Brief Notes on Networks

Similar documents
Linux System Administration

MAC Address Filtering Setup (3G18Wn)

IP Addressing and Subnetting

IP Addresses McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Network Protocols - Revision

IP addresses and Subnetting

Full file at

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Top-Down Network Design

Networking and IP Addressing TELECOMMUNICATIONS AND NETWORKING

Introduction to TCP/IP

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Binary Octet to Decimal Format Conversion

Address Class (Exercise) B A

Appendix B Networks, Routing, and Firewall Basics

6.6 Subnetting and Variable Length Subnet Masks (VLSMs)

Some Subnetting Practice Problem Solutions

CTS2134 Introduction to Networking. Module : Troubleshooting

Network Layer: Logical Addressing

The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or

Subnetting/Supernetting and Classless Addressing

Subnetting and Classless Addressing

Basics of communication. Grundlagen der Rechnernetze Introduction 31

Chapter 6 Addressing the Network- IPv4

IP Addressing and Subnetting NETWORK INFRASTRUCTURES NETKIT - LECTURE 2 MANUEL CAMPO, MARCO SPAZIANI

COSC 6377 Mid-Term #2 Fall 2000

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Lecture 12: Addressing. CSE 123: Computer Networks Alex C. Snoeren

Lab 8 (IP Addressing)

CCNA 1 Chapter 9 v5.0 Exam Answers 2013

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics

1 Connectionless Routing

5. Providing a narrower address space is the primary design goal for IPv6.

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Copyright 2011 Sakun Sharma

CS118 Discussion, Week 6. Taqi

TCP/IP Protocol Suite and IP Addressing

Chapter 8: Subnetting IP Networks

TCP/IP and the OSI Model

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

Internet Protocol Addressing and Routing. Redes TCP/IP

Chapter 06 IP Address

Subnetting/Supernetting and Classless Addressing

Table of Contents. Cisco IP Addressing and Subnetting for New Users

5.7 K E Y TE R M S 5.8 SUM M A R Y

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Network Layer/IP Protocols

End-to-End Communication

Chapter 3 LAN Configuration

IP Addressing - Subnetting

Module 4. Planning the Addressing Structure

Networks: Communicating and Sharing Resources

UIP1869V User Interface Guide

Chapter 7 LAN Configuration

R (2) Write a program to demonstrate Subneting & find the Subnet Mask.

Computer Networks Lecture -5- IPv4 Addresses. Dr. Abbas Abdulazeez

Port Forwarding Setup (RTA1025W)

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Internet Addresses (You should read Chapter 4 in Forouzan)

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

Genie Routing lab. Laboration in data communications GenieLab Department of Information Technology, Uppsala University. Overview

DATA COMMUNICATION AND NETWORKS

Port Forwarding Setup (NB7)

Addressing and Routing

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa

Configuring IPv4 Addresses

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Trio Default IP Address

On the left hand side of the screen, click on Setup Wizard and go through the Wizard.

CS519: Computer Networks. Lecture 2, part 2: Feb 4, 2004 IP (Internet Protocol)

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

IP Addresses. IP Addresses

TCP/IP. Model and Layers Bits and Number Bases IPv4 Addressing Subnetting Classless Interdomain Routing IPv6

Chapter 3 LAN Configuration

1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2.

Lab 5.6.2: Challenge RIP Configuration

Network Layer: Control/data plane, addressing, routers

Configuring PPP over Ethernet with NAT

Subnetting Questions with Detailed Answers: Subnetting Questions with Detailed Answers:

Network Defenses 21 JANUARY KAMI VANIEA 1

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats

Chapter 2: Configuring Network Protocols

Computer Networks Lab

Addressing & Subnetting

Computer Networking Fundamentals

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Virtual Private Cloud. VPC Product Introduction

Note: This case study utilizes Packet Tracer. Please see the Chapter 4 Packet Tracer file located in Supplemental Materials.

Lecture 12: Aggregation. CSE 123: Computer Networks Alex C. Snoeren

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

COMP/ELEC 429/556 Introduction to Computer Networks

Vorlesung Kommunikationsnetze

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Cisco Interconnecting Cisco Networking Devices Part 1.

Lecture 8 Network Layer: Logical addressing

Figure 11 Two-level addressing in classful addressing

Transcription:

IP ADDRESS "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs on-line communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible. An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections, ensuring that our messages, as well as our requests for data and the data we've requested, will reach their correct Internet destinations. Without this numeric protocol, sending and receiving data over the World Wide Web would be impossible.

MASK An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). Subnetting further divides the host part of an IP address into a subnet and host address (<network><subnet><host>) if additional subnetwork is needed. Use the Subnet Calculator to retrieve subnetwork information from IP address and Subnet Mask. It is called a subnet mask because it is used to identify network address of an IP address by perfoming a bitwise AND operation on the netmask. A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special purpose, and cannot be assigned to hosts. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and they cannot be assigned to hosts. Examples of commonly used netmasks for classed networks are 8-bits (Class A), 16-bits (Class B) and 24-bits (Class C), and classless networks are as follows: Class Address # of Hosts Netmask (Binary) Netmask (Decimal) CIDR /4 240,435,456 11110000 00000000 00000000 00000000 240.0.0.0 CIDR /5 134,217,728 11111000 00000000 00000000 00000000 248.0.0.0 CIDR /6 67,108,864 11111100 00000000 00000000 00000000 252.0.0.0 CIDR /7 33,554,432 11111110 00000000 00000000 00000000 254.0.0.0 A /8 16,777,216 11111111 00000000 00000000 00000000 255.0.0.0 CIDR /9 8,388,608 11111111 10000000 00000000 00000000 255.128.0.0 CIDR /10 4,194,304 11111111 11000000 00000000 00000000 255.192.0.0 CIDR /11 2,097,152 11111111 11100000 00000000 00000000 255.224.0.0 CIDR /12 1,048,576 11111111 11110000 00000000 00000000 255.240.0.0 CIDR /13 524,288 11111111 11111000 00000000 00000000 255.248.0.0 CIDR /14 262,144 11111111 11111100 00000000 00000000 255.252.0.0 CIDR /15 131,072 11111111 11111110 00000000 00000000 255.254.0.0 B /16 65,534 11111111 11111111 00000000 00000000 255.255.0.0 CIDR /17 32,768 11111111 11111111 10000000 00000000 255.255.128.0 CIDR /18 16,384 11111111 11111111 11000000 00000000 255.255.192.0 CIDR /19 8,192 11111111 11111111 11100000 00000000 255.255.224.0 CIDR /20 4,096 11111111 11111111 11110000 00000000 255.255.240.0 CIDR /21 2,048 11111111 11111111 11111000 00000000 255.255.248.0 CIDR /22 1,024 11111111 11111111 11111100 00000000 255.255.252.0 CIDR /23 512 11111111 11111111 11111110 00000000 255.255.254.0 C /24 256 11111111 11111111 11111111 00000000 255.255.255.0 CIDR /25 128 11111111 11111111 11111111 10000000 255.255.255.128

CIDR /26 64 11111111 11111111 11111111 11000000 255.255.255.192 CIDR /27 32 11111111 11111111 11111111 11100000 255.255.255.224 CIDR /28 16 11111111 11111111 11111111 11110000 255.255.255.240 CIDR /29 8 11111111 11111111 11111111 11111000 255.255.255.248 CIDR /30 4 11111111 11111111 11111111 11111100 255.255.255.252 Subnetting an IP network is to separate a big network into smaller multiple networks for reorganization and security purposes. All nodes (hosts) in a subnetwork see all packets transmitted by any node in a network. Performance of a network is adversely affected under heavy traffic load due to collisions and retransmissions. Applying a subnet mask to an IP address separates network address from host address. The network bits are represented by the 1's in the mask, and the host bits are represented by 0's. Performing a bitwise logical AND operation on the IP address with the subnet mask produces the network address. For example, applying the Class C subnet mask to our IP address 216.3.128.12 produces the following network address: IP: 1101 1000. 0000 0011. 1000 0000. 0000 1100 (216.003.128.012) Mask: 1111 1111. 1111 1111. 1111 1111. 0000 0000 (255.255.255.000) --------------------------------------------- 1101 1000. 0000 0011. 1000 0000. 0000 0000 (216.003.128.000)

MAC ADDRESS MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer. DNS SERVER Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

GATEWAY A gateway is a node (router) in a computer network, a key stopping point for data on its way to or from other networks. Thanks to gateways, we are able to communicate and send data back and forth. The Internet wouldn't be any use to us without gateways (as well as a lot of other hardware and software). In a workplace, the gateway is the computer that routes traffic from a workstation to the outside network that is serving up the Web pages. For basic Internet connections at home, the gateway is the Internet Service Provider that gives you access to the entire Internet. If you have a wireless network at home that gives your entire family access to the Internet, your gateway is the modem (or modem-router combo) your ISP provides so you can connect to their network. On the other end, the computer that controls all of the data traffic your Internet Service Provider (ISP) takes and sends out is itself a node. When a computer-server acts as a gateway, it also operates as a firewall and a proxy server. A firewall keeps out unwanted traffic and outsiders off a private network. A proxy server is software that "sits" between programs on your computer that you use (such as a Web browser) and a computer server the computer that serves your network. The proxy server's task is to make sure the real server can handle your on-line data requests.