Module 10 Review

advertisement
Sem1 - Module 10
Routing Fundamentals and Subnets
Review
Routable and routed protocols:
A protocol is a set of rules that determines how computers communicate
with each other across networks.
A protocol describes the following:
– The format that a message must conform to
– The way in which computers must exchange a message within
the context of a particular activity
A routed protocol allows the router to forward data between nodes on
different networks.
Routed Protocols:
–
–
–
–
–
–
–
IP (Internet Protocol)
IPX/SPX
AppleTalk
DECnet
AppleTalk
Banyan VINES
Xerox Network Systems (XNS)
IP as a routed protocol:
encapsulation
Routable and routed protocols:
As a packet travels through an internetwork to
its final destination, the Layer 2 frame headers
and trailers are removed and replaced at every
Layer 3 device.
This is because Layer 2 data units, frames, are
for local addressing.
Layer 3 data units, packets, are for end-to-end
addressing.
encapsulation
de-encapsulation
Routable and routed protocols:
As a frame is received at a router interface, the destination MAC
address is extracted.
The address is checked to see if the frame is directly addressed to the
router interface, or if it is a broadcast.
In either of these two cases, the frame is accepted. Otherwise, the
frame is discarded since it is destined for another device on the
collision domain.
The accepted frame has the Cyclic Redundancy Check (CRC)
information extracted from the frame trailer, and calculated to verify that
the frame data is without error.
If the check fails, the frame is discarded. If the check is valid, the frame
header and trailer are removed and the packet is passed up to Layer 3.
The packet is then checked to see if it is actually destined for the router,
or if it is to be routed to another device in the internetwork.
If the destination IP address matches one of the router ports, the Layer
3 header is removed and the data is passed up to the Layer 4.
Routable and routed protocols:
Some protocols, such as IPX, require only a network number because
these protocols use the host's MAC address for the host number.
Other protocols, such as IP, require a complete address consisting of a
network portion and a host portion.
These protocols also require a network mask in order to differentiate
the two numbers.
The network address is obtained by ANDing the address with the
network mask.
Consider following address & SNM:
192.168.25.79/27:
192.168.25.79 255.255.255.224
IP:
11000000. 10101000.00011001.01001111
SNM:
11111111.11111111.11111111.11100000
SubNet Addr:
11000000. 10101000.00011001.01000000
192.168.25.64 (Subnet for the IP 192.168.25.79/27)
Anatomy of an IP packet:
The IP header consists of the following:
Version – Indicates the version of IP currently used; four bits. If the
version field is different than the IP version of the receiving device, that
device will reject the packets.
IP header length (HLEN) – Indicates the datagram header length in
32-bit words. This is the total length of all header information,
accounting for the two variable-length header fields.
Total length – Specifies the length of the entire packet in bytes,
including data and header, 16 bits. To get the length of the data
payload subtract the HLEN from the total length.
Anatomy of an IP packet:
The IP header consists of the following:
Flags – A three-bit field in which the two low-order bits control
fragmentation. One bit specifies whether the packet can be
fragmented, and the other specifies whether the packet is the last
fragment in a series of fragmented packets.
Time-to-live (TTL) – A field that specifies the number of hops a packet
may travel. This number is decreased by one as the packet travels
through a router. When the counter reaches zero the packet is
discarded. This prevents packets from looping endlessly.
Protocol – indicates which upper-layer protocol, such as TCP or UDP,
receives incoming packets after IP processing has been completed,
eight bits.
Header checksum – helps ensure IP header integrity, 16 bits.
Anatomy of an IP packet:
The IP header consists of the following:
Source address – specifies the sending node IP address, 32 bits.
Destination address – specifies the receiving node IP address, 32
bits.
Padding – extra zeros are added to this field to ensure that the IP
header is always a multiple of 32 bits.
Data – contains upper-layer information, variable length up to 64 Kb.
Routing:
Routing is an OSI Layer 3 function.
The following are the two key functions of a router:
– Routers must maintain routing tables and make sure
other routers know of changes in the network topology.
This function is performed using a routing protocol to
communicate network information with other routers.
– When packets arrive at an interface, the router must use
the routing table to determine where to send them. The
router switches the packets to the appropriate interface,
adds the necessary framing information for the interface,
and then transmits the frame.
A router is a network layer device that uses one or more
routing metrics to determine the optimal path along which
network traffic should be forwarded.
Routing:
Routing metrics are values used in determining the advantage
of one route over another.
Routing protocols use various combinations of metrics for
determining the best path for data.
Routed protocols transport data across a network.
Routing protocols allow routers to choose the best path for
data from source to destination.
A routing protocol functions includes the following:
Provides processes for sharing route information
Allows routers to communicate with other routers to update
and maintain the routing tables
Routing algorithms and metrics:
Metrics can be based on a single characteristic of a path, or
can be calculated based on several characteristics. The
following are the metrics that are most commonly used by
routing protocols:
Hop count:
The number of routers that a packet must travel through
before reaching its destination. Each router the data must
pass through is equal to one hop. A path that has a hop
count of four indicates that data traveling along that path
would have to pass through four routers before reaching its
final destination. If multiple paths are available to a
destination, the path with the least number of hops is
preferred.
Routing algorithms and metrics:
Bandwidth:
The data capacity of a link. Normally, a 10-Mbps Ethernet link is
preferable to a 64-kbps leased line.
Delay:
The length of time required to move a packet along each link from
source to destination. Delay depends on the bandwidth of intermediate
links, the amount of data that can be temporarily stored at each router,
network congestion, and physical distance.
Load:
The amount of activity on a network resource such as a router or a link.
Reliability:
Usually a reference to the error rate of each network link.
Routing Protocols:
Two families of routing protocols are Interior Gateway
Protocols (IGPs) and Exterior Gateway Protocols (EGPs).
IGPs can be further categorized as either distance-vector or
link-state protocols.
Examples of distance-vector protocols include the following:
• Routing Information Protocol (RIP) – The most common
IGP in the Internet, RIP uses hop count as its only routing
metric.
• Interior Gateway Routing Protocol (IGRP) – This IGP
was developed by Cisco to address issues associated with
routing in large networks.
• Enhanced IGRP (EIGRP) – This Cisco-proprietary IGP
includes many of the features of a link-state routing
protocol. Because of this, it has been called a balancedhybrid protocol, but it is really an advanced distance-vector
routing protocol.
Link-state Routing Protocols:
Link-state routing protocols were designed to overcome
limitations of distance vector routing protocols.
Link-state routing protocols respond quickly to network
changes sending trigger updates only when a network
change has occurred.
Link-state routing protocols send periodic updates, known
as link-state refreshes, at longer time intervals, such as
every 30 minutes.
Link-State Routing Protocols:
–IS-IS (Intermediate System-to-Intermediate System )
–OSPF (Open Shortest Path First)
Routing versus switching:
Routing and switching might seem to perform the same function to the
inexperienced observer.
The primary difference is that switching occurs at Layer 2, the data link
layer, of the OSI model and routing occurs at Layer 3.
This distinction means routing and switching use different information in
the process of moving data from source to destination.
Router vs Switches:
Another difference between switched and routed networks is
switched networks do not block broadcasts.
As a result, switches can be overwhelmed by broadcast
storms.
Routers block LAN broadcasts, so a broadcast storm only
affects the broadcast domain from which it originated.
Because routers block broadcasts, routers also provide a
higher level of security and bandwidth control than switches.
Benefits of Subnetting:
• More efficient use of IPs
• Increased address flexibility
• Segments Broadcast domains (smaller)
– Small amount of security
IPs & Subnetting:
For each of the following IPs:
– 172.17.2.175/26
– 101.100.10.89/25
– 219.199.101.140/28
Identify the following:
–
–
–
–
–
–
–
–
–
Class
Subnet Mask
# SN bits and # useable Subnets
# Host Bits and # useable IPs
Subnet address for the IP
Subnet Broadcast address
Useable IPs (range)
Major Network Address
Major Broadcast address
IPs & Subnetting - 219.199.101.140/28
Identify the following:
Class:
Subnet Broadcast address (Host Bits = 1):
219.199.101.143
Useable IPs (range):
219.199.101.129  172.17.2.142
Class C
Subnet Mask (Host Bits = 0):
255.255.255.240
Major Network Address:
# SN bits and # useable Subnets:
– 4 Subnet bits
– 24 – 2 = 14
# Host Bits and # useable IPs:
– 4 Host Bits
– 24 – 2 = 14
Subnet address for the IP :
219.199 .101.10001100
255.255.255 .11110000
--------------------------------219.199.101.10000000
219.199.101.128
219.199.101.0
Major Broadcast address:
219.199.101.255
IPs & Subnetting -172.17.2.175/26
Identify the following:
Class:
Class B
Subnet Broadcast address:
172.17.2.191
Subnet Mask:
255.255.255.192
# SN bits and # useable
Subnets:
– 10 Subnet bits
– 210 – 2 = 1022
Useable IPs (range):
172.17.2.129  172.17.2.190
Major Network Address:
172.17.0.0
# Host Bits and # useable IPs:
– 6 Host Bits
– 26 – 2 = 62
Subnet address for the IP:
172. 17 . 2 . 10101111
255.255.255 . 11000000
--------------------------------127.17.2.10000000
172.17.2.128
Major Broadcast address:
172.17.255.255
IPs & Subnetting -101.100.10.89/25
Identify the following:
Class:
Class A
Subnet Broadcast address:
101.100.10.127
Subnet Mask:
255.255.255.128
# SN bits and # useable
Subnets:
– 17 Subnet bits
– 217 – 2 = 131070
Useable IPs (range):
101.100.10.1  172.17.2.126
Major Network Address:
101.0.0.0
# Host Bits and # useable IPs:
– 7 Host Bits
– 27 – 2 = 126
Subnet address for the IP:
101. 100. 10 . 01011001
255.255.255 . 10000000
--------------------------------101.100.10.00000000
101.100.10.0
Major Broadcast address:
101.255.255.255
IPs & Subnetting - 219.199.101.140/28
Identify the following:
Class:
Class C
Subnet Broadcast address:
219.199.101.143
Subnet Mask:
255.255.255.240
# SN bits and # useable
Subnets:
– 4 Subnet bits
– 24 – 2 = 14
Useable IPs (range):
219.199.101.129  172.17.2.142
Major Network Address:
219.199.101.0
# Host Bits and # useable IPs:
– 4 Host Bits
– 24 – 2 = 14
Subnet address for the IP:
219.199 .101.10001100
255.255.255 .11110000
--------------------------------219.199.101.10000000
219.199.101.128
Major Broadcast address:
219.199.101.255
Host Subnet Schemes
The number of lost IP addresses with a Class C network
depends on the number of bits borrowed for subnetting.
Chapter #10
Test
Download