Академический Документы
Профессиональный Документы
Культура Документы
IP Address —
Binary Math
What is this number?
3,482
What is a Subnetting?
Example:
128 64 32 16 8 4 2 1
1 1 1 1 1 1 1 1
128+64+32+16+8+4+2+1=255
CIDR Notation
Without CIDR Notation
– 192.168.10.1
– 255.255.255.248
With CIDR Notation
– 192.168.10.1/29
IPv6 Fundamentals
Disadvantages of IPv4
IPv6 Solutions
– When both IPv4 and IPv6 protocols exist within an operating system
– Can be used independently or together
– Hybrid stacks use a special IPv4 mapped address within IPv6
Example ::ffff:192.168.10.1
Example FE80::5EFE:192.168.10.1%2
Network Devices
Modem
– Modems are used for dial-up connections over standard analog telephone lines. They can
be integrated onto a system’s motherboard, an internal expansion card, or an external
peripheral device
NIC
– Network Interface Cards are used to connect systems to physical network media. They
can be integrated onto a system’s motherboard or an internal expansion card
Repeater
– Repeaters are used to help deal with attenuation issues. A repeater will take a signal in on
one port and retransmit it out the other
Hub
– Hubs are basically multiport repeaters. A hub will take a signal in on one port and
forward it on to all other ports
Bridge
– Bridges operate at the Data Link layer of the OSI model. Bridges have simplistic routing
tables based on MAC addresses. Bridges are used to create separate collision domains
Switch
– Switches are basically multiport bridges. Switches can be used so each computer resides
in its own collision domain
Router
– Routers are used to connect networks together. Routers have sophisticated routing tables
which can determine the best route to get information from one network to another.
Routers function at the Network layer of the OSI model. Routers are used to create
separate broadcast domains
A Multilayer Switch functions at the Data Link layer of the OSI model just like a regular switch,
but also provides additional functionality at higher OSI layers
The Spanning Tree Algorithm (STA) is used by switches to determine the best route when there
is more than one connection to a node
Virtual LANs (VLANs) can be created in order to emulate multiple broadcast domains using
switches
Trunking is when a switch presents more than one VLAN configuration over a single connection
to another switch or a router
Port Mirroring is used to send a copy of network data to asecond (mirrored) connection usually
for the purposes of monitoring
Port Authentication is used to restrict access based upon authentication information. Typically
used in 802.1x network
Firewall
Proxy Server
– A Wireless Access Point (WAP) is basically the same thing as a hub, but the connections
are made via the airwaves rather than cable
DNS Server
– DNS is a TCP/IP service used to resolve host names to IP addresses. A DNS server is
responsible for maintaining an hierarchical directory of names in a database and respond
to client requests for name resolution
CSU/DSU
– A Channel Service Unit/Data Service Unit is a hardware device which converts data
frames used on a LAN into data frames used on a WAN
Media Converters
Load Balancer
– Load balancers are used when there are more than on line of communication available.
Load balancers help to divide communication evenly between the different
communication lines
Bandwidth Shaper
– Bandwidth shapers are very similar to load balancers in that they are used to help make
communication more efficient. The difference is that bandwidth shapers provide a much
higher level of control over what data gets sent where and when