SlideShare a Scribd company logo
1© 2004, Cisco Systems, Inc. All rights reserved.
Module 10
Routing Fundamentals and
Subnets
222© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Objectives
333© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IP Address
444© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IP Address Grouping
555© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routed and Routing Protocols
• Consider that a packet needs to be sent from node A
to node F. How would it decide which path to take?
666© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Protocol vs Routed Protocol
• A routed protocol
1. defines the end to end addressing and the
packet format of a packet that is forwarded
between nodes on different networks.
Internet Protocol (IP) is a routed protocol
• A routing protocol
1. exchanges topology information with adjacent
routers to update and maintain their routing tables.
2. selects the best path through a network
RIP is a routing protocol
777© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routed Protocol
• A protocol is a set of rules
• A routed protocol is a set of rules that determines how
computers at the source and destination communicate
with each other across networks
– packet format
– end to end addressing
• In order for a protocol to be routable, it must provide the
ability to assign both a network number and a host
number for each individual device.
888© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Internet Protocol IP
• IP is a connectionless, unreliable, best-effort delivery protocol
• As information flows down the layers of the OSI model, the data is
processed at each layer.
• IP accepts whatever data is passed down to it from the upper layers.
999© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IP Packet Header
101010© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Network Layer Devices in Data Flow
• As a frame is received at a
router interface.
• The MAC address is checked
to see if the frame is directly
addressed to the router
interface, or a broadcast.
• The frame header and trailer
are removed and the packet is
passed up to Layer 3.
• The destination IP address is
compared to the routing table
to find a match.
• The packet (datagram) is
placed in a new frame with the
MAC address of the next hop
interface.
• The frame is then transmitted.
If a match is found or there is a default
route, the packet will be sent to the
interface specified in the matched routing
table statement otherwise packet is
discarded
111111© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Packets Travel Across Links in a Frame
• Packets NEVER travel through the network – they are carried within frames
• A new frame MUST be created to carry the packet over each individual link
• Routers provide the IP address of the next hop interface (router or host)
• The ARP table provides the MAC address of this IP address for the frame destination
121212© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Connectionless vs. Connection-Oriented
• In a connection oriented system is established
between the sender and the recipient before any
data is transferred.
– example: Telephone
• In a connectionless system, the destination is not
contacted before a packet is sent.
– example: Postal system
• TCP is connection oriented
• IP is connectionless
131313© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Connectionless Network Services
• The Internet is a huge network where packets are routed according to their
IP addresses.
• IP is unreliable and best-effort as IP does not verify that the data reached its
destination and therefore does not resend missing packets.
• Reliability and resending of packets is handled by the upper layer protocols.
• IP may be used in conjunction with TCP to add a Layer 4, connection-
oriented service that checks for missing segments and resends them to
provide reliability.
141414© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
The IPv4 Packet Header
Time-to-live (TTL)
Count Decreases with every hop
This prevents packets from
looping endlessly.
151515© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing
161616© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
The Network Layer
171717© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing
• Routing is an OSI Layer 3 function.
• Routers connect networks (or subnetworks)
• Routing is the process of finding the most efficient
path from one device to another (router)
• Routers must maintain routing tables and make sure
other routers know of changes in the network
topology. This function is performed using a routing
protocol to communicate network information with
other routers
181818© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Through a Network
• A router is a network layer device that uses one or more
routing metrics to determine the optimal path through the
network
191919© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Metrics
202020© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Data Encapsulation
212121© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Layer 3 Routing and Layer 2 Switching
222222© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routers Reduce the Size of Broadcast Domains
• Routers block LAN broadcasts, so a broadcast
storm only affects the broadcast domain from which
it originated
• Switched networks do not block broadcasts
232323© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing and Switching in a Network
242424© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
ARP Tables and Routing Tables
252525© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
The difference between a routed and routing
protocol – revisited
262626© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routed Protocol
272727© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Protocol
282828© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routed Vs Routing protocols
• A Routed Protocol:
– A network protocol suite that provides enough information in its network
layer address to allow a router to forward it to the next device and ultimately
to its destination.
– Defines the format and use of the fields within a packet.
– The Internet Protocol (IP) and Novell's Internetwork Packet Exchange (IPX),
DECnet, AppleTalk, Banyan VINES, and Xerox Network Systems (XNS)
• A Routing Protocol:
– Provides processes for sharing route information. Exchange topology info.
To determining the best routing paths and transporting packets through an
internetwork
– Also allows routers to communicate with other routers to update and
maintain the routing tables.
– Routing Information Protocol (RIP), Interior Gateway Routing Protocol
(IGRP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP),
and Enhanced IGRP (EIGRP).
292929© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Back to Routing
303030© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Path Determination
313131© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Path Determination
323232© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Tables
• Routing tables contain the best routes to all known
networks.
• These routes can be either
– Static routes, which are entered manually by the system
administrator
– Or dynamic routes, which are constructed from
information passed between adjacent routers.
• A routing table entry contains:
– Each Destination
– The next hop IP address to reach that destination
– The metric for the route via that next hop
– Outbound router interface for the next hop
333333© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Tables
343434© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Algorithms and Metrics
• Routing protocols have one or more of the following
design goals:
Optimization
Simplicity and low overhead
Robustness and stability
Flexibility
Rapid convergence
353535© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Routing Algorithms and Metrics
363636© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Interior and Exterior Gateway Protocols
373737© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Interior and Exterior Gateway Protocols
• IGPs route data within an autonomous system.
RIP, RIPv2, IGRP, EIGRP, OSPF, IS-IS
• EGPs route data between autonomous systems
Border Gateway Protocol (BGP)
383838© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Interior Gateway Routing Protocols
• Link State and Distance Vector Routing Protocols
• Examples of distance-vector protocols:
Routing Information Protocol (RIP)
Interior Gateway Routing Protocol (IGRP)
Enhanced IGRP (EIGRP)
• Examples of link-state protocols:
Open Shortest Path First (OSPF)
Intermediate System-to-Intermediate System (IS-IS)
393939© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Mechanics of Subnetting
404040© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnetting
• Reasons for subnetting
– Provides addressing flexibility for the network
administrator.
• Each LAN must have its own network or subnetwork
address.
– Provides broadcast containment and low-level security on
the LAN.
– Provides some security since access to other subnets is
only available through the services of a router.
414141© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IP Address Bit Patterns
424242© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Introduction to Subnetting
• Host bits must are
reassigned (or
“borrowed”) as
network bits.
• The starting point is
always the leftmost
host bit.
3 bits borrowed allows 23
-2 or 6 subnets
5 bits borrowed allows 25
-2 or 30 subnets
12 bits borrowed allows 212
-2 or 4094 subnets
434343© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnetting Chart (Bit Position and Value)
444444© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnetting Chart (Subnet Mask Identifier)
454545© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnetting
464646© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnetting Chart
474747© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnetting Example
• This is an example of subnetting the 192.168.10.0 class C
network into 8 subnets with 32 host addresses per subnet
• Note that the first and last subnets are not used (the first can be)
• Also the first and last host address in each subnet are not used
484848© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Example Host IP Address from Subnet 2
Packet Address 192.168.10.65 11000000.10101000.00001010.010 00001
Subnet Mask 255.255.255.224 11111111.11111111.11111111.111 00000
Subnet Address 192.168.10.64 11000000.10101000.00001010.010 00000
• The subnet mask is ANDed with the packet address to
determine the subnet address - as shown in the next slides
494949© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
The Logical ANDing Process
505050© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Calculating the Subnet ID
515151© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Subnet Mask Defines the Number of Subnets
525252© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Summary

More Related Content

What's hot

CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
Vuz Dở Hơi
 
CCNA Chapter1
CCNA Chapter1CCNA Chapter1
CCNA Chapter1
Mohammed Ali
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projectstcpipguru
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
Vuz Dở Hơi
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
Vuz Dở Hơi
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
RandyDookheran1
 
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7Irsandi Hasan
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
milkux
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7
Irsandi Hasan
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSanilinvns
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
Nil Menon
 

What's hot (20)

CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNA Chapter1
CCNA Chapter1CCNA Chapter1
CCNA Chapter1
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
 
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
Ccna2 project
Ccna2 projectCcna2 project
Ccna2 project
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 

Viewers also liked

CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsDsunte Wilson
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
Swapnil Kapate
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
thetechnicalzone
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
dkaya
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
Sarmad Ali
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
rafiq123
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheetaromal4frnz
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsDsunte Wilson
 

Viewers also liked (16)

CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 

Similar to Cisco CCNA module 10

6978047_2.ppt
6978047_2.ppt6978047_2.ppt
6978047_2.ppt
MeseleBerhanu4
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptxCCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
ManishkumarSharma338257
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
Waqas Ahmed Nawaz
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
Network Layer
Network LayerNetwork Layer
Network Layer
Lakshika Rasanjali
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptx
AliJrboy
 
Apricot2004 bgp00
Apricot2004 bgp00Apricot2004 bgp00
Apricot2004 bgp00
La Htoi Layang
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
Zee Haak
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
Sachii Dosti
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
RobinRohit2
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
NguyenNM
 
CCNA
CCNACCNA
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
AssemNazirova2
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
gebreyesusweldegebri2
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
sayidkhalif
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
Waqas Ahmed Nawaz
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
Robb Boyd
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
Sĩ Anh Nguyễn
 

Similar to Cisco CCNA module 10 (20)

6978047_2.ppt
6978047_2.ppt6978047_2.ppt
6978047_2.ppt
 
Cisco CCNA module 9
Cisco CCNA module 9Cisco CCNA module 9
Cisco CCNA module 9
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptxCCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
CCNA_RSE_Chp3_Dynamic Routing NETWORKINGFBU.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptx
 
Apricot2004 bgp00
Apricot2004 bgp00Apricot2004 bgp00
Apricot2004 bgp00
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
 
CCNA
CCNACCNA
CCNA
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
 

More from Anjar Septiawan

More from Anjar Septiawan (7)

Cisco CCNA module 7
Cisco CCNA module 7Cisco CCNA module 7
Cisco CCNA module 7
 
Cisco CCNA module 6
Cisco CCNA module 6Cisco CCNA module 6
Cisco CCNA module 6
 
Cisco CCNA module 5
Cisco CCNA module 5Cisco CCNA module 5
Cisco CCNA module 5
 
Cisco CCNA module 4
Cisco CCNA module 4Cisco CCNA module 4
Cisco CCNA module 4
 
Cisco CCNA module 3
Cisco CCNA module 3Cisco CCNA module 3
Cisco CCNA module 3
 
Cisco CCNA module 1
Cisco CCNA module 1Cisco CCNA module 1
Cisco CCNA module 1
 
Cisco CCNA module 8
Cisco CCNA module 8Cisco CCNA module 8
Cisco CCNA module 8
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Cisco CCNA module 10

  • 1. 1© 2004, Cisco Systems, Inc. All rights reserved. Module 10 Routing Fundamentals and Subnets
  • 2. 222© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Objectives
  • 3. 333© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IP Address
  • 4. 444© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IP Address Grouping
  • 5. 555© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routed and Routing Protocols • Consider that a packet needs to be sent from node A to node F. How would it decide which path to take?
  • 6. 666© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Protocol vs Routed Protocol • A routed protocol 1. defines the end to end addressing and the packet format of a packet that is forwarded between nodes on different networks. Internet Protocol (IP) is a routed protocol • A routing protocol 1. exchanges topology information with adjacent routers to update and maintain their routing tables. 2. selects the best path through a network RIP is a routing protocol
  • 7. 777© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routed Protocol • A protocol is a set of rules • A routed protocol is a set of rules that determines how computers at the source and destination communicate with each other across networks – packet format – end to end addressing • In order for a protocol to be routable, it must provide the ability to assign both a network number and a host number for each individual device.
  • 8. 888© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Internet Protocol IP • IP is a connectionless, unreliable, best-effort delivery protocol • As information flows down the layers of the OSI model, the data is processed at each layer. • IP accepts whatever data is passed down to it from the upper layers.
  • 9. 999© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IP Packet Header
  • 10. 101010© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Network Layer Devices in Data Flow • As a frame is received at a router interface. • The MAC address is checked to see if the frame is directly addressed to the router interface, or a broadcast. • The frame header and trailer are removed and the packet is passed up to Layer 3. • The destination IP address is compared to the routing table to find a match. • The packet (datagram) is placed in a new frame with the MAC address of the next hop interface. • The frame is then transmitted. If a match is found or there is a default route, the packet will be sent to the interface specified in the matched routing table statement otherwise packet is discarded
  • 11. 111111© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Packets Travel Across Links in a Frame • Packets NEVER travel through the network – they are carried within frames • A new frame MUST be created to carry the packet over each individual link • Routers provide the IP address of the next hop interface (router or host) • The ARP table provides the MAC address of this IP address for the frame destination
  • 12. 121212© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Connectionless vs. Connection-Oriented • In a connection oriented system is established between the sender and the recipient before any data is transferred. – example: Telephone • In a connectionless system, the destination is not contacted before a packet is sent. – example: Postal system • TCP is connection oriented • IP is connectionless
  • 13. 131313© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Connectionless Network Services • The Internet is a huge network where packets are routed according to their IP addresses. • IP is unreliable and best-effort as IP does not verify that the data reached its destination and therefore does not resend missing packets. • Reliability and resending of packets is handled by the upper layer protocols. • IP may be used in conjunction with TCP to add a Layer 4, connection- oriented service that checks for missing segments and resends them to provide reliability.
  • 14. 141414© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id The IPv4 Packet Header Time-to-live (TTL) Count Decreases with every hop This prevents packets from looping endlessly.
  • 15. 151515© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing
  • 16. 161616© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id The Network Layer
  • 17. 171717© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing • Routing is an OSI Layer 3 function. • Routers connect networks (or subnetworks) • Routing is the process of finding the most efficient path from one device to another (router) • Routers must maintain routing tables and make sure other routers know of changes in the network topology. This function is performed using a routing protocol to communicate network information with other routers
  • 18. 181818© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Through a Network • A router is a network layer device that uses one or more routing metrics to determine the optimal path through the network
  • 19. 191919© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Metrics
  • 20. 202020© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Data Encapsulation
  • 21. 212121© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Layer 3 Routing and Layer 2 Switching
  • 22. 222222© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routers Reduce the Size of Broadcast Domains • Routers block LAN broadcasts, so a broadcast storm only affects the broadcast domain from which it originated • Switched networks do not block broadcasts
  • 23. 232323© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing and Switching in a Network
  • 24. 242424© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id ARP Tables and Routing Tables
  • 25. 252525© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id The difference between a routed and routing protocol – revisited
  • 26. 262626© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routed Protocol
  • 27. 272727© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Protocol
  • 28. 282828© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routed Vs Routing protocols • A Routed Protocol: – A network protocol suite that provides enough information in its network layer address to allow a router to forward it to the next device and ultimately to its destination. – Defines the format and use of the fields within a packet. – The Internet Protocol (IP) and Novell's Internetwork Packet Exchange (IPX), DECnet, AppleTalk, Banyan VINES, and Xerox Network Systems (XNS) • A Routing Protocol: – Provides processes for sharing route information. Exchange topology info. To determining the best routing paths and transporting packets through an internetwork – Also allows routers to communicate with other routers to update and maintain the routing tables. – Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and Enhanced IGRP (EIGRP).
  • 29. 292929© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Back to Routing
  • 30. 303030© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Path Determination
  • 31. 313131© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Path Determination
  • 32. 323232© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Tables • Routing tables contain the best routes to all known networks. • These routes can be either – Static routes, which are entered manually by the system administrator – Or dynamic routes, which are constructed from information passed between adjacent routers. • A routing table entry contains: – Each Destination – The next hop IP address to reach that destination – The metric for the route via that next hop – Outbound router interface for the next hop
  • 33. 333333© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Tables
  • 34. 343434© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Algorithms and Metrics • Routing protocols have one or more of the following design goals: Optimization Simplicity and low overhead Robustness and stability Flexibility Rapid convergence
  • 35. 353535© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Routing Algorithms and Metrics
  • 36. 363636© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Interior and Exterior Gateway Protocols
  • 37. 373737© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Interior and Exterior Gateway Protocols • IGPs route data within an autonomous system. RIP, RIPv2, IGRP, EIGRP, OSPF, IS-IS • EGPs route data between autonomous systems Border Gateway Protocol (BGP)
  • 38. 383838© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Interior Gateway Routing Protocols • Link State and Distance Vector Routing Protocols • Examples of distance-vector protocols: Routing Information Protocol (RIP) Interior Gateway Routing Protocol (IGRP) Enhanced IGRP (EIGRP) • Examples of link-state protocols: Open Shortest Path First (OSPF) Intermediate System-to-Intermediate System (IS-IS)
  • 39. 393939© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Mechanics of Subnetting
  • 40. 404040© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnetting • Reasons for subnetting – Provides addressing flexibility for the network administrator. • Each LAN must have its own network or subnetwork address. – Provides broadcast containment and low-level security on the LAN. – Provides some security since access to other subnets is only available through the services of a router.
  • 41. 414141© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IP Address Bit Patterns
  • 42. 424242© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Introduction to Subnetting • Host bits must are reassigned (or “borrowed”) as network bits. • The starting point is always the leftmost host bit. 3 bits borrowed allows 23 -2 or 6 subnets 5 bits borrowed allows 25 -2 or 30 subnets 12 bits borrowed allows 212 -2 or 4094 subnets
  • 43. 434343© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnetting Chart (Bit Position and Value)
  • 44. 444444© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnetting Chart (Subnet Mask Identifier)
  • 45. 454545© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnetting
  • 46. 464646© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnetting Chart
  • 47. 474747© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnetting Example • This is an example of subnetting the 192.168.10.0 class C network into 8 subnets with 32 host addresses per subnet • Note that the first and last subnets are not used (the first can be) • Also the first and last host address in each subnet are not used
  • 48. 484848© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Example Host IP Address from Subnet 2 Packet Address 192.168.10.65 11000000.10101000.00001010.010 00001 Subnet Mask 255.255.255.224 11111111.11111111.11111111.111 00000 Subnet Address 192.168.10.64 11000000.10101000.00001010.010 00000 • The subnet mask is ANDed with the packet address to determine the subnet address - as shown in the next slides
  • 49. 494949© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id The Logical ANDing Process
  • 50. 505050© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Calculating the Subnet ID
  • 51. 515151© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Subnet Mask Defines the Number of Subnets
  • 52. 525252© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Summary