Jumat, 30 Desember 2011

Tugas

Questions?
1. when we use 192 xxx ip address, and when we also use 256 xxx ip address ..?
2. Ip address can be separated into two parts, mentioned ?


Answer
1. according to our needs, if we want to create small networks then you should use the ip address classes C, (256 xxx) but if want to create a large network using the ip address class A (192 xxx).
2. netID and hostID

LAN & WAN

1. LAN (Local Area Network)

A local area network (LAN) is a computer network that connects computers in limited areas such as school, home, computer lab, or office buildings. [1] The defining characteristics of LANs, in contrast to the wide area network (WAN), including their usually higher data transfer rates, smaller geographic areas, and lack of need for leased telecommunication networks.
ARCnet, Token Ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to build the LAN.
Early LAN cabling is always based on the various classes of coaxial cable. However, shielded twisted pair is used in the IBM Token Ring implementation, and in 1984 showed the potential of a simple StarLAN unshielded twisted pair Cat3-using the same simple cable used for telephone systems. This led to the development of 10Base-T (and successors) and structured cabling is still the basis of most current commercial LAN. In addition, fiber optic cable is increasingly used in commercial applications.
Because this cable is not always possible, wireless Wi-Fi is now the most common technology in the residence, because the cable required is minimal and is perfect for mobile laptop and smartphone.
Today, most LAN technology based on IEEE 802.3 Ethernet switch using the device, which has a data transfer speed 10, 100, or 1000 Mbit / s. In addition to Ethernet technology, the current 802.11b technology (or so-called Wi-Fi) is also often used to form the LAN. Places that provide LAN connectivity with Wi-Fi technology called hotspots.
On a LAN, each node or computer has its own computing power, in contrast to the concept of terminal dump. Each computer can also access resources on the LAN in accordance with the permissions that have been set. These resources can be data or devices such as printers. On a LAN, a user can also communicate with other users by using the appropriate application.

There are different types of LANs Ethernets are most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers.
Following characteristics differentiate one LAN from another:
a. Topology: The composition of geometric devices on a network. For example, the device can be arranged in a ring or in a straight line.
b. Protocols: The rules and encoding specifications for sending data. The protocol also determines whether the network using peer-to-peer or client / server architecture.
c. Media: Devices can be connected by twisted-pair cable, coaxial cable, or fiber optic cables. A number of networks without connecting media altogether, communicating instead via radio waves


2. Wan (Wide Area Network)


WAN covers a wide geographical area, such as a province, state or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area network (MAN).
WAN in the world's most popular is the Internet. Some segments of the Internet, such as VPN-based extranet, WAN also within them. Finally, many companies or research WAN networks using leased lines.
WAN network equipment generally use a different and far more expensive than the LAN. Key technologies often found in WANs include SONET, Frame Relay, and ATM
Wide Area Network consists of dark fiber and active communications equipment. Among these are network switches, optical multiplexers and media converters. The WAN will be implemented using 10 Gigabit Ethernet (GbE 10) technology. This is an obvious choice for distances up to ~ 40 km with a pair of transmitter / single receiver, but will also be used for longer distances but cheap and reliable alternatives are available (eg by reuse of existing infrastructure).

Network formed often by seeking the help of telecomm departments that provide leased line facilities. The router is connected to the LAN on one side and a hub mounted at the other end. This is an expensive way to form a WAN (Wide Area Network) networks. WAN (Wide Area Network) networks are often formed using the method of circuit switching. A circuit switching network is established when at the end of one node and at the other end of the terminal is physically connected to each other for further communication. Network nodes is the most common physical switches, hubs and modems. While the terminal is a physical device that perform basic communication, such as telephone, answering machine or printer sometimes. Data moves through the use of network protocols. A protocol is a set of rules that guide the transfer of information. The purpose of the protocol is to detect errors.

WAN devices :

a. WAN Switch
A WAN switch is a multiport internetworking device used in carrier networks. These devices typically switch traffic such as Frame Relay, X.25, and SMDS and operate at the data link layer of the OSI reference model.

b. Access Server
An access server acts as a concentration point for dial-in and dial-out connections.

c. Modem
Modem is a device that interprets digital and analog signals, allowing data to be transmitted over voice-grade telephone lines.

d. CSU / DSU
A CSU / DSU (channel service unit / digital service unit) is a digital-interface device that adapts the physical interface on the device (Data Terminal Equipment) interface from the DCE that the DTE (Data Circuit-Terminating)-enabled devices in the network operator. CSU / DSU also provides signal timing for communication between devices.

e. ISDN Terminal Adapter
An ISDN terminal adapter is a device used to connect ISDN Basic Rate Interface (BRI) connections to other interfaces, such as EIA/TIA-232. A terminal adapter is essentially an ISDN modem.


How to Work a WAN ..??

If we develop a virtual network switching or packet switching network, we often need to relay the frame to transfer the data in (Wide Area Network) WAN. Frame data packets are transferred from one end to the other. There are many types of WAN (Wide Area Network) protocols such as TCP / IP, MPLS, frame relay and ATM. Most (Wide Area Network) WAN using the X.25 protocol, but is well-known WAN is used to transfer packets. X.25 packet switching was established by the exchange, which is a physical node at one end and leased telephone lines at the other end.

NAT

In computer networking, network address translation (NAT) is the process of modifying the IP address of the IP packet header information in transit in traffic routing device.
The simplest types of NAT provides translation 1-1 of IP addresses. RFC 2663 refers to the type of NAT as a basic NAT. It is often also referred to as one-to-one NAT. In this type only NAT IP address, IP header checksum and the checksum of each higher level that includes the IP address needs to be changed. The rest of the package can be left untouched (at least for basic TCP / UDP functionality, some higher-level protocols may require further interpretation). Nat base can be used when there is a requirement for the interconnection of two networks with the IP addresses that are not compatible.
However, it is common to hide the entire IP address space, usually consisting of private IP addresses behind a single IP address (or in some cases a small group of IP addresses) in another address space (usually public). To avoid ambiguity in the handling of the returned package, one-to-many NAT must modify the higher level information such as TCP / UDP port in communication out and should have a translation table so that packets can be correctly translated back again. RFC 2663 uses the term NAPT (network address translation and port) for the type of NAT. Other names include PAT (Port Address Translation), IP masquerading, NAT Overload and many-to-one NAT. Since this is the most common type of NAT is often referred to simply as NAT.
However, most NAT devices today allow the network administrator to configure translation table entry for permanent use. This feature is often referred to as "static NAT" or port forwarding and allows traffic originating in the network "outside" to reach the network host designated in disguise.

NAT and TCP / UDP

"Pure NAT", operating on IP alone, may or may not be totally correct parse protocol relating to IP information, such as ICMP, depending on whether the payload is interpreted by the host on the "inside" or "outside" of translation. Once the protocol stack to go through, even with basic protocols such as TCP and UDP, the protocols will break unless NAT takes action beyond the network layer.
IP packet has a checksum in each packet header, which provides error detection only for the header. IP datagram can be fragmented and the need for NAT to reassemble these fragments to allow correct recalculation of higher level checksums and correct tracking of which packets belong to which connection.
The main transport layer protocols, TCP and UDP, have a checksum that covers all of the data they carry, as well as TCP / UDP, plus a "pseudo-header" that contains the source and destination IP address of the packet carrying the TCP / UDP header. For originating NAT to successfully pass TCP or UDP, must recompute the checksum of TCP / UDP header that is based on the IP address is translated, not the original, and put into the header checksum TCP / UDP packets from the first set of fragmented packets. Receiving NAT must recompute the IP checksum on every packet passed to the destination host, and also recognize and recompute the header TCP / UDP using the retranslated addresses and pseudo-header. This is not really solved the problem. One solution for NAT receiver to reassemble the entire segment and then recompute the checksum is calculated on all packages.
Originating host can do the maximum transmission unit (MTU) discovery of a way to determine the packet size that can be transmitted without fragmentation, and then set does not fragment (DF) bit in the appropriate field of the packet header.
[Edit] Destination network address translation (DNAT)

DNAT is a technique for transparently change the destination IP address of an en-route packet and perform the inverse function for each reply. Each router that is located between two endpoints can perform the transformation of the package.
DNAT is commonly used to publicize the services located on a private network on a publicly accessible IP address. It uses DNAT also called port forwarding, or DMZ when used on the entire server, which becomes exposed to the WAN, to be analogous to the military maintained demilitarized zone (DMZ).
[Edit] SNAT

The meaning of the term SNAT varies by vendor. Many vendors have proprietary definitions for SNAT. An expansion of the public is the source NAT, a partner of destination NAT (DNAT). Microsoft uses the acronym for Secure NAT, in association with ISA Server. For Cisco Systems, SNAT means stateful NAT.
[Edit] Secure network address translation
In computer networking, network address translation process performed in a safe way involves rewriting the source and / or destination addresses of IP packets as they pass through a router or firewall.

An analogy
A NAT device is similar to the phone system in an office that has a public phone number and some extensions. Outbound telephone calls made ​​from the office all seem to come from the same phone number. However, incoming calls that do not specify an extension can not be transferred to individuals in the office. In this scenario, the office is a private LAN, the main phone number is the public IP address, and the extension port number of unique individuals

Routing ( Static & Dinamis)

Routing is the process of directing packets from the source node to destination node on the network that berbeda.Mendapatkan packet to the next hop router they need to perform two basic activities: tekaddan path packet switching.
Path determination
Involve reviewing all the paths to the destination network and selecting the optimal route. To determine the optimal route, information is entered into the route table, which includes information such as network destination, next hop, and related metrics.
Packet switching
Involve physical changes to the packet's destination address to that of the next hop (logical destination address of the source package and will remain the same).
Routers need to know information to route packets
• The destination address.
• Neighbor routers.
• Possible routes to all remote networks.
• The best route for each network.
• How to maintain and verify routing information.
Routers learn about remote networks from neighbor routers or administrator. The router then builds a routing table that tells how to get to the remote network. Routes are either directly connected, static, or dynamic. Static routes entered by the administrator. Dynamic routes learned from neighboring routers using routing protocols. In dynamic routing, routers update each other on a specified interval. Changes cause the router to update all other routers. If the router receives a packet with the destination network is not in the routing table, it will discard the packet.

STATIC ROUTING


The process of manually adding a route in the routing table of each router. Administrators configure the destination network, the next hop, and appropriate metrics. The route does not change until the network administrator changes it.
Profit
• No overhead on the router CPU.
• No use of bandwidth between the links.
• Security (only the administrator added the route).
Shortage
• The administrator must really understand the internetwork and how each router is connected.
• If the new network is added, the administrator must update all routers.
• Not practical on a large network because the time-intensive.
Examples of static routes
Router3 routes (config) # ip 192.168.1.0 255.255.255.0 serial0 permanent

DINAMIC ROUTING

Routes dynamically adjust to changes in the internetwork environment automatically. When there is change in the network, the router begins to converge with re-calculate the route and distribute route update. Route update messages spread through the network, which causes other routers to recalculate their routes. The process continues until all routes have been gathered. Using the protocol for finding and updating routes in the routing table. It uses CPU time and consumes bandwidth between the links. Routing protocol defines the rules used by the router when they communicate with each other.
There are two types of routing protocols in the internetwork, Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP). IGP is used within the network in the same administrative domain. EGPs are used to communicate between domains.
Routers to route the lines that formed automatically by the router itself according to the configuration are made. If there are changes in inter-network topology, the router will automatically create a new routing.
Pros:
• Dynamic Routing will always update and menenntukan jalur2nya in its routing table.
• Dynamic Routing not only create the best path to a different network, dynamic roting will also determine the new path is good if the goal is not te
rsedia (if the topology changes).
• Automatically divides its routing information to other routers and adapt to the changing topology of the arrangement tenpa s
eorang network admin.
weaknesses:
• Dynamic routing will be a burden in terms of processes in the CPU bandwidth usage of routers and network links.
When using dynamic routing:
Static routing is usually used for large-scale networks.


The IP Routing Process
The IP Routing Process
The IP routing process is fairly direct when a datagram's destination is located on a neighboring network. In this kind of situation, a router would follow a simple procedure

First, when a workstation wants to send a packet to a destination host, in this instance 160.1.0.1 transmitting to 160.2.0.4, host 160.1.0.1 checks the destination IP address. If it determines the address isn't on the local network, it must then be routed. Next, 160.1.0.1 calls on ARP to obtain the hardware address of its default gateway. The IP address of the default gateway is configured in machine 160.1.0.1's internal configuration, but 160.1.0.1 still needs to find the hardware address of the default gateway, and sends out an ARP request to get it. IP then proceeds to address the packet with the newly obtained destination hardware address of its default router. The information utilized for addressing the packet includes:
• Source hardware address 1
• Source IP address 160.1.0.1
• Destination hardware address 5
• Destination IP address 160.2.0.4
IP, on the receiving router with the hardware address of 5, establishes that it is not the final, intended recipient by inspecting the packet's destination IP address, which indicates it must be forwarded to network 160.2. Then, IP uses ARP to determine the hardware address for 160.2.0.4. The router then puts the newly identified hardware address into it's ARP cache for easy reference the next time it's called upon to route a packet to that destination.

IP Address & Subnetting

IP Address (Internet Protocol Address or often abbreviated IP) is a row of binary digits between 32-bit to 128-bits are used as an identification address for each host computer in a network the Internet. The length of this figure is 32-bit (for IPv4 or IP version 4), and 128-bit (for IPv6 or IP version 6) which indicates the address of the computer on the Internet network based TCP / IP.

IP addresses can be separated into two parts, namely the network (net ID) and the host (host ID). Net ID instrumental in the identification of a network from another network, while the host ID serves to identify a host within a network. Thus, all hosts are connected in the same network have the same net ID. Some of the bits of the early part of the IP Address is the network bits / network number, while the rest is for the host. The dividing line between the network and hosts are not fixed, depending on the class network. IP addresses are divided into five classes, namely class A, class B, class C, class D and class E.

Determination of the class is done in the following ways:

The structure of class A IP Address :
Class A IP address is 0, with a length of 8 bits net ID and host ID 24 bits long. So the first byte of the IP address class A has a range of 0-127. So in class A there are 127 networks with each network can accommodate about 16 million hosts (255x255x255). Class A IP address given to the network with a very large number of hosts.


The structure of class B IP Address :
Class B IP address bits are always set to 10 so the first byte is always a value between 128-191. Network ID is the first 16 bits and 16 bits are the host ID so that if any computer has the IP address 167.205.26.161, the network ID and host ID = 167 205 = 26 161. On. Class B IP address has IP range from 128.0.xxx.xxx to 191.155.xxx.xxx, which amounted to 65 255 network by the number of hosts per network host 255 x 255 or about 65 thousand hosts.

The structure of class C IP Address
Class C IP address originally used for small networks such as LANs. The first three bits of a class C IP address is always set to 111. Network ID consists of 24 bits and 8 bits of remaining host ID so it can be formed about 2 million networks with each network has 256 hosts.


Class D and E are not used in general, a class D is used for multicast network, the first 4 bits of the class D IP address is always set 1110 so the first byte ranges between 224-247, while the next bit is set as necessary multicast group.
The structure of class D IP Address


Class E for experimental keprluan, class E IP address is not made available for public use. The first four bits of the IP address of this class is set 1111 so the first byte ranges between 248-255.
The structure of class E IP Address :

Network addresses used by routers to find a place a local computer network is located, while address local computer is used to identify a computer on the local network.
IP version 4 (IPv4 address is often called) is a type of network addressing that is used in network protocol TCP / IP using the IP protocol version 4. Total length is 32-bits, and can theoretically address on a host computer up to 4 billion or more precisely 4,294,967,296 hosts around the world, the number of hosts was obtained from 256 (obtained from 8 bits) dipangkat 4 (because there are 4 octets) so that the value maximum of alamt IP version 4 is 255.255.255.255 where the value is calculated from zero so that the value of the host that can be accommodated is 256x256x256x256 = 4,294,967,296 hosts. so that when a host of global quota then be made exceed the IP version 6 or IPv6.
Examples of version 4 IP address is 192.168.0.3


SUBNETTING

we have to master the concept of subnetting to get new IP address, which in this way we can create a new network ID of a network that we had before. Subnetting is use to break up a single network into several smaller networks. To reproduce the network ID of an existing network id, where the host ID sacrificed in part for use in making additional ID

Remember the formula to find a lot of subnets is 2 n - 2
N = number of bits that are shrouded in

And the formula to find number of hosts per subnet is 2 m - 2
M = number of bits that have not been shrouded in

Examples of cases with the completion of I:
Ip address 130.200.0.0 with a subnet mask of 255.255.224.0 identified as class B.
Subnet mask: 11111111.11111111.11100000.00000000
3 bits of the octet to 3 have been used, tingal 5 bits that have not been shrouded in so many groups of subnets that can be used is a multiple of 2 5 = 32 (256-224 = 32)
32 64 96 128 160 192 224

So the IP group that can be used dalah;
loopback subnet  130.200.0.0 - 130.200.31.254
130.200.32.1 - 130.200.63.254
130.200.64.1 - 130.200.95.254
130.200.96.1 - 130 200 127 254
130.200.128.1 - 130 200 159 254
130.200.160.1 - 130 200 191 254
130.200.192.1 - 130 200 223 254

Case:
An emerging company has many branches and each branch office has 255 workstations, network address is 164.10.0.0 available, create a subnet with the largest number of subnets

Settlement; 164.10.0.0 is in class B, meaning octet 3 and 4 are used for the host, whereas a branch office there are 254 hosts, then take a bit longer than the third octet so pretty.

So the new subnetmask
11111111.11111111.11111110.00000000
255. 255. 254. 0

Subnet that is available is 256-254 = 2, then the subnet multiples of 2 up to 254.
The number of subnets (2 7-2) = 128-2 = 26 subnets
The number of hosts / subnet (2 9-2) = 512-2 = 510 hosts
164.10.0.0 to 164.10.1.0  discarded
164.10.2 .1 to 164.10.3.254
164.10.4.1 to 164.10.5.254
164.10.6.1 to 164.10.7.254
164.10.8.1 to 164.10.9.254
164.10.252.1 to 164.10.253.254

Examples of practice subnetting: class B address

Network address 172.16.0.0 and the subnet mask of 255.255.192.0

Subnet 192 = 11 million, 2 2-2 = 2
Host 2 14 - 2 = 16 382 (6 bits in the third octet, and 8 bits in the fourth octet)
Valid subnet 256-192 = 64. 64 + 64 = 128

Subnet 64.0 128.0
The first host 64.1 128.1
Last Host 127 254 192 254
Broadcast 127 255 199 255

Description, then the 172.16.64.0 subnet or 64.0, 64.1 or have first host 172.16.64.1 to 171.16.127.254 and 172.16.127.255 broadcastnya address


Examples of practice subnetting: class A address

Network address 10.0.0.0 and subnet mask 255.255.0.0

Subnet 255 = 11111111, 2 8-2 = 254
Host 2 16 - 2 = 65 534
Valid subnet 256-255 = 1, 2, 3 and so on. (all in second octet). Subnet to be 10.1.0.0, 10.2.0.0, 10.3.0.0 and so on until 10.254.0.0

Subnet 10.1.0.0 10.254.0.0 ...
The first host 10.254.0.1 10.1.0.1 ...
Last Host 10.1.255.254 ... 10,254,255,254
Broadcast 10.1.255.255 ... 10,254,255,255