IT-320Chapter 5 IP Addressing. Objectives 1. Identify Ipv4 and Ipv6 addresses and their default...

Preview:

Citation preview

IT-320 Chapter 5

IP Addressing

Objectives• 1.                  Identify Ipv4 and Ipv6 addresses and their default subnet masks.• 2.                  Identify the differences between public and private networks.• 3.                  Identify the purpose of subnetting and default gateways.• 4.                  Given an IP address and subnet mask, determine the network and

host addresses.• 5.                  Given a network situation, determine the subnet mask for that

network.• 6.                  Explain the difference between Classful IP and CIDR addressing .• 7.                  Explain VLSM and CIDR.• 8.                  Identify the purpose of NAT services as compared to a Proxy

server.• 9.                  Identify the purpose of subnetting and default gateways.• 10.              Given a range of networks, aggregate them to the highest degree

possible.• 11.              Specify the main features of Ethernet, Token Ring and FDDI.• 12.              Specify the speed, length, topology, and cable characteristics for

Ethernet.• 13.              Build an Ethernet network.

FIGURE 5-1 IP Network with Addresses and Subnet Masks. Notice the Multihomed Computer (Computer with Two Network Cards Connected to Two Subnets)

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 5-2 IP Addresses with Default Gateways (GW) that Point to the Router.

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 5-3 The Host Number Can Be Split into a Subnet and a Host Number Address

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 5-4 Using VLSM to Divide an Assigned Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 5-5 Address Strategy for VLSM Example

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 5-6 IPv6 IP Header

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

IT-320 Chapter 6

Ethernet, Token Ring and FDDI

FIGURE 6-1 Ethernet Using Manchester Signal Encoding that Uses Transition State to Encode Data

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-2 An 802.2 Ethernet Packet

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-3 Ethernet Encapsulations

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-4 A 10base5 Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-5 A 10base2 Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-6 A 10BaseT Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-7 The 5-4-3 Rule for an Ethernet Coaxial Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-8 The 5-4-3 Rule for an Ethernet UTP Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-9 The 5-4-3 Rule for an Ethernet UTP/Coaxial Network

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-10 A Token Ring Frame

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-11 MAUs Connected Together. Notice the Cables Attached to RI and RO are Connected to Form a Larger Ring

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-12 EIA/TIA 568-A Wiring Summary

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-13 A Cable Tester

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 6-14 A Tone Generator

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

Recommended