15-441 Computer Networking IP Address Classes Subnetting

Total Page:16

File Type:pdf, Size:1020Kb

15-441 Computer Networking IP Address Classes Subnetting IP Address Classes (Some are Obsolete) Network ID Host ID 15-441 816 24 32 15-441 Computer Networking 15-641 Class A 0 Network ID Host ID Class B 10 Lecture 8 – IP Addressing & Packets Class C 110 Peter Steenkiste Class D 1110 Multicast Addresses Fall 2013 Class E 1111 Reserved for experiments www.cs.cmu.edu/~prs/15-441-F13 2 Subnetting Important Concepts • Add another layer to hierarchy • Hierarchical addressing critical for scalable • Variable length subnet masks system • Could subnet a class B into several chunks • Don’t require everyone to know everyone else • Reduces number of updates when something changes Network Host • Interaction with routing tables Network Subnet Host • Sub-netting simplifies network management Subnet • Break up the network into smaller chunks 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 Mask • Managed internally in network 3 4 1 Outline IP Address Problem (1991) • CIDR addressing • Address space depletion • Suppose you need 216 + 1 addresses? • In danger of running out of classes A and B • IP protocol • Class C too small for most domains • Very few class A – very careful about using them • IPv6 • Class B – greatest problem • Class B sparsely populated • But people refuse to give it back • NATs • Large forwarding tables • 2 Million possible class C groups 5 6 IP Address Utilization (‘97) Classless Inter-Domain Routing (CIDR) – RFC1338 • Arbitrary split between network & host part of address more efficient use of address space • Do not use classes to determine network ID • Use common part of address as network identifier • E.g., addresses 192.4.16 - 192.4.31 have the first 20 bits in common. Thus, we use these 20 bits as the network number 192.4.16/20 • Merge forwarding entries smaller tables • Use single entry for range in forwarding tables • Combined forwarding entries when possible • “Adjacent” in address space and same egress 7 8 2 CIDR Example IP Addresses: How to Get One? • Network is allocated 8 class C chunks, Network (network portion): 200.10.0.0 to 200.10.7.255 • Get allocated portion of ISP’s address space: • Move 3 bits of class C address to host address • Network address is 21 bits: 201.10.0.0/21 ISP's block 11001000 00010111 00010000 00000000 200.23.16.0/20 • Replaces 8 class C routing Organization 0 11001000 00010111 00010000 00000000 200.23.16.0/23 8 times entries with 1 entry Organization 1 11001000 00010111 00010010 00000000 200.23.18.0/23 • But how do routers know Organization 2 11001000 00010111 00010100 00000000 200.23.20.0/23 size of network address? 3 bits ... ….. …. …. • Routing protocols must carry Organization 7 11001000 00010111 00011110 00000000 200.23.30.0/23 prefix length with address 9 10 IP Addresses: How to Get One? CIDR Illustration • How does an ISP get block of addresses? • From Regional Internet Registries (RIRs) Provider is given 201.10.0.0/21 • ARIN (North America, Southern Africa), APNIC (Asia-Pacific), RIPE (Europe, Northern Africa), LACNIC (South America) Provider • How about a single host? • Hard-coded by system admin in a file • DHCP: Dynamic Host Configuration Protocol: dynamically 201.10.0.0/22 201.10.4.0/24 201.10.5.0/24 201.10.6.0/23 get address: “plug-and-play” • Host broadcasts “DHCP discover” msg • DHCP server responds with “DHCP offer” msg • Host requests IP address: “DHCP request” msg • DHCP server sends address: “DHCP ack” msg 11 12 3 CIDR Implications Outline • Longest prefix match!! • CIDR addressing • Forwarding example Advertise 201.10.0.0/21 201.10.6.0/23 • IP protocol Provider 1 Provider 2 • IPv6 201.10.0.0/22 201.10.4.0/24 201.10.5.0/24 201.10.6.0/23 or Provider 2 address • NATs 13 14 Host Routing Table Example Routing to the Network Destination Gateway Genmask Iface • Packet to 10.1.1.2 10.1.1.4 10.1.1.3 128.2.209.100 0.0.0.0 255.255.255.255 eth0 128.2.0.0 0.0.0.0 255.255.0.0 eth0 10.1.1.3 arrives H1 H2 127.0.0.0 0.0.0.0 255.0.0.0 lo 10.1.1/24 0.0.0.0 128.2.254.36 0.0.0.0 eth0 • Path is R2 – R1 – 10.1.0.2 10.1.0.1 10.1.1.1 R1 H3 H1 – H2 10.1.2.2 • From “netstat –rn” 10.1.0/24 • Host 128.2.209.100 when plugged into CS ethernet 10.1.2/23 10.1/16 10.1.8/24 • Dest 128.2.209.100 routing to same machine Provider R2 10.1.8.1 • Dest 128.2.0.0 other hosts on same ethernet 10.1.2.1 10.1.16.1 H4 • Dest 127.0.0.0 special loopback address 10.1.8.4 • Dest 0.0.0.0 default route to rest of Internet • Main CS router: gigrouter.net.cs.cmu.edu (128.2.254.36) 15 16 4 Routing Within the Subnet Routing Within the Subnet 10.1.1.2 10.1.1.2 • Packet to 10.1.1.3 10.1.1.4 10.1.1.3 • Packet to 10.1.1.3 10.1.1.4 10.1.1.3 • Matches 10.1.0.0/23 H1 H2 • Matches 10.1.1.1/31 H1 H2 10.1.1/24 10.1.1/24 10.1.0.2 10.1.0.2 Routing table at R2 10.1.0.1 • Longest prefix match 10.1.0.1 10.1.1.1 R1 H3 10.1.1.1 R1 H3 10.1.2.2 10.1.2.2 Destination Next Hop Interface Routing table at R1 10.1.0/24 10.1.0/24 127.0.0.1 127.0.0.1 lo0 Destination Next Hop Interface 10.1.2/23 127.0.0.1 127.0.0.1 lo0 10.1.2/23 Default or 0/0 provider 10.1.16.1 10.1/16 10.1/16 R2 10.1.8/24 R2 10.1.8/24 10.1.8.0/24 10.1.8.1 10.1.8.1 Default or 0/0 10.1.2.1 10.1.2.2 10.1.2.0/23 10.1.2.1 10.1.2.1 10.1.8.1 10.1.0.0/24 10.1.0.1 10.1.0.1 10.1.8.1 10.1.2.1 H4 10.1.2.1 H4 10.1.0.0/23 10.1.2.2 10.1.2.1 10.1.16.1 10.1.1.0/24 10.1.1.1 10.1.1.1 10.1.16.1 10.1.8.4 10.1.8.4 10.1.2.0/23 10.1.2.2 10.1.2.2 10.1.1.2/31 10.1.1.2 10.1.1.1 17 18 Outline IP Service Model • Low-level communication model provided by Internet • CIDR addressing • Datagram • Each packet self-contained • All information needed to get to destination • No advance setup or connection maintenance • IP protocol • Analogous to letter or telegram 0 4 8 121619242831 version HLen TOS Length • IPv6 IPv4 Identifier Flag Offset Packet TTL Protocol Checksum Header Format Source Address • NATs Destination Address Options (if any) Data 20 21 5 IPv4 Header Fields IPv4 Header Fields 3 • Version: IP Version • Identifier, flags, fragment offset used for fragmentation 0481216192428 ver- 1 HLe sio TOS Length n • Time to live n Fl Identifier ag Offset • 4 for IPv4 s TTL Protocol Checksum • Must be decremented at each router Source Address • HLen: Header Length • Packets with TTL=0 are thrown away Destination Address Options (if any) • Ensure packets exit the network • 32-bit words (typically 5) 3 0 4 8 1216192428 Data ver- 1 HLe • Protocol sio TOS Length n n Fl • TOS: Type of Service Identifier ag Offset • Demultiplexing to higher layer protocols s TTL Protocol Checksum • Priority information • TCP = 6, ICMP = 1, UDP = 17… Source Address • Header checksum Destination Address • Length: Packet Length Options (if any) • Ensures some degree of header integrity • Bytes (including header) Data • Relatively weak – 16 bit • Header format can change with versions • Source and destination IP addresses • First byte identifies version • Options • Length field limits packets to 65,535 bytes • E.g. Source routing, record route, etc. • Performance issues • In practice, break into much smaller packets for network • Poorly supported performance considerations 22 23 IP Delivery Model IP Fragmentation • Best effort service MTU = • Network will do its best to get packet to destination 2000 host router router MTU = 1500 • Does NOT guarantee: host • Any maximum latency or even ultimate success MTU = 4000 • Sender will be informed if packet doesn’t make it • Every network has own Maximum Transmission Unit • Packets will arrive in same order sent (MTU) • Just one copy of packet will arrive • Largest IP datagram it can carry within its own packet frame • Implications • E.g., Ethernet is 1500 bytes • Scales very well • Don’t know MTUs of all intermediate networks in advance • Higher level protocols must make up for shortcomings • IP Solution • Reliably delivering ordered sequence of bytes TCP • When hit network with small MTU, router fragments packet • Some services not feasible • Destination host reassembles the paper – why? • Latency or bandwidth guarantees 24 25 6 Fragmentation Related Fields IP Fragmentation Example #1 • Length router • Length of IP fragment host MTU = 4000 • Identification • To match up with other fragments • Flags Length = 3820, M=0 IP IP • Don’t fragment flag Header Data • More fragments flag • Fragment offset • Where this fragment lies in entire IP datagram • Measured in 8 octet units (13 bit field) 26 27 IP Fragmentation Example #2 Fragmentation is Harmful MTU = • Uses resources poorly 2000 router • Forwarding costs per packet router • Best if we can send large chunks of data Length = 2000, M=1, Offset = 0 • Worst case: packet just bigger than MTU Length = 3820, M=0 IP IP • Poor end-to-end performance IP IP Header Data Header Data • Loss of a fragment 1980 bytes 3800 bytes • Path MTU discovery protocol determines minimum Length = 1840, M=0, Offset = 1980 MTU along route • Uses ICMP error messages IP IP Header Data • Common theme in system design • Assure correctness by implementing complete protocol • Optimize common cases to avoid full complexity 1820 bytes 28 29 7 Internet Control Message Protocol IP MTU Discovery with ICMP (ICMP) • Short messages used to send error & other control information MTU = • Examples 2000 host router • Ping request / response router MTU = 1500 • Can use to check whether remote host reachable host • Destination unreachable MTU = 4000 • Indicates how packet got & why couldn’t go further • Typically send series of packets from one host to another • Flow control • Typically, all will follow same route • Slow down packet delivery rate • Routes remain stable for minutes at a time • Redirect • Makes sense to determine path MTU before sending real packets • Suggest alternate routing path for future messages • Operation • Router solicitation / advertisement • Send max-sized packet with “do not fragment” flag set • Helps newly connected host discover local router • If encounters problem, ICMP message will be returned • Timeout • “Destination unreachable: Fragmentation needed” • Packet exceeded maximum hop limit • Usually indicates MTU problem encountered 30 31 IP MTU Discovery with ICMP IP MTU Discovery with ICMP ICMP ICMP Frag.
Recommended publications
  • Aerohive Configuration Guide: RADIUS Authentication | 2
    Aerohive Configuration Guide RADIUS Authentication Aerohive Configuration Guide: RADIUS Authentication | 2 Copyright © 2012 Aerohive Networks, Inc. All rights reserved Aerohive Networks, Inc. 330 Gibraltar Drive Sunnyvale, CA 94089 P/N 330068-03, Rev. A To learn more about Aerohive products visit www.aerohive.com/techdocs Aerohive Networks, Inc. Aerohive Configuration Guide: RADIUS Authentication | 3 Contents Contents ...................................................................................................................................................................................................................... 3 IEEE 802.1X Primer................................................................................................................................................................................................... 4 Example 1: Single Site Authentication .................................................................................................................................................................... 6 Step 1: Configuring the Network Policy ..............................................................................................................................................................7 Step 2: Configuring the Interface and User Access .........................................................................................................................................7 Step 3: Uploading the Configuration and Certificates ....................................................................................................................................
    [Show full text]
  • Internet Protocol Suite
    InternetInternet ProtocolProtocol SuiteSuite Srinidhi Varadarajan InternetInternet ProtocolProtocol Suite:Suite: TransportTransport • TCP: Transmission Control Protocol • Byte stream transfer • Reliable, connection-oriented service • Point-to-point (one-to-one) service only • UDP: User Datagram Protocol • Unreliable (“best effort”) datagram service • Point-to-point, multicast (one-to-many), and • broadcast (one-to-all) InternetInternet ProtocolProtocol Suite:Suite: NetworkNetwork z IP: Internet Protocol – Unreliable service – Performs routing – Supported by routing protocols, • e.g. RIP, IS-IS, • OSPF, IGP, and BGP z ICMP: Internet Control Message Protocol – Used by IP (primarily) to exchange error and control messages with other nodes z IGMP: Internet Group Management Protocol – Used for controlling multicast (one-to-many transmission) for UDP datagrams InternetInternet ProtocolProtocol Suite:Suite: DataData LinkLink z ARP: Address Resolution Protocol – Translates from an IP (network) address to a network interface (hardware) address, e.g. IP address-to-Ethernet address or IP address-to- FDDI address z RARP: Reverse Address Resolution Protocol – Translates from a network interface (hardware) address to an IP (network) address AddressAddress ResolutionResolution ProtocolProtocol (ARP)(ARP) ARP Query What is the Ethernet Address of 130.245.20.2 Ethernet ARP Response IP Source 0A:03:23:65:09:FB IP Destination IP: 130.245.20.1 IP: 130.245.20.2 Ethernet: 0A:03:21:60:09:FA Ethernet: 0A:03:23:65:09:FB z Maps IP addresses to Ethernet Addresses
    [Show full text]
  • Domain Name System System Work?
    What is the DNS? - how it works Isaac Maposa | Dev Anand Teelucksingh | Beran Gillen Community Onboarding Program | 11 March 2017 Agenda 1 2 3 What is the Domain Structure of the How does the Name System? Domain Name Domain Name System System Work? 4 5 6 Who makes the Stakeholders in the Engage with ICANN Domain Name Domain Name ??? System Work? System. | 2 What is the Domain Name System (DNS)? The Internet, what is it..? ● The Internet is a network of networks that interconnects devices to exchange information. ● In order to “talk” to each other, all of these devices must have a unique numerical address called an Internet Protocol address or IP Address. An example of an IP address is 94.127.53.132 ● When you visit a website from your browser, you are requesting the website from your device’s IP address to the web server’s IP address. ● However, you don’t type in the ip address of the web server, rather the domain name of for example www.google.com ● In so doing, you have queried the DNS. ● So what is this DNS???? | 4 What is the Domain Name System? ● The Domain Name System or DNS overcomes this problem of remembering IP addresses by mapping domain names to IP addresses. ● While this sounds like a phone book, it is not a centralised database. ● The DNS is a distributed database across a hierarchy of networks of servers and provide ways for devices and software (like browsers and email) to query the DNS to get an IP address. ● Domain names must be unique.
    [Show full text]
  • NAT-Aware Public-Private GSLB Configuration Avi Networks — Technical Reference (17.2)
    Page 1 of 5 NAT-aware Public-Private GSLB Configuration Avi Networks — Technical Reference (17.2) NAT-aware Public-Private GSLB Configuration view online An Avi GSLB configuration can serve clients from a mixture of public and private networks. Introduction Typically, the VIP configured in a local virtual service (configured as a GSLB pool member) is a private IP address. But this IP address may not always be reachable by the client. For example, a user on a laptop could come in via the corporate intranet or VPN, but also directly from the public Internet. In the former case, the source IP address would be an intranet private IP address. In the latter case, it would be a public IP address. Note that, with resolvers (LDNS) in the middle and no support for extension mechanism for DNS (EDNS), this may not be as simple. Note ? If EDNS processing is enabled, the client's IP address is found within the ECS option. For more information, refer to the Extension Mechanisms for DNS Client Subnet Option Insertion article. The source being a certain set of resolver IP addresses could indicate that the client is coming in from a private network, and another set of IP addresses could indicate that the client is coming in from a public network. How It Works Client DNS requests coming in from within the intranet have the private IP served in the A record, and requests from outside are served the public IP address. Please note that datapath health monitoring is performed only against the private IP address.
    [Show full text]
  • New Gateways (PDF
    Packet Network Notice Rev: 28-Nov-2011 Date: Nov 28, 2011 From: Santa Clara County ARES/RACES Packet Committee Subject: Packet Network Update – New AMPRnet and E-mail gateways Attention: All ECs, AECs, MACs and other Santa Clara County Packet Users This Packet Network Notice contains important information which affects your ability to access and use the county packet backbone. This update covers the following topics: • New AMPRnet Gateway • New E-mail Gateway Please read this information thoroughly and pass along to any packet users in your local area. New AMPRnet Gateway The AMPRnet is an AMateur Packet Radio network consisting of packet radio BBSs located worldwide. Local networks of BBSs are interconnected to other local networks through gateways. These gateways use IP-in-IP tunnels to connect to each other. AMPRnet IP addresses are allocated from the IP address block of 44.0.0.0/8. Once a BBS or local network of BBSs is connected to AMPRnet, each of the BBSs can reach any other BBS on the AMPRnet, and vice-versa. For example, in the State of Michigan, each county has a local network of one or more BBSs. Each county is connected to all other counties (and to the rest of the world) with AMPRnet connections. Here in California, we can use AMPRnet connections to reach other counties which do not have a radio path to our network. We have just started to reach out to other counties to work on making those connections. There are two primary uses for this connectivity: 1) Messaging: Messages can now be addressed to anyone at any of the AMPRnet BBSs with a simple and standard Internet-style address format: [email protected].
    [Show full text]
  • Ipv6 Addresses
    56982_CH04II 12/12/97 3:34 PM Page 57 CHAPTER 44 IPv6 Addresses As we already saw in Chapter 1 (Section 1.2.1), the main innovation of IPv6 addresses lies in their size: 128 bits! With 128 bits, 2128 addresses are available, which is ap- proximately 1038 addresses or, more exactly, 340.282.366.920.938.463.463.374.607.431.768.211.456 addresses1. If we estimate that the earth’s surface is 511.263.971.197.990 square meters, the result is that 655.570.793.348.866.943.898.599 IPv6 addresses will be available for each square meter of earth’s surface—a number that would be sufficient considering future colo- nization of other celestial bodies! On this subject, we suggest that people seeking good hu- mor read RFC 1607, “A View From The 21st Century,” 2 which presents a “retrospective” analysis written between 2020 and 2023 on choices made by the IPv6 protocol de- signers. 56982_CH04II 12/12/97 3:34 PM Page 58 58 Chapter Four 4.1 The Addressing Space IPv6 designers decided to subdivide the IPv6 addressing space on the ba- sis of the value assumed by leading bits in the address; the variable-length field comprising these leading bits is called the Format Prefix (FP)3. The allocation scheme adopted is shown in Table 4-1. Table 4-1 Allocation Prefix (binary) Fraction of Address Space Allocation of the Reserved 0000 0000 1/256 IPv6 addressing space Unassigned 0000 0001 1/256 Reserved for NSAP 0000 001 1/128 addresses Reserved for IPX 0000 010 1/128 addresses Unassigned 0000 011 1/128 Unassigned 0000 1 1/32 Unassigned 0001 1/16 Aggregatable global 001
    [Show full text]
  • Changing the IP Address Scope of the Media Gateway to Allow Use of Customer-Owned Routers
    Changing the IP Address scope of the media gateway to allow use of customer-owned routers This method does not require making any changes to the customer-owned router and can be completed by accessing the Media Gateway’s router and the powercycling of devices. The HomeConnect functionality may not be available on some devices when using this method. HomeConnect functionality may not work correctly using this method and devices connected to the Gateway’s Ethernet ports or wireless may not be able to communicate with devices connected to the customer’s router. Description The wireless can be enabled on both the Ultra TV Media Gateway and the customer- owned router at the same time. The DHCP is enabled on the customer-owned router and the Media Gateway, and both have a separate IP address scope to assign to connected devices. The customer- owned router is connected to the “1” Ethernet port of the Gateway using the Internet/WAN port on the router. Example This image shows how devices are connected to the Media Gateway and the customer-owned router. Configuring the Gateway 1. Access the Media Gateway: a. Enter “192.168.0.1” into the address bar of any web browser. b. Press the “Enter” key. c. Enter “technician” in the User Name field. d. Enter “WOWpass” in the Password field. If the user name and password combination do not work, the customer must call WOW! to have the password reset. e. Click the “Apply” button. 2. Click the “LAN Setup” tab. 3. Enter “192.168.2.1” in the IP Address field.
    [Show full text]
  • An Internet Protocol (IP) Address Is a Numerical Label That Is
    Computer Communication Networks Lecture No. 5 Computer Network Lectures IP address An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network, that uses the Internet Protocol for communication between its nodes. An IP address serves two principal functions: 1- host or network interface identification 2- location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of TCP/IP defined an IP address as a 32-bit number and this system, known as Internet Protocol Version 4 or IPv4, is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995. Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6). The Internet Protocol also routes data packets between networks; IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are used to designate a sub network. As the development of private networks raised the threat of IPv4 address exhaustion, RFC 1918 set aside a group of private address spaces that may be used by anyone on private networks. They are often used with network address translators to connect to the global public Internet.
    [Show full text]
  • TCP/IP Protocol Suite
    TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. I said, oh, man, it's obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPANET." – New York Times Interview: December 20, 1999 Overview • Terminology • History • Technical Details: – TCP – IP – Related Protocols • Physical Media • Social Implications • Economic Impact 3 Terminology • Protocol – A set of rules outlining the format to be used for communication between systems • Domain Name System (DNS) – Converts an Internet domain into an IP address • Router – A computer or software package used in packet switched networks to look at the source and destination addresses, and decide where to send the packets • Uniform Resource Indicators – Uniform Resource Location (URL) • How to find the resource: HTTP, FTP, Telnet – Uniform Resource Names (URN) • What the resource is: Not as common as URL 4 History: Pre-TCP/IP • Networks existed and information could be transferred within • Because of differences in network implementation communication between networks different for each application • Need for unification in protocols connecting networks 5 History: TCP/IP Development • 1968: Plans develop for using Interface Message Processors (IMPs) • Dec.
    [Show full text]
  • A Better Internet Without Ip Addresses
    A BETTER INTERNET WITHOUT IP ADDRESSES Craig A. Shue Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the Department of Computer Science, Indiana University May 2009 ii Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Doctoral Committee Minaxi Gupta, Ph.D. Randall Bramley, Ph.D. Geoffrey Fox, Ph.D. Raquel Hill, Ph.D. April 21, 2009 iii Craig A. Shue A BETTER INTERNET WITHOUT IP ADDRESSES The Internet has evolved from a small network of research machines into a world-wide network for sharing information. The importance of the Internet on commerce, industry, and education has become so profound that world leaders have labeled Internet access as a utility vital to civilization. With such a vitally important role, network researchers must ensure that the Internet is able to expand and scale to serve the needs of the generations to come. To do so, we must overcome two of the most pressing technical obstacles. First, we are rapidly running out of available addresses to identify machines on the Internet. The Internet Protocol version 4, or simply IPv4, can uniquely identify 4.3 billion machines. However, about 88% of the IPv4 address space has been assigned with projections of exhaustion in as little as two years. The second major hurdle is that routers, which forward packets from a source machine to a destination, may soon not be able to store all the required packet forwarding state while still providing expedient packet delivery.
    [Show full text]
  • RADIUS Attribute 8 Framed-IP-Address in Access Requests
    RADIUS Attribute 8 Framed-IP-Address in Access Requests The RADIUS Attribute 8 (Framed-IP-Address) in Access Requests feature makes it possible for a network access server (NAS) to provide the RADIUS server with a hint of the user IP address in advance of user authentication. An application can be run on the RADIUS server to use this hint and build a table (map) of user names and addresses. Using the mapping information, service applications can begin preparing user login information to have available upon successful user authentication. • Finding Feature Information, page 1 • Prerequisites for RADIUS Attribute 8 Framed-IP-Address in Access Requests, page 2 • Information About RADIUS Attribute 8 Framed-IP-Address in Access Requests, page 2 • How to Configure RADIUS Attribute 8 Framed-IP-Address in Access Requests, page 3 • Configuration Examples for RADIUS Attribute 8 Framed-IP-Address in Access Requests, page 4 • Additional References, page 5 • Feature Information for RADIUS Attribute 8 Framed-IP-Address in Access Requests, page 6 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn.
    [Show full text]
  • IP Addressing and Subnetting Workbook Version 1.5
    10011000 1010100 10001111100 1011100101011100 101100011101001 1011110100011010 00001010010110010 1001010101100111 1111010101000101 1101001101010011 001010010101010 1010101000110010 010101001011000 110101100011010 11010100001011 001010100110 1001010010 001IP Addressing and Subnetting Workbook Version 1.5 Instructor’s Edition 11111110 10010101 00011011 10000110 11010011 0101 IP Address Classes Class A 1 – 127 (Network 127 is reserved for loopback and internal testing) Leading bit pattern 0 00000000.00000000.00000000.00000000 Network . Host . Host . Host Class B 128 – 191 Leading bit pattern 10 10000000.00000000.00000000.00000000 Network . Network . Host . Host Class C 192 – 223 Leading bit pattern 110 11000000.00000000.00000000.00000000 Network . Network . Network . Host Class D 224 – 239 (Reserved for multicast) Class E 240 – 255 (Reserved for experimental, used for research) Private Address Space Class A 10.0.0.0 to 10.255.255.255 Class B 172.16.0.0 to 172.31.255.255 Class C 192.168.0.0 to 192.168.255.255 Default Subnet Masks Class A 255.0.0.0 Class B 255.255.0.0 Class C 255.255.255.0 Produced by: Robb Jones [email protected] Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors, and to everyone who has sent in suggestions to improve the series. Workbooks included in the series: IP Addressing and Subnetting Workbooks ACLs - Access Lists Workbooks VLSM Variable-Length Subnet Mask IWorkbooks Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this you are giving everyone else worldwide the answers.
    [Show full text]