SlideShare a Scribd company logo
Introduction to Networks v5.1
Chapter 7:
IP Addressing
Jupriyadi
Juli 2020
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
7.0 Introduction
7.1 IPv4 Network Addresses
7.2 IPv6 Network Addresses
7.3 Connectivity Verification
7.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Convert between binary and decimal numbering systems.
• Describe the structure of an IPv4 address including the network portion, the host
portion, and the subnet mask.
• Compare the characteristics and uses of the unicast, broadcast, and multicast
IPv4 addresses.
• Explain public, private, and reserved IPv4 addresses.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Dotted Decimal Address
Octets
32-Bit Address
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Decimal Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Applying Decimal Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Binary Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Applying Binary Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
To convert a binary IPv4 address to its dotted decimal equivalent:
• Divide the IPv4 address into four 8-bit octets. Apply the binary positional
value to the first octet binary number and calculate accordingly.
• Repeat for each octet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
The following illustrates how to use the binary positional value
table to convert decimal to binary.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Continue to evaluate the decimal until all positional
values have been entered, which results in the
equivalent binary value.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
See VIDEO DEMONSTRATION
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
One portion of the 32 bit IPv4 address identifies the network, and another
portion identifies the host.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
• Comparing the IP Address and the Subnet Mask
• The 1s in the subnet mask identify the network portion while the
0s identify the host portion.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
• Logical AND is the comparison of two bits.
• ANDing between the IP address and the
subnet mask yields the network address.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
• Shorthand method of identifying a subnet mask.
• It is the number of bits set to 1 in the subnet mask.
• Written in “slash notation”, a “/” followed by the number of bits
set to 1.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
See VIDEO DEMONSTRATION
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Unicast
Broadcast
Multicast
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
• Unicast communication is used for normal host-to-host
communication.
• The unicast address applied to an
end device is referred to as the host
address.
• The source address of any packet is
always the unicast address of the
originating host.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
• A host sends a single packet to a selected set of hosts that
subscribe to a multicast group.
• The 224.0.0.0 to 239.255.255.255 range of addresses are
reserved for multicast.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Private Addresses:
• 10.0.0.0/8 or 10.0.0.0 to10.255.255.255
• 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
• 192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
• Loopback addresses
127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254
• Link-Local addresses or Automatic Private IP Addressing (APIPA) addresses
169.254.0.0 /16 or
169.254.0.1 to 169.254.255.254
• TEST-NET addresses
192.0.2.0/24 or 192.0.2.0
to 192.0.2.255
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
• Formal name is Classless Inter-Domain Routing (CIDR, pronounced
“cider”).
• Created a new set of standards that allowed service providers to
allocate IPv4 addresses on any address bit boundary (prefix length)
instead of only by a class A, B, or C address.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Upon completion of this section, you should be able to:
• Explain the need for IPv6 addressing.
• Describe the representation of an IPv6 address.
• Describe types of IPv6 network addresses.
• Configure global unicast addresses.
• Describe multicast addresses.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 47
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
• The migration techniques can be divided into three categories: Dual
Tack, Tunneling, and Translation.
• Dual-stack allows IPv4 and IPv6 to coexist on the same network.
Devices run both IPv4 and IPv6 protocol stacks simultaneously.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
• Tunneling is a method of transporting an IPv6 packet over an
IPv4 network. The IPv6 packet is encapsulated inside an IPv4
packet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
• Translation: Network Address Translation 64 (NAT64) allows
IPv6-enabled devices to communicate with IPv4-enabled devices
using a translation technique similar to NAT for IPv4. An IPv6
packet is translated to an IPv4 packet, and vice versa.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Hextets – 4 Hexadecimal digits = 16 binary digits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
(cont.)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
(cont.)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Example 1
Example 2
Example 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Example 1
Example 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Example 3
Example 4
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 59
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
There are three types of IPv6 addresses:
• Unicast
• Multicast
• Anycast
Note: IPv6 does not have broadcast addresses.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
• IPv6 does not use the dotted-decimal subnet mask notation.
• Prefix length indicates the network portion of an IPv6 address using the
following format:
o IPv6 address /prefix length
o Prefix length can range from 0 to 128
o Typical prefix length is /64
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Uses of an IPv6 Link-local address
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 65
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Reading a Global Unicast Address
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
EUI-64 Process
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
EUI-64 Process 
Randomly Generated Interface ID
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 81
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
• IPv6 multicast addresses have the prefix FF00::/8.
• There are two types of IPv6 multicast addresses:
o Assigned multicast
o Solicited node multicast
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Upon completion of this section, you should be able to:
• Explain how ICMP is used to test network connectivity.
• Use ping and traceroute utilities to test network connectivity.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 85
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
• ICMP messages common to both ICMPv4 and ICMPv6 include:
o Host confirmation
o Destination or service unreachable
o Time exceeded
o Route redirection
• Although IP is not a reliable protocol, the TCP/IP suite provides
for messages to be sent in the event of certain errors. They are
sent using the services of ICMP.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 93
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Chapter Objectives:
• Explain the use of IPv4 addresses to provide connectivity in a small to
medium-sized business network.
• Configure IPv6 addresses to provide connectivity in small to medium-
sized business networks.
• Use common testing utilities to verify network connectivity.
Thank you.

More Related Content

PDF
It nv51 instructor_ppt_ch5
PDF
It nv51 instructor_ppt_ch6
PDF
It nv51 instructor_ppt_ch8
PDF
It nv51 instructor_ppt_ch9
PPTX
Dynamic Host Configuration Protocol
PPTX
Ccna rse chp2
PPTX
CCNA v6.0 ITN - Chapter 07
PPTX
CCNA v6.0 ITN - Chapter 05
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch9
Dynamic Host Configuration Protocol
Ccna rse chp2
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 05

What's hot (20)

PPTX
Ccna rse chp9 nat fo i_pv4
PPTX
CCNA v6.0 ITN - Chapter 09
PPTX
CCNA3 Verson6 Chapter2
PPTX
CCNA4 Verson6 Chapter3
PDF
EIGRP
PDF
It nv51 instructor_ppt_ch10
PPTX
CCNA2 Verson6 Chapter2
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
PDF
Ccna rse chp6 VLAN
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 7
PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
CCNA3 Verson6 Chapter6
PPTX
CCNA3 Verson6 Chapter9
PDF
CCNA RSE Routing concept
PDF
Routing Security - its importance and status in South Asia
PDF
Ccna rse chp7 Access Control List (ACL)
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Ccna rse chp9 nat fo i_pv4
CCNA v6.0 ITN - Chapter 09
CCNA3 Verson6 Chapter2
CCNA4 Verson6 Chapter3
EIGRP
It nv51 instructor_ppt_ch10
CCNA2 Verson6 Chapter2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
Ccna rse chp6 VLAN
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA v6.0 ITN - Chapter 10
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter9
CCNA RSE Routing concept
Routing Security - its importance and status in South Asia
Ccna rse chp7 Access Control List (ACL)
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Ad

Similar to It nv51 instructor_ppt_ch7 (20)

PDF
I pv6 addressing
PPT
Addressing the Network – IPv4
PPTX
Ccna v5-S1-Chapter 8
PPTX
IPv6 Addressing
PPTX
CCNA RS_NB - Chapter 7
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 8
PDF
IP_Addressing_and Subnetting.pdf
PPT
CCNA Exploration 1 - Chapter 6
PPTX
CNET146+ITN_Module_12+-+IPv6+Addressing.pptx
PPT
Exploration network chapter6
PPTX
CCNA RS_ITN - Chapter 8
PPTX
8-Lect_8 Addressing the Network.tcp.pptx
PDF
07_IP_Addressing.pdf
PDF
07_IP_Addressing ayudaok.pdf
PPTX
ITN_Module_12.pptx
PDF
subneting-cnnnnnnnnccccccccccccccccc.pdf
PPTX
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
PPT
Ex 1 chapter06-i-pv4-tony_chen
PDF
CCNAv5 - S1: Chapter 8 - Ip Addressing
PPTX
Chapter 8 : IP addressing
I pv6 addressing
Addressing the Network – IPv4
Ccna v5-S1-Chapter 8
IPv6 Addressing
CCNA RS_NB - Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 8
IP_Addressing_and Subnetting.pdf
CCNA Exploration 1 - Chapter 6
CNET146+ITN_Module_12+-+IPv6+Addressing.pptx
Exploration network chapter6
CCNA RS_ITN - Chapter 8
8-Lect_8 Addressing the Network.tcp.pptx
07_IP_Addressing.pdf
07_IP_Addressing ayudaok.pdf
ITN_Module_12.pptx
subneting-cnnnnnnnnccccccccccccccccc.pdf
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
Ex 1 chapter06-i-pv4-tony_chen
CCNAv5 - S1: Chapter 8 - Ip Addressing
Chapter 8 : IP addressing
Ad

More from newbie2019 (20)

PDF
Digital forensic principles and procedure
PDF
Fundamental digital forensik
PDF
Pendahuluan it forensik
PDF
Chapter 15 incident handling
PDF
Chapter 14 sql injection
PDF
Chapter 13 web security
PDF
NIST Framework for Information System
PDF
Nist.sp.800 37r2
PDF
Chapter 12 iso 27001 awareness
PDF
Chapter 10 security standart
PDF
Chapter 8 cryptography lanjutan
PDF
Pertemuan 7 cryptography
PDF
Chapter 6 information hiding (steganography)
PDF
Vulnerability threat and attack
PDF
Chapter 4 vulnerability threat and attack
PDF
PDF
Chapter 3 security principals
PDF
Chapter 2 konsep dasar keamanan
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
PDF
Chapter 1 introduction
Digital forensic principles and procedure
Fundamental digital forensik
Pendahuluan it forensik
Chapter 15 incident handling
Chapter 14 sql injection
Chapter 13 web security
NIST Framework for Information System
Nist.sp.800 37r2
Chapter 12 iso 27001 awareness
Chapter 10 security standart
Chapter 8 cryptography lanjutan
Pertemuan 7 cryptography
Chapter 6 information hiding (steganography)
Vulnerability threat and attack
Chapter 4 vulnerability threat and attack
Chapter 3 security principals
Chapter 2 konsep dasar keamanan
Fundamentals of information systems security ( pdf drive ) chapter 1
Chapter 1 introduction

Recently uploaded (20)

PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Cell Types and Its function , kingdom of life
PDF
Computing-Curriculum for Schools in Ghana
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
A systematic review of self-coping strategies used by university students to ...
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Supply Chain Operations Speaking Notes -ICLT Program
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Weekly quiz Compilation Jan -July 25.pdf
Digestion and Absorption of Carbohydrates, Proteina and Fats
UNIT III MENTAL HEALTH NURSING ASSESSMENT
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Cell Types and Its function , kingdom of life
Computing-Curriculum for Schools in Ghana
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
RMMM.pdf make it easy to upload and study
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Final Presentation General Medicine 03-08-2024.pptx
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx

It nv51 instructor_ppt_ch7

  • 1. Introduction to Networks v5.1 Chapter 7: IP Addressing Jupriyadi Juli 2020
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 7.0 Introduction 7.1 IPv4 Network Addresses 7.2 IPv6 Network Addresses 7.3 Connectivity Verification 7.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Convert between binary and decimal numbering systems. • Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask. • Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses. • Explain public, private, and reserved IPv4 addresses.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Dotted Decimal Address Octets 32-Bit Address
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Decimal Positional Notation
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Applying Decimal Positional Notation
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Binary Positional Notation
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Applying Binary Positional Notation
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 To convert a binary IPv4 address to its dotted decimal equivalent: • Divide the IPv4 address into four 8-bit octets. Apply the binary positional value to the first octet binary number and calculate accordingly. • Repeat for each octet.
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 The following illustrates how to use the binary positional value table to convert decimal to binary.
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Continue to evaluate the decimal until all positional values have been entered, which results in the equivalent binary value.
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 See VIDEO DEMONSTRATION
  • 22. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 One portion of the 32 bit IPv4 address identifies the network, and another portion identifies the host.
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 • Comparing the IP Address and the Subnet Mask • The 1s in the subnet mask identify the network portion while the 0s identify the host portion.
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 • Logical AND is the comparison of two bits. • ANDing between the IP address and the subnet mask yields the network address.
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 • Shorthand method of identifying a subnet mask. • It is the number of bits set to 1 in the subnet mask. • Written in “slash notation”, a “/” followed by the number of bits set to 1.
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 See VIDEO DEMONSTRATION
  • 33. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 Unicast Broadcast Multicast
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 • Unicast communication is used for normal host-to-host communication. • The unicast address applied to an end device is referred to as the host address. • The source address of any packet is always the unicast address of the originating host.
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 • A host sends a single packet to a selected set of hosts that subscribe to a multicast group. • The 224.0.0.0 to 239.255.255.255 range of addresses are reserved for multicast.
  • 40. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 40
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 Private Addresses: • 10.0.0.0/8 or 10.0.0.0 to10.255.255.255 • 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255 • 192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42 • Loopback addresses 127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254 • Link-Local addresses or Automatic Private IP Addressing (APIPA) addresses 169.254.0.0 /16 or 169.254.0.1 to 169.254.255.254 • TEST-NET addresses 192.0.2.0/24 or 192.0.2.0 to 192.0.2.255
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44 • Formal name is Classless Inter-Domain Routing (CIDR, pronounced “cider”). • Created a new set of standards that allowed service providers to allocate IPv4 addresses on any address bit boundary (prefix length) instead of only by a class A, B, or C address.
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46 Upon completion of this section, you should be able to: • Explain the need for IPv6 addressing. • Describe the representation of an IPv6 address. • Describe types of IPv6 network addresses. • Configure global unicast addresses. • Describe multicast addresses.
  • 47. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 47
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49 • The migration techniques can be divided into three categories: Dual Tack, Tunneling, and Translation. • Dual-stack allows IPv4 and IPv6 to coexist on the same network. Devices run both IPv4 and IPv6 protocol stacks simultaneously.
  • 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50 • Tunneling is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet.
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51 • Translation: Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. An IPv6 packet is translated to an IPv4 packet, and vice versa.
  • 52. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
  • 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53 Hextets – 4 Hexadecimal digits = 16 binary digits
  • 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54 (cont.)
  • 55. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55 (cont.)
  • 56. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56 Example 1 Example 2 Example 3
  • 57. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57 Example 1 Example 2
  • 58. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58 Example 3 Example 4
  • 59. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 59
  • 60. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60 There are three types of IPv6 addresses: • Unicast • Multicast • Anycast Note: IPv6 does not have broadcast addresses.
  • 61. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61 • IPv6 does not use the dotted-decimal subnet mask notation. • Prefix length indicates the network portion of an IPv6 address using the following format: o IPv6 address /prefix length o Prefix length can range from 0 to 128 o Typical prefix length is /64
  • 62. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
  • 63. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
  • 64. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64 Uses of an IPv6 Link-local address
  • 65. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 65
  • 66. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
  • 67. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67 Reading a Global Unicast Address
  • 68. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
  • 69. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
  • 70. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
  • 71. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
  • 72. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
  • 73. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
  • 74. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74 EUI-64 Process
  • 75. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75 EUI-64 Process  Randomly Generated Interface ID
  • 76. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
  • 77. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
  • 78. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
  • 79. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
  • 80. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
  • 81. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 81
  • 82. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82 • IPv6 multicast addresses have the prefix FF00::/8. • There are two types of IPv6 multicast addresses: o Assigned multicast o Solicited node multicast
  • 83. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
  • 84. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84 Upon completion of this section, you should be able to: • Explain how ICMP is used to test network connectivity. • Use ping and traceroute utilities to test network connectivity.
  • 85. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 85
  • 86. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
  • 87. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87 • ICMP messages common to both ICMPv4 and ICMPv6 include: o Host confirmation o Destination or service unreachable o Time exceeded o Route redirection • Although IP is not a reliable protocol, the TCP/IP suite provides for messages to be sent in the event of certain errors. They are sent using the services of ICMP.
  • 88. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
  • 89. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
  • 90. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
  • 91. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
  • 92. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
  • 93. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 93
  • 94. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
  • 95. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
  • 96. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
  • 97. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
  • 98. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 98 Chapter Objectives: • Explain the use of IPv4 addresses to provide connectivity in a small to medium-sized business network. • Configure IPv6 addresses to provide connectivity in small to medium- sized business networks. • Use common testing utilities to verify network connectivity.