Network+ Guide to Networks, 5th Edition Chapter 10 In-depth TCP/IP Networking At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms 10-1 Network+ Guide to Networks, 5th Edition 10-2 Lecture Notes Overview In Chapter 4, students learned about core protocols and subprotocols in the TCP/IP protocol suite, addressing schemes, and host and domain naming. Students also learned that TCP/IP is a complex and highly customizable protocol suite. This chapter builds on these basic concepts, examining how TCP/IP-based networks are designed and analyzed. It also describes the services and applications that TCP/IP-based networks commonly support. Chapter Objectives After reading this chapter and completing the exercises, the student will be able to: Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation Explain the differences between public and private TCP/IP networks Describe protocols used between mail clients and mail servers, including SMTP, POP3, and IMAP4 Employ multiple TCP/IP utilities for network discovery and troubleshooting Teaching Tips Designing TCP/IP-Based Networks 1. Describe how most modern networks rely on the TCP/IP protocol suite. 2. Review TCP/IP fundamentals. 3. Note the two versions of IP. a. Explain why this discussion on IP addressing focuses on IPv4. 4. Review the IPv4 address expressions: a. Binary and dotted decimal 5. Remind students that many networks assign IP addresses and host names dynamically, using DHCP, rather than statically. 6. Review network classes. a. Emphasize that a node’s network class provides information about the segment or network to which the node belongs. Network+ Guide to Networks, 5th Edition 10-3 Subnetting 1. Define the term subnetting. 2. Discuss how networks are commonly subnetted. a. Geographic locations b. Departmental boundaries c. Technology types 3. Discuss three reasons why a network administrator might separate traffic. 4. Review IPv4 addressing conventions on a network that does not use subnetting. 5. Introduce and explain classful addressing in IPv4. 6. Remind students that all IPv4 addresses consist of network and host information. 7. Explain where the network information portion of an IPv4 address (the network ID) is located in classful addressing: a. First 8 bits in a Class A address b. First 16 bits in a Class B address c. First 24 bits in a Class C address 8. Explain where the host information portion of an IPv4 address is located in classful addressing: a. Last 24 bits for a Class A address b. Last 16 bits in a Class B address c. Last 8 bits in a Class C address 9. Use Figure 10-1 to illustrate examples of IPv4 addresses separated into network and host information according to the classful addressing convention. 10. Introduce and describe IPv4 subnet masks. 11. Use Table 10-1 to illustrate how each network class is associated with a default subnet mask. a. Remind students that an octet composed of all 1s in binary notation equals 255 in decimal notation and an octet composed of all 0s in binary notation equals 0 in decimal notation. 12. Define and explain the concept of ANDing. a. Explain how to calculate a host’s network ID given its IPv4 address and subnet mask. b. Use Table 10-2 to illustrate ANDing. c. Use Figure 10-2 to illustrate and example of calculating a host’s network ID. Network+ Guide to Networks, 5th Edition Teaching Tip 10-4 Point out that several online sites and operating systems provide calculators that calculate AND operations. Provide a class demonstration of the Windows operating system calculator by navigating to the Accessories area containing the calculator. Change the calculator view to scientific if necessary. Select “bin” for input and practice ANDing two binary numbers of various numeric contents and lengths. 13. Define and explain the concept of reserved addresses. a. Describe why the network ID is considered a reserved address. b. Describe why the broadcast address is considered a reserved address. c. Explain why only the numbers 1 through 254 can be used for host information in an IPv4 address. 14. Introduce and explain IPv4 subnetting techniques. a. Note that subnetting breaks the rules of classful IPv4 addressing. b. Describe how some of an IP address’s bits that in classful addressing would represent host information are changed to represent network information instead. c. Emphasize the consequence of subnetting in terms of the number of useable host addresses available per subnet. d. Use Table 10-3 to illustrate the numbers of subnets and hosts that can be created by subnetting a Class B network. e. Use Table 10-4 to illustrate the numbers of subnets and hosts that can be created by subnetting a Class C network. 15. Introduce the topic of calculating IPv4 subnets. a. Present and explain the formula for determining how to modify a default subnet mask. b. Walk though an example utilizing a leased Class C network with network ID of 199.34.89.0 and the need to divide it into six subnets. c. Use Table 10-5 to illustrate a listing of the network ID, broadcast address, and usable host addresses for each of the six subnets in the example Class C network. d. Point out that the extended network prefix for each subnet is based on which of the additional (borrowed) network information bits are set to equal 1. e. Point out that Class A, Class B, and Class C networks can all be subnetted; however, each class reserves a different number of bits for network information and each class has a different number of host information bits that can be used for subnet information. f. Explain how subnetting on a LAN affects LAN devices. g. Use Figure 10-3 to illustrate and explain a situation in which a LAN running IPv4 has been granted the Class C range of addresses that begin with 199.34.89. Network+ Guide to Networks, 5th Edition Teaching Tip 10-5 Point out that several Web sites provide excellent tools to assist network administrators in calculating subnet information. Provide a classroom demonstration by navigating to http://www.subnetmask.info to illustrate one such site. CIDR (Classless Interdomain Routing) 1. Introduce and explain CIDR (Classless Interdomain Routing). 2. Mention that it is sometimes called classless routing or supernetting. 3. Walk through an example of CIDR where a subnet boundary moves to the left. a. Emphasize that moving the subnet boundary to the left allows an administrator to use more bits for host information and, therefore, generate more usable IP addresses on the network. b. Mention that a subnet created by moving the subnet boundary to the left is known as a supernet. 4. Use Figure 10-4 to contrast examples of a Class C supernet mask with a subnet mask. a. In Figure 10-4, point out that 27 bits are used for network information in the subnet mask, whereas only 22 bits are used for network information in the supernet mask. 5. Walk through an example where an organization has leased the Class C range of IPv4 addresses that shares the network ID 199.34.89.0 and, because of growth in the company, the network administrator needs to increase the number of host addresses this network allows by default. a. Use Figure 10-5 to illustrate calculating a host’s network ID on a supernetted network. 6. Describe CIDR notation (or slash notation). 7. Define and describe a CIDR block. 8. Wrap up this topic by emphasizing that to take advantage of classless routing; a network’s routers must be able to interpret IP addresses that do not adhere to conventional network class parameters. a. Routers that rely on older routing protocols, such as RIP, are not capable of interpreting classless IP addresses. Teaching Tip Point out that CIDR is pronounced cider. Network+ Guide to Networks, 5th Edition 10-6 Internet Gateways 1. Define and explain a gateway. 2. Define the term default gateway. 3. Explain characteristics of default gateways. 4. Use Figure 10-6 to illustrate the use of default gateways. 5. Define and describe the advantages of a default router. 6. Describe two default gateway connections. 7. Note that routers used as gateway must maintain routing tables. 8. Describe the gateways that make up the Internet. 9. Define a core gateway. Teaching Tip Student may read more about “Using Internet Gateway Device Discovery and Control” at http://windowshelp.microsoft.com/Windows/en-US/help/670718ec7d51-49ed-87f1-b8a98ced11a41033.mspx. Address Translation 1. Define the term public network and provide examples. 2. Define the term private network and provide examples. 3. Explain how hiding IP addresses on private networks allows network managers more flexibility in assigning addresses. 4. Define the term NAT (Network Address Translation). 5. Describe reasons for using address translation. 6. Define and describe SNAT (Static Network Address Translation). 7. Use Figure 10-7 to illustrate SNAT. 8. Define and describe DNAT (Dynamic Network Address Translation). 9. Mention that DNAT is also called IP masquerading. 10. Define and describe PAT (Port Address Translation). Network+ Guide to Networks, 5th Edition 10-7 11. Use Figure 10-8 to illustrate an example of PAT usage. 12. Explain how the gateway might instead operate on a network host. 13. Describe how in Windows operating systems, ICS (Internet Connection Sharing) can be used to translate network addresses and allow clients to share an Internet connection. Teaching Tip Student may find a “Description of Internet Connection Sharing” at http://support.microsoft.com/kb/234815. Quick Quiz 1 1. True or False: DHCP may be used to assign IP addresses and host names dynamically. Answer: True 2. A node’s network ____ provides information about the segment or network to which the node belongs. a. frame b. location c. class d. routing table Answer: C 3. Subnetting separates a network into multiple logically defined segments, or ____________________. Answer: subnets 4. True or False: Subnet masks are only used in IPv4 classful addressing. Answer: False 5. A broadcast address is known as a(n) ____ address for a network or segment. a. reserved b. default c. open d. informative Answer: A 6. True or False: In CIDR, conventional network class distinctions exist. Answer: False TCP/IP Mail Services 1. Explain why a student needs to understand how mail services work. Network+ Guide to Networks, 5th Edition 10-8 2. Point out that all Internet mail services rely on the same principles of mail delivery, storage, and pickup, though they may use different types of software to accomplish these functions. 3. Explain the function of mail servers. 4. Explain the function of mail clients. 5. Emphasize that e-mail servers and clients communicate through special TCP/IP Application layer protocols. SMTP (Simple Mail Transfer Protocol) 1. Define and describe SMTP. 2. Point out that SMTP transports mail and holds it in a queue. 3. Mention that in Internet e-mail transmission, higher-level mail protocols such as POP and IMAP may attempt to figure out what went wrong with an undeliverable message. 4. Describe how to configure a client to use SMPT. Teaching Student may find more information on SMTP at http://www.cisco.com/en/US/docs/ios/sw_upgrades/interlink/r2_0/user/ugsmtp.html. Tip MIME (Multipurpose Internet Mail Extensions) 1. Explain the drawbacks of SMPT. 2. Define and describe MIME as a solution to the 1000 ASCII characters limit. a. Note that MIME is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message. b. Point out that MIME identifies each element of a mail message according to content type. c. Mention that MIME encodes different content types so that SMTP is fooled into thinking it is transporting an ASCII message stream. 3. Emphasize that MIME does not replace SMTP, but works in conjunction with it. 4. Note that most modern e-mail clients and servers support MIME. POP (Post Office Protocol) 1. Define and describe POP. 2. Note the most current version. Network+ Guide to Networks, 5th Edition 10-9 3. Describe how POP3 mail is stored and delivered. 4. Describe the advantages of using POP3. 5. Emphasize that mail is deleted from the server after it is downloaded. a. Explain why this can be troublesome for mobile users. IMAP (Internet Message Access Protocol) 1. Point out that IMAP is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3. 2. Describe the advantages of IMAP. 3. Describe the features of IMAP. 4. Describe the disadvantages of IMAP. Teaching Tip Students may find more information on how e-mail works at http://communication.howstuffworks.com/email.htm. Additional TCP/IP Utilities 1. Note that there are many points of failure in a TCP transmission. 2. Explain how TCP/IP attempts to help an administrator track down most TCP/IP-related problems without using expensive software or hardware to analyze network traffic. 3. Emphasize why students should be familiar with TCP/IP diagnostic tools. 4. Review the Telnet, ARP, and ping utilities from Chapter 4. 5. Explain the benefits of the command prompt in accessing TCP/IP utilities. 6. Note that utility command syntax may differ, depending on the client’s operating system. Ipconfig 1. Define and explain the ipconfig utility. a. Review the command switches. b. Note that this command operates with Windows-based systems. Network+ Guide to Networks, 5th Edition 10-10 2. Use Figure 10-9 to illustrate the output of an ipconfig command on a Windows Vista workstation. Teaching Tip Students may find more information on the syntax and options for using the ipconfig diagnostic utility for network connections at http://support.microsoft.com/kb/314850. Ifconfig 1. Define and explain the ifconfig utility. a. Review the command switches. b. Note that ifconfig is the UNIX and Linux version of ipconfig. 2. Use Figure 10-10 to illustrate detailed information available through ifconfig. Teaching Tip Students may find more information on the syntax and options for the ifconfig command at http://docs.sun.com/app/docs/doc/816-4554/ipconfig-141?a=view. Netstat 1. Define and explain the netstat utility. a. Review the command switches. 2. Use Figure 10-11 to illustrate detailed output of a netstat –a command. Teaching Tip Students may read information on adding a GUI front end to the netstat command line utility at http://articles.techrepublic.com.com/5100-10878_11-5149569.html. Nbtstat 1. Define and explain the nbtstat utility. a. Note that nbtstat is useful only on networks that run Windows-based operating systems and NetBIOS. b. Review the command switches. Teaching Tip Students may find more information on nbtstat at http://technet.microsoft.com/enus/library/cc940106.aspx Network+ Guide to Networks, 5th Edition 10-11 Hostname, Host, and Nslookup 1. Define and explain the hostname utility. a. Note that the hostname utility is useful a computer running the Windows, UNIX, or Linux operating systems. 2. Define and explain the host utility. a. Note that Windows requires a third-party version of host. 3. Define and explain the nslookup utility. a. Note that this utility is useful in troubleshooting DNS resolution problems. b. Use Figure 10-12 to illustrate the result of running a simple nslookup command at a Linux shell prompt. c. Review how to get help with the nslookup command switches. Dig 1. Define and explain the dig utility. a. Compare the dig command to the nslookup command. b. Mention that dig is useful for helping network administrators diagnose DNS problems. c. Point out that the dig utility is included with UNIX and Linux operating systems. d. Mention that for Windows-based operating system, an administrator must obtain the code for the dig utility from a third party and install it on your system. 2. Use Figure 10-13 to illustrate the output of a simple dig command. Whois 1. Review the basic steps that occur when a domain name is registered with ICAN. 2. Define and explain the whois utility. a. Mention that whois utility is helpful in troubleshooting network problems. b. Review the command syntax. c. Mention that there are Web-based interfaces for running the whois command Teaching Tip Demonstrate the use of the Whois command by navigating to http://www.networksolutions.com/whois/index.jsp. Search for various organizations. Traceroute (Tracert) 1. Define and explain the traceroute utility. Network+ Guide to Networks, 5th Edition 10-12 a. Note that the utility is known as tracert on Windows-based systems and tracepath on some Linux systems. b. Walk through the steps traceroute takes to trace the path from one networked node to another. c. Describe the simplest form of the traceroute command. 2. Use Figure 10-14 to illustrate output of a traceroute command. 3. Review popular switches. Mtr (my traceroute) 1. Define and explain the mtr utility. a. Mention that it comes with UNIX and Linux operating systems. b. Emphasis that the mtr utility combines the functions of the ping and traceroute utilities and delivers an easy-to-read chart as its output. c. Describe the simplest form of the mtr command. d. Describe some popular MTR utility switches. 2. Use Figure 10-15 to illustrate the output of the command mtr –c 100 –r www.cengage.com 3. Describe a program similar to mtr, pathping, which is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008. Route 1. Define and explain the route utility. a. Describe the route command syntax for various operating systems and Ciscobrand routers. 2. Use Figure 10-16 to illustrate an example of a routing table. 3. Use Table 10-6 to explain the fields belonging to routing tables on UNIX or Linux systems. 4. Review some options available for use with the route command. 5. Describe how to get help with route command options. Quick Quiz 2 1. True or False: MIME is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message. Answer: True Network+ Guide to Networks, 5th Edition 10-13 2. True or False: The MIME standard replaces SMTP. Answer: False 3. ____________________ is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3. Answer: MAP (Internet Message Access Protocol), Internet Message Access Protocol, IMAP 4. True or False: The ipconfig utility is the TCP/IP configuration and management utility used on UNIX and Linux systems. Answer: False 5. ____ combines the functions of the ping and traceroute utilities a. Tracert b. Mtr c. Whois d. Route Answer: B Class Discussion Topics 1. Discuss the benefits of subnetting. 2. Discuss why IMAP is preferred over POP3. Additional Projects 1. Have the student research their favorite e-mail service. The students should determine which Application layer protocols the e-mail system supports (SMTP, MIME, POP, POP3, IMAP, etc.) and write a report on their findings. The report should also include a description of the protocol set-up or configurations, if applicable. 2. Have student select five random companies, and issue the whois and traceroute commands for each one. The student should prepare a report describing the results. Require the use of screen shots to back up the reported findings. Additional Resources 1. ARIN https://www.arin.net/ 2. SMTP http://www.cisco.com/en/US/docs/ios/sw_upgrades/interlink/r2_0/user/ugsmtp.html Network+ Guide to Networks, 5th Edition 10-14 3. IMAP http://www.imap.org 4. RFC 1009 Requirements for Internet Gateways (Historic) http://tools.ietf.org/html/rfc1009 5. RFC 5034 The Post Office Protocol (POP3) http://tools.ietf.org/html/rfc5034 Key Terms ANDing - A logical process of combining bits. In ANDing, a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0. CIDR (Classless Interdomain Routing) - An IP addressing and subnetting method in which network and host information is manipulated without adhering to the limitations imposed by traditional network class distinctions. CIDR is also known as classless routing or supernetting. Older routing protocols, such as RIP, are not capable of interpreting CIDR addressing schemes. CIDR block - In CIDR notation, the number of bits used for an extended network prefix. For example, the CIDR block for 199.34.89.0/22 is /22. CIDR notation - In CIDR, a method of denoting network IDs and their subnet boundaries. Slash notation takes the form of the network ID followed by a slash ( / ), followed by the number of bits that are used for the extended network prefix. classful addressing - An IP addressing convention that adheres to network class distinctions, in which the first 8 bits of a Class A address, the first 16 bits of a Class B address, and the first 24 bits of a Class C address are used for network information. Classless Interdomain Routing - See CIDR. classless routing - See CIDR. core gateway - A gateway that operates on the Internet backbone. default gateway - The gateway that first interprets a device’s outbound requests, and then interprets its inbound requests to and from other subnets. In a Postal Service analogy, the default gateway is similar to a local post office. default router - See default gateway. dig (domain information groper) - A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility, but provides more information, even in its simplest form, than nslookup can. DNAT (Dynamic Network Address Translation) - A type of address translation in which a limited pool of Internet-valid IP addresses is shared by multiple private network hosts. domain information groper - See dig. Dynamic Network Address Translation - See DNAT extended network prefix - The combination of an IP address’s network ID and subnet information. By interpreting the address’s extended network prefix, a device can determine the subnet to which an address belongs. host - A TCP/IP utility that at its simplest returns either the IP address of a host if its host name is specified or its host name if its IP address is specified. hostname - A TCP/IP utility used to show or modify a client’s host name. ICS (Internet Connection Sharing) - A service provided with Windows 98, Me, 2000 and 32bit versions of XP operating systems that allows one computer, the ICS host, to share its Internet connection with other computers on the same network. Network+ Guide to Networks, 5th Edition 10-15 ICS host - On a network using the Microsoft Internet Connection Sharing service, the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN. IMAP (Internet Message Access Protocol) - A mail retrieval protocol that improves on the shortcomings of POP. The single biggest advantage IMAP4 has relative to POP is that it allows users to store messages on the mail server, rather than always having to download them to the local machine. The most current version of IMAP is version 4 (IMAP4). IMAP4 (Internet Message Access Protocol, version 4) - The most commonly used form of the Internet Message Access Protocol (IMAP). Internet Connection Sharing - See ICS. Internet Message Access Protocol - See IMAP. Internet Message Access Protocol, version 4 - See IMAP4. IP masquerading - See DNAT. MIME (Multipurpose Internet Mail Extensions) - A standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message. mtr (my traceroute) - A route discovery and analysis utility that comes with UNIX and Linux operating systems. Mtr combines the functions of the ping and traceroute commands and delivers an easily readable chart as its output. Multipurpose Internet Mail Extensions - See MIME. NAT (Network Address Translation) - A technique in which IP addresses used on a private network are assigned a public IP address by a gateway when accessing a public network. nbtstat - A TCP/IP troubleshooting utility that provides information about NetBIOS names and their addresses. If you know the NetBIOS name of a workstation, you can use nbtstat to determine its IP address. NetBIOS - A protocol that runs in the Session and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network layer information. However, when encapsulated in another protocol such as TCP/IP, it can be routed. netstat - A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the correct ports. Network Address Translation - See NAT. network number - See network ID. network prefix - See network ID. nslookup - A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address, or vice versa. This ability is useful for verifying that a host is configured correctly and for troubleshooting DNS resolution problems. PAT (Port Address Translation) - A form of address translation that uses TCP port numbers to distinguish each client’s transmission, thus allowing multiple clients to share a limited number of Internet-recognized IP addresses. pathping - A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX’s mtr command) and comes with Windows XP, Vista, and Windows Server 2003 and Server 2008. POP (Post Office Protocol) - An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP, messages previously stored on the mail server are downloaded to the client’s workstation, and then deleted from the mail server. POP3 (Post Office Protocol, version 3) - The most commonly used form of the Post Office Protocol. Port Address Translation - See PAT. Post Office Protocol - See POP. Post Office Protocol, version 3 - See POP3. private network - A network whose access is restricted to only clients or machines with proper credentials. Network+ Guide to Networks, 5th Edition 10-16 public network - A network that any user can access with no restrictions. The most familiar example of a public network is the Internet. route - A utility for viewing or modifying a host’s routing table. Simple Mail Transfer Protocol - See SMTP. slash notation - See CIDR notation. SMTP (Simple Mail Transfer Protocol) - The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another. SNAT (Static Network Address Translation) - A type of address translation in which each private IP address is correlated with its own Internet-recognized IP address. Static Network Address Translation - See SNAT. supernet - A type of subnet that is created using bits that normally would be reserved for network class information - by moving the subnet boundary to the left. supernet mask - A 32-bit number that, when combined with a device’s IP address, indicates the kind of supernet to which the device belongs. supernetting - See CIDR. tracepath - A version of the traceroute utility found on some Linux distributions. traceroute (tracert) - A TCP/IP troubleshooting utility that uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows-based systems, the utility is known as tracert. whois - The utility that allows you to query ICANN’s DNS registration database and find information about a domain.