13 hours 57 minutes
Hello and welcome back to icy new one. Interconnecting Cisco networking devices apart. One accepts of 4 to 2 classical network concepts.
I will be Triton, dear. Oh, and I will be restricted for this course.
In this last video, we went over the lesson 4.2 overview
It just sort of recovering the different concepts in class for not working.
First, we're going to a classical network of you. We're gonna look at the different ranges, different classes, and we added a few extras that we didn't go over previously.
Ah, Then we will look at the reserved in private network ranges. Then lastly, we're gonna determine usable and non usable eyepiece. Any strange,
quick pre assessment here,
you should go back to the sub knitting Review. What would the block size B for a sub net that needs 39 usable I. P's? And how many host bits would be used
give you a few seconds?
All right, it is
64 6 because, remember, I'm gonna go ahead and draw out my fancy lord shirt that I always do here.
39. Okay, 60 fours. And when I can go in here.
So we got a 64 blocks, eyes with six bits.
All right, so back in the class is here. We're gonna just
It really is is a lot of information. Look at just take it one board at a time.
Um, it's a good one. A screenshot if you want to, uh,
you know, keep it on hands. Just a reference to your class. A range is gonna be one
000 through 1 26 years is you think that is the network I d. That is not your usable space. So if you think 1002 through 1 26 start to identified a certified at 2 35
That's actually your full peace. But this we were just looking at your network. I d for now,
because this is a slash eight for your cider, which means you have eight in our beds and 24 host bits.
And the default subnet mask is to 55 000
and we'll show you how to get that to 55 later on. Because we're also gonna go into how to get a 2 48 to 24
and other ones like that.
Class B 1 28 to 1 91 to 55 00
16,000 networks. 65,000 addresses per host.
This one's a slash 16. So it's split between 60 network reds and 16 host pits.
It's a twofer defied to be tried at 00 the default mask.
Class C. This is the one that you kind of always see with your home networks. It always starts with 1921681.0 or zero doubt. Zero sum like that. Um, those ones are always sitting in that room.
So he goes all the way to to 23 to be divided to be divided to zero Sorry.
22 for device.
so that when I should still treat their two million networks 256 address for network slash 24. And that's where you always see the normal default mass that you generally see in a home network.
So we're gonna class A D.
And this is where you get into your multi cast addresses, right? You're gonna see that if one when we have you stick around for the actual I. Sandy. To course, you'll see this a lot.
This is where you see routing advertisements. You'll see a few other things, but there's like, specific addresses to where think of the device is tuned into that address, right?
So they're sitting there, they'll tune into 2 24 0.6
so we'll be waiting for a
destination i p address of that,
uh, P And there's, you know, certain devices that are on that multicast range
then classy is just reserve range. Doesn't use that. Used to be experimental. Now it's just ridden deserved.
so here we're gonna You're probably thinking, OK, there's some gaps. You know, you're looking at 1 27 0.0
Uh, that one's missing. You know, you're missing a few others. You missing the
There's a gap in the class B one as well. That starts with 1 69 to 54.
And here they are. So now we're gonna look at the RSC 1918 addresses the private addresses. So here's your 10 dot network. You're 17 to 16. Network
1 91 68.0 to 0
when we're done here, I want you to figure out how this slash 12 on 1 17 16 0 to 0 works.
Why? It's like how the sub networks for that one figure out
how many number of bizarre, how many sudden that bits, How many Hello, Spitz
and why does it go from that 16 to 160.31 to divide up to 55
So when we never know, uh, not usable I p address of.
So these last three bullets here are non usable,
so we'll accept things started next. Two bullets zeros through 2 55 Those are just not usable. So when you have your 1 27 slash eight
arrange, that is going to use for your loop back addresses for your local host. So you always see the T shirts and bumper stickers and everything else that say there's no place like 1 27 00 that is your blue back and dress for your computer.
So if you do a ping to 1 27 a 00 what that does, is it contest your I P stack, it will go, you know, make sure that it's actually working,
and then you also have a 1 69 to 54. That 1 69 to Betty Ford out. Too petrified to defy slash 16.
Um, that is your link. Local addresses for I P. Before
there's that might just be gibberish for you right now.
Um, so what that actually is is it's a self assigned I p address. So if your computer is not statically, assign an I p address by you
or by organization. And let's say it can't reach the D. A. C P server keeps reaching out and reaching out. Eventually it's gonna give up. It's not going to say, OK, we can't reach the h e p. I'm gonna use this $169 to fight for network.
Um, and it's all the computers will use this. So let's say you throw five computers on a switch and none of them have d h e p. None of them are statically assigned that all still bill to communicate because they'll all have this built in address range that they can use.
It's kind of cool.
All right, so it gets into You guys saw me in the past where I kept saying, OK, we're gonna need to minus two off the block size for usable eyepiece. Why do we do this? Well, the first I p address in that range is your network idea. This is what identifies that network. We talked a little bit about that earlier.
Um, and then the last address in that block is your network broadcasts address.
So that's when you mind sure to cause those ones aren't usable by your host devices. Right?
So if we look at a example here, 17 to 16 10 slash 24
means that last octet is gonna be used for hosting for host bits.
The network idea is gonna be 0.0 the used by pieces one through 2 54
And the broadcast has just got to 55. Says simple. Is that
all right? So it's a quick practice year. Break out the pen and paper
we're gonna look at with that starting network. The 1 91 6800 slash 16.
So break that up between sudden it and host bits are
the network and host bits is just
us. Each one has 16 currently.
And then we're gonna go ahead and subdivide that network into these four sub nets.
So just start at the beginning and just work your way through.
Use variable ink, sudden it massively use each one. Have a used the most efficient mask are appropriate mask that you can for each, I guess, department.
And then what? I'm gonna have you do it. Also, write out the network i d
for the group. That one should be
Ah, right out the broadcast, I pee and then write out that usable range for each subject.
Now, go ahead and pause the video and do it real quick.
All right, so we're gonna go ahead and write this down here.
We get my penance.
All right? I want to make sure that you guys do this, right.
So Stroh are handy My Aunt Edie and Little Chart. I don't know if you got you, but I d'oh
because I like it makes it easy for me.
All right, so let's do I t up here. So you have sub nets Network and host
network iss slash 16. Host,
we have 129 devices. So that iss gonna be down here.
123456788 on host
32 minus 81 16 is gonna leave us with eight on the sub net,
we will do 192.168 Dutch 0.0 through. I'm just just gonna shorthand this year. Zero
with a broadcast.
55. So usable will actually be zeroed out to 54.
I don't know what my pen keeps doing. That was
so let's look att
sub net network
And we have 16 here. So 62 devices, we can actually go here.
to leave us 10 on the
So we have a block size of 64
so we'll do a shorthand again. So do
you get 1.0 through
And these all if you look at them, the next largest is gonna be 64 for both of them.
So I'm just gonna shorthand both of these here.
We got 1.64 through
and one. That's 1 28 through 1 91
And remember, the usable is gonna be 1 29 through 1 90
and usable for this is gonna be 63.
65 through 1 26
and usable for here is gonna be one through 62.
Hopefully, all that scribbling
makes sense for you guys.
Really? It's It's the same thing we've been doing. Except for know that the beginning addresses your network idea in that last address. In the range is your broadcast address.
And then everything in between is reducible I p range.
So let's go ahead and step into the post assessment here. What would be broadcast address be for this? I p
give me a few seconds toe. Figure it out there.
All right, so I'm gonna draw out my chart because I always do.
Before 8 16 32 64 1 28 to 36. There shouldn't be any need to go higher,
so it's like it's sudden it's network
I always break it down. So the next lowest is gonna be 16.
That leaves us with seven sub nets and nine hosts.
So if you look, uh, let's look at host first. So 12345678
5 12 will be nine.
So we have a 512 block space.
So's draws out here. We got 11 about 65. Since that's not changing.
one thing you always want, remember is, um,
you're gonna end on an odd number, right?
So if we think about
00 so if we started from the beginning, is your zero that one dot
2 55? Because this range here,
well, give us 512 addresses.
And so then we go with
zero through 3 to 55
and really continues down, too.
11 65 Dutch
20 to 0
23 to 55.
So which one is that? This guy, or are we gonna have just an actual green thing around it?
All right, so if you do that doesn't understand that. Please use
this website. You please use time levels website. Um,
practice with us. Your guy did. I don't know how much practice I did it. One of the work.
Don't tell my employer that,
you you have to learn this for this test. This is and I'm not kidding. Anyway, the next episode we're gonna convert decimal binary again, and we're gonna learn about the sub net masks.
As always, if you guys have questions, need help. Feel free to shoot me. Message. Otherwise, thank you for watching this episode, and I look forward to seeing you next winter.
This course will enable students to understand virtualization and cloud services, and network programmability related to LAN, access and core segments.