• Tidak ada hasil yang ditemukan

Day 1 session 2 IP Addressing IPV4 IPV6

N/A
N/A
Protected

Academic year: 2017

Membagikan "Day 1 session 2 IP Addressing IPV4 IPV6"

Copied!
29
0
0

Teks penuh

(1)

CommTech Training Center

IP Address Version 4

(IPV4)

Periyadi, M.T.

2

Binary Information Group Representations and

Terms

Number of Bits Common Representation Terms

1 Bit / Digit / Flag

4 Nybble / Nibble

8 Byte / Octet / Character

16 Double Byte / Word

32 Double Word / Long Word

64 Very Long Word

(2)

4

Biner

Desimal

•Diselesaikan dengan menjumlahkan dari perkalian bilangan biner dengan

eksponen dari basis terhadap bobot yang dihitung dari LSB ke MSB.

•Perhatikan notasi posisional masing-masing digit.

5

Biner

Desimal

100111011 2

1 0 0 1 1 1 0 1 1

28 27 26 25 24 23 22 21 20

= (1x28) + (0x27) + (0x26) + (1x25) + (1x24) + (1x23) + (0x22) + (1x21) + (1x20) = 256 + 32 + 16 + 8 + 2 + 1

= 315

Sehingga: 1001110112= 31510

6

IP Addressing

•IP addressing is important because it facilitates the primary function of the

Internet Protocol—the delivery of datagrams across an internetwork

•The first point that bears making is that there are actually two different

functions of the IP address:

•Network Interface Identification: Like a street address, the IP address provides unique

identification of the interface between a device and the network. This is required to ensure that the datagram is delivered to the correct recipients.

•Routing: When the source and destination of an IP datagram are not on the same

et o k, the datag a ust e deli e ed i di e tl usi g i te ediate s ste s, a

(3)

7

IP Address Size and Binary Notation

•the IP address is just a 32-bit binary number: a set of 32 ones or zeroes

8

Original Definition Of IPv4

Type Of Service (TOS)

Field

Subfield Name Size (bytes) Description

Precedence (3 bits)3/8

D (1 bit)1/8 Delay:delay delivery is requested.Set to 0 to request “normal” delay in delivery; set to 1 if low

T (1 bit)1/8 Throughput:if higher throughput delivery is requested.Set to 0 to request “normal” delivery throughput; set to 1

R (1 bit)1/8 Reliability:higher reliability delivery is requested.Set to 0 to request “normal” reliability in delivery; set to 1 if

Reserved (2 bits)2/8 Reserved:Not used.

•IP addresses are normally expressed with each octet of 8 bits converted to a

de i al u e a d the o tets sepa ated a pe iod a dot .

•W.X.Y.Z

•Each of the octets in an IP address can take on the values from 0 to 255

•Since the IP address is 32 bits wide, this provides us with a theoretical address

space of 232, or 4,294,967,296 addresses.

(4)

•Network Identifier (Network ID): A certain number of bits, starting from the left-most bit, is used to identify the network where the host or other network interface is located. This is also sometimes called the network prefix or even just the prefix.

•Host Identifier (Host ID): The remainder of the bits are used to identify the host

on the network.

Internet IP Address Structure

Location of the Division Between Network ID and

Host ID

•Co e tio al Classful Add essi g : The o igi al IP add essi g s he e is set up so that the di idi g li e o u s o l i one of a few locations: on octet boundaries

•“u etted Classful Add essi g : I the su et add essi g s ste , the t o-tier network/host division of the IP address is made into a three-tier system by taking some number of bits from a class A, B or C host ID and using them for a subnet identifier. The network ID is unchanged. The subnet ID is used for routing within the different subnetworks that constitute a complete network, providing extra flexibility for administrators. For example, consider a class C address that normally uses the first 24 bits for the network ID and remaining 8 bits for the host ID. The host ID can be split into, say, 3 bits for a subnet ID and 5 for the host ID.

•Classless Addressing : In the classless system, the classes of the original IP addressing scheme are tossed out the window. The division between the network ID and host ID can occur at an arbitrary point, not just on octet boundaries like in the

lassful s he e.

•IP Address Adjuncts: Subnet Mask and Default Gateway

•As ou a see, i the o igi al lassful s he e the di isio et ee et o k ID a d host ID is i plied. Ho e e , if eithe lassless add essi g is used, the the su et ask o slash u e a e e ui ed to full ualif the add ess. These u e ssubnetting or are considered

adju ts to the IP add ess a d usuall e tio ed i the sa e eath as the add ess itself, e ause ithout the , it is ot possible to know where the network ID ends and the host ID begins.

•One other number that is often specified along with the IP address for a device is the default gateway identifier. In simplest terms, this is the IP address of the router that provides default routing functions for a particular device. When a device on an IP network wants to send a datagram to a device it can't see on its local IP network, it sends it to the default gateway which takes care of routing functions. Without this, each IP device would also have to have knowledge of routing functions and routes, which would be inefficient. See the sections on routing concepts and TCP/IP routing protocols for more information.

(5)

•There are two ways that a host can be multihomed:

•Two Or More Interfaces To The Same Network: Devices such as servers or

high-powered workstations may be equipped with two physical interfaces to the same network for performance and/or reliability reasons. They will have two IP addresses on the same network with the same network ID.

•Interfaces To Two Or More Different Networks: Devices may have multiple

interfaces to different networks. The IP addresses will typically have different network IDs in them.

Number of IP Addresses and Multihoming

Multihomed Devices On An IP Internetwork

IP Address Class Fraction of Total IP Address Space Number Of Network ID Bits Number Of Host ID Bits Intended Use

Class A 1/2 8 24

Unicast addressing for very large organizations with hundreds of thousands or millions of hosts to connect

to the Internet.

Class B 1/4 16 16

Unicast addressing for medium-to-large organizations with many hundreds to thousands of hosts to connect to the

Internet.

Class C 1/8 24 8

Unicast addressing for smaller organizations with

no more than about 250 hosts to connect to the

Internet.

Class D 1/16 n/a n/a IP multicasting.

Class E 1/16 n/a n/a Reserved for “experimental

(6)

IP "Classful" Addressing Network and Host

Identification and Address Ranges

Simulasi Perhitungan IP Address Classfull

IP Address ClassFirst Octet of IP Address Lowest Value of

First Octet (binary)

Highest Value of First Octet

(binary) Range of First

Octet Values (decimal)

Octets in Network ID / Host

ID

Theoretical IP Address Range

Class A 0xxx xxxx 0000 0001 0111 1110 1 to 126 1 / 3 to126.255.255.2551.0.0.0

Class B 10xx xxxx 1000 0000 1011 1111 128 to 191 2 / 2 128.0.0.0 to191.255.255.255

Class C 110x xxxx 1100 0000 1101 1111 192 to 223 3 / 1 192.0.0.0 to223.255.255.255

Class D 1110xxxx 11100000 11101111 224 to 239 — 224.0.0.0 to

239.255.255.255

Class E 1111xxxx 11110000 11111111 240 to 255 — 240.0.0.0 to

255.255.255.255

IP "Classful" Addressing Network and Host

(7)

IP "Classful" Addressing Network and Host

Identification and Address Ranges

IP Address Class

Total # Of Bits For Network

ID / Host ID First Octet of

IP Address

IP Address Class A, B and C Network and Host

Capacities

•IP addresses are constructed by replacing the normal network ID or host ID (or both) in an IP

address with one of two special patterns. The two patterns are:

All Zeroes:When the network ID or host ID bits are replaced by a set of all zeroes, the

special meaning is the equivalent of the pronoun this, referring to whatever was replaced.

It a also e i te p eted as the default o the u e t . “o fo e a ple, if e epla e the et o k ID ith all ze oes ut lea e the host ID alo e, the esulti g add ess ea s the

device with the host ID given, onthis network. O alte ati el , the de i e ith the host ID

specified, onthe default networkorthe current network.

All Ones:When the network ID or host ID bits are replaced by a set of all ones, this has the

special meaning of all. So replacing the host ID with all ones means the IP address refers

to all hosts on the network. This is generally used as a broadcast address for sending a

message to everyo e.

Special Network ID and Host ID Address

(8)

Network ID Host ID Class A Example Class B Example Class C Example Special Meaning and Description Network ID Host ID 77.91.215.5 154.3.99.6 227.82.157.160 Normal Meaning:Refers to a specific device. Network ID All Zeroes 77.0.0.0 154.3.0.0 227.82.157.0 “The Specified Network”:This notation, with a “0” at

the end of the address, refers to an entire network.

All Zeroes Host ID 0.91.215.5 0.0.99.6 0.0.0.160

“Specified Host On This Network”:This addresses a host on the current or default network when the network ID is not known, or when it doesn't need to be

explicitly stated.

All Zeroes All Zeroes 0.0.0.0

“Me”:(Alternately, “this host”, or “the current/default host”). Used by a device to refer to itself when it

doesn't know its own IP address. The most common use is when a device attempts to determine its

address using a host-configuration protocol like DHCP. May also be used to indicate that

any address of a multihomed host may be used. Network ID All Ones 77.255.255.255 154.3.255.255 227.82.157.255 “All Hosts On The Specified Network”:Used for

broadcasting to all hosts on the local network.

All Ones All Ones 255.255.255.255

“All Hosts On The Network”:Specifies a global broadcast to all hosts on the directly-connected network. Note that there is no address that would imply sending to all hosts everywhere on the global Internet, since this would be very inefficient and costly.

IP Address Patterns With Special Meanings

Range Start

Address Range End Address “Classful” Address Equivalent Classless

Address Equivalent

Description

0.0.0.0 0.255.255.255 Class A network 0.x.x.x 0/8 Reserved.

10.0.0.0 10.255.255.255 Class A network 10.x.x.x 10/8 Class A private address block. 127.0.0.0 127.255.255.255 Class A network 127.x.x.x 127/8 Loopback address block. 128.0.0.0 128.0.255.255 Class B network 128.0.x.x 128.0/16 Reserved.

169.254.0.0 169.254.255.255 Class B network 169.254.x.x 169.254/16 Class B private address block reserved for automatic private address allocation. See the section on DHCP for details.

172.16.0.0 172.31.255.255 16 contiguous Class B networks

from 172.16.x.x through 172.31.x.x 172.16/12 Class B private address blocks. 191.255.0.0 191.255.255.255 Class B network 191.255.x.x 191.255/16 Reserved.

192.0.0.0 192.0.0.255 Class C network 192.0.0.x 192.0.0/24 Reserved.

192.168.0.0 192.168.255.255

256 contiguous Class C networks from 192.168.0.x through

192.168.255.x

192.168/16 Class C private address blocks.

223.255.255.0 223.255.255.255 Class C network 223.255.255.x 223.255.255/24 Reserved.

Reserved, Loopback and Private IP Addresses

Range Start Address Range End Address Description

224.0.0.0 224.0.0.255 Reserved for special “wellmulticast addresses.-known”

224.0.1.0 238.255.255.255 Globally-scoped (Internet-wide) multicast addresses.

239.0.0.0 239.255.255.255 Administratively-scoped (local) multicast addresses.

(9)

Range Start Address Description

224.0.0.0 Reserved; not used

224.0.0.1 All devices on the subnet

224.0.0.2 All routers on the subnet

224.0.0.3 Reserved

224.0.0.4 All routers using DVMRP

224.0.0.5 All routers using OSPF

224.0.0.6 Designated routers using OSPF

224.0.0.9 Designated routers using RIP-2

224.0.0.11 Mobile agents (for Mobile IP)

224.0.0.12 DHCP Server / Relay Agent

Well-Known IP Multicast Addresses

IP Multicast Address Ranges and Uses

Lack of Internal Address Flexibility:Big organizations are assigned large,

o olithi lo ks of add esses that do 't at h ell the st u tu e of thei

underlying internal networks.

Inefficient Use of Address Space:The existence of only three block sizes (classes A, B and C) leads to waste of limited IP address space.

Proliferation of Router Table Entries:As the Internet grows, more and more entries are required for routers to handle the routing of IP datagrams, which causes performance problems for routers. Attempting to reduce inefficient address space allocation leads to even more router table entries.

“u

ary of

Classful

Addressi g

Issues

There

•It contributed to the explosion in size of IP routing tables.

•Every time more address space was needed, the administrator would have to

apply for a new block of addresses.

•Any changes to the internal structure of a company's network would

potentially affect devices and sites outside the organization.

•Keeping track of all those different Class C networks would be a bit of a

headache in its own right.

(10)

Better Match to Physical Network Structure:Hosts can be grouped into subnets that reflect the way they are actually structured in the organization's physical network.

Flexibility:The number of subnets and number of hosts per subnet can be customized for each organization. Each can decide on its own subnet structure and change it as required.

Invisibility To Public Internet:Subnetting was implemented so that the internal division of a network into subnets is visible only within the organization; to the rest of the Internet the organization is still just o e ig, flat, et o k . This also ea s that a ha ges ade to the i te al st u tu e a e ot visible outside the organization.

No Need To Request New IP Addresses:Organizations don't have to constantly requisition more IP addresses, as they would in the workaround of using multiple small Class C blocks.

No Routing Table Entry Proliferation:Since the subnet structure exists only within the organization, routers outside that organization know nothing about it. The organization still maintains a single (or perhaps a few) routing table entries for all of its devices. Only routers inside the organization need to worry about routing between subnets.

Advantages of Subnet Addressing

IP Subnetting: "Three-Level" Hierarchical IP

Subnet Addressing

Subnetting A Class B Network

(11)

•Suppose we have a host on this network with an IP of 154.71.150.42. A router needs to figure out which subnet this address is on.

Case

Determining the Subnet ID of an IP Address Through Subnet Masking

Component Octet 1 Octet 2 Octet 3 Octet 4

IP Address 10011010

Default Subnet Masks for Class A, Class B and Class C Networks

IP Address Class

Total # Of Bits For Network ID / Host ID

Default Subnet Mask

First Octet Second Octet Third Octet Fourth Octet

Class A 8 / 24 11111111(255) 00000000(0) 00000000(0) 00000000(0)

Class B 16 / 16 11111111

(255)

Class C 24 / 8 11111111(255) 11111111(255) 11111111(255) 00000000(0)

(12)

IP Default Subnet Masks For Address Classes A, B

Hosts Per Subnet Subnet Mask

(Binary / Dotted Decimal) Subnet Mask (Slash/ CIDR

Notation)Subnet Address #N Formula (N=0, 1, … # of Subnets-1)

0 (Default) 24 1 16,277,214 11111111.00000000.0000000.00000000

255.0.0.0 /8 —

1 23 2 8,388,606 11111111.10000000.0000000.00000000 255.128.0.0 /9 x.N*128.0.0

2 22 4 4,194,302 11111111.11000000.0000000.00000000 255.192.0.0 /10 x.N*64.0.0

3 21 8 2,097,150 11111111.11100000.00000000.00000000 255.224.0.0 /11 x.N*32.0.0

4 20 16 1,048,574 11111111.11110000.00000000.00000000 255.240.0.0 /12 x.N*16.0.0

5 19 32 524,286 11111111.11111000.00000000.00000000 255.248.0.0 /13 x.N*8.0.0

6 18 64 262,142 11111111.11111100.00000000.00000000 255.252.0.0 /14 x.N*4.0.0

7 17 128 131,070 11111111.11111110.00000000.00000000 255.254.0.0 /15 x.N*2.0.0

8 16 256 65,534 11111111.11111111.00000000.00000000 255.255.0.0 /16 x.N.0.0

9 15 512 32,766 11111111.11111111.10000000.00000000 255.255.128.0 /17 x.N/2.

(N%2)*128.0

10 14 1,024 16,382 11111111.11111111.11000000.00000000 255.255.192.0 /18 x.N/4.

(N%4)*64.0

11 13 2,048 8,190 11111111.11111111.11100000.00000000 255.255.224.0 /19 x.N/8.

(N%8)*32.0

12 12 4,096 4,094 11111111.11111111.11110000.00000000 255.255.240.0 /20 x.N/16.

(N%16)*16.0

13 11 8,192 2,046 11111111.11111111.11111000.00000000 255.255.248.0 /21 x.N/32.

(N%32)*8.0

14 10 16,384 1,022 11111111.11111111.11111100.00000000 255.255.252.0 /22 x.N/64.

(N%64)*4.0

15 9 32,768 510 11111111.11111111.11111110.00000000 255.255.254.0 /23 x.N/128.

(N%128)*2.0

16 8 65,536 254 11111111.11111111.11111111.00000000 255.255.255.0 /24 x.N/256.

N%256.0

17 7 131,072 126 11111111.11111111.11111111.10000000 255.255.255.128 /25 x.N/512.

(N/2)%256. (N%2)*128

18 6 262,144 62 11111111.11111111.11111111.11000000 255.255.255.192 /26 x.N/1024.

(N/4)%256. (N%4)*64

19 5 524,288 30 11111111.11111111.11111111.11100000 255.255.255.224 /27

x.N/2048. (N/8)%256. (N%8)*32

20 4 1,048,576 14 11111111.11111111.11111111.11110000 255.255.255.240 /28 x.N/4096.

(N/16)%256. (N%16)*16

21 3 2,097,152 6 11111111.11111111.11111111.11111000 255.255.255.248 /29 x.N/8192.

(N/32)%256. (N%32)*8

(13)

# of Subnet ID

Bit # of Host ID Bits # of Subnets Per Network Hosts Per Subnet# of Subnet Mask

(Binary / Dotted Decimal) Subnet Mask (Slash/ CIDR Notation) Subnet Address #N

Formula (N=0, 1, … #

of Subnets-1) 0 (Default) 16 1 65,534 11111111.11111111.00000000.00000000

255.255.0.0 /16 --1 15 2 32,766 11111111.11111111.10000000.00000000

255.255.128.0 /17 x.y.N*128.0 2 14 4 16,382 11111111.11111111.11000000.00000000

255.255.192.0 /18 x.y.N*64.0 3 13 8 8,190 11111111.11111111.11100000.00000000

255.255.224.0 /19 x.y.N*32.0 4 12 16 4,094 11111111.11111111.11110000.00000000

255.255.240.0 /20 x.y.N*16.0 5 11 32 2,046 11111111.11111111.11111000.00000000

255.255.248.0 /21 x.y.N*8.0 6 10 64 1,022 11111111.11111111.11111100.00000000

255.255.252.0 /22 x.y.N*4.0 7 9 128 510 11111111.11111111.11111110.00000000

255.255.254.0 /23 x.y.N*2.0 8 8 256 254 11111111.11111111.11111111.00000000

255.255.255.0 /24 x.y.N.0 9 7 512 126 11111111.11111111.11111111.10000000

255.255.255.128 /25 x.y.N/2. (N%2)*128 10 6 1,024 62 11111111.11111111.11111111.11000000

255.255.255.192 /26 x.y.N/4. (N%4)*64 11 5 2,048 30 11111111.11111111.11111111.11100000

255.255.255.224 /27 x.x.N/8. (N%8)*32 12 4 4,096 14 11111111.11111111.11111111.11110000

255.255.255.240 /28 x.y.N/16. (N%16)*16 13 3 8,192 6 11111111.11111111.11111111.11111000

255.255.255.248 /29 x.y.N/32. (N%32)*8 14 2 16,384 2 11111111.11111111.11111111.11111100

255.255.255.252 /30 x.y.N/64. (N%64)*4

Subnetting

Summary Table For

Class B Networks

(Binary / Dotted Decimal)

Subnet

(Default) 8 1 254 11111111.11111111.11111111.00000000

255.255.255.0 /24 —

1 7 2 126 11111111.11111111.11111111.10000000 255.255.255.128 /25 x.y.z.N*128

2 6 4 62 11111111.11111111.11111111.255.255.255.19211000000 /26 x.y.z.N*64

3 5 8 30 11111111.11111111.11111111.11100000 255.255.255.224 /27 x.y.z.N*32

4 4 16 14 11111111.11111111.11111111.11110000 255.255.255.240 /28 x.y.z.N*16

5 3 32 6 11111111.11111111.11111111.11111000 255.255.255.248 /29 x.y.z.N*8

6 2 64 2 11111111.11111111.11111111.255.255.255.25211111100 /30 x.y.z.N*4

Subnetting

Summary Table

For Class C

Networks

•Conventional Subnet masking replaces the two-level IP addressing scheme

with a more flexible three-level method. Since it lets network administrators assign IP addresses to hosts based on how they are connected in physical networks, subnetting is a real breakthrough for those maintaining large IP networks. It has its own weaknesses though, and still has room for improvement. The main weakness of conventional subnetting is in fact that the

subnet ID represents onlyoneadditional hierarchical level in how IP addresses

are interpreted and used for routing.

(14)

•It a see g eed to look at subnettinga d sa hat, o l oneadditional

le el ?

• in large networks, the need to divide our entire network into only one level of

subnetworks doesn't represent the best use of our IP address block.

IP Variable Length Subnet Masking (VLSM) :

The

Problem With Single-Level Subnetting

Class C (/24)

Network Split Into

Eight Conventional

Subnets

(15)

Variable Length Subnet

Masking (VLSM)

Example

•Let's take our example above again and see how we can make everything fit using

VLSM. We start with our Class C network, 201.45.222.0/24. We first do an initial subnetting by using one bit for the subnet ID, leaving us 7 bits for the host ID. This gives us two subnets: 201.45.222.0/25 and 201.45.222.128/25. Each of these can have a maximum of 126 hosts. We set aside the first of these for subnet S6 and its 100 hosts.

•We take the second subnet, 201.45.222.128/25, and subnet it further into two

sub-subnets. We do this by taking one bit from the 7 bits left in the host ID. This gives us the sub-subnets 201.45.222.128/26 and 201.45.222.192/26, each of which can have 62 hosts. We set aside the first of these for subnet S5 and its 50 hosts.

•We take the second sub-subnet, 201.45.222.192/26, and subnet it further into four

sub-sub-subnets. We take 2 bits from the 6 that are left in the host ID. This gives us four sub-sub-subnets that each can have a maximum of 14 hosts. These are used for S1, S2, S3 and S4.

•Cek apakah IP yang diberikan itu sudah valid, caranya adalah meng-AND kan

dengan subnet mask nya (24) dengan dirubah ke bentuk binner.

•Cara selanjutnya adalah mengurutkan jumlah Host dimulai dari yang terbesar

untuk memulai perhitungan

(16)

46

Case

•Diberikan IP 192.168.1.10/24

•Host yang dibutuhkan :

•A = 100

•B = 40

•C = 50

•D= 150

•E = 2 (biasanya perhitungan untuk alamat router)

47

•192.168.1.10 = 11000000.10101000.00000001.00001010

•/24 (angka 1 terdapat 24) = 11111111.11111111.11111111.00000000

•di AND kan (bernilai benar bila benar dan benar) menjadi :

192.168.1.0 = 11000000.10101000.00000001.00000000

•Sehingga IP yang digunakan untuk perhitungan adalah 192.168.1.0/24

•Cara selanjutnya adalah mengurutkan jumlah Host dimulai dari yang terbesar

untuk memulai perhitungan, dalam kasus ini urutannya adalah (D,A,C,B,E)

48

•dengan menggunakan rumus (2^n) –2 >=host maka :

•untuk host D = 150

•(2^n) –2>=150

•n = 8, maka : 32-8 = 24 (untuk mengetahui subnet mask yg akan digunakan,

dalam soal ini /24)

•Network address : 192.168.1.0/24

•Broadcast Address : 192.168.1.255

(17)

49

•untuk host A = 100

•(2^n) –2>=100

•n = 7, maka : 32-7 = 25

•Network address : 192.168.2.0/25

•Broadcast Address : 192.168.2.127

•IP Range : 192.168.2.1-192.168.1.126

50

•untuk host C = 50

•(2^n) –2=50

•n = 6, maka : 32-6 = 26

•Network Address : 192.168.2.128/26

•Broadcast Address : 192.168.2.191

•IP Range : 192.168.2.129-192.168.2.190

•untuk host B = 40

•(2^n) –2 >=40

•n = 6, maka : 32-6 = 26

•Network Address : 192.168.2.192/26

•Broadcast Address : 192.168.2.255

(18)

52

•untuk host E = 2

•(2^n) –2 >=2

•n = 2, maka : 32-2 = 30

•Network Address : 192.168.3.0/30

•Broadcast Address : 192.168.3.4

•IP Range : 192.168.3.2-192.168.3.3

CommTech Training Center

IPV6

Periyadi,M.T.

54

Preface

•IP is the primary protocol in the internet layer of the OSI networking model

•IP’s jo is to deli e pa kets f o a sou e o pute to a desti atio

computer (network)

•As of May 2015, about 97 % Web Traffic uses IPV4

•IPv6 is destined to be the future of the Internet Protocol, and due to IP's critical

importance, it will form the basis for the future of TCP/IP and the Internet as well.

•The primary motivation for creating IPv6 was to rectify the addressing

(19)

55

Unchanged Aspects of Addressing in IPv6

Some of the general characteristics of the IPv6 addressing model that are basically the same as in IPv4:

Core Functions of Addressing:The two main functions of addressing are still network interface identification and routing. Routing is facilitated through the structure of addresses on the internetwork.

Network Layer Addressing:IPv6 addresses are still the ones associated with the network layer in TCP/IP networks, and are distinct from data link layer (also sometimes calledphysical) addresses.

Number of IP Addresses Per Device:Addresses are still assigned to network interfaces, so a regular host like a PC will usually have one (unicast) address, and routers will have more than one, for each of the physical networks to which it connects.

Address Interpretation and Prefix Representation:IPv6 addresses are like classless IPv4 addresses in that they are interpreted as having a network identifier part and a host identifier part, but that the delineation is not encoded into the address itself. A prefix length number, using CIDR-like notation, is used to indicate the length of the network ID (prefix length).

Private and Public Addresses:Both types of addresses exist in IPv6, though they are defined and used somewhat differently.

56

Some of the most important goals in designing

IPv6

Larger Address Space:This is what we discussed earlier. IPv6 had to provide more addresses for the growing Internet.

Better Management of Address Space:It was desired that IPv6 not only include more addresses, but a more capable way of dividing the address space and using the bits in each address.

Eli i atio of Addressi g Kludges :Technologies like NATa e effe ti el kludges that ake up fo the la k of add ess spa e i IP 4. IP 6

eliminates the need for NAT and similar workarounds, allowing every TCP/IP device to have a public address.

Easier TCP/IP Administration:The designers of IPv6 hoped to resolve some of the current labor-intensive requirements of IPv4, such as the need to configure IP addresses. Even though tools like DHCP eliminate the need to manually configure many hosts, it only partially solves the problem. •Modern Design For Routing:In contrast to IPv4, which was designed before we all had any idea what the modern Internet would be like, IPv6 was

created specifically for efficient routing in our current Internet, and with the flexibility for the future.

Better Support For Multicasting:Multicasting was an option under IPv4 from the start, but support for it has been slow in coming. •Better Support For Security:IPv4 was designed at a time when security wasn't much of an issue, because there were a relatively small number of

networks on the internet, and their administrators often knew each other. Today, security on the public Internet is a big issue, and the future success of the Internet requires that security concerns be resolved.

Better Support For Mobility:When IPv4 was created, there really was no concept of mobile IP devices. The problems associated with computers that move between networks led to the need for Mobile IP. IPv6 builds on Mobile IP and provides mobility support within IP itself.

(20)

58

• Global Unicast

• Address format that enables aggregation upward to the ISP.

• 48-bit global routing prefix and a 16-bit subnet ID.

• Allows for organizations to have up to 65535 individual subnets

Format and Header

59

Format and Header

•Reserved Addresses

•1/256 of all available addresses

•Other types of addresses come from this block as well

•Private Addresses

•First octet value of FE, after which comes a value of 8 - F

•Divided into other addresses

•Site-local address (exactly like private addresses of •Deprecated as of 2003

•Start with FE then followed by C - F •Link-local address - New concept

•Never routed by any router, including internal ones

•Used for local communication on a particular physical network segment •Utilized for autoconfiguration, neighbor discovery, and router discovery. •Begin with FE and followed by 8 - B

60

Format and Header

•Loopback

•Same as the loopback in IPv4

•0:0:0:0:0:0:0:1 or 0::1

•Unspecified address

•All zero address 0:0:0:0:0:0:0:0 or ::

•Used when a device does not know or have an address

(21)

61

IPv4-IPv6 Transition Methods

Dual “tack Devices:Routers and some other devices may be programmed with both IPv4 and IPv6 implementations to allow them to communicate with both types of hosts.

IPv4/IPv6 Translation: Dual sta k de i es a e desig ed to a ept

requests from IPv6 hosts, convert them to IPv4 datagrams, send the datagrams to the IPv4 destination and then process the return datagrams similarly. •IPv4 Tunneling of IPv6:IPv6 devices that don't have a path between them

consisting entirely of IPv6-capable routers may be able to communicate by encapsulating IPv6 datagrams within IPv4. In essence, they would be using IPv6 on top of IPv4; two network layers. The encapsulated IPv4 datagrams would travel across conventional IPv4 routers.

62

Why IPV6

•IP 4 does ot suppo t ea e ough add esses to o e t all the o ld’s

devices

•IPV4 only support 4.3 billion address

•IPV4 address space is poorly allocated, with only 14% of all available address in use

•Number of devices in use today

•Automobiles : 1.1 Billion

•Smartphones : 1.8 Billion

•Websites : 650 million

•Televisions : Wow !!!

•Security Camera : Double Wow !!!

•Othe : ………..?????!!!

IPV4 Review

•32-bits / 4 blocks of 8 bits, separated by period

172 . 128 . 0 . 19

•Expressed as four decimal number

•Each 0 to 255

(22)

64

IPv6 Address

•128-bits /8 block of 16 bits, separated by colon ( : )

8145 : 010C : 0000 : 0000 : 1100 : 1A06 : 8800 : 0001

•Expressed as 8 groups of 4 hexadecimal digits, each 0 - FFFF

1000000101000101 : 000100001100 : 0000000000000000 : 0000000000000000 : 0001000100000000 : 0001101000000110 : 1000100000000000 : 0000000000000001

65

Binnary

Hex Convertion

•0001101000000110 => Hexadecimal

•Four Binary digits = one Hex digit

•0001 1010 0000 0110

•1 A 0 6

•DIGIT WEIGHT 8421

• 0000

•NOT CASE SENSITIVE

(23)

67

structure

8145 : 010C : 0000 : 0000 : 1100 : 1A06 : 8800 : 0001

64 BITS

64 BITS

NETWORK PORTION

HOST PORTION

CIDR

8145:10C::1100:1A06:8800:1/64

68

Subnet IPV6

8145 : 010C : 0000 :

0000

: 1100 : 1A06 : 8800 : 0001

48 BITS

64 BITS

NETWORK PORTION

HOST PORTION

CIDR

8145:10C::1100:1A06:8800:1/64

16 BITS

SUBNET

STUDI KASUS

•2001:db8:1234:0000:/48 from provider kita bisa memanipulasi 0000 untuk site

sub site dan subnet id bagaimana memecahnya tergantung kebutuhan

sebagai contoh :: OPTION A

4 site, 4 sub site(setiap site) dan 4096 subnet (setiap sub site) :

1st 2 bit untuk site dan next2 bit untuk sub site dan 3 nibble sisa untuk subnet (2>12)

OPTION B

•16 site, 16 sub site (setiap site) dan 256 subnet (setiap subsite) :

(24)

70

Studi kasus

OPTION C

16 site, 256 sub site (setiap site) dan 16 (setiap subsite) :

1st nibble untuk site 2nd and 3rd nibble untuk sub site dan 1 nible untuk subnet (2>4)

2001:DB8:1234:0000:/64 HEX BINNARY

00000000 0000 0000 OPTION A

000000000000 0000 OPTION B

00000000 00000000OPTION C

71

STUDI KASUS

•We have a mid-sized company with offices and data centers across the United

State. As part of our long term planning we have applied for an IPv6 address and were assigned 2001:db8:abcd::/48. We now need to allocate this across our enterprise

•We have branches in most states, so we've decided to use Option B, giving us

16 sites, 16 sub-sites and 256 subnets per site.

•We've decided that a "site" will be a geographic region of the country and a

sub-site will be a city within the geographic region. Here is the breakdown we are using for our sites:

72

Site Addresses

The sites that we are rolling IPv6 to are in: San Francisco (Site 9)

(25)

73

The Site

•Site 0 - 2001:db8:abcd:0000::/52 (for future use)

•Site 1 - 2001:db8:abcd:1000::/52

•Site 2 - 2001:db8:abcd:2000::/52

•Site 3 - 2001:db8:abcd:3000::/52

•...

•Site 8 - 2001:db8:abcd:8000::/52

•Site 9 - 2001:db8:abcd:9000::/52

•Site 10 - 2001:db8:abcd:a000::/52 (for future use)

•Site 11 - 2001:db8:abcd:b000::/52 (for future use)

•Site 12 - 2001:db8:abcd:c000::/52 (for future use)

74

Sub-Site Addresses

Site 1

----Future Use - 2001:db8:abcd:1000::/56 Boston - 2001:db8:abcd:1100::/56 Future Use - 2001:db8:abcd:1200::/56 ...

Future Use - 2001:db8:abcd:1a00::/56 Future Use - 2001:db8:abcd:1b00::/56 ...

Sub Site

Site 2

(26)

76

Sub Site

Site 3

----Future Use - 2001:db8:abcd:3000::/56 ...

Newark - 2001:db8:abcd:3f00::/56

77

Sub site

Site 8

----Omaha - 2001:db8:abcd:8000::/56 Site 9

----San Francisco - 2001:db8:abcd:9100::/56 Seattle - 2001:db8:abcd:9200::/56

78

Subnet Addresses

Within each site we can now assign our subnets. We will use our Newark site as an example.

Firewall Outside: 2001:db8:abcd:3f00::/64 Webservers: 2001:db8:abcd:3f01::/64 Database Servers: 2001:db8:abcd:3f02::/64 ....

Mail Servers: 2001:db8:abcd:3f0d::/64 ....

(27)

79

•We are defining the next two nibbles for the subnet so our mask moves from a

/56 sub-site up to a /64 subnet prefix. Newark's subnets can use 2001:db8:abcd:3f00 through 2001:db8:abcd:3fff:: for subnet addresses.

•Within each subnet we can provide 2^64 addresses, as we still have 64 bits to

use.

•For example, within the MailServers vlan we will start all addresses

with 2001:db8:abcd:3f0d:: and the last 64-bits are for the host.

80

•We've assigned the following addresses

•mail gateway: 2001:db8:abcd:3f0d::1/64

•mail01: 2001:db8:abcd:3f0d:0000:0000:0000:0002/64

•mail02: 2001:db8:abcd:3f0d::ab00/64

(28)

82

83

Routing

•With IPv6 not relying on IPv4 anymore we finally address the poor addressing

schemes we've all had in place for years. By defining sites and sub-sites, with plenty of room for growth we can do some pretty heavy duty aggregation.

•Each of our sub-sites will advertise their /56 prefix up to an aggregation router.

•Each aggregation router will be connected to the IPv6 Internet and announce

both our enterprise wide /48 and the site /52. This provides redundant connectivity via the internet and allows the internet to use longest match to reach the site directly.

(29)

Gambar

Table For Class A

Referensi

Dokumen terkait

This study finding indicate that pharmaceutical care intervention by pharmacist could reduce mean length of stay significantly in hospitalized patients with community

PERAN GURU PENDIDIKAN KEWARGANEGARAAN UNTUK MENCEGAH PENYALAHGUNAAN NARKOBA DIKALANGAN SISWA-SISWI SMAN 1 KARANGNUNGGAL.. Universitas Pendidikan Indonesia |

[r]

asas-asas hukum perjanjian pada perjanjian terapeutik antara dokter dan pasien dikaitkan dengan Pasal 1338 KUHPerdata dan akibat hukum timbul yang dari tidak terpenuhi prestasi

5.58 Diagram bulat persentase kesetujuan responden terhadap faktor kedekatan dengan sarana pendidikan

Di lahan kering Tuban, perbaikan teknologi dengan pengolahan tanah lebih dalam (20 cm), pembuatan bedengan selebar 2 m, jarak tanam 40 cm x 10 cm, pemupukan 50 kg urea+75 kg TSP+50

Routine programme records used for HIV surveillance among pregnant women attending ANC contain personal identifying information (e.g. name and ANC service number) and

Arista Hanggraeni, 2007, Jurusan Hukum, Fakultas Hukum Universitas Airlangga Surabaya dalam skripsinya yang berjudul Perlindungan Hukum Bagi Pekerja / Buruh