SlideShare a Scribd company logo
Introduction to Networks v5.1
Chapter 7:
IP Addressing
Jupriyadi
Juli 2020
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
7.0 Introduction
7.1 IPv4 Network Addresses
7.2 IPv6 Network Addresses
7.3 Connectivity Verification
7.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Convert between binary and decimal numbering systems.
• Describe the structure of an IPv4 address including the network portion, the host
portion, and the subnet mask.
• Compare the characteristics and uses of the unicast, broadcast, and multicast
IPv4 addresses.
• Explain public, private, and reserved IPv4 addresses.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Dotted Decimal Address
Octets
32-Bit Address
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Decimal Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Applying Decimal Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Binary Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Applying Binary Positional Notation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
To convert a binary IPv4 address to its dotted decimal equivalent:
• Divide the IPv4 address into four 8-bit octets. Apply the binary positional
value to the first octet binary number and calculate accordingly.
• Repeat for each octet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
The following illustrates how to use the binary positional value
table to convert decimal to binary.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Continue to evaluate the decimal until all positional
values have been entered, which results in the
equivalent binary value.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
See VIDEO DEMONSTRATION
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
One portion of the 32 bit IPv4 address identifies the network, and another
portion identifies the host.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
• Comparing the IP Address and the Subnet Mask
• The 1s in the subnet mask identify the network portion while the
0s identify the host portion.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
• Logical AND is the comparison of two bits.
• ANDing between the IP address and the
subnet mask yields the network address.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
• Shorthand method of identifying a subnet mask.
• It is the number of bits set to 1 in the subnet mask.
• Written in “slash notation”, a “/” followed by the number of bits
set to 1.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
See VIDEO DEMONSTRATION
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Unicast
Broadcast
Multicast
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
• Unicast communication is used for normal host-to-host
communication.
• The unicast address applied to an
end device is referred to as the host
address.
• The source address of any packet is
always the unicast address of the
originating host.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
• A host sends a single packet to a selected set of hosts that
subscribe to a multicast group.
• The 224.0.0.0 to 239.255.255.255 range of addresses are
reserved for multicast.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Private Addresses:
• 10.0.0.0/8 or 10.0.0.0 to10.255.255.255
• 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
• 192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
• Loopback addresses
127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254
• Link-Local addresses or Automatic Private IP Addressing (APIPA) addresses
169.254.0.0 /16 or
169.254.0.1 to 169.254.255.254
• TEST-NET addresses
192.0.2.0/24 or 192.0.2.0
to 192.0.2.255
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
• Formal name is Classless Inter-Domain Routing (CIDR, pronounced
“cider”).
• Created a new set of standards that allowed service providers to
allocate IPv4 addresses on any address bit boundary (prefix length)
instead of only by a class A, B, or C address.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Upon completion of this section, you should be able to:
• Explain the need for IPv6 addressing.
• Describe the representation of an IPv6 address.
• Describe types of IPv6 network addresses.
• Configure global unicast addresses.
• Describe multicast addresses.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 47
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
• The migration techniques can be divided into three categories: Dual
Tack, Tunneling, and Translation.
• Dual-stack allows IPv4 and IPv6 to coexist on the same network.
Devices run both IPv4 and IPv6 protocol stacks simultaneously.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
• Tunneling is a method of transporting an IPv6 packet over an
IPv4 network. The IPv6 packet is encapsulated inside an IPv4
packet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
• Translation: Network Address Translation 64 (NAT64) allows
IPv6-enabled devices to communicate with IPv4-enabled devices
using a translation technique similar to NAT for IPv4. An IPv6
packet is translated to an IPv4 packet, and vice versa.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Hextets – 4 Hexadecimal digits = 16 binary digits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
(cont.)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
(cont.)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Example 1
Example 2
Example 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Example 1
Example 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Example 3
Example 4
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 59
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
There are three types of IPv6 addresses:
• Unicast
• Multicast
• Anycast
Note: IPv6 does not have broadcast addresses.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
• IPv6 does not use the dotted-decimal subnet mask notation.
• Prefix length indicates the network portion of an IPv6 address using the
following format:
o IPv6 address /prefix length
o Prefix length can range from 0 to 128
o Typical prefix length is /64
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Uses of an IPv6 Link-local address
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 65
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Reading a Global Unicast Address
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
EUI-64 Process
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
EUI-64 Process 
Randomly Generated Interface ID
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 81
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
• IPv6 multicast addresses have the prefix FF00::/8.
• There are two types of IPv6 multicast addresses:
o Assigned multicast
o Solicited node multicast
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Upon completion of this section, you should be able to:
• Explain how ICMP is used to test network connectivity.
• Use ping and traceroute utilities to test network connectivity.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 85
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
• ICMP messages common to both ICMPv4 and ICMPv6 include:
o Host confirmation
o Destination or service unreachable
o Time exceeded
o Route redirection
• Although IP is not a reliable protocol, the TCP/IP suite provides
for messages to be sent in the event of certain errors. They are
sent using the services of ICMP.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 93
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Chapter Objectives:
• Explain the use of IPv4 addresses to provide connectivity in a small to
medium-sized business network.
• Configure IPv6 addresses to provide connectivity in small to medium-
sized business networks.
• Use common testing utilities to verify network connectivity.
Thank you.

More Related Content

What's hot

Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
newbie2019
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
Chaing Ravuth
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
Chaing Ravuth
 
EIGRP
EIGRPEIGRP
EIGRP
newbie2019
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
newbie2019
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
Chaing Ravuth
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
Waqas Ahmed Nawaz
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
newbie2019
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
Nil Menon
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
Chaing Ravuth
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
Chaing Ravuth
 
CCNA RSE Routing concept
CCNA RSE Routing conceptCCNA RSE Routing concept
CCNA RSE Routing concept
newbie2019
 
Routing Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South Asia
Bangladesh Network Operators Group
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
newbie2019
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Waqas Ahmed Nawaz
 

What's hot (20)

Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
EIGRP
EIGRPEIGRP
EIGRP
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
 
CCNA RSE Routing concept
CCNA RSE Routing conceptCCNA RSE Routing concept
CCNA RSE Routing concept
 
Routing Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South Asia
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 

Similar to It nv51 instructor_ppt_ch7

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Babaa Naya
 
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and CommunicationsChapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communications
newbie2019
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
SalmenHAJJI1
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
RichardChecca1
 
Chapter 4 Network Access
Chapter 4 Network AccessChapter 4 Network Access
Chapter 4 Network Access
newbie2019
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
 
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
newbie2019
 
Ccna sv2 instructor_ppt_ch7
Ccna sv2 instructor_ppt_ch7Ccna sv2 instructor_ppt_ch7
Ccna sv2 instructor_ppt_ch7
SalmenHAJJI1
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
Babaa Naya
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
AssemNazirova2
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
Babaa Naya
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
SalmenHAJJI1
 
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
SalmenHAJJI1
 
ITN_Module_12.pptx
ITN_Module_12.pptxITN_Module_12.pptx
ITN_Module_12.pptx
seare1
 
Ccna security v2 instructor_ppt_ch10
Ccna security v2 instructor_ppt_ch10Ccna security v2 instructor_ppt_ch10
Ccna security v2 instructor_ppt_ch10
SalmenHAJJI1
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
 
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPF
rooree29
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
Hamza Malik
 

Similar to It nv51 instructor_ppt_ch7 (20)

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and CommunicationsChapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communications
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
 
Chapter 4 Network Access
Chapter 4 Network AccessChapter 4 Network Access
Chapter 4 Network Access
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
 
Ccna sv2 instructor_ppt_ch7
Ccna sv2 instructor_ppt_ch7Ccna sv2 instructor_ppt_ch7
Ccna sv2 instructor_ppt_ch7
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
 
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
 
ITN_Module_12.pptx
ITN_Module_12.pptxITN_Module_12.pptx
ITN_Module_12.pptx
 
Ccna security v2 instructor_ppt_ch10
Ccna security v2 instructor_ppt_ch10Ccna security v2 instructor_ppt_ch10
Ccna security v2 instructor_ppt_ch10
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPF
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
newbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
newbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
newbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
newbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
newbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
newbie2019
 
C02
C02C02
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
newbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 

It nv51 instructor_ppt_ch7

  • 1. Introduction to Networks v5.1 Chapter 7: IP Addressing Jupriyadi Juli 2020
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 7.0 Introduction 7.1 IPv4 Network Addresses 7.2 IPv6 Network Addresses 7.3 Connectivity Verification 7.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Convert between binary and decimal numbering systems. • Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask. • Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses. • Explain public, private, and reserved IPv4 addresses.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Dotted Decimal Address Octets 32-Bit Address
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Decimal Positional Notation
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Applying Decimal Positional Notation
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Binary Positional Notation
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Applying Binary Positional Notation
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 To convert a binary IPv4 address to its dotted decimal equivalent: • Divide the IPv4 address into four 8-bit octets. Apply the binary positional value to the first octet binary number and calculate accordingly. • Repeat for each octet.
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 The following illustrates how to use the binary positional value table to convert decimal to binary.
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Continue to evaluate the decimal until all positional values have been entered, which results in the equivalent binary value.
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 See VIDEO DEMONSTRATION
  • 22. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 One portion of the 32 bit IPv4 address identifies the network, and another portion identifies the host.
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 • Comparing the IP Address and the Subnet Mask • The 1s in the subnet mask identify the network portion while the 0s identify the host portion.
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 • Logical AND is the comparison of two bits. • ANDing between the IP address and the subnet mask yields the network address.
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 • Shorthand method of identifying a subnet mask. • It is the number of bits set to 1 in the subnet mask. • Written in “slash notation”, a “/” followed by the number of bits set to 1.
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 See VIDEO DEMONSTRATION
  • 33. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 Unicast Broadcast Multicast
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 • Unicast communication is used for normal host-to-host communication. • The unicast address applied to an end device is referred to as the host address. • The source address of any packet is always the unicast address of the originating host.
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 • A host sends a single packet to a selected set of hosts that subscribe to a multicast group. • The 224.0.0.0 to 239.255.255.255 range of addresses are reserved for multicast.
  • 40. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 40
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 Private Addresses: • 10.0.0.0/8 or 10.0.0.0 to10.255.255.255 • 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255 • 192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42 • Loopback addresses 127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254 • Link-Local addresses or Automatic Private IP Addressing (APIPA) addresses 169.254.0.0 /16 or 169.254.0.1 to 169.254.255.254 • TEST-NET addresses 192.0.2.0/24 or 192.0.2.0 to 192.0.2.255
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44 • Formal name is Classless Inter-Domain Routing (CIDR, pronounced “cider”). • Created a new set of standards that allowed service providers to allocate IPv4 addresses on any address bit boundary (prefix length) instead of only by a class A, B, or C address.
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46 Upon completion of this section, you should be able to: • Explain the need for IPv6 addressing. • Describe the representation of an IPv6 address. • Describe types of IPv6 network addresses. • Configure global unicast addresses. • Describe multicast addresses.
  • 47. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 47
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49 • The migration techniques can be divided into three categories: Dual Tack, Tunneling, and Translation. • Dual-stack allows IPv4 and IPv6 to coexist on the same network. Devices run both IPv4 and IPv6 protocol stacks simultaneously.
  • 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50 • Tunneling is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet.
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51 • Translation: Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. An IPv6 packet is translated to an IPv4 packet, and vice versa.
  • 52. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
  • 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53 Hextets – 4 Hexadecimal digits = 16 binary digits
  • 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54 (cont.)
  • 55. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55 (cont.)
  • 56. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56 Example 1 Example 2 Example 3
  • 57. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57 Example 1 Example 2
  • 58. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58 Example 3 Example 4
  • 59. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 59
  • 60. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60 There are three types of IPv6 addresses: • Unicast • Multicast • Anycast Note: IPv6 does not have broadcast addresses.
  • 61. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61 • IPv6 does not use the dotted-decimal subnet mask notation. • Prefix length indicates the network portion of an IPv6 address using the following format: o IPv6 address /prefix length o Prefix length can range from 0 to 128 o Typical prefix length is /64
  • 62. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
  • 63. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
  • 64. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64 Uses of an IPv6 Link-local address
  • 65. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 65
  • 66. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
  • 67. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67 Reading a Global Unicast Address
  • 68. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
  • 69. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
  • 70. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
  • 71. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
  • 72. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
  • 73. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
  • 74. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74 EUI-64 Process
  • 75. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75 EUI-64 Process  Randomly Generated Interface ID
  • 76. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
  • 77. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
  • 78. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
  • 79. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
  • 80. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
  • 81. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 81
  • 82. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82 • IPv6 multicast addresses have the prefix FF00::/8. • There are two types of IPv6 multicast addresses: o Assigned multicast o Solicited node multicast
  • 83. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
  • 84. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84 Upon completion of this section, you should be able to: • Explain how ICMP is used to test network connectivity. • Use ping and traceroute utilities to test network connectivity.
  • 85. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 85
  • 86. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
  • 87. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87 • ICMP messages common to both ICMPv4 and ICMPv6 include: o Host confirmation o Destination or service unreachable o Time exceeded o Route redirection • Although IP is not a reliable protocol, the TCP/IP suite provides for messages to be sent in the event of certain errors. They are sent using the services of ICMP.
  • 88. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
  • 89. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
  • 90. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
  • 91. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
  • 92. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
  • 93. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 93
  • 94. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
  • 95. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
  • 96. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
  • 97. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
  • 98. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 98 Chapter Objectives: • Explain the use of IPv4 addresses to provide connectivity in a small to medium-sized business network. • Configure IPv6 addresses to provide connectivity in small to medium- sized business networks. • Use common testing utilities to verify network connectivity.