Guide to tcp/ip 5th edition pdf download






















For example, with the network address of This results in host addresses available in this network. In CIDR, you can use any number of bits for the network address ignoring class limitations leaving two bits available to support hosts. Public versus Private IPv4 Addresses 1. It is very typical to have one computer act as the interface between the internal network and the Internet, even on home networks. The modem interface will be assigned a public IP address from the ISP and this computer must be configured to share its Internet connection with the other computers on the private network.

The text mentions that IP Security IPSec , a form of secure, encrypted information transfer, cannot be used in conjunction with NAT since the private address cannot be translated and thus routed to the Internet. There is a way around this. Instead of establishing an IPSec tunnel directly from computer to computer, establish it from perimeter device that does the NAT translation to the other computer outside the network.

This is typically done firewall to firewall and would only apply to this particular link. All other standard traffic to and from the Internet would go through NAT translation. The text mentions the issue of lag time in changing name to address resolution in this section. A practical example would be eBay or Amazon.

Imagine how much revenue each one of them would lose if they had to re-establish name to address resolution, waiting up to 72 hours to be able to send and receive traffic on the Internet. This would be a good time to review RFCs and with your students. Answer: subnet mask 2. The simplest form of subnet masking uses a technique called , in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments.

Answer: constant-length subnet masking CLSM 3. Answer: False 4. A n is a device that interconnects multiple IP networks or subnets. Although it is valid to use NAT as part of your network security strategy, it is generally recommended that multiple methods of security be employed.

Reverse proxying would be part of a layered security approach. Obtaining Public IP Addresses 1. To emphasize what the text already mentions, it is extremely common for organizations and individuals alike to lease their public addresses from an ISP rather than purchase them. IPv4 Addressing Schemes 1.

In this section, you will discuss the need for IP addressing schemes, and how to create and document one. The Network Space 1. There are a number of critical factors that typically constrain IP addressing schemes, and we look at these in two groups. The first group of constraints determines the number and size of networks. These are: Number of physical locations Number of network devices at each location Amount of broadcast traffic at each location Availability of IP addresses Delay caused by routing from one network to another 2.

The second group that helps us determine how to choose which IP addresses go where are these design objectives: Minimize the size of the routing tables. Maximize flexibility and facilitate management and troubleshooting. The Host Space 1. The point of planning growth for networks was previously mentioned. You can reemphasize it here. One of the important things that go along with an organized host space and network addressing scheme is accurate documentation of the network.

While this is not a requirement of the class, it would be helpful for the students to see the relationship between having a logical and organized network and being able to document it.

As corporate network use and the Internet grew in popularity, vast numbers of IP address were purchased including large sections of Class A addresses. A single Class A network address includes a huge number of hosts per network. Owners of these Class A networks, even now, possess a large storehouse of unused host addresses. The text mentions how many companies rent rather than buy their addresses from ISPs. You might mention to your class that they are also part of the group that rents IP addresses.

Every time we go on the Internet, our ISP temporarily assigns us an IP address from a pool they own, allowing us to have an address that is routable on the Internet and saving us the expense of buying one of our own. Point out that if your private network will never go on the Internet, you can use any address. However, if you try to use those addresses to surf the Web, you will find they are already owned. Encourage your students to use a private IP addressing scheme, even for their home or lab networks.

Answer: Reverse proxying. Because all devices accessible to the Internet must have public IP addresses, changing providers often means going through a tedious exercise called. Answer: IP renumbering. Switches make their decisions with specialized hardware known as. True or False: The time it takes to route from one network to another is affected by the size of the routing table.

Answer: True. Introducing IPv6 1. As described before, IPv6 solves many of the problems in IPv4, including the size of the address space and the lack of security by using encryption and authentication. In this section, you will discuss IPv6 in greater detail. Request for Comments Pages and Depreciation 1. We already discussed RFCs in Chapter 1. IPv6 Addressing 1. Although IPv6 addresses are very different from their IPv4 counterparts, there are some similarities.

For example, the notion of host and network portions is present on both schemes. Address Format and Notation 1. At first, IPv6 addresses might look strange, especially if you compare them with IPv4 addresses. Take this opportunity to explain the basic format and notation of IPv6 addresses. In the next section, you will talk about the network and host portion of the address. Network and Host Address Portions 1.

Explain how to represent the network and host portion of an IPv6 address, which is similar to the CIDR notation studied before. Scope Identifier 1. Later in this chapter, you will review multicast addresses in IPv6 but for now, explain to your students that multicast addresses in IPv6 use a scope identifier, a 4-bit field that limits the valid range for a multicast address to define the portion of the Internet to which the multicast group pertains.

Interface Identifiers 1. Like IPv4, IPv6 also requires that every network interface have its own unique identifier. But although IPv6 specified that interface identifiers follow the modified EUI format, many software makers, including Microsoft, use the privacy format defined in RFC This is a good opportunity to ask your students to think about the problems of following different standards, something that is somewhat common in the networking industry.

Address Types 1. While the old IPv4 classful address structure was designed as much for ease of human understanding as it was for machine usability, the new IPv6 address types take advantage of years of experience with routing across large hierarchical domains to streamline the whole operation. Describe the following address types, emphasizing how each type relates to an specific IPv4 addressing need: a.

Unspecified b. Loopback c. Multicast d. Anycast e. Unicast f. Aggregatable global unicast g. Link-local h. Site-local 3. Mention that IPv4 broadcast addresses have been replaced by multicast addresses in IPv6. Address Allocations 1. Mention that IPv6 pre-allocates only about 15 percent of its available addresses.

Using Table , describe address allocations in IPv6. IPv6 Addressing and Subnetting Considerations 1. Remind your students about the purposes of subnetting.

Use the example provided in the text to explain how to subnet an IPv6 address. As you can imagine, moving from IPv4 to its newer version is not an easy matter. In this section, describe the following techniques that will allow IPv4 and IPv6 hosts and networks to exist together until a full transition is reached: a. Teredo tunneling b. Class Discussion Topics 1. Have the class discuss why a large corporation that bought a Class A network 20 years ago would be reluctant to sell back even a portion of their unused host addresses to help conserve overall resources.

Have the class discuss the pros and cons of using a subnet mask calculator versus manually calculating subnet masks. Have the class discuss the benefits of using reverse proxying from a security standpoint.

Are additional methods required to protect the network from external attack? Why or why not? If more security methods are required, which ones would they choose? Have the class discuss the pros and cons of start using IPv6 immediately. Additional Projects 1. Assign the class the task of briefly documenting the classroom LAN including PCs, switches, routers, and printers, making sure they assign an IP addressing scheme. The class can break up into small groups for this project. Have them identify the class of address used, the subnet mask, the default gateway address and the DNS server address es.

Please select an option. View More Purchase Options. View as Instructor. Whether you need access offline or online, in print or on your mobile device, we have cost saving options. Tell me about Rentals. Free eTextbook while your book ships Contract starts on the date of product shipment, not on date of purchase. Tell me about Cengage eTextbooks. Best value! Access your book immediately!



0コメント

  • 1000 / 1000