SlideShare a Scribd company logo
MẠNG MÁY TÍNH NÂNG CAO Thời gian học : 30 Tiết GV: TS Phạm Văn Tính Khoa CNTT – Đại học Nông Lâm  Email: pvtinh@hcmuaf.edu.vn Khoa CNTT
OVERVIEW TS, PHẠM VĂN TÍNH MẠNG MÁY TÍNH NÂNG CAO
Data networks   Data networks developed as a result of business applications that were written for microcomputers.  Businesses needed a solution that would successfully address the following three problems:  How to avoid duplication of equipment and resources  How to communicate efficiently  How to set up and manage a network
Network topology
Logical Topologies Broadcast Token Passing
Local-area networks (LANs)
Local-area networks (LANs) LANs consist of the following components:  Computers  Network interface cards  Peripheral devices  Networking media  Network devices  Some common LAN technologies are:  Ethernet  Token Ring  FDDI
Wide-area networks (WANs)
Wide-area networks (WANs) WANs interconnect LANs, which then provide access to computers or file servers in other locations.  Some common WAN technologies are:  Modems  Integrated Services Digital Network (ISDN)  Digital Subscriber Line (DSL)  Frame Relay  US (T) and Europe (E) Carrier Series – T1, E1, T3, E3  Synchronous Optical Network (SONET)
OSI layers   Dividing the network into seven layers provides the following advantages:  It breaks network communication into smaller, more manageable parts.  It standardizes network components to allow multiple vendor development and support.  It allows different types of network hardware and software to communicate with each other.  It prevents changes in one layer from affecting other layers.  It divides network communication into smaller parts to make learning it easier to understand.
TCP/IP model
TCP/IP model
Ethernet and the OSI model
Ethernet and the OSI model
Ethernet Naming  – MAC address
Ethernet frame fields   Start Frame Delimiter :  10101011
Transport  Data Link Physical  Network  Upper Layer Data Upper Layer Data TCP Header Data IP Header Data LLC Header 0101110101001000010 Data MAC Header Presentation Application Session Segment Packet Bits Frame PDU Encapsulating Data FCS FCS
Upper Layer Data LLC Hdr + IP + TCP + Upper Layer Data MAC Header IP + TCP + Upper Layer Data LLC Header TCP+ Upper Layer Data IP Header Upper Layer Data TCP Header 0101110101001000010 Transport  Data Link Physical  Network  Presentation Application Session De - encapsulating Data
Each segment has its own collision domain All segments are in the same broadcast domain Data Link OR 1 2 3 1 2 Switches and Bridges Operate at Data Link Layer 4
Switches Each segment has its own collision domain Broadcasts are forwarded to all segments Memory Switch
Ethernet Switching
Interconnecting Networks with TCP/IP
Early protocol suite Universal Introduction to TCP/IP Host Internet TCP/IP Host
TCP/IP Protocol Stack 7 6 5 4 3 2 5 4 3 2 Application Presentation Session Transport Network Data Link Physical 1 Application Transport Internet Data Link Physical 1
Application Layer Overview *Used by the router Application Transport Internet Data Link Physical File Transfer - TFTP * - FTP * - NFS E-Mail - SMTP Remote Login - Telnet * - rlogin * Network Management - SNMP * Name Management - DNS*
Distinguishes between upper layer applications Establishes end-to-end connectivity between applications Defines flow control  Provides reliable or unreliable services for data transfer Network IPX IP Transport SPX TCP UDP Transport Layer Functions
Transport Layer Overview Transmission Control Protocol (TCP) User Datagram  Protocol (UDP) Application Transport Internet Data Link Physical Connection-Oriented Connectionless
Synchronize Acknowledge, Synchronize Acknowledge Data Transfer (Send Segments) Sender Receiver Connection Established Reliable Transport Layer Functions
Hub Bridge Switch Router Collision Domains: 1  4  4  4  Broadcast Domains: 1  1  1  4  Network Device Domains
TCP Segment Format Source port (16) Destination port (16) Sequence number (32) Header length (4) Acknowledgement number (32) Reserved (6) Code bits (6) Window (16) Checksum (16) Urgent (16) Options (0 or 32 if any) Data (varies) 20 Bytes Bit 0 Bit 15 Bit 16 Bit 31
Port Numbers TCP Port  Numbers F T P Transport Layer T E L N E T D N S S N M P T F T P S M T P UDP Application Layer 21 23 25 53 69 161 R I P 520
TCP Port Numbers Source Port Dest. Port … Host A 1028 23 … SP DP Host Z Telnet Z Dest. port = 23. Send packet to my  Telnet  application.
TCP Three Way Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Host A Host B 1
TCP Three Way Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Send SYN, ACK  (seq=300 ack=101 ctl=syn,ack) Host A Host B SYN received 1 2
TCP Three Way Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Send SYN, ACK  (seq=300 ack=101 ctl=syn,ack) Established (seq=101 ack=301 ctl=ack) Host A Host B SYN received 1 2 3
Denial - of - Service Attacks Denial - of - service (DoS) attacks are designed to deny services to legitimate hosts attempting to establish connections.  In a DoS attack, the hacker initiates a synchronization but the receiving device replies to a non-existent, unreachable IP address and then is placed in a wait-state while waiting to receive the final ACK from the initiator .
TCP Simple Acknowledgment Window size = 1 Sender  Receiver
TCP Simple Acknowledgment Window size = 1 Sender  Receiver Send 1 Receive 1
TCP Simple Acknowledgment Window size = 1 Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2
TCP Simple Acknowledgment Window size = 1 Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2
TCP Simple Acknowledgment Window size = 1 Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3
TCP Simple Acknowledgment Window size = 1 Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3 Receive ACK 4 Send ACK 4
TCP Sequence and  Acknowledgment Numbers Source Port Dest. Port … Sequence # Acknowledgement # Source Dest. Seq. Ack. 1028 23 10 1 I just sent #10.
TCP Sequence and  Acknowledgment Numbers I just got #10, now I need #11. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 1 Ack. 1028 23 Source Dest. 11 Seq. 1 Ack. I just sent #10.
TCP Sequence and  Acknowledgment Numbers Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 11 Seq. 2 Ack. 1028 23 Source Dest. 10 Seq. 1 Ack. 1028 23 Source Dest. 11 Seq. 1 Ack. I just got #10, now I need #11. I just sent #11.
TCP Sequence and  Acknowledgment Numbers Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 11 Seq. 101 Ack. 1028 23 Source Dest. 10 Seq. 100 Ack. 1028 23 Source Dest. 11 Seq. 100 Ack. 1028 23 Source Dest. 12 Seq. 101 Ack. I just got #11, now I need #12. I just sent #11.
TCP Windowing Sender Receiver
TCP Windowing Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 3
TCP Windowing Window size = 3 Send 2 Sender Window size = 3 Send 1 Window size = 3 Send 3 ACK 3 Window size = 2 Packet 3 is Dropped Receiver
TCP Windowing Window size = 3 Send 2 Sender Window size = 3 Send 1 Window size = 3 Send 3 ACK 3 Window size = 2 Packet 3 is Dropped Window size = 3 Send 4 Window size = 3 Send 3 Receiver
TCP Windowing Window size = 3 Send 2 Sender Window size = 3 Send 1 Window size = 3 Send 3 Packet 3 is Dropped Window size = 3 Send 4 Window size = 3 Send 3 ACK 5 Window size = 2 Receiver Window size = 3 ACK 3 Window size = 2
No sequence or acknowledgment fields UDP Segment Format Source port (16) Destination port (16) Length (16) Data (if any) 1 Bit 0 Bit 15 Bit 16 Bit 31 Checksum (16) 8 Bytes
Network Layer Functions Defines logical source and destination addresses associated with a specific protocol Defines paths through network Interconnects multiple data links Network IP, IPX Data Link Physical EIA/TIA-232 v.35 Ethernet Frame Relay HDLC 802.2 802.3
Data Source address Destination  address IP Header 172.15.1.1 Node Network Logical Address Network Layer End Station Packet Network Layer Functions
Network Layer Functions (cont.) 11111111 11111111 00000000 00000000 10101100 00010000 01111010 11001100 Binary Mask Binary Address 172.16.122.204 255.255.0.0 172 16 122 204 255 Address Mask 255 0 0 Network Host
Internet Layer Overview OSI network layer corresponds to the  TCP/IP internet layer Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) Application Transport Internet Data Link Physical
IP Datagram Version (4) Destination IP Address (32) Options (0 or 32 if any) Data (varies if any) 1 Bit 0 Bit 15 Bit 16 Bit 31 Header Length (4) Priority  & Type  of Service (8) Total Length (16) Identification (16) Flags (3) Fragment offset (13) Time to live (8) Protocol (8) Header checksum (16) Source IP Address (32) 20 Bytes
Determines destination upper-layer protocol  Protocol Field Transport Layer Internet Layer TCP UDP Protocol Numbers IP 17 6
Internet Control Message  Protocol Application Transport Internet Data Link Physical Destination  Unreachable Echo (Ping) Other ICMP 1
Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2.
Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I heard that broadcast. The message is for me. Here is my Ethernet address. I need the Ethernet address of 176.16.3.2.
Address Resolution Protocol 172.16.3.1 IP: 172.16.3.2  Ethernet: 0800.0020.1111  172.16.3.2 IP: 172.16.3.2 = ??? I heard that broadcast. The message is for me. Here is my Ethernet address. I need the Ethernet address of 176.16.3.2.
Address Resolution Protocol Map IP   MAC  Local ARP 172.16.3.1 IP: 172.16.3.2  Ethernet: 0800.0020.1111  172.16.3.2 IP: 172.16.3.2 = ??? I heard that broadcast. The message is for me. Here is my Ethernet address. I need the Ethernet address of 176.16.3.2.
Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address?
Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
Reverse ARP Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
Reverse ARP Map MAC    IP Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
Unique addressing allows communication  between end stations Path choice is based on destination address Location is represented by an address Introduction to TCP/IP Addresses 172.18.0.2 172.18.0.1 172.17.0.2 172.17.0.1 172.16.0.2 172.16.0.1 SA DA HDR DATA 10.13.0.0 192.168.1.0 10.13.0.1 192.168.1.1
IP Addressing 255 255 255 255 Dotted Decimal Maximum Network Host 32 bits
IP Addressing 255 255 255 255 Dotted Decimal Maximum Network Host 128 64 32 16 8 4 2 1 11111111 11111111 11111111 11111111 Binary 32 bits 1 8 9 16 17 24 25 32 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
IP Addressing 255 255 255 255 Dotted Decimal Maximum Network Host 128 64 32 16 8 4 2 1 11111111 11111111 11111111 11111111 10101100 00010000 01111010 11001100 Binary 32 bits 172 16 122 204 Example Decimal Example Binary 1 8 9 16 17 24 25 32 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
Class A:  Class B:  Class C:  Class D:    Multicast  Class E:  Research IP Address Classes 8 bits 8 bits 8 bits 8 bits Network Host Host Host Network Network Host Host Network Network Network Host
IP Address Classes 1 Class A: Bits: 0 NNNNNNN Host Host Host 8 9 16 17 24 25 32 Range (1-126) 1 Class B: Bits: 10 NNNNNN Network Host Host 8 9 16 17 24 25 32 Range (128-191) 1 Class C: Bits: 110 NNNNN Network Network Host 8 9 16 17 24 25 32 Range (192-223) 1 Class D: Bits: 1110 MMMM Multicast Group Multicast Group Multicast Group 8 9 16 17 24 25 32 Range (224-239)
Host Addresses 172.16.2.2 172.16.3.10 172.16.12.12 10.1.1.1 10.250.8.11 10.180.30.118 E1 172.16 12 12 Network Host . . Network Interface 172.16.0.0 10.0.0.0 E0 E1 Routing Table 172.16.2.1 10.6.24.2 E0
Determining Available Host Addresses 11111111 172    16   0  0 10101100 00010000 00000000 00000000 16 15 14 13 12 11 10   9 8 7 6 5 4 3 2 1 Network Host 00000000 00000001 11111111 11111111 11111111 11111110 ... ... 00000000 00000011 11111101 1 2 3 65534 65535 65536 - ... 2 65534 N 2 N -2  = 2 16 -2 = 65534
Network 172.16.0.0 Addressing without Subnets 172.16.0.0 172.16.0.1 172.16.0.2 172.16.0.3 … ... 172.16.255.253 172.16.255.254
Network 172.16.0.0 Addressing with Subnets 172.16.1.0 172.16.2.0 172.16.3.0 172.16.4.0
Subnet Addressing 172.16.2.200 172.16.2.2 172.16.2.160 172.16.2.1 172.16.3.5 172.16.3.100 172.16.3.150 E0 172.16 Network Network Interface 172.16.0.0 172.16.0.0 E0 E1 New Routing Table 2 160 Host . . 172.16.3.1 E1
Subnet Addressing 172.16.2.200 172.16.2.2 172.16.2.160 172.16.2.1 172.16.3.5 172.16.3.100 172.16.3.150 172.16.3.1 E0 E1 172.16 2 160 Network Host . . Network Interface 172.16.2.0 172.16.3.0 E0 E1 New Routing Table Subnet
Subnet Mask 255 255 0 0 IP Address Default Subnet Mask 8-bit Subnet Mask Network Host Network Host Network Subnet Host Also written as “ /16 ” where 16 represents the number of 1s in the mask. Also written as “ /24 ” where 24 represents the number of 1s in the mask. 11111111 11111111 00000000 00000000 172 16 0 0 255 255 255 0
Decimal Equivalents of Bit Patterns 0 0 0 0 0 0 0 0 = 0 1 0 0 0 0 0 0 0 = 128 1 1 0 0 0 0 0 0 = 192 1 1 1 0 0 0 0 0 = 224 1 1 1 1 0 0 0 0 = 240 1 1 1 1 1 0 0 0 = 248 1 1 1 1 1 1 0 0 = 252 1 1 1 1 1 1 1 0 = 254 1 1 1 1 1 1 1 1 = 255 128  64 32 16 8 4 2 1
Subnets not in use—the default Subnet Mask without Subnets 16 Network Host 172 0 0 10101100 11111111 10101100 00010000 11111111 00010000 00000000 00000000 10100000 00000000 00000000 00000010 172.16.2.160 255.255.0.0 Network Number
Network number extended by eight bits Subnet Mask with Subnets 16 Network Host 172.16.2.160 255.255. 255 .0 172 2 0 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 00000000 00000000 00000010 Subnet Network Number 128 192 224 240 248 252 254 255
Subnet Mask with Subnets (cont.) Network number extended by ten bits Network Host 172.16.2.160 255.255. 255 . 192 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 11 000000 10 000000 00000010 Subnet 16 172 2 128 Network Number 128 192 224 240 248 252 254 255 128 192 224 240 248 252 254 255
Subnet Mask Exercise Address Subnet Mask Class Subnet 172.16.2.10 10.6.24.20 10.30.36.12 255.255.255.0 255.255.240.0 255.255.255.0
Subnet Mask Exercise Answers Address Subnet Mask Class Subnet 172.16.2.10 10.6.24.20 10.30.36.12 255.255.255.0 255.255.240.0 255.255.255.0 B A A 172.16.2.0 10.6.16.0 10.30.36.0
Broadcast Addresses 172.16.1.0 172.16.2.0 172.16.3.0 172.16.4.0 172.16.3.255 (Directed broadcast) 255.255.255.255 (Local network broadcast) X 172.16.255.255 (All subnets broadcast)
Addressing Summary Example 16 172 2 160 10101100 00010000 10100000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 4 1
Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 16 172 2 160
Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 7 16 172 2 160
Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 16 172 2 160
Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 10 111111 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 16 172 2 160
Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 10 111111 10 000001 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 16 172 2 160
Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 10 111111 10 000001 10 111110 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 7 16 172 2 160
Addressing Summary Example 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 11 000000 10 000000 00000010 10101100 00010000 00000010 10 111111 10101100 00010000 00000010 10 000001 10101100 00010000 00000010 10 111110 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 7 8 16 172 2 160
Addressing Summary Example 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 11 000000 10 000000 00000010 10101100 00010000 00000010 10 111111 10101100 00010000 00000010 10 000001 10101100 00010000 00000010 10 111110 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 172.16.2.128 172.16.2.191 172.16.2.129 172.16.2.190 1 2 3 4 5 6 7 8 9 16 172 2 160
Subnet Address = 172.16.2.0 Host Addresses = 172.16.2.1–172.16.2.254 Broadcast Address = 172.16.2.255 Eight bits of subnetting Class B Subnet Example IP Host Address: 172.16.2.121 Subnet Mask:  255.255.255.0 Network Subnet Host 10101100 00010000 00000010 11111111 172.16.2.121: 255.255.255.0: 10101100 11111111 Subnet: 10101100 00010000 00010000 11111111 00000010 00000010 11111111 01111001  00000000 00000000 Broadcast: Network
Subnet Planning Other  subnets 192.168.5.16 192.168.5.32 192.168.5.48 20 subnets 5 hosts per subnet Class C address: 192.168.5.0
Class C Subnet Planning Example Subnet Address = 192.168.5.120 Host Addresses = 192.168.5.121–192.168.5.126 Broadcast Address = 192.168.5.127 Five Bits of Subnetting 11111 000 IP Host Address: 192.168.5.121 Subnet Mask:  255.255.255.248 Network Subnet Host 192.168.5.121: 11000000 11111111 Subnet: 11000000 10101000 10101000 11111111 00000101 00000101 11111111 01111001  01111 000 255.255.255.248: Broadcast: Network Network 11000000 10101000 00000101 01111111
Practical Network troubleshooting Layer 1: HW indicators (LED) Layer2 : MAC (ARP) Layer3: IP, Default gateway,Routing (IPCONFIG, PING, TRACERT, ROUTE) Layer4: PORT (NETSTAT)  Layer5-7: DNS, PROXY (NSLOOKUP, PING, LAN Setting…)

More Related Content

PDF
Osi model
PPTX
Tcp ip presentation
PPT
Ports & sockets
PDF
TCP - Transmission Control Protocol
PPT
TCP/IP(networking)
PPT
Chapter 5 : Link Layer
PDF
Internet technology unit 3
Osi model
Tcp ip presentation
Ports & sockets
TCP - Transmission Control Protocol
TCP/IP(networking)
Chapter 5 : Link Layer
Internet technology unit 3

What's hot (20)

DOCX
Final networks lab manual
PPT
Chap 10 igmp
PPTX
Reliable stream transport service
PPT
Features of tcp (part 2) .68
PDF
Internet technology unit 4
PPTX
Part 7 : HTTP/2, UDP and TCP
PDF
Internet technology unit 6
PPT
Np unit iii
PPTX
Tcp3 wayhandshakeprocess
PPT
Mạng máy tính nâng cao_Chapter01 overview
PPT
Np unit2
PDF
Internet technology unit 2
PPT
Np unit iv ii
DOCX
Network interview questions
PDF
Meeting 5.1 : telnet
PPT
Np unit1
PPT
Networking basics
PPTX
Part 12 : Local Area Networks
PDF
Internet technology unit 1
PDF
Meeting 7 : host configuration: dhcp
Final networks lab manual
Chap 10 igmp
Reliable stream transport service
Features of tcp (part 2) .68
Internet technology unit 4
Part 7 : HTTP/2, UDP and TCP
Internet technology unit 6
Np unit iii
Tcp3 wayhandshakeprocess
Mạng máy tính nâng cao_Chapter01 overview
Np unit2
Internet technology unit 2
Np unit iv ii
Network interview questions
Meeting 5.1 : telnet
Np unit1
Networking basics
Part 12 : Local Area Networks
Internet technology unit 1
Meeting 7 : host configuration: dhcp
Ad

Viewers also liked (20)

DOC
K10+11+12
PDF
20 bai-toan-hinh-vui
DOC
40 de-thi-toan-vao-10-chon-loc
PDF
Bai tap-toan-nang-cao-lop-7
PDF
40 bai-tap-nang-cao-hoa-8
PDF
Tuyển tập 500 bài Bất Đẳng Thức cổ điển
PDF
ĐỀ THI HSG TOÁN + TV LỚP 5 CÓ ĐÁP ÁN
PDF
Sach bat dang thuc rat hay
PDF
Bộ sưu tập bất đẳng thức của võ quốc bá cẩn
PDF
Bai dabttl quan_he_vuong_goc_no_restriction
PDF
Một số chuyên đề nâng cao đại số lớp 7
PDF
Tập 5 chuyên đề Toán học: Hình không gian - Megabook.vn
PDF
Chứng minh bất đẳng thức bằng phương pháp chọn điểm rơi. (1)
PDF
Tuyển tập bài tập hay và khó hình không gian và đề thi thử
PDF
hinh khong gian
DOC
Kho bài tập hình không gian
DOCX
Giáo án bồi dưỡng học sinh giỏi Toán 7
PDF
lý thuyết và bài tập hình không gian ôn thi đại học cực hay
PDF
Bai tap-hinh-lop-7-hay-co-loi-giai
PDF
Các chuyên đề bồi dưỡng HSG môn Toán THCS hay nhất
K10+11+12
20 bai-toan-hinh-vui
40 de-thi-toan-vao-10-chon-loc
Bai tap-toan-nang-cao-lop-7
40 bai-tap-nang-cao-hoa-8
Tuyển tập 500 bài Bất Đẳng Thức cổ điển
ĐỀ THI HSG TOÁN + TV LỚP 5 CÓ ĐÁP ÁN
Sach bat dang thuc rat hay
Bộ sưu tập bất đẳng thức của võ quốc bá cẩn
Bai dabttl quan_he_vuong_goc_no_restriction
Một số chuyên đề nâng cao đại số lớp 7
Tập 5 chuyên đề Toán học: Hình không gian - Megabook.vn
Chứng minh bất đẳng thức bằng phương pháp chọn điểm rơi. (1)
Tuyển tập bài tập hay và khó hình không gian và đề thi thử
hinh khong gian
Kho bài tập hình không gian
Giáo án bồi dưỡng học sinh giỏi Toán 7
lý thuyết và bài tập hình không gian ôn thi đại học cực hay
Bai tap-hinh-lop-7-hay-co-loi-giai
Các chuyên đề bồi dưỡng HSG môn Toán THCS hay nhất
Ad

Similar to Chapter 01 - Overview (20)

PPT
08 module interconnecting cisco router
PPT
TCP/IP Basics
PPTX
ppt of computer netwokrs.cse engineering.part 5
PDF
Ismail TCP IP.pdf
PDF
Ismail TCP IP.pdf
PPT
tcpip.ppt
PPT
tcpip.ppt
PPT
tcpip.ppt protocol power point presentation
PPT
tcpip.ppt
PPT
Introduction to TCP / IP in networking Technology
PPT
PPT
PPT
TCPIP in brief and working operation.ppt
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
PPTX
Transport_Layer_Protocols.pptx
PPT
07 - TCP_IP and the DoD Model.ppt
PDF
4. Communication and Network Security
PPT
the transport layer
PPTX
CCNA ppt Day 2
08 module interconnecting cisco router
TCP/IP Basics
ppt of computer netwokrs.cse engineering.part 5
Ismail TCP IP.pdf
Ismail TCP IP.pdf
tcpip.ppt
tcpip.ppt
tcpip.ppt protocol power point presentation
tcpip.ppt
Introduction to TCP / IP in networking Technology
TCPIP in brief and working operation.ppt
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Transport_Layer_Protocols.pptx
07 - TCP_IP and the DoD Model.ppt
4. Communication and Network Security
the transport layer
CCNA ppt Day 2

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web

Recently uploaded (20)

PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Institutional Correction lecture only . . .
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
master seminar digital applications in india
PDF
Insiders guide to clinical Medicine.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
01-Introduction-to-Information-Management.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Module 4: Burden of Disease Tutorial Slides S2 2025
102 student loan defaulters named and shamed – Is someone you know on the list?
FourierSeries-QuestionsWithAnswers(Part-A).pdf
O7-L3 Supply Chain Operations - ICLT Program
Institutional Correction lecture only . . .
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Renaissance Architecture: A Journey from Faith to Humanism
master seminar digital applications in india
Insiders guide to clinical Medicine.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Chapter 01 - Overview

  • 1. MẠNG MÁY TÍNH NÂNG CAO Thời gian học : 30 Tiết GV: TS Phạm Văn Tính Khoa CNTT – Đại học Nông Lâm Email: pvtinh@hcmuaf.edu.vn Khoa CNTT
  • 2. OVERVIEW TS, PHẠM VĂN TÍNH MẠNG MÁY TÍNH NÂNG CAO
  • 3. Data networks Data networks developed as a result of business applications that were written for microcomputers. Businesses needed a solution that would successfully address the following three problems: How to avoid duplication of equipment and resources How to communicate efficiently How to set up and manage a network
  • 7. Local-area networks (LANs) LANs consist of the following components: Computers Network interface cards Peripheral devices Networking media Network devices Some common LAN technologies are: Ethernet Token Ring FDDI
  • 9. Wide-area networks (WANs) WANs interconnect LANs, which then provide access to computers or file servers in other locations. Some common WAN technologies are: Modems Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Frame Relay US (T) and Europe (E) Carrier Series – T1, E1, T3, E3 Synchronous Optical Network (SONET)
  • 10. OSI layers Dividing the network into seven layers provides the following advantages: It breaks network communication into smaller, more manageable parts. It standardizes network components to allow multiple vendor development and support. It allows different types of network hardware and software to communicate with each other. It prevents changes in one layer from affecting other layers. It divides network communication into smaller parts to make learning it easier to understand.
  • 13. Ethernet and the OSI model
  • 14. Ethernet and the OSI model
  • 15. Ethernet Naming – MAC address
  • 16. Ethernet frame fields Start Frame Delimiter : 10101011
  • 17. Transport Data Link Physical Network Upper Layer Data Upper Layer Data TCP Header Data IP Header Data LLC Header 0101110101001000010 Data MAC Header Presentation Application Session Segment Packet Bits Frame PDU Encapsulating Data FCS FCS
  • 18. Upper Layer Data LLC Hdr + IP + TCP + Upper Layer Data MAC Header IP + TCP + Upper Layer Data LLC Header TCP+ Upper Layer Data IP Header Upper Layer Data TCP Header 0101110101001000010 Transport Data Link Physical Network Presentation Application Session De - encapsulating Data
  • 19. Each segment has its own collision domain All segments are in the same broadcast domain Data Link OR 1 2 3 1 2 Switches and Bridges Operate at Data Link Layer 4
  • 20. Switches Each segment has its own collision domain Broadcasts are forwarded to all segments Memory Switch
  • 23. Early protocol suite Universal Introduction to TCP/IP Host Internet TCP/IP Host
  • 24. TCP/IP Protocol Stack 7 6 5 4 3 2 5 4 3 2 Application Presentation Session Transport Network Data Link Physical 1 Application Transport Internet Data Link Physical 1
  • 25. Application Layer Overview *Used by the router Application Transport Internet Data Link Physical File Transfer - TFTP * - FTP * - NFS E-Mail - SMTP Remote Login - Telnet * - rlogin * Network Management - SNMP * Name Management - DNS*
  • 26. Distinguishes between upper layer applications Establishes end-to-end connectivity between applications Defines flow control Provides reliable or unreliable services for data transfer Network IPX IP Transport SPX TCP UDP Transport Layer Functions
  • 27. Transport Layer Overview Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Application Transport Internet Data Link Physical Connection-Oriented Connectionless
  • 28. Synchronize Acknowledge, Synchronize Acknowledge Data Transfer (Send Segments) Sender Receiver Connection Established Reliable Transport Layer Functions
  • 29. Hub Bridge Switch Router Collision Domains: 1 4 4 4 Broadcast Domains: 1 1 1 4 Network Device Domains
  • 30. TCP Segment Format Source port (16) Destination port (16) Sequence number (32) Header length (4) Acknowledgement number (32) Reserved (6) Code bits (6) Window (16) Checksum (16) Urgent (16) Options (0 or 32 if any) Data (varies) 20 Bytes Bit 0 Bit 15 Bit 16 Bit 31
  • 31. Port Numbers TCP Port Numbers F T P Transport Layer T E L N E T D N S S N M P T F T P S M T P UDP Application Layer 21 23 25 53 69 161 R I P 520
  • 32. TCP Port Numbers Source Port Dest. Port … Host A 1028 23 … SP DP Host Z Telnet Z Dest. port = 23. Send packet to my Telnet application.
  • 33. TCP Three Way Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Host A Host B 1
  • 34. TCP Three Way Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Send SYN, ACK (seq=300 ack=101 ctl=syn,ack) Host A Host B SYN received 1 2
  • 35. TCP Three Way Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Send SYN, ACK (seq=300 ack=101 ctl=syn,ack) Established (seq=101 ack=301 ctl=ack) Host A Host B SYN received 1 2 3
  • 36. Denial - of - Service Attacks Denial - of - service (DoS) attacks are designed to deny services to legitimate hosts attempting to establish connections. In a DoS attack, the hacker initiates a synchronization but the receiving device replies to a non-existent, unreachable IP address and then is placed in a wait-state while waiting to receive the final ACK from the initiator .
  • 37. TCP Simple Acknowledgment Window size = 1 Sender Receiver
  • 38. TCP Simple Acknowledgment Window size = 1 Sender Receiver Send 1 Receive 1
  • 39. TCP Simple Acknowledgment Window size = 1 Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2
  • 40. TCP Simple Acknowledgment Window size = 1 Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2
  • 41. TCP Simple Acknowledgment Window size = 1 Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3
  • 42. TCP Simple Acknowledgment Window size = 1 Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3
  • 43. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3 Receive ACK 4 Send ACK 4
  • 44. TCP Sequence and Acknowledgment Numbers Source Port Dest. Port … Sequence # Acknowledgement # Source Dest. Seq. Ack. 1028 23 10 1 I just sent #10.
  • 45. TCP Sequence and Acknowledgment Numbers I just got #10, now I need #11. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 1 Ack. 1028 23 Source Dest. 11 Seq. 1 Ack. I just sent #10.
  • 46. TCP Sequence and Acknowledgment Numbers Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 11 Seq. 2 Ack. 1028 23 Source Dest. 10 Seq. 1 Ack. 1028 23 Source Dest. 11 Seq. 1 Ack. I just got #10, now I need #11. I just sent #11.
  • 47. TCP Sequence and Acknowledgment Numbers Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 11 Seq. 101 Ack. 1028 23 Source Dest. 10 Seq. 100 Ack. 1028 23 Source Dest. 11 Seq. 100 Ack. 1028 23 Source Dest. 12 Seq. 101 Ack. I just got #11, now I need #12. I just sent #11.
  • 49. TCP Windowing Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 3
  • 50. TCP Windowing Window size = 3 Send 2 Sender Window size = 3 Send 1 Window size = 3 Send 3 ACK 3 Window size = 2 Packet 3 is Dropped Receiver
  • 51. TCP Windowing Window size = 3 Send 2 Sender Window size = 3 Send 1 Window size = 3 Send 3 ACK 3 Window size = 2 Packet 3 is Dropped Window size = 3 Send 4 Window size = 3 Send 3 Receiver
  • 52. TCP Windowing Window size = 3 Send 2 Sender Window size = 3 Send 1 Window size = 3 Send 3 Packet 3 is Dropped Window size = 3 Send 4 Window size = 3 Send 3 ACK 5 Window size = 2 Receiver Window size = 3 ACK 3 Window size = 2
  • 53. No sequence or acknowledgment fields UDP Segment Format Source port (16) Destination port (16) Length (16) Data (if any) 1 Bit 0 Bit 15 Bit 16 Bit 31 Checksum (16) 8 Bytes
  • 54. Network Layer Functions Defines logical source and destination addresses associated with a specific protocol Defines paths through network Interconnects multiple data links Network IP, IPX Data Link Physical EIA/TIA-232 v.35 Ethernet Frame Relay HDLC 802.2 802.3
  • 55. Data Source address Destination address IP Header 172.15.1.1 Node Network Logical Address Network Layer End Station Packet Network Layer Functions
  • 56. Network Layer Functions (cont.) 11111111 11111111 00000000 00000000 10101100 00010000 01111010 11001100 Binary Mask Binary Address 172.16.122.204 255.255.0.0 172 16 122 204 255 Address Mask 255 0 0 Network Host
  • 57. Internet Layer Overview OSI network layer corresponds to the TCP/IP internet layer Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) Application Transport Internet Data Link Physical
  • 58. IP Datagram Version (4) Destination IP Address (32) Options (0 or 32 if any) Data (varies if any) 1 Bit 0 Bit 15 Bit 16 Bit 31 Header Length (4) Priority & Type of Service (8) Total Length (16) Identification (16) Flags (3) Fragment offset (13) Time to live (8) Protocol (8) Header checksum (16) Source IP Address (32) 20 Bytes
  • 59. Determines destination upper-layer protocol Protocol Field Transport Layer Internet Layer TCP UDP Protocol Numbers IP 17 6
  • 60. Internet Control Message Protocol Application Transport Internet Data Link Physical Destination Unreachable Echo (Ping) Other ICMP 1
  • 61. Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2.
  • 62. Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I heard that broadcast. The message is for me. Here is my Ethernet address. I need the Ethernet address of 176.16.3.2.
  • 63. Address Resolution Protocol 172.16.3.1 IP: 172.16.3.2 Ethernet: 0800.0020.1111 172.16.3.2 IP: 172.16.3.2 = ??? I heard that broadcast. The message is for me. Here is my Ethernet address. I need the Ethernet address of 176.16.3.2.
  • 64. Address Resolution Protocol Map IP MAC Local ARP 172.16.3.1 IP: 172.16.3.2 Ethernet: 0800.0020.1111 172.16.3.2 IP: 172.16.3.2 = ??? I heard that broadcast. The message is for me. Here is my Ethernet address. I need the Ethernet address of 176.16.3.2.
  • 65. Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address?
  • 66. Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
  • 67. Reverse ARP Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
  • 68. Reverse ARP Map MAC IP Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
  • 69. Unique addressing allows communication between end stations Path choice is based on destination address Location is represented by an address Introduction to TCP/IP Addresses 172.18.0.2 172.18.0.1 172.17.0.2 172.17.0.1 172.16.0.2 172.16.0.1 SA DA HDR DATA 10.13.0.0 192.168.1.0 10.13.0.1 192.168.1.1
  • 70. IP Addressing 255 255 255 255 Dotted Decimal Maximum Network Host 32 bits
  • 71. IP Addressing 255 255 255 255 Dotted Decimal Maximum Network Host 128 64 32 16 8 4 2 1 11111111 11111111 11111111 11111111 Binary 32 bits 1 8 9 16 17 24 25 32 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
  • 72. IP Addressing 255 255 255 255 Dotted Decimal Maximum Network Host 128 64 32 16 8 4 2 1 11111111 11111111 11111111 11111111 10101100 00010000 01111010 11001100 Binary 32 bits 172 16 122 204 Example Decimal Example Binary 1 8 9 16 17 24 25 32 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
  • 73. Class A: Class B: Class C: Class D: Multicast Class E: Research IP Address Classes 8 bits 8 bits 8 bits 8 bits Network Host Host Host Network Network Host Host Network Network Network Host
  • 74. IP Address Classes 1 Class A: Bits: 0 NNNNNNN Host Host Host 8 9 16 17 24 25 32 Range (1-126) 1 Class B: Bits: 10 NNNNNN Network Host Host 8 9 16 17 24 25 32 Range (128-191) 1 Class C: Bits: 110 NNNNN Network Network Host 8 9 16 17 24 25 32 Range (192-223) 1 Class D: Bits: 1110 MMMM Multicast Group Multicast Group Multicast Group 8 9 16 17 24 25 32 Range (224-239)
  • 75. Host Addresses 172.16.2.2 172.16.3.10 172.16.12.12 10.1.1.1 10.250.8.11 10.180.30.118 E1 172.16 12 12 Network Host . . Network Interface 172.16.0.0 10.0.0.0 E0 E1 Routing Table 172.16.2.1 10.6.24.2 E0
  • 76. Determining Available Host Addresses 11111111 172 16 0 0 10101100 00010000 00000000 00000000 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 Network Host 00000000 00000001 11111111 11111111 11111111 11111110 ... ... 00000000 00000011 11111101 1 2 3 65534 65535 65536 - ... 2 65534 N 2 N -2 = 2 16 -2 = 65534
  • 77. Network 172.16.0.0 Addressing without Subnets 172.16.0.0 172.16.0.1 172.16.0.2 172.16.0.3 … ... 172.16.255.253 172.16.255.254
  • 78. Network 172.16.0.0 Addressing with Subnets 172.16.1.0 172.16.2.0 172.16.3.0 172.16.4.0
  • 79. Subnet Addressing 172.16.2.200 172.16.2.2 172.16.2.160 172.16.2.1 172.16.3.5 172.16.3.100 172.16.3.150 E0 172.16 Network Network Interface 172.16.0.0 172.16.0.0 E0 E1 New Routing Table 2 160 Host . . 172.16.3.1 E1
  • 80. Subnet Addressing 172.16.2.200 172.16.2.2 172.16.2.160 172.16.2.1 172.16.3.5 172.16.3.100 172.16.3.150 172.16.3.1 E0 E1 172.16 2 160 Network Host . . Network Interface 172.16.2.0 172.16.3.0 E0 E1 New Routing Table Subnet
  • 81. Subnet Mask 255 255 0 0 IP Address Default Subnet Mask 8-bit Subnet Mask Network Host Network Host Network Subnet Host Also written as “ /16 ” where 16 represents the number of 1s in the mask. Also written as “ /24 ” where 24 represents the number of 1s in the mask. 11111111 11111111 00000000 00000000 172 16 0 0 255 255 255 0
  • 82. Decimal Equivalents of Bit Patterns 0 0 0 0 0 0 0 0 = 0 1 0 0 0 0 0 0 0 = 128 1 1 0 0 0 0 0 0 = 192 1 1 1 0 0 0 0 0 = 224 1 1 1 1 0 0 0 0 = 240 1 1 1 1 1 0 0 0 = 248 1 1 1 1 1 1 0 0 = 252 1 1 1 1 1 1 1 0 = 254 1 1 1 1 1 1 1 1 = 255 128 64 32 16 8 4 2 1
  • 83. Subnets not in use—the default Subnet Mask without Subnets 16 Network Host 172 0 0 10101100 11111111 10101100 00010000 11111111 00010000 00000000 00000000 10100000 00000000 00000000 00000010 172.16.2.160 255.255.0.0 Network Number
  • 84. Network number extended by eight bits Subnet Mask with Subnets 16 Network Host 172.16.2.160 255.255. 255 .0 172 2 0 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 00000000 00000000 00000010 Subnet Network Number 128 192 224 240 248 252 254 255
  • 85. Subnet Mask with Subnets (cont.) Network number extended by ten bits Network Host 172.16.2.160 255.255. 255 . 192 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 11 000000 10 000000 00000010 Subnet 16 172 2 128 Network Number 128 192 224 240 248 252 254 255 128 192 224 240 248 252 254 255
  • 86. Subnet Mask Exercise Address Subnet Mask Class Subnet 172.16.2.10 10.6.24.20 10.30.36.12 255.255.255.0 255.255.240.0 255.255.255.0
  • 87. Subnet Mask Exercise Answers Address Subnet Mask Class Subnet 172.16.2.10 10.6.24.20 10.30.36.12 255.255.255.0 255.255.240.0 255.255.255.0 B A A 172.16.2.0 10.6.16.0 10.30.36.0
  • 88. Broadcast Addresses 172.16.1.0 172.16.2.0 172.16.3.0 172.16.4.0 172.16.3.255 (Directed broadcast) 255.255.255.255 (Local network broadcast) X 172.16.255.255 (All subnets broadcast)
  • 89. Addressing Summary Example 16 172 2 160 10101100 00010000 10100000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 4 1
  • 90. Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 16 172 2 160
  • 91. Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 7 16 172 2 160
  • 92. Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 16 172 2 160
  • 93. Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 10 111111 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 16 172 2 160
  • 94. Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 10 111111 10 000001 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 16 172 2 160
  • 95. Addressing Summary Example 10101100 11111111 00010000 11111111 11111111 10100000 11 000000 10 000000 00000010 10 111111 10 000001 10 111110 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 7 16 172 2 160
  • 96. Addressing Summary Example 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 11 000000 10 000000 00000010 10101100 00010000 00000010 10 111111 10101100 00010000 00000010 10 000001 10101100 00010000 00000010 10 111110 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 1 2 3 4 5 6 7 8 16 172 2 160
  • 97. Addressing Summary Example 10101100 11111111 10101100 00010000 11111111 00010000 11111111 00000010 10100000 11 000000 10 000000 00000010 10101100 00010000 00000010 10 111111 10101100 00010000 00000010 10 000001 10101100 00010000 00000010 10 111110 Host Mask Subnet Broadcast Last First 172.16.2.160 255.255.255.192 172.16.2.128 172.16.2.191 172.16.2.129 172.16.2.190 1 2 3 4 5 6 7 8 9 16 172 2 160
  • 98. Subnet Address = 172.16.2.0 Host Addresses = 172.16.2.1–172.16.2.254 Broadcast Address = 172.16.2.255 Eight bits of subnetting Class B Subnet Example IP Host Address: 172.16.2.121 Subnet Mask: 255.255.255.0 Network Subnet Host 10101100 00010000 00000010 11111111 172.16.2.121: 255.255.255.0: 10101100 11111111 Subnet: 10101100 00010000 00010000 11111111 00000010 00000010 11111111 01111001 00000000 00000000 Broadcast: Network
  • 99. Subnet Planning Other subnets 192.168.5.16 192.168.5.32 192.168.5.48 20 subnets 5 hosts per subnet Class C address: 192.168.5.0
  • 100. Class C Subnet Planning Example Subnet Address = 192.168.5.120 Host Addresses = 192.168.5.121–192.168.5.126 Broadcast Address = 192.168.5.127 Five Bits of Subnetting 11111 000 IP Host Address: 192.168.5.121 Subnet Mask: 255.255.255.248 Network Subnet Host 192.168.5.121: 11000000 11111111 Subnet: 11000000 10101000 10101000 11111111 00000101 00000101 11111111 01111001 01111 000 255.255.255.248: Broadcast: Network Network 11000000 10101000 00000101 01111111
  • 101. Practical Network troubleshooting Layer 1: HW indicators (LED) Layer2 : MAC (ARP) Layer3: IP, Default gateway,Routing (IPCONFIG, PING, TRACERT, ROUTE) Layer4: PORT (NETSTAT) Layer5-7: DNS, PROXY (NSLOOKUP, PING, LAN Setting…)

Editor's Notes

  • #18: Purpose: This figure illustrates encapsulation. Emphasize: The protocol data units (PDUs) are the terms used in the industry and in this course to describe data at the different layers. Encapuslation is a key concept that illustrates how data is formatted prior to being sent across a link. This example is an illustration is Ethernet (or token ring) at the data link and physical layer and TCP/IP at the network and transport layers. Transition: The following discusses de-encalsulation.
  • #19: Purpose: This figure illustrates de-encapsulation. Emphasize: At the destination, the headers at each layer are stripped off as the data moves back up the stack.
  • #20: Emphasize: To reduce the number of collisions, a switch can be split into multiple segments, each in a separate collision domain. Note that all segments are in the same broadcast domain.
  • #21: Purpose: This figure compares the switch to a highway.
  • #24: Purpose: This figure explains the history of TCP/IP. Emphasize: In the mid-1970s, DARPA established a packet-switched network to provide electronic communication between research institutions in the United States. DARPA and other government organizations understood the potential of packet-switched technology and were just beginning to face the problem virtually all companies with networks now have—how to establish communication between dissimilar computer systems.
  • #25: Purpose: This figure shows the protocol layers and compares them with the layers of the OSI reference model. Emphasize: This figure shows the TCP/IP conceptual layer titles. The protocol stack is used several times in this chapter, and the lower two layers may be sometimes called the network interface layer. The terms “packet” and “datagram” are nearly interchangeable. However, a datagram is a unit of data, while a packet is a physical entity that appears on a network. In most cases, a packet contains a datagram. In some protocols, though, a datagram is divided into a number of packets to accommodate a requirement for smaller transmittable pieces. Note: Creation and documentation of the Internet protocols closely resembles an academic research project. The protocols are specified in documents called RFCs. RFCs are published, reviewed, and analyzed by the Internet community.
  • #26: Purpose: This figure discusses application-layer protocols. Emphasize: The common network applications today include file transfer, remote login, network management, and e-mail. We focus on TCP/IP in this course for several reasons: TCP/IP is a universally available protocol and you will use it at work. TCP/IP is a useful reference for understanding other protocols, because it includes elements that are representative of other protocols. TCP/IP is important because the router uses it as a configuration tool. The router uses Telnet for remote configuration, TFTP to transfer configuration files and operating system images, and SNMP for network management. Transition: The next section moves down the model to discuss the transport layer.
  • #27: Purpose: This figure describes the transport layer. Emphasize: Two transport layer protocols in the IP stack are TCP and UDP. TCP will offer more reliability because it is connection oriented. UDP guarantees no reliability. Sequence Packet Exchange (SPX) is the transport layer protocol used by IPX. It is also connection oriented. Newer versions of IPX support TCP and UDP as well.
  • #28: Purpose: This figure introduces the protocols used at the transport layer. Emphasize: TCP is one protocol within the protocol suite of TCP/IP. TCP is an acknowledged transport-layer protocol. However, TCP has a large header so there is much overhead. UDP is unacknowledged. By eliminating all of the acknowledgement mechanisms, UDP is fast and efficient. UDP does not divide application data into pieces. Reliability is assumed to be handled by the upper-layer protocols, by a reliable lower-layer protocol, or by an error-tolerant application. UDP does have a smaller header and less overhead.
  • #29: Purpose: This figure illustrates a TCP connection being established. Emphasize: The exchange is sometimes referred to as the “three-way-handshake.” The initiating host requests a synchronization. The receiver acknowledges the synchronization and specify synchronization parameters in the opposite direction. The receiver acknowledges the synchronization and a connection is established.
  • #30: Emphasize: This figure summarizes the different collision domains and broadcast domains on various network devices. It is important that students understand the difference between the two domains.
  • #31: Purpose: This figure explains what is contained in a TCP segment. Emphasize: Source Port and Destination Port are the connections to the upper-layer protocol. Sequence and Acknowledgment numbers are the position in the user’s byte stream of this segment. Sequence numbers are used for establishing reliability. HLEN is the header length. It tells us where the data begins. Six bits are reserved for future use. Code Bits distinguish session management messages from data. Window is a term we will come back to in a few slides. For now, consider it the size of the receivers buffers. Checksum is a cyclic redundancy check (CRC). It verifies that the datagram arrived intact. Urgent Pointer is used to signify out-of-band data. Options are used by vendors to enhance their protocol offering. The data portion of the frame contains the upper-layer protocol data.
  • #32: Purpose: This figure explains how TCP uses port numbers to connect applications. Emphasize: These port numbers were standardized in RFC 1340. This RFC has been obsoleted by RFC 1700. However, many of the port numbers outlined in RFC 1340 are still being used as standards. It is possible to filter on TCP port numbers. The TCP port number, combined with other information, is what UNIX C language developers call a socket. However, work sockets have different meanings in XNS and Novell, where they are service access point abstractions or programming interfaces rather than service access point identifiers.
  • #33: Purpose: This figure continues to explain how TCP uses port numbers. Emphasize: In most cases the TCP port number on one side of a conversation is the same on the other side. For example, when a file transfer takes place, the software on one host is communicating with a peer application on another host. In this example we see a Telnet (TCP port 23) session. It is possible to have multiple Telnet sessions running simultaneously on a host or router. Telnet selects an unused port number above 1023 to represent the source port for each independent session. Notice that the destination port is still 23. Port numbering is important to understand in order to configure IP extended access lists. The lack of symmetry in port number use is a critical factor in establishing effective security.
  • #34: Layer 1 of 3: Host A begins by sending a SYN segment indicating that host A will use sequence numbers starting with sequence number 100. Emphasize: TCP is a simple protocol in terms of connection establishment. Some protocols have dozens of negotiation messages that are transmitted prior to session initialization. TCP implements a strategy that is both necessary and sufficient.
  • #35: Layer 2 of 3: Host B sends an ACK and acknowledges the SYN it received from host A. Host B also sends a SYN. Note that the acknowledgment field indicates host B is now expecting to hear sequence 101, acknowledging the SYN that occupied sequence 100.
  • #36: Layer 3 of 3: In the next segment, host A sends some data. Note that the sequence number of the segment in step 3 is the same as as the ACK in step 2. Emphasize: This sequence is like two people talking. The first person wants to talk to the second, so she says, “I would like to talk with you.” (SYN.) The second person responds, “Good. I want to talk with you.” (SYN, ACK.) The first person then says, “Fine—let us talk. Here is what I have to say.” (SYN, ACK, DATA.) At this point either side can begin communicating and either side can break the connection. TCP is a peer-to-peer (balanced) communication method (no primary/secondary). Note: This figure explains TCP connection establishment. For more information regarding the three-way handshake in establishing a TCP connection, refer to RFC 793.
  • #38: Layer 1 of 7: The window size is the number of messages transmitted before the sender must wait for an acknowledgment. Window size was presented earlier in the course, so this slide is a review. The initial state, no messages being sent.
  • #39: Layer 2 of 7: Data message 1 sent. (Send 1, Receive 1)
  • #40: Layer 3 of 7: Acknowledgment message 2 sent. (Send ACK 2, Receive ACK 2)
  • #41: Layer 4 of 7: Data message 2 sent. (Send 2, Receive 2)
  • #42: Layer 5 of 7: ACK for message 2. (Send ACK 3, Receive ACK 3)
  • #43: Layer 6 of 7: Send 3, Receive 3.
  • #44: Layer 1 of 7: ACK for message 3. (Send ACK 4, Receive ACK 4) This sequence helps to convey the delay associated with a window size of one. Note: TCP acknowledgments are expectational and are sometimes called forward referenced, which means that they refer to the segment they are expecting to receive, not the one just sent. Acknowledgment field sizes can become an issue when transmitting data at FDDI and ATM speeds.
  • #45: Layer 1 of 4: Layer 1 shows the Sequence number is 10.
  • #46: Layer 2 of 4: Layer 2 shows the acknowledgment number is 11.
  • #47: Layer 3 of 4: Layer 3 shows the next sequence number is 11.
  • #48: Layer 4 of 4: Layer 4 shows the acknowledgment number is 12. Emphasize: The Sequence and Acknowledgment numbers are directional. The slide highlights the communication going in one direction. The sequence and acknowledgments take place with the sender on the right. TCP provides full-duplex communication.
  • #49: Layer 1 of 5: This figure points out the benefit of a larger window size. Layer 1 is in the initial state, no messages being sent.
  • #50: Layer 2 of 5: Layer 2 illustrates how the sending device defines its window buffer as 3 and sends three bytes.
  • #51: Layer 3 of 5: In layer 3, the receiving device acknowledges the two first bytes, drops 3, and advertises its window size as 2.
  • #52: Layer 4 of 5: In layer 3 the sending device transmits 2 bytes but maintains a window size of 2.
  • #53: Layer 5 of 5: In layer 5, the receiving device acknowledges the 2 bytes and still advertises its window size as 2.
  • #54: Purpose: This graphic explains the format of UDP. Emphasize: UDP is simple and efficient but not reliable. The UDP segment format includes a source port, a destination port, a length field, and an optional checksum field. It has no sequencing, acknowledgments, or windowing. Example: TFTP uses a checksum. At the end of the transfer if the checksum does not match then the file did not make it. The user is notified and must type in the command again. As a result, the user has become the reliability mechanism. Transition: The next section discusses the network layer of the OSI model and how it corresponds to the TCP/IP internet layer.
  • #55: Purpose: This figure maps the lower layers to the network layer. Emphasize: Routing occurs at the network layer. Most of this course uses the IP network layer protocol. It supports multiple lower layer protocols. IPX will also be covered in a single chapter in this course. Routers are network layer devices.
  • #56: Emphasize: Route determination occurs at this layer so a packet must include a source and destination address. Network layer addresses have two components, a network component for internetwork routing and a node number for a device specific address. The example in the figure is an example of an IP packet and address.
  • #57: Purpose: This slide gives students enough information about IP addresses until it is covered in-depth in Chapter 8, “Interconnecting Networks with TCP/IP.” Emphasize: IP address format is dotted-decimal. Dotted-decimal makes it easy to work with IP addresses. Students should be familiar with binary. In this course we will work with the addresses on the bit level, so we will convert these addresses into binary, make changes to them, and convert them back. Let students know that the IP address is a 32 bit address. It has a network portion and host portion. The subnet mask is a 32 bit mask that divides the address into the two portions. Note: Students should understand this format presented so they can successfully perform the laboratory exercises in this course. They will learn about classes of I P addresses later in the course.
  • #58: Purpose: This figure presents a list of the protocols operating at the Internet layer. Emphasize: Review the protocols briefly. They are covered in detail on the coming pages. Routing protocols are usually considered layer-management protocols that support the network layer.
  • #59: Purpose: This figure explains what is contained in an IP datagram. Emphasize: Discuss the format of the IP datagram. The current generation of IP is version 4. We need the Header Length (HLEN) and the Total Length in this example because the IP Options field allows a variable length. Time-To-Live (TTL) is a countdown field. Every station must decrement this number by one or by the number of seconds it holds onto the packet. When the counter reaches zero, the time to live expires and the packet is dropped. TTL keeps packets from endlessly wandering the internet in search of nonexistent destinations. The next generation of IP (called IPng) is IP version 6. It is covered in RFC 1752. Good references for this topic are Douglas Comer’s books on TCP/IP.
  • #60: Purpose: This figure explains the use of the protocol field. Emphasize: Protocol numbers connect, or multiplex, IP to the transport layer. These numbers are standardized in RFC 1700. Cisco uses these numbers in filtering with extended access lists.
  • #61: Purpose: This figure explains which messages are ICMP messages. Emphasize: Describe ICMP messages and ping.
  • #62: Layer 1 of 4: Purpose: This figure shows how ARP is used to determine an IP address. In layer 1, host 172.16.3.1 needs the MAC address of host 172.16.3.2. It sends an ARP request message.
  • #63: Layer 2 of 4: In layer 2, host 172.16.3.2 is on the same wire and receives the ARP request message.
  • #64: Layer 3 of 4: In layer 3, host 172.16.3.2 sends an ARP reply with its MAC address to host 172.16.3.1.
  • #65: Layer 4 of 4: In layer 4, the bulleted items at the bottom of the slide appear. Emphasize: ARP provides translation between network and data link layers. Discuss why it is necessary to have a mechanism like ARP. Describe ARP operation. Not all protocols use ARP. Some use other methods for address translation. Note: For the message to be transmitted uniquely to a single interface on the multiaccess link, it is necessary to build a frame with the unique MAC address of the interface
  • #66: Layer 1 of 4: Purpose: This figure explains how RARP works. In layer 1, the host on the left needs its IP address. It sends a RARP request with its MAC address.
  • #67: Layer 2 of 4: In layer 2, the host on the right, functioning as a RARP server, maps the MAC address to an IP address.
  • #68: Layer 3 of 4: In layer 3, the host on the right sends the IP address to the requester in a RARP reply message.
  • #69: Layer 4 of 4: In layer 4, the bulleted items appear at the bottom of the slide. Emphasize: RARP is used to boot diskless workstations over a network.
  • #70: Purpose: This is an introduction slide to the IP addressing section. Emphasize: Stations with internetwork access must have unique addresses.
  • #71: Layer 1 of 3: Purpose: This figure show the general format of an IP address. In layer 1, the address is 32 bits with a network and host portion.
  • #72: Layer 3 of 3: In layer 2, one can convert the address to binary.
  • #73: Layer 3 of 3: In layer 3, an example of dotted-decimal format and binary are displayed. Emphasize: IP address format is dotted-decimal. Dotted-decimal makes it easy to work with IP addresses. However, in this course we will work with the addresses on the bit level, so we will convert these addresses into binary, make changes to them, and convert them back. The central authority for addresses is the Internet Assigned Numbers Authority. Note: This most common form of addressing reflects the widely used IP version 4. Faced with the problem of depleting available addresses, Internet Engineering Task Force (IETF) work is under way for a backward-compatible next generation of IP (IPng, also called IP 6). IP 6 will offer expanded routing and addressing capabilities with 128-bit addresses rather than the 32-bit addressing shown on the graphic. Addresses from both IP versions will coexist. Initial occurrences will probably be at locations with address translator software and firewalls.
  • #74: Purpose: This graphic describes the three most common classes of IP address. Emphasize: Discuss classes of addresses. Each address contains information about the network number and the host number of the device. Class A addresses are for very large organizations. Class B addresses are for smaller organizations, and Class C addresses for even smaller ones. As the number of networks grows, classes may eventually be replaced by another addressing mechanism, such as classless interdomain routing (CIDR). RFC 1467, Status of CIDR Deployment in the Internet, presents information about CIDR. RFC 1817, CIDR and Classful Routing, also presents CIDR information.
  • #75: Emphasize: Highlight the fixed values that start each class address. The first octet rule states that when an address falls into a specified range, it belongs to a certain class. Students should soon be able to recognize the address class of any IP address on sight. Note: If time or interest permits, you can use the initial bit patterns in the first octet and show how a class of IP network derives the range of network numbers for that IP address class.
  • #76: Purpose: This figure presents an overview of host and network address conventions. Emphasize: In the example, 172.16.0.0 and 10.0.0.0 refer to the wires at each end of the router. Explain how the routing table is used. Entries in the routing table refer to the network only. The router does not know the location of hosts—it knows the location of networks. .
  • #77: Purpose: This figure explains how to calculate the number of available hosts in a network. Emphasize: 2N-2 is the calculation to determine available hosts. N is the number of binary digits in the host field. Subtract 2 because a host cannot be all 0s or 1s. The same principal applies when determining the number of available networks.
  • #78: Purpose: This figure explains what networks look like without subnets. Without subnets, use of network addressing space is inefficient. The Class B network is like a highway with no exits—there is no place to exit, so all of the traffic is in one line.
  • #79: Purpose: This figure describes network structure when subnets are used. Emphasize: The host bits of an IP address can be subdivided into a subnetwork section and a host section. The subnetwork section in this example is the full third octet. Point out the difference in the addressing between the previous slide and this slide. A subnetted address space is like a highway with exits. A network device uses a subnet mask to determine what part of the IP address is used for the network, the subnet, and the device ID. A subnet mask is a 32-bit value containing a number of one bits for the network and subnet ID and a number of zero bits for the host ID. Given its own IP address and subnet mask, a device can determine if an IP packet is destined for 1) a device on its own subnet, 2) a device on a different subnet on its own network, or 3) a device on a different network. A device can determine what class of address the device has been assigned from its own IP address. The subnet mask then tells the device where the boundary is between the subnet ID and the host ID.
  • #80: Layer 1 of 2: Purpose: This figure shows what would happen if there were no subnetting. Emphasize: If networks could not be broken down into more granular, subnetworks few networks could exist, each with a capacity for many hosts.
  • #81: Layer 1 of 2: Emphasize: By turning on more bits in the mask, we reserve some bits as network information and can use these bits to describe subnetworks. Describe how the router makes use of this technique. Point out that there is more information in the routing table now. Note: As you enter the discussion about subnet masks, a question might arise about whether it is legal to define a discontiguous subnet mask. A discontiguous subnet mask consists of intervening zeros, as in 101111011000, rather than all ones followed by zeros, as in 1111111100000000. The question has two answers. According to RFC 950 that describes IP, a discontiguous subnet mask is legal. However, the hardware expense to produce an interface that supports discontiguous masking is cost-prohibitive. Thus in practice it is not supported on most vendors’ equipment, including Cisco. Also, discontiguous masking has no benefit, and it is much more difficult to maintain a network based on this design. Later RFCs make noncontiguous subnet masks illegal because they are incompatible with future addressing schemes such as CIDR.
  • #82: Emphasize: Turn on more bits to represent subnets. Compare the default or standard subnet mask with the subnet mask in the slide. These are the rules for IP addressing: An address is 32 bits, divided into three components: First octet rule bits Network bits (path selection bits) Node bits The first octet rule states that the most significant bit pattern in the first octet determines the class of the address. Path selection bits cannot be all ones or zeros. Certain addresses are reserved. RFC 1918 defines some of those. Prefix or mask one bits are path selection significant; zero bits are host bits and therefore not significant. Use the logical AND to combine the address and mask bits to get the subnet address. The maximum number of available subnets equals 2 prefix bits - 2; the maximum number of available hosts equals 2 32- prefix bits - 2.
  • #83: Purpose: This figure explains how subnet masks are converted to decimal addresses. Emphasize: Review binary-to-decimal conversion, bit weighting, and conversion. Explain logical AND. One possible explanation of logical AND follows: We will need to be able to perform a logical AND on the binary numbers. Just take two binary numbers and place one above the other. The ones in the bottom are like a pipe—the number above it just drops through. The zeros are like a clogged pipe, so nothing comes out in the answer. Presenting a truth table will help some students understand. You might need to give more than one explanation. Note: You might want to hand out a binary-to-decimal conversion sheet if you have not already done so. We have not included one in the lab section. It is more useful to have one that is on a separate page from the labs.
  • #84: Purpose: This graphic explains how routers use addresses that have no subnet mask. Emphasize: Explain how masking works at the bit level. Zero bits mask host information. Note: This is an easy place to lose students. At this point, they need to learn several abstract mathematical concepts before we can show them how to lay out an IP-addressed network. To the novice these techniques may seem unrelated, making the presentation confusing. To a more experienced audience, these techniques will be familiar.
  • #85: Purpose: This figure shows how the router determines an address when subnetting is used. Emphasize: This example makes a Class B address space look like a collection of Class C address spaces. Now the logical AND allows us to extract the subnet number as well as the assigned network number. An exercise follows that tests the students’ understanding of subnet masks.
  • #86: Purpose: This figure shows how the router determines an address when subnetting is used. Emphasize: This example is different from the previous example in that the the subnet and host are divided within an octet. Transition: An exercise follows that tests the students’ understanding of subnet masks.
  • #87: Layer 1 of 2: Purpose: This exercise is for the students to take the given IP addresses and associated subnet masks and perform a logical AND to extract the subnet number. Provide time in class and review the answers after the majority of students have finished. The answers are given in the following figure.
  • #88: Layer 2 of 2: Purpose: This answers to the exercise are given in the figure. Note: Students can also find the answers to this exercise in the “Answers” appendix.
  • #89: Purpose: This figure explains how broadcast addresses work. Emphasize: A range of addresses is needed to allocate address space. A valid range of addresses is between subnet zero and the directed broadcast. These RFCs provide more information about broadcasts: RFC 919, Broadcasting Internet Datagrams RFC 922, Broadcasting IP Datagrams in the Presence of Subnets Cisco’s support for broadcasts generally complies with these two RFCs. It does not support multisubnet broadcasts that are defined in RFC 922.
  • #90: Layer 1 of 9: Purpose: This example summarizes The IP addressing that was covered earlier in this chapter. Emphasize: In layer 1, convert the address to a binary host address.
  • #91: Layer 2 of 9: Emphasize: In layer 2, write the subnet mask in binary.
  • #92: Layer 3 of 9: Emphasize: In layer 3, draw a line after the recursive ones in the subnet mask.
  • #93: Layer 4 of 9: Emphasize: In layer 4, fill in zeros beyond the vertical line for the subnet.
  • #94: Layer 5 of 9: Emphasize: In layer 5, fill in ones beyond the vertical line for the broadcast address.
  • #95: Layer 6 of 9: Emphasize: In layer 6, fill in 0s beyond the vertical line except for the last bit. Make that bit a 1. This is the first usable host address.
  • #96: Layer 7 of 9: Emphasize: In layer 7, fill in 1s beyond the vertical line except for the last bit. Make that bit a 0. This is the last usable host address.
  • #97: Layer 8 of 9: Emphasize: In layer 8, copy the binary network and subnetwork address from the top row into the lower rows.
  • #98: Layer 9 of 9: Emphasize: In layer 9, convert binary back to dotted decimal.
  • #99: Purpose: This figure shows an example of a Class B network with a subnet.
  • #100: Purpose: This figure explains how to plan subnet numbers. Emphasize: What if this were a Class B address? How many bits would we have for subnetting then? Where do you want to draw the line now? Alternatives to review: Creating the subnet at the octet boundary is easier to work with—more host bits and more subnet bits. Explain that the decision is really a guess on how you think your network will grow—will it have more subnets or more hosts? RFC 1219 Mirroring: Mirroring hedges the subnetting decision by buying time. Do not use mirroring if you intend to use route summarization or variable-length subnet masking (VLSM); they are incompatible with mirroring.
  • #101: Purpose: This figure shows an example of a Class C network with a subnet. Emphasize: Contrast the Class C network subnet mask with the previous Class B example.