Professional Documents
Culture Documents
Objectives: By the end of this training session, the student will be:
familiar with RouterOS software and RouterBoard
products. He will also be able to configure, manage, do
basic troubleshooting of a MikroTik router and provide
basic services to clients.
Target Audience:
Network engineers and technicians wanting to deploy and support:
Corporate networks
Client CPEs (WISPs and ISPs)
Course prerequisites: The student must have a good understanding of TCP/IP and
subnetting.
CLOUD FOR NETWORK
Various
Certified as Cisco (CCNA R&S , Security , VoIP , CCDA , Service Provider , Wireless , Data
Center , CCNP R&S , CCNP Security , CCNP Service Provider and Cisco networking
academy )
TCP/IP Review
The Open Systems Interconnection (OSI) model is the most widely known
internetwork reference model. It is used for data network design,
operation specifications, and troubleshooting.
Data Encapsulation
Each layer communicating with its peer layer adds protocol information to
ensure proper delivery.
This process when the new header is added is called the Encapsulation.
Receiving device on each layer read proper information after that remove
this information and handled data to the next layer up this process called
the De-Encapsulation.
Data Encapsulation
10
The Application layer: Layer seven, is the top layer of the OSI model Application layer
protocols are used to exchange data between programs running on the source and
destination hosts. Examples DHCP , DNS , Telnet, Email server and FTP server.
Transport layer: The processes described in the OSI Transport layer accept data from
the Application layer and prepare it for addressing at the Network layer. The Transport
layer is responsible for the overall end-to-end transfer of application data.
Network layer: The Network layer, or OSI Layer 3, provides services to exchange the
individual pieces of data over the network between identified end devices . Identifier of
network layer is IP address like 192.168.1.1
11
Data link layer :The data link layer is the protocol layer that transfers data between
adjacent network nodes in a wide area network or between nodes on the same local
area network segment.
Physical layer:The OSI Physical layer provides the means to transport across the
network media the bits that make up a Data Link layer frame.
12
Example: 00:0C:42:20:97:68
Example: 159.148.60.20
13
Subnets
Both network and broadcast address are reserved and cannot be used.
14
Subnets
Class
Network
Broadcast
Subnet
1.0.0.0
127.255.255.255
255.0.0.0 /8
128.0.0.0
191.255.255.255
255.255.0.0 /16
192.0.0.0
223.255.255.255
255.255.255.0 /24
D (multicast)
224.0.0.0
239.255.255.255
255.255.255.0/28
E (reserved)
240.0.0.0
255.255.255.255
Not defined
15
Subnets
Class
Network
Broadcast
Subnet
10.0.0.0
10.255.255.255
255.0.0.0 /8
172.16.0.0
172.31.255.255
255.240.0.0 /12
192.168.0.0
192.168.255.255
255.255.0.0 /16
Private IP Address
16
Subnets
Identification
CIDR
Network
Broadcast
Loopback addresses
127.0.0.0/8
127.0.0.0
127.255.255.255
169.254.0.0/16
172.16.0.0
172.31.0.0
Test Net 1
192.0.2.0/24
192.0.2.0
192.0.2.255
Test Net 2
198.51.100.0/24
192.168.51.100.0
192.168.51.100.255
Test Net 3
203.0.113.0/24
203.0.113.0
203.0.113.255
Reserved IP Addresses
17
Subnets
Subnet
Subnet Mask
Available Host
/32
255.255.255.255
Host itself
/30
255.255.255.252
4-2
/29
255.255.255.248
8-2
/28
255.255.255.240
16-2
/27
255.255.255.224
32-2
/26
255.255.255.192
64-2
/25
255.255.255.128
128-2
/24
255.255.255.0
256-2
18
Example
You have Main IP address 192.168.1.0 and you want to subnetting this main IP
to 8 Network and inside each network 30 available addresses to be assigned
to the end devices.
11111111.11111111.11111111.11111111
11111111.11111111.11111111.11100000
255.255.255.224 or /27
11111111.11111111.11111111.11100000
The last 1 one the left most considered as hop count between networks
19
Example
Networks
Available Host
Broadcast
192.168.1.0
192.168.1.1-192.168.1.1
192.168.1.31
192.168.1.32
192.168.1.33-192.168.1.62
192.168.1.63
192.168.1.64
192.168.1.65-192.168.1.94
192.168.1.95
192.168.1.96
192.168.1.97-192.168.1.126
192.168.127
192.168.1.128
192.168.1.129-192.168.1.158
192.168.1.159
192.168.1.160
192.168.1.161-192.168.1.190
192.168.1.191
192.168.1.192
192.168.1.193-192.168.1.222
192.168.1.223
192.168.1.224
192.168.1.225-192.168.1.254
192.168.1.254
20
Network Design
21
Network Design
The subnet musk that can work on all networks and satisfied conditions?
Begin your network design by give IP address and subnet to small network like
point to point network and choose subnet with least lose of IP address .
Move to larger network by give them subnet and network ID that satisfied the
following .
Number of subnets or networks in your location.
Number of Hosts (PCs) in each network .
22
Network Design
Step 1 :choose subnet to your point to point network as the following :
23
Network Design
Step 2 : Choose subnet mask according number of hosts and subnets :
24
Selecting IP Address
Select your subnet according number of host required in your local network .
Choosing the best subnet helping you to use ip addresses in that subnet with least
loose.
25
26
Client A
192.168.0.200/26
Network
Available address
Network
Available address
192.168.0.0
192.168.0.1-192.168.0.62
192.168.0.0
192.168.0.1-192.168.0.126
192.168.0.64
192.168.0.65-192.168.0.126
192.168.0.128
192.168.0.129-192.168.0.254
192.168.0.128
192.168.0.129-192.168.0.190
192.168.0.192
192.168.0.193-192.168.0.254
End of TCP/IP
28