Chapter One

advertisement
Chapter Eleven
Networking
with TCP/IP
and the Internet
IP Planning
An IP address contains 32 bits or total of 4
octets

i.e. 192.168.0.2
Each bit of the 32 bits can be a member of one
and only one of the following sections:
Network
 Host
 Subnet
What is the Network section?

A group Identifier (compare to area code
number)
What is the Host section?
 Group of individual PC’s or devices within
the same network

IP Planning
How many bits should be under the Network section?
 Depending on the size of the organization and potential
growth, one of the following classes can be obtained from the
ICANN organization: A, B, or C
How many bits should belong to the host section?
 32 – # Network bits
How many hosts can a Network have?
 (2 ^ Number of host bits ) - 2
IP Planning
Why are we loosing 2?
Network Identifier
 Network Broadcast Address
What is a Network Identifier?


The first IP address in a network, known as the “cable
identifier”. Represents the entire network. All host bits are
turned off (0’s)
 Example: 192.168.4.0
 What class is it? What is it in binary?
What is a Broadcast Address?
 The last IP address in a network. Used to communicate with
all the hosts in the network. All host bits are turned on
(1’s)
 Example: 192.168.4.255
What is it in binary?
IP Planning
Examples:



Class A uses the first 8 bits for the network identifier
 The address range is only up to 126. The binary equivalent to that is
01111110. The MSB is 0 so we use only the last 7 bits.
 Number of networks that can be created = 27 = 128 – 2 = 126. Why?
 Number of hosts per Class A network
 32 bits – 8 bits = 24 bits
 224 = 16,777,216 – 2 = 16,777,214
 Class A structure: N.H.H.H
Class B uses the first 16 bits for the network identifier
 The address range is from 128 - 191. The difference is = 64. The
binary equivalent to that is 00111110.00000000 The first two MSB are
0 so we use only the last 14 bits
 Number of networks that can be created = 214 = 16384
 Number of hosts per Class A network
 32 bits – 16 bits = 16 bits
 216 = 65,536 – 2 = 65,534
 Class B Structure: N.N.H.H
What would be Class C?
Exercise
Classify the following IP addresses as A,
B, or C and label the network and host
parts of the IP address:





99.1.1.0
156.1.149.9
171.13.5.233
127.1.1.255
193.4.14.1
IP Planning
What is Subnetting?

Process of subdividing a single class of network into multiple, smaller
networks.
Why do we need it?

Organization, control, and ease of management
Who does it?

The Network Administrator of the organization
How is subnetting done?

Borrow bits from the host section and move them to the “subnet” section
How many bits should I borrow?
Depends on how many subnets you want to create

What are some of the problems associated with
subnetting?
Loosing IP’s

The outside world does not have any knowledge of
our Subnetting plan

IP Planning
What is a Subnetmask?
 Special 32-bit number that, when combined (Logically
Anded) with a device’s IP address, determines which
subnetwork that particular device belongs to
For an external host to communicate with 166.144.63.12, the
router will need to interpret the subnetmask information
IP Planning
How is it written?
 All bits under the network and subnetwork sections are turned on
(1’s).
What is default subnetmask?
 The subnet mask that will be used if you do not specify one in
your TCP/IP Configuration
 255.0.0.0 for Class A
 255.255.0.0 for Class B
 255.255.255.0 for Class C
What is the relation between Subnet Mask and Bit
Mask?


Subnet mask is the dotted decimal notation of the number
of network and subnetwork bits
Bit Mask is the count of the number of network and subnet
bits
 Default bit mask for class A is 8
 Default bit mask for class B is 16
 Default bit mask for class C is 24
IP Planning
What are the rules?
 Number of subnets created =
(Number of bits borrowed from the host
2^
section)



Number of subnets Available =
2 ^ (Number of bits borrowed from the host
section) – 2
Number of hosts created per subnet
=
(Number of bits remaining under the host
2^
section)
Number of hosts available per
subnet =
2 ^ (Number of bits remaining from the host
section) – 2
Agenda
Attendance, and Review of subnetting rules
Subnetting Class C -- Case Study
Building the topology and Interconnecting
Networking Devices Using real Cisco routers and
switches
Gateways – What are they???
Packet Tracer– A quick introduction, and simulating
how a packet traverses a simple WAN (How a packet
goes from one LAN to another through routers)
Subnetting Class C– Group Exercise
Logical And
Example
Say you are assigned a Class C network
number of 200.133.175.0 (apologies to
anyone who may actually own this domain
address:). You want to utilize this network
across multiple small groups within an
organization. You can do this by subnetting
that network. Break this network into 8
subnets of 32 IP addresses each.


How many subnets can be used?
How many nodes can be in each subnet?
Building the Topology
Now, we will use real Cisco routers and switches to
connect two LANs (Let’s say, the HR department LAN
and the IT department LAN)
During this lab make sure that you take the time to
do the following:




Check the different types of interfaces that a router can
have
Know what each type of an interface is used for
Know what type of cable is used with each interface
Ask Questions
Default Gateway
The role of Routers in connecting subnets
What is a Gateway?
 Combination of software and hardware that enable two
different network segments to exchange data
 Examples: Cisco Routers, Linksys routes, Linux servers with
multiple NICs and routing services installed, windows 2000
server with multiple NICs and RRAS installed.
 The IP address of a router’s port through which a network is
connected to the router
 Every device has to have a default gateway to
communicate with other devices outside its network
Rules
1. Each router’s interface has to be on a separate network ( You can’t have two different
interfaces on the same network)
2. Each interface on the router has to be assigned an ip address and a subnet mask
3. Routers’ interfaces usually take the first available IP address on a network
4. Switches are layer 2 devices and do not need an IP address to work
5. Each PC on the network must be configured with the correct IP properties. Your PC will need
an IP address and a subnet mask to be able to communicate with other hosts on the same
network. Your PC will need a default gateway to be able to communicate with other hosts on a
different network
6. PCs and their Default Gateway must belong to the same network.
iMac
iMac
iMac
iMac
iMac
iMac
iMac
iMac
Building The Topology with
Packet Tracer
Interconnect Devices
Simulate how a Packet traverses a
simple WAN
Group Exercise
Do number 2 from the IP
Addressing/Subnet Masking
Problems
Agenda
Attendance and questions from last week’s
meeting
Group discussion about the homework
Exercise
Logical AND and group exercise
Case 1, and 2 (To be studied at home)
Sockets, well-known port numbers, DNS,
BOOTP, DHCP, and WINS
Tools: netstat, nbtstat, snlookup, and tracero
Logical And – Why
Why: The logical AND function is used
to extract the subnet ID from a host IP
address and its subnet Mask

Question: With out using the table from
the previous group exercise, can you tell to
which subnet the host 200.133.175.199
belongs???
Logical And – How
Host IP Address (in binary format)
AND
Subnet Mask (in binary format)
= Subnet ID
1 And 1 = 1
1 And 0 = 0
0 And 0 = 0
0 and 1 = 0
Short cut: X And 255 = X
X And 0 = 0
Logical AND Exercise
Given the IP Address: 199.10.10.110/248






What is the subnet mask?
How many bits were borrowed?
How many subnets were created
What is the number of theoretical hosts per
subnet?
Using the Logical And function, find the subnet ID
where the host resides
What is the broadcast address for this subnet?
Case 1
1.
Suppose you are given the IP
address 195.5.5.0 and wish
to connect Springfield and
Bedrock to Southpark. Create
an IP addressing scheme that
will meet the following
requirements:

A: Each subnet must
support between 25 and
30 devices.

B: You must have enough
subnets to address each
network.
i.
What is the subnet mask for this network?
ii.
What is the broadcast address of the 3rd subnet?
iii.
On the diagram, assign a subnet address to each network and give each
router interface an appropriate IP address for that network.
List of networks
Case 1 Answer
for the 195.5.5.0 network with the subnet mask 255.255.255.224
192.5.5.33/27
Hosts
Network
from
195.5.5.0
195.5.5.1
192.5.5.65/27
Southpark
Broadcast Address
to
195.5.5.30 195.5.5.31
195.5.5.32 195.5.5.33 195.5.5.62 195.5.5.63
192.5.5.34/27
192.5.5.66/27
195.5.5.64 195.5.5.65 195.5.5.94 195.5.5.95
195.5.5.96 195.5.5.97 195.5.5.126 195.5.5.127
195.5.5.128 195.5.5.129 195.5.5.158 195.5.5.159
Springfield
192.5.5.97/27
Bedrock
192.5.5.129/27
195.5.5.160 195.5.5.161 195.5.5.190 195.5.5.191
195.5.5.192 195.5.5.193 195.5.5.222 195.5.5.223
195.5.5.224 195.5.5.225 195.5.5.254 195.5.5.255
-
IP:192.5.5.98/27
SM: 255.255.255.224
GW: 192.5.5.97
IP:192.5.5.130/27
SM: 255.255.255.224
GW: 192.5.5.129
Rules
1. Each router’s interface has to be on a separate network ( You can’t have two different
interfaces on the same network)
2. Each interface on the router has to be assigned an ip address and a subnet mask
3. Routers’ interfaces usually take the first available IP address on a network
4. Switches are layer 2 devices and do not need an IP address to work
5. Each PC on the network must be configured with the correct IP properties. Your PC will net
an IP address and a subnet mask to be able to communicate with other hosts on the same
network. Your PC will net a default gateway to be able to communicate with other hosts on a
different network
6. PCs and their Default Gateway must belong to the same network.
Case 2
a.
b.
c.
d.
e.
Given the IP address 199.199.199.172 with a subnet mask of
255.255.255.192. Answer the following:
How many bits were borrowed?
How many subnets have been created?
How many host address per subnet?
What is the subnet address of the network containing the
given IP address?
What is the broadcast address of the network containing the
given IP address?
Case 2 Answer
List of networks
for the 199.199.199.0 network with the subnet mask 255.255.255.192
Hosts
Network
from
199.199.199.0
199.199.199.1
Broadcast Address
to
199.199.199.62 199.199.199.63
199.199.199.64 199.199.199.65 199.199.199.126 199.199.199.127
199.199.199.128 199.199.199.129 199.199.199.190 199.199.199.191
199.199.199.192 199.199.199.193 199.199.199.254 199.199.199.255
A: 2
B: 4
C: 64
D: 199.199.199.128
E: 199.199.1299.191
Sockets and Ports
Socket
 Logical address
assigned to a
specific process
running on a
computer
Sockets and Ports
Virtual circuit for the Telnet service
Host Names and Domain Name System (DNS)
Host name
 Symbolic name that describes a TCP/IP device
Domain
 Group of computers that belong to the same organization
and have part of their IP addresses in common
Domain name
 Symbolic name that identifies an organization
 Must be registered with the Internet Naming Authority.
 Must be available (not already taken by another
organization)
Domain Names
Fully qualified domain name (FQDN)
 Name of a host that includes the full domain name as well
as the host name
 Example: You work at the library of congress and named
your machine PeggySue. Your fully qualified hostname is
PeggySue.loc.gov
Top-level domains (TLDs)
 Highest-level category used to distinguish domain names
 A certain suffix that applies to an organization according to
the nature of business it conducts.
Domain Names
Domain naming conventions
What other domains are now available?
Host Files
Text file that associates TCP/IP host names with IP addresses
(was used when we had 1000 hosts on the web)
Alias
 Nickname for a node’s host name
Example: host file
This file is called lmhosts in Windows and /etc/hosts
on a UNIX-based computer
Domain Name System (DNS)
Database that is distributed over several key computers across the
Internet.
Hierarchical way of tracking domain names and their addresses, devised
in the mid-1980s
Example: How does the DNS request is processed?

From Local, Regional, National To National, Regional, Organizational
(local)
DNS server hierarchy by geography
Domain Name System (DNS)
Resolvers
 Hosts on the Internet that need to look up domain name
information
 Example, type the command telnet support.novell.com
and your Telnet client software will kick off the resolver
service to find the IP address for support.novell.com
Name servers are servers that contain databases of names
and their associated IP addresses
 Each name server manages a group of devices, collectively
known as a zone
Configuring DNS
To view or change the name
server information on a
Windows 2000PC



Right-click My Network
Places, then right-click
appropriate Network Adapter.
Select Properties, Select
TCP/IP, Select Properties.
In the TCP/IP Properties box,
click the DNS tab.
DNS Configuration properties tab
DNS Name Space
Name space
 Database of Internet IP addresses and their associated
names distributed over DNS name servers worldwide (every
name server holds a piece of that database)
 Root server
 DNS server maintained by InterNIC and acts as the
ultimate authority on how to contact the top-level
domains (how to get from .edu to .com)
 Resource record
 One record for each host
 Element of a DNS database stored on a name server that
contains information about TCP/IP host names and their
addresses
Bootstrap Protocol (BOOTP)
Service that simplifies IP address management.
Requires network administrators to enter every IP and MAC
address into the BOOTP table
• This situation is ideal for Diskless workstations:
workstations that do not contain any hard disks
Dynamic Host Configuration Protocol
(DHCP)
Automated means of assigning a unique IP address to every
device on a network
Reasons for implementing DHCP
 Reduce the time and planning spent on IP address
management
 Reduce the potential for errors in assigning IP addresses
 Enable users to move their workstations and printers without
having to change their TCP/IP configuration
 Make IP addressing transparent for mobile users
DHCP Leasing Process
Lease
 Agreement between DHCP server and client on how long
the client will borrow a DHCP-assigned address
NetBIOS Names Defined
Each Windows-based host receives a NetBIOS name during the
installation of the operating system. This name is used to uniquely
identify the machine on the network
However the NetBIOS name is not used itself to identify a host: it is
used by NetBIOS applications and processes to establish communication
with other NetBIOS applications on remote hosts
A NetBIOS name consists of 15 alphanumeric characters
If a NetBIOS name does not contain 15 characters to fill the name out
to the required 15 characters, Windows will add the necessary number
of null characters to fill the name out to the required 15 characters
A sixteenth character , which is not usually visible, is added to each
NetBIOS name to indicate the type of name, service, or group that the
NetBIOS name represents
Registration, Discovery and Release of NetBIOS
Names
Process
Broadcast
WINS
Registration
(defending a
NetBIOS
name)
Sent to every machine within
the same LAN (subnet) to
see if any machine is already
using the name being
requested
No broadcast. The name
registration request is sent
directly to WINS to see if
the requested name is
available.
Discovery
A broadcast will be sent to all
hosts to request the IP
associated with the NetBIOS
name. When obtained
results will be registered in
cache.
No Broadcast. Request is
sent directly to WINS,
which can resolve names
of hosts on the entire
Network (different
subnets)
Release
During proper shutdown,
Release request is sent
NetBIOS host sends a
directly to WINS
broadcast to release its name
LMHOSTS File
Standard Text file used to resolve NetBIOS names to IP
addresses.
The LMHOSTS file should be located in:
%systemroot%\system32\drivers\etc directory
Example:
192.168.0.1 BONGO #PRE # DOM: Resource
The LMHOSTS file is read from top to bottom. So would the
order of entries matter???

NetBIOS Node Types
B-Node: relies completely on broadcast for name registration,
discovery and release. Creates great deal of traffic on the
network
 Cache, Broadcast, End
P-Node: Point-to-point communication with a WINS server for
NetBIOS name services
 Cache, WINS, End
H-Node: default configuration in windows machine
 Cache, WINS, Broadcast up to 3 requests, LMHOST if exist,
End
NetBIOS Names and Browsing The
Network Resources
How do I get to see all these network resources when I click on My
Network Places???
What is a browse List? A list of available NetBIOS network resources
for a particular network segment.
How are the lists built and who keep them?
 NetBIOS machines announce their presence at the start up then
once every 12 minutes. Those announcements will be used by the
following special hosts to built the browse lists:
 Master Browser: One per segment
 Backup Master Browser: Future Master browser
 Domain master Browser : Pulls the master browser to get a list
of the resources on this particular segment, then sends a
complete list with all the resources on the entire network to
each Master Browser
NetBIOS Switches
Windows Internet Naming Service (WINS)
Provides a means of resolving NetBIOS names with IP addresses
What are NetBIOS names?
How are DNS names different from NetBIOS?
Make sure that you can differentiate between TCP/IP host names
and NetBIOS names
Remember that NetBIOS is used primarily with Windows-based
systems
WINS offers several advantages
 Guarantees a unique NetBIOS name is used for each
computer on a network
 Support for DHCP
 Better network performance (eliminates NetBIOS broadcast)
TCP/IP Troubleshooting
Packet Internet Groper (PING)

Troubleshooting utility that
can verify TCP/IP is installed,
bound to the NIC, configured
correctly, and communicating
with the network

How does it work? It uses
ICMP to send echo request
and echo replay messages.

What is an Echo Request?
An echo request is a signal
sent out to another computer

What is an Echo Replay? An
echo reply is the other
computer’s response signal

Process of sending this signal
back and forth is known as
pinging
Netstat and Nbstat
Netstat

Displays statistics and the state of current TCP/IP
connections
Nbstat

Provides information about NetBIOS names and their
addresses
Nslookup and Traceroute
Nslookup

Allows you to look up the DNS host name of a network node
by specifying its IP address, or vice versa. Used to
troubleshoot problems related to the DNS server.
Tracert



Uses ICMP and TTL to trace the path from one networked
node to another
What is TTL? Numeric measure used to determine how
many more network hops a datagram can make. When TTL
expires a datagram returns to the source with the identity of
the destination.
How is it done? By transmitting a series of UDP to a
specified destination
Next Meeting (After Spring Break)
Take Chapter 11 Test (Read the chapter first)
Take The Midterm Exam (Make sure that you
study both case 1, and 2 before you take the
test
Download the Project and start working on it;
It is due two weeks before the final exam!
Make sure that you have the cable kit
Read Chapter 6 (Network Hardware)
Enjoy your break
Download