Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Similar documents
Lecture (08) Fundamentals of WANs (II)

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (02) The TCP/IP Networking Model

Lecture (06) Network Access layer LAN, & WAN. Agenda. By: Dr. Ahmed ElShafee. Ethernet Framing (2) Ethernet Framing What is MAN?

Lecture (03) (I) OSI Reference Model

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (05) Network Access layer fundamentals II LAN, & WAN

Lecture (08) Internetwork Layer II

Lecture (02) The TCP/IP Networking Model

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Lecture (07) Fundamentals of WANs (I)

Cisco Cisco Certified Network Associate (CCNA)

OSI Network Layer. Chapter 5

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

Lecture (03) Network Model

IP Addressing - Subnetting

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Lecture (04 & 05) Data link layer fundamental

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Chapter 6 Addressing the Network- IPv4

NetWare Link-Services Protocol

Linux System Administration

OSI Data Link & Network Layer

Chapter 6: Network Communications and Protocols

OSI Data Link & Network Layer

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

OSI Data Link & Network Layer

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Lecture (03) Data Encapsulation. Network Layer (Physical/Data link)

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Imi :... Data:... Nazwisko:... Stron:...

IP: Addressing, ARP, Routing

Frame Relay. Frame Relay Information 1 of 18

ICND1 Open-Ended Questions

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

7010INT Data Communications Lecture 7 The Network Layer

Introduction to Internetworking

Part II. Chapter 6. Frame Relay

CCNA 4 - Final Exam Answers

Chapter Motivation For Internetworking

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

CCNA 4 - Final Exam (A)

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

TCP/IP Protocol Suite and IP Addressing

CCNA 4 - Final Exam (B)

Defining Networks with the OSI Model. Module 2

Introducing Frame Relay

IP Address Assignment

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

IP Routing & Bridging

TCP/IP and the OSI Model

1: Review Of Semester Provide an overview of encapsulation.

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee

Using Serial Ports to Connect to ATM with DXI Encapsulation

WAN technology which are to be discussed:

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

Chapter 7. Local Area Network Communications Protocols

WAN Technologies CCNA 4

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4

Introduction to Protocols

Lecture (04) Network Layer (Physical/Data link) 2

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Hands-On Network Security: Practical Tools & Methods

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

Lecture 8 Network Layer: Logical addressing

Internetwork Protocols

Ch. 4 - WAN, Wide Area Networks

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Lecture (01) Determining IP Routes (1)

Overview. Cisco 805 Router Overview CHAPTER

Cisco IP Addressing and Subnetting for New Users

The Internet Protocol (IP)

CCNA MCQS with Answers Set-1

PPP. Point-to-Point Protocol

Module 7 Internet And Internet Protocol Suite

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Internetwork Basic. Possible causes of LAN traffic congestion are

Introduction to Open System Interconnection Reference Model

Internet Protocols (chapter 18)

Ethereal Exercise 2 (Part A): Link Control Protocol

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats

TestsDumps. Latest Test Dumps for IT Exam Certification

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Online Documentation: To access the online documentation for this and other Novell products, and to get updates, see

1 Connectionless Routing

material. For more information on how to get additional questions, please see a.

Network Devices,Frame Relay and X.25

Implementing Enterprise WAN Links

Computer Networks Question Bank

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Transcription:

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing ٢ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs WAN protocols used on point to point serial links provide the basic function of data delivery across that one link. The two most popular data link protocols used on point topoint links are High Level Data Link Control (HDLC) and Point to Point Protocol (PPP). ٣ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (2) 1. HDLC HDLC performs OSI Layer 2 functions, Arbitration Determines when it is appropriate to use the physical medium Addressing Ensures that the correct recipient(s) receives and processes the data that is sent Error detection Determines whether the data made the trip across the physical medium successfully Identifying the encapsulated data Determines the type of header that follows the datalink header ٤ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (3) 1. Arbitration HDLC is very simple as compared with Ethernet Ethernet uses CSMA/CD algorithm arbitrates point to point serial link, each router can send over the fourwire (two pair) circuit at any time, so there is no need for any kind of a arbitration. ٥ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (4) HDLC defines framing that includes an 1. address field, 2. frame check sequence (FCS) field, 3. And a protocol type field. These three fields in the HDLC frame help provide the other three functions of the data link layer. ٦ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (5) 2. Addressing HDLC defines a 1 byte address field, although on point topoint links, it is not really needed. In the past HDLC was used for a multidrop circuit. With a multidrop circuit, one central site device could send and receive frames with multiple remote sites. HDLC defined the address field to identify the different remote sites on a multidrop link. Now HDLC used for point to point links so address is not used, routers insert decimal 3 into address field. ٧ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (6) 3. Error Detection HDLC performs error detection just like Ethernet it uses an FCS field in the HDLC trailer. And just like Ethernet, if a received frame has errors in it, the frame is discarded, with no error recovery performed by HDLC. 4. Identifying the encapsulated data HDLC performs the function of identifying the encapsulated data just like Ethernet as well. When a router receives an HDLC frame, it wants to know what type of packet is held inside the frame. ٨ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (7) 2. Point to Point Protocol Comparing the basics, PPP behaves exactly like HDLC 1. There is an address field, but the addressing does not matter. ٩ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II 2. PPP does discard errored frames that do not pass the FCS check. 3. And PPP uses a 2 byte Protocol Type field although PPP s Protocol Type field is defined by the protocol ١٠ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (8) PPP unique features fall into two main categories: 1. Those needed regardless of the Layer 3 protocol sent across the link 2. Those specific to each Layer 3 protocol Each link that uses PPP has one LCP (link control protocol) per link and one CP (control protocol) for each Layer 3 protocol defined on the link. ١١ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (9) Link Control Protocol (LCP), focuses on the features that apply regardless of the Layer 3 protocol used. LCP performs most of its work when the line comes up, so it has a lot more work to do with dialed links, which come up and down a lot, versus leased lines, which hopefully seldom fail. ١٢ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (10) ١٣ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (11) IP Control Protocol (IPCP) (type of LC) provides for IP address assignment over a PPP link. When a user dials a new connection to an ISP using a modem, PPP typically is used, with IPCP assigning an IP address to the remote PC. If a router is configured for IPX, AppleTalk, and IP on a PPP serial link, the router configured for PPP encapsulation automatically tries to bring up the appropriate controlprotocols for each Layer 3 protocol. ١٤ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

١٥ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (12) 3. Other Point to Point WAN Data Link Protocols WAN data link protocols can be compared relative to two main attributes. 1. First, some protocols do support multiprotocol traffic by virtue of having a defined protocol type field. 2. Also, some protocols actually perform error recovery so when the receiving end notices that the received frame did not pass the FCS check, it causes the frame to be resent. ١٦ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (13) ١٧ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (14) Synchronization Both of HDLC and PPP are synchronous. Synchronous means sending and receiving ends uses the same clock. it is expensive to build devices that truly can operate at exactly the same speed. So, the devices operate at close to the same speed and listen to the speed of the other device on the other side of the link. One side makes small adjustments in its rate to match the other side. ١٨ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

١٩ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (16) Frame Relay Frame Relay networks are multi access networks, which means that more than two devices can attach to the network, similar to LANs. To support more than two devices, the protocols must be a little more detailed. ٢٠ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (17) Frame Relay uses the same Layer 1 features as a point topoint leased line. For a Frame Relay services, a leased line is installed between each router and a nearby Frame Relay switch; these links are called access links. The access links run the same speeds and use the same signaling standards as do point to point leased lines. ٢١ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (18) Each frame header holds an address field called a data link connection identifier (DLCI). The WAN switch forwards the frame, based on the DLCI, through the provider s network until it gets to the router on the other side of the network. so that it s called packet switching service, and that s the main difference between point2point and frame relay. ٢٢ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

٢٣ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (19) Frame Relay protocols resemble OSI Layer 2 protocols; the term usually used for the bits sent by a Layer 2 device is frame the Frame Relay switches are called DCE, and the customer equipment routers, in this case are called DTE DCE refers to the device providing the service, and the term DTE refers to the device needing the frame switching service. ٢٤ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (20) At the same time, the CSU/DSU provides clocking to the router, so from a Layer 1 perspective, the CSU/DSU is still the DCE and the router is still the DTE. It s just two different uses of the same terms. ٢٥ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (21) The logical path between each pair of routers is called a Frame Relay permanent virtual circuits (PVCs). When R1 needs to forward a packet to R2, it encapsulates the Layer 3 packet into a Frame Relay header and trailer and then sends the frame. R1 uses a Frame Relay address called a DLCI in the Frame Relay header. ٢٦ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (22) Permanent virtual circuit (PVC) is the main feature of frame relay over p2p Figure shows connecting 3 sites using 3 leased lines and 3 frame relay switches ٢٧ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (23) In the example, both VCs terminating at R1 use the same access link. So, with large networks with many WAN sites that need to connect to a central location, only one physical access link is required from the main site router to the Frame Relay network. If point to point links were used, a physical circuit, a separate CSU/DSU, and a separate physical interface on the router would be required for each point to point link. So, Frame Relay enables you to expand the WAN but add less hardware to do so. ٢٨ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II

OSI Layer 2 of WANs (24) Frame Relay is designed with the concept of a committed information rate (CIR). Each VC has a CIR, which is a guarantee by the provider that a particular VC gets at least that much bandwidth. You can think of CIR of a VC like the bandwidth or clock rate of a point to point circuit, except that it s the minimum value you can actually send more, in most cases. ٢٩ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II Internetwork layer ٣٠

Introduction Typical features of OSI layer 3 OSI layer 3 or network layer, or internet layer in case of TCP/IP protocol is a protocol that defines routing and addressing Such as Connectionless Network Services (CLNS), Internet Protocol (IP), Novell Internetwork Packet Exchange (IPX), or AppleTalk Dynamic Data Routing (DDR) network layer protocols have many similarities. ٣١ Introduction (2) Routing (Path Selection) Routing focuses on the end to end logic of forwarding data. Figure shows a simple example of how routing works. The logic seen in the figure is relatively simple. For PC1 to send data to PC2, it must send something to R1, when sends it to R2, then on to R3, and finally to PC2. ٣٢

Introduction (3) PC1 s Logic: Sending Data to a Nearby Router In this example, PC1 has some data to send data to PC2. Because PC2 is not on the same Ethernet as PC1, PC1 needs to send the packet to a router that is attached to the same Ethernet as PC1. The sender sends a data link frame across the medium to the nearby router; this frame includes the packet in the data portion of the frame. ٣٣ Introduction (4) That frame uses data link layer (Layer 2) addressing in the data link header to ensure that the nearby router receives the frame. The main point here is that the originator of the data does not know much about the network just how to get the data to some nearby router. PC1 needs to know only how to get the packet to R1. ٣٤

Introduction (5) R1 and R2 s Logic: Routing Data Across the Network R1 and R2 both use the same general process to route the packet The routing table contains one entry per group of addresses The router compares the destination network layer address in the packet to the entries in the routing table The matching entry in the routing table tells this router where to forward the packet next. ٣٥ Introduction (6) Likewise, in Figure everyone in this the network whose IP address starts with 168.1 is on the Token Ring on which PC2 resides, So the routers can just have one routing table entry that means all addresses that start with 168.1. Eventually, the packet is delivered to the router connected to the network or subnet of the destination host (R3), ٣٦

Introduction (7) R3 s Logic: Delivering Data to the End Destination R3 needs to forward the packet directly to PC2, not to some other router. ٣٧ Network Layer Interaction with the Data Link Layer four different types of data links were used to deliver the data When the network layer protocol is processing the packet, it decides to send the packet out the appropriate data link layer. the data link layer adds the appropriate header and trailer to the packet, creating a frame, before sending the frames over each physical network. ٣٨

The network layer processes deliver the packet end to end, using successive data link headers and trailers just to get the packet to the next router or host in the path. the PCs and routers must have some way to decide what datalink addresses to use Address Resolution Protocol (ARP) is used to dynamically learn the data link address of an IP host connected to a LAN. ٣٩ One key feature of network layer addresses is that they were designed to allow logical grouping of addresses (routing process) In TCP/IP, this group is called a network or a subnet. In IPX, it is called a network. In AppleTalk, the grouping is called a cable range. Just like postal street addresses, network layer addresses are grouped based on physical location in a network ٤٠

In each of these network layer protocols, all devices on opposite sides of a router must be in a different Layer 3 group. The routing tables for each network layer protocol can have one entry for the group, Imagine an Ethernet with 100 TCP/IP hosts. A router needing to forward packets to any of those hosts needs only one entry in its IP routing table. This basic fact is one of the key reasons that routers can scale to allow tens and hundreds of thousands of devices ٤١ The same logic of people in the same ZIP code live near to each other. If that local town wants to add streets, the rest of the post offices in the country already are prepared because they just forward letters based on the ZIP code, which they already know. The only postal employees who care about the new streets are the people in the local post office. Also, you can have duplicate local street addresses, as long as they are in different ZIP codes, and it all ٤٢ still works.

Example Layer 3 Address Structures Each Layer 3 address structure contains at least two parts. One (or more) part at the beginning of the address works like the ZIP code and essentially identifies the grouping. All addresses with the same value in the first part are in the same group for example, the same IP subnet or IPX network or AppleTalk cable range. The last part of the address acts as a local address, uniquely identifying that device in that particular group ٤٣ Routing Protocols In most cases, routing table entries are built dynamically by use of a routing protocol. Routing protocols learn about all the locations of the network layer groups in a network. Routing protocols define message formats and procedures to build the routing table. The end goal of each routing protocol is to fill the routing table with all known destination groups and with the best route to reach each group. ٤٤

routers uses the Routing Information Protocol (RIP) to learn the routes IP protocol called routed protocol, which is responsible of packet forwarded, or routed, through a network. ٤٥ IP Addressing Definitions If a device wants to communicate using TCP/IP, it needs an IP address. Any device that can send and receive IP packets is called an IP host. IP addresses consist of a 32 bit number, usually written in dotted decimal notation For instance, 168.1.1.1 is an IP address written in dotteddecimal form Each of the decimal numbers in an IP address is called an octet which is a byte. The range of decimal numbers in each octet is between 0 and ٤٦ 255, inclusive.

computer s network card has an IP address. If you put two Ethernet cards in a PC to forward IP packets through both cards, they both would need unique IP addresses. Similarly, routers, which typically have many network interfaces that forward IP packets, have an IP address for each interface. ٤٧ How IP Addresses Are Grouped Together For example, all IP addresses that begin with 8 are on the Token Ring on the left. Likewise, all IP addresses that begin with 130.4 are on the right. Along the same lines, 199.1.1 is the prefix on the serial link. By following this convention, the routers build a routing table with three entries, one for each prefix, or network number. ٤٨

So, the general ideas about how IP address groupings can be summarized are as follows: All IP addresses in the same group must not be separated by a router. IP addresses separated by a router must be in different groups. ٤٩ Classifying IP Addresses In IP addressing scheme, some arbitrary number of bits for it is assigned an for network ID, The remaining bits then be used for the host ID. suppose that half of the address (16 bits) would be used for the network, the remaining 16 bits used for the host ID. result of that scheme would be 65,536 networks, each of those networks could have 65,536 hosts. Suppose that a network of 1,000 computers joins the Internet and is assigned one of these hypothetical network IDs, that network then wast 64,000 IP addresses for hosts. ٥٠

Solution, is IP address classes The IP protocol defines five different address classes: A, B, C, D, and E. of the first three classes, A C, uses a different size for the network ID and host ID portion of the address. Class D is for a special type of address called a multicast address. Class E is an experimental address class that isn t used. ٥١ ٥٢

The first four bits of the IP address are used to determine into which class a particular address fits, as follows: If the first bit is zero, the address is a Class A address 0xxx If the first bit is one and if the second bit is zero, the address is a Class B address. 10xx If the first two bits are both one and if the third bit is zero, the address is a Class C address. 110x If the first three bits are all one and if the fourth bit is zero, the address is a Class D address 1100 If the first four bits are all one, the address is a Class E address. 1111 ٥٣ ٥٤

Class A addresses Class A addresses are designed for very large networks, as only eight bits are allocated to the network, first of these bits is used to indicate that the address is a Class A, only 126 Class A networks can exist in the entire Internet. The last 3 octets are used for hosts, so each network can accommodate more than 16 million hosts. Only about 40 Class A addresses are actually assigned to companies or organizations, The rest are either reserved by ٥٥ Internet Assigned Numbers Authority (IANA) ٥٦

٥٧ Class B addresses the first two octets of the IP address are used as the network ID, and the second two octets are used as the host ID. in order to indicate that the address is Class B the first two bits of the first octet are required to be 10, As a result, a total of 16,384 Class B networks can exist. Each Class B network can accommodate more than 65,000 hosts. ٥٨

The problem with Class B networks is that even though they are much smaller than Class A networks, they still allocate far too many host IDs. ٥٩ Note: Class A addresses end with126.x.y.z, and Class B addresses begin with 128.x.y.z. What happened to 127.x.y.z? This special range of addresses is reserved for loopback testing, so these addresses aren t assigned to public networks. ٦٠

Class C addresses the first three octets are used for the network ID, and the fourth octet is used for the host ID. with 24 network ID bits, Class C addresses allow for more than 2 million networks, each Class C network can accommodate only 254 hosts The problem with Class C networks is that they re too small. ٦١ Subnetting A subnet is a network that falls within a Class A, B, or C network. Subnets are created by using one or more of the Class A, B, or C host bits to extend the network ID. Thus, instead of the standard 8, 16, or 24 bit network ID, subnets can have network IDs of any length. Following Figure shows an example of a network before and after subnetting has been applied. In the unsubnetted network, the network has been assigned the Class B address 192.168.0.0. All the devices on this network must share the same broadcast domain. ٦٢

٦٣ In the second network, the first four bits of the host ID are used to divide the network into two small networks, identified as subnets 16 and 32. To the outside world (that is, on the other side of the router), these two networks still appear to be a single network identified as 192.168.0.0. For example, the outside world considers the device at 192.168.1.2 to belong to the 192.168.0.0 network. As a result, a packet sent to this device will be delivered to the router at 192.168.0.0. The router then considers the subnet portion of the host ID to decide whether to route the packet to subnet 1 or subnet 2. ٦٤

Subnet masks For subnetting to work, the router must be told which portion of the host ID should be used for the subnet network ID. That is accomplished by using another 32 bit number, known as a subnet mask. Those IP address bits that represent the network ID are represented by a 1 in the mask, and those bits that represent the host ID appear as a 0 in the mask. ٦٥ Subnet mask here 11111111 11111111 00000000 00000000 255 255 0 0 ٦٦

Router 11111111 11111111 11111100 00000000 255 255 252 0 PCs 11111111 11111111 11111100 00000000 255 255 252 0 ٦٧ Example Router IP 192 168 0 1 11000000 10101000 00000000 00000001 Subnet Mask 11111111 11111111 00000000 00000000 255 255 0 0 Network IP 192 168 0 0 ٦٨ PC1 IP 192 168 0 2 11000000 10101000 00000000 00000010 Subnet Mask 11111111 11111111 00000000 00000000 255 255 0 0 Network IP 192 168 0 0

Example Router IP 192 168 0 1 11000000 10101000 00000000 00000001 Subnet Mask 11111111 11111111 11111100 00000000 255 255 252 0 Network IP 192 168 0 0 ٦٩ PC1 IP 192 168 1 1 11000000 10101000 00000001 00000001 Subnet Mask 11111111 11111111 11111100 00000000 255 255 252 0 Network IP 192 168 0 0 PC2 IP 192 168 2 1 11000000 10101000 00000010 00000001 Subnet Mask 11111111 11111111 11111100 00000000 255 255 252 0 Network IP 192 168 0 0 ٧٠

Example 01 Router IP 192 168 0 1 11000000 10101000 00000000 00000001 Subnet Mask 11111111 11111111 00000000 00000000 255 255 0 0 Network IP 192 168 0 0 ٧١ PC1 in sub network 1 IP 192 168 16 1 11000000 10101000 00010000 00000001 Subnet Mask 11111111 11111111 00000000 00000000 255 255 0 0 Network IP Dr. Ahmed 192 ElShafee, ACU Fall 168 2013, Network I 0 0 PC2 PC1 in sub network 2 IP 192 168 32 1 11000000 10101000 00100000 00000001 Subnet Mask 11111111 11111111 00000000 00000000 255 255 0 0 Network IP 192 168 0 0 ٧٢

Router IP 192 168 0 1 11000000 10101000 00000000 00000001 Subnet Mask 11111111 11111111 11111111 00000000 255 255 255 0 Network IP 192 168 0 0 PC1 IP 192 168 16 1 11000000 10101000 00010000 00000001 Subnet Mask 11111111 11111111 11111111 00000000 255 255 255 0 ٧٣ Network IP Dr. Ahmed 192 ElShafee, ACU Fall 168 2013, Network I 16 0 PC2 IP 192 168 32 1 11000000 10101000 00100000 00000001 Subnet Mask 11111111 11111111 11111111 00000000 255 255 255 0 Network IP 192 168 32 0 ٧٤

Subnetting Router IP 192 168 0 1 11000000 10101000 00000000 00000001 Subnet Mask 11111111 11111111 11000000 00000000 255 255 192 0 Network IP 192 168 0 0 PC1 IP 192 168 16 1 11000000 10101000 00010000 00000001 Subnet Mask 11111111 11111111 11000000 00000000 255 255 192 0 ٧٥ Network IP Dr. Ahmed 192 ElShafee, ACU Fall 168 2013, Network I 0 0 PC2 IP 192 168 32 1 11000000 10101000 00100000 00000001 Subnet Mask 11111111 11111111 11000000 00000000 255 255 192 0 Network IP 192 168 0 0 ٧٦

Example 02 Router IP 192 168 128 1 11000000 10101000 10000000 00000001 Subnet Mask 11111111 11111111 11000000 00000000 255 255 192 0 Network IP 192 168 128 0 ٧٧ PC1 on sub network 1 IP 192 168 144 1 11000000 10101000 10010000 00000001 Subnet Mask 11111111 11111111 11000000 00000000 255 255 192 0 Network IP Dr. Ahmed 192 ElShafee, ACU Fall 168 2013, Network I 128 0 PC2 on sub network 2 IP 192 168 160 1 11000000 10101000 10100000 00000001 Subnet Mask 11111111 11111111 11000000 00000000 255 255 192 0 Network IP 192 168 128 0 ٧٨

Thanks,.. See you next week (ISA), ٧٩