Semester 2v2 Chapter 8: IP Addressing. Describe how IP addressing is important in routing. IP addresses are specified in 32-bit dotted-decimal format.

Slides:



Advertisements
Similar presentations
RIP V1 W.lilakiatsakun.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Interconnecting Networks with TCP/IP
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Question N°1 You are logged into a router and with to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Internet Control Message Protocol (ICMP)
1 CCNA 2 v3.1 Module 4. 2 CCNA 2 Module 4 Learning about Devices.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
TCP/IP Address Overview End stations communicate seamlessly with servers or other stations Each node uses a unique 32 bit IP address.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
WXES2106 Network Technology Semester /2005 Chapter 7 TCP/IP Suite Error and Control Messages CCNA2: Module 8, 9.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
1 ICMP – Using Ping and Trace CCNA Semester
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
CCENT Review. Put the following descriptions in order from Layer 7 to Layer 1 and give the name of each layer.
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Chapter 5 IP Address Configuration Connecting People To Information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Module 4 – Learning about other Devices Testing network connections.
Guide to TCP/IP, Third Edition
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Herramientas para diagnósticos. Ping USO: Ping nombre.dominio o dirección IP Options: -t Ping the specifed host until interrupted. -a Resolve addresses.
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Ch.4 – Learning About Other Devices (CDP and Telnet) CCNA 1 version 3.0 Rick Graziani Cabrillo College.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 10 IP Addressing.
Examining TCP/IP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
Chapter 9 & 10 TCP/IP. TCP/IP Model Application Transport Internet Internet Access.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
CCNA 2 Week 9 Router Troubleshooting. Copyright © 2005 University of Bolton Topics Routing Table Overview Network Testing Troubleshooting Router Issues.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
Linux Operations and Administration Chapter Eight Network Communications.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
Cisco I Introduction to Networks Semester 1 Chapter 8 JEOPADY.
Network Layer IP Address.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
CCNA 2 Router and Routing Basics Module 8 TCP/IP Suite Error and Control Messages.
IP: Addressing, ARP, Routing
Module 4 – Learning about other Devices
Chap 10 IP Addressing Andres, Wen-Yuan Liao
Chapter 6 – Routing.
ICMP – Using Ping and Trace
Presentation transcript:

Semester 2v2 Chapter 8: IP Addressing

Describe how IP addressing is important in routing. IP addresses are specified in 32-bit dotted-decimal format. Router interfaces must be configured with an IP address if IP is to be routed to or from the interface. ping and trace commands can be used to verify IP address configuration

Each company or organization listed on the Internet is seen as a single unique network that must be reached before an individual host within that company can be contacted. Each company network has an address; the hosts that live on that network share that same network address, but each host is identified by the unique host address on the network.

The routing table contains entries for network or wire addresses; it usually contains no information about hosts. Each device or interface must have a host number that does not have all 0s in the host field. A host address of all 1s is reserved for an IP broadcast into that network. A host value of 0 means "this network" or "the wire itself" (e.g ). A value of 0 is also used, though rarely, for IP broadcasts in some early TCP/IP implementations.

An IP address and a subnet mask on an interface achieve three purposes: They enable the system to process the receipt and transmission of packets. They specify the device’s local address. They specify a range of addresses that share the cable with the device.

Broadcasting messages are intended to be seen by every host on a network. The broadcast address is formed by using all 1s within a portion of the IP address Two kinds of broadcasts - directed broadcasts and flooded broadcasts. Broadcasts directed into a specific network/subnet are allowed and are forwarded by the router. These directed broadcasts contain all 1s in the host portion of the address. Flooded broadcasts ( ) are not propagated, but are considered local broadcasts.

The number of routing bits (network and subnet bits) in each subnet mask can also be indicated by the "/n " format.

Use the term ip netmask-format command to specify the format of network masks for the current session. Format options are: bit count dotted-decimal (default) hexadecimal

The ip host command makes a static name-to-address entry in the router’s configuration file. Example : IP host WORK

The ip name-server command defines which hosts can provide the name service. You can specify a maximum of six IP addresses as name servers in a single command. To map domain names to IP addresses, you must identify the host names specify a name server enable DNS.

Cisco IOS software maintains a cache of host name-to-address mappings for use by EXEC commands. This cache speeds the process of converting names to addresses. To turn off the name-to- address translation use the no ip domain- lookup command. A name such as ftp.cisco.com identifies the domain of the File Transfer Protocol (FTP) for Cisco. To keep track of domain names, IP identifies a name server that manages the name cache.

show host Command Description Hostnames of learned hosts Flag descriptions of how information was learned and its current status permmanually configured in a static host table tempacquired from DNS use OKentry is current EXentry has aged-out, expired Agetime measured in hours since software referred to the entry Typeprotocol field Address(es)logical addresses associated with the host name Show Hosts Command

telnet -verifies the application layer software between source and destination stations; is the most complete testing mechanism available ping - uses the ICMP protocol to verify the hardware connection and the logical address at the network layer; is a very basic testing mechanism trace - uses TTL values to generate messages from each router used along the path; is very powerful in its ability to locate failures in the path from the source to the destination

CharacterDefinition !successful receipt of an echo reply.timed out waiting for datagram reply Udestination unreachable error Ccongestion-experienced packet Iping interrupted (e.g. Ctrl-Shift-6 X) ?packet type unknown &packet TTL exceeded

The extended ping command is supported only from privileged EXEC mode. You can use the extended command mode of the ping command to specify the supported Internet header options. To enter the extended mode, enter ping, then Y at the extended commands prompt.

Host names are shown if the addresses are translated dynamically or via static host table entries. The times listed represent the time required for each of three probes to return. NOTE: trace is supported by IP, CLNS, VINES, and AppleTalk. When the trace reaches the target destination, an asterisk (*) is reported at the display. This is normally caused by a time out in response to one of the probe packets. !H - The probe was received by the router, but not forwarded, usually due to an access list. P - The protocol was unreachable. N - The network was unreachable. U - The port was unreachable. * - Time out. The END