Sunday, 21 May 2017

BASIC UNDERSTANDS NETWORK ADDRESSING:

IP Addresses Are Broken Into 4 Octets (IPv4) Separated By Dots Called Dotted Decimal Notation. An Octet Is A Byte Consisting Of 8 Bits. The Ipv4 Addresses Are In The Following Form: 

192.168.10.1

THERE ARE TWO PARTS OF AN IP ADDRESS :


  • NETWORK ID
  • HOST ID

    THE VARIOUS CLASSES OF NETWORKS SPECIFY ADDITIONAL OR FEWER OCTETS TO DESIGNATE THE NETWORK ID VERSUS THE HOST ID.



    When A Network Is Set Up, A Netmask Is Also Specified. The Netmask Determines The Class Of The Network As Shown Below, Except For CIDR. When The Netmask Is Setup, It Specifies Some Number Of Most Significant Bits With A 1's Value And The Rest Have Values Of 0.

    The Most Significant Part Of The Netmask With Bits Set To 1's Specifies The Network Address, And The Lower Part Of The Address Will Specify The Host Address. When Setting Addresses On A Network, Remember There Can Be No Host Address Of 0 (No Host Address Bits Set), And There Can Be No Host Address With All Bits Set.

    CLASS A-E NETWORKS THE ADDRESSING SCHEME FOR CLASS A THROUGH E NETWORKS IS SHOWN BELOW.


    Note: We Use The 'X' Character Here To Denote Don't Care Situations Which Includes All Possible Numbers At The Location. It Is Many Times Used To Denote Networks.

    NETWORK TYPE ADDRESS RANGE NORMAL NETMASK COMMENTS :


    Class A 001.X.X.X To 126.X.X.X 255.0.0.0 - > For Very Large Networks.

    Class B 128.1.X.X To 191.254.X.X 255.255.0.0 - > For Medium Size Networks.

    Class C 192.0.1.X To 223.255.254.X 255.255.255.0 - > For Small Networks.

    Class D 224.X.X.X To 239.255.255.255 - > Used To Support Multicasting.

    Class E 240.X.X.X To 247.255.255.255 RFCs 1518 And 1519 Define A System Called Classless Inter-Domain Routing (Cidr) Which Is Used To Allocate IP Addresses More Efficiently. This May Be Used With Subnet Masks To Establish Networks Rather Than The Class System Shown Above. A Class C Subnet May Be 8 Bits But Using CIDR, It May Be 12 Bits.

    There Are Some Network Addresses Reserved For Private Use By The Internet Assigned Numbers Authority (IANA) Which Can Be Hidden Behind A Computer Which Uses IP Masquerading To Connect The Private Network To The Internet.

    THERE ARE THREE SETS OF ADDRESSES RESERVED. THESE ADDRESSES ARE SHOWN BELOW:


    10.X.X.X

    172.16.X.X - 172.31.X.X

    192.168.X.X

    OTHER RESERVED OR COMMONLY USED ADDRESSES:


    127.0.0.1 - The Loopback Interface Address. All 127.X.X.X Addresses Are Used By The Loopback Interface Which Copies Data From The Transmit Buffer To The Receive Buffer Of The Nic When Used.

    0.0.0.0 - This Is Reserved For Hosts That Don't Know Their Address And Use Bootp Or DHCP Protocols To Determine Their Addresses.

    255 - The Value Of 255 Is Never Used As An Address For Any Part Of The IP Address. It Is Reserved For Broadcast Addressing. Please Remember, This Is Exclusive Of CIDR. When Using CIDR, All Bits Of The Address Can Never Be All Ones.

    TO FURTHER ILLUSTRATE, A FEW EXAMPLES OF VALID AND INVALID ADDRESSES ARE LISTED BELOW:


    VALID ADDRESSES:


    10.1.0.1 Through 10.1.0.254

    10.0.0.1 Through 10.0.0.254

    10.0.1.1 Through 10.0.1.254

    INVALID ADDRESSES :


    10.1.0.0 - Host IP Can't Be 0.

    10.1.0.255 - Host IP Can't Be 255.

    10.123.255.4 - No Network Or Subnet Can Have A Value Of 255.

    0.12.16.89 - No Class A Network Can Have An Address Of 0.

    255.9.56.45 - No Network Address Can Be 255.

    10.34.255.1 - No Network Address Can Be 255.

    NETWORK/NETMASK SPECIFICATION:


    Sometimes You May See A Network Interface Card (NIC) IP Address Specified In The Following Manner:

    192.168.1.1/24

    The First Part Indicates The Ip Address Of The Nic Which Is "192.168.1.1" In This Case. The Second Part "/24" Indicates The Netmask Value Meaning In This Case That The First 24 Bits Of The Netmask Are Set.

    This Makes The Netmask Value 255.255.255.0. If The Last Part Of The Line Above Were "/16", The Netmask Would Be 255.255.0.0.

    SUBNET MASKS :


    Subnetting Is The Process Of Breaking Down A Main Class A, B, Or C Network Into Subnets For Routing Purposes.

    Subnetting Allows You To Create Multiple Logical Networks That Exist Within A Single Class A, B, Or C Network. If You Do Not Subnet, You Are Only Able To Use One Network From Your Class A, B, Or C Network, Which Is Unrealistic.

    A Subnet Mask Is The Same Basic Thing As A Netmask With The Only Real Difference Being That You Are Breaking A Larger Organizational Network Into Smaller Parts, And Each Smaller Section Will Use A Different Set Of Address Numbers. This Will Allow Network Packets To Be Routed Between Subnetworks.

    When Doing Subnetting, The Number Of Bits In The Subnet Mask Determine The Number Of Available Subnets. Two To The Power Of The Number Of Bits Minus Two Is The Number Of Available Subnets.

    When Setting Up Subnets The Following Must Be Determined :
  • Number Of Segments
  • Hosts Per Segment

    SUBNETTING PROVIDES THE FOLLOWING ADVANTAGES :


    Network Traffic Isolation : There Is Less Network Traffic On Each Subnet.

    Simplified Administration: Networks May Be Managed Independently.

    Improved Security : Subnets Can Isolate Internal Networks So They Are Not Visible From External Networks.

    A 14 Bit Subnet Mask On A Class B Network Only Allows 2 Node Addresses For Wan Links. A Routing Algorithm Like OSPF Or EIGRP Must Be Used For This Approach. These Protocols Allow The Variable Length Subnet Masks (VLSM). RIP And IGRP Don't Support This. Subnet Mask Information Must Be Transmitted On The Update Packets For Dynamic Routing Protocols For This To Work. The Router Subnet Mask Is Different Than The Wan Interface Subnet Mask.

    One Network ID Is Required By Each Of:

    Subnet
    Wan Connection

    One Host Id Is Required By Each Of:

    Each Nic On Each Host.
    Each Router Interface.

    TYPES OF SUBNET MASKS :


    Default : Fits Into A Class A, B, Or C Network Category

    Custom: Used To Break A Default Network Such As A Class A, B, Or C Network Into Subnets.

    WHEN IS SUBNETTING NECESSARY?


    Subnetting Is Required When One Network Number Needs To Be Distributed Across Multiple LAN Segments. This May Be The Case In Instances When:

    • A Company Uses Two Or More Types Of LAN Technology (For Example, Ethernet, Token Ring) On Their Network.

    • Two Network Segments Are Restricted By Distance Limitations (For Example, Remote Offices Linked Via Point-To-Point Circuit).

    • Segments Need To Be Localized For Network Management Reasons (Accounting Segment, Sales Segment, Etc.).

    • Hosts Which Dominate Most Of The LAN Bandwidth Need To Be Isolated.
    For More About - > CISCO IP ADDRESSING

    SUPERNETTING :


    Supernetting Is Used To Help Make Up For Some Of The Shortage If IP Addresses For The Internet. It Uses Classless Inter-Domain Routing (CIDR).

    If A Business Needs A Specific Number Of IP Addresses Such As 1500, Rather Than Allocating A Class B Set Of Addresses With The Subnet Mask Of 255.255.0.0, A Subnet Mask Of 255.255.248.0 May Be Allocated.

    Therefore The Equivalent Of Eight Class C Addresses Have Been Allocated. With Supernetting, The Value Of 2 Is Not Subtracted From The Possible Number Of Subnets Since The Router Knows That These Are Contiguous Networks. 8 Times 254 = 2032.



    CONCLUSION:


    The Goal Of This Article Is To Give An Easy Way To Understand The “BASIC UNDERSTANDS NETWORK ADDRESSING". Hope This Article Will Help Every Beginners Who Are Going To Start Cisco Lab Practice Without Any Doubts.

    Some Topics That You Might Want To Pursue On Your Own That We Did Not Cover In This Article Are Listed Here, Thank You And Best Of Luck.

    This Article Written Author By: Premakumar Thevathasan. CCNA, CCNP, CCIP, MCSE, MCSA, MCSA - MSG, CIW Security Analyst, CompTIA Certified A+.

    DISCLAIMER:


    This Document Carries No Explicit Or Implied Warranty. Nor Is There Any Guarantee That The Information Contained In This Document Is Accurate. Every Effort Has Been Made To Make All Articles As Complete And As Accurate As Possible.

    It Is Offered In The Hopes Of Helping Others, But You Use It At Your Own Risk. The Author Will Not Be Liable For Any Special, Incidental, Consequential Or Indirect Any Damages Due To Loss Of Data Or Any Other Reason That Occur As A Result Of Using This Document. But No Warranty Or Fitness Is Implied. The Information Provided Is On An "As Is" Basic. All Use Is Completely At Your Own Risk. 
  • 2 comments:

    Kristen Brown said...

    I additionally might want to state that nothing was relieving in this blog identified with any data I as of now had. Indeed, even I discovered new data to my subject and I added them to my database. FreePBX Cloud

    NETGEAR Router Login said...

    Quite impressive post. You have provided a great Netgear Router Login solution. Thanks for sharing & looking forward for reading more…
    NETGEAR router login


    NETGEAR Nighthawk setup

    NETGEAR WiFi extender setup

    NETGEAR Modem Router setup

    NETGEAR Genie Download

    192.168.1.1

    netgear orbi wifi 6

    routerlogin.net not working

    NETGEAR product registration

    NETGEAR router not connecting to internet

    how to setup a NETGEAR router without a modem?

    How do I power cycle my home network?

    PAN-OS Supported ciphers

    Following is a list of supported ciphers for PAN-OS 7.1 and later: SSLv3 Ciphers Supported (No change from PAN-OS 7.0) Non-FIPS mod...