Day1 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 151

CCNA (200-301)

Crash Course
Day 1
with
Kevin Wallace, CCIEx2
(R/S & Collaboration) #7945
Your Instructor
• Kevin Wallace

• CCIEx2 #7945 (Collaboration and R/S)

• Working with Cisco gear since 1989

• Taught courses with a CLP for nearly 14 years

• Network Design Specialist at Walt Disney World

• Written a bunch of books & made a ton of video courses for Cisco Press

• 2x Cisco Live Distinguished Speaker


Module 1
Foundational Networking
Technologies
Common Network
Components
Routers

IPv4 Routing Table


Interface Network
Gig 1 0.0.0.0 /0

Gig 2 10.1.1.0 /24 Internet

Gig 3 192.168.1.0 /24

192.0.2.0 /30
10.1.1.0 /24 192.168.1.0 /24
Gig 1 .1

.100 .1 .1 .200
Switch 1 Gig 2
Router Gig 3
Switch 2
Laptop Server
Switches
Laptop 1
MAC Address Table
Port MAC Address
Gig 1 AAAA.AAAA.AAAA
AAAA.AAAA.AAAA
Gig 2 BBBB.BBBB.BBBB
Gig 3 CCCC.CCCC.CCCC
Gig 4 DDDD.DDDD.DDDD Gig 1

Switch

Gig 3
CCCC.CCCC.CCCC

DDDD.DDDD.DDDD
BBBB.BBBB.BBBB

Laptop 2 Printer Server


Security Appliances

Next Generation Firewall (NGFW/Layer 7 Firewall): An Application Layer


firewall with additional features, such as: Deep-Packet Inspection (DPI),
Intrusion Prevention System (IPS), and encrypted traffic inspection.
Security Appliances

Next Generation Firewall (NGFW/Layer 7 Firewall): An Application Layer


firewall with additional features, such as: Deep-Packet Inspection (DPI),
Intrusion Prevention System (IPS), and encrypted traffic inspection.

Intrusion Prevention System (IPS) Sensor: An appliance that sits inline


with traffic and checks that traffic against a database of known threats.
If a threat is detected, the offending packet(s) can be dropped.
Security Appliances
Intrusion Prevention System (IPS) Sensor:
An appliance that sits inline with traffic
and checks that traffic against a
database of known threats. If a threat is
Target detected, the offending packet(s) can be
Server dropped.

SW1
Attacker

PC1 HQ Internet
IPS Sensor
Security Appliances

Next Generation Firewall (NGFW/Layer 7


Firewall): An Application Layer firewall
with additional features, such as: Deep-
Target Packet Inspection (DPI), Intrusion
Server Prevention System (IPS), and encrypted
traffic inspection.
SW1
Attacker

PC1 HQ Internet
NGFW
Ad Hoc Wireless LAN

Client 1 Client 2
Infrastructure Wireless LAN

Internet

Wireless Router
Client 1 Client 2
Mesh Wireless LAN

Client 1 Client 2
Enterprise Wireless LAN

Wireless Access Point (AP) Wireless Access Point (AP)

Ethernet
Switch

SW1

Client 1 Wireless LAN Controller (WLC) Client 2


Endpoints and Servers

• Also known as Client-


Server Architecture
PC 1 PC 2
• Clients access a
common server
SW1
• Server shares
resources (e.g. file
and printer resources)
with clients

Server
PC 3
Endpoints and Servers

• Also known as Peer-


to-Peer Architecture
PC 1 PC 2
• Clients share
resources (e.g. file
SW1 and printer resources)
• Not as robust as using
a network operating
system (NOS)

PC 3 PC 4
Cisco DNA Center

Cisco DNA Center is an appliance


that provides a graphical interface
and a programming interface to
design your network, add and
configure devices, monitor, and
troubleshoot your network.
Cisco DNA Center

• Design
• Policy

• Provision

• Assurance

• Platform
Virtual Server
Microsoft Oracle
Linux
Windows Solaris
Server
Server Server

• Hypervisor: Software that can


create, start, stop, and monitor
multiple virtual machines.
- Type-1 (“Native” or “Bare Metal”):
Runs directly on the server’s
hardware.
- Type-2 (“Hosted”): Runs in a
Switch
traditional operating system.
Virtual Server
Virtualization

Virtual
NIC-1 • Virtual NIC: Software associated
with a unique MAC address, which
can be used by a VM to send and
Physical Virtual receive packets.

NIC vSwitch NIC-2


• Virtual Switch: Software that can
connect to other virtual switches,
virtual NICs and to a physical NIC.
Virtual
NIC-3

Virtual Server
Virtual Services

Enterprise Cloud Virtual Virtual Router Cloud


Provider’s Firewall Provider’s
Router Virtual SLB

VMs

Cloud Provider
The OSI Model’s Seven Layers
Layer 7 Application

Layer 6 Presentation

Layer 5 Session

Layer 4 Transport

Layer 3 Network

Layer 2 Data Link

Floor 1 Layer 1 Physical


TCP vs. UDP

Synchronization (SYN)
Synchronization and Acknowledgement (SYN - ACK)
Acknowledgement (ACK)

TCP 3-Way Handshake


Bidirectional Communication

Source IP: 10.1.1.1


Source Port: 49158
Destination IP: 172.16.1.2 Web Server
Client Destination Port: 80

Source IP: 172.16.1.2


10.1.1.1 Source Port: 80 172.16.1.2
Destination IP: 10.1.1.1
Destination Port: 49158
Protocol Description TCP Port UDP Port
FTP File Transfer Protocol: Transfers files with a remote host (typically requires authentication of user credentials) 20 and 21
SSH Secure Shell: Securely connect to a remote host (typically via a terminal emulator) 22
SFTP Secure FTP: Provides FTP file-transfer service over an SSH connection 22
Telnet Telnet: Used to connect to a remote host (typically via a terminal emulator) 23
SMTP Simple Mail Transfer Protocol: Used for sending e-mail 25
DNS Domain Name System: Resolves domain names to corresponding IP addresses 53 53
TFTP Trivial File Transfer Protocol: Transfers files with a remote host (does not require authentication of user credentials) 69
Dynamic Host Configuration Protocol: Dynamically assigns IP address information (for example, IP address, subnet mask, DNS server’s IP
DHCP address, and default gateway’s IP address) to a network device
67

HTTP Hypertext Transfer Protocol: Retrieves content from a web server 80


POP3 Post Office Protocol version 3: Retrieves e-mail from an e-mail server 110
NTP Network Time Protocol: Used by a network device to synchronize its clock with a time server (NTP server) 123
IMAP4 Internet Message Access Protocol version 4: Retrieves e-mail from an e-mail server 143
Lightweight Directory Access Protocol: Provides directory services (for example, a user directory—including username, password, e-mail,
LDAP and phone number information) to network clients
389
HTTPS Hypertext Transfer Protocol Secure: Used to securely retrieve content from a web server 443
RDP Remote Desktop Protocol: A Microsoft protocol that allows a user to view and control the desktop of a remote computer 3389
Common Network
Architectures and
Designs
Three-Tier Architecture
Internet

Core Layer

Distribution Layer
Three-Tier Architecture
A network topology divided into the Access,
Distribution, and Core layers.

Access Layer
Collapsed Core Architecture
Internet

Collapsed Core
Layer

Distribution Layer
Collapsed Core Architecture
A two-tier topology where the Core and Distribution
Layers have been consolidated.

Access Layer
Spine-Leaf Design for Data Centers
Logically, One Switch

Spine Switches

Leaf Switches

Nodes
Wide Area Network (WAN) Topologies

HQ
BR1

• Traditionally Slower Speed than LANs


• Geographically Dispersed Sites

• Sites Connect to Service Provider


Wide Area Network (WAN) Topologies

BR1 HQ Connectivity
Examples of WAN BR2
• Point-to-Point
• Point-to-Multipoint

• Internet (with VPN)

• MPLS

• Metro Ethernet
Point-to-Point

R1 R2

• Interconnects two devices


• Typically uses a Layer 2 protocol

• Could be a physical point-to-

point connection
• Could be a logical point-to-point

connection
Point-to-Multipoint
Location B

R2

Service Provider’s Frame


R1 Relay Cloud

Location A

Location C

R3
Internet (with VPN)

Client 1

Client 2 Server

Internet
SW1 R1 R2 SW2

Site-to-Site VPN

• Provides privacy over the public Internet


• Low cost

• Widely available
Multiprotocol Label Switching (MPLS)

32-bit
L2 L3
Shim Payload
Header Header Header
Multiprotocol Label Switching (MPLS)

CE LSR CE
Location A Location B
LSR LSR
PE (ELSR) LSR PE (ELSR)

CE CE
Location C Location D
Metropolitan Area Network (MAN)

John Hancock Center

Tribune Tower
Willis Tower

• Metro E is an Example
• Limited Availability

Chicago Board of • Very High Speed


Trade • Redundant
Metropolitan Area Network (MAN)

Each wavelength is called a


Lambda.
Small Office/Home Office (SOHO) Topologies
Laptop
Laptop

Smartphone

PC Internet
Ethernet Wireless Router
Server Switch
On-Premise vs. Cloud Architectures

Internet
VPN

Private WAN
MPLS
Metro Ethernet

Enterprise Cloud Provider


On-Premise vs. Cloud Architectures

Cloud Provider 1

Intercloud
Exchange
Enterprise Cloud Provider 2

Cloud Provider 3
Network Cabling
Copper Cables

• RG-59 • Unshielded Twisted Pair (UTP)


• RG-6 • Shielded Twisted Pair (STP)
• RG-58/U • Plenum-Rated
• RG-8/U

Coaxial Cable Twisted Pair Cable


Electromagnetic Interference (EMI): Occurs when radio waves are picked up by or radiated by a cable carrying
another signal, resulting in signal degradation
Impedance: A circuit’s opposition to traffic flow (measured in Ohms)
Categories of Twisted Pair Cable

Category Common Use Distance Limitations


3 10BASE-T and 100BASE-T4 100m
5 100BASE-TX and 1000BASE-T 100m
5e 100BASE-TX and 1000BASE-T 100m
100m and 55m
6 1000BASE-T and 10GBASE-T

6a 1000BASE-T and 10GBASE-T 100m


7 10GBASE-T and POTS/CATV/1000BASE-T 100m
Straight-Through vs. Crossover Cables
Pins
1 2 3 4 5 6 7 8

PIN T568B

1
White/Orange

2
Orange

3
White/Green

4
Blue

5
White/Blue

6
Green

7
White/Brown

8
Brown
RJ-45
Straight-Through Cable
PIN T568B
10BASE-T and 100BASE-TX
1
White/Orange
Pin Pin
2 T+ 1 1 R+
T- 2 2 R-
Orange

3 R+ 3 3 T+
4
White/Green
4
4 5 5
Blue
R- 6 6 T-
5 7 7
White/Blue
8 8
6
Green

7
White/Brown

8 Switch 1
Brown

Media Dependent
Interface Crossover
Media Dependent (MDI-X)
Interface (MDI)
Crossover Cable
PIN T568B
10BASE-T and 100BASE-TX
1
White/Orange
Pin Pin
2 T+ 1 1 T+
T- 2 2 T-
Orange

3 R+ 3 3 R+
4
White/Green
4
4 5 5
Blue
R- 6 6 R-
5 7 7
White/Blue
8 8
6
Green

7
White/Brown

8
Brown

Media Dependent Media Dependent


Interface (MDI) Interface (MDI)
Straight-Through Cable
PIN T568B
1000BASE-T
1
White/Orange
Pin Pin
2 DA+ 1 1 DB+
DA- 2 2 DB-
Orange

3 DB+ 3 3 DA+
4 DD+
White/Green
DC+ 4
4 DC- 5 5 DD-
Blue
DB- 6 6 DA-
5 DD+ 7 7 DC+
White/Blue
DD- 8 8 DC-
6
Green

7
White/Brown

8 Switch 1
Brown

Media Dependent
Interface Crossover
Media Dependent (MDI-X)
Interface (MDI)
Crossover Cable
PIN T568B
1000BASE-T
1
White/Orange
Pin Pin
2 DA+ 1 1 DA+
DA- 2 2 DA-
Orange

3 DB+ 3 3 DB+
4 DC+
White/Green
DC+ 4
4 DC- 5 5 DC-
Blue
DB- 6 6 DB-
5 DD+ 7 7 DD+
8 DD-
White/Blue
DD- 8
6
Green

7
White/Brown

8
Brown

Media Dependent Media Dependent


Interface (MDI) Interface (MDI)
Fiber Optic Cables

• Single-Mode Fiber (SMF)


• Multimode Fiber (MMF)
Fiber Optic Modes of Propagation

Single-Mode Fiber

Multimode Fiber
Ethernet Standards
Ethernet Standard Media Type Bandwidth Capacity Distance Limitation
100BASE-TX Cat 5 (or higher) UTP 100 Mbps 100 m
1000BASE-T Cat 5 (or higher) UTP 1 Gbps 100 m
1000BASE-LX MMF/SMF 1 Gbps/1 Gbps 550 m/5 km
220 m (62.5mm)/550 m
1000BASE-SX MMF 1 Gbps
(50mm)
10GBASE-T Cat 6/Cat 6a (or higher) 10 Gbps 55 m/100 m
DB-9 and DB-25

DB-9 DB-25

Commonly used with serial connections (e.g. modem,


serial printer, console on Unix host, or mouse)
RJ-11 and RJ-45
RJ-45 RJ-11

• Commonly used on telephones, modems, and fax machines


• Commonly used on Ethernet cables
• 6 positions with 2 conductors
• 8 positions with 8 conductors
• (RJ-14: 6 positions with 4 conductors)
F-Type and BNC
F-Type BNC

• Was used with 10BASE-2 networks


• Commonly connects cable modems
• Carries radio frequencies for a variety of electronic gear
• Commonly used with RG-6 and RG-59 coaxial cable
• Usually connects to 50 or 75 Ohm coaxial cable
Fiber Connectors

ST LC

SC MTRJ
Fiber Connectors

Ultra Physical Contact (UPC)


Fiber Connectors

8 Degree Angle

Angled Physical Contact (APC)


Tranceivers

GBIC SFP SFP+ QSFP

Gigabit Interface Converter (GBIC)


Small Form-factor Pluggable (SFP) Transceiver
SFP+
Quad SFP (QSFP)
Tranceivers

Tx
Full-Duplex Switch 1
Rx

Tx and Rx
Bidirectional Transceiver (BiDi Transceiver) Switch 1
Shared Media

Ethernet
Bus

Random Back Off Random Back Off


Timer of 10 ms Timer of 20 ms
Shared Media Hub
Laptop 1

HUB

Laptop 2 Printer Server


Point-to-Point Switch Connections
Laptop 1

AAAA.AAAA.AAAA

Gig 1

Switch

Gig 3
CCCC.CCCC.CCCC

DDDD.DDDD.DDDD
BBBB.BBBB.BBBB

Laptop 2 Printer Server


Power over Ethernet (PoE)

PoE Switch
UPS Power Outlet

Wireless Access Point IP Phone Video Surveillance Camera


PoE Components
PSE
• Power Source
Equipment
(PSE)
• Powered PD
Device (PD)
• Ethernet Cable

Ethernet
Cable
PoE Standards

• Cisco Inline Power (7.7


Watts)
• IEEE 802.3af (15.4 Watts)
• IEEE 802.3at (30 Watts)
• IEEE 802.3bt (100 Watts)
Common LAN Issues
• Attenuation
• Latency
• Jitter
• Crosstalk
• Electromagnetic Interference (EMI)
• Open/Short
• Incorrect Pin-Out
• Incorrect Cable Type
• Bad Port
• Transceiver Mismatch
• TX/RX Reverse
• Duplex/Speed Mismatch
• Damaged Cables
• Bent Pins
• Bottlenecks
• VLAN Mismatch
• Network Connection LED Status Indicator
Module 2
IPv4 Addressing
IPv4 Address Structure
IPv4 Address Structure

27837th Street

278 37th Street

2783 7th Street


IPv4 Address Structure

10.1.2.3
Dotted Decimal
10 1 2 3
Notation
IP Address
00001010 00000001 00000010 00000011
(in binary)

Subnet Mask 11111111 00000000 00000000 00000000

Network Bits Host Bits

• 10.1.2.3: IP Address With No Subnet Information


• 10.1.2.3 /8: IP Address With Prefix Notation
• 10.1.2.3 255.0.0.0: IP Address With Dotted Decimal Notation
IPv4 Address Classes

Address Classful Mask Classful Mask


Value in First Octet
Class (Dotted Decimal) (Prefix Notation)
A 1 - 126 255.0.0.0 /8
B 128 - 191 255.255.0.0 /16
C 192 - 223 255.255.255.0 /24
D 224 - 239 N/A N/A
E 240 - 255 N/A N/A
Public vs. Private IPv4 Addresses

Default Subnet
Address Class Address Range
Mask
A 10.0.0.0 - 10.255.255.255 255.0.0.0
B 172.16.0.0 - 172.31.255.255 255.255.0.0
B 169.254.0.0 - 169.254.255.255 255.255.0.0
C 192.168.0.0 - 192.168.255.255 255.255.255.0
IPv4 Address Assignment,
Verification, and Name
Resolution
Dynamic Host Configuration Protocol (DHCP)
Discover

Offer

Request
192.168.1.100 /24
Acknowledgement

Laptop A 192.168.1.0 /24


192.168.1.2 /24 DHCP
Switch 1 Server

172.16.1.100 /24
Gig 1 192.168.1.1 /24
172.16.1.0 /24
Laptop B
172.16.1.1 /24 DHCP Relay / IP Helper
Switch 2 Gig 2
Router

Discover
DEMO:
IPv4 Address Assignment
(Manual and Dynamic)
Domain Name System (DNS) Services
The IP address of
kwtrain.com is DNS Server
What is the IP 203.0.113.100.
Web Server
address of
Desktop
kwtrain.com?
Computer 192.0.2.10

Internet
SW1 R1 203.0.113.100

198.51.100.26
Hierarchical DNS Structure
root

.com .mil .edu

cisco amazon twitter uscg af army eku purdue yale

cs science
DNS Record Types
Record Type Description

A An address record is used to map a hostname to an IPv4 address.

AAAA An IPv6 address record is used to main a hostname to an IPv6 address.

A canonical name record is an alias of an existing record, thus allowing multiple DNS records to
CNAME map to the same IP address.

A mail exchange record maps a domain name to an e-mail (or message transfer agent) server for
MX that domain.

A pointer record points to a canonical name. A PTR record is commonly used when performing a
PTR reverse DNS lookup, which is a process used to determine what domain name is associated with a
known IP address.
A start of authority record provides authoritative information about a DNS zone, such as: e-mail
SOA contact information for the zone's administrator, the zone's primary name server, and various
refresh timers.
DNS Record Types

Record Type Description

A text record was originally intended to contain descriptive text (for humans to read). However, it’s
TXT most often used to carry various attributes and their values, readable by the requesting computer.

A Service Locator record can be used to specify the IP address of a host providing a specific
SRV service, which is more generic than using an MX record, which points just to an e-mail service.

NS A Name Server record tells a DNS zone to use specific name servers, for security reasons.
Types of IPv4
Communication
Unicast

PC #1 Wants to
10.1.1.1 Receive Video

PC #2 Wants to
10.1.1.2 Receive Video

Video Server
10.1.1.100

PC #3 Does Not Want


10.1.1.3 to Receive
Video
Broadcast

PC #1 Wants to
10.1.1.1 Receive Video

PC #2 Wants to
10.1.1.2 Receive Video

Video Server
10.1.1.100

PC #3 Does Not Want


10.1.1.3 to Receive
Video
Multicast

PC #1 Wants to
10.1.1.1 Receive Video

Class D Address: 239.1.1.1

PC #2 Wants to
10.1.1.2 Receive Video

Video Server
10.1.1.100

PC #3 Does Not Want


10.1.1.3 to Receive
Video
Binary Numbering
Binary Numbering Overview

10.1.2.3
Dotted Decimal
10 1 2 3
Notation

IP Address
00001010 00000001 00000010 00000011
(in binary)

Octet 1 Octet 2 Octet 3 Octet 4


Converting Binary Numbers to Decimal

128 64 32 16 8 4 2 1
1 0 0 1 0 1 1 0

128 + 16 + 4 + 2 = 150
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1

• Is 167 equal to or greater than 128?


• Yes
• Place a 1 in the 128 column
• Subtract 128 from 167 = 39
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0

• Is 39 equal to or greater than 64?


• No
• Place a 0 in the 64 column
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0 1

• Is 39 equal to or greater than 32?


• Yes
• Place a 1 in the 32 column
• Subtract 32 from 39 = 7
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0 1 0

• Is 7 equal to or greater than 16?


• No
• Place a 0 in the 16 column
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0 1 0 0

• Is 7 equal to or greater than 8?


• No
• Place a 0 in the 8 column
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0 1 0 0 1

• Is 7 equal to or greater than 4?


• Yes
• Place a 1 in the 4 column
• Subtract 4 from 7 = 3
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0 1 0 0 1 1

• Is 3 equal to or greater than 2?


• Yes
• Place a 1 in the 2 column
• Subtract 2 from 3 = 1
Converting Decimal Numbers to Binary

Given a decimal number of 167, calculate the corresponding


binary number.

128 64 32 16 8 4 2 1
1 0 1 0 0 1 1 1

• Is 1 equal to or greater than 1?


• Yes
• Place a 1 in the 1 column
• Subtract 1 from 1 = 0
IPv4 Exercise #1

Given the a binary number of 01101011,


calculate the corresponding decimal number.

128 64 32 16 8 4 2 1
IPv4 Exercise #1

Given the a binary number of 01101011,


calculate the corresponding decimal number.

128 64 32 16 8 4 2 1
0 1 1 0 1 0 1 1

64 + 32 + 8 + 2 + 1 = 107
IPv4 Exercise #2

Given the a decimal number of 49, calculate the


corresponding binary number.

128 64 32 16 8 4 2 1
IPv4 Exercise #2

Given the a decimal number of 49, calculate the


corresponding binary number.

128 64 32 16 8 4 2 1
0 0 1 1 0 0 0 1
• Is 49 greater than or equal to 128? => No => Put a 0 in the 128
column.
• Is 49 greater than or equal to 64? => No => Put a 0 in the 64
column.
• Is 49 greater than or equal to 32? => Yes => Put a 1 in the 32
column, and subtract 32 from 49 => 49 - 32 = 17
• Is 17 greater than or equal to 16? => Yes => Put a 1 in the 16
column, and subtract 16 from 17 => 17 - 16 = 1
• Is 1 greater than or equal to 8? => No => Put a 0 in the 8 column.
• Is 1 greater than or equal to 4? => No => Put a 0 in the 4 column.
• Is 1 greater than or equal to 2? => No => Put a 0 in the 2 column.
• Is 1 greater than or equal to 1? => Yes => Put a 1 in the 1 column.
Basic Subnetting
IPv4 Subnetting Overview

Address Class Assignable IP Addresses

A 16,777,214 (i.e. 224 - 2)


B 65,534 (i.e. 216 - 2)
C 254 (i.e. 28 - 2)

Network: 192.0.2.0 /24


Wasted IP Addresses: 192.168.1.3 - 192.168.1.254

.1 .2
R1 R2
IPv4 Subnetting Overview

Network Address Octet 1 Octet 2 Octet 3 Octet 4

192.168.1.0 /24 11000000 10101000 00000001 00000000


192.168.14.0 /24 11000000 10101000 00001110 00000000
192.168.25.0 /24 11000000 10101000 00011001 00000000
192.168.30.0 /24 11000000 10101000 00011110 00000000
All Networks Have Their First 19
Bits In Common

Subnet Mask (Binary) 11111111 11111111 11100000 00000000


Subnet Mask (Decimal) 255 255 224 0
Network Address (Binary) 11000000 10101000 00000000 00000000
Network Address (Decimal) 192 168 0 0
Directed Broadcast Address (Binary) 11000000 10101000 00011111 11111111
Directed Broadcast Address (Decimal) 192 168 31 255
The Network Address

10.1.2.3 /8
IP Address
(Decimal)
10 1 2 3
IP Address
(Binary)
00001010 00000001 00000010 00000011
Subnet Mask
11111111 00000000 00000000 00000000
(Binary)
Subnet Mask
255 0 0 0
(Decimal)
Network Address
(Binary)
00001010 00000000 00000000 00000000
Network Address
(Decimal)
10 0 0 0
The Directed Broadcast Address

10.1.2.3 /8
IP Address
10 1 2 3
(Decimal)
IP Address
(Binary)
00001010 00000001 00000010 00000011
Subnet Mask
(Binary)
11111111 00000000 00000000 00000000
Subnet Mask
(Decimal)
255 0 0 0
Directed Broadcast
Address (Binary)
00001010 11111111 11111111 11111111
Directed Broadcast
Address (Decimal)
10 255 255 255
Review

• IP Address: 10.1.2.3
• Subnet Mask: 255.0.0.0

• Network Address: 10.0.0.0 /8

• Directed Broadcast: 10.255.255.255

• Usable IP Addresses: 10.0.0.1 - 10.255.255.254


Dotted Decimal Notation Prefix Notation
255.0.0.0 /8 (Classful Subnet Mask for Class A Networks)
255.128.0.0 /9
255.192.0.0 /10
255.224.0.0 /11
255.240.0.0 /12
255.248.0.0 /13
255.252.0.0 /14
255.254.0.0 /15
255.255.0.0 /16 (Classful Subnet Mask for Class B Networks)
255.255.128.0 /17
255.255.192.0 /18
255.255.224.0 /19
255.255.240.0 /20
255.255.248.0 /21
255.255.252.0 /22
255.255.254.0 /23
255.255.255.0 /24 (Classful Subnet Mask for Class C Networks)
255.255.255.128 /25
255.255.255.192 /26
255.255.255.224 /27
255.255.255.240 /28
255.255.255.248 /29
255.255.255.252 /30
Subnet Octet Value Number of Left-Justified 1s
0 0
128 1

192 2

224 3

240 4

248 5

252 6

254 7

255 8
Calculating Available Subnets
s
Number of Created Subnets = 2
(where s is the number of borrowed bits)

• Network Class?
•C
Example
• Natural Mask?
• A subnet mask of 255.255.255.224
• /24
is applied to a Class C network of • Subnet Mask?
192.168.1.0 /24. • 255.255.255.224
• How many subnets are created? • /27
• Borrowed Bits?
•3
• Number of Subnets?
3
• 2 =8
Calculating Available Subnets

Subnet Mask Host Range


192.168.1.0 255.255.255.224 192.168.1.1 - 192.168.1.30
192.168.1.32 255.255.255.224 192.168.1.33 - 192.168.1.62
192.168.1.64 255.255.255.224 192.168.1.65 - 192.168.1.94
192.168.1.96 255.255.255.224 192.168.1.97 - 192.168.1.126
192.168.1.128 255.255.255.224 192.168.1.129 - 192.168.1.158
192.168.1.160 255.255.255.224 192.168.1.161 - 192.168.1.190
192.168.1.192 255.255.255.224 192.168.1.193 - 192.168.1.222
192.168.1.224 255.255.255.224 192.168.1.225 - 192.168.1.254
Calculating Available Hosts
h
Number of Assignable IP Addresses in a Subnet = 2 - 2
(where h is the number of host bits)

Why Subtract 2?
• You cannot assign the network address,
where all host bits are set to 0
• You cannot assign the directed broadcast • Number of 1s in Subnet
address, where all the host bits are set to 1 Mask?
• 27
• Host Bits?

Example • 32 - 27 = 5

• A subnet mask of 255.255.255.224 is • Number of Hosts?


5
applied to a Class C network of 192.168.1.0 • 2 - 2 = 30
/24
• How many hosts can be assigned in each
subnet?
Practice Exercise #3
Your company has been assigned the
172.20.0.0/16 network for use at one of its
sites. You need to use a subnet mask that will
accommodate 47 subnets while simultaneously
accommodating the maximum number of hosts
per subnet. What subnet mask will you use?
Practice Exercise #3
Number of Subnets Created
Borrowed
Bits
(2s, where s is the number of To determine how many borrowed
borrowed bits)
0 1
bits are required to accommodate 47
1 2 subnets, you can write out a table
2 4 that shows the powers of 2.
3 8
4 16
5 32
6 64
7 128
8 256
9 512
10 1024
11 2048
12 4096
Practice Exercise #3
• You want to support 47 subnets.
Number of Subnets Created
Borrowed • Five borrowed bits are not enough.
(2s, where s is the number of
Bits
borrowed bits)
0 1 • Six borrowed bits are more than enough.
1 2
• Since five borrowed bits are not enough, you round up
2 4
and use six borrowed bits.
3 8
4 16
• The first octet in the network address 172.20.0.0 has a
5 32 value of 172, meaning that you are dealing with a Class B
6 64 address. Since a Class B address has sixteen bits in its
7 128 classful mask, you can add the six borrowed bits to the
8 256 16-bit classful mask, resulting in a 22-bit subnet mask.
9 512
10 1024 • You can conclude that to meet the scenario's
11 2048 requirements, you should use a subnet mask of /22,
12 4096 which could also be written as 255.255.252.0.
Practice Exercise #4
Your company has been assigned the
172.20.0.0/16 network for use at one of its
sites. You need to calculate a subnet mask that
will accommodate 100 hosts per subnet while
maximizing the number of available subnets.
What subnet mask will you use?
Practice Exercise #4

Host Number of Supported Hosts (2h - 2, To determine how many host bits are
Bits where h is the number of host bits)
2 2
required to accommodate 100 hosts,
3 6 you can write out a table that shows
4 14
the number of hosts supported by a
5 30
6 62 specific number of hosts bits.
7 126
8 254
9 510
10 1022
11 2046
12 4094
Practice Exercise #4
• You want to support 100 hosts.

• Six host bits are not enough.


Host Number of Supported Hosts (2h - 2,
Bits where h is the number of host bits) • Seven host bits are more than enough.
2 2
3 6 • Since six host bits are not enough, you round up and use
4 14 seven host bits.
5 30
6 62 • Since an IPv4 address has 32 bits, and you need seven
host bits, you can calculate the number of subnet bits by
7 126
subtracting the seven host bits from 32 (that is, the total
8 254
number of bits in an IPv4 address). This results in a 25-bit
9 510
subnet mask (that is, 32 total bits - 7 host bits = 25 subnet
10 1022 mask bits).
11 2046
12 4094 • Therefore, you can conclude that to meet the scenario's
requirements, you should use a subnet mask of /25,
which could also be written as 255.255.255.128.
Practice Exercise #5

Given a subnet mask of


255.255.255.248, what is the
corresponding prefix notation?
Practice Exercise #5
Subnet Octet Number of Left- • Given a subnet mask of 255.255.255.248,
Value Justified 1s recognize that the first three octets, each
containing a value of 255, represent 24 1s.
0 0
• To those 24 1s, you add five additional 1s,
128 1 based on your memorization of how many
192 2 contiguous, left-justified 1s in an octet are
required to produce various octet values.
224 3
• The sum of 24 bits (from the first three
240 4 octets) and the five bits (from the fourth
248 5 octet) give you a total of 29 bits. Therefore,
you can conclude that a subnet mask with
252 6 a dotted decimal notation of
254 7 255.255.255.248 has an equivalent prefix
255 8 notation of /29.
Advanced Subnetting
Calculating Usable IPv4 Address Ranges
172.25.0.0 /16
172.25.0.0 /24
172.25.1.0 /24
172.25.2.0 /24

172.25.255.0 /24

rd
Count by 1 in the 3 octet.
Calculating Usable IPv4 Address Ranges
What is the interesting octet (the last
octet to contain a 1 in the subnet mask)?

Subnet Mask

11111111.11111111.11111111.00000000

rd
The 3 octet is the interesting octet.
Calculating Usable IPv4 Address Ranges
What is the block size (the number we
count by in the interesting octet)?
172.25.0.0 /24
• Block Size = 256 - Subnet’s Interesting Octet Value
172.25.1.0 /24
• Subnet Mask = 255.255.255.0
172.25.2.0 /24
• Value in the Subnet Mask’s Interesting Octet = 255

• Block Size = 256 - 255 = 1
• Count by 1 in 172.25.255.0
the 3rd Octet to/24
Calculate Subnets
Calculating Usable IPv4 Address Ranges
Determine the Directed Broadcast
Address for a Subnet
• Set Host Bits to 0 for a Network Address
• Network Address: 172.25.0.0 /24

Network Address
172 25 0 0
(Decimal)
Network Address 10101100 00011001 00000000 00000000
(Binary)
Subnet Mask
11111111 11111111 11111111 00000000
(Binary)
Directed Broadcast
(Binary) 10101100 00011001 00000000 11111111
Directed Broadcast
172 25 0 255
(Decimal)
Calculating Usable IPv4 Address Ranges
Determine the Usable Range of
Addresses for a Subnet
• Find the first usable IP address by adding a binary 1
to the Network Address
Calculating Usable IPv4 Address Ranges
Determine the Usable Range of
Addresses for a Subnet
• Find the first usable IP address by adding a binary 1
to the Network Address
• Find the last usable IP address by subtracting a binary
1 from the Directed Broadcast Address
Calculating Usable IPv4 Address Ranges
Determine the Usable Range of
Addresses for a Subnet
• Find the first usable IP address by adding a binary 1
to the Network Address
• Find the last usable IP address by subtracting a binary
1 from the Directed Broadcast Address
Practice Exercise #6
You wish to apply a 26-bit subnet
mask to your 192.168.0.0/24
network address space.

What are the subnets, and what


are the usable address ranges in
each subnet?
Practice Exercise #6

• Determine the interesting octet.


- A 26-bit subnet mask = 255.255.255.192
- The last octet to contain a binary 1 in the subnet mask is the 4th octet.

• Determine the block size.


- Block size = 256 – subnet mask value of interesting octet
- Block size = 256 – 192 = 64

• Determine the first subnet, by setting all borrowed bits and host bits to 0.
- 192.168.0.0 /26
Practice Exercise #6
• Determine additional subnets by counting by the block size in the
interesting octet.
- 192.168.0.0
- 192.168.0.64
- 192.168.0.128
- 192.168.0.192

• Determine the range of usable addresses by excluding the subnet and


directed broadcast addresses.

Subnet Directed Broadcast Useable Range of IP Addresses


192.168.0.0 192.168.0.63 192.168.0.1 – 192.168.0.62
192.168.0.64 192.168.0.127 192.168.0.65 – 192.168.0.126
192.168.0.128 192.168.0.191 192.168.0.129 – 192.168.0.190
192.168.0.192 192.168.0.255 192.168.0.193 – 192.168.0.254
Classless Inter-Domain Routing (CIDR)
Network Address Octet 1 Octet 2 Octet 3 Octet 4

192.168.32.0 /24 11000000 10101000 00100000 00000000


192.168.33.0 /24 11000000 10101000 00100001 00000000
192.168.34.0 /24 11000000 10101000 00100010 00000000
192.168.35.0 /24 11000000 10101000 00100011 00000000
All Networks Have Their First 22
Bits In Common

Subnet Mask (Binary) 11111111 11111111 11111100 00000000


Subnet Mask (Decimal) 255 255 252 0
Network Address (Binary) 11000000 10101000 00100000 00000000
Network Address (Decimal) 192 168 32 0

192.168.32.0 /22
Module 3
IPv6 Addressing
IPv6 Address Format
and Communication
IPv6 Address Format

Prefix Host
Length •


32 hexadecimal numbers

8 “quartets” of 4 hexadecimal
digits separated by a colon

• One hexadecimal digit represents


4 binary bits

• 128 bits total length

• No broadcasts

• No fragmentation (MTU discovery


performed for each session)
23A0:201A:00B2:0000:0000:0000:0400:0001/64
Shortening an IPv6 Address

23A0:201A:00B2
23A0:201A :00B2:0000:0000:0000
:0000:0000:0000:0400
:0400:0001
:0001/64
/64
23A0:201A:B2:: 400:1/64 • Omit leading zeros in a quartet.

• Represent consecutive quartets


containing all zeros with a
double colon. (NOTE: This can be
used only once per address.)
IPv6 Exercise

2000:0000:0000:0000:1234:0000:0000:000B
IPv6 Unicast

Destination IPv6 Address


2001::2

PC #1 PC #2
2001::1 2001::2
IPv6 Multicast
PC #1 Wants to
2000::1 Receive Video
Destination IPv6 Address
FF04::10
Multicast Group: FF04::10

PC #2 Wants to
2000::2 Receive Video

Video Server

PC #3 Does Not Want


2000::3 to Receive
Video
IPv6 Anycast Server 1
3003::1

ISP1

Client
2002::1
SW1 R1
Internet

ISP2

Server 2
3003::1
IPv6 Address Types
IPv6 Global Unicast
Destination IPv6 Address
2001::2

PC #1 PC #2
2001::1 2001::2

001 Global Routing Prefix Subnet ID Interface ID


3 bits 45 bits 16 bits 64 bits

• Addressing starts with 2000::/3


• Addressing assigned by the Internet Assigned Numbers Authority (IANA)
IPv6 Multicast
PC #1 Receiver
2000::1
Destination IPv6 Address
FF04::10
Multicast Group: FF04::10

PC #2 Receiver
2000::2

Video Server

Flags Scope Examples


FF02::1 All nodes in the link-local scope
• 4 bits: 0RPT FF02::2 All routers in the link-local scope
PC #3 Non-Receiver
• 0: Reserved and set to 0 2000::3
• R: If set to a 1, P and T must also be set to 1. This would indicate that a

Rendezvous Point (RP) address was embedded in the address.


1111 1111 Flags Scope Group ID
8 bits 4 bits 4 bits 112 bits
IPv6 Link Local
Destination IPv6 Address
FE80::2

FE80::1 FE80::2 FE80::A FE80::B


R1 R2 R3

1111 1110 11 54 Zeros Interface ID


10 bits 54 bits 64 bits

• Addressing starts with FE80::/10


• Can only communicate on one network segment

• Similar to the IPv4 APIPA addresses (169.254.0.0 /16)

• Can be automatically or statically assigned


IPv6 Unique Local
Destination IPv6 Address
FD00::2

FD00::1 FD00::2 Internet


R1 R2

1111 110 L Global ID Subnet ID Interface ID


7 bits 1 bit 40 bits 16 bits 64 bits

• Addressing starts with FC00::/7


• Cannot be routed over the public Internet

• Similar to IPv4 private addresses

• L bit set to a 1 if the address is locally assigned


IPv6 Loopback Address
Destination IPv6 Address
::1

R1

127 Zeros 1
127 bits 1 bit

• Written as ::1
• Also known as localhost

• Similar to IPv4’s 127.0.0.1 address

• Can be used to verify the IPv6 stack is operating on a device


IPv6 Unspecified
Source IPv6 Address
::
Destination IPv6 Address
FF02::2
PC #1

R1

128 Zeros
128 bits

• Written as ::
• Used for a client’s source address when sending a Neighbor Solicitation message

• Used for a client’s source address when sending a Router Solicitation message
IPv6 Solicited-Node Multicast

Destination IPv6 Address


FF02::1:FF00:2
3000::1 3000::2
R1 R2

FF02::1:FF Last 24 bits in IPv6 address


104 bits 24 bits

• Address begins with FF02::1:FF/104


• Address ends with the last 24 bits of the corresponding IPv6 address

• Used instead of an IPv4 broadcast

• Also used for Duplicate Address Detection (DAD)


64-Bit Extended Unique Identifier (EUI-64)
3000::1 3000::2
R1 Gig 0/1 (MAC Address: 0015.2BE4.9B60) Gig 0/1 R2
• Uses the MAC address of an interface to create a 64-bit interface ID
• The Challenge: A MAC address is only 48 bits long

• Example: R1’s Gig 0/1 interface has a MAC address of 0015.2BE4.9B60, and that MAC address can be used for the

interface’s Link Local address


0015.2BE4.9B60
Step #1: Split the 48-bit MAC address in the middle 0015.2BFF.FEE4.9B60
Step #2: Insert FF.FE in the middle
Step #3: Change format to use a colon delimiter FF.FE
Step #4: Convert the first 2 hex digits to binary 0015:2BFF:FEE4:9B60
Step #5: Flip the 7th bit 0
0000001 0
Step #6: Convert the first eight bits back into hexadecimal
0215:2BFF:FEE4:9B60
Link Local Address: FE80::215:2BFF:FEE4:9B60
Stateful DHCPv6

Prefix/Length, Host, and DNS Server’s IPv6 Address (Learned from DHCPv6 Server)

SW1

PC #1 DHCPv6 Server

R1
Stateless DHCPv6

DNS Server’s IPv6 Address (Learned from DHCPv6 Server)

EUI-64
Address
Used as Host SW1
Address

PC #1 DHCPv6 Server
Prefix/Length (Learned Using NDP)

R1
Homework
CCNA (200-301)
Complete Video Course
Modules 1 - 3
http://bit.ly/ccna-safari
Q&A

You might also like