Download Power Point Chapter 10 CCNA1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Backpressure routing wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Peering wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

RapidIO wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

AppleTalk wikipedia , lookup

Network tap wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Internet protocol suite wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer network wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 1355 wikipedia , lookup

Airborne Networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
SEMESTER 1/ MODULE 10
Routing Fundamentals & Subnets
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Overview
• Internet Protocol (IP) is the routed protocol of the Internet.
• IP addressing enables packets to be routed from source to destination
using the best available path.
• The propagation of packets, encapsulation changes, and connectionoriented and connectionless protocols are also critical to ensure that data
is properly transmitted to its destination.
• A protocol is a set of rules that determines how computers communicate
with each other across networks.
• A protocol describes the following:
• The format that a message must conform to
• The way in which computers must exchange a message within the
context of a particular activity
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routable / Routed Protocol
• A routed protocol allows the router to forward data between nodes on
different networks.
• In order for a protocol to be routable, it must provide the ability to assign a
network number and a host number to each individual device.
• Examples: IPX, IP
• These protocols also
require a network mask
or subnet mask in order
to separate the network
portion & host portion.
• The reason that a network
mask is used is to allow
groups of sequential IP
addresses to be treated as
a single unit.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
IP as Routed Protocol
• IP is a connectionless, unreliable, best-effort delivery protocol.
• IP takes whichever route is the most efficient based on the routing
protocol decision.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Data Encapsulation
• As information flows down
the layers of the OSI model;
the data is processed at each
layer.
• At the network layer, the
data is encapsulated into
packets, also known as
datagrams.
• When data is received from upper layer protocols, the network
layer appends the IP header information to the data.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Packet Propagation
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Packet Propagation
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Packet Propagation
As a frame is received at a router interface:
• The MAC address is checked to see if the frame is directly addressed to the router
interface, or a broadcast, otherwise it’s discarded.
• The frame header and trailer are removed and the packet is passed up to Layer 3.
• The destination IP address is compared to the routing table to find a match.
• The packet is switched to the outgoing interface and given the proper frame
header.
• The frame is then transmitted.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Network Delivery Services
Connectionless Network Service
• They treat each packet separately, and send it on its way through the network.
• Different packets may take different paths to get through the network. The packets
are reassembled after they arrive at the destination
• In a connectionless system, the destination is not contacted before a packet is sent.
• Connectionless network processes are often referred to as packet switched
processes.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Network Delivery Services
Connectionless Network Service
• The Internet is a connectionless network in which all packet deliveries
are handled by IP.
• TCP adds Layer 4, connection-oriented reliability services to IP.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Network Delivery Services
Connection-oriented Network Service
• A connection is established between the sender and the recipient
before any data is transferred.
• Connection-oriented network processes are often referred to as
circuit switched processes.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Anatomy of IP Packet
• While the IP source and destination addresses are important, the other
header fields have made IP very flexible.
• The header fields are the information that is provided to the upper
layer protocols defining the data in the packet.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Anatomy of IP Packet
•Version – The 4-bit version field contains the number 4 if it is an IPv4
packet and 6 if it is an IPv6 packet.
•IP header length (HLEN) – Indicates the datagram header length in
32-bit words
•Type of service (ToS) – 8 bits that specify the level of importance
that has been assigned by a particular upper-layer protocol.
•Total length – 16 bits that specify the length of the entire packet in
bytes.
•Identification – 16 bits that identify the current datagram. This is the
sequence number.
•Flags – A 3-bit field in which the two low-order bits control
fragmentation.
•Fragment offset – 13 bits that are used to help piece together
datagram fragments.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Anatomy of IP Packet
•Time to Live (TTL) – A field that specifies the number of hops a
packet may travel.
•Protocol – 8 bits that indicate which upper-layer protocol such as
TCP or UDP.
•Header checksum – 16 bits that help ensure IP header integrity.
•Source address – 32 bits that specify the IP address of the node
from which the packet was sent.
•Destination address – 32 bits that specify the IP address of the
node to which the data is sent.
•Options – Allows IP to support various options such as security.
The length of this field varies.
•Padding – Extra zeros are added to this field to ensure that the
IP header is always a multiple of 32 bits.
•Data – Contains upper-layer information and has a variable
length of up to 64 bits
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Overview
• Routing is a hierarchical organizational scheme that allows individual
addresses to be grouped together.
• Routing is the process of finding the most efficient path from one
device to another.
• The primary device that performs the routing process is the router.
• Router is a network layer device that uses one or more routing metrics
to determine the optimal path.
• Routing protocols use various combinations of metrics for
determining the best path for data.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Router Functions
• Routers must maintain routing tables
• Routers make sure other routers know of changes in the network
topology.
• These functions are performed using a routing protocol to communicate
network information with other routers.
• When packets arrive at an interface, the router must use the routing table
to determine where to send them.
• The router switches the
packets to the appropriate
interface, adds the necessary
framing information for the
interface, and then transmits
the frame.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Metric
• A router is a network layer device that uses one or more routing
metrics to determine the optimal path along which network traffic
should be forwarded.
• Routing metrics are values used in determining the advantage of one
route over another.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Metric
• Bandwidth – Bandwidth is the data capacity of a link. Normally, a 10Mbps Ethernet link is preferable to a 64-kbps leased line.
• Delay – Delay is the length of time required to move a packet along
each link from a source to a destination.
• Load – Load is the amount of activity on a network resource such as
a router or a link.
• Reliability – Reliability is usually a reference to the error rate of each
network link.
• Hop count – Hop count is the number of routers that a packet must
travel through before reaching its destination
• Ticks – The delay on a data link using IBM PC clock ticks. One tick is
approximately 1/18 second.
• Cost – Cost is an arbitrary value, usually based on bandwidth,
monetary expense, or other measurement, that is assigned by a
network administrator.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Vs. Switching
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Vs. Switching
• This distinction is routing and switching use different information in
the process of moving data from source to destination..
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routed Vs. Routing
• Protocols used at the network layer that transfer data from one
host to another across a router are called routed or routable
protocols.
• Routed protocols transport data across a network.
• Routing protocols allow routers to choose the best path for data
from source to destination
A routed protocol functions include the following:
• Includes any network protocol suite that provides enough
information in its network layer address to allow a router to forward
it to the next device and ultimately to its destination
• Defines the format and use of the fields within a packet
• Examples: IP, IPX, DECnet, AppleTalk
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routed Vs. Routing
A routing protocol
functions includes the
following:
• Provides processes
for sharing route
information
• Allows routers to
communicate with
other routers to
update and maintain
the routing tables
• Examples: RIP, IGRP,
OSF
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Path Determination
• Path determination occurs at the network layer.
• Path determination enables a router to compare the destination
address to the available routes in its routing table, and to select the
best path.
• The routers learn of these available routes through static routing or
dynamic routing.
• In static routing, Routes configured manually by the network
administrator are static routes.
• In dynamic routing, Routes learned by others routers using a routing
protocol are dynamic routes.
• The router uses path determination to decide which port an incoming
packet should be sent out of to travel on to its destination.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Tables
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Tables
• Routers use routing protocols to build and maintain routing tables
that contain route information.
• Routers communicate with one another to maintain their routing tables
through the transmission of routing update messages.
• This aids in the process of path determination.
• Routers keep track of the following:
• Protocol type
• Destination/next-hop associations
• Routing metric
• Outbound interfaces
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Routing Algorithm & Metric
• Different routing protocols use different algorithms to decide which port an
incoming packet should be sent to.
• Routing algorithms depend on metrics to make these decisions.
The followings are routing algorithm design goals:
• Optimization
• Simplicity and low overhead
• Robustness and stability
• Flexibility
• Rapid convergence
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
IGP & EGP
• IGPs route data within an autonomous system: RIP, RIPv2, IGRP,
EIGRP, OSPF, IS-IS
• EGPs route data between autonomous systems: Border Gateway
Protocol (BGP)
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Link-State & Distance Vector
• The distance-vector routing approach determines the distance and
direction (vector) to any link in the internetwork.
• The distance may be the hop count to the link.
• Routers using distance-vector algorithms send all or part of their
routing table entries to adjacent routers on a periodic basis.
• Link-state routing protocols respond quickly to network changes
sending trigger updates only when a network change has occurred.
• Link-state routing protocols send periodic updates, known as link-state
refreshes, at longer time intervals, such as every 30 minutes.
• When a route or link changes, the device that detected the change
creates a link-state advertisement (LSA) concerning that link.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
RIP Version 1 and 2
• RIPv1 is a distance vector routing protocol
• RIP uses hop count as its metric to determine the direction and
distance to any link in the internetwork.
• RIP cannot route a packet beyond 15 hops.
• RIP Version 1 (RIP v1) requires that all devices in the network use the
same subnet mask.
• This is also known as classful routing.
• RIP Version 2 (RIP v2) provides prefix routing, and does send subnet
mask information in routing updates.
• This is also known as classless routing.
• The use of different subnet masks within the same network is referred
to as variable-length subnet masking (VLSM).
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
IGRP and OSPF
• IGRP is a distance-vector routing protocol developed by Cisco.
• IGRP can select the fastest available path based on delay, bandwidth,
load, and reliability.
• IGRP also has a much higher maximum hop count limit than RIP.
• IGRP uses only classful routing.
• OSPF is a link-state routing protocol developed by the Internet
Engineering Task Force (IETF) in 1988.
• OSPF was written to address the needs of large, scalable
internetworks that RIP could not.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Mechanics of Subnetting
• Classes of IP Addresses
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Introduction to Subnetting
• Host bits must are
reassigned (or
“borrowed”) as network
bits.
• The starting point is
always the leftmost
host bit.
3 bits borrowed allows 23-2 or 6 subnets
5 bits borrowed allows 25-2 or 30 subnets
12 bits borrowed allows 212-2 or 4094 subnets
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Reasons for Subnetting
• Provides addressing flexibility for the network
administrator.
• Each LAN must have its own network or subnetwork
address.
• Provides broadcast containment and low-level security on
the LAN.
• Provides some security since access to other subnets is
only available through the services of a router.
• Further, access security may be provided through the use
of access lists. These lists can permit or deny access to a
subnet
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Establishing Subnet Mask Address
• Determines which part of an IP address is the network
field and which part is the host field.
Follow these steps to determine the subnet mask:
1. Express the subnetwork IP address in binary form.
2. Replace the network and subnet portion of the
address with all 1s.
3. Replace the host portion of the address with all 0s.
4. Convert the binary expression back to dotted-decimal
notation.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Establishing Subnet Mask Address
• To determine the number of bits to be used, the network designer needs to
calculate how many hosts the largest subnetwork requires and the number of
subnetworks needed.
• The “slash format” is a shorter way of representing the subnet mask: /25
represents the 25 one bits in the subnet mask 255.255.255.128
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Establishing Subnet Mask Address
• Number of usable subnets = two to the power of the assigned subnet
bits or borrowed bits, minus two. The minus two is for the reserved
addresses of network ID and network broadcast.
(2 power of borrowed bits) – 2 = usable subnets
(23) – 2 = 6
• Number of usable hosts = two to the power of the bits remaining, minus
two (reserved addresses for subnet id and subnet broadcast).
(2 power of remaining host bits) – 2 = usable hosts
(25) – 2 = 30
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Establishing Subnet Mask Address
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Subnetting Class A and B Networks
• The available bits for assignment to the subnet field in a Class A
address is 22 bits while a Class B address has 14 bits.
CISCO NETWORKING ACADEMY PROGRAM
SEMESTER 1/ MODULE 10
Routing Fundamental & Subnets
Calculating the Subnetwork with ANDing
• ANDing is a binary process by which the router calculates the
subnetwork ID for an incoming packet.
• 1 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 0
• The router then uses that information to forward the packet across the
correct interface.
Packet Address
192.168.10.65
11000000.10101000.00001010.01000001
Subnet Mask
255.255.255.224
11111111.11111111.11111111.11100000
Subnetwork Address 192.168.10.64
11000000.10101000.00001010.01000000