You are on page 1of 38

0:00

welcome to chapter 5 for C to T and networking


0:03
this chapter's gonna deal TCP IP addressing
0:06
and
0:07
routing the objectives for this chapter
0:10
are due to help you understand the number systems used to an address in
0:14
on how Mac addresses are used and
0:17
help explain the structure be able to recognize the structure over
0:21
IP version 4 IP version 6 address
0:26
be able to identify
0:28
within the range is that we're going to learn private addressing
0:32
and how it's different from public addressing
0:36
we're gonna talk about to some other routing protocol saying
0:41
what their purposes and what function routing is as well
0:45
that we can talk a little bit about network address translation in the
0:50
the different types of it that you'll see
0:53
well first of all a numbering systems for networking
0:57
computers understand obviously ones and zeros
1:01
so we're talking about a binary numbering system
1:05
be any electronics background it or anything like that
1:09
Its gonna help a lot because we're used to seeing numbers
1:13
in
1:14
A decimal systems base 10 system and that's when you have your

1:18
your 10 symbols from 0 through 9 . So we use to look in that, we look at mac addresses
were actually be looking at hexadecimal
1:27
addresses which is a base 16
1:29
and their 16 symbols with
1:32
the with hexadecimal there's a
1:36
0 through 9
1:39
once we get to 10 that'll be given value
1:42
Of A and
1:44
B would be eleven so on so forth up to F
1:47
with the FBI the highest number that you could
1:50
could have been a in a mac Address a.m.
1:54
these not only is bad dressing with to use Pallotta for
1:57
programs to to
2:00
express numbers that are larger than the decimal system will allow for
2:03
and actually when we look at IP version 6
2:08
your see that IP version 6 uses exodus was well rather than
2:12
decibel and hexadecimal basically works better in a
2:16
binary and buyer fireman's them and first thing you have to be able to do
2:20
this you have to be able to convert binary to decimal
2:22
I'm so foresee in the you know an address
2:26
bike 128 dot 1.0 1.1
2:30
home our computers looking at that yes
2:34

this 8-bit from the right being turned on


2:39
that's a value 128
2:42
Tom in in the other seven bits would be turned off so
2:45
starting right to live
2:48
every bid for every place can have two values see their 0
2:52
or one so process if this bit in the one spot was turned on it would have a value
2:58
warn if it was turned off
3:00
values 0
3:02
and then as we increase a.m. today you doubles each time
3:06
so the second bid is worth two
3:10
third period this word for a 16 32 64 128
3:15
and we would basically and add these numbers up
3:19
for the bits that are turned on her figure out which pits would be turned on
3:23
for example would be examples here
3:27
home
3:28
have 8 bids coz I P virgin forests the
3:31
32-bit separated into four octets will have to deal with a bit
3:35
the time and if we look at this binary number
3:38
this bit is on this bit is on
3:42
refer back to the top that has a value
3:45
to value 1
3:48
so where those up we get three
3:51

on the we had this bit turned on this bit turned on and this better known
3:55
those have a value 8 to and one
3:59
which would give us 11 and if we had all
4:02
eight bits turned on for example we would add up
4:05
128 plus 64 plus 32 plus 16 plus
4:10
a was four plus two plus one which would give us $2.55
4:16
so forgetting to IP address close up a little bit about Mac addressing
4:20
mac address and uses a function call media access control
4:25
and the format for max our mac Address
4:29
is a it's six biden's long so forty eight bids
4:33
insists red expressed as: hexadecimal so
4:36
you have six fields I'm with to
4:40
hexadecimal numbers or letters in each field
4:45
so out of the six feels the first three fields for the first six numbers
4:49
are water called the OU I thats organizationally
4:53
a unique identifiers thats assigned to the manufacture by the IEEE
4:59
so for instance if you had a you know fifty
5:03
a net calmer Broadcom a
5:07
network cards they would all have and the first
5:10
the same numbers in the first response
5:14
a.m.
5:16
and in bites four five and six represent the actual address on the host
5:21

and the manufacturer science those this is done so that


5:26
gives us a lot of possible combinations for addresses so
5:30
will end up with two hosts having the same mac address
5:34
so we combined the first three bids and
5:37
the next three bids or the OU line host ID
5:42
that's gonna give us her mac Address and the last three bites
5:46
sorry man bites a bit earlier the last three bites is gonna identify the
5:51
specific host
5:52
so and O'Neal and network where everything is
5:56
is you know in the same rumor same location that %uh computers find each
6:00
other these black dresses
6:02
everything's plugged in the same switch it doesn't need routed
6:06
so
6:08
the switches will basically
6:11
take the back address information outta the packets
6:15
and figure out where that to that data needs to go
6:21
alright so stock a little bit about the discovering the mac Address
6:26
home first evolved marketers can also be known as a physical address or Ethernet
6:32
address those terms are interchangeable
6:34
them
6:35
he may rarely hear Magadha scholar Vernon addresses
6:39
they're really applies only to the
6:42

the wrong address a.m. the mac address that we look at


6:46
is not technically a burden address
6:49
just to get termino
6:52
her you may see on your network push may not but
6:56
I'm there's there's a several different
6:59
methods to to find where your Mac aggressors we go to command line and
7:03
Windows
7:04
we can use the R command with the dash
7:08
a switch so are space de chez that will give your Mac Address
7:12
a.m. we could also do an IP config slashed all
7:16
if you look at Figure 5-1 in your book I am
7:20
you'll see it shows up under physical
7:23
address it for arlen texture
7:26
UNIX system and we can do ifconfig Dache
7:30
a cannula true physical address from within the Cisco I'll wish you could too
7:35
show interface and that will give you
7:39
your Mac address:
7:42
so
7:43
that her find out what your Mac Dressen there's other ways to do this well you
7:47
could obviously is a
7:48
a packet sniffer and there's a command get back
7:51
that will give you that is will you could look into vice manager
7:56

you could look most species of showing it


8:00
post so
8:03
was talk now about IP version 4 um
8:06
hairdressing in this is where com
8:09
a lot of the
8:10
questions on the network plus you're gonna really focus on IP version 4
8:14
a.m. that
8:16
the thing that's different about 'em and IP address as compared to a Mac
8:21
is an IP address is gonna identified now only
8:25
a individual or unique host but is gonna identify them
8:29
the network as well remember with the mac address those first three bites were
8:33
the same
8:34
depending on the manufactures though you know there's no guarantee that just
8:39
because 2pcs have the same
8:41
oh you I that they're on the same network so I P
8:45
addressing basically takes care that
8:49
for supports 32 bits Tom
8:52
broken up into four bytes so
8:54
for a bit bytes
8:57
brought it to make him call octet age by can be expressed
9:01
a in des small and then that's what we're used to look at them when you go
9:05
into your TCPIP properties insecure network
9:09

address I'm here obviously put it this this decibel


9:12
but every address is gonna really
9:15
be able to be broken down into two parts up the network ID
9:19
and the host ID the network had is always going to be on left
9:23
in hopes that he's always going to be on the right now
9:27
on exactly how many numbers identify the network
9:31
or the host depends on the class IPAddress classy address for example
9:35
the first three octets identify
9:39
the network last octet identifies the host
9:42
a.m. where if we were looking at class a network
9:47
only the first talked a lot if I the the network and
9:51
the last three hot tits would be left for host a.m.
9:54
so we would have been a case 24 bits for host
9:57
obviously you can have a lot more hosts with 24 bits than you could with
10:01
be 8 you had classy
10:04
in fact to do the 24th power as compared to 22 the eight-hour
10:09
so a.m.
10:12
the network ID is basically identified using the subnet mask
10:18
on the subnet mask identifies how many those bits on live
10:22
are gonna make up the network so you can take a bit
10:26
as like a network or a host filter
10:30
it turns off the host portion please the network portion reveal
10:35

I nestle their routers when they look at


10:40
IP address in a packet they can identify where that package coming from where it
10:45
needs to go to
10:46
a.m. so the bits that are on the subnet mask
10:50
are basically compared bit by bit the IP address so
10:54
if you had an IP address and a mask that you're looking at a decibel
10:58
you were to convert those game
11:01
to binary a.m.
11:04
what happens in the electronics world there's a device called a and Kate
11:10
in and gave basically is device that has two inputs
11:14
here and one output
11:32
sorry lost mine
11:33
show there
11:41
let's go back one more night so down
11:46
you we'll talk about in gates in Kate has one input
11:50
are two input 1 output and if you applied voltage to both inputs
11:55
beautiful to check out and that's the only way that you get a voltage ap
11:59
hit voltage on one and not only other
12:02
you get nothing out
12:05
and voltage in the digital world can be expressed as
12:09
in on in our state or 10 so binary works perfect for this
12:14
so a.m. if
12:17

a bit is on and the subnet mask


12:20
a
12:22
in a bit is all in the IP address it's gonna be
12:26
a network bit so first although the two
12:30
255 indicates that anything
12:33
in that octet is gonna be network
12:37
good
12:39
if a bit as of:
12:41
its corresponding been an IP address is a host bit
12:44
and typically there's gonna be a zero for example
12:48
let's just look at an example get an IP address tend not to doubt 3.4
12:53
with a sub Damascus 2-for-5 does hero to zero to zero
12:57
K
12:58
255 means all a bit this first doctor turned on
13:02
so if we go through and we conferred
13:06
home
13:07
this decimal to binary like we've done down here to bottom
13:11
we have the first four bits of the 8-bit would be on
13:15
in the tube it would be on P plus to the stencil there's art and
13:19
in binary obviously all up the Spitzer gonna be on in the mask
13:24
so only during and function that's going to come out
13:27
as a day TN so the first octet
13:31

smashed 255 all the bits Ron we're gonna get a 10


13:35
all the bits in the second third and fourth octets
13:38
with this massacre zeros so
13:41
a.m. they're not gonna the and function is gonna work
13:45
the two or three or four so what's leftist industrial down 0 to 0
13:49
so this IP address tender to to
13:52
3.4 with a massive 255 does hero to zero zero
13:57
would be and network TN does 0
14:00
that 0 to 0 that's the network address so the tennis the portion that
14:05
identifies the network
14:07
the dot to dot 3.4 identifies de specific host on that network
14:11
and know whether hostess gonna have that address are going to have a conflict
14:19
and there's a couple different types at their dressing or you can
14:23
you can break it into two categories really on this class for those classless
14:27
with class full address ng on the
14:31
IP addresses are divided into classes and the classes are
14:35
are defined by the first number that you look at
14:39
in the in to the left in the IP address for the first talked it
14:43
in each class has a subnet mask that is is predefined for that class
14:49
Class A the first number
14:52
can be anything from one to 127 still the previous example we just looked at
14:58
tienda 2.3 2.4 is a Class A address
15:01

and the default mask for class-a is 255 does 0 to 0 vote 0


15:09
that's the default for class-a Class B
15:12
X 128 191
15:14
the default masks 255 255 does hero to zero
15:18
classy stars 192 ghost
15:21
223
15:22
on the default mass being 255 255 255 does 0
15:27
then we also have class the in class III
15:31
a yearly can assign addresses out of these ranges class the issues for
15:35
multicasting
15:37
a.m. good example multicast is similar to broadcast
15:41
except that is typically a.m.
15:45
not really said to everything on the network but two things that are
15:49
listening on a specific class the address all over routing protocols work
15:53
this way
15:53
and they have a class D address that's reserved for them
15:57
when this and the routing updates if their protocols configured on into the
16:01
router
16:02
on their router will be listening Class D address
16:05
in for classy those are used for experimental purposes
16:10
you're never gonna see those IOU's
16:13
Feliz liquor class for masks class-a st. 55 000
16:18

means the first a is turned on first eight bids


16:22
and so the first a bit in the IP addresses your network member
16:26
and there's example we did earlier with Class B
16:30
the for 16 bits are turned on 25 active
16:33
500 so the first 16 bits in the IP address
16:36
are the network amor for example a host with Manders
16:40
172 done 30 that too about 5.9
16:43
is on their work 172 done thirty 0 the 0
16:47
for classy the first 24 bits are on and some in masks
16:51
so again the first 24 bit in the IP address are the network member
16:55
for example
16:57
a host with an address a 192 down 16 aid %uh 7.6
17:02
is on network 192 got 16 8.7
17:05
everything else on that local area
17:09
network would need to start with these first three numbers 192
17:12
16 8.7
17:15
very just take a look at some issues we can have with their dressing
17:22
in order for to host to be on the same networking communicate with
17:26
out our router they have to have the same network member
17:29
a.m. for example we had a house 192 168 a 73 to 65
17:35
we know that's a class C address on the issues in the first 24 bids
17:40
for the subnet mask and we had a host with 172 to 32
17:45

5.9
17:47
Class B address
17:50
chooses sixteen-bit to the basque by default
17:53
its network is gonna be 172 to 30 died 25 5.9
17:58
their network members are different so
18:00
they're not gonna be able to communicate without her router
18:04
so grounders gonna be configured
18:08
with an address
18:10
on the local area network have the devices that need to get outta
18:14
network so lookin back up this example
18:17
we had a host to with that address 192 168 does 730 65
18:23
the router interface disconnected to
18:26
the switch that this host is on is gonna need an address from 192
18:31
168 to 73 done something has to have the same network member
18:35
and whatever address that we can figure on their router
18:39
that's gonna be the default gateway
18:43
for the TCP I settings for the host on those
18:47
networks then has to be exacted
18:50
if it off by one number let's say we is 192 168 at seven 3.1
18:55
on the router here we put in a default it
18:58
gateway address on a host on that network go 192 168
19:03
to 73 done 5
19:06

that hostess not gonna be able to communicate through their routers


19:10
default gateway is very important
19:13
lack of the default gateway or
19:16
be incorrect default gateway means that any host on that land is not going to be
19:21
able to communicate
19:22
outside at the Langham so
19:26
think the default gateway is the main entrance to
19:29
land were the main exit from a land com
19:32
both physical and logical physically it support on a router
19:36
when you see a default gateway a setting 2i people fear if configured
19:41
or however you look at it that addresses the router port logically
19:47
it is an IP address that were sign in to the airport
19:51
all hostal and should have the same the fall
19:55
gateway
19:56
they can be assigned manually can be assigned via DHCP
19:59
and that they'll have to have the same kalian the Keighley has to be correct
20:04
and let's look at another example a.m.
20:07
that addressing issues and Andy serwer how
20:11
they will process on the network plus home
20:15
with got 17 to 16 up 305 you see this last 16
20:20
that's another way to a.m. expressed the subnet mask
20:24
on the skull classless inter-domain routing or cider
20:28

and all that saying is the mask for this address


20:32
is 16 bids so to default class P
20:36
255 255 does 0 to 0
20:39
we have that host and we have
20:42
a host 172 to seventeen 4.6 last 16
20:46
also a class B address also using the same
20:49
default mask are they on the same network
20:54
okay well we know this last 16 means to first two octets
20:58
identify the network and with his first address we have won seven to sixteen
21:03
with the second we have won seven to seventeen so no they are not on the same
21:07
network
21:08
a.m.
21:10
so how that how did I get these
21:14
the answer to this question as you can you're going to see these on your
21:17
network plus
21:18
you have to first evolved know what class the numbers are
21:23
so you're gonna need to memorize those address ranges
21:27
Arabian Sea on your gonna have to know the default subnet masks
21:32
so slice 16 I knew that was 255 255 does 0 to 0
21:38
in you have to know how that mask is applied to the address
21:42
so
21:44
that's how I knew that there some different address types that are used
21:48

with IP version 4
21:49
on their shoe to cast which is so what were normally used to look at their
21:53
that's what we signed workstations servers I'm it's an address assigned to
21:57
a single NIC
21:58
a broadcast which is used for sending data to all notes on a network
22:06
the typically applications won't use this
22:09
but this does happen
22:13
tough news to discover the mac address when we plug new things into a switcher
22:18
for the first time things communicate on a local area network
22:21
and multicast issues for sending data
22:25
to a.m.
22:27
predefined are prescribed members a multicast
22:31
group begin your routing protocols used that
22:34
could be things for is for things like a webcast
22:38
stuff like that
22:42
so when we assign addresses you need to be familiar
22:45
when you take a network plus with that
22:48
deferments for signing IP addresses in the first First Methodist attic and it
22:53
just means you're gonna go into the TCPIP
22:55
properties utility the operating system
22:58
and you're gonna manually put in the address
23:02
'em book P is an older protocol
23:06

that it's it's Canada next year you had a statically


23:10
put the addresses and to a a file basically in Bootle
23:15
p with Dana sign in automatically they really didn't save
23:19
a lotta work unless you know they were post that you had to
23:24
reassigned interest stuff all the time the most common way
23:28
is to dynamically asylum and desk these
23:31
protocol like DHCP Tom
23:35
DTP stands for dynamic host control configuration protocol
23:39
I'm you have a server this run in DHCP a.m.
23:43
you're gonna go in and give it a range addresses you
23:46
one to it to head out her hand out and in clients
23:51
will get their addresses from this server
23:54
and and
23:56
another way that dynamic adversity as a sinus autoconfiguration
23:59
and thats IP version 4 self assignment
24:03
using range 1 $6.95 for does he or does he realize the network
24:08
that's called above or automatic private IP address
24:12
it means that the host to set to automatically
24:16
get an IP address but its not able to talk to a
24:20
study will talk to the DHCP server so anytime you see 169
24:25
254 when you do IP configure if $config
24:29
you know there's a problem with your DHCP server
24:32

either host can communicate with it bore the surpluses in running


24:36
up sold typically you would the
24:39
checkered it CP server and restart it actually will
24:43
not all server just a DHCP service
24:47
will typically fix that issue Patterson is important because
24:52
if to get fifty hosts on the land
24:56
and they can get IP addresses from a DHCP server
24:59
they can still get a 169 254 address
25:03
and they'll be able to communicate with each other it works a little different
25:07
they'll grab a random address
25:09
helping the address to see if another host already has a
25:12
if a host doesn't 10 day will grab that address
25:16
and eventually everything on the network will have 169 254
25:20
that'll be unique you can still communicate
25:23
can get outside your lawn with IP version 6
25:28
a.m.
25:30
autoconfiguration is how we're gonna be sittin routers a
25:33
and they'll generate network address and it basically
25:38
at the mac address at the PC to that in this gonna be your IP version 6 address
25:44
so thats that say we never use in class full address
25:48
now you can also use classless addressing
25:52
so with class all remember where the standards and ask for a given class
25:56

network Class A for example used to but 5000


26:01
classless means dad we're going to deviate from that standard
26:05
mask for example we can have a class A at
26:09
network 10.0.0.0 in
26:12
we can borrow bits from the other 24-bit
26:17
in this case we're gonna barley bids and have a total of 16 bits on
26:22
they can mask 255 255 00
26:26
done excuse me the
26:29
thats again is called cider classless inter-domain routing
26:34
the you're gonna see the IP address in a slash
26:38
a so in our example here 10 000 slash 16
26:43
16 means the same thing as too bad to 5500
26:47
am we could even go on in
26:50
take a more bids news teens here 00 slash 24
26:55
I'm so why are we doing this well
26:58
if we take the number network bids a.m.
27:03
increase those we can obviously have more networks
27:07
so if I take this class A address and up our own
27:12
16 more bids
27:15
from the original 8 and I've 16 more bids
27:19
that I can create networks would am
27:22
when I do that I'm leaving less bids for wholesome only did
27:27

eight bits for host the last octet so


27:30
that means you have got more networks but the networks are going to be
27:33
smaller and again the subnet mask is what controls all of this
27:38
a 255 255 255 does 0 has 24 bits on a bit of
27:45
day bits are you sure host so I have to do the eighth
27:49
I am combinations of numbers that I can use for host
27:53
so am your power up to
27:57
because to for a 16 32 64 128 256 have been 256 possible combinations ones and
28:06
zeros
28:07
with a bid
28:10
and that keeps increasing increasing exponentially
28:14
if I have 16 bits of in a mask
28:18
then I have to do the 16th here
28:20
if you were to keep doubling to be six 512 1,024
28:25
2048 so on and so forth I've 65,000 636 combinations
28:32
so I could have a lot more hosts with
28:35
days last 16 basked in a good with us last 24
28:39
am because everyone knows combinations can be a host address
28:45
so in the previous example by
28:48
using this last 24 for the Class A address
28:52
in reducing the number host bits today and then that works much more
28:57
manageable only have to worry about 256 addresses
29:01

as to 65,000
29:04
so to reduce the number host bits you just increase in number
29:08
network bids in the mask
29:10
so you just turn orbit on in the supplements
29:14
and that's called subnetting subnetting manger cursing the number bits in the
29:20
mask
29:20
which increases the number networks each network created
29:24
is us up there at the network it was created from
29:28
apps like taking a applying cut it into
29:31
smaller slices for sizes
29:35
Solis looking example got a class B address
29:39
17 to 20 does hero to zero and that's going to be important to guess can look
29:44
at an IP address look at this
29:45
first numbered say okay this class AB or C so really work on
29:49
memorizing those ranges by the way this
29:53
this network has a mask 255 to about 500
29:57
so 16 bits for host we can have 65,000 636 host address
30:04
what happens if we decide to serve net
30:09
this network with
30:11
24 bits class even testified that if other to Pappadeaux 0
30:16
will were turning eight additional bits on
30:19
meaning the first three octets
30:22

now are going to identify the network 172 29


30:26
0
30:27
and that only leaves a
30:30
8 bids for host address so
30:34
the
30:35
you basically took 8 extra bits
30:39
to the eighth is 256
30:42
that's going to create 256 additional
30:45
network number combinations so
30:48
the number biz for the host decreases 16
30:51
to eight
30:52
think is she to do the host addresses you borrowed eight bits for the mask
30:57
see to buffeted by and and here we have two about
31:01
but 50 and to the 8 gives you 256 networks
31:07
so our results we have more networks with your host
31:11
on the network on so we got some segmentation going on
31:15
and that's a good thing
31:19
so
31:20
just talk a little bit about the different types that are so talked about
31:23
the classes
31:24
nom typically there's a couple special addresses but
31:29
to the two main classes are public and private public addresses are globally
31:35

unique
31:36
meaning nobody else in the world can have that IP address
31:40
sold those are going to be registered from
31:43
10 the numbering standards organisation I A N A
31:47
I ATF are people that hand those out
31:50
a.m.
31:52
typically there bought out by a ISP's a nice peaceful
31:57
assigned 0 serves you were to look at the IP address on your
32:00
cable or DSL modem it's gonna be a public IP address
32:03
has can be assigned by your ISP private addresses on the other hand
32:10
were created so that we didn't have to use a public IP address for everything
32:15
I'm so they're created to save numbers private addresses are locally
32:20
administered
32:21
the you can
32:24
asylum however you want they can be routed
32:27
however that cannot be routed across the internet you you can't
32:32
set up a router for business game
32:35
give them a private IP address can expect for a customer to be able to
32:41
for example go to their web page using their private address because
32:44
that addresses not globally so
32:48
arranges a.m.
32:51
here's her some pressure ranges with a cider ask a
32:56

10 000 210 255 255 255 slash


33:01
eight
33:01
com that is the Class A a prior range
33:05
Class B is 170 16:00:00
33:08
217 231 that 25 up to 255
33:12
then this should be a slash 16
33:15
here actually
33:18
that your Class B range classy is 192 168 0.00%
33:23
to 192 168 255 255 this should be a slash 24
33:29
in in your paper Rangers 1 $6.95 400
33:33
to 169 254 255 255 and that is also with the default class B
33:40
mass course last 16
33:44
home
33:44
list talk a little bit about IP version 6 address and you may see
33:48
a few questions on it on your network plus not gonna go
33:52
real India on the problem with IP version 4 is we're
33:57
out for their address om they handed out the last at the addresses
34:01
and in the spring or summer
34:04
2011 soldier no more public addresses
34:08
a so in order to address this they've come up with a new protocol IP version 6
34:14
they did have IP version 5 on
34:17
really never made it off the table but
34:21

when they created IP version 4 they didn't realize we're gonna have so many
34:25
devices with IP address
34:27
cell phones I am refrigerators treadmills cars
34:31
I am you know tablets all those things
34:36
are things now that have IP addresses so IP version 6 creates more addresses
34:41
fact I am instead a 32-bit addresses
34:45
228 address so 22 the 128
34:49
power which is 340 quadrillion
34:53
at seventy-nine Oct chilean times the current
34:56
4.2 billion addresses that we have so
35:01
that is more than
35:04
the number stars and unknown universe basically
35:07
so it's a lot bigger number they're gonna be expressed in hexadecimal
35:11
there any be divided into eight groups
35:14
that teachers Group Co have 16 bits in each one
35:18
in hexadecimal a.m.
35:21
could be your standard hex decimal format a Coal India Limited
35:25
to have Colin's in between on a the cool thing about him
35:29
is this bill %ah zeros and IP version 6 address
35:33
and any zeros in the first part is that urs can be eliminated you can just take
35:39
a map
35:39
a.m. dresses have if one of those
35:43

16 bit blocks
35:46
were all zeros and it's going to be pretty common
35:49
that could be reduced down to a single 0 so there's cops
35:53
leading 0 compressed just just take another
35:56
makes a number shorter um if we have multiple blocks
36:00
0 so let's say I am you know remember we had
36:05
eight blocks 16h if we had them
36:08
two blocks in a row that we're all 0 which again will be common
36:12
I am you can compress those damn
36:15
to two sets of Colin's their resisted
36:19
after to book series er you can only do that once per address though
36:24
the the compression leading 0 compression
36:27
you can do with with any of those blocks home
36:32
as far as address types their very similar I'm there are you to cast
36:36
addresses
36:36
a they are separated into
36:40
globally in a cast link local and unique local
36:43
take a global measure public address
36:46
I am take a link local as an uphill battle us
36:51
and think that unique local as your private address
36:54
they do also have multicast and instead a broadcast
36:59
a.m. they've created what's called anycast addressing
37:03

works very similar a however it's more efficient


37:07
player places broadcasting Tom
37:11
the way did to address can be assigned state forced
37:15
dateless a stateful means we're going to be using TCP
37:19
stateless meaning autoconfiguration by the host in this is something this new
37:23
with IP version 6 a.m. you can
37:27
basically set up your router to leave it up to you hosts
37:31
3i the first six capable am
37:34
to configure their own address based on their
37:37
mac Address a lot of people are going to be using this sir
37:41
and again you don't really have to
37:44
go really in-depth her nobody version 6 really in-depth review network plus
37:49
but it is a good starting point to get introduced to it
37:53
and specifically make sure you know these different address types make sure
37:57
your state for stateless is
37:59
and then make sure you know what a Global Inc local
38:03
and unique local address our so let's talk a little bit about routing
38:08
protocols
38:09
and the network plus a scan
38:11
funny and it focuses on you being able to identify the difference between a row
38:16
double
38:17
and routing protocols travel means that they're being acted upon
38:22

for example network address TCPIP


38:26
SPX IPEX AppleTalk those are all Patterson protocols
38:30
that our route uble Napoli
38:34
is its basically a
38:38
and older Windows protocol a.m. it is not around
38:41
then have a network address so
38:44
radical means
38:47
it is sheesh rather sing it can be routed routing
38:50
means the they are capable of looking at the at those addresses
38:56
found in radical protocols for example I P
38:59
and they can use those to move data from one network to another
39:04
so a.m. to collect information about networks that are reachable
39:09
and then they take that information they build what's called a routing table
39:14
I routing tables basically gonna have the best path
39:18
to every network that that router knows about
39:21
now by default its gonna know about any networks that are directly connected so
39:27
for example if I had 192 168 1 does 0
39:31
on 28 Ethernet interface a router
39:34
and 192 168 them to does hero or on
39:38
another Ethernet interface a router that router would know about those networks
39:43
because its interfaces are going to have an address
39:45
in those networks so you know it's very simplest
39:50

their router would have a routing table with those two networks in it
39:54
in the exit interface to those now
39:57
the cool thing about routing protocols is
40:00
they will take that information that a No
40:04
about in the share it with other routers so potentially all the routers
40:09
know about all other networks and there's two general types
40:12
routing protocols interior and exterior
40:16
interiors typically within your system that you're responsible for
40:21
in an exterior is used typically on public networks
40:25
by espy's and in the best example that is BTP your border gateway protocol
40:32
that's what they use a lot a
40:35
so most the time as an administrator in steer you were going to be working with
40:39
interior protocols
40:41
to need understand them a a lot better than you do
40:45
exterior in that's what a lot of your network plus
40:49
focuses on that's what the Cisco training focuses on
40:52
so let's take a look at different classifications for interior protocols
40:58
um first-class cation distance specter
41:02
K any of these routing protocols
41:05
remember all over me try to find the best path to a network
41:09
any distance vector protocol simply uses hot cam
41:14
and I hop is a link from one router to another so fed up counter 10
41:19

gonna cost $10 routers to get to this network


41:22
so they use distance up to find it
41:25
some examples a this inspection protocols rip
41:30
version 1 /version to and
41:33
and a I G R A P though sir
41:37
the most common the next type we have is link-state
41:41
an East Point to Point link-state information
41:46
to determine the best path so doesn't really look at distance
41:49
looks at some thanks their dynamic like band with congestion
41:54
so as your network changes 'em your path to and from a network
41:59
a he your router can basically
42:03
fine and net better path that any given time based on these dynamic things that
42:08
can change your so
42:10
these are much more efficient protocols and
42:13
that too
42:14
that are most common are spf /url open shortest path
42:18
first for is-is which stands for in a media system the intermediate system
42:24
and then we have a hybrid protocol
42:27
hybrid protocol uses the best of both worlds
42:31
became the take anything that to is used by distance vector protocol
42:36
on the news that but it can also use the link-state
42:40
a protocol things a link-state protocols would use like band with congestion
42:46

and tube routing protocol that does that is he IGRP


42:51
enhanced interior gateway routing protocol and that is a Cisco proprietary
42:55
so
42:57
if you have 50
43:00
Cisco routers in your network in you throw in one router that's not Cisco
43:04
on you won't be able to set up the GRP
43:07
on that network you would have to use one other nah proprietary protocols like
43:11
grouper or spear
43:13
for is-is
43:16
it's really important for you that you start
43:19
thinking kinda like a packet and being able to look at the network and say okay
43:24
hours as packet gonna go where it needs to go and why
43:29
so let's take a look at the process
43:32
on the host needs to communicate to something outside the network
43:36
was so we're going to Google on the Internet on the hostess gonna
43:41
figure out basically that Google's non-owner local network through
43:46
try to find the mac address on the switch for Google the mac address for
43:49
Google's not gonna be on the switch so
43:51
it sends the packet to the default gateway which is your router
43:55
which router does is it puts a pack in a buffer
43:58
com it looks at the packet and gets the
44:02
destination IP address the destination network
44:05

in that it looks in its routing table to see


44:09
if it knows about that network if it doesn't find in there
44:14
a typically will drop the packet if it does find the network
44:18
if Ford said to
44:21
whatever network in their routing table says
44:24
a that it's the best path now
44:27
you may be thinking oh wait a minute if the packets dropped every time the
44:31
router doesn't find network
44:33
has gonna find anything on the internet
44:36
and the women if you take advanced networking you're getting to Cisco
44:42
and there's something called a default route which means
44:45
it's it's command each put in a special rather tells a router hey
44:49
if you don't find this networking a routing table 40 doubt
44:53
this interface and it typically is pointing towards the ISP's
44:57
so anything on the internet it sends to the ISP
45:00
come but if it did find a a path
45:05
for network it sends it to the next router
45:08
in every hour completes the process it happens every router
45:11
they look at the destination network look to routing table
45:14
in they make a affording or filtering decision
45:18
in the end once it arrives comes out the router into that last
45:22
switch remember the switch is actually going to use
45:26

are to find the mac address based on the


45:29
IP address or reverse our backs so
45:34
that process is reversed for acknowledgements using TCP
45:39
it's called a hot by hot process because each router
45:43
independently makes its own routing decisions regarding the next topper
45:49
or router to forward that packet to
45:52
on that that it in and that shows basically how routing
45:57
works I'll so we talked about private address ng
46:02
and on how everything inside our network had private addresses but at same time
46:07
we also said
46:08
the private addresses can't a
46:12
be routed across the internet a.m.
46:15
so and we know that we do that
46:18
so we need to understand how that happened in this cold address
46:22
translation
46:23
that's when we take a rather more public address
46:27
it was substituted in a in place upon at this private address
46:31
state can be routed Tom finish for implementation traders net
46:35
network address translation Tom
46:39
which can be done a couple different ways
46:42
static network address translation means that one to one mapping you're going to
46:46
manually going in
46:47

and say this public address is


46:51
mapped this private address saw one the one that pic
46:55
static NAT is used for things like public servers that a company would have
47:00
so if I have any mail server
47:01
Tom gonna have a public IP address
47:05
on a my router interface connected to the ISP
47:09
I'm gonna put in a static nah statement that maps that too
47:13
whatever private address my email services dynamic address translation
47:18
automatically assigns the public addresses to internal addresses the
47:23
problem with dynamic address translation
47:25
is a once it
47:28
assigns an address a public address to an internal
47:32
it can assign that public want to any other internal addresses
47:35
so dynamic address translation you would see
47:39
company have a pool IPAddress maybe they have
47:42
10 public addresses dynamic address translation would hand those out one at
47:47
a time
47:48
watched in private addresses for Matt
47:52
know whether private address would would be able to be maps another host would be
47:56
able to get out to the
47:57
internet port address translation
48:00
takes care their problem and and port addressed translation or
48:03

at is the most common form a net on


48:07
it basically means that ship one public address
48:10
and it can be mapped to as many private ones as you want to
48:15
in the way that it does that a is it assigns a port number
48:19
every time it maps for public address to a private one
48:23
the map support number as well
48:26
and it gives each private host a different port number so
48:30
even though we only have one address been mapped multiple times
48:34
our routers
48:37
can still determined where the packets need to go based on the port that it a
48:41
sin
48:41
to look at figure 5-7 in your textbook
48:46
a speeches to very simple basic
48:49
example get a server or router that is running that
48:54
it's connected to the inner internet Tom
48:58
all other hosts are connected to the server router
49:01
would be via switch scattering them
49:04
really more simple than it should be but a
49:10
all it is work stations are using private address
49:13
I'm so the request originate from one IP address
49:17
a
49:19
but as they hit this server this router running NAT
49:22

they get translated into this single registered IP address that we have for
49:28
years
49:28
everything in sight here to anything on the internet
49:32
is gonna look like this public a piece on that this is something else forces
49:36
will
49:36
and what it is is it hides
49:40
our internal IP addresses to anybody were to run a scan
49:44
from the internet and find this interface
49:48
they would not be able to find the actual addresses that these host inside
49:53
the network
49:53
so lot of time nap grounds on your
49:56
your firewall whatever that perimeter devices that's what's going to be
50:00
running
50:00
net server router firewall there's different devices
50:03
can put in there so here's here's the thing he did to really understand
50:08
I am you need to understand how public address
50:12
is different from a private address what can an IP version
50:16
six etter she's for the host portion did
50:20
IP version 4 cannot makes you look at examples in your book
50:24
IP version 6 addresses kiss at the give examples of all the
50:29
different types who lived through definitely know the difference between
50:35
a row trouble protocol in a routing protocol
50:38

I'm so you should know what it is that makes a protocol row double
50:41
them
50:44
you need to understand the difference between a router in a switch
50:49
up
50:51
what what a router does it can't find a destination network and its routing
50:56
table
50:57
be able to explain how subnet mask identifies a network portion
51:02
up an address so go through the exercise it into the book
51:08
it's good to have you do an IP config the nature address sure
51:12
lease period you can actually release and renew your address
51:19
and gonna have you disconnect from switching do that as well
51:25
so a.m.
51:28
so this this then the chapter 5 on this their numbering system IP version 4 in
51:33
version 6
51:34
as well as Mac addresses com also a paper
51:37
addressing a routing in route uble protocols
51:43
a and
51:45
network address translation
Uploaded on 9 Feb 2012

Category

You might also like