Lecture 8 11
Lecture 8 11
Lecture 8 11
IPv6 Packet Explain the role of the major header fields in the IPv6 packet.
Router Routing Tables Explain the function of fields in the routing table of a router.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
8.1 Network Layer
Characteristics
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Network Layer Characteristics
The Network Layer
• Provides services to allow end devices to exchange
data
• IP version 4 (IPv4) and IP version 6 (IPv6) are the
principle network layer communication protocols.
• The network layer performs four basic operations:
• Addressing end devices
• Encapsulation
• Routing
• De-encapsulation
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Layer Characteristics
IP Encapsulation
• IP encapsulates the transport layer
segment.
• IP can use either an IPv4 or IPv6
packet and not impact the layer 4
segment.
• IP packet will be examined by all
layer 3 devices as it traverses the
network.
• The IP addressing does not change
from source to destination.
Note: NAT will change addressing,
but will be discussed in a later
module.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Layer Characteristics
Characteristics of IP
IP is meant to have low overhead and may be described as:
• Connectionless
• Best Effort
• Media Independent
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Layer Characteristics
Connectionless
IP is Connectionless
• IP does not establish a connection with the destination before sending the packet.
• The destination will receive the packet when it arrives, but no pre-notifications are sent by IP.
• If there is a need for connection-oriented traffic, then another protocol will handle this
(typically TCP at the transport layer).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Network Layer Characteristics
Best Effort
IP is Best Effort
• IP will not guarantee delivery of the
packet.
• IP has reduced overhead since there
is no mechanism to resend data that
is not received.
• IP does not expect
acknowledgments.
• IP does not know if the other device
is operational or if it received the
packet.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Layer Characteristics
Media Independent
IP is unreliable:
• It cannot manage or fix undelivered or
corrupt packets.
• IP cannot retransmit after an error.
• IP cannot realign out of sequence
packets.
• IP must rely on other protocols for these
functions.
IP is media Independent:
• IP does not concern itself with the type
of frame required at the data link layer
or the media type at the physical layer.
• IP can be sent over any media type:
copper, fiber, or wireless.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Layer Characteristics
Media Independent (Contd.)
The network layer will establish the
Maximum Transmission Unit (MTU).
• Network layer receives this from
control information sent by the data
link layer.
• The network then establishes the
MTU size.
Fragmentation is when Layer 3 splits the
IPv4 packet into smaller units.
• Fragmenting causes latency.
• IPv6 does not fragment packets.
• Example: Router goes from Ethernet
to a slow WAN with a smaller MTU
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
8.2 IPv4 Packet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
IPv4 Packet
IPv4 Packet Header
IPv4 is the primary communication protocol for the network layer.
The network header has many purposes:
• It ensures the packet is sent in the correct direction (to the destination).
• It contains information for network layer processing in various fields.
• The information in the header is used by all layer 3 devices that handle the packet
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
IPv4 Packet
IPv4 Packet Header Fields
The IPv4 network header characteristics:
• It is in binary.
• Contains several fields of information
• Diagram is read from left to right, 4 bytes per
line
• The two most important fields are the source
and destination.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
IPv4 Packet
IPv4 Packet Header Fields
Significant fields in the IPv4 header:
Function Description
Version This will be for v4, as opposed to v6, a 4 bit field= 0100
Differentiated Services Used for QoS: DiffServ – DS field or the older IntServ – ToS or Type of Service
Time to Live (TTL) Layer 3 hop count. When it becomes zero the router will discard the packet.
Protocol I.D.s next level protocol: ICMP, TCP, UDP, etc.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
8.3 IPv6 Packets
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
IPv6 Packets
Limitations of IPv4
IPv4 has three major limitations:
• IPv4 address depletion – We have basically run out of IPv4 addressing.
• Lack of end-to-end connectivity – To make IPv4 survive this long, private addressing and
NAT were created. This ended direct communications with public addressing.
• Increased network complexity – NAT was meant as temporary solution and creates
issues on the network as a side effect of manipulating the network headers addressing.
NAT causes latency and troubleshooting issues.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
IPv6 Packets
IPv6 Overview
• IPv6 was developed by Internet
Engineering Task Force (IETF).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
IPv6 Packets
IPv4 Packet Header Fields in the IPv6 Packet Header
• The IPv6 header is simplified,
but not smaller.
• The header is fixed at 40 Bytes
or octets long.
• Several IPv4 fields were
removed to improve
performance.
• Some IPv4 fields were removed
to improve performance:
• Flag
• Fragment Offset
• Header Checksum
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
IPv6 Packets
IPv6 Packet Header
Significant fields in the IPv6 header:
Function Description
Version This will be for v6, as opposed to v4, a 4 bit field= 0110
Flow Label Informs device to handle identical flow labels the same way, 20 bit field
Payload Length This 16-bit field indicates the length of the data portion or payload of the IPv6
packet
Next Header I.D.s next level protocol: ICMP, TCP, UDP, etc.
• are optional
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
8.4 How a Host Routes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
How a Host Routes
Host Forwarding Decision
• Packets are always created at the source.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
How a Host Routes
Host Forwarding Decision (Cont.)
• The Source device determines whether the destination is local or remote
• Method of determination:
• IPv4 – Source uses its own IP address and Subnet mask, along with the destination IP
address
• IPv6 – Source uses the network address and prefix advertised by the local router
• Local traffic is dumped out the host interface to be handled by an intermediary device.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
How a Host Routes
Default Gateway
A router or layer 3 switch can be a default-gateway.
Features of a default gateway (DGW):
• It must have an IP address in the same range as the rest of the LAN.
• It can accept data from the LAN and is capable of forwarding traffic off of the LAN.
• It can route to other networks.
If a device has no default gateway or a bad default gateway, its traffic will not be
able to leave the LAN.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
How a Host Routes
A Host Routes to the Default Gateway
• The host will know the default
gateway (DGW) either statically or
through DHCP in IPv4.
• IPv6 sends the DGW through a
router solicitation (RS) or can be
configured manually.
• A DGW is static route which will be
a last resort route in the routing
table.
• All device on the LAN will need the
DGW of the router if they intend to
send traffic remotely.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
How a Host Routes
Host Routing Tables
• On Windows, route print
or netstat -r to display
the PC routing table
• Three sections
displayed by these two
commands:
• Interface List – all
potential interfaces and
MAC addressing
• IPv4 Routing Table
• IPv6 Routing Table
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
8.5 Introduction to Routing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Introduction to Routing
Router Packet Forwarding Decision
What happens when the router receives the frame from the host device?
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Introduction to Routing
IP Router Routing Table
There three types of routes in a router’s routing table:
• Directly Connected – These routes are automatically added by the router, provided the interface is
active and has addressing.
• Remote – These are the routes the router does not have a direct connection and may be learned:
• Manually – with a static route
• Dynamically – by using a routing protocol to have the routers share their information with each other
• Default Route – this forwards all traffic to a specific direction when there is not a match in the
routing table
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Introduction to Routing
Static Routing
Static Route Characteristics:
• Must be configured manually
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Introduction to Routing
Dynamic Routing
Dynamic Routes Automatically:
• Discover remote networks
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Introduction to Routing
Introduction to an IPv4 Routing Table
The show ip route command shows the
following route sources:
• L - Directly connected local interface IP
address
• C – Directly connected network
• S – Static route was manually configured
by an administrator
• O – OSPF
• D – EIGRP
This command shows types of routes:
• Directly Connected – C and L
• Remote Routes – O, D, etc.
• Default Routes – S*
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Module 9: Address Resolution
Introduction to Networks v7.0
(ITN)
Module Objectives
Module Title: Address Resolution
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
9.1 MAC and IP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
MAC and IP
Destination on Same Network
There are two primary addresses assigned to a device on an Ethernet LAN:
• Layer 2 physical address (the MAC address) – Used for NIC to NIC communications
on the same Ethernet network.
• Layer 3 logical address (the IP address) – Used to send the packet from the source
device to the destination device.
Layer 2 addresses are used to deliver frames from one NIC to another NIC on the same
network. If a destination IP address is on the same network, the destination MAC address
will be that of the destination device.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
MAC and IP
Destination on Remote Network
When the destination IP address is on a remote network, the destination MAC address is
that of the default gateway.
• ARP is used by IPv4 to associate the IPv4 address of a device with the MAC address
of the device NIC.
• ICMPv6 is used by IPv6 to associate the IPv6 address of a device with the MAC
address of the device NIC.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
9.2 ARP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
ARP
ARP Overview
A device uses ARP to determine the
destination MAC address of a local
device when it knows its IPv4 address.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
ARP
ARP Functions
To send a frame, a device will search its ARP table for a destination IPv4 address and a
corresponding MAC address.
• If the packet’s destination IPv4 address is on the same network, the device will
search the ARP table for the destination IPv4 address.
• If the destination IPv4 address is on a different network, the device will search the
ARP table for the IPv4 address of the default gateway.
• If the device locates the IPv4 address, its corresponding MAC address is used as the
destination MAC address in the frame.
• If there is no ARP table entry is found, then the device sends an ARP request.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
ARP
Removing Entries from an ARP Table
• Entries in the ARP table are not permanent and are removed when an ARP cache
timer expires after a specified period of time.
• The duration of the ARP cache timer differs depending on the operating system.
• ARP table entries can also be removed manually by the administrator.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
ARP
ARP Tables on Networking Devices
• The show ip arp command displays the ARP table on a Cisco router.
• The arp –a command displays the ARP table on a Windows 10 PC.
C:\Users\PC> arp -a
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
ARP
ARP Issues – ARP Broadcasting and ARP Spoofing
• ARP requests are received and processed by every device on the local network.
• Excessive ARP broadcasts can cause some reduction in performance.
• ARP replies can be spoofed by a threat actor to perform an ARP poisoning attack.
• Enterprise level switches include mitigation techniques to protect against ARP attacks.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
9.3 IPv6 Neighbor Discovery
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
IPv6 Neighbor Discovery
IPv6 Neighbor Discovery Messages
IPv6 Neighbor Discovery (ND) protocol provides:
• Address resolution
• Router discovery
• Redirection services
• ICMPv6 Neighbor Solicitation (NS) and Neighbor Advertisement (NA)
messages are used for device-to-device messaging such as address
resolution.
• ICMTPv6 Router Solicitation (RS) and Router Advertisement (RA) messages
are used for messaging between devices and routers for router discovery.
• ICMPv6 redirect messages are used by routers for better next-hop selection.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
IPv6 Neighbor Discovery
IPv6 Neighbor Discovery – Address Resolution
• IPv6 devices use ND to resolve
the MAC address of a known
IPv6 address.
• ICMPv6 Neighbor Solicitation
messages are sent using
special Ethernet and IPv6
multicast addresses.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Module 10: Basic Router
Configuration
Introduction to Networks v7.0
(ITN)
Module Objectives
Module Title: Basic Router Configuration
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
10.1 Configure Initial Router
Settings
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Configure Initial Router Settings
Basic Router Configuration Steps
• Configure the device name. Router(config)# hostname hostname
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Configure Initial Router Settings
Basic Router Configuration Example
• Commands for basic router R1(config)# hostname R1
R1(config)# enable secret class
configuration on R1. R1(config)# line console 0
R1(config-line)# password cisco
• Configuration is saved to R1(config-line)# login
NVRAM. R1(config-line)# line vty 0 4
R1(config-line)# password cisco
R1(config-line)# login
R1(config-line)# transport input ssh telnet
R1(config-line)# exit
R1(config)# service password encryption
R1(config)# banner motd #
Enter TEXT message. End with a new line and the #
***********************************************
WARNING: Unauthorized access is prohibited!
**********************************************
R1(config)# exit
R1# copy running-config startup-config
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
10.2 Configure Interfaces
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Configure Interfaces
Configure Router Interfaces
Configuring a router interface includes issuing the following commands:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Configure Interfaces
Configure Router Interfaces Example
The commands to configure interface G0/0/0 on R1 are shown here:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Configure Interfaces
Configure Router Interfaces Example (Cont.)
The commands to configure interface G0/0/1 on R1 are shown here:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Configure Interfaces
Verify Interface Configuration
To verify interface configuration use the show ip interface brief and
show ipv6 interface brief commands shown here:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Configure Interfaces
Configure Verification Commands
Commands Description
show ip interface brief Displays all interfaces, their IP addresses, and their current
show ipv6 interface brief status.
show ip route Displays the contents of the IP routing tables stored in
show ipv6 route RAM.
show interfaces Displays statistics for all interfaces on the device. Only
displays the IPv4 addressing information.
show ip interfaces Displays the IPv4 statistics for all interfaces on a router.
show ipv6 interfaces Displays the IPv6 statistics for all interfaces on a router.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Configure Interfaces
Configure Verification Commands (Cont.)
View status of all interfaces with the show ip interface brief and show ipv6 interface
brief commands, shown here:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Configure Interfaces
Configure Verification Commands (Cont.)
Display the contents of the IP routing tables with the show ip route and show ipv6
route commands as shown here:
R1# show ip route
< output omitted>
Gateway of last resort is not set
192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.10.0/24 is directly connected, GigabitEthernet0/0/0
L 192.168.10.1/32 is directly connected, GigabitEthernet0/0/0
209.165.200.0/24 is variably subnetted, 2 subnets, 2 masks
C 209.165.200.224/30 is directly connected, GigabitEthernet0/0/1
L 209.165.200.225/32 is directly connected, GigabitEthernet0/0/1
R1#
<output omitted>
R1#
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Configure Interfaces
Configure Verification Commands (Cont.)
R1# show ip interface g0/0/0
Display IPv4 statistics for GigabitEthernet0/0/0 is up, line protocol is up
router interfaces with the Internet address is 192.168.10.1/24
Broadcast address is 255.255.255.255
show ip interface Address determined by setup command
command, as shown here: MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing Common access list is not set
Outgoing access list is not set
Inbound Common access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP Flow switching is disabled
<output omitted>
R1#
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Configure Interfaces
Configure Verification Commands (Cont.)
R1# show ipv6 interface g0/0/0
Display IPv6 statistics for GigabitEthernet0/0/0 is up, line protocol is up
router interfaces with the IPv6 is enabled, link-local address is
FE80::868A:8DFF:FE44:49B0
show ipv6 interface No Virtual link-local address(es):
command shown here: Description: Link to LAN
Global unicast address(es):
2001:DB8:ACAD:10::1, subnet is 2001:DB8:ACAD:10::/64
Joined group address(es):
FF02::1
FF02::1:FF00:1
FF02::1:FF44:49B0
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds (using 30000)
ND NS retransmit interval is 1000 milliseconds
R1#
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
10.3 Configure the Default
Gateway
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Configure the Default Gateway
Default Gateway on a Host
• The default gateway is used
when a host sends a packet to a
device on another network.
• The default gateway address is
generally the router interface
address attached to the local
network of the host.
• To reach PC3, PC1 addresses a
packet with the IPv4 address of
PC3, but forwards the packet to
its default gateway, the G0/0/0
interface of R1.
Note: The IP address of the host and the
router interface must be in the same network.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Configure the Default Gateway
Default Gateway on a Switch
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Module Practice and Quiz
What did I learn in this module?
• The tasks that should be completed when configuring initial settings on a router.
• Configure the device name.
• Secure privileged EXEC mode.
• Secure user EXEC mode.
• Secure remote Telnet / SSH access.
• Secure all passwords in the config file.
• Provide legal notification.
• Save the configuration.
• For routers to be reachable, the router interfaces must be configured.
• Using the no shutdown command activates the interface. The interface must also be
connected to another device, such as a switch or a router, for the physical layer to be
active. There are several commands that can be used to verify interface configuration
including the show ip interface brief and show ipv6 interface brief, the show ip route
and show ipv6 route, as well as show interfaces, show ip interface and show ipv6
interface.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Module Practice and Quiz
What did I learn in this module (Cont.)?
• For an end device to reach other networks, a default gateway must be configured.
• The IP address of the host device and the router interface address must be in the
same network.
• A switch must have a default gateway address configured to remotely manage the
switch from another network.
• To configure an IPv4 default gateway on a switch, use the ip default-gateway ip-
address global configuration command.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Module 11: IPv4
Addressing
Introduction to Networks v7.0
(ITN)
Module Objectives
Module Title: IPv4 Addressing
Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network.
Topic Title Topic Objective
IPv4 Address Structure Describe the structure of an IPv4 address including
the network portion, the host portion, and the
subnet mask.
IPv4 Unicast, Broadcast, and Multicast Compare the characteristics and uses of the
unicast, broadcast and multicast IPv4 addresses.
Types of IPv4 Addresses Explain public, private, and reserved IPv4
addresses.
Network Segmentation Explain how subnetting segments a network to
enable better communication.
Subnet an IPv4 Network Calculate IPv4 subnets for a /24 prefix.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Module Objectives (Cont.)
Module Title: IPv4 Addressing
Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network.
Topic Title Topic Objective
Subnetting a /16 and a /8 Prefix Calculate IPv4 subnets for a /16 and a /8 prefix.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
11.1 IPv4 Address Structure
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
IPv4 Address Structure
Network and Host Portions
• An IPv4 address is a 32-bit hierarchical address that is made up of a network portion
and a host portion.
• When determining the network portion versus the host portion, you must look at the
32-bit stream.
• A subnet mask is used to determine the network and host portions.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
IPv4 Address Structure
The Subnet Mask
• To identify the network and host portions of an IPv4 address, the subnet mask is
compared to the IPv4 address bit for bit, from left to right.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
IPv4 Address Structure
The Prefix Length
• A prefix length is a less cumbersome method used to identify a subnet mask address.
Prefix
• The prefix length is the number Subnet Mask 32-bit Address
Length
of bits set to 1 in the subnet 255.0.0.0 11111111.00000000.00000000.00000000 /8
mask.
255.255.0.0 11111111.11111111.00000000.00000000 /16
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
IPv4 Address Structure
Network, Host, and Broadcast Addresses
• Within each network are three types of IP addresses:
• Network address
• Host addresses
• Broadcast address
Host
Network Portion Host Bits
Portion
Subnet mask 255 255 255 0
255.255.255.0 or /24 11111111 11111111 11111111 00000000
Network address 192 168 10 0
All 0s
192.168.10.0 or /24 11000000 10100000 00001010 00000000
First address 192 168 10 1
All 0s and a 1
192.168.10.1 or /24 11000000 10100000 00001010 00000001
Last address 192 168 10 254
All 1s and a 0
192.168.10.254 or /24 11000000 10100000 00001010 11111110
Broadcast address 192 168 10 255
All 1s
192.168.10.255 or /24 11000000 10100000 00001010 11111111
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
11.2 IPv4 Unicast, Broadcast,
and Multicast
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
IPv4 Unicast, Broadcast, and Multicast
Unicast
• Unicast transmission is sending a packet to one destination IP address.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
IPv4 Unicast, Broadcast, and Multicast
Broadcast
• Broadcast transmission is sending a packet to all other destination IP addresses.
• For example, the PC at 172.16.4.1 sends a broadcast packet to all IPv4 hosts.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
IPv4 Unicast, Broadcast, and Multicast
Multicast
• Multicast transmission is sending a packet to a multicast address group.
• For example, the PC at 172.16.4.1 sends a multicast packet to the multicast group
address 224.10.10.5.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
11.3 Types of IPv4
Addresses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Types of IPv4 Addresses
Public and Private IPv4 Addresses
• As defined in in RFC 1918, public IPv4 addresses are globally routed between
internet service provider (ISP) routers.
network.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Types of IPv4 Addresses
Routing to the Internet
• Network Address Translation (NAT) translates private IPv4 addresses to public IPv4
addresses.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Types of IPv4 Addresses
Special Use IPv4 Addresses
Loopback addresses
• 127.0.0.0 /8 (127.0.0.1 to 127.255.255.254)
• Commonly identified as only 127.0.0.1
• Used on a host to test if TCP/IP is operational.
Link-Local addresses
• 169.254.0.0 /16 (169.254.0.1 to 169.254.255.254)
• Commonly known as the Automatic Private IP Addressing (APIPA) addresses or self-
assigned addresses.
• Used by Windows DHCP clients to self-configure when no DHCP servers are
available.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Types of IPv4 Addresses
Legacy Classful Addressing
RFC 790 (1981) allocated IPv4 addresses
in classes
• Class A (0.0.0.0/8 to 127.0.0.0/8)
• Class B (128.0.0.0 /16 – 191.255.0.0 /16)
• Class C (192.0.0.0 /24 – 223.255.255.0 /24)
• Class D (224.0.0.0 to 239.0.0.0)
• Class E (240.0.0.0 – 255.0.0.0)
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
11.4 Network Segmentation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Network Segmentation
Broadcast Domains and Segmentation
• Many protocols use broadcasts or multicasts (e.g., ARP use broadcasts to locate
other devices, hosts send DHCP discover broadcasts to locate a DHCP server.)
• Switches propagate broadcasts out all interfaces except the interface on which it was
received.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Segmentation
Reasons for Segmenting Networks
• Subnetting reduces overall network traffic and improves network performance.
• It can be used to implement security policies between subnets.
• Subnetting reduces the number of devices affected by abnormal broadcast traffic.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
11.5 Subnet an IPv4 Network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Subnet an IPv4 Network
Subnet on an Octet Boundary
• Networks are most easily subnetted at the octet boundary of /8, /16, and /24.
• Notice that using longer prefix lengths decreases the number of hosts per subnet.
Prefix Length Subnet Mask Subnet Mask in Binary (n = network, h = host) # of hosts
nnnnnnnn.hhhhhhhh.hhhhhhhh.hhhhhhhh
/8 255.0.0.0 16,777,214
11111111.00000000.00000000.00000000
nnnnnnnn.nnnnnnnn.hhhhhhhh.hhhhhhhh
/16 255.255.0.0 65,534
11111111.11111111.00000000.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh
/24 255.255.255.0 254
11111111.11111111.11111111.00000000
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Subnet an IPv4 Network
Subnet on an Octet Boundary (Cont.)
• In the first table 10.0.0.0/8 is subnetted using /16 and in the second table, a /24 mask.
Subnet Address Host Range Subnet Address
Host Range
(256 Possible (65,534 possible hosts per Broadcast (65,536 Possible Broadcast
(254 possible hosts per subnet)
Subnets) subnet) Subnets)
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
11.6 Subnet a Slash 16 and a
Slash 8 Prefix
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Subnet a Slash 16 and a Slash 8 Prefix
Create Subnets with a Slash 16 prefix
Prefix Length Subnet Mask Network Address (n = network, h = host) # of subnets # of hosts
nnnnnnnn.nnnnnnnn.nhhhhhhh.hhhhhhhh
•
/17 255.255.128.0 2 32766
The table highlights all 11111111.11111111.10000000.00000000
nnnnnnnn.nnnnnnnn.nnhhhhhh.hhhhhhhh
the possible scenarios for /18 255.255.192.0
11111111.11111111.11000000.00000000
4 16382
nnnnnnnn.nnnnnnnn.nnnnhhhh.hhhhhhhh
/20 255.255.240.0 16 4094
11111111.11111111.11110000.00000000
nnnnnnnn.nnnnnnnn.nnnnnhhh.hhhhhhhh
/21 255.255.248.0 32 2046
11111111.11111111.11111000.00000000
nnnnnnnn.nnnnnnnn.nnnnnnhh.hhhhhhhh
/22 255.255.252.0 64 1022
11111111.11111111.11111100.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnh.hhhhhhhh
/23 255.255.254.0 128 510
11111111.11111111.11111110.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh
/24 255.255.255.0 256 254
11111111.11111111.11111111.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh
/25 255.255.255.128 512 126
11111111.11111111.11111111.10000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 1024 62
11111111.11111111.11111111.11000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 2048 30
11111111.11111111.11111111.11100000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 4096 14
11111111.11111111.11111111.11110000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 8192 6
11111111.11111111.11111111.11111000
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 16384 2
11111111.11111111.11111111.11111100
Subnet a Slash 16 and a Slash 8 Prefix
Create 100 Subnets with a Slash 16 prefix
Consider a large enterprise that requires at least 100
subnets and has chosen the private address
172.16.0.0/16 as its internal network address.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Subnet a Slash 16 and a Slash 8 Prefix
Create 1000 Subnets with a Slash 8 prefix
Consider a small ISP that requires 1000 subnets for
its clients using network address 10.0.0.0/8 which
means there are 8 bits in the network portion and
24 host bits available to borrow toward subnetting.
• The figure displays the number of subnets that can be
created when borrowing bits from the second and third.
• Notice there are now up to 22 host bits that can be
borrowed (i.e., last two bits cannot be borrowed).
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
11.7 Subnet to Meet
Requirements
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Subnet to Meet Requirements
Subnet Private versus Public IPv4 Address Space
Enterprise networks will have an:
• Intranet - A company’s internal network typically
using private IPv4 addresses.
• DMZ – A companies internet facing servers.
Devices in the DMZ use public IPv4 addresses.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Subnet to Meet Requirements
Minimize Unused Host IPv4 Addresses and Maximize Subnets
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Subnet to Meet Requirements
Example: Efficient IPv4 Subnetting
• In this example, corporate headquarters has
been allocated a public network address of
172.16.0.0/22 (10 host bits) by its ISP
providing 1,022 host addresses.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
11.8 VLSM
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
VLSM
IPv4 Address Conservation
Given the topology, 7 subnets are required (i.e, four LANs and three WAN links) and the
largest number of host is in Building D with 28 hosts.
• A /27 mask would provide 8 subnets of 30 host IP addresses and therefore support
this topology.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
VLSM
IPv4 Address Conservation (Cont.)
However, the point-to-point WAN links only require two addresses
and therefore waste 28 addresses each for a total of 84 unused
addresses.
• Applying a traditional subnetting scheme to this scenario is not very efficient and is
wasteful.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
VLSM
VLSM
• The left side displays the traditional subnetting scheme
(i.e., the same subnet mask) while the right side
illustrates how VLSM can be used to subnet a subnet
and divided the last subnet into eight /30 subnets.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
VLSM
VLSM Topology Address Assignment
• Using VLSM subnets, the LAN and inter-router networks can be addressed without
unnecessary waste as shown in the logical topology diagram.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
11.9 Structured Design
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Structured Design
IPv4 Network Address Planning
IP network planning is crucial to develop a scalable solution to an enterprise network.
• To develop an IPv4 network wide addressing scheme, you need to know how many subnets are
needed, how many hosts a particular subnet requires, what devices are part of the subnet, which
parts of your network use private addresses, and which use public, and many other determining
factors.
Examine the needs of an organization’s network usage and how the subnets will be
structured.
• Perform a network requirement study by looking at the entire network to determining how each
area will be segmented.
• Determine how many subnets are needed and how many hosts per subnet.
• Determine DHCP address pools and Layer 2 VLAN pools.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Structured Design
Device Address Assignment
Within a network, there are different types of devices that require addresses:
• End user clients – Most use DHCP to reduce errors and burden on network support staff. IPv6
clients can obtain address information using DHCPv6 or SLAAC.
• Servers and peripherals – These should have a predictable static IP address.
• Servers that are accessible from the internet – Servers must have a public IPv4 address, most
often accessed using NAT.
• Intermediary devices – Devices are assigned addresses for network management, monitoring,
and security.
• Gateway – Routers and firewall devices are gateway for the hosts in that network.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Module Practice and Quiz
What did I learn in this module?
• The IP addressing structure consists of a 32-bit hierarchical network address that identifies a
network and a host portion. Network devices use a process called ANDing using the IP
address and associated subnet mask to identify the network and host portions.
• Destination IPv4 packets can be unicast, broadcast, and multicast.
• There are globally routable IP addresses as assigned by the IANA and there are three ranges
of private IP network addresses that cannot be routed globally but can be used on all internal
private networks.
• Reduce large broadcast domains using subnets to create smaller broadcast domains, reduce
overall network traffic, and improve network performance.
• Create IPv4 subnets using one or more of the host bits as network bits. However, networks
are most easily subnetted at the octet boundary of /8, /16, and /24.
• Larger networks can be subnetted at the /8 or /16 boundaries.
• Use VLSM to reduce the number of unused host addresses per subnet.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Module Practice and Quiz
What did I learn in this module? (Cont.)
• VLSM allows a network space to be divided into unequal parts. Always begin by satisfying
the host requirements of the largest subnet. Continue subnetting until the host requirements
of the smallest subnet are satisfied.
• When designing a network addressing scheme, consider internal, DMZ, and external
requirements. Use a consistent internal IP addressing scheme with a set pattern of how
addresses are allocated to each type of device.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45