MIS365 7 - IP Addressing

MIS365 7 - IP Addressing - MIS365 Data Communications &...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
MIS365 Jerry Malcolm IP Addressing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Decentralized IP Traffic Decentralized functionality Could possibly extend to “ decentralized traffic Imagine all IP traffic flowing across all floors and offices in your building searching for its destination Is that really necessary if the two computers are a few feet away from each other? Wouldn’t it make sense to isolate “ local traffic from more “ public ” traffic? Traffic clutter is a real risk Early days of TCPIP at IBM Austin… TCP Storms would often take the network to its knees
Background image of page 2
Sub-Networks Let’s subdivide the network into localized “sub-networks”, or “ subnets Traffic destined for a computer in the same “sub-network” simply flows within that portion of the network We’ll have a “ gateway ” that will be the path out of the sub-network into the next larger network
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Janus – Keeper of the Doors
Background image of page 4
Gateway The “gateway” is a door Keep the image of Janus in mind when we talk about gateways Gateways have one ‘face’ looking downstream toward the subnet Gateways have another ‘face’ looking upstream toward the public internet
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Private Networks Internet Gateway Gateway Gateway Subnet Subnet Subnet
Background image of page 6
Gateway The gateway is simply another computer with An IP address on the subnet An IP address on the upstream network The IP stacks in the machines on the subnet must make a decision… Is the target machine directly accessible on my same subnet? Do I need to pass this request through the gateway since the target is not in my subnet?
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Subnet Mask Every machine on the network has: An IP address A subnet mask A subnet mask is boolean “AND”ed with my IP address and the target IP address
Background image of page 8
Boolean “AND” 0 AND 0 = 0 0 AND 1 = 0 1 AND 0 = 0 1 AND 1 = 1
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Subnet Masks Most subnet masks are contiguous 1111111111111111111…. .00000000 The zeros are the “mask”
Background image of page 10
Masking IP address: 192.168.1.221 Subnet mask 255.255.255.0 (255 = 1111 1111) Result of mask: 192.168.1.0 Rule: If my IP/mask result == target IP/mask result… Target computer is in my subnet
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Subnet Range Said another way… My IP address is 192.168.1.1 Subnet mask is 255.255.255.0 The address range of my subnet is 192.168.1.xxx Any IP address in this range is local Any IP address not in this range needs to go through the gateway to get outside my subnet
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 39

MIS365 7 - IP Addressing - MIS365 Data Communications &...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online