0% found this document useful (0 votes)
36 views37 pages

Data Communications - PPTX Chapter 6 TCPIP

data com

Uploaded by

Nabek Deresa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views37 pages

Data Communications - PPTX Chapter 6 TCPIP

data com

Uploaded by

Nabek Deresa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Introduction to Data Communication and

Computer Network

Chapter 6
IP Addressing and Sub Divided Network (Subnetting)

BITS College

Prepared by: Anteneh Kassaye


7/3/2024
Reference for this Chapter

 CCNA – official Cert guide (Chapter 11,12,13,14 . From Page 318 to 396)
 COMPTIA Network+ study book ( Tamare Dean, Chapter 11,Page 415 to
456 )
Common ICONS used in networking
Introduction
 Networks work correctly because the various devices and
software follow the rules.
 Those rules come in the form of standards and protocols, which
are agreements of a particular part of how a network should
work.
 Today, TCP/IP rules as the most pervasive networking model in
use.
 Every computer operating system (OS) in existence, from mobile
phones to mainframe computers, support for TCP/IP.
TCP/IP Networking model
 A networking model or framework, sometimes also called either a
networking architecture or networking blueprint, refers to a
comprehensive set of documents.
 Individually, each document describes one small function required
for a network; collectively, these documents define everything that
should happen for a computer network to work.
 Some documents define a protocol, which is a set of logical rules
that devices must follow to communicate. Other documents define
some physical requirements for networking.

 For example, a document could define the voltage and current


levels used on a particular cable when transmitting data.
History of TCP/IP
 Once upon a time, networking protocols didn’t exist, including
TCP/IP.

 Vendors created their own protocols and it only supported that


vendor’s computers.
o For example, IBM, the computer company with the largest market share
back in the 1970s and 1980s, published its Systems Network Architecture
(SNA) networking model in 1974.

 Today, the world of computer networking uses one networking


model: TCP/IP.
History of TCP/IP

Historical Progression: Proprietary Models to the Open TCP/IP Model


TCP/IP
 The International Organization for Standardization (ISO) took on
the task to create such a model, starting as early as the late 1970s,
on Open Systems Interconnection (OSI) networking model.

 ISO had a noble goal for the OSI model: to standardize data
networking protocols to allow communication among all computers
across the entire planet.

 A second, less-formal effort to create an open, vendor-neutral,


public networking model sprouted forth from a U.S. Department of
Defense (DoD) contract.
Overview of TCP/IP Network Model
 To define a protocol, TCP/IP uses documents called Requests For
Comments (RFC).

 The TCP/IP model also avoids repeating work already done by some
other standards body or vendor consortium by simply referring to
standards or protocols created by those groups.
o For example, IEEE defines Ethernet LANs; the TCP/IP model does not define
Ethernet in RFCs, but refers to IEEE Ethernet as an option.

 To help people understand, each model breaks into a small number


of categories called layers.
TCP/IP Model
 The TCP/IP model shows the more common terms and
layers used when people talk about TCP/IP today.
 The bottom layer focuses on how to transmit bits over
each individual link.
 The data-link layer focuses on sending data over one
type of physical link: for instance, networks use
different data-link protocols for Ethernet LANs versus
wireless LANs.
 The network layer focuses on delivering data over the
entire path from the original sending computer to the
final destination computer.
 And the top two layers focus more on the applications
that need to send and receive data.
The TCP/IP Model
TCP/IP Application Layer
 Application layer protocols provide services to the application
software running on a computer. The application layer does not
define the application itself, but it defines services that
applications need.
o For example, application protocol HTTP defines how web browsers can
pull the contents of a web page from a web server.

 In short, the application layer provides an interface between


software running on a computer and the network itself.
o The most popular TCP/IP application today is the web browser.
HTTP
 What really happens to allow that web page to appear on your web
browser?

 Imagine that Bob opens his browser. His browser has been
configured to automatically ask for web server default web page,
or home page. The general logic looks like
IPv4 Addressing

 Most entry-level networking jobs require you to operate and


troubleshoot a network using a preexisting IP addressing and
subnetting plan.

 This Chapter assesses your readiness to use preexisting IP


addressing and subnetting information to perform typical
operations tasks, such as monitoring the network, reacting to
possible problems, configuring addresses for new parts of the
network, and troubleshooting those problems.
Introduction to Subnet Masking
 You start with one network, but it is just one large network. As
a single large entity, it might not be useful, and it is probably
far too large.

 To make it useful, you chop it into smaller pieces, called


subnets.

 Simply Defined:
o An IP subnet is a subset of a Class A, B, or C network.
o In fact, the word subnet is a shortened version of the phrase subdivided
network.
Example of Class B network subnet
Determine the number of Subnets
 To determine the number of subnets required, you must think
about the internetwork that need a subnet. Examples, LAN, VLAN
(may be different departments need separate LANs), WANs and so
on.
Determine the Number of Hosts per
Subnet
Classful IP Networks Before
Subnetting
 Before subnetting a classful network, the network is a single group
of addresses. In other words, a network which is not yet subdivided
into many smaller subsets called subnets.
Masks and Mask formats
 A subnet consists of a group of consecutive numbers. Most of these
numbers can be used as IP addresses by hosts.
 However, each subnet reserves the first and last numbers in the
group, and these two numbers cannot be used as IP addresses. In
particular, each subnet contains the following:

o Subnet number: Also called the subnet ID or subnet address, this number
identifies the subnet. It is the numerically smallest number in the subnet.
o Subnet broadcast: Also called the subnet broadcast address or directed
broadcast address, this is the last (numerically highest) number in the
subnet.
o IP addresses: All the numbers between the subnet ID and the subnet
broadcast address can be used as a host IP address.
Number of Hosts per Network
 Calculating the number of hosts per network requires some basic
binary math.
o First, consider a case where you have a single binary digit. How many
unique values are there? There are, of course, two values: 0 and 1.
o With 2 bits, you can make four combinations: 00, 01, 10, and 11.
o As it turns out, the total combination of unique values you can make with N
bits is 2N.
 Host addresses—the IP addresses assigned to hosts—must be unique.
So, with H host bits, 2H unique combinations exist. However, the
number of hosts in a network is not 2H; instead, it is 2H – 2.
 Each network reserves two numbers: one for the network ID and
one for the network broadcast address.
Exercise on Subnets
 Example on Class c:
 Consider 192.168.2.0 Network Address with Classful subnetting
255.255.255.0
 How many subnets can we create from this network?
 Class exercise on Creating 5 different network using class C
network
Practice on network address
 Practice finding the various facts that can be derived from an IP
address, as discussed throughout this chapter.
Practice on network address
 Practice finding the various facts that can be derived from an IP
address, as discussed throughout this chapter. (answer)
Analyzing Subnet Mask
 The subnet mask holds the key to understanding several important
subnetting design points. However, to analyze a subnet mask, you
first need some basic math skills with masks. The math converts
masks between the three different formats used to represent a
mask:

o Binary
o Dotted-decimal notation (DDN)
o Prefix (also called Classless Inter-Domain Routing [CIDR])
Subnet Mask Formats
 Subnet masks can be written as 32-bit binary numbers, but not just
any binary number. In particular, the binary subnet mask must
follow these rules:

o The value must not interleave 1s and 0s.


o If 1s exist, they are on the left.
o If 0s exist, they are on the right.
Subnet Mask Formats
 For example, the following values would be illegal. The first is
illegal because the value interleaves 0s and 1s, and the second is
illegal because it lists 0s on the left and 1s on the right
o 10101010 01010101 11110000 00001111
o 00000000 00000000 00000000 11111111

 The following two binary values meet the requirements, in that


they have all 1s on the left, followed by all 0s, with no interleaving
of 1s and 0s:
o 11111111 00000000 00000000 00000000
o 11111111 11111111 11111111 00000000
Subnet Mask Formats
 Two alternative subnet mask formats exist in today's notation
 One format, dotted-decimal notation (DDN), converts each set of 8 bits into
the decimal equivalent. For example, the two previous masks would convert
• 255.0.0.0
• 255.255.255.0
 The third mask format was added in the early 1990s: the prefix format.
 It takes advantage of the rule that the subnet mask starts with some number of
1s, and then the rest of the digits are 0s. Prefix format lists a slash (/) followed
by the number of binary 1s in the binary mask.
o Using the same two examples as earlier in this section, the prefix format equivalent
masks are as follows:
• /8
• /24
Nine Possible Values in One Octet of
a Subnet Mask
Finding subnet ID
 The following written process lists all the steps to find the subnet ID, using only
decimal math. For each octet:
o Step 1. If the mask octet = 255, copy the decimal IP address.
o Step 2. If the mask octet = 0, write a decimal 0.
o Step 3. If the mask is neither, refer to this octet as the interesting octet:
• A. Calculate the magic number as 256 – mask.
• B. Set the subnet ID’s value to the multiple of the magic number that is closest to the IP
address without going over.
o Example: 130.4.102.1, mask 255.255.240.0. (below is how it is done)
130 4 102 1
255 255 240 0
130 4 256-240= 16; 16x6= 96 0
o  Subnet ID is 130.4.96.0
Finding subnet Broadcast Address
 The following written process lists all the steps to find the broadcast Address.
o Step 1. If the mask octet = 255, copy the subnet ID.
o Step 2. If the mask octet = 0, write 255.
o Step 3. If the mask is neither, identify this octet as the interesting octet:
• A. Calculate the magic number as 256 – mask.
• B. Take the subnet ID’s value, add the magic number, and subtract 1 (ID + magic – 1)

o Example: 130.4.102.1, mask 255.255.240.0. (below is how it is done)


130 4 102 1
255 255 240 0
130 4 256-240= 16; 96+16-1= 111 255
o That makes the subnet broadcast address 130.4.111.255.
Exercises
 Given IP Address and Subnet mask as follow, find network address
and broadcast address
 150.30.198.1, 255.255.224.0

o Find subnet ID and broadcast address.


Several network connected by router
Class Exercises
Subnetting - 5 Steps
1. Identify the class of the IP address and note the Default Subnet
Mask
2. Convert the Default Subnet Mask into Binary
3. Note the number of hosts required per subnet and find the Subnet
Generator (SG) and Octet Position
4. Generate the new Subnet Mask
5. Use the SG and generate the network ranges (subnets) in the
appropriate octet position.

Example: Subnet the IP Address 216.21.5.0 into 30 hosts in each


subnet
o Find subnet ID and broadcast address of each subnets.
Exercises
1. Subnet the IP Address 196.10.20.0 into 52 hosts in each subnet
o Find subnet ID and broadcast address of each subnets.

2. Subnet the IP Address 10.0.0.0 into 100 hosts in each subnet


o Find subnet ID and broadcast address of each subnets. Also how
many hosts per network and how many networks are there?

3. An organization has a class B network and wishes to form subnets


for 64 departments. The new subnet mask would be?
Home Exercise

1. Subnet the IP Address 166.70.0.0 into 1000 hosts in


each subnet
o Find subnet ID and broadcast address of each
subnets.
o How many hosts per network does each subnet has?
o How many subnetworks are there?

You might also like