Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back, Siskel Certified Design associate Macho eight Lights an 8.2 on your instructor way
00:08
In the previous video, we talked about I p v for header. From this video, we will begin to introduce a TV for addressing and a seven Eights
00:18
pre assessment question. What is the benefit of the using B r S m A. To save a waste of the ikey address, be to expand a 78 C to improve the performance by reducing motive, test on broadcast trafficking or network the to simplify the crowding domain.
00:37
The answer will be a to save our wasted I p address.
00:42
Here is the topic of what disgust
00:46
my TV For address type
00:49
TV. Foreign dresses can also be classified in one of these three types unit costs
00:56
broadcasts on the Mahdi cost.
00:59
Ah, you know, because the ideas re president a single interface off the hosts PC rotter server They can be a source or destination. Ikey addresses
01:10
Ah broadcast addresses a destination Nike address. That is a sight to all other devices in the given address range. No, Marie is a center. All devices in a sudden it ah multi cussed address as a destination ikey address. Send it to a specific set of a host.
01:29
This table some right is I t address types
01:37
by TV for private addresses,
01:40
some that members within the ITV four address space are reserved for private use. These numbers are not rotted on the Internet, so there's no way to reach them over an Internet connection. Many organizations today use the private eye addresses in their internal networks with net access. The Internet
01:59
net is covered in later in the following slights.
02:02
Private addresses are explaining. RFC 1918 address. Ah, location for private Internets population in 1996. Private addresses are one of the first steps in dealing with the concern that it globally unique i p v for addresses space would become exhausted.
02:23
The availability of a private addresses
02:25
combined with the night reduces the need for organizations to carefully defy some dates. To minimize the waste of assign her. Blake Global Ikey addresses
02:37
the 80 network addresses That space reserved for private Internet is 10 slash eight was $72.16 slash 12 on the 1 $92.68 slash 16 a includes a one cross eight network 16 costs beat networks on a 256 class to see networks.
02:57
This table summarizes private addresses space.
03:00
Large organizations can use a network of $10 0 Does your does your oh spot eight Tow Asari addresses face throughout. The enterprise meets eyes. Organizations can use one of the cost. Be private and networks 1 72 That's $16 year old 07 16
03:17
through 1 $72.31 dollars. 006 to 16
03:22
for i Ke addresses. The smaller classes see addresses, which begin with 1 92 that was 6 to 8, can be used aboard by corporations that are commonly used. The home Rodders
03:36
net. That device is a convert. Ikey addresses space into globally unique AKI addresses. Net was originally specified by RFC 16 30 War. The currently specifications is our after C 30 22. It is common for companies to using that
03:55
to translate internal private addresses,
03:58
too. Popular guy dresses on the vice versa, although it can also translate public I P addresses to public cocky addresses. The translation can be performing many private addresses to a single public address or from the many private ikey addresses to a range of a public I P addresses.
04:16
When that performs a Manny to one translation.
04:20
The process is called a port address. Translation packed because different import numbers identified translations as joining this diagram, The source address for outgoing I P packets are converted into globally unique ikey address.
04:38
The conversion can be configured a status Scully, or it can dynamically use a global pool addresses.
04:46
Now it has a several performance static and net maps. The unregistered or private i P address to register Ikey Address eighties were configured it manually. It is commonly used it to assign. And that road device with internal private ikey address unique a public address
05:02
so that it can be accessed from the Internet
05:05
that I'm a unit that chemically maps on registered or private ikey. Address to a registered charity address from a pool group of register addresses. The two stuff says of the dynamic and net are overloading on overlapping overloading
05:19
maps multiple and registered or private I P addresses to a single registered ikey address by using different reports.
05:28
This is also known as pat Single address net or port level multiplex. The net over. Lackey maps register internal ikey addresses out outside registered ikey addresses. It can also map external I P addresses to internal registered addresses. When designing for net,
05:46
you should understand the foley and terminology
05:48
septum in the internal network that might be using private ikey addresses. Public a network outside of the stuff domain reciting the Internet addresses in a public. A network can be reached from the Internet inside. Local Address the real ikey address of the device that recites in the internal network.
06:08
This address is used in the sub domain
06:11
inside a Crow boyars, the translated ikey aggressively device that recites in a internal network. These addresses using the public network outside Grow boyars, the Rial i p. Address off a device that reciting the Internet outside Up Stop domain.
06:29
Also a local address, the translated i. P. Address of the device that recites in the the Internet. These addresses used the inside of the stuff that may.
06:39
This diagram illustrates the terms described in the list, right? The real I P address of the host in a stop networks of 1 92 Wessex Ada, $10 rendered. It is the inside local address
06:53
than that rotter translates the inside. A local address into the inside Global address told $200. We're headed out $10.100 hosts the located in the Internet have there a real I. P address. I once had a global address
07:05
translated right in the example 30. That 100 out to Dr D is translated into the outside local address of 1 92 6 850
07:19
I. T. V for some dates,
07:21
some hiding place and the important part in I P. Before I visit the Subnet mask helps determine the network some network on a host of part of a Nike address. The network architect. He uses a sudden knighting to manipulated a default mask to create a sudden networks for Lana, where second it's
07:40
these sub networks have provided enough address for lance off different sizes.
07:45
Point point one links usually get on Sunday may ask that I lost for only two hosts because only two rodders are present in the point of 20.0.1 link. You should become a familiar with determining some network and numbers. Broadcast the addresses on host address range is given an I P address in the mask.
08:03
Some of the masses are used for Class A, B and C addresses on Lee
08:07
Motor cast addresses do now use the Sunday masks. A 70 mask is a 30 to beat the number in which bits are set to one to identify the network. A portion of the address and a zero is the host apart. Off the address,
08:22
the masses bit sad to one. Our continues on the left a portion of the mask
08:28
the bids and said that zero R continues on the right portion of the mask.
08:33
This table shows the default mascot for a cost. A B, as he addresses this section, addresses there's a waste to re present some night. The Basques. Understanding these ways is a significantly because understanding these ways is sticking to make. And because of the rig presentation of a network on a mask,
08:54
can the pure, differently assistant documentation or on the command interface is right?
09:00
There are several ways to present ikey Sunday mask. The masses can be battery hatch, desi Modotti decimal or a prefix bit mask. Historically, the most a commentary presentation was the Dalai the Decimal, from 255 $255.155 0.
09:18
The prefix bid may ask. A format is now more popular.
09:22
This format re presents a masked by using a slash, followed by the number off leading address bits that must be said What for the mask. It is also referred to as costless Inter Damian Rotting Cmdr Critics don't ation right. For example,
09:37
255 $255 You're zero is ripped present as the forward slash 16.
09:43
This table shows most of the mastery presentations. The slash 24 Basque is common land. Second, it's the slash 30 mask is common for 1.2 point links on a slash 32 is used of a rotter. Lou bag addresses
10:01
bearable live subnet mask. Very planted something master via Ressam's Divide a network into some nights of bears, all sizes to prevent wasting our key addresses
10:13
across the sea. Never uses a tooth are fired. 255255 to 40 as a subnet mask. 16. Some nights are available each way. The 14 Archy addresses they've appointed Point and Lincoln needs on Lee to I P addresses to all the I P addresses are wasted.
10:30
This problem scales further with the Cisco Crosby and costs a address two spaces with the V R S m
10:35
Small as can use this last one ace on that with the 14 hosts on. The larger letters can use a slash 23 its last 22 masks with the 529 and a 1000 and 22 hosts, respectively. Pointed Point that works, He uses up Slash
10:54
Dirty masked witches Supports to host.
10:56
There isn't a one way to subdivide a network, so there is no single correct a way to create a seven. It's the best practices, the divided large, not networks into smaller. Some days that can't be a scientist. Sights further divided each insights into smaller something. It's for data wipe a wireless land and other Sunday it's
11:16
to be used. The insight. Let Venus
11:18
furthermore, one and the point of point links. Roger as switchback addresses are I located Ikey some nights
11:26
learning check Question number one company wants the use of Private I P addresses. Oh, it's internal hosts which technology you can company use to provide access to the Internet. Using this thing. Single public ikey addresses a static and net be source rotting a c L D pat.
11:46
It will be deep half
11:48
question number two. Which key address can be routed across the public Internet?
11:52
A $10.31 does is one No. One. Be 1 92 168 32 That one see us 70 to 30 to one No. One.
12:03
The 1 69 to 54 32. I don't want LBC 1 70 to 30 to one. No. One
12:11
in today's briefing lecturer with disgust, I p V for addressing on some nights
12:16
any questions if you free to contact me, otherwise I'll see you in the next video bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor