Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Supernetting questions and answers pdf

04/12/2021 Client: muhammad11 Deadline: 2 Day

NW/Questions.docx
PC & Industrial Networks

70 Points

Answer each of the following questions in complete detail:

1. (10 points) Assume a host computer has the following configuration:

IP Address: 200.110.84.176

Subnet Mask: 255.255.248.0

Default Gateway: 200.110.84.1

a. What is the Class of this ‘network’?

b. Is this a Network, Subnetwork, Supernetwork or something else? How do you know?

c. How many possible hosts would there be on the above network if all usable addresses were assigned?

d. How would this IP address be expressed using CIDR notation?

e. Using CIDR notation, what is the range of the block of addresses this Host belongs to?

2. (6 points) Explain everything that can be determined from the following:

a. fe80::9890:96ff:fea1:53ed%12

b. 2002:77fe:8921::77fe:8921

c. ::01

d. ::

3. (4 points) What is the significance of the ninth octet in the header of the IP datagram?

4. (5 points) SSK Corp has offices in Toledo, Detroit and Columbus. Each office has 127

Computers. The IT plan calls for connecting all offices using data lines. The Toledo site will also connect to the Internet. SSK Corp. has elected to use PUBLIC IP address space on all computers at each of its sites.

Their ISP has restricted the IP ranges to the ones below. The ISP’s Network

Administrator is on vacation – you have been asked to fill-in and select a range of addresses that will satisfy SSK Corp.’s needs with the least amount of wasted IP addresses. Propose a range of addresses for SSK Corp. and explain your answer.

225.113.8.0/24

225.113.9.0/24

192.168.0.0/16

221.127.136.0/24

221.128.135.0/24

221.128.136.0/24

221.128.137.0/24

221.128.138.0/24

206.122.148.0/24

10.0.0.0/8

221.125.138.0/24

221.126.137.0/25

221.128.139.0/24

5. (5 points) Using the IP ranges below:

a) What IP range would an ISP provide to a customer, if the customer wanted a range of Public IP’s for use on the Internet? Explain your choice and why you feel the other choices are not adequate?

b) Using the Range you selected in ‘5a’ above - subnet the range into as many /28 networks as possible – show your work and each /28 range of addresses. (Show the network address and the broadcast address for each /28 subnet)

225.113.8.0/24

225.113.9.0/25

192.168.0.0/16

201.127.136.0/24

172.16.0.0/24

10.0.0.0/8

169.254.137.0/25

245.125.1378.0/24

10.0.0.0/24

245.0.0.0/8

127.0.0.0/8

6. (15 points) The following information was extracted from an Ethernet Frame:

IP Datagram Header: 45 00 00 44 5b d2 00 00 80 11 ef 4d 83 b7 75 39 83 b7 72 e1

Based on the above information, describe everything that can be determined about this packet (give the actual data value for each field). Convert each field to its normally displayed value (i.e. Hexadecimal/Decimal/Binary).

Example: Version is 4 which is IPv4

7. (10 points) Bob obtained the following information from a workstation: C:\>ipconfig

Ethernet adapter Local Area Connection:

IP Address. . . . . . . ……... . : 169.254.10.105 Subnet Mask . . . . . . ……... : 255.255.0.0 Default Gateway . . . . ……..:

Link-Local IPv6 Address…..fe80::9890:96ff:fea1:53ed%12

a. Explain everything that can be determined about this host.

After waiting 5 minutes and making no changes to his workstation. Bob obtained the following information from his workstation.

C:\>ipconfig

Ethernet adapter Local Area Connection:

IP Address. . . . . . . . ………………: 138.110.10.50 Subnet Mask . . . . . . …………….. : 255.255.0.0

Default Gateway . . . …………….. : 138.110.10.1

Link-Local IPv6 Address………….:fe80::9890:96ff:fea1:53ed%12

b. How would you explain the changes to the IP stack? Explain in detail what occurred.

8. (5 points) Explain each of the good ‘Network Design goals’ as discussed in class.

9. (10 points) You have been given the task of changing the IP Address and enabling telnet remote access on a CISCO 2950 enterprise switch.

The current IP address is 172.25.2/16 the new IP address is 10.0.0.2/24

The enterprise switch has no password configured.

a. Explain all of the commands needed for you to successfully accomplish the IP Address change and telnet remote access.

NW/Useful files/bootstapping.pdf
Before a device on a TCP/IP network can effectively communicate, it needs to know its IP address. While a conventional network host can read this information from its internal disk, some devices have no storage, and so do not have this luxury. They need help from another device on the network to provide them with an IP address and other information and/or software they need to become active IP hosts. This problem of getting a new machine up and running is commonly called bootstrapping, and to provide this capability to IP hosts, the TCP/IP Bootstrap Protocol (BOOTP) was created.

Without a form of internal storage, a device must rely on someone or something to tell it “who it is” (its address) and how to function each time it is powered up. When a device like this is turned on, it is in a difficult position: it needs to use IP to communicate with another device that will tell it how to communicate using IP! This process, called bootstrapping or booting, comes from an analogy to a person “pulling himself up using his own bootstraps”.

The Reverse Address Resolution Protocol (RARP) was the first attempt to resolve this “bootstrap problem”. Created in 1984, RARP is a direct adaptation of the low-level Address Resolution Protocol (ARP) that binds IP addresses to link-layer hardware addresses. RARP is capable of providing a diskless device with its IP address, using a simple client/server exchange of a request and reply between a host and an RARP server.

The difficulty with RARP is that it has so many limitations. It operates at a fairly low level using hardware broadcasts, so it requires adjustments for different hardware types. An RARP server is also required on every physical network to respond to layer-two broadcasts. Each RARP server must have address assignments manually provided by an administrator. And perhaps worst of all, RARP only provides an IP address to a host and none of the other information a host may need.

RARP clearly wasn't sufficient for the host configuration needs of TCP/IP. To support both the needs of diskless hosts and other situations where the benefits of autoconfiguration were required, the Bootstrap Protocol (BOOTP) was created. BOOTP was standardized in RFC 951, published September 1985. This relatively straight- forward protocol was designed specifically to address the shortcomings of RARP:

BOOTP Deals With the First Phase of Bootstrapping

It should be noted that even though the name of BOOTP implies that it defines everything needed for a storageless device to “boot”, this isn't really the case. As the BOOTP standard itself describes, “bootstrapping” generally requires two phases. In the first, the client is provided with an address and other parameters. In the second, the client downloads software, such as an operating system and drivers, that let it function on the network and perform whatever tasks it is charged with. BOOTP really only deals with the first of these phases: address assignment and configuration. The second is assumed to take place using a simple file transfer protocol like the Trivial File Transfer Protocol (TFTP).

http://www.tcpipguide.com/free/t_TCPIPBootstrapProtocolBOOTP.htm
http://www.tcpipguide.com/free/t_ReverseAddressResolutionandtheTCPIPReverseAddressR.htm
http://www.tcpipguide.com/free/t_TCPIPAddressResolutionProtocolARP.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-2.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-2.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-2.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-2.htm
http://www.tcpipguide.com/free/t_TrivialFileTransferProtocolTFTP.htm
http://www.tcpipguide.com/free/t_TrivialFileTransferProtocolTFTP.htm
Changes to BOOTP and the Development of DHCP

BOOTP was the TCP/IP host configuration of choice from the mid-1980s through the end of the 1990s. The vendor extensions introduced in RFC 1048 were popular, and over the years, additional vendor extensions were defined; RFC 1048 was replaced by RFCs 1084, 1395 and 1497 in succession. Some confusion also resulted over the years in how some sections of RFC 951 should be interpreted, and how certain features of BOOTP work.

RFC 1542, Clarifications and Extensions for the Bootstrap Protocol, was published in October 1993 to address this, and also made some slight changes to the protocol's operation. (RFC 1542 is actually a correction of the nearly-identical RFC 1532 that had some small errors in it.)

While BOOTP was obviously quite successful, it also had certain weaknesses of its own. One of the most important of these is lack of support for dynamic address assignment. The need for dynamic assignment became much more pronounced when the Internet really started to take off in the late 90s. This led directly to the development of the Dynamic Host Configuration Protocol (DHCP).

While DHCP replaced BOOTP as the TCP/IP host configuration protocol of choice, it would be inaccurate to say that BOOTP is “gone”. It is still used to this day in various networks. Furthermore, DHCP was based directly on BOOTP, and they share many attributes, including a common message format. BOOTP vendor extensions were used as the basis for DHCP options, which work in the same way but include extra capabilities. In fact, the successor to RFC 1497 is RFC 1533, which officially merges BOOTP vendor extensions and BOOTP options into the same standard.

http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-3.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-3.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-3.htm
http://www.tcpipguide.com/free/t_TCPIPDynamicHostConfigurationProtocolDHCP.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-3.htm
http://www.tcpipguide.com/free/t_BOOTPOverviewHistoryandStandards-3.htm
NW/Useful files/DHCP_APIPA(1).pdf
NW/Useful files/IPClasses.pdf
Classes

The following are the classes of IP addresses.

 Class A—The first octet denotes the network address, and the last three octets are the host portion. Any IP address whose first octet is between 1 and 126 is a Class A address. Note that 0 is reserved as a part of the default address, and 127 is reserved for internal loopback testing.

1-126

 Class B—The first two octets denote the network address, and the last two octets are the host portion. Any address whose first octet is in the range 128 to 191 is a Class B address.

128-191

 Class C—The first three octets denote the network address, and the last octet is the host portion. The first octet range of 192 to 223 is a Class C address.

192-223

 Class D—Used for multicast. Multicast IP addresses have their first octets in the range 224 to 239.

224-239 (Multicast)

 Class E—Reserved for future use and includes the range of addresses with a first octet from 240 to 255.

240-255 (Reserved)

Subnetting

Subnetting is the concept of dividing the network into smaller portions called subnets. This is done by borrowing bits from the host portion of the IP address, enabling more efficient use of the network address. A subnet mask

defines which portion of the address is used to identify the network and which denotes the hosts.

The following tables show all possible ways a major network can be subnetted, and, in each case, how many effective subnets and hosts are possible.

There are three tables, one for each class of addresses.

 The first column shows how many bits are borrowed from the host portion of the address for subnetting.

 The second column shows the resulting subnet mask in dotted decimal format.

 The third column shows how many subnets are possible.

 The fourth column shows how many valid hosts are possible on each of these subnets.

 The fifth column shows the number of subnet mask bits.

Class A Host/Subnet Table

Class A

Number of

Bits Borrowed Subnet Effective Number of Number of Subnet

from Host Portion Mask Subnets Hosts/Subnet Mask Bits

------- --------------- --------- ------------- -------------

1 255.128.0.0 2 8388606 /9

2 255.192.0.0 4 4194302 /10

3 255.224.0.0 8 2097150 /11

4 255.240.0.0 16 1048574 /12

5 255.248.0.0 32 524286 /13

6 255.252.0.0 64 262142 /14

7 255.254.0.0 128 131070 /15

8 255.255.0.0 256 65534 /16

9 255.255.128.0 512 32766 /17

10 255.255.192.0 1024 16382 /18

11 255.255.224.0 2048 8190 /19

12 255.255.240.0 4096 4094 /20

13 255.255.248.0 8192 2046 /21

14 255.255.252.0 16384 1022 /22

15 255.255.254.0 32768 510 /23

16 255.255.255.0 65536 254 /24

17 255.255.255.128 131072 126 /25

18 255.255.255.192 262144 62 /26

19 255.255.255.224 524288 30 /27

20 255.255.255.240 1048576 14 /28

21 255.255.255.248 2097152 6 /29

22 255.255.255.252 4194304 2 /30

23 255.255.255.254 8388608 2* /31

Class B Host/Subnet Table

Class B Subnet Effective Effective Number of Subnet

Bits Mask Subnets Hosts Mask Bits

------- --------------- --------- --------- -------------

1 255.255.128.0 2 32766 /17

2 255.255.192.0 4 16382 /18

3 255.255.224.0 8 8190 /19

4 255.255.240.0 16 4094 /20

5 255.255.248.0 32 2046 /21

6 255.255.252.0 64 1022 /22

7 255.255.254.0 128 510 /23

8 255.255.255.0 256 254 /24

9 255.255.255.128 512 126 /25

10 255.255.255.192 1024 62 /26

11 255.255.255.224 2048 30 /27

12 255.255.255.240 4096 14 /28

13 255.255.255.248 8192 6 /29

14 255.255.255.252 16384 2 /30

Class C Host/Subnet Table

Class C Subnet Effective Effective Number of Subnet

Bits Mask Subnets Hosts Mask Bits

------- --------------- --------- --------- --------------

1 255.255.255.128 2 126 /25

2 255.255.255.192 4 62 /26

3 255.255.255.224 8 30 /27

4 255.255.255.240 16 14 /28

5 255.255.255.248 32 6 /29

6 255.255.255.252 64 2 /30

Subnetting Example

The first entry in the Class A table (/10 subnet mask) borrows two bits (the leftmost bits) from the host portion of the network for subnetting, then with two bits you have four (2

2 ) combinations, 00, 01, 10, and 11. Each of these will

represent a subnet.

Binary Notation Decimal Notation

-------------------------------------------------- -----------------

xxxx xxxx. 0000 0000.0000 0000.0000 0000/10 ------> X.0.0.0/10

xxxx xxxx. 0100 0000.0000 0000.0000 0000/10 ------> X.64.0.0/10

xxxx xxxx. 1000 0000.0000 0000.0000 0000/10 ------> X.128.0.0/10

xxxx xxxx. 1100 0000.0000 0000.0000 0000/10 ------> X.192.0.0/10

Out of these four subnets, 00 and 11 are called subnet zero and the all-ones subnet, respectively. Prior to Cisco IOS

® Software Release 12.0, the ip subnet-zero global configuration command was required to be able to configure

subnet zero on an interface. In Cisco IOS 12.0, ip subnet-zero is enabled by default.

Note: The subnet zero and all-ones subnet are included in the effective number of subnets as shown in the third column.

Since the host portion has now lost two bits, the host portion will have only 22 bits (out of the last three octets). This means the complete Class A network is now divided (or subnetted) into four subnets, and each subnet can have 2

22 hosts (4194304). A host portion with all zeros is network number itself, and a host portion with all ones is reserved

for broadcast on that subnet, leaving the effective number of hosts to 4194302 (2 22

– 2), as shown in the fourth column.

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f33.shtml#subnetting
http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f33.shtml#subnetting
http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f33.shtml#subnetting
http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f33.shtml#subnetting
NW/Useful files/IPv6 Address structure.pdf
IPv6 Address structure Hexadecimal Number System Before introducing IPv6 Address format, we shall look into Hexadecimal Number System. Hexadecimal is positional number system which uses radix (base) of 16. To represent the values in readable format, this system uses 0-9 symbols to represent values from zero to nine and A-F symbol to represent values from ten to fifteen. Every digit in Hexadecimal can represent values from 0 to 15.

Address Structure An IPv6 address is made of 128 bits divided into eight 16-bits blocks. Each block is then converted into 4-digit Hexadecimal numbers separated by colon symbol.

For example, the below is 128 bit IPv6 address represented in binary format and divided into eight 16-bits blocks:

0010000000000001 0000000000000000 0011001000110100 1101111111100001 0000000001100011 0000000000000000 0000000000000000 1111111011111011

2001:0000:3238:DFE1:0063:0000:0000:FEFB

Rules to shorten the IPv6 address:

Even after converting into Hexadecimal format, IPv6 address remains long. IPv6 provides some rules to shorten the address. These rules are:

2001:0000:3238:DFE1:0063:0000:0000:FEFB

Rule:1 Discard leading Zero(es):

In Block 5, 0063, the leading two 0s can be omitted, such as (5th block):

2001:0000:3238:DFE1:63:0000:0000:FEFB

Rule:2 If two of more blocks contains consecutive zeroes, omit them all and replace with double colon sign ::, such as (6th and 7th block): 2001:0000:3238:DFE1:63::FEFB

Consecutive blocks of zeroes can be replaced only once by :: so if there are still blocks of zeroes in the address they can be shrink down to single zero, such as (2nd block):

2001:0:3238:DFE1:63::FEFB

Interface ID IPv6 has three different types of Unicast Address schemes.

The second half of the address (last 64 bits) is always used for Interface ID.

MAC address of a system is composed of 48-bits and represented in Hexadecimal. MAC address is considered to be uniquely assigned worldwide. Interface ID takes advantage of this uniqueness of MAC addresses. A host can auto-

-64) format.

First, a Host divides its own MAC address into two 24-bits halves. Then 16-bit Hex value 0xFFFE is sandwiched into those two halves of MAC address, resulting in 64-bit Interface ID.

Global Unicast Address

and uniquely addressable.

Global Routing Prefix: The most significant 48-bits are designated as Global Routing Prefix which is assigned to specific Autonomous System. Three most significant bits of Global Routing Prefix is always set to 001.

Link-Local Address Auto-configured IPv6 address is known as Link-Local address. This address always starts with FE80. First 16 bits of Link-Local address is always set to 1111 1110 1000 0000 (FE80). Next 48-bits are set to 0, thus:

Link-Local addresses are used for communication among IPv6 hosts on a link (broadcast segment) only. These addresses are not routable so a Router never forwards these addresses outside the link.

Unique-Local Address This type of IPv6 address which is though globally unique, but it should be used in local communication. This address has second half of Interface ID and first half is divided among Prefix, Local Bit, Global ID and Subnet ID.

Prefix is always set to 1111 110. L bit, which is set to 1 if the address is locally assigned. So far the meaning of L bit

SCOPE OF IPV6 UNICAST ADDRESSES:

The scope of Link-local address is limited to the segment.

Unique Local Address are boundary.

Global Unicast addresses are globally unique and recognizable.

NW/Useful files/IPv6 neighbor discovery.pdf
IPv6 neighbor discovery

Neighbor Discovery Protocol (NDP) itself does not describe a wire-level protocol or packet structure,

but rather it establishes directions for accomplishing routine tasks using certain algorithms and five

ICMPv6 message types.

Many of the capabilities provided by NDP are very similar to those found in IPv4's ARP and ICMPv4,

while others are new implementations available only under IPv6. RFC 4861 describes the nine

functions of NDP in detail.

Router Discovery

Whereas IPv4 hosts must rely on manual configuration or DHCP to provide the address of a default

gateway, IPv6 hosts can automatically locate default routers on the link. This is accomplished

through the use of two ICMPv6 messages: Router Solicitation (type 133) and Router

Advertisement (type 134). When first joining a link, an IPv6 host multicasts a router solicitation to

the all routers multicast group, and each router active on the link responds by sending a router

advertisement with its address to the all nodes group.

http://tools.ietf.org/html/rfc4861
Router advertisements indicate paths out of the local link, but they also specify additional information

necessary to assist other NDP operations.

Prefix Discovery

One of the options typically carried by a router advertisement is the Prefix Information option (type

3). Each prefix information option lists an IPv6 prefix (subnet) reachable on the local link. Remember

that it is not uncommon for multiple IPv6 prefixes to reside on the same link, and routers may include

more than one prefix in each advertisement. A host which knows what prefixes are reachable on the

link can communicate directly with destinations in those prefixes without passing its traffic through a

router.

Parameter Discovery

Another option included in router advertisements is the MTU option (type 5), which informs hosts of

the IP MTU to use. For example, this value is typically set to 1500 for Ethernet networks. However,

not all link types have a standardized MTU size. Including this option ensures all hosts know the

correct MTU to use.

Router advertisements also specify the default value hosts should use for the IPv6 hop count. This

isn't an option, but a field built into the router advertisement message header.

Address Autoconfiguration

NDP provides mechanisms for a host to automatically configure itself with an address from a prefix

learned from a local router through prefix discovery. This is done by concatenating a candidate

learned prefix with the EUI-64 address of the host's interface (embedding the MAC address inserting

FF:FE). In this manner, a host can achieve stateless autoconfiguration.

http://packetlife.net/blog/2008/aug/04/eui-64-ipv6/
Address Resolution

The function of address resolution was handled by ARP for IPv4, but is handled by ICMPv6 for IPv6.

In a process very similar to router discovery, two ICMPv6 messages are used: Neighbor

Solicitation (type 135) and Neighbor Advertisement (type 136). A host seeking the link layer

address of a neighbor multicasts a neighbor solicitation and the neighbor (if online) responds with its

link layer address in a neighbor advertisement.

Next-Hop Determination

As in IPv4, next-hop determination is simply a procedure for performing longest-match lookups on

the host routing table and, for off-link destinations, the selection of a default router.

Neighbor Unreachability Detection

NDP is able to determine the reachability of a neighbor by examining clues from upper-layer

protocols (for example, received TCP acknowledgments), or by actively re-performing address

resolution (via ICMPv6) when certain thresholds are reached.

Duplicate Address Detection

When a host first joins a link, it multicasts neighbor solicitations for its own IPv6 address for a short

period before attempting to use that address to communicate. If it receives a neighbor advertisement

in response, the host realizes that another neighbor on the link is already using that address. The

host will mark the address as a duplicate and will not use it on the link.

Note that this process is similar to IPv4 gratuitous ARP requests, but NDP elegantly allows for

detection of two hosts with the same address before both hosts are actively sending traffic from the

address.

Redirection

A fifth type of ICMPv6 message, the Redirect (type 137), is used by routers to either point hosts

toward a more preferable router, or to indicate that the destination actually resides on link. ICMPv4

provides the same capability with its own redirect message.

NW/Useful files/ipv6_reference_card.pdf
IPv6 Address Types

::/128

::1/128

::ffff/96

Example: ::ffff:192.0.2.47

fc00::/7

Example: fdf8:f53b:82e4::53

fe80::/10

Example: fe80::200:5aee:feaa:20a2

Prefix Designation and Explanation IPv4 Equivalent

Unspecified This address may only be used as a source address by an initialising host before it has learned its own address.

Loopback This address is used when a host talks to itself over IPv6. This often happens when one program sends data to another.

IPv4-Mapped These addresses are used to embed IPv4 addresses in an IPv6 address. One use for this is in a dual stack transition scenario where IPv4 addresses can be mapped into an IPv6 address. See RFC 4038 for more details.

Unique Local Addresses (ULAs) These addresses are reserved for local use in home and enterprise environments and are not public address space.

These addresses might not be unique, and there is no formal address registration. Packets with these addresses in the source or destination fields are not intended to be routed on the public Internet but are intended to be routed within the enterprise or organisation.

See RFC 4193 for more details.

Link-Local Addresses These addresses are used on a single link or a non-routed common access network, such as an Ethernet LAN. They do not need to be unique outside of that link.

Link-local addresses may appear as the source or destination of an IPv6 packet. Routers must not forward IPv6 packets if the source or destination contains a link- local address.

Link-local addresses may appear as the source or destination of an IPv6 packet. Routers must not forward IPv6 packets if the source or destination contains a link- local address.

0.0.0.0

127.0.0.1

There is no equivalent. However, the mapped IPv4 address can be looked up in the relevant RIR’s Whois database.

Private, or RFC 1918 address space:

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

169.254.0.0/16

This sheet is available at www.ripe.net/ipv6-address-types • Produced by the RIPE NCC in cooperation with ICANN • www.ripe.net • www.icann.org

IPv6 Address Types

2001:0000::/32

Example: 2001:0000:4136:e378: 8000:63bf:3fff:fdd2

2001:0002::/48

Example: 2001:0002:6c::430

2001:0010::/28

Example: 2001:10:240:ab::a

2002::/16

Example: 2002:cb0a:3cdd:1::1

2001:db8::/32

Example: 2001:db8:8:4::2

2000::/3

ff00::/8

Example: ff01:0:0:0:0:0:0:2

Prefix Designation and Explanation IPv4 Equivalent

Teredo This is a mapped address allowing IPv6 tunneling through IPv4 NATs. The address is formed using the Teredo prefix, the server’s unique IPv4 address, flags describing the type of NAT, the obfuscated client port and the client IPv4 address, which is probably a private address. It is possible to reverse the process and identify the IPv4 address of the relay server, which can then be looked up in the relevant RIR’s Whois database.

You can do this on the following webpage: http://www.potaroo.net/cgi-bin/ipv6addr

Benchmarking These addresses are reserved for use in documentation. They should not be used as source or destination addresses.

Orchid These addresses are used for a fixed-term experiment. They should only be visible on an end-to-end basis and routers should not see packets using them as source or destination addresses.

6to4 A 6to4 gateway adds its IPv4 address to this 2002::/16, creating a unique /48 prefix. As the IPv4 address of the gateway router is used to compose the IPv6 prefix, it is possible to reverse the process and identify the IPv4 address, which can then be looked up in the relevant RIR’s Whois database.

You can do this on the following webpage: http://www.potaroo.net/cgi-bin/ipv6addr

Documentation These addresses are used in examples and documentation. They should never be source or destination addresses.

Global Unicast Other than the exceptions documented in this table, the operators of networks using these addresses can be found using the Whois servers of the RIRs listed in the registry at: http://www.iana.org/assignments/ipv6- unicast-address-assignments

Multicast These addresses are used to identify multicast groups. They should only be used as destination addresses, never as source addresses.

No equivalent

198.18.0.0/15

No equivalent

There is no equivalent but 192.88.99.0/24 has been reserved as the 6to4 relay anycast address prefix by the IETF.

192.0.2.0/24 198.51.100.0/24 203.0.113.0/24

No equivalent single block

224.0.0.0/4

This sheet is available at www.ripe.net/ipv6-address-types • Produced by the RIPE NCC in cooperation with ICANN • www.ripe.net • www.icann.org

NW/Useful files/Lecture 4- Sub_Supernetting and Classless Addressing.pdf
©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200311

Chapter 5

Subnetting/Supernetting and

Classless Addressing

• SUBNETTING • SUPERNETTING • CLASSLESS ADDRSSING

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200322

SUBNETTING5.15.1

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200333

A network with two levels of hierarchy (not subnetted)

• All hosts in such a large network must be laid out as ONE physical network

• May not always be feasible (due to geographic constraints)

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200344

A network with three levels of hierarchy (subnetted)

• 3-step delivery: site, subnet, host.

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200355

Default mask and subnet mask

Subnetwork

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200366

Finding the Subnet Address

Given an IP address, we can find the subnet address the same way we found the network address in the previous chapter. We apply the mask to the address. We can do this in two ways: straight or short-cut.

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200377

Straight Method

In the straight method, we use binary notation for both the address and the mask and then apply the AND operation to find the subnet address.

Example 1Example 1

What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0?

11001000 00101101 00100010 00111000

11111111 11111111 11110000 00000000

11001000 00101101 001000000000 0000000000000000

The subnetwork address is 200.45.32.0.

©The McGraw-Hill Companies, Inc., 2000 © Adapted for use at JMU by Mohamed Aboutabl, 200388

Short-Cut Method

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Homework Master
Solution Provider
Assignments Hut
Chartered Accountant
Buy Coursework Help
Top Academic Guru
Writer Writer Name Offer Chat
Homework Master

ONLINE

Homework Master

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$49 Chat With Writer
Solution Provider

ONLINE

Solution Provider

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$43 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$46 Chat With Writer
Chartered Accountant

ONLINE

Chartered Accountant

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$42 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$17 Chat With Writer
Top Academic Guru

ONLINE

Top Academic Guru

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$22 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

The county practice syston - How do i get a dhl waybill - Sue's shop the dance warehouse - You can grow your intelligence author - The mutual impact of organizational culture and structure - Identify the phases of relationship deterioration - Greenhouse effect lab report - Boiling point elevation example problem - How to write a leadership philosophy - Anatomy & Physiology - Themes in lady lazurus - Veneer wrapped mdf profiles https://studylib.net/doc/18873211/mdf-mouldings - The hidden face cda - 102 minutes that changed america review - Physical behavior of matter heating and cooling curves - Situational thinking - C++ lecture notes ppt - Reformatory movement criminal justice - Scheme of analysis of simple salts - Philippine ports authority entrance exam - Freud's stages of psychosexual development pdf - Women and power essay - Baskin robbins lunar cheesecake - Mitel 5330 feature codes - Structure of a flower - Advantages and disadvantages of sales promotion ppt - Cleo slow motion study - A man starts walking north at 4 ft s - Barriers to np practice that impact healthcare redesign - Lng tanks staten island - Singapore airlines case study solution - DrRacket programming - Nmc reflective discussion form - Microeconomics Discussion Implicit & Explicit Costs - Stakeholder Involvement - Cv and cp for diatomic gas - Mla essay template word - Five pillars oof islam - 6 month libor wsj - Potential directions studio art - Endorsed components of a training package - Boroughmuir high school catchment - Civil service assessment centre - Buffer capacity calculation example - +91-8306951337 kala jadu specialist astrologer IN RajpurSonarpur - Presented here are the components in casilla company's income statement - Financial accounting craig deegan - CCIS - Art Project ( three times) - Short response - Casey nelson is a divisional manager - Critical theory of communication in organizations - Chelsea cookbook rodney spoke - Presentation - Pull factors of mumbai - Pillow method is designed to - How to know if functions are inverses of each other - American international journal of contemporary research - Corn pone opinions answers - Uck london college moodle - Economics can best be described as the study of - Six ethical decision making steps - French bulldog club of nsw - Cpa pep schedule 2019 - An interesting person i know essay - Explorers or boys messing about - British spacecraft hermes 1959 - Finesse clean and simple hypoallergenic shampoo - Driven to destruction cheats - Bbc learning zone vikings - Enterprise risk management assignment - Juan hola linda que tal las clases - Pete wishart jasper jones - Poppy cottage druridge bay - Operation management report on kfc - Arriva student bus pass newcastle - Skin Disorders - English Outline - Writing economic Essay - Brickworks dividend reinvestment plan - Visual understanding in education - Personal Holistic Beliefs on Education - Cirque du soleil in los angeles 2013 - Wayne abbott equine dentist - Concur we encountered an error uploading your receipt unknown - Michael friedman sale of the century las vegas - Pipe makers canning vale - Agassi company uses a job order cost system - Archer daniels midland and the friendly competitors case study - A level psychology syllabus - Midnight journal entry solution - John deere case study solution - Bunsen burner input energy - The flowers by alice walker theme - Week 4 discussion - Impediments to critical thinking - Ssca group of schools - L estrange v graucob - Forked river brewing company case study - Alternate function of port 3 of 8051 microcontroller - Factoring and zero product property