 =2 subnets
192.168.1.0/25
192.168.1.128/25

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

34
Subnetting work out the host portion

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

35
Subnetting- calculate the addresses in each
subnet
 The host addresses on each subnet are calculated as
before:
 For 1st subnet 192.168.1.0 =(Network + all host bits are
zeroes)
 192.168.1.1=(Network + First useable value in host
portion)
 192.168.1.126 =(Network + Last useable value in host
portion)
 192.168.1.127 (BC) =(Network + all host bits are ones)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

36
Subnetting- calculate the addresses in each
subnet

 For 2nd subnet 192.168.1.128 =(Network + all host
bits are zeroes)
 192.168.1.129=(Network + First useable value in
host portion)
 192.168.1.254 =(Network + Last useable value in
host portion)
 192.168.1.255 (BC) =(Network + all host bits are
ones)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

37
IPv6 protocol
 Improve packet handling via simplified header,
scalability via 128 bit addressing scheme, QOS via
Flow labeling and integrated security

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

38
Summary
 IP addresses are hierarchical (have structure) with a network, host and
sometimes a subnet portion.
 All IPv4 addresses can represent a complete network, a specific host, a
group of hosts or broadcast address of the network
 Addressing authorities and ISPs allocate address ranges to companies.
Companies can then divide the address ranges into subnets by extending
the subnet mask and reassigning host bits to network bits
 Networks can be subnetted on the basis of subnets required or hosts per
subnet or both
 If networks are being subnetted based on hosts required. Always start with
the largest host requirement
 Planning makes the best use of the addressing scheme
 IP network addresses can be tested by using Ping and Tracert
 IPv6 is a new layer 3 protocol with new protocols at various layers to
support it
ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

39
Labs
 IPv4 Address Subnetting Part 1
Network address
Network broadcast address
Total number of host
Number of hosts

 IPv4 Address Subnetting Part 2
The subnet address of a subnet
The broadcast address of a subnet
The range of host addresses for a subnet
The maximum number of subnets for a subnet mask
The number of hosts for each subnet
The number of subnet bits
The number of a subnet

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

40

Contenu connexe

Tendances

Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6Rekha Yadav
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Router vs switch
Router vs switchRouter vs switch
Router vs switchIT Tech
 
network Addressing
network Addressingnetwork Addressing
network AddressingTauseef khan
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 

Tendances (20)

Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Icmp
IcmpIcmp
Icmp
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
IPv6
IPv6IPv6
IPv6
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Router vs switch
Router vs switchRouter vs switch
Router vs switch
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 

En vedette

CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCENT Certification
CCENT CertificationCCENT Certification
CCENT CertificationChris Mouk
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 
Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Joshua Owolabi
 
Re-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic FeversRe-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic FeversJoshua Owolabi
 
How to Do the Carb Nite Dieting
How to Do the Carb Nite DietingHow to Do the Carb Nite Dieting
How to Do the Carb Nite Dietingroger carter
 
Linked in Master
Linked in MasterLinked in Master
Linked in MasterSimon Dear
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenesvanessavergara18
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
Normas técnicas de gestión calidad s.c
Normas técnicas de gestión calidad s.cNormas técnicas de gestión calidad s.c
Normas técnicas de gestión calidad s.cJohanna Merchan
 
Asure one spark (3)
Asure one spark (3)Asure one spark (3)
Asure one spark (3)Bizapity
 
Company Profile - UBWebs
Company Profile - UBWebsCompany Profile - UBWebs
Company Profile - UBWebsUBWebSolutions
 

En vedette (20)

CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
Assignment
AssignmentAssignment
Assignment
 
CCENT Certification
CCENT CertificationCCENT Certification
CCENT Certification
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
Cisco CCENT Cram Notes
Cisco CCENT Cram NotesCisco CCENT Cram Notes
Cisco CCENT Cram Notes
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
E4
E4E4
E4
 
Acropolis griegas
Acropolis griegasAcropolis griegas
Acropolis griegas
 
Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...
 
Actividad 7
Actividad 7Actividad 7
Actividad 7
 
Re-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic FeversRe-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic Fevers
 
How to Do the Carb Nite Dieting
How to Do the Carb Nite DietingHow to Do the Carb Nite Dieting
How to Do the Carb Nite Dieting
 
Castillos medievales
Castillos medievalesCastillos medievales
Castillos medievales
 
Linked in Master
Linked in MasterLinked in Master
Linked in Master
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenes
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Normas técnicas de gestión calidad s.c
Normas técnicas de gestión calidad s.cNormas técnicas de gestión calidad s.c
Normas técnicas de gestión calidad s.c
 
Ethernet
EthernetEthernet
Ethernet
 
Asure one spark (3)
Asure one spark (3)Asure one spark (3)
Asure one spark (3)
 
Company Profile - UBWebs
Company Profile - UBWebsCompany Profile - UBWebs
Company Profile - UBWebs
 

Similaire à IPv4 Network Fundamentals

CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressingteknetir
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6Irsandi Hasan
 
Exploration routing chapter_6
Exploration routing chapter_6Exploration routing chapter_6
Exploration routing chapter_6Joshua Torres
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6cyberjoex
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basicstmavroidis
 
Ex 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenEx 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenĐô GiẢn
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6Irsandi Hasan
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6r82093403
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 

Similaire à IPv4 Network Fundamentals (20)

CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressing
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
 
Exploration routing chapter_6
Exploration routing chapter_6Exploration routing chapter_6
Exploration routing chapter_6
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
 
1
11
1
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
Ex 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenEx 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chen
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 

Plus de Sachii Dosti

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2Sachii Dosti
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paperSachii Dosti
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpgSachii Dosti
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical LayerSachii Dosti
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4Sachii Dosti
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport LayerSachii Dosti
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 

Plus de Sachii Dosti (13)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paper
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
ip v6
ip v6ip v6
ip v6
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 

Dernier

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Dernier (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

IPv4 Network Fundamentals

  • 1. Addressing the Network – IPv4 Network Fundamentals – Chapter 6 ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify the structure IP addressing and demonstrate the ability to convert between 8-bit binary and decimal numbers.  Identify an IPv4 address, classify by type and describe how it is used in the network  Identify how addresses are assigned to networks by ISPs and within networks by administrators  Identify the network portion of the host address and explain the role of the subnet mask in dividing networks.  Given IPv4 addressing information and design criteria, calculate the appropriate addressing components.  Identify common testing utilities to verify and test network connectivity and operational status of the IP protocol stack on a host. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. IP Addressing Dotted decimal Structure  An IP address structure in dotted decimal form can be seen by inspecting the TCP/IP properties of a PC as below: ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. IP Addressing Dotted Binary Structure  Dotted decimal IP addresses can be expressed in dotted binary form. Each octet is simply converted to its binary equivalent ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. 8 bit Binary to decimal conversion  1 Write down the 8 bit binary number  2 Write down the decimal value above each bit  3 Add only decimal values above a 1 bit (Ignore values above 0 bits)  4 The total for all 8 bits is decimal number ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Decimal to Binary (using short division) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Decimal to Binary (using short division) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Decimal to 8- bit binary ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Network, Broadcast and host Addresses An address can represent:  The Network only (Network Address, Wire Address)  All hosts i.e. PC’s, Servers, Printers, Router interfaces on the network (Broadcast Address) e.g DHCP request, ARP request or Routing update (RIP)  A single host on the network (Host Address) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Example  Determine the network, broadcast and host addresses for a given address and prefix combination ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Example  172.16.4.32/28 (28 Network bits 4 Host bits)  Network address is 172.16.4.32  Subnet mask is 255.255.255.240  First Useable host address is 172.16.4.33  Last Useable host address is 172.16.4.46  Broadcast address is 172.16.4.47 i.e. all host bits are set to 1 ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Calculations (Convert both numbers to Binary) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Calculations (Work out the range of numbers in the host portion) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Calculation (Add the host values to the complete address) Useable addresses = Total addresses – 2 = 24- 2 (where 4 is the number of bits in host portion) = 16 - 2 = 14 ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Address communication types  Unicast – 1 to 1 communication  Broadcast 1 to all network host communication (Directed or Limited)  Multicast 1 to a group of hosts on the network communication ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. IPv4 Addresses usage  Address ranges reserved for special purposes in the IPv4 protocol Legacy Class A,B and C Used for hosts Multicast address used for Routing Protocols Exchange, Software distribution, Audio and Video Broadcasts ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Public and Private addresses  Public addresses can move across the internet in packets  Private address must remain within a network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Classes of IPv4 Addresses  Packets with Private address (Link-Local and Test – Net) are not routed on the internet ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Classify and Define IPv4 Addresses  In the early 1980s IPv4 addresses were divided into classes ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Assigning Addresses  Addresses can be public or private and assigned manually, automatically by server or automatically by hosts operating systems in a peer to peer network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Configuring Addresses  TCP/IP setting allows to setting of IP addresses ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Assigning Addresses  Network hardware can have IPv4 addresses also ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. IANA, Regional agencies and ISPs  Internet Assigned Number Authority (IANA), Internet regional agencies and ISPs manage the allocation of IP addresses to organisations IANA manage addresses overall and the registries manage the addresses for particular geographic regions ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. ISPs and the Internet Backbone  All ISPs are connected to the internet back. Tier1 directly, Tier 2 through Tier 1 and Tier 3 through Tier 2  The bigger the company the closer it is to the back bone ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. The subnet mask can be used to find the network for an IP address To calculate the network address of a given IP address the logic ANDing of any 2 bit values must be understood AND Truth table for two bit values ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Logically AND each bit in the IP address with its subnet mask bit, the result is the network bit ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. Another Example ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  • 28. Subnetting a Network address  Subnetting is the process of borrowing bits from the left hand side of the host portion of the address and subnet mask and reassigning them as network bits, in order to create smaller subnets within a network address. Networks can be subnetted on the basis of subnets required or hosts per subnet ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
  • 29. Subnetting use a table ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  • 30. Subnetting a Network address  Extend the subnet mask to divide a network into smaller networks ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
  • 31. Subnetting Starting point To begin we have the address 192.168.1.0/24.This gives us 1 network of 28 = (256 – 2) = 254 useable hosts ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
  • 32. Subnetting – decide the network needs  The network requires 2 separate networks for each router interface  We therefore borrow 1 bit from the host portion of the subnet mask changing it from /24 to /25  Borrowing 1 bit gives 21 = 2 networks ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
  • 33. Subnetting- look at the host portion  The new host portion is now 7 bits wide. This give us 2 1 = 2 networks each of  27=128 – 2= 126 useable hosts  The addresses for each subnet can be determined by the decimal weighted value of the last subnet mask network bit This bit has been borrowed from the host portion and converted to a network bit ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33
  • 34. Subnetting – examine the octet  Each octet in an IP address and subnet mask have bits worth: 128 64 32 16 8 4 2 1 1 Octet of subnet mask) 0 0 0 0 0 0 0 (4th  In the example we can see that the decimal weighted value is 128.  This means that our subnet addresses will increase in steps of 128 hosts  This gives the 2 subnet addresses of: (Note 2 subnets because 1 bit was borrowed i.e. 21 =2 subnets 192.168.1.0/25 192.168.1.128/25 ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 34
  • 35. Subnetting work out the host portion ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 35
  • 36. Subnetting- calculate the addresses in each subnet  The host addresses on each subnet are calculated as before:  For 1st subnet 192.168.1.0 =(Network + all host bits are zeroes)  192.168.1.1=(Network + First useable value in host portion)  192.168.1.126 =(Network + Last useable value in host portion)  192.168.1.127 (BC) =(Network + all host bits are ones) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 36
  • 37. Subnetting- calculate the addresses in each subnet  For 2nd subnet 192.168.1.128 =(Network + all host bits are zeroes)  192.168.1.129=(Network + First useable value in host portion)  192.168.1.254 =(Network + Last useable value in host portion)  192.168.1.255 (BC) =(Network + all host bits are ones) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 37
  • 38. IPv6 protocol  Improve packet handling via simplified header, scalability via 128 bit addressing scheme, QOS via Flow labeling and integrated security ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 38
  • 39. Summary  IP addresses are hierarchical (have structure) with a network, host and sometimes a subnet portion.  All IPv4 addresses can represent a complete network, a specific host, a group of hosts or broadcast address of the network  Addressing authorities and ISPs allocate address ranges to companies. Companies can then divide the address ranges into subnets by extending the subnet mask and reassigning host bits to network bits  Networks can be subnetted on the basis of subnets required or hosts per subnet or both  If networks are being subnetted based on hosts required. Always start with the largest host requirement  Planning makes the best use of the addressing scheme  IP network addresses can be tested by using Ping and Tracert  IPv6 is a new layer 3 protocol with new protocols at various layers to support it ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 39
  • 40. Labs  IPv4 Address Subnetting Part 1 Network address Network broadcast address Total number of host Number of hosts  IPv4 Address Subnetting Part 2 The subnet address of a subnet The broadcast address of a subnet The range of host addresses for a subnet The maximum number of subnets for a subnet mask The number of hosts for each subnet The number of subnet bits The number of a subnet ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 40