This Chapter Discusses The Following Advanced IP .

2y ago
29 Views
2 Downloads
1.06 MB
88 Pages
Last View : 4d ago
Last Download : 3m ago
Upload by : Sabrina Baez
Transcription

146xx01.book Page 2 Thursday, March 18, 2004 9:57 AMThis chapter discusses the following advanced IP addressing topics: IP Address PlanningHierarchical Addressing Using Variable-Length Subnet MasksRoute SummarizationClassless Interdomain RoutingNetwork Address TranslationUnderstanding IP Version 6

146xx01.book Page 3 Thursday, March 18, 2004 9:57 AMCHAPTER1Advanced IP AddressingScalable, well-behaved networks are not accidental; they are the result of good networkdesign and effective implementation planning. A key element for effective scalable networkimplementation is a well-conceived and scalable IP addressing plan. The purpose of ascalable IP addressing plan is to maximize the amount of IP address space available indeployed networks (this address space is shrinking) and to minimize the size of routingtables.As a network grows, the number of subnets and the volume of network addresses requiredincrease proportionally. Without advanced IP addressing techniques such as summarizationand classless interdomain routing (CIDR), the size of the routing tables increases, whichcauses a variety of problems. For example, networks require more CPU resources torespond to each topology change in the larger routing tables. In addition, larger routingtables can cause delays while the CPU sorts and searches for a match to a destinationaddress. Both of these problems are solved by summarization and CIDR.To effectively use summarization and CIDR to control the size of routing tables, networkadministrators employ other advanced IP addressing techniques such as Network AddressTranslation (NAT) and variable-length subnet masking (VLSM).NAT allows the use of a private addressing space within an organization while usingglobally unique addresses for routing across the Internet and between independentdivisions of the organization. Different address pools may be used to track groups of users,which makes it easier to manage interconnectivity.VLSM allows the network administrator to subnet a previously subnetted address to makethe best use of the available address space.Another long-standing problem that network administrators must overcome is theexhaustion of available IP addresses caused by the increase in Internet use. Although thecurrent solution is to use NAT, the long-term solution is to migrate from the IP version 4(IPv4) 32-bit address space to the IP version 6 (IPv6) 128-bit address space. Gaining insightinto IPv6 functionality and deployment will prove valuable for network administrators inthe not-too-distant future.

146xx01.book Page 4 Thursday, March 18, 2004 9:57 AM4Chapter 1: Advanced IP AddressingAfter completing this chapter, you will be able to describe the concepts of network designand explain the benefits and characteristics of an effective scalable IP addressing plan.You will also be able to describe the role of VLSM addressing in a scalable network andcalculate VLSM addresses for a network. You will be able to demonstrate the principles ofroute summarization and CIDR by summarizing a given range of network addresses intolarger IP address blocks. You will also be able to configure NAT for multiple address poolsusing access lists and route maps. Finally, you will be able to describe the features andbenefits of using IPv6.IP Address PlanningA well-designed large-scale internetwork with an effective IP addressing plan has manybenefits. It is scalable, flexible, predictable, and can reduce the routing table size throughsummarization.Scalable Network DesignAn understanding of scalable network design concepts is imperative for understanding properIP address planning.Corporate organizational structure should affect network design. The structure of a scalablenetwork design reflects a corporation’s information flow and is called a hierarchical networkdesign.There are two types of hierarchical network design: functional and geographic.NOTEThe design concepts discussed in this section are only a very small part of good network designfrom the perspective of the IP addressing plan. For a full discussion of internetwork design, referto CCDA Self-Study: Designing for Cisco Internetwork Solutions (DESGN) (Cisco Press, 2003).Functional Structured DesignSome corporations have independent divisions that are responsible for their own operations,including networking. These divisions interact with one another and share resources; however,each division has an independent chain of command.This type of corporate structure is reflected in a functional network design, as illustrated inFigure 1-1. In this example, the different divisions of the corporation have their own networksand are connected according to their functional purpose within the corporate structure. Thenetwork architecture can follow the corporate organizational chart.

146xx01.book Page 5 Thursday, March 18, 2004 9:57 AMIP Address PlanningFigure 1-15In a Functional Design, Networks Are Connected According to Their Functional PurposePickupsBusesDECSportsCarsFBAVroom, KSportsUtility VehiclesTractorsGeographic Structured DesignMany retail corporations are organized by the geographic location of their stores. Within thecorporate structure, each local retail store reports to a district consolidation point. These districtconsolidation points report to regional consolidation points; the regional consolidation pointsthen report to corporate headquarters. Networks are organized along geographic boundaries,such as countries, states, or provinces.This type of corporate structure is reflected in a geographic network design, as illustrated inFigure 1-2. In this example, the divisions of the corporation have their own networks and areconnected according to their location.Figure 1-2In a Geographic Design, Networks Are Connected According to Their LocationVAPADCNYOHEFLFBNJALDeep DiscountPharmacy, Inc.AGRetail DiscountDrugstore ChainNTXHMITNLINKWAJAZCAIL

146xx01.book Page 6 Thursday, March 18, 2004 9:57 AM6Chapter 1: Advanced IP AddressingNOTEFrom a networking point of view, a geographic network structure is cost-effective becausefewer network links require long-haul carriers, often a considerable added expense.Hierarchical LayersWithin the functional or geographic networks, the following three primary layer elements areinvolved in a hierarchical scalable network design: Access layer—Provides local and remote workgroup, end-user, and customer access to thenetwork. Virtual LANs (VLANs), firewalls, and access lists maintain security for this layer. Distribution layer—Provides policy-based connectivity and is the consolidation pointfor access layer devices and corporate services. Host services required by multiple accesslayer devices are assigned to this layer. Core (or backbone) layer—Provides high-speed transport to satisfy the connectivity andtransport needs of the distribution layer devices. The circuits with the fastest bandwidthare in the core layer of the network. Redundancy occurs more frequently at this layer thanat the other layers.There are many different ways of designing these hierarchical layers. Some of the considerationsare identified in this section.Fully Meshed Core LayerThe core layer is designed to provide quick and efficient access to headquarters and otherdivisions within a company. Because the core is usually critical to the network, redundancy isoften found in this layer. In a fully meshed core layer design, shown in Figure 1-3, each divisionhas redundant routers at the core layer. The core sites are fully meshed, meaning that all routershave direct connections to all other routers. This connectivity allows the network to reactquickly when it must route data flow from a downed link to another path.Figure 1-3In a Fully Meshed Core, All Routers Are Connected to All Other nGMIJLKDivisionFDivisionEDivisionD

146xx01.book Page 7 Thursday, March 18, 2004 9:57 AMIP Address Planning7For a small core with a limited number of divisions, this core layer design provides robustconnectivity. However, a fully meshed core layer design is very expensive for a corporation withmany divisions.NOTEThe number of links in a full mesh is n(n – 1)/2, where n is the number of routers. As the numberof routers increases, the cost of full-mesh connectivity might become prohibitive.Hub-and-Spoke Core LayerAs a network grows, fully meshing all the core routers can become difficult. At that point,consolidation into geographically separate data centers might be appropriate. For example, inmany companies, data travels to a centralized headquarters where the corporate databases andnetwork services reside. To reflect this corporate centralization, the core layer hub-and-spokeconfiguration establishes a focal point for the data flow at a key site. The hub-and-spoke design,illustrated in Figure 1-4, supports the traffic flow through the corporation.Figure 1-4In a Hub-and-Spoke Core, Each Division Is Connected Only to the DivisionGDivisionDMIJLKDivisionFNOTEDivisionEA partial-mesh design is also possible, including some nodes connected in a full mesh and someconnected in hub-and-spoke fashion.Access and Distribution LayersRemote sites are points of entry to the network for end users and customers. Within the network,remote sites gain access to network services through the access layer. The distribution layerconsolidates the services and devices that the access layer needs to process the activity that isgenerated by the remote sites. Figure 1-5 illustrates this process.

146xx01.book Page 8 Thursday, March 18, 2004 9:57 AM8Chapter 1: Advanced IP AddressingFigure 1-5The Distribution Layer Consolidates Access Layer ConnectivityDistributionLayerCore 7R6BAFrame yR8R9Access LayerR10R11R12R13R14Access LayerNOTEFrame Relay, shown in Figure 1-5, is a WAN access protocol commonly used to interconnectgeographically dispersed sites.Services should be placed in the distribution layer when there is no benefit to having duplicatedservices at the remote sites. These services may include Dynamic Host Configuration Protocol(DHCP), Domain Name System (DNS), human resources, and accounting servers. One ormore distribution layers can connect to each entry point at the core layer.You can fully mesh connectivity between remote sites at the access layer. However, using a huband-spoke configuration by connecting remote sites to at least two distribution layer devicesprovides redundancy and is relatively easy to administer.Benefits of a Good Network DesignAn effective network design accommodates unexpected growth and quick changes in thecorporate environment. The network design can be adapted to accommodate mergers with othercompanies, corporate restructuring, and downsizing with minimal impact on the portions of thenetwork that do not change.The following are characteristics of a good IP addressing plan implemented in a well-designednetwork: Scalability—A well-designed network allows for significant increases in the number ofsupported sites.

146xx01.book Page 9 Thursday, March 18, 2004 9:57 AMIP Address Planning Predictability—A well-designed network exhibits predictable behavior andperformance. Flexibility—A well-designed network minimizes the impact of additions, changes,or removals within the network.9These characteristics are described further in the following sections.Scalability of a Good Network DesignPrivate addresses are reserved IPv4 addresses to be used only internally within a company’snetwork. These private addresses are not to be used on the Internet, so they must be mapped toa company’s external registered address when you send anything to a recipient on the Internet.Key Point: IPv4 Private AddressesRFC 1918, Address Allocation for Private Internets (available at www.cis.ohio-state.edu/cgi-bin/rfc/rfc1918.html), has set aside the following IPv4 address space for private use:— Class A network—10.0.0.0 to 10.255.255.255— Class B network—172.16.0.0 to 172.31.255.255— Class C network—192.168.0.0 to 192.168.255.255NOTEThe examples in this book use only private addressing.The current proliferation of corporate mergers emphasizes the design issues inherent in privateIPv4 addressing. For example, if two companies merge, and both use network 10.0.0.0addresses, there will likely be some overlapping addressing space.A scalable network that integrates private addressing with a good IP addressing plan minimizesthe impact of additions or reorganizations of divisions to a network. A scalable network allowscompanies that merge to connect at the core layer. Implementing NAT on routers allows thenetwork administrator to translate overlapping network numbers to an unused address space asa temporary solution. Then, the overlapping network numbers can be changed on the devicesand/or on the DHCP server in the network.Good network design also facilitates the process of adding routers to an existing network. Forexample, in Figure 1-6, two companies have merged. Both companies were using network10.0.0.0 for addressing. One correct way to merge the two networks would be as follows: Attach routers P and Q in the new domain to the other routers in the core layer of thenetwork (routers A, D, J, K, X, and Y).

146xx01.book Page 10 Thursday, March 18, 2004 9:57 AM10Chapter 1: Advanced IP AddressingFigure 1-6 Configure NAT on routers P and Q to change the IP address space of the new companyfrom network 10.0.0.0 to network 172.16.0.0. Change the DHCP servers to reflect the newly assigned address space in the new network.Remove NAT from routers P and Q.A Good IP Addressing Design Minimizes the Impact of Merging NetworksPSNewDivisionYQXRAKDBJELGCMFHNOIDivision AlphaDivision BetaPredictability of a Good Network DesignThe behavior of a scalable network is predictable.Packets load-balance across the internetwork if equal-cost paths exist between any tworouters in the internetwork. When a circuit or router fails, an alternative equal-cost path tothe destination that exists in every routing table can be used, without any recalculation. Thisalternative path reduces convergence times and route recalculation to typically less than1 second after the failed circuit or router is discovered.Depending on the routing protocol used, the equal cost is determined based on hop count and/or bandwidth. For example, if the Routing Information Protocol (RIP) is used in the networkshown in Figure 1-6, the routing table for router C will have two best paths to X: threehops through B and three hops through E. Routers B and E each have two best paths to thenetworks behind router X: Both have two hops through either routers A or D. If router D fails,routers B and E do not need to discover alternative routes because the preferred route existsin the routing table. Thus, if router D fails, the routes to X in router C’s routing table do notchange.

146xx01.book Page 11 Thursday, March 18, 2004 9:57 AMIP Address Planning11If a routing protocol that uses bandwidth in its calculation is used (for example, InteriorGateway Routing Protocol [IGRP]), the bandwidth should be configured equally on allinterfaces within a layer at each site. For example, in Figure 1-6, routers B and E areconsolidation points for the access layer routers (G, C, and F in the example). Routers C,B, and E all have the same bandwidth configured on the links that connect them so that loadbalancing can be used.The paths between routers B and E and routers A and D need larger-bandwidth pipes toconsolidate the traffic between corporate divisions. Because routers A and D consolidatemultiple distribution points for a division, the connections for these routers to other divisionsin the company need the largest bandwidth.The result is a predictable traffic pattern. This level of network behavior predictability is a directbenefit of a scalable network design.Flexibility of a Good Network DesignA scalable network also needs to be flexible. For example, corporate reorganizations can haveminimal impact on the rest of the network when implemented in a scalable network. In thesample network shown in Figure 1-6, assume that Frame Relay is used at the remote sites andthat Division Beta is sold and merged with another company, except for remote site H, whichbecomes part of Division Alpha.The network administrator in this sample network could accommodate the corporate reorganizationwith the following process: Install two additional virtual circuits from router H to routers B and E. Remove the circuits from routers J and K to the other core routers A, D, X, and Y (and Pand Q if they are connected). Change the user addresses for router H to the Division Alpha block of addresses.Following a successful installation, remove the virtual circuits to routers M and L.Perform NAT on the router H interfaces to routers B and E to use the address space ofDivision Alpha.Benefits of an Optimized IP Addressing PlanAn optimized IP addressing plan uses hierarchical addressing.Perhaps the best-known addressing hierarchy is the telephone network. The telephone networkuses a hierarchical numbering scheme that includes country codes, area codes, and localexchange numbers. For example, if you are in San Jose, California, and you call someone elsein San Jose, you dial the San Jose local exchange number, 528, and the person’s four digitnumber. Upon seeing the number 528, the central office recognizes that the destinationtelephone is within its area, so it looks up the four digit number and transfers the call.

146xx01.book Page 12 Thursday, March 18, 2004 9:57 AM12Chapter 1: Advanced IP AddressingNOTEIn many places in North America now, the area code must also be dialed for local calls. This isbecause of changes in the use of specific digits for area codes and local exchange numbers. Thetelephone network is suffering from address exhaustion , just like the IP network. Changes inhow telephone numbers are used is one solution being implemented to solve this problem.In another example (see Figure 1-7), to call Aunt Judy in Alexandria, Virginia, from San Jose,you dial 1, and then the area code 703, and then the Alexandria prefix 555, and then Aunt Judy’slocal number, 1212. The central office first sees the number 1, indicating a remote call, and thenlooks up the number 703. The central office immediately routes the call to a central office inAlexandria. The San Jose central office does not know exactly where 555-1212 is in Alexandria,nor does it have to. It needs to know only the area codes, which summarize the local telephonenumbers within an area.Figure 1-7The Telephone Network Uses an Addressing HierarchyLong (Remote)DistancePath to 1(A numberindicatesdestinationis remote.)LocalOfficeLong DistanceVirginiaPath to 555Path to 703(An area codesummarizes anarea in Virginia.)Local OfficeAlexandria(A prefixsummarizesa smaller areain Virginia.)Path to 1212(Number)CaliforniaNOTEAunt JudyAs you might have noticed, the telephone number used in this example is the number forinternational directory assistance; it is used for illustration purposes to ensure that Aunt Judy’spersonal number is not published.If there were no hierarchical structure, every central office would need to have every telephonenumber worldwide in its locator table. Instead, the central offices have summary numbers, suchas area codes and country codes. A summary number (address) represents a group of numbers.For example, an area code such as 408 is a summary number for the San Jose area. In otherwords, if you dial 1-408 from anywhere in the U.S. or Canada, followed by a seven-digittelephone number, the central office routes the call to a San Jose central office. Similarly, arouted network can employ a hierarchical addressing scheme to take advantage of those samebenefits.

146xx01.book Page 13 Thursday, March 18, 2004 9:57 AMIP Address Planning13Here a

Scalable, well-behaved networks are not accidental; they are the result of good network design and effective implementation planning. A key element for effective scalable network implementation is a well-conceived and scalable IP addressing plan. The purpose of a scalable IP addressing plan i

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Part One: Heir of Ash Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 .

TO KILL A MOCKINGBIRD. Contents Dedication Epigraph Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Part Two Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18. Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26