Skip this Video
Download Presentation
Week Seven

Loading in 2 Seconds...

play fullscreen
1 / 49

Week Seven - PowerPoint PPT Presentation

  • Uploaded on

Week Seven. Attendance Announcements Current Week Information Upcoming Assignments Review midterm exam. Week Seven Topics. Private, public, and NAT addressing Static or Dynamic IP Address Assignment Hierarchical Addressing, route summarization, CIDR Domain Name Server (DNS).

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Week Seven' - micol

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
week seven
Week Seven
  • Attendance
  • Announcements
  • Current Week Information
  • Upcoming Assignments
  • Review midterm exam
week seven topics
Week Seven Topics
  • Private, public, and NAT addressing
  • Static or Dynamic IP Address Assignment
  • Hierarchical Addressing, route summarization, CIDR
  • Domain Name Server (DNS)
private addresses
Private Addresses

What has happened to IPv4 addresses?

In 1981, IPv4 Protocol was published. In 1985, about 1/16 of the total IPv4 address space was in use. By mid-2001, about 2/3 of the total IPv4 address space was in use.

Since 2001, Internet service providers have been trying to conserve IP addresses. They have assigned only a subset of addresses to customers. Currently, the number of public IP addresses available is insufficient for assigning addresses for an entire network.

The answer to this problem is to assign private addresses within a network and to translate these private addresses to public addresses when Internet connectivity is required.

ip address design strategy
IP Address Design Strategy

Are there public, private, or both types of addressing required?

How many end systems will need access to the public network? This includes email, file transfer, or web browsing.

How many end systems require access to visible public network(s). This includes e-commerce, such as web servers, database servers, application servers, and public servers. These end systems require globally unambiguous IP addresses.

Where will the boundaries be between private and public IP addresses and how will they be implemented?

private addresses1
Private Addresses
  • RFC 1918 sets aside three blocks of private IP addresses:
  • One (1) Class A address
  • Sixteen (16) Class B addresses
  • Two hundred and fifty six (256) Class C addresses
  • These addresses are for private, internal network use only
  • Packets containing these addresses are not routed over the Internet
  • A router should never route RFC 1918 addresses, because ISPs typically configure the border routers to prevent privately addressed traffic from being forwarded
private addressing
Private Addressing –

Where does the /12 come from?

12 bits in common

10101100 . 0 . 00010000 . 00000000 . 00000000 –

10101100 . 00011111 . 11111111 . 11111111 –


10101100 . 000100000000000 . 00000000 –

network address translation nat
Network Address Translation (NAT)
  • NAT is defined by RFC 1631. It is the process of swapping one address for another in the IP packet header.
  • NAT is a mechanism for conserving registered IP addresses in large networks and simplifying IP addressing management tasks.
  • In practice, NAT is used to allow hosts that are privately addressed, using RFC 1918 addresses, to access the Internet
  • NAT allows many hosts on an inside network to communicate on the Internet with one valid, assigned IP address
network address translation nat1
Network Address Translation (NAT)
  • NAT provides a level of security for your inside network from the outside world
nat terminology
NAT Terminology
  • Inside local IP address: The IP address assigned to a host on the inside network. The address is typically an RFC 1918 address.
  • Inside global IP address: A globally unique IP address (typically assigned by an ISP) that represents one or more inside local IP addresses to the outside world.
  • Outside global IP address: The IP address assigned to a host on the outside network by its owner. The address is globally unique.
  • Outside local IP address: The local IP address assigned to a host on the outside network. In most situations, this address will be identical to the outside global address of that outside device
static ip address assignment
Static IP Address Assignment
  • An IP address is manually assigned to a device or host
  • The network administrator configures the IP address, default gateway, and name servers manually by entering them into a special file or files on the end system with either a graphical or text interface
  • Static address assignment is an extra burden for the administrator—especially on large-scale networks—who must configure the address on every end system in the network
  • Typically, routers, switches, servers, and printers have IP addresses statically assigned
dynamic ip address assignment
Dynamic IP Address Assignment
  • IP addresses are automatically assigned to the devices
  • Dynamic address assignment relieves the administrator of manually assigning an address to every network device
  • Instead, the administrator must set up a server to assign the addresses.
  • On that server, the administrator defines the address pools and additional parameters that should be sent to the host (default gateway, name servers, time servers, and so forth)
  • On the host, the administrator enables the host to acquire the address dynamically; this is often the default.
  • When IP address reconfiguration is needed, the administrator reconfigures the server, which then performs the host-renumbering task
  • DHCP is the protocol used
dynamic host configuration protocol dhcp
Dynamic Host Configuration Protocol (DHCP)

DHCP is a superset of the BootP protocol. This means that it uses the same protocol structure as BootP, but it has enhancements added. Both of these protocols use servers that dynamically configure clients when requested. The two major enhancements are address pools and lease time.

dynamic host configuration protocol dhcp1
Dynamic Host Configuration Protocol (DHCP)
  • A DHCP Server can provide the following to a client:
  • IP address
  • Gateway address
  • Subnet mask
  • DNS server address
  • Subnet mask
  • Router
  • Domain Name
  • Domain Name Server(s)
  • WINS Server(s)
dhcp operation
DHCP Operation
  • A client must have DHCP configured when starting the network membership process
  • The client sends a request to a server requesting an IP configuration
  • Sometimes the client may suggest the IP address it wants, such as when requesting an extension to a DHCP lease
  • The client locates a DHCP server by sending a broadcast called a DHCPDISCOVER
classless interdomain routing cidr
Classless Interdomain Routing (CIDR)
  • CIDR is the abbreviation for “Classless InterdomainRouting”
  • CIDR is pronounced “cider”
  • CIDR replaced the old process of assigning addresses based on Class A, Class B, and Class C.
classless interdomain routing cidr1
Classless Interdomain Routing (CIDR)

A method supported by classless routing protocols, such as OSPF and BGP4, based on the concept of ignoring the IP class of address, permitting route aggregation and VLSM that enable routers to combine routes in order to minimize the routing information that needs to be conveyed by the primary routers. It allows a group of IP networks to appear to other networks as a unified, larger entity. In CIDR, IP addresses and their subnet masks are written as four dotted octets, followed by a forward slash and the numbering of masking bits.

classless interdomain routing cidr2
Classless Interdomain Routing (CIDR)
  • With CIDR, addresses use bit identifiers, or bit masks, instead of an address class to determine the network portion of an address
  • CIDR uses the /N notation instead of subnet masks
  • CIDR allows for the more efficient allocation of IP addresses
  • Blocks of addresses that match an organization’s needs can be issued
classless interdomain routing cidr4
Classless Interdomain Routing (CIDR) = /16 = /24

Note that /22 is not a Class C network, it has a subnet mask of

cidr and route aggregation
CIDRand Route Aggregation
  • CIDR allows routers to summarize, or aggregate, routing information
  • One address with mask can represent multiple networks
  • This reduces the size of routing tables
  • Supernettingis another term for route aggregation
cidr and route aggregation1
CIDR and Route Aggregation

Given four Class C Networks (/24): 11000000 1010100000010000 00000000 11000000 1010100000010001 00000000 11000000 1010100000010010 00000000 11000000 1010100000010011 00000000

Identify which bits all these networks have in common. /22 can represent all these networks. The router will look at the first 22 bits of the address to make a routing decision

importance of hierarchical addressing

Importance of Hierarchical Addressing

Without summarization, every small change in the network will be propagated (spread) throughout the entire network

importance of hierarchical addressing1
Importance of Hierarchical Addressing

With summarization, small changes in the network aren’t propagated (spread) throughout the entire network

subnet masks
Subnet Masks
  • A major network is a Class A, B, or C network
  • Fixed-Length Subnet Masking (FLSM) is when all subnet masks in a major network must be the same
  • Variable-Length Subnet Masking (VLSM) is when subnet masks within a major network can be different. In modern networks, VLSM should be used to conserve the IP addresses
  • Some routing protocols require FLSM; others allow VLSM
dynamic host configuration protocol2
Dynamic Host Configuration Protocol
  • FLSM requires that all subnets of a major network have the same subnet mask, which therefore results in less efficient address space allocation.
  • The network on the next slide is composed of multiple LANs that are connected by point-to-point WAN links.
  • Because FLSM is used, all subnets have the same subnet mask. This is inefficient, because even though only two addresses are needed on the point-to-point links, a /24 subnet mask with 254 available host addresses is used
  • VLSM makes it possible to subnet with different subnet masks and therefore results in more efficient address space allocation.
  • VLSM also provides a greater capability to perform route summarization, because it allows more hierarchical levels within an addressing plan.
  • VLSM requires prefix length information to be explicitly sent with each address advertised in a routing update
classful and classless routing protocols
Classful and Classless Routing Protocols
  • Classful routing protocols DO NOT send subnet mask information in their routing updates
  • When a router receives a routing update, it simply assumes the default subnet mask (Class A, B, or C)
  • VLSM cannot be used in networks that use Classful routing protocols
  • Classless routing protocols send the subnet mask (prefix length) in their updates
  • VLSM can be used with Classless routing protocols
classful versus classless
Classful Versus Classless
  • When subnet masks aren’t sent in updates, routing problems can occur
  • This particular problem occurs because the two 172.16.x.x networks are separated by another network. The two networks are discontinuous
  • The network is not hierarchical and appears to be a poor network design, but this may have occurred because two different networks were joined together at a later time
classful and classless routing protocols1
Classful and Classless Routing Protocols
  • Classful protocols use address classes (A,B,C) to determine networks because subnet masks are not sent in routing updates
features of classless routing protocols
Features of Classless Routing Protocols
  • The routing updates include subnet masks.
  • VLSM is supported.
  • Automatic route summarization at the major network boundary is not required, and route summarization can be manually configured.
  • Subnetted networks can be discontinuous
dns components
DNS Components
  • Resolver – The DNS client that sends queries to a Name Server
  • Name Servers –The DNS component that responds to queries and has the name to IP address mappings
  • Domain Name Space –The hierarchical system of names used on the Internet
domain name space
Domain Name Space

Root Level Domain

Top Level Domain and Countries

(Australia com edugov net org )

Second Level Domain

( microsoftfranklincisco )

(Seattle student)

domain name space1
Domain Name Space
  • At the top is named Root or .
  • TLD is a top level domain
  • The next layer is the second level domain
  • A second level domain may have sub-domains
  • Then you have host names which completely identify a host with the FQDN (Fully Qualified Domain Name)
upcoming deadlines
Upcoming Deadlines
  • Assignment 8-2, Concept Questions 6 is due June 21.
  • Assignment 1-4-2 Network Design ProjectPhase 2: WAN Network Design is dueJune 21
  • Assignement 10-1 Concept Questions 7 is due July 5