The router compares the IP destination address with the IP subnet address to determine whether the destination IP address is on the same subnet as the source host.. The exception to this
Trang 1Routers running proxy ARP capture ARP packets They respond with their MAC
addresses for those requests in which the IP address is not in the range of addresses of
the local subnet For example, in Figure 7-49, if Machine A sends an ARP requests to
Machine F, the router processes the request and replies to A with its own MAC address
to be mapped to the IP address of Machine F In the previous description of how data
is sent to a host on a different subnet, the default gateway is configured If the source
host does not have a default gateway configured, it sends an ARP request All hosts on
the segment, including the router, receive the ARP request The router compares the IP
destination address with the IP subnet address to determine whether the destination
IP address is on the same subnet as the source host If the subnet address is the same,
the router discards the packet The packet is discarded because the destination IP address
is on the same segment as the source’s IP address This means that the destination
device on the segment should respond to the ARP request The exception to this is that
the destination IP address is not currently assigned, which generates an error response
on the source host
Figure 7-49 Proxy ARP Network Example
Summary
In this chapter, you learned the following key points:
■ To provide extra flexibility for the network administrator, networks—particularly
large ones—are often divided into smaller networks called subnetworks or sub-nets Subnetting allows a network administrator to get around IPv4’s limitations
by dividing a single network address into many subnets visible only within that single network
■ The function of a subnet mask is to tell devices which part of an address is the
network number, including the subnet, and which part is the host
■ Internetworking functions of the network layer include network addressing and
best-path selection for data traffic
Router
A B C
D E F
Trang 2420 Chapter 7: TCP/IP Protocol Suite and IP Addressing
■ How to explain IP addressing, IP address classes, reserved IP address space, private IP address space, and IP subnetting
■ How to explain the evolution of IP addressing, including the need for an increase
in the size of the IP address space
■ A computer needs an IP address (hierarchical address) to communicate on the Internet
■ There are two ways to configure IP addresses: statically and dynamically
■ There are multiple ways to assign an IP address dynamically
■ When a device does not know its own IP address, it uses RARP, BOOTP, or DHCP
■ When the device that originated a RARP request receives a RARP reply, it copies its IP address into its memory cache, where it resides for as long as the session lasts
■ BOOTP supplies more information to a client than just an IP address
■ DHCP allows computers to be mobile, connecting to many different networks
as needed
To supplement all you’ve learned in this chapter, refer to the chapter-specific Videos, PhotoZooms, and e-Lab Activities on the CD-ROM accompanying this book
Trang 3Key Terms
application layer Handles high-level protocols and issues of representation, encoding,
and dialog control The TCP/IP protocol suite combines all application-related issues
into one layer and ensures that this data is properly packaged for the next layer
broadcast address Used to broadcast packets to all the devices on a network
Class A address Designed to support extremely large networks A Class A IP address
uses only the first octet to indicate the network address The remaining three octets
enumerate host addresses
Class B address Designed to support the needs of moderate- to large-sized networks
A Class B IP address uses two of the four octets to indicate the network address The
other two octets specify host addresses
Class C address The most commonly used of the original address classes This address
space was intended to support a lot of small networks
Class D address Created to enable multicasting in an IP address
Class E address The IETF reserves these addresses for its own research Therefore,
no Class E addresses have been released for use in the Internet
dotted-decimal format In this notation, each IP address is written as four parts
separated by periods, or dots
IP address class A 32-bit IP address is broken into a network part and a host part
A bit or bit sequence at the start of each address determines the address’s class
IP Version 6 (IPv6) The replacement for the current version of IP (Version 4) IPv6
includes support for flow ID in the packet header, which can be used to identify flows
Formerly called IPng (IP next generation)
multicast address A unique network address that directs packets that have that
destination address to predefined groups of IP addresses
network access layer The layer that is concerned with all the issues that an IP packet
requires to make a physical link to the network medium
subnetting The method of dividing full network address classes into smaller pieces
This has prevented complete IP address exhaustion
Trang 4422 Chapter 7: TCP/IP Protocol Suite and IP Addressing
suite of protocols developed by the U.S DoD in the 1970s to support the construction of worldwide internetworks TCP and IP are the two best-known protocols in the suite
transport layer Provides transport services from the source host to the destination host It constitutes a logical connection between the network’s endpoints: the sending host and the receiving host
Review Questions
Complete all the review questions to test your understanding of the topics and con-cepts in this chapter Answers are listed in Appendix C, “Check Your Understanding Answer Key.”
1. What transport layer protocol does TFTP use?
2. Which of the following is a basic service of the transport layer?
A. Provides reliability by using sequence numbers and acknowledgments
B. Segments upper-layer application data
C. Establishes end-to-end operations
D. All of the above
3. Which of the following protocols operate at the TCP/IP Internet layer?
D. All of the above
4. What is the first thing that happens when a DHCP client boots?
A. DHCPREQUEST
B. DHCPBOOT
C. DHCPDISCOVER
D. None of the above
Trang 55. How does the network layer forward packets from the source to the destination?
A. By using a routing table
B. By using ARP responses
C. By referring to a name server
D. By referring to the bridge
6. If a device doesn’t know the MAC address of a device on an adjacent network, it
sends an ARP request to what?
A. The default gateway
B. The closest router
C. The router interface
D. All of the above
7. What is in a RARP request?
A. A MAC header and the RARP request message
B. A MAC header, a RARP header, and a data packet
C. A RARP header and MAC and IP addresses
D. A RARP header and an ARP trailer
8. What are the two parts of an IP address?
A. Network address and host address
B. Network address and MAC address
C. Host address and MAC address
D. MAC address and subnet mask
9. What Internet protocol is used to map a known IP address to an unknown MAC
address?
10. Which of the following initiates an ARP request?
A. A device that can locate the destination IP address in its ARP table
B. The RARP server in response to a malfunctioning device
C. A diskless workstation with an empty cache
D. A device that cannot locate the destination MAC address in its ARP table
Trang 6424 Chapter 7: TCP/IP Protocol Suite and IP Addressing
11. Which of the following best describes an ARP table?
A. A way to reduce network traffic by providing lists of shortcuts and routes to common destinations
B. A way to route data within networks that are divided into subnetworks
C. A protocol that performs an application layer conversion of information from one stack to another
D. A section of RAM on each device that maps IP addresses to MAC addresses
12. Which of the following best describes the ARP reply?
A. A device sends its MAC address to a source in response to an ARP request
B. The shortest path between the source and the destination
C. The updating of ARP tables through intercepting and reading messages traveling on the network
D. The method of finding IP addresses based on the MAC address, used primarily by RARP servers
13. Why are current, updated ARP tables important?
A. For testing links in the network
B. For limiting the number of broadcasts
C. For reducing network administrator maintenance time
D. For resolving addressing conflicts
14. Why is a RARP request made?
A. A source knows its MAC address but not its IP address
B. The data packet needs to find the shortest route between the destination and the source
C. The administrator needs to manually configure the system
D. A link in the network faults, and a redundant system must be activated
15. Which of the following best describes TCP/IP?
A. It is a suite of protocols that can be used to communicate across any set of interconnected networks
B. It is a suite of protocols that allows LANs to connect to WANs
C. It is a suite of protocols that allows for data transmission across a multitude
of networks
D. It is a suite of protocols that allows different devices to be shared by intercon-nected networks
Trang 716. Which of the following does not describe the TCP/IP protocol stack?
A. It maps closely to the OSI reference model’s upper layers
B. It supports all standard physical and data link protocols
C. It transfers information in a sequence of datagrams
D. It reassembles datagrams into complete messages at the receiving location
17. The TCP/IP protocol suite has specifications for which layers of the OSI model?
A. 1 through 3
B. 1 through 4 and 7
C. 3, 4, and 5 through 7
D. 1, 3, and 4
18. Which of the following is not a function of the network layer?
A. RARP determines network addresses when data link layer addresses are known
B. ICMP provides control and messaging capabilities
C. ARP determines the data link layer address for known IP addresses
D. UDP provides connectionless exchange of datagrams without acknowledgments
19. Which of the following is one of the protocols found at the transport layer?
Trang 8Upon completion of this chapter, you will be able to
■ Describe the purpose of routable/routed protocols such as IP
■ Understand the function of IP as a connectionless versus connection-oriented networking service
■ Explain how routers operate at the network layer
■ Describe how routed protocols define the format and use of the fields in a packet
■ Compare OSI Layer 2 LAN switching to Layer 3 routing
■ Explain how routing protocols are used between routers to determine paths and maintain routing tables
■ Explain how routers accomplish path selection and switching functions to transport packets through an internetwork
■ Describe the differences between static and dynamic routing
■ Describe the differences between distance-vector and link-state routing protocols, including convergence
■ Describe the differences between interior and exterior routing protocols, and cite examples of each
■ Understand the purpose and benefits of subnetting
■ Create subnets using the subnet mask based on requirements
■ Calculate the resident network through the ANDing process
Trang 9Chapter 8
Routing Fundamentals and Subnets
This chapter covers topics related to the Internet Protocol (IP) IP is the fundamental pro-tocol used in the Internet Topics discussed include how IP is delivered, how the header is modified at Layer 3 devices, and the actual layout of the IP packet This chapter also covers the relationship between connectionless and connection-oriented networking services You will learn the difference between routing and routed protocols and how routers track dis-tance between locations This chapter introduces the disdis-tance-vector, link-state, and hybrid routing approaches and how each resolves common routing problems
Be sure to look at this chapter’s associated e-Lab Activities, Videos, and PhotoZooms, which you will find on the CD-ROM accompanying this book These CD elements are designed to supplement the material and reinforce the concepts introduced in this chapter
Routed, Routable, and Routing Protocols
A protocol is a standards-based set of rules that determines how computers communicate with each other across networks A protocol also serves as the common denominator or medium by which different applications, hosts, or systems communicate When computers communicate with one another, they exchange data messages To accept and act on these messages, computers must have definitions of how a message is defined and what it means
Examples of messages include establishing a connection to a remote machine, sending or receiving e-mail, and transferring files and data
Trang 10428 Chapter 8: Routing Fundamentals and Subnets
A protocol describes
■ The format that a message must take
■ The way in which computers must exchange a message within the context of a particular activity, such as sending messages across networks
Because of the similarity of a routed/routable protocol versus a routing protocol, confusion over these terms often exists The following provides some clarification:
its network layer address to allow a packet to be forwarded from one host to another host based on the addressing scheme Routed protocols define the field formats within a packet Packets are generally conveyed from end system to end system A routed protocol uses the routing table to forward packets Examples of routed or routable protocols are shown in the routing table in Figure 8-1 They include the following:
— Internet Protocol (IP)
— Internetwork Packet Exchange (IPX)
— AppleTalk
Figure 8-1 Routed/Routable Protocols
Token Ring
Token Ring
Novell Apple Routing Tables
IPX 3a.0800.5678.12ab
IP 15.16.50.3
AppleTalk 100.110
IP 15.16.42.8
IP 15.17.132.6 AppleTalk 200.167