Classful Ranges and Remote Addressing

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 49 minutes
Difficulty
Beginner
CEU/CPE
10
Video Transcription
00:05
just a quick review,
00:07
he said. Keep in mind that even though when we look at our classical addresses and we say Okay
00:12
for class A address for the sub net mask 255.0 point 0.0 Our system reads on a binary
00:20
so 255.0 point 0.0 is the first octet entirely set to one,
00:27
and the remainder is set to zero.
00:29
For that reason, you have eight bit set to one.
00:32
Sometimes this address is referenced as slash eight.
00:36
That slashing number is going to tell you how many bits are set to one of the sub net masks.
00:41
So when we go to Class B that has 255.255 point 0.0.
00:47
The first two octaves, or 16 bits, is set to one.
00:51
That's where you get your slash 16
00:53
classy address. You have the 1st 24 bits at 21
00:57
so that's where you get your slash 24.
01:00
If you keep that in mind, we have a couple more things to talk about, like default address ranges before we can expand upon that and talk about classical ranges
01:10
as I mentioned earlier. Subject mask. It's worthless without an I P address
01:15
and an I P address is worthless without a sub net mask.
01:18
We always want that sub net mask.
01:21
Any time I say what's a subject mask?
01:23
You should be able to go to a system, do an IP config and see the mask that's being used.
01:29
However, if you are unable to find a sub net mask for particular address, there's some assumptions you can make.
01:34
Now remember, an assumption isn't a cold, hard fact that wins out in every case.
01:40
If you're given a sub net mask that will always trump this default.
01:44
But if you're not giving a subnet mask, look at the first auction of the I. P address.
01:49
At that first octet falls in the range of 1 to 1 26.
01:53
Then you consider it to be a class a address with slash eight sub Net mask or 255.0
02:01
It's the first octet falls in the range of 1 28 to 1 91 assumes Class B.
02:07
If you notice. When I turned, 27 was skipped,
02:10
127 is reserved for a troubleshooting and testing tool called the Loop Back.
02:15
So it's not a mistake.
02:17
It really is. 1 to 126 for a and 120 to 191 for B.
02:24
If the first ox it falls in the range of 1 90 to 2 to 23
02:30
that's a classy with a 24 bit mask.
02:35
There are also Class D and D sub net masks.
02:38
Class D is used for multicasting,
02:39
where I send a message out to multiple systems.
02:43
Sometimes this is done through videoconferencing or imaging computers.
02:47
You'll see less about multicasting in this class.
02:51
No, you're ranges of I P addresses. Be able to look at an I p address and say, That's class B. That's classy.
02:58
But be flexible enough to know that if you're given a different mask,
03:00
that's always going to be the one you go with.
03:04
The question becomes, Why is all of this so important?
03:07
Why do we really care about the network ID versus the host ID and so on?
03:13
What we have to do is be able to determine whether or not traffic is local or remote.
03:19
So let's say I'm on a sub net and I'm an on client host whose I P address is 10.1 point 1.1.
03:25
If you go back to a chart, you'll know that if the first octet falls in the value of 1 to 126 that's Class A.
03:34
So we'll use class A sub net mask here.
03:37
I've got some other hosts on the network that all have a Class A sub net mask, and they're all in the 10 Network.
03:43
If I want to ping 10.1 point 1.10
03:46
and you look at the second illustration, you'll see that what happens is my system will evaluate the addressing. I'm trying to reach and determine if it's all my network or remote network
03:58
by looking at I P addresses of my destination and the sub net mask. My client system says that that's on the same network as me.
04:05
So it moves immediately to sending out an Air P broadcast which says, Hey, whose I P addresses this.
04:12
The computer, 10.1 point 1.10, comes back and says, That's me and here's my Mac address.
04:18
So if the traffic is determined to be local, and the client system sends out an therapy broadcast.
04:28
But what about if the traffic is remote
04:30
going back to the scenario where I'm at a computer? 10.1 point 1.1 with a Class A mask? I paying 172.16 point 1.1?
04:42
That's not a local address, so an era P broadcast isn't going to help me.
04:46
What do I need to do? In that case,
04:48
I need to send that traffic to a router.
04:50
Another word for a router is a default gateway.
04:54
Your default gateway is where you send traffic that's not in your local network.
04:59
You need that router to redirect the traffic to the right network.
05:02
In this case, because of the fact the traffic is not local goes to my default gateway,
05:08
which you can see in the middle of my screen. I've used the I P Command.
05:13
At the very least, it's going to show you my address, my sub net mask and who My default Gateway is
05:18
the client, because it looks at the I. P address based on the mask, says this isn't local
05:24
and then knows to send the traffic to the router.
05:27
Assuming the router is properly configured, the router is able to pass the traffic onto the destination.
05:32
So it's important to understand those ideas because if you're taking the test and you can paying a local host,
05:39
you're just trying to connect locally,
05:41
then the default gateway doesn't matter, and you never use the default gateway if you're just communicating locally.
05:47
If you're trying to communicate remotely, you have to make sure that you have your router properly configured.
05:53
Remember, your router should always be on the same network that you're on.
05:57
Otherwise, you need a router. You get to your router,
06:00
so I think you'll probably see some sort of trouble shooting issues where you can't connect locally. Then you can't connect remotely enough to try and isolate what the problem is.
06:10
Also mentioned. Tools
06:12
I. P. Conflict is good to see and remember that if you're online X or UNIX,
06:16
maybe the remote host are trying to get as far away enough through a series of routers.
06:20
Don't forget the tools Trace route with UNIX and tracer it with windows.
06:26
Those are the tools that will show you it goes throughout our A B or C. So those are handy tools we can use
06:33
just wrapping up this section.
06:34
We've talked about I p addresses and the fact that an I P address is divided into a network ID and a host.
06:43
The way you know that is your sub net mask.
06:45
We've looked at default classical add dressing like Class A, B and C addresses.
06:50
So anything whose first octet has fallen between one and 126 we can assume his class to a
06:57
anything between 128 and 191 is Class B,
07:01
and 190 to 2 to 23 is classy.
07:05
And of course, remember the sub net masks
07:09
A is 255.0
07:12
be 255.255 point 00
07:15
and see
07:16
255.255 point 255.0.
07:21
A lot to remember from this section,
07:25
and we also talked about why that significance That way we can tell if traffic is local. Remote
07:30
traffic is local was sent on an era P broadcast
07:33
traffic is remote. That traffic goes to our local router and perhaps out through the Internet.
07:39
This is really critical for the exam.
07:42
But even beyond that for your life as a network technician,
07:46
I'm going to really encourage you to go back and watch this again. If this is new to you,
07:49
make sure you're really solid on those key principles because we're going to take this piece and build on it in the next section.
Up Next