CCNA1 M10 Routing Fundamentals Subnets
CCNA1 M10 Routing Fundamentals Subnets
Objectives
Routed protocols
A routed protocol allows the router to forward data between different networks In order for a protocol to be routable, it must provide the ability to assign a network number and a host number to each individual device. The network address is obtained by ANDing the address with the network mask.
Routed protocols
A connection is established between the sender and the recipient before any data is transferred. All packets travel sequentially across the same circuit, or more commonly, across the same virtual circuit.
Each packet is treated separately When the packets pass from source to destination, they can:
Switch to different paths. Arrive out of order.
IP as a Routed Protocol
IP is a connectionless, unreliable, best-effort delivery protocol. IP does not verify that the data reached its destination. This function is handled by the upper layer protocols.
Packet Propagation
Process in Router
IP header format
20 bytes
4 4 bits. bits. Indicates Indicates the the version version of of IP IP currently currently used. used.
IPv4 IPv4::0100 0100 IPv6 IPv6::0110 0110
4 4 bits. bits. IP IP header header length length :: Indicates Indicates the the datagram datagram header header length length in in 32 32 bit bit words words (4 (4 bits), bits), and and thus thus points points to to the the beginning beginning of of the the data. data.
8 8 bits. bits. Specifies Specifies the the level level of of importance importance that that has has been been requested requested for for this this datagram datagram by by an an upper-layer upper-layer protocol. protocol.
Precedence. Precedence. Reliability. Reliability. Speed. Speed.
16 16 bits. bits. Specifies Specifies the the length length in inbytes bytes of of the the entire entire IP IP packet, packet, including including data data and and header. header.
16 16 bits. bits. Contains Contains an an integer integer that that identifies identifies the the current current datagram. datagram. Assigned Assigned by by the the sender sender to to aid aid in in assembling assembling the the fragments fragments of of a a datagram. datagram.
3 3 bits. bits. The The second second bit bit specifying specifying whether whether the the packet packet can can be be fragmented fragmented .. The The last last bit bit specifying specifying whether whether the the packet packet is is the the last last fragment fragment in in a a series series of of fragmented fragmented packets. packets.
13 13 bits. bits.
Used Usedwith withfragmented fragmenteddatagrams, datagrams,to toaid aidin in reassembly of the full datagram. reassembly of the full datagram. Is Isthe thenumber numberof of64-bit 64-bitpieces pieces(header (headerbytes bytes are not counted) that are contained in are not counted) that are contained in earlier earlierfragments. fragments. In Inthe thefirst first(or (oronly) only)fragment, fragment,this thisvalue valueis is always alwayszero. zero.
8 8bits, bits,specifies specifiesthe thetime timeand anddistance distancethis this datagram datagramis isallowed allowedto totravel. travel. Each Eachrouter routerrouting routingthis thisdatagram datagramsubtracts subtracts from fromthis thisfield fieldits itsprocessing processingtime timefor forthis this datagram, which gradually decreases datagram, which gradually decreasesit. it. It Ithelps helpsprevent preventpackets packetsfrom fromlooping looping endlessly. endlessly.
Indicates Indicates which which upper upper protocol protocol receives receives incoming incoming packets packets after after IP IP processing processing has has been been completed completed
06 06::TCP TCP 17 17::UDP UDP 01: ICMP 01: ICMP
16 16 bits. bits. A A checksum checksum on on the the header header only, only, helps helps ensure ensure IP IP header header integrity. integrity.
32 32 bits bits each. each. Source Source IP IP Address Address Destination Destination IP IP Address Address
Variable Variable length. length. Allows Allows IP IP to to support support various various options, options, such such as as security, security, route, route, error error report report ... ...
The The header header padding padding is is used used to to ensure ensure that that the the internet internet header header ends ends on on a a 32 32 bit bit boundary. boundary.
Contains Containsupper-protocol upper-protocolinformation, information, variable variablelength lengthup upto to64 64Kb. Kb.
IP Routing Protocol
Routing Overview
Routing is an OSI Layer 3 function. Routing is the process of finding the most efficient path from one device to another. Two key functions of router:
maintain routing tables use the routing table to forward packets
Routing Protocol
Routing protocols allow routers to choose the best path for data from source to destination. A routing protocol functions includes the following:
Provides processes for sharing route information Allows routers to communicate with other routers to update and maintain the routing tables
ols ed c o t rot rou ets p ng how pack i t u Ro rmine route s te de tocol pro
Path Determination
Path determination enables a router to compare the destination address to the available routes in its routing table, and to select the best path. The router uses path determination to decide which port an incoming packet should be sent out of to travel on to its destination.
Routing Tables
Routing tables contain the information of a route to forward data packets across connected networks :
Protocol type Destination/next-hop associations Route metric and routing protocol reliability Outbound interfaces
Routing Algorithms
Routing protocols often have one or more of the following design goals:
Optimization Simplicity and low overhead Robustness and stability Flexibility Rapid convergence
Routing Metrics
Metrics can be based on a single characteristic of a path, or can be calculated based on several characteristics. The following are the metrics that are most commonly used by routing protocols:
Bandwidth: The data capacity of a link Delay: The length of time required to move a packet along each link Load: The amount of activity on a network resource Reliability: Usually a reference to the error rate Hop count: The number of routers that a packet must travel through before reaching its destination Ticks: delay on a data link using IBM PC clock ticks. One tick is approximately 1/18 second. Cost: An arbitrary value, usually based on bandwidth, monetary expense, or other measurement, that is assigned by a network administrator.
So we need more network addresses for your network. But I want the outside networks see our network as a single network.
Subnetting
Subnetworks are smaller divisions of network. To create a subnet address, a network administrator borrows bits from the original host portion and designates them as the subnet field.
Subnet mask
Extended Network Prefix. Determines which part of an IP address is the network field and which part is the host field. 32 bits long. Divided into four octets. Network and Subnet portions all 1s. Host portions all 0s.
The minimum bits you can borrow is: 2 bits. The maximum bits you can borrow is: Number of host bits -2 bits Slash mask is the sum total of all bits assigned to the subnet field plus the fixed network bits. So 172.16.1.100 with subnet mask 255.255.240.0 may be written as 172.16.1.100/20
Subnetting example
Given network 172.16.0.0. We need 8 usable subnets and up to 1000 hosts on each subnet.
Calculating a subnet
1. Determine the class of network and default subnet mask. 2. Determine how many bits to borrow. Determine the subnet mask and the actual number of subnets and hosts. 3. Determine the ranges of host address for each subnet. Choose the subnets that you want to use.