EtherExpress is a trademark of Intel Corporation.EtherLink II is a registered trademark of 3Com Corporation.. Netscape Communicator and Netscape FastTrack are trademarks of Netscape Comm
Trang 1This document should only be used by a Novell-certified instructor.
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 2)
C O U R S E 1 4 0 0
Volume 2
100-004506-001 Revision 1.0
Trang 2Proprietary Statement
Copyright © Novell, Inc 1999 All rights reserved
No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc
Further, Novell, Inc reserves the right to revise this publication and to make changes
in its content at any time, without obligation to notify any person or entity of such revisions or changes
Further, Novell, Inc makes no representations or warranties with respect to any NetWare software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose
Further, Novell, Inc reserves the right to make changes to any and all parts of NetWare software at any time, without obligation to notify any person or entity of such changes
This Novell Training Manual is published solely to instruct students in the use of Novell networking software Although third-party application software packages are used in Novell training courses, this is for demonstration purposes only and shall not constitute an endorsement of any of these software applications
Further, Novell, Inc does not represent itself as having any particular expertise in these application software packages and any use by students of the same shall be done at the students’ own risk
Trang 3Novell, Inc has attempted to supply trademark information about company names, products, and services mentioned in this manual The following list of trademarks was derived from various sources.
Novell, Inc.
NetWare, the N-Design, and Novell are registered trademarks of Novell, Inc in the United States and other countries The NetWare Logotype (teeth logo) is a trademark of Novell, Inc.
Application Launcher is a trademark of Novell, Inc.
AppNotes is a trademark of Novell, Inc.
BorderManager is a trademark of Novell, Inc.
Certified Novell Administrator, Certified Novell Engineer, and CNA are service marks
of Novell, Inc
Client 32 is a trademark of Novell, Inc.
CNA (Certified Novell Administrator) and CNI (Certified Novell Instructor) are service marks of Novell, Inc CNE is a registered service mark of Novell, Inc in the United States and other countries Master CNE is a trademark of Novell, Inc.
ConsoleOne is a trademark of Novell, Inc.
GroupWise is a registered trademark of Novell, Inc in the United States and other countries.
Hot Fix is a trademark of Novell, Inc.
Internetwork Packet Exchange and IPX are trademarks of Novell, Inc.
intraNetWare Client is a trademark of Novell, Inc
IntranetWare Client is a trademark of Novell, Inc
IPX and IPX/SPX are trademarks of Novell, Inc.
LANalyzer is a registered trademark of Novell, Inc in the United States and other countries LANalyzer Agent is a trademark of Novell, Inc.
Link Support Layer and LSL are trademarks of Novell, Inc.
ManageWise is a registered trademark of Novell, Inc in the United States.
Multiple-Link Interface Driver and MLID are trademarks of Novell, Inc.
NDPS is a registered trademark of Novell, Inc in the United States and other countries Novell Distributed Print Services is a trademark of Novell, Inc.
NE1000 and NE2000 are trademarks of Novell, Inc.
NEAP (Novell Education Academic Partner) is a service mark of Novell, Inc NetSync is a trademark of Novell, Inc.
NetWare 2, NetWare 3, NetWare 3.12, NetWare 4, NetWare 5, and NetWare/IP are trademarks of Novell, Inc
Trang 4NetWare Application Manager is a trademark of Novell, Inc.
NetWare Core Protocol and NCP are trademarks of Novell, Inc.
NetWare DOS Requester is a trademark of Novell, Inc.
NetWare Expert is a trademark of Novell, Inc.
NetWare Link Services Protocol and NLSP are trademarks of Novell, Inc NetWare Loadable Module and NLM are trademarks of Novell, Inc.
NetWare Management Agent is a trademark of Novell, Inc.
NetWare Management Map is a trademark of Novell, Inc.
NetWare MultiProtocol Router (MPR) is a trademark of Novell, Inc.
NetWare Name Service is a trademark of Novell, Inc.
NetWare Peripheral Architecture is a trademark of Novell, Inc.
NetWire is a registered service mark of Novell, Inc
Novell Application Launcher is a trademark of Novell, Inc.
Novell Authorized Education Center and NAEC are service marks of Novell, Inc Novell Client is a trademark of Novell, Inc.
Novell Directory Services is a registered trademark of Novell, Inc NDS is a trademark of Novell, Inc.
Novell Labs is a trademark of Novell, Inc.
Novell Network Registry is a service mark of Novell, Inc.
Novell Press is a trademark of Novell, Inc in the United States.
Novell Storage Services is a trademark of Novell, Inc.
Novell Support Connection is a trademark of Novell, Inc.
Novell Technical Services is a service mark of Novell, Inc.
Novell Technical Support is a service mark of Novell, Inc.
Open Data-Link Interface and ODI are trademarks of Novell, Inc.
Packet Burst is a trademark of Novell, Inc.
Remote Console is a trademark of Novell, Inc.
RX-Net and RX-Net/2 are trademarks of Novell, Inc.
Sequenced Packet Exchange and SPX are trademarks of Novell, Inc.
Trang 5VLM is a trademark of Novell, Inc.
Z.E.N.works is a trademark of Novell, Inc.
Other Trademarks
286, 386, and 486 are trademarks of Intel Corporation.
386Max is a registered trademark of Qualitas Corporation.
3Com is a registered trademark of 3Com Corporation.
3M is a registered trademark of Minnesota Mining and Manufacturing Company Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated Adaptec is a registered trademark of Adaptec, Inc.
Advanced Peer-to-Peer Networking is a registered trademark of International Business Machines Corporation.
AltaVista is a trademark of Digital Equipment Corporation.
America Online is a registered service mark of America Online, Inc.
AMP is a registered trademark of AMP, Inc.
Apple, AppleShare, AppleTalk, EtherTalk, LocalTalk, and TokenTalk are registered trademarks of Apple Computer, Inc
ARCnet is a registered trademark of Datapoint Corporation.
AT is a registered trademark of International Business Machines Corporation AT&T is a registered trademark of AT&T Corporation.
ATM is a registered trademark of Adobe Systems Incorporated.
AUSTPAC is a registered trademark of Telstra Corporation.
AutoCAD is a registered trademark of AutoDESK, Inc.
Castelle is a registered trademark of Silicon Valley Bank.
CheckIT is a registered trademark of Touchstone Software Corporation.
Compaq is a registered trademark of Compaq Computer Corporation.
CompuServe is a registered trademark of CompuServe Incorporated.
Corporate Systems Center is a trademark of Computer Performance, Inc.
Datapac is a registered trademark of BCE, Inc.
DATASHOW is a registered trademark of Sayett Technology, Inc.
DEC, DECnet, and LAT are trademarks of Digital Equipment Corporation.
Digital Equipment Corporation is a registered trademark of Digital Equipment Corporation.
DR DOS is a registered trademark of Caldera, Inc in the United States and other countries.
DynaText is a registered trademark of Electronic Book Technologies, Inc
Trang 6EtherExpress is a trademark of Intel Corporation.
EtherLink II is a registered trademark of 3Com Corporation.
GTE is a registered trademark of GTE Corporation.
Hewlett Packard and HP are registered trademarks of Hewlett-Packard Company IBM and IBM-AT are registered trademarks of International Business Machines Corporation XT is a trademark of International Business Machines Corporation IBM is a registered trademark of International Business Machines Corporation Infinite Technologies is a registered trademark of Infinite Technologies, Inc Intel is a registered trademark of Intel Corporation Intel386 and Intel486 are trademarks of Intel Corporation.
Java is a registered trademark of Sun Microsystems, Inc in the United States and other countries.
JavaSoft is a registered trademark of Sun Microsystmes, Inc.
JetDirect and LaserJet are registered trademarks of Hewlett-Packard Company JetPress and LANPress are registered trademarks of Silicon Valley Bank.
JetXPrint is a registered trademark of Digital Products, Inc.
KDD is a registered trademark of KDD Network Systems Co., Ltd.
LANdecoder is a trademark of Infoseek Corporation.
LANDesk is a registered trademark of Intel Corporation.
LANSchool is a registered trademark of Lan Fan Technologies.
LaserJet is a registered trademark of Hewlett-Packard Company
Macintosh is a registered trademark of Apple Computer, Inc.
Micro Channel is a registered trademark of International Business Machines Corporation.
Micro House Technical Library is a trademark of Micro House International, Inc Microdyne is a trademark of Microdyne Corporation.
Micropolis is a registered trademark of Micropolis Corporation.
Microsoft and MS-DOS are registered trademarks of Microsoft Corporation NEC is a registered trademark of NEC Corporation.
NetBasic is a registered trademark of High Technology SoftWare Corporation NetDirector is a registered trademark of UB Networks.
Trang 7Communications Corporation Netscape Communicator and Netscape FastTrack are trademarks of Netscape Communications Corporation.
NetView is a registered trademark of International Business Machines Corporation Network Driver Interface Specification and NDIS are trademarks of PC Plus Communications LP
NTT is a registered trademark of Nippon Telegraph and Telephone Corporation Ontrack Data Recovery is a trademark of Ontrack Data International, Inc.
OpenView is a registered trademark of Hewlett-Packard Company.
OS/2 is a registered trademark of International Business Machines Corporation Pentium is a registered trademark of Intel Corporation.
Persuasion is a registered trademark of Adobe Systems Incorporated.
PhoneNet is a registered trademark of Farallon Computing, Inc.
PostScript is a registered trademark of Adobe Systems Incorporated
PowerPC is a trademark of International Business Machines Corporation.
PS/2 is a registered trademark of International Business Machines Corporation PSS is a registered trademark of British Telecom.
QEMM is a registered trademark and QEMM386 is a trademark of Quarterdeck Office Systems.
Quantum is a registered trademark of Quantum Corporation.
SCSI Express is a registered trademark of Security Control Systems, Inc.
Seagate is a registered trademark of Seagate Technology, Inc.
SideKick is a registered trademark of Borland International, Inc.
SMC is a registered trademark of Standard Microsystems Corporation.
Sniffer is a trademark of Network General Corporation.
Software Shopper is a registered trademark of Falsoft, Inc.
SprintNet is a restered trademark of Sprint Communications Company L.P Stacker is a registered trademark of Stac Electronics.
Sun Microsystems is a registered trademark of Sun Microsystems, Inc.
SunNet Manager is a trademark of Sun Microsystems, Inc.
Support Group is a trademark of Support Group, Inc.
System 7 is a trademark of Apple Computer, Inc.
Total Recall is a registered trademark of Total Recall, Inc.
Transpac is a registered trademark of France Telecom Transpac.
TrueType is a registered trademark of Apple Computer, Inc.
Tymnet is a registered trademark of MCI Telecommunications Corporation.
Trang 8UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd
UnixWare is a registered trademark of The Santa Cruz Operation, Inc in the US and other countries.
Windows and Windows NT are registered trademarks of Microsoft Corporation.Windows 95 and Windows 98 are trademarks of Microsoft Corporation WordPerfect is a registered trademark of Corel Corporation Limited in the US and other countries.
Xerox is a registered trademark of Xerox Corporation.
Yahoo! is a trademark of Yahoo!, Inc.
All other products not listed are the property of their respective owners.
Trang 9Revision 1.0 This document should only be used by a Novell-certified instructor IG TOC-ix
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Contents
TCP/IP Fundamentals IG 7-3Objectives IG 7-3Exercise 7-1: Pre-Test IG 7-5Describe the IP Address Structure IG 7-9Identify Network Classes IG 7-15Address Types IG 7-17Special IP Addresses IG 7-21Exercise 7-2: Binary to Decimal Conversion and Address
Classes IG 7-23Obtain a Registered IP Address IG 7-25The Role of InterNIC IG 7-25How to Contact IP Registries IG 7-27Managing Your Registered IP Addresses IG 7-29Register a Domain Name IG 7-31Applying for a Domain Name in the U.S IG 7-37Applying for a Domain Name Outside the US IG 7-39Assign Addresses to Hosts IG 7-39Addresses for Private Networks IG 7-39Describe How Host Names, Host Tables, and DNS Work IG 7-41Host Tables IG 7-41DNS Zones IG 7-43Describe Windows Internet Name Services (WINS) IG 7-57Describe How Ports are Used IG 7-59Port Numbers Commonly Assigned to Services IG 7-59Explain the Purpose of Subnets IG 7-61Define a Subnet Mask IG 7-65Creating the Subnet Address from the Subnet Mask IG 7-69Describe How Subnet Masks are Used IG 7-71Example 1: GAMES Unlimited IG 7-75Example 2: BJC Corporation IG 7-79Using Partial Bytes or Octets IG 7-81Example 3: Software, Inc IG 7-87
Trang 10The Novell Guide to Network + (Volume 1)
Assign Subnet Addresses IG 7-89Plan for Growth IG 7-91Understand Subnets Using an Example IG 7-97Exercise 7-3: Assigning and Managing IP Subnets IG 7-109Exercise 7-4: Establishing Subnets IG 7-115Exercise 7-5: Planning your IP Network IG 7-119Exercise 7-6: Planning Your Network IG 7-121Exercise 7-7: Post-Test IG 7-125Summary IG 7-135
The TCP/IP Protocol Suite and Utilities IG 8-3Objectives IG 8-3Exercise 8-1: Pretest IG 8-5Identify the Components of the TCP/IP Protocol Suite as They
Relate to the OSI and DoD Models IG 8-9Routing IP IG 8-15Describe Distance Vector Routing with IP IG 8-19Disadvantages of RIP and Distance Vector Routing IG 8-21RIP II IG 8-29Describe Link State Routing with IP IG 8-31Open Shortest Path First (OSPF) IG 8-31OSPF Compared to RIP IG 8-49Exercise 8-2: Reviewing IP Routing IG 8-51List the Protocols That Comprise TCP/IP IG 8-55Internet Layer Protocols IG 8-55Internet Protocol (IP) IG 8-57Internet Control Message Protocol (ICMP) IG 8-59The Address Resolution Protocols: ARP and RARP or
BOOTP IG 8-65Dynamic Host Configuration Protocol (DHCP) IG 8-71Host-to-Host Layer Protocol IG 8-75Process/Application Layer Protocol IG 8-79
Trang 11Revision 1.0 This document should only be used by a Novell-certified instructor IG TOC-xi
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Describe the IPX/SPX Protocol Suite and the OSI Reference Model IG 8-101Purpose of IPX/SPX IG 8-103IPX Network Address Elements IG 8-105Internetwork Packet Exchange Protocol (IPX) IG 8-109Sequenced Packet Exchange Protocol (SPX) IG 8-111Describe Routing with RIP/SAP IG 8-113Distance Vector Routing: IPX RIP and SAP IG 8-113Router Information Protocol (RIP) IG 8-113Service Advertising Protocol (SAP) IG 8-117Describe the Utilities Used in a Windows NT Network IG 8-125NetBEUI Protocol IG 8-125NWLink IPX/SPX Protocol IG 8-127Additional Protocols Included with Windows NT IG 8-129Exercise 8-3: Post-Test IG 8-131Summary IG 8-135
Implementing the Network IG 9-3Objectives IG 9-3Exercise 9-1: Pre-Test IG 9-5Plan the Network and Install the Network Cabling IG 9-7Plan the Network IG 9-7Install Network Cabling IG 9-9Crimping Network Cables IG 9-9Exercise 9-2: Installing Network Cabling IG 9-13Install and Configure Network Interface Boards IG 9-17Choosing the Board IG 9-19Understanding PC Architectures IG 9-19Identifying Configuration Information IG 9-31Configuring the Network Board with Jumpers and DIP
Switches IG 9-41Installing the Board IG 9-45Configuring the Network Board with Software IG 9-45Configuring Plug-n-Play Network Boards IG 9-51Connecting to the Network IG 9-53Exercise 9-3: Installing a 10BASE-T Ethernet Connection IG 9-55
Trang 12The Novell Guide to Network + (Volume 1)
Install and Configure Hard Disk Drives IG 9-59Disk Interface Types IG 9-59Hard Disk Tips IG 9-63Installing SCSI Hard Disks IG 9-65Physically Installing the SCSI Disk IG 9-67Exercise 9-4: Installing SCSI Hard Disks IG 9-81Installing IDE Hard Disks IG 9-85Step 1 Configuring and Installing the Controller Board IG 9-85Step 2 Configuring and Installing the IDE Disk IG 9-87Step 3 Attaching Disk Cables IG 9-89Step 4 Setting the CMOS Disk Type IG 9-89Step 5 Completing Controller Board and IDE Disk
Configuration IG 9-93Exercise 9-5: Installing IDE Hard Disks IG 9-95Prepare Hard Disks for Use IG 9-99Creating Partitions IG 9-99Performing High-Level Formatting IG 9-103Tips for Formatting Hard Disks IG 9-103Exercise 9-6: Preparing Hard Disks for Use IG 9-105Install Workstation Operating Systems IG 9-107Exercise 9-7: Installing Windows 98 IG 9-109Install Network Client Software IG 9-113Types of Client Software IG 9-113Loading Client Software and Protocols IG 9-115Configuring Client Software and Protocols IG 9-119Exercise 9-8: Configuring Client Software and Protocols IG 9-121Exercise 9-9: Post-Test IG 9-123Summary IG 9-127
Security IG 10-3Objectives IG 10-3Exercise 10-1: Pre-Test IG 10-5
Trang 13Revision 1.0 This document should only be used by a Novell-certified instructor IG TOC-xiii
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
List the Elements of Secure Password and User Account Policies IG 10-11Implementing a Password Security Policy IG 10-13Implementing a User Account Security Policy IG 10-15Describe How Encryption Works IG 10-19Encryption Schemes IG 10-19Digital Signatures IG 10-23Describe How Firewalls Work IG 10-25Filtering by IP Address IG 10-25Filtering by Port Number IG 10-25Describe How Proxy Servers Work IG 10-27Exercise 10-2: Post-Test IG 10-29Summary IG 10-35
Implementing Remote Connectivity IG 11-3Objectives IG 11-3Exercise 11-1: Pre-Test IG 11-5Explain the Capabilities and Requirements for Remote
Access IG 11-7Network Services Available Anywhere IG 11-7Limitations IG 11-9Implementing Remote Access IG 11-11Evaluate the Current Network and User Environment IG 11-11Selecting the Best Physical Server Locations IG 11-13Determining Users and Services IG 11-13Select an Appropriate Data Transmission Technology IG 11-15ISDN IG 11-15POTS IG 11-15xDSL IG 11-17Selecting an Appropriate Data Transmission Technology IG 11-19Design a Secure Remote Access Solution IG 11-21Determining an Organizational Security Policy IG 11-21Determining a Network Security Policy IG 11-23Determining a Data-Level Security Policy IG 11-23Isolating a Remote Access Server IG 11-25Special Security Concerns IG 11-27
Trang 14The Novell Guide to Network + (Volume 1)
Design Optimal Performance in a Remote Access Solution IG 11-27Maximizing Client Performance IG 11-27Maximizing Server Performance IG 11-31Configure Windows 95/98 or Windows NT clients for remote
access IG 11-31Tasks to Configure a Remote Access Windows Client IG 11-33Exercise 11-2: Configuring Windows Workstations for Remote
Access IG 11-35Connect Remotely to a Server Using a Modem-Equipped
Windows Client IG 11-49Connecting a Remote Client IG 11-49Exercise 11-3: Making a Remote Connection IG 11-51Exercise 11-4: Post-Test IG 11-55Summary IG 11-59
Maintaining the Network IG 12-3Objectives IG 12-3Exercise 12-1: Pre-Test IG 12-5Choose a Backup Strategy IG 12-7Time Requirements for Completing a Backup IG 12-9Time Requirements for Restoring a Backup IG 12-13Assigning Backup Responsibility IG 12-15Exercise 12-2: Choosing a Backup Strategy IG 12-17Describe Strategies for Anti-Virus Protection IG 12-19Types of Viruses IG 12-19Characteristics of Virus Infection IG 12-19Preventing Virus Infection IG 12-21Describe Uninterruptible Power Supplies (UPS) IG 12-23Three Types of UPSs IG 12-23Advantages of a UPS IG 12-25Explain RAID and Define Each of its Levels IG 12-27Determining the Appropriate RAID Level IG 12-29
Trang 15Revision 1.0 This document should only be used by a Novell-certified instructor IG TOC-xv
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Describe Disaster Recovery Options IG 12-41Planning for a Disaster IG 12-41Recovering from a Disaster IG 12-41Exercise 12-3: Post-Test IG 12-47Summary IG 12-51
Troubleshooting the Network IG 13-3Objectives IG 13-3Exercise 13-1: Pre-Test IG 13-5List and Describe Tasks Related to Providing Service and
Support on a Network IG 13-7Describe the Six-Step Troubleshooting Model Used in this
Course IG 13-9Step One: Try a Quick Fix IG 13-11Step Two: Gather Basic Information IG 13-15Step Three: Develop a Plan to Isolate the Problem IG 13-15Step Four: Execute the Plan IG 13-17Step Five: Ensure User Satisfaction IG 13-19Step Six: Document the Solution and Take Steps to Avoid
or Prepare for Recurrence IG 13-19Describe Record-Keeping Practices IG 13-21Components of the LAN System IG 13-21History of the LAN IG 13-23Resources Used with the LAN IG 13-25Exercise 13-2: Understanding the Basic Principles of Service
and Support IG 13-27Troubleshoot Network and Workstation Problems IG 13-29Using Troubleshooting Tools IG 13-29Describe the Tools that Are Commonly Used to Resolve
Network Equipment Problems IG 13-45Crossover cable IG 13-45Hardware Loopback IG 13-47Tone Generator IG 13-47Tone Locator (Fox and Hound) IG 13-47Documentation Sources IG 13-49
Trang 16The Novell Guide to Network + (Volume 1)
Exercise 13-3: Troubleshooting Skills Practice IG 13-51Exercise 13-4: Post-Test IG 13-53Summary IG 13-57
Trang 17TCP/IP Fundamentals
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-1
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Trang 18The Novell Guide to Network + (Volume 2)
0
0
SECTION 7 TCP/IP Fundamentals
In this section you learn how to obtain a registered IP address and domain name You also learn the function of host names, host tables, the Domain Name System (DNS), WINS and subnets
Objectives
Upon completing this section, you should be able to
1 Describe the IP address structure
2 Identify network classes
3 Obtain a registered IP address
4 Register a domain name
5 Assign addresses to hosts
6 Describe how host names, host tables, and DNS work
7 Describe Windows Internet Name Services (WINS)
8 Describe how ports are used
9 Explain the purpose of subnets
10 Define a subnet mask
11 Describe how subnet masks are used
12 Assign subnet addresses
Trang 19TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-3
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
TCP/IP Fundamentals
Objectives
❑ Introduce the section.
❑ Present the section
objectives.
Trang 20The Novell Guide to Network + (Volume 2)
1 How many bits compose an IPv4 address?
2 What is the function of a host table?
a It registers host names
b It registers domain names
c It maintains IP routing information
d It resolves host names to IP addresses
3 What does every node on the DNS tree represent?
Trang 21TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-5
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Exercise 7-1: Pre-Test
❑ Introduce the exercise.
:10a Conduct the exercise. Assist students as necessary
Trang 22The Novell Guide to Network + (Volume 2)
0
0
7 What is the function of DNS?
a It registers Internet domain names
b It resolves domain names to IP addresses
c It builds and maintains domain routing tables
d It dynamically assigns IP addresses to network hosts
8 Why might a network administrator create subnets? (Choose three.)
a To improve security
b To simplify routing
c To reduce congestion
d To provide full-duplex communication
e To increase the number of hosts on the network
(End of Exercise)
Trang 23TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-7
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Exercise 7-1: Pre-Test
(continued)
❑ Review the exercise and
discuss the answers.
6 ARIN, RIPE, APNIC, InterNIC
7 b It resolves domain names to IP addresses
8 a To improve security
b To reduce conjestion
e To increase the number of hosts on the network
Trang 24The Novell Guide to Network + (Volume 2)
The IP address of a host consists of four bytes divided into two parts:
■ A network address (varying from one to three bytes)
■ A node or station address (varying from one to three bytes)
Figure 7-1: TCP/IP Addressing
• Four bytes long
• Identify IP network and node
• First byte determines class
Trang 25TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-9
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Describe the IP Address
Trang 26The Novell Guide to Network + (Volume 2)
0
0
In the previous figure, an IP network has been assigned the network address of 132.132 Its network address uniquely identifies it from all other networks on the internetwork
Each host or node on this network must have an IP address of the form 132.132.x.x, where the last two bytes of the address must be unique on the network A node assigned the last two octets of 87.176 is uniquely identified on the internetwork by its address, 132.132.87.176
Each byte of a node address falls in the range of 0 to 255, but 0 and 255 are usually not used in addressing because not all systems support a node address of 0, and 255 is reserved for broadcast packets
In the previous figure, the top node has been assigned a node address
of 87.176, so its complete IP address is 132.132.87.176
IP addresses take the form of a dotted octet; that is, each byte (8 bits in
an octet) is separated by a dot
In binary format, an IP address is as follows, with each x representing a binary bit with the value of 0 or 1
Figure 7-2: Four Bytes of an IP Address
A complete IP address in binary format would look like this:
10101100.00010000.00000100.00000010When you convert the binary bits to decimal numbers, an IP address takes a readable form
Converting the example results in the IP address 172.16.4.2
One easy way to convert from binary to decimal numbers is to create a binary table with columns for each power of 2 with their decimal equivalent (see the following table)
Correspond each of the eight bits in a byte to a column, and add the decimal values for each bit with a value of 1 in a single row
Byte 4 Byte 3
Byte 1 Byte 2
xxxxxxxx
Trang 27TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-11
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Describe the IP Address
Trang 28The Novell Guide to Network + (Volume 2)
0
0
The result is the decimal equivalent of the byte
b For more on IP address structure, access the INDEX.HTM file from the
ANIMATIONS folder on your course CD and select IP Addressing
Trang 29TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-13
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Describe the IP Address
Trang 30The Novell Guide to Network + (Volume 2)
0
0
Identify Network Classes
Five address classes exist in the IP addressing scheme — classes A through E
Figure 7-3: Address Classes A through E
Classes A through C can be assigned; classes D and E are reserved for specific uses and are not assigned to hosts
Your network class determines how the four byte IP address is divided between network and node portions
1 - 127 Class A
128 - 191 Class B
192 - 223 Class C
Trang 31TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-15
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Identify Network Classes
❑ Discuss network classes.
d 7-3 (Figure 7-3: Address
Classes A through E)
Trang 32The Novell Guide to Network + (Volume 2)
Following is a brief explanation of address types:
■ Class A Addresses In a class A address, the first byte is in the 0 to
127 range and also identifies the network; the final three bytes identify the node The first bit must be zero
There are 126 possible class A networks, each having up to 16,777,216 hosts Virtually all class A addresses have been assigned
■ Class B Addresses In a class B address, the first byte is in the 128
to 191 range (the first two bits of the first byte are 1 and 0) In class
B addresses, the first two bytes identify the network and the last two bytes identify the node on the network
There are 16,384 possible class B networks Each class B network can have up to 65,534 hosts Relatively few class B addresses remain available
xxxxxxxx xxxxxxxx
11110xxx . xxxxxxxx . .
xxxxxxxx xxxxxxxx
1110xxxx xxxxxxxx
Class A
Multicast Class D
xxxxxxxx xxxxxxxx
110xxxxx . xxxxxxxx . .
Class C
Reserved Experimental Class E
Trang 33TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-17
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Identify Network Classes
(continued)
Address Types
❑ Continue discussing
network classes.
d 7-4 (Figure 7-4: Binary Digits
(Bits) Which Identify Network
Class)
❑ Discuss address types.
Trang 34The Novell Guide to Network + (Volume 2)
0
0
■ Class C Addresses In a class C address, the first byte is in the
192 to 223 range (the first three bits of the first byte are 1, 1, and 0)
In class C addresses, the first three bytes identify the network and the last byte identifies the node
There are 2,097,152 possible class C networks Each class C network can have up to 255 hosts
Organizations that request a registered class B address can receive one or more class C addresses instead IPv6 is expected to be available before all class C addresses are exhausted
■ Class D Addresses In a class D address, the first byte is in the
224 to 239 range (the first four bits of the first byte are 1, 1, 1, and 0)
Class D addresses are used for multicast packets Multicast packets are used by a host to transmit messages to a specified group of hosts on the network Multicasts packets are typically exchanged between routers only
■ Class E Addresses In a class E address, the first byte is in the 240
to 255 range (the first five bits of the byte are 1,1,1,1, and 0)
Class E addresses are reserved for experimental use and potential future addressing modes Class E addresses are typically used for broadcasts
One particular class E address, 255.255.255.255, is used to identify
a broadcast message A broadcast message is one that is transmitted to every host on the network
When the destination IP address is 255.255.255.255, the message
is directed to all hosts on the network from which the broadcast originated Routers do not typically forward broadcast messages to other networks
x Make sure you can identify Classes A through E
Trang 35TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-19
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
❑ Continue discussing
address types.
Trang 36The Novell Guide to Network + (Volume 2)
Network 0.0.0.0 Refers to the default route This route is used to
simplify routing tables used by IP
Note: On some older (BSD4.2) networks the 0.0.0.0 address is used for broadcasts
Network 127.0.0.0 Reserved for loopback The address 127.0.0.1
often is used to refer to the local host
Using this address, applications can address a local host as if it were a remote host without relying on configuration information
Address with all network bits set to 0
Refers to a host on “this” network For example, 0.0.0.34 would address node 34 on the local class A network
Address with all host bits set to 0
Refers to the network For example, the address 145.67.0.0 can be used to refer to network 145.67 This notation is used within routing tables Network or node
address with all bits set to 1
Refers to all networks or hosts
255.255.255.255 Refers to a limited broadcast meant for hosts on
this network only
Table 7-2: Special IP Addresses
Trang 37TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-21
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Special IP Addresses
❑ Discuss special IP
addresses.
Trang 38The Novell Guide to Network + (Volume 2)
1 Complete the following tables:
2 Convert the following to binary format and identify the address class:
a 128.10.2.30 Class
b 201.45.87.129 _Class
2 5 (32)
2 4 (16)
2 3 (8)
2 2 (4)
2 1 (2)
2 0 (1)
Decimal Equivalent
10000001 1 0 0 0 0 0 0 1 128+1
=12911100000
00011110
Decimal 2 7
(128)
2 6 (64)
2 5 (32)
2 4 (16)
2 3 (8)
2 2 (4)
2 1 (2)
2 0 (1)
Binary Equivalent
128 1 0 0 0 0 0 0 0 1000000010
21
147.19.23.14198.23.19.42120.0.0.1
Trang 39TCP/IP Fundamentals
Notes Presentation
Revision 1.0 This document should only be used by a Novell-certified instructor IG 7-23
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Exercise 7-2: Binary to
Decimal Conversion and
Address Classes
❑ Introduce the exercise.
:05a Conduct the exercise. Assist students as necessary
❑ Review the exercise and
discuss the answers.
a [100000000].[00001010].[00000010].[00011110]; Class B
b [11001001].[00101101].[01010111].[10000001]; Class C
c [00001111].[00000010].[00011110].[00110010]; Class A
3
147.19.23.14 B198.23.19.42 C120.0.0.1 A
Trang 40The Novell Guide to Network + (Volume 2)
Figure 7-5: Obtaining an IP Address
You can use unregistered IP addresses in an intranet that is restricted to private network use However, if you connect your intranet to the
Internet, you must obtain registered IP addresses valid for public use.However, feature of Novell BorderManager® is the Network Address Translator (NAT), which lets you use any IP address on your private network NAT translates private addresses into valid, registered IP addresses before forwarding packets to the Internet
The Role of InterNIC
InterNIC, also known as Network Solutions, Inc (NSI), has been responsible for assigning IP addresses InterNIC has traditionally assigned large blocks of IP addresses to primary Internet service providers (ISPs) In 1996, InterNIC assigned IP addresses to approximately 300 ISPs
These primary ISPs assign or sub-allocate portions of the IP addresses
to smaller, downstream ISPs These smaller ISPs provide most users with registered IP addresses for hosts on a network
The Internet