[ Pobierz całość w formacie PDF ]
.16.2.This sample shows more bits turned on, extending the network portion and creating a secondary field extending from the end of the standard mask and using eight of the host bits.This secondary field is the subnet field and is used to represent wires (or subnetworks) inside the networks.Subnet PlanningClass B Subnet Planning ExampleIP Host Address: 172.16.2.120Subnet Mask: 255.255.255.0Network Subnet Host172.16.2.120: 10101100 00010000 00000010 01111001255.255.255.0/8: 11111111 11111111 11111111 00000000Subnet: 10101100 00010000 00000010 00000000172 16 2 0lSubnet Address = 172.16.2.0llHost Address = 172.16.2.1-172.16.2.254llBroadcast Address = 172.16.2.255llEight bits of subnettinglThis network has eight that provide up to 254 subnets and 254 host addresses.No.Bits Subnet Mask No.Subnets No.Hosts2 255.255.192.0 2 16,3823 255.255.224.0 6 81904 255.255.240.0 14 40945 255.255.248.0 30 20466 255.255.252.0 62 10227 255.255.254.0 126 5108 255.255.255.0 254 2549 255.255.255.128 510 12610 255.255.255.192 1022 6211 255.255.255.224 2046 3012 255.255.255.240 4094 1413 255.255.255.248 8190 614 255.255.255.252 16,382 2Class C Subnet Planning ExampleIP Host Address: 192.168.5.121Subnet Mask: 255.255.255.248Network Subnet Host192.168.5.121: 11000000 10101000 00000101 01111 001255.255.255.248/5: 11111111 11111111 11111111 11111 000Subnet: 11001001 11011110 00000101 01111 000lSubnet Address = 192.168.5.120llHost Address = 192.168.5.121-192.168.5.126llBroadcast Address = 192.168.5.127llFive Bits of SubnettinglNo.Bits Subnet Mask No.Subnets No.Hosts2 255.255.255.192 2 623 255.255.255.224 6 304 255.255.255.240 14 145 255.255.255.248 30 66 255.255.255.252 62 223) Configure IP addresses.IP Address ConfigurationRouter (config-if) # ip address ip-address subnet-masklAssigns an address and subnet maskllStarts IP processing on an interfacelRouter# term ip netmask-formatRouter(config)# term ip netmask-formatlSets format of network mask as seen in show commandslUse the ip address command to establish the logical network address of this interface.ip address Command Descriptionip-address A 32-bit dotted decimal number.subnet-mask A 32-bit dotted decimal number indicating which bit positions must match; ones indicate positions that much match, and zeros indicate positions that do not match.Use the term ip netmask-format command to specify the format of network masks for the current session.Format options are:lBit countllDotted decimal (the default)llHexadecimallIP Host NamesRouter (config) # ip host name [ tcp-port-number ] address [ address ]…lDefines static host name to IP address mappinglip host tokyo 1.5 2.8ip host kyoto 1.4lHosts/interfaces selectable by name or IP addressl24) Verify IP addresses.Verifying Address configurationThree command allow you to verify address configuration in your internetwork:lTelnet - Verifies the application-layer software between source and destination stations.This is the most complete test mechanism available.llPing - Uses the ICMP protocol to verify the hardware connection and the logical address of the network layer.This is a very basic testing mechanism.llTrace - Uses Time-To-Live (TTL) values to generate messages from each router used along the path.This is very powerful in its ability to locate failures in the path from the source to the destination.lSimple PingThe ping command sends ICMP echo packets and is supported in both user and privileged EXEC mode.These are the commands that may be returned by the ping test:Character Definition! Successful receipt of an echo reply.Times out waiting for datagram replyU Destination unreachable errorC Congestion-experienced packetI Ping interrupted (for example, Ctrl-Shift-6 X)? Packet type unknown& Packet Time to Live exceededExtended PingThe extended ping command is supported only privileged EXEC mode.You can use the extended command mode of the ping command to specify the supported Internet header options.To enter the extended mode, enter Y at the extended commands prompt.IP TraceHost names are shown if the addresses are translated dynamically or via static host table entries.Note: trace is supported by IP, CLNS, VINES, and AppleTalk.When the trace reaches the target destination, an asterisk (*) is reported at the display.This normally is caused by the receipt of a port-unreachable packet and the time out in response to the probe packet.Others include:!H - The probe was received by the router, but not forwarded, usually due to an access list.P - The protocol was unreachable.N - The network was unreachable.* - Time out.25) Prepare the initial configuration of your router and enable IP.Initial Router ConfigurationInstructions: Perform the initial configuration of your router.Use the System Configuration Dialog to create an initial configuration for the to create an initial configuration for the router [ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl centka.pev.pl
.16.2.This sample shows more bits turned on, extending the network portion and creating a secondary field extending from the end of the standard mask and using eight of the host bits.This secondary field is the subnet field and is used to represent wires (or subnetworks) inside the networks.Subnet PlanningClass B Subnet Planning ExampleIP Host Address: 172.16.2.120Subnet Mask: 255.255.255.0Network Subnet Host172.16.2.120: 10101100 00010000 00000010 01111001255.255.255.0/8: 11111111 11111111 11111111 00000000Subnet: 10101100 00010000 00000010 00000000172 16 2 0lSubnet Address = 172.16.2.0llHost Address = 172.16.2.1-172.16.2.254llBroadcast Address = 172.16.2.255llEight bits of subnettinglThis network has eight that provide up to 254 subnets and 254 host addresses.No.Bits Subnet Mask No.Subnets No.Hosts2 255.255.192.0 2 16,3823 255.255.224.0 6 81904 255.255.240.0 14 40945 255.255.248.0 30 20466 255.255.252.0 62 10227 255.255.254.0 126 5108 255.255.255.0 254 2549 255.255.255.128 510 12610 255.255.255.192 1022 6211 255.255.255.224 2046 3012 255.255.255.240 4094 1413 255.255.255.248 8190 614 255.255.255.252 16,382 2Class C Subnet Planning ExampleIP Host Address: 192.168.5.121Subnet Mask: 255.255.255.248Network Subnet Host192.168.5.121: 11000000 10101000 00000101 01111 001255.255.255.248/5: 11111111 11111111 11111111 11111 000Subnet: 11001001 11011110 00000101 01111 000lSubnet Address = 192.168.5.120llHost Address = 192.168.5.121-192.168.5.126llBroadcast Address = 192.168.5.127llFive Bits of SubnettinglNo.Bits Subnet Mask No.Subnets No.Hosts2 255.255.255.192 2 623 255.255.255.224 6 304 255.255.255.240 14 145 255.255.255.248 30 66 255.255.255.252 62 223) Configure IP addresses.IP Address ConfigurationRouter (config-if) # ip address ip-address subnet-masklAssigns an address and subnet maskllStarts IP processing on an interfacelRouter# term ip netmask-formatRouter(config)# term ip netmask-formatlSets format of network mask as seen in show commandslUse the ip address command to establish the logical network address of this interface.ip address Command Descriptionip-address A 32-bit dotted decimal number.subnet-mask A 32-bit dotted decimal number indicating which bit positions must match; ones indicate positions that much match, and zeros indicate positions that do not match.Use the term ip netmask-format command to specify the format of network masks for the current session.Format options are:lBit countllDotted decimal (the default)llHexadecimallIP Host NamesRouter (config) # ip host name [ tcp-port-number ] address [ address ]…lDefines static host name to IP address mappinglip host tokyo 1.5 2.8ip host kyoto 1.4lHosts/interfaces selectable by name or IP addressl24) Verify IP addresses.Verifying Address configurationThree command allow you to verify address configuration in your internetwork:lTelnet - Verifies the application-layer software between source and destination stations.This is the most complete test mechanism available.llPing - Uses the ICMP protocol to verify the hardware connection and the logical address of the network layer.This is a very basic testing mechanism.llTrace - Uses Time-To-Live (TTL) values to generate messages from each router used along the path.This is very powerful in its ability to locate failures in the path from the source to the destination.lSimple PingThe ping command sends ICMP echo packets and is supported in both user and privileged EXEC mode.These are the commands that may be returned by the ping test:Character Definition! Successful receipt of an echo reply.Times out waiting for datagram replyU Destination unreachable errorC Congestion-experienced packetI Ping interrupted (for example, Ctrl-Shift-6 X)? Packet type unknown& Packet Time to Live exceededExtended PingThe extended ping command is supported only privileged EXEC mode.You can use the extended command mode of the ping command to specify the supported Internet header options.To enter the extended mode, enter Y at the extended commands prompt.IP TraceHost names are shown if the addresses are translated dynamically or via static host table entries.Note: trace is supported by IP, CLNS, VINES, and AppleTalk.When the trace reaches the target destination, an asterisk (*) is reported at the display.This normally is caused by the receipt of a port-unreachable packet and the time out in response to the probe packet.Others include:!H - The probe was received by the router, but not forwarded, usually due to an access list.P - The protocol was unreachable.N - The network was unreachable.* - Time out.25) Prepare the initial configuration of your router and enable IP.Initial Router ConfigurationInstructions: Perform the initial configuration of your router.Use the System Configuration Dialog to create an initial configuration for the to create an initial configuration for the router [ Pobierz całość w formacie PDF ]