The document discusses data link layer protocols, including LLC, MAC, and Ethernet standards. It describes the functions of the physical layer, data link layer, and logical link control sublayer. It also covers IP addressing schemes like IPv4 addresses, network classes, public vs private addresses, and subnetting. CIDR is introduced as a method to improve address space utilization and routing scalability on the internet.
This document discusses the data link layer, which prepares network layer packets for transmission by encapsulating them into frames. It identifies common data link layer protocols for both LANs and WANs. The data link layer controls media access through logical link control and media access control sublayers. Media access control methods include controlled access like token ring and contention-based access like CSMA/CD. Frame structure is also discussed, with frames containing source/destination addresses, error checking fields, and encapsulated network layer data. Different frame types are used depending on the logical and physical network topology.
This document provides an overview of network addressing concepts including:
1. It describes IP addresses and subnet masks, and how they are used to identify networks and hosts.
2. It outlines the different classes of IP addresses (A, B, C, D, E) and their address ranges.
3. It explains how devices obtain IP addresses through static assignment or dynamic assignment via DHCP.
4. It discusses network address translation (NAT) and how it allows private IP addresses to access the public internet through an ISR router.
This document provides an overview of the Internet Control Message Protocol (ICMP). It discusses the different types of ICMP messages including error reporting messages like Destination Unreachable and query messages like Echo Request and Reply. It describes the ICMP message format, checksum calculation, and how debugging tools like ping and traceroute use ICMP to troubleshoot network connectivity issues. Specific examples are provided to demonstrate how to use these tools and interpret their output.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
The document discusses data link layer protocols, including LLC, MAC, and Ethernet standards. It describes the functions of the physical layer, data link layer, and logical link control sublayer. It also covers IP addressing schemes like IPv4 addresses, network classes, public vs private addresses, and subnetting. CIDR is introduced as a method to improve address space utilization and routing scalability on the internet.
This document discusses the data link layer, which prepares network layer packets for transmission by encapsulating them into frames. It identifies common data link layer protocols for both LANs and WANs. The data link layer controls media access through logical link control and media access control sublayers. Media access control methods include controlled access like token ring and contention-based access like CSMA/CD. Frame structure is also discussed, with frames containing source/destination addresses, error checking fields, and encapsulated network layer data. Different frame types are used depending on the logical and physical network topology.
This document provides an overview of network addressing concepts including:
1. It describes IP addresses and subnet masks, and how they are used to identify networks and hosts.
2. It outlines the different classes of IP addresses (A, B, C, D, E) and their address ranges.
3. It explains how devices obtain IP addresses through static assignment or dynamic assignment via DHCP.
4. It discusses network address translation (NAT) and how it allows private IP addresses to access the public internet through an ISR router.
This document provides an overview of the Internet Control Message Protocol (ICMP). It discusses the different types of ICMP messages including error reporting messages like Destination Unreachable and query messages like Echo Request and Reply. It describes the ICMP message format, checksum calculation, and how debugging tools like ping and traceroute use ICMP to troubleshoot network connectivity issues. Specific examples are provided to demonstrate how to use these tools and interpret their output.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
This document discusses CSMA/CA protocols used in 802.11 and 802.15.4 wireless standards. It explains that CSMA/CA uses carrier sensing to avoid collisions by having nodes wait a random backoff period if the channel is busy, whereas CSMA/CD uses backoff after a collision is detected. It also provides details on the IEEE 802.15.4 standard defining physical and MAC layers for low-rate wireless personal area networks, including its low power consumption, CSMA/CA access, packet structure, modulation schemes and topologies.
The document compares the TCP/IP and OSI network models. It notes that while the OSI model has 7 layers, TCP/IP has 4 layers: Network Access, Internet, Transport, and Application. The Network Access layer combines the functions of the OSI Data Link and Physical layers. It provides details on the protocols and functions of each TCP/IP layer, including common protocols like IP, TCP, UDP, HTTP, and FTP.
The document describes the basic BGP configuration of routers R1, R2, and ISPs Airtel, Reliance, and Vodafone. It defines the interfaces of each router and ISP with IP addresses. It also outlines the BGP configuration of each entity with AS numbers, neighbor definitions, and network advertisements. Troubleshooting commands like show ip route, show ip bgp summary, and show ip bgp neighbor are listed.
There are two main types of addresses used in networking: IP addresses and MAC addresses. IP addresses are assigned to devices using TCP/IP and allow devices to communicate on an IP network or the Internet. They consist of a network portion and host portion. MAC addresses are unique identifiers assigned to network interfaces.
The document discusses the OSI physical layer. It describes the physical layer's purpose of creating electrical, optical, or microwave signals to represent bits in frames. It discusses different physical layer protocols and services, signaling and encoding methods used on different network media like copper, fiber, and wireless. It also covers physical layer standards bodies, functions of transmitting data, encoding it onto media, and signaling methods. Physical characteristics of different media types are explained as well as common physical layer protocols for wireless networking.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
Dokumen tersebut membahas tentang layer data link pada model OSI khususnya sublayer MAC dan LLC. Layer data link bertanggung jawab menyediakan koneksi antar dua komputer dengan menggunakan alamat fisik dan mengelompokkan bit menjadi frame. Sublayer MAC dan LLC bekerja sama untuk mengatur akses media dan menyediakan layanan ke layer di atas.
Here are the key steps to include IPv6 on an existing IPv4 MPLS VPN using 6PE and CsC:
1. Upgrade PE routers to support 6PE and CsC. This allows the PEs to tunnel IPv6 packets over the existing IPv4 MPLS infrastructure.
2. Configure loopback addresses for the PE routers and advertise these addresses over MP-iBGP to exchange IPv6 reachability information.
3. Configure IPv6 VPN address families and enable the send-label option to exchange VPNv6 routes and labels over MP-iBGP.
4. Configure IPv6 VPN routes on the PEs and redistribute these routes into the VPNv6 address family to advertise to other PEs.
The document discusses the TCP/IP protocol stack and address resolution. It describes the five layers of the TCP/IP protocol suite - physical, data link, network, transport, and application layers. It also compares the TCP/IP and OSI models. Address resolution is explained, which is the process of mapping between Layer 3 network addresses and Layer 2 hardware addresses. The Address Resolution Protocol (ARP) allows hosts to dynamically discover the MAC address associated with a known IP address on the local network.
The document provides an overview of the Border Gateway Protocol (BGP). It begins with general information about BGP, including that it is used for routing between autonomous systems and is classified as a path vector routing protocol. It then covers BGP theory in detail over several sections, explaining concepts like neighbors, messages, states, attributes and more. The document aims to provide thorough theoretical understanding needed to implement BGP in a lab.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
This document summarizes a lecture on data communications and networking. It discusses categories of networks including LANs, MANs, and WANs. It also covers internetworks, the history of the Internet, communication tasks such as transmission, interfacing, synchronization, and protocols. Characteristics of protocols are described as direct/indirect, structured/monolithic, symmetric/asymmetric, and standard/non-standard. Suggested additional readings on these topics are provided.
This document discusses quality of service (QoS) classification on Cisco IOS routers. It explains that applications like voice have different network requirements than bulk file transfers. To ensure each application gets proper treatment, traffic must be classified. Classification methods on IOS routers include header inspection of fields like ports and IP addresses, and deeper payload inspection using Network-Based Application Recognition (NBAR) which can identify applications regardless of port. The document demonstrates simple classification using an access control list matched to a class map in a policy map applied to an interface. It also shows classification using NBAR to match protocols like Telnet in a class map.
Using BGP To Manage Dual Internet ConnectionsRowell Dionicio
Meredith Rose discusses using BGP to manage dual internet connections for redundancy. BGP allows traffic to be distributed across both connections simultaneously or fail over from one to the other. Key considerations include preventing the corporate network from becoming a transit path, influencing inbound and outbound traffic flows, and options for routes to import from each ISP like full routes, defaults only, or ISP customer routes plus a default. Proper configuration is needed to load balance connections and control traffic flows for both redundancy and performance.
The document provides an overview of networking basics, including:
- The OSI 7-layer model for network communication and the TCP/IP 4-layer Internet model.
- Standardization is needed to allow different network components to communicate through common protocols.
- Real-world networks are more complex than models, using combinations of topologies, media, and hardware like switches, routers, and gateways.
- Key concepts include IP addressing, subnets to extend address space, and the Domain Name System to map names to numbers.
- Configuring a host requires settings like the IP address, subnet mask, default gateway, and DNS servers.
Routing and switching essentials companion guide
By Cisco Networking Academy
Published Feb 18, 2014 by Cisco Press. Part of the Companion Guide series.
This document discusses how to manipulate BGP weight attributes using route maps to control route selection. The WEST router receives two routes from the EAST router via ISP-1 and ISP-2. By default, the ISP-2 path is preferred. Route maps are used to match networks and set the weight to 100 for ISP-1 when reaching 192.168.100.0/24 and for ISP-2 when reaching 172.16.0.0/24. This causes 192.168.100.0/24 to prefer ISP-1 and 172.16.0.0/24 to prefer ISP-2 in the WEST router's routing table.
Sie haben noch Serielle Endgeräte im Einsatz? Aber das Netz ist doch längst auf Ethernet umgestellt. Die alten Leitungen müssen weg, aber die alten Endgeräte sind noch gut? Dann brauchen Sie nur eine einfache Lösung. Übertragen Sie ihre alten Seriellen Daten einfach über Ethernet. Einen kurzen Einblick in das Howto bekommen Sie in diesem Webinar.
This document discusses CSMA/CA protocols used in 802.11 and 802.15.4 wireless standards. It explains that CSMA/CA uses carrier sensing to avoid collisions by having nodes wait a random backoff period if the channel is busy, whereas CSMA/CD uses backoff after a collision is detected. It also provides details on the IEEE 802.15.4 standard defining physical and MAC layers for low-rate wireless personal area networks, including its low power consumption, CSMA/CA access, packet structure, modulation schemes and topologies.
The document compares the TCP/IP and OSI network models. It notes that while the OSI model has 7 layers, TCP/IP has 4 layers: Network Access, Internet, Transport, and Application. The Network Access layer combines the functions of the OSI Data Link and Physical layers. It provides details on the protocols and functions of each TCP/IP layer, including common protocols like IP, TCP, UDP, HTTP, and FTP.
The document describes the basic BGP configuration of routers R1, R2, and ISPs Airtel, Reliance, and Vodafone. It defines the interfaces of each router and ISP with IP addresses. It also outlines the BGP configuration of each entity with AS numbers, neighbor definitions, and network advertisements. Troubleshooting commands like show ip route, show ip bgp summary, and show ip bgp neighbor are listed.
There are two main types of addresses used in networking: IP addresses and MAC addresses. IP addresses are assigned to devices using TCP/IP and allow devices to communicate on an IP network or the Internet. They consist of a network portion and host portion. MAC addresses are unique identifiers assigned to network interfaces.
The document discusses the OSI physical layer. It describes the physical layer's purpose of creating electrical, optical, or microwave signals to represent bits in frames. It discusses different physical layer protocols and services, signaling and encoding methods used on different network media like copper, fiber, and wireless. It also covers physical layer standards bodies, functions of transmitting data, encoding it onto media, and signaling methods. Physical characteristics of different media types are explained as well as common physical layer protocols for wireless networking.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
Dokumen tersebut membahas tentang layer data link pada model OSI khususnya sublayer MAC dan LLC. Layer data link bertanggung jawab menyediakan koneksi antar dua komputer dengan menggunakan alamat fisik dan mengelompokkan bit menjadi frame. Sublayer MAC dan LLC bekerja sama untuk mengatur akses media dan menyediakan layanan ke layer di atas.
Here are the key steps to include IPv6 on an existing IPv4 MPLS VPN using 6PE and CsC:
1. Upgrade PE routers to support 6PE and CsC. This allows the PEs to tunnel IPv6 packets over the existing IPv4 MPLS infrastructure.
2. Configure loopback addresses for the PE routers and advertise these addresses over MP-iBGP to exchange IPv6 reachability information.
3. Configure IPv6 VPN address families and enable the send-label option to exchange VPNv6 routes and labels over MP-iBGP.
4. Configure IPv6 VPN routes on the PEs and redistribute these routes into the VPNv6 address family to advertise to other PEs.
The document discusses the TCP/IP protocol stack and address resolution. It describes the five layers of the TCP/IP protocol suite - physical, data link, network, transport, and application layers. It also compares the TCP/IP and OSI models. Address resolution is explained, which is the process of mapping between Layer 3 network addresses and Layer 2 hardware addresses. The Address Resolution Protocol (ARP) allows hosts to dynamically discover the MAC address associated with a known IP address on the local network.
The document provides an overview of the Border Gateway Protocol (BGP). It begins with general information about BGP, including that it is used for routing between autonomous systems and is classified as a path vector routing protocol. It then covers BGP theory in detail over several sections, explaining concepts like neighbors, messages, states, attributes and more. The document aims to provide thorough theoretical understanding needed to implement BGP in a lab.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
This document summarizes a lecture on data communications and networking. It discusses categories of networks including LANs, MANs, and WANs. It also covers internetworks, the history of the Internet, communication tasks such as transmission, interfacing, synchronization, and protocols. Characteristics of protocols are described as direct/indirect, structured/monolithic, symmetric/asymmetric, and standard/non-standard. Suggested additional readings on these topics are provided.
This document discusses quality of service (QoS) classification on Cisco IOS routers. It explains that applications like voice have different network requirements than bulk file transfers. To ensure each application gets proper treatment, traffic must be classified. Classification methods on IOS routers include header inspection of fields like ports and IP addresses, and deeper payload inspection using Network-Based Application Recognition (NBAR) which can identify applications regardless of port. The document demonstrates simple classification using an access control list matched to a class map in a policy map applied to an interface. It also shows classification using NBAR to match protocols like Telnet in a class map.
Using BGP To Manage Dual Internet ConnectionsRowell Dionicio
Meredith Rose discusses using BGP to manage dual internet connections for redundancy. BGP allows traffic to be distributed across both connections simultaneously or fail over from one to the other. Key considerations include preventing the corporate network from becoming a transit path, influencing inbound and outbound traffic flows, and options for routes to import from each ISP like full routes, defaults only, or ISP customer routes plus a default. Proper configuration is needed to load balance connections and control traffic flows for both redundancy and performance.
The document provides an overview of networking basics, including:
- The OSI 7-layer model for network communication and the TCP/IP 4-layer Internet model.
- Standardization is needed to allow different network components to communicate through common protocols.
- Real-world networks are more complex than models, using combinations of topologies, media, and hardware like switches, routers, and gateways.
- Key concepts include IP addressing, subnets to extend address space, and the Domain Name System to map names to numbers.
- Configuring a host requires settings like the IP address, subnet mask, default gateway, and DNS servers.
Routing and switching essentials companion guide
By Cisco Networking Academy
Published Feb 18, 2014 by Cisco Press. Part of the Companion Guide series.
This document discusses how to manipulate BGP weight attributes using route maps to control route selection. The WEST router receives two routes from the EAST router via ISP-1 and ISP-2. By default, the ISP-2 path is preferred. Route maps are used to match networks and set the weight to 100 for ISP-1 when reaching 192.168.100.0/24 and for ISP-2 when reaching 172.16.0.0/24. This causes 192.168.100.0/24 to prefer ISP-1 and 172.16.0.0/24 to prefer ISP-2 in the WEST router's routing table.
Sie haben noch Serielle Endgeräte im Einsatz? Aber das Netz ist doch längst auf Ethernet umgestellt. Die alten Leitungen müssen weg, aber die alten Endgeräte sind noch gut? Dann brauchen Sie nur eine einfache Lösung. Übertragen Sie ihre alten Seriellen Daten einfach über Ethernet. Einen kurzen Einblick in das Howto bekommen Sie in diesem Webinar.
Crouzet Automation - em4 Ethernet Broschüre, deutsche FassungCrouzet
Crouzet Automation ist Vorreiter in vereinfachter Programmierung. Unterstützt von erfahrenen Technikern und Entwicklern, bietet Crouzet Automation alternative Automationslösungen für spezialisierte und anspruchsvolle Anwendungen, die sich durch Anwenderfreundlichkeit und hohe Anpassungsfähigkeit auszeichnen.
www.crouzet-automation.com
LinkedIn: https://www.linkedin.com/company/crouzet-automation
Crouzet Automation ist eine Marke von InnoVista Sensors™.
InnoVista Sensors™ : Ihr zuverlässiger Partner, mit dem Sie die industriellen Herausforderungen von heute und von morgen meistern.
InnoVista Sensors™ ist ein weltweit tätiger Spezialist für Sensoren, Steuerungen und Aktuatoren für Automationssysteme.
Unter den Markennamen Crouzet Aerospace, Crouzet Automation, Crouzet Control, Crouzet Motors, Crouzet Switches und Systron Donner Inertial liefert InnoVista Sensors™ ein breites Sortiment von zuverlässigen, effizienten und anpassbaren Komponenten für die Bereiche Luftfahrt- und Verteidigung, Transport und Industrie.
Basierend auf der anerkannten Kompetenz und Innovationskraft seiner Teams stellt InnoVista Sensors™ seinen Kunden weltweit leistungssteigernde Lösungen zur Verfügung.
www.innovistasensors.com
12. Smooth migration from IPv4 to IPv6 with Citrix NetScaler - Daniel KünzliDigicomp Academy AG
Citrix NetScaler is the industry’s leading load balancer and application delivery controller (ADC), powering thousands of enterprise applications and the largest web sites in the world. However, we’re just scratching the surface of its potential. Citrix engineers have been hard at work getting NetScaler ready to tackle the next set of IT and application delivery challenges, such as virtual application, desktop and server availability and security. This technical session will highlight how NetScaler can help to migrate from IPv4 to IPv6 and make applications run better and faster.
Transport Layer Multipathing: MPTCP und CMT-SCTPMarkus Jungbluth
Funktionsweise und Möglichkeiten von Transport Layer Multipathing mit MPTCP und CMT-SCTP. Präsentation einer Arbeit im Seminar "Netzwerkarchitekturen" des Studiengangs Kommunikatonsinformatik an der htw saar (HTW des Saarlandes)
Sprache:
Deutsch
Autoren:
Markus Jungbluth
Tobias Müller
Slides out of a presentation within the Study of Applied Computer Sciences (Network-Sockets). - Lang: German
---
Präsentation im Zuge des Studiums der Angewandten Informatik (Netztechnik-Sockets) - Sprache: Deutsch
OSDC 2011 | Automatische Netzwerkdokumentation mit NetDot und RANCID by Jens ...NETWAYS
Netzwerke sind ein Kernbestandteil eines jeden Datacenters. Neben den zahlreichen Monitoring-Lösungen wie Nagios oder Icinga gibt es aber auch für das Management von Netzkomponenten wie Routern und Switchen zahlreiche Open-Source-Tools die jedem Admin das Leben erleichtern können. Einige dieser Werkzeuge sollen in diesem Vortrag vorgestellt werden:
Erhöhen Sie die Redundanz Ihres Netzwerkes mit VPN-Tunneln über das Internet oder externe Netze. Geroutete Redundanzen bieten Ihnen dabei die Flexibilität, sowohl einfache, redundante Anbindungen als auch komplexe Szenarien zu realisieren.
Egal, ob Sie eine Mobilfunk-Außenstation redundant an zwei VPN-Server anbinden möchten, ein Stich-Netzwerk über das Internet sicher zur Zentrale zurückführen wollen oder komplexe, vermaschte Netze realisieren möchten - all das ist mit Routing möglich.
In diesem Webinar präsentieren wir praxisnahe Beispiele und zeigen Ihnen, wie Sie diese Optimierungen umsetzen können und welche leistungsstarken Funktionen Ihnen dabei zur Verfügung stehen.
5. Die 7 Schichten des OSI-Modells
Anwendung
Darstellung
Komm.Steuerung
Transport
Vermittlung
Sicherung
Bitübertragung
Application
Presentation
Session
Transport
Network
Data link
Physical
3
2
1
7
6
5
4
Endsystem A Endsystem B
Übertragungsmedium
Transitsystem
All People Seem To Need Data Processing
9. Ethernet
Ethernet-Standards (IEEE)
CSMA/CD Verfahren
Ethernet-Frame
Serielle Übertragung von LSB zu MSB
Token Ring
Kollisionsfreie Übertragung
Token-Passing (bit=0= freier Token)
10. Bus-Topologie
erweiterbar, installierbar
Netzausfall bei Kabelbruch
Terminatoren
Ring-Topologie
Verteilte Steuerung
Große Ausdehnung
Aufwendige Fehlersuche
Keine aktiven NWK Komponenten
notwendig
11. Stern-Topologie
++ Vernetzung
++ Erweiterbarkeit
++ Ausfallssicherheit
Stern-Bus-Struktur
Kombi aus Stern und Bus
Kritische Situation bei Ausfall der zentralen Station
++ Verkabelungsaufwand
12. Baum-Topologie
Hohe
Ausfallssicherheit
Große Entfernung
realisierbar
„Wurzelproblem“
Vermaschte Topologie
Dezentrales Netzwerk
Unendliche Ausdehnung
Hohe Ausfallsicherheit aber hoher
Materialaufwand
13. Protokolle
Physikalische Adressierung von Datenpaketen
(MAC)
Adress Resolution Protocol
(ARP)
Point to Point Protocol
(PPP)
Geräte:
Switch
14. MAC (Media Access Control)
Einzigartige Adresse
Kombination aus Hersteller und
Seriennummer
Identifikator im NWK.
MAC Adresse von
WLAN &
sog. „onboard“ NWK
Karten
15. Aufgabe:
Weiterleitung der der Datenpakete zum nächsten Knoten
(Routing)
Protokolle
IP
IPX
ICMP
NetBEUI
Geräte
Layer 3 Switch
Router
16. IP Protokoll - Was ist eine IP Adresse?
eindeutig identifizierbare, logische Netzwerkadresse
IPv4 (32bit) ; Ipv6 (128bit)
32 Bit = 4 Oktetten = 4 Byte (IPv4)
IP: 192.168.9.22
Maske: 255.255.255.128
Gateway: 192.168.9.22
17. Eigenschaften des IP Headers
Version
TTL (Time-to-live)
Quell –IP-Adresse
Ziel-IP-Adresse
Paketlänge
Optionsfeld
(für Diagnose)
18. Netzklassen für IPv4
Öffentlich
Privat
Max Ip Adresse 232 4.294.967.296 Adressen (4,3 Milliarden)
Netzklasse Adressbereich (öffentliche) Private Adressräume
Klasse A 0.0.0.0 – 127.255.255.255 10.0.0.0 – 10.255.255.255
Klasse B 128.0.0.0 – 191.255.255.255 172.16.0.0 – 172.31.255.255
Klasse C 192.0.0.0 – 223.255.255.255 192.168.0.0 – 192.168.255.255
Klasse D 224.0.0.0 – 239.255.255.255
Klasse E 240.0.0.0 – 255.255.255.255
19. IPv6 (Internet Protokoll Version 6)
Nachfolger von IPv4
128 Bit Max IP Adressen 2128 ca. 340 Sextillionen
Wegfall der Subnetzmaske, diese wird mit / angehängt.
64 Bit Netzadressierung & 64 Bit den Host
IPv6-Urls notwendig für Portdefinition
20. Aufteilung eines Adressbereiches
von IP-Adressen in mehrere kleinen Adressbereiche
Welche „Subnetmask“ für welches Netz?
Hostberechnung
Hostanzahl Subnetzmaske 32-Bit-Wert Präfix
16.777.214 255.0.0.0 11111111 00000000 00000000 00000000 /8
65.534 255.255.0.0 11111111 11111111 00000000 00000000 /16
510 255.255.254.0 11111111 11111111 11111110 00000000 /23
254 255.255.255.0 11111111 11111111 11111111 00000000 /24
126 255.255.255.128 11111111 11111111 11111111 10000000 /25
21. 255.255.255.0 11111111.11111111.11111111.00000000
Nicht veränderbar Nicht veränderbar
Durch 1en ersetzen
1 1 1 1 1 1 1 1
27 26 25 24 23 22 21 20
128+64+32+16+8+4+2+1
255-1
254
In dezimal umwandeln:
Hostberechnung
einer /24
Maske
28 = 256 (0 – 255)
1 IP für die NWK ID
1 IP für Broadcast
Maximale Anzahl an Hosts
22. Notwendigkeit ?
Ip- Adresse definiert Host im Netzwerk
Subnetzmaske liefert Informationen
Informationen notwendig für die Zustellung des Ip-Datenpakets
Gleiche Netzwerkadresse bei Quelle und Ziel gleiches Subnetz
Ungleiche Netzwerkadresse bei Quelle und Ziel Routing in ein
anderes Subnetz via Gateway
24. Aufgabe:
Steuerung und Überwachung der logischen Verbindung zwischen
Sender und Empfänger (End-to-End)
Überwachung
Zerlegen und Zusammensetzen von Datenpaketen
Protokolle
TCP (Transmission Control Protocol)
UDP (User Datagram Protocol)
SPX (Sequenced Packet Exchange)
25. UDP (User Datagram Protocol)
kein Verbindungsmanagement , keine Flusskontrolle
keine Zeitüberwachung , keine Fehlerbehandlung
Aber hohe Geschwindigkeit
Bsp: Statusmeldung SNMP ;
Host
Host
Server
Server
REQUEST
RESPONSE
26. TCP (Transmission Control Protocol)
verbindungsorientiertes Protokoll
Verbindungsmanagement
Flusskontrolle , Zeitüberwachung , Fehlerbehandlung
Portdefinition in jedem TCP Paket !!!
Host
Host
Host
Host
Host
Host
SYN
Verbindungsaufbau erwünscht
SYN ACK
empfangsbereit
ACK
Verbindung aufgebaut
Übertragungsstart
29. Aufgaben:
Aufbauen, Halten und Abbauen von Sitzungen
Synchronisation des Dialoges (full/half duplex)
Koordiniert Anwendungen und deren Zusammenspiel auf
verschiedenen Hosts
Anwendungen
Network File System (NFS)
Structured Query Language (SQL)
Remote Procedure Call (RPC)
Host Server
Dienstanforderung
Dienstantwort
30. Aufgabe:
Legt Struktur der Daten fest bzw. Datenaufbereitung (docx.)
Fungiert als Übersetzer
Datenverschlüsselung
Datenkomprimierung
Protokolle:
http
ftp
Smtp
etc….
31. Aufgabe:
Zugang zur OSI Welt
Managt Kommunikation und Anwendung
Funktionsaufruf durch Anwendungsprogramm (Word)
Dienste und Anwendungen:
Telnet
http
Snmtp
DNS
DHCP
32. DHCP (Dynamic Host Configuration Protocol)
Protokoll zur automatischen IP-Adress-Vergabe
Eindeutige IP-Adresse
Subnetmask
Gateway
DNS-Server
DNS (Domain Name Service)
Übersetzt IP Adressen in Computernamen
Hostname & Domainname Fully Qualified Domain Name (FQDN)
33. Funktionsweise von DHCP (DORA Prinzip)
DHCP-Discover
Broadcast (UDP)
Zieladresse:
255.255.255.255
Quelladresse:
0.0.0.0
DHCP-Offer
Freie IP-Adresse
und weitere
Parameter
DHCP-Request
DHCP-Ack(nowledgement)
Annahme der
Parameter
Bestätigung der
Parameter
34. Fully Qualified Domain-Name (FQDN)
www.my.graz.at.
Root
Top-Level-Domain (TLD)
Second-Level-Domain (SLD)
Sub-Level-Domain (Subdomain) <-- Optional
Computername (Host oder Dienst)
RootTLDSLD
Dienst
Subdomain
Wird von rechts nach links aufgelöst.
35. Beispiel Namensauflösung via DNS
Root Nameserver
4. at ?
5. at !
at Nameserver
6. graz.at ?
7. graz.at !
8. www.graz.at ?
9. www.graz.at !
10.
www.graz.at !
Eingabe: www.graz.at
2. DNS-Cache
1. Hosts
Client
3. Zonenfile
DNS-Server
graz.at
Nameserver
36. Von Benutzer verursachte Probleme
Probleme welche nichts mit dem Netzwerk zu tun haben
“the problem exists between keyboard and chair”
37. Ports
Zuordnung von TCP und UDP Verbindungen
Immer 2 Nummern (Client und Server)
bsp: DHCP (Client = 67 ; Server = 68 UDP)
Unterscheidbarkeit der Anwendungen
(Mail, http, ftp usw..)
Vergabe durch IANA (Internet Assigned Numbers Authority)
Port Protocol Verwendung
21 FTP Datei Übertragung
25 SMTP Email (Sender)
80 HTTP Wolrd Wide Web
110 POP3 Remote Email Zugriff