Network Layer Protocol and IP Addressing
Network Layer Protocol and IP Addressing
Addressing
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
⚫ Internet Protocol Version 4 (IPv4) is the core protocol suite in the TCP/IP protocol
suite. It works at the network layer in the TCP/IP protocol stack and this layer
corresponds to the network layer in the Open System Interconnection Reference
Model (OSI RM).
⚫ The network layer provides connectionless data transmission services. A network
does not need to establish a connection before sending data packets. Each IP data
packet is sent separately.
⚫ This presentation describes the basic concepts of IPv4 addresses, subnetting,
network IP address planning, and basic IP address configuration.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
⚫ On completion of this course, you will be able:
Describe main protocols at the network layer.
Describe the concepts and classification of IPv4 addresses and special IPv4 addresses.
Calculate IP networks and subnets.
Use the IP network address planning method.
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Layer Protocols
⚫ The network layer is often called the IP layer. Network layer protocols include Internet
Control Message Protocol (ICMP) and Internet Packet Exchange (IPX), in addition to IP.
Application Layer
Transport layer
Physical Layer
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
•
Internet Protocol
⚫ IP is short for the Internet Protocol. IP is the name of a protocol file with small content. It
defines and describes the format of IP packets.
⚫ The frequently mentioned IP refers to any content related directly or indirectly to the
Internet Protocol, instead of the Internet Protocol itself.
Function Version
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• IP has two versions: IPv4 and IPv6. IPv4 packets prevail on the Internet, and the
Internet is undergoing the transition to IPv6. Unless otherwise specified, IP addresses
mentioned in this presentation refer to IPv4 addresses.
▫ IPv4 is the core protocol in the TCP/IP protocol suite. It works at the network
layer in the TCP/IP protocol stack and this layer corresponds to the network layer
in the Open System Interconnection Reference Model (OSI RM).
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Application data can be transmitted to the destination end over the network only after
being processed at each layer of the TCP/IP protocol suite. Each layer uses protocol
data units (PDUs) to exchange information with another layer. PDUs at different layers
contain different information. Therefore, PDUs at each layer have a particular name.
▫ For example, after a TCP header is added to the upper-layer data in a PDU at the
transport layer, the PDU is called a segment. The data segment is transmitted to
the network layer. After an IP header is added to the PDU at the network layer,
the PDU is called a packet. The data packet is transmitted to the data link layer.
After the data link layer header and tailer are encapsulated into the PDU, the
PDU becomes a frame. Ultimately, the frame is converted into bits and
transmitted through network media.
▫ The process in which data is delivered following the protocol suite from top to
bottom and is added with headers and tails is called encapsulation.
• This presentation describes how to encapsulate data at the network layer. If data is
encapsulated with IP, the packets are called IP packets.
IPv4 Packet Format
Ethernet IP TCP
User data Ethernet tail
header header header
Header Type of
Version Total Length
Length Service
Identification Flags Fragment Offset
Fixed size:
20 bytes TTL Protocol Header Checksum
Source IP Address
Destination IP Address
Optional size:
Options Padding
0–40 bytes
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
▫ Header Length: 4 bits long, indicating the size of a header. If the Option field is
not carried, the length is 20 bytes. The maximum length is 60 bytes.
▫ Type of Service: 8 bits long, indicating a service type. This field takes effect only
when the QoS differentiated service (DiffServ) is required.
▫ Total Length: 16 bits long. It indicates the total length of an IP data packet.
▫ Fragment Offset: 13 bits long. This field is used for fragment reassembly.
▫ Protocol: 8 bits long. It indicates a next-layer protocol. This field identifies the
protocol used by the data carried in the data packet so that the IP layer of the
destination host sends the data to the process mapped to the Protocol field.
Header Type of
Version Total Length
Length Service
Identification Flags Fragment Offset
Host A Host B
TTL Protocol Header Checksum Data
Source IP Address
Data fragment
Destination IP Address
Options Padding
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Identification: 16 bits long. This field carries a value assigned by a sender host and is
used for fragment reassembly.
▫ Don't Fragment: Value 1 indicates that fragmentation is not allowed, and value 0
indicates that fragmentation is allowed.
▫ More Fragment: Value 1 indicates that there are more segments following the
segment, and value 0 indicates that the segment is the last data segment.
• Fragment Offset: 13 bits long. This field is used for fragment reassembly. This field
indicates the relative position of a fragment in an original packet that is fragmented.
This field is used together with the More Fragment bit to help the receiver assemble
the fragments.
Time to Live
⚫ The TTL field specifies the number of routers that a packet can pass through.
⚫ Once a packet passes through a router, the TTL is reduced by 1. If the TTL value is reduced
to 0, a data packet is discarded.
Header Type of
Version Total Length
Length Service TTL = 255 TTL = 254 TTL = 253
Identification Flags Fragment Offset
TTL Protocol Header Checksum
Source IP Address
Host A Host B
Destination IP Address
Options Padding
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Time to Live: 8 bits long. It specifies the maximum number of routers that a packet can
pass through on a network.
▫ When packets are forwarded between network segments, loops may occur if
routes are not properly planned on network devices. As a result, packets are
infinitely looped on the network and cannot reach the destination. If a loop
occurs, all packets destined for this destination are forwarded cyclically. As the
number of such packets increases, network congestion occurs.
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• After receiving and processing the packet at the network layer, the destination end
needs to determine which protocol is used to further process the packet. The Protocol
field in the IP packet header identifies the number of a protocol that will continue to
process the packet.
• The field may identify a network layer protocol (for example, ICMP of value 0x01) or
an upper-layer protocol (for example, Transmission Control Protocol [TCP] of value
0x06 or the User Datagram Protocol [UDP] of value 0x11).
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
What Is an IP Address?
⚫ An IP address identifies a node (or an interface on a network device) on a network.
⚫ IP addresses are used to forward IP packets on the network.
IP Address
IP 1 IP 5
An IP address identifies a
IP 4
node on a network and is
IP 2
used to find the destination
IP 3 for data.
Data
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Note: The interface that needs to use an IP address is usually the interface of a router
or computer.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Address Notation
⚫ An IPv4 address is 32 bits long.
⚫ It is in dotted decimal notation.
27 26 25 24 23 22 21 20
Power
Conversion between 128 64 32 16 8 4 2 1
decimal and binary
systems Bit 1 1 0 0 0 0 0 0
= 128 + 64 = 192
⚫ IPv4 address range is 0.0.0.0–255.255.255.255.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• IP address notation
▫ The IP address format helps us better use and configure a network. However, a
communication device uses the binary mode to operate an IP address. Therefore,
it is necessary to be familiar with the decimal and binary conversion.
▫ 00000000.00000000.00000000.00000000–
11111111.11111111.11111111.11111111, that is, 0.0.0.0–255.255.255.255
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Address Structure
⚫ Network part: identifies a network.
⚫ Host part: identifies a host and is used to differentiate hosts on a network.
Network part Host part
• Network mask: is used to distinguish the network part from the host part in an IP address.
192.168.10.1 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 IP address
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
▪ Network devices with the same network ID are located on the same
network, regardless of their physical locations.
▫ The network mask is not an IP address. The network mask consists of consecutive
1s followed by consecutive 0s in binary notation.
▫ The network mask is generally used together with the IP address. Bits of 0
correspond to host bits in the IP address. In other words, in an IP address, the
number of 1s in a network mask is the number of bits of the network ID, and the
number of 0s is the number of bits in the host ID.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Addressing
⚫ Network part (network ID): identifies a network.
⚫ Host part: identifies a host and is used to differentiate hosts on a network.
Network part
10.0.1.0/24 10.0.2.0/24
10.0.1.1/24 10.0.2.1/24
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• A network ID indicates the network where a host is located, which is similar to the
function of "Community A in district B of City X in province Y."
• A host ID identifies a specific host interface within a network segment defined by the
network ID. The function of host ID is like a host location "No. A Street B".
• Network addressing:
• Gateway:
Assigned to
Class B 10NNNNNN NNNNNNNN NNNNNNNN NNNNNNNN 128.0.0.0–191.255.255.255
hosts
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IP Address Types
⚫ A network range defined by a network ID is called a network segment.
⚫ Network address: identifies a network.
Example: 192.168.10.0/24
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Network address
• Broadcast address
• Available address
▫ Given that the host part of a network segment is n bits, the number of IP
addresses is 2n, and the number of available IP addresses is 2n – 2 (one network
address and one broadcast address).
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Address Calculation
⚫ Example: What are the network address, broadcast address, and number of available
addresses of class B address 172.16.10.1/16?
172. 16. 00001010. 00000001
IP address
1 0 1 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1
Network mask
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
The network address is obtained,
with all host bits set to 0s.
Network address 1 0 1 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 172.16.0.0
The broadcast address is obtained,
with all host bits set to 1s.
Broadcast address 1 0 1 0 1 1 0 0 0 0 0 1 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 172.16.255.255
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Network address: After the host part of this address is set to all 0s, the obtained result
is the network address of the network segment where the IP address is located.
• Broadcast address: After the host part of this address is set to all 1s, the obtained
result is the broadcast address used on the network where the IP address is located.
Private IP Addresses
⚫ Public IP address: An IP address is assigned by the Internet Assigned Numbers Authority (IANA), and
this address allocation mode ensures that each IP address is unique on the Internet. Such an IP address
is a public IP address.
⚫ Private IP address: In practice, some networks do not need to connect to the Internet. For example, on
a network of a lab in a college, IP addresses of devices need to avoid conflicting with each other only
within the same network. In the IP address space, some IP addresses of class A, B, and C addresses are
reserved for the preceding situations. These IP addresses are called private IP addresses.
Class A: 10.0.0.0–10.255.255.255
192.168.1.0/24
10.0.0.0/8
Class B: 172.16.0.0–172.31.255.255
Implemented using network
Internet address translation (NAT)
Class C: 192.168.0.0–192.168.255.255
10.0.0.0/8 192.168.1.0/24
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Private IP addresses are used to relieve the problem of IP address shortage. Private
addresses are used on internal networks and hosts, and cannot be used on the public
network.
▫ Public IP address: A network device connected to the Internet must have a public
IP address allocated by the IANA.
Special IP Addresses
⚫ Some IP addresses in the IP address space are of special meanings and functions.
⚫ For example:
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• 255.255.255.255
▫ This address is called a limited broadcast address and can be used as the
destination IP address of an IP packet.
▫ After receiving an IP packet whose destination IP address is a limited broadcast
address, the router stops forwarding the IP packet.
• 0.0.0.0
▫ If this address is used as a network address, it means the network address of any
network. If this address is used as the IP address of a host interface, it is the IP
address of a source host interface on "this" network.
▫ For example, if a host interface does not obtain its IP address during startup, the
host interface can send a DHCP Request message with the destination IP address
set to a limited broadcast address and the source IP address set to 0.0.0.0 to the
network. The DHCP server is expected to allocate an available IP address to the
host interface after receiving the DHCP Request message.
• 127.0.0.0/8
▫ This address is called a Loopback address and can be used as the destination IP
address of an IP packet. It is used to test the software system of a test device.
▫ The IP packets that are generated by a device and whose destination IP address
is set to a Loopback address cannot leave the device itself.
• 169.254.0.0/16
▫ If a network device is configured to automatically obtain an IP address but no
DHCP server is available on the network, the device uses an IP address in the
169.254.0.0/16 network segment for temporary communication.
• Note: The Dynamic Host Configuration Protocol (DHCP) is used to dynamically
allocate network configuration parameters, such as IP addresses.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IPv4 IPv6
• Address length: 32 bits • Address length: 128 bits
• Address types: unicast address, broadcast • Address types: unicast address, multicast
address, and multicast address address, and anycast address
• Characteristics: • Characteristics:
▫ IPv4 address depletion ▫ Unlimited number of addresses
▫ Inappropriate packet header design ▫ Simplified packet header
▫ ARP dependency-induced flooding ▫ Automatic IPv6 address allocation
▫ ... ▫ ...
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Why Subnetting?
172.16.1.0
172.16.4.0
172.16.0.0
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Classful addressing is too rigid and the granularity of address division is too large. As a
result, a large number of host IDs cannot be fully used, wasting IP addresses.
• Therefore, subnetting can be used to reduce address waste through the variable length
subnet mask (VLSM) technology. A large classful network is divided into several small
subnets, which makes the use of IP addresses more scientific.
Subnetting - Analyzing the Original
Network Segment
⚫ Example: 192.168.10.0/24
192.168.10.1
IP address 192. 168. 10. 0 0 0 0 0 0 0 1
Default
255. 255. 255. 0 0 0 0 0 0 0 0 One class C network:
subnet mask
... 192.168.10.0/24
192.168.10.255
Default subnet mask:
IP address 192. 168. 10. 1 1 1 1 1 1 1 1
255.255.255.0
Default
255. 255. 255. 0 0 0 0 0 0 0 0
subnet mask
Network part Host part
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Assume that a class C network segment is 192.168.10.0. By default, the network mask
is 24 bits, including 24 network bits and 8 host bits.
Subnet bits
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Now, for the original 24-bit network part, a host bit is taken to increase the network
part to 25 bits. The host part is reduced to 7 bits. The taken 1 bit is a subnet bit. In this
case, the network mask becomes 25 bits, that is, 255.255.255.128, or /25.
• Subnet bit: The value can be 0 or 1. Two new subnets are obtained.
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
... 5 hosts
• Answer: (Use a network with 10 hosts as an example.)
Step 1: Calculate the number of host bits to be taken.
2n – 2 ≥ 10
n ≥ 4, host bits
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• In actual network planning, the subnet with more hosts is planned first.
Practice: Computing Subnets (2)
• Question: An existing class C network segment
is 192.168.1.0/24. Use the VLSM to allocate IP
192.168.1.0/28
addresses to three subnets.
10 hosts
…
Subnet 16 192. 168. 1. 1 1 1 1 0 0 0 0 192.168.1.240
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
▫ 192.168.1.0
▫ 192.168.1.16
▫ 192.168.1.32
▫ 192.168.1.48
▫ 192.168.1.64
▫ 192.168.1.80
▫ 192.168.1.96
▫ 192.168.1.112
▫ 192.168.1.128
▫ 192.168.1.144
▫ 192.168.1.160
▫ 192.168.1.176
▫ 192.168.1.192
▫ 192.168.1.208
▫ 192.168.1.224
▫ 192.168.1.240
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ICMP
⚫ The Internet Control Message Protocol (ICMP) is an auxiliary protocol of the IP protocol.
Ethernet IP
• ICMP is used to transmit error and control ICMP message Ethernet tail
header header
information between network devices. It
Type Code Checksum
plays an important role in collecting network
ICMP message content
information, diagnosing and rectifying
network faults. Type Code Description
0 0 Echo Reply
3 1 Host Unreachable
Message
Host A 3 2 Protocol Unreachable
3 3 Port Unreachable
5 0 Redirect
8 0 Echo Request
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• To improve the efficiency of IP data packet forwarding and success rate of packet
exchanges, ICMP is used at the network layer. ICMP allows hosts and devices to report
errors during packet transmission.
• ICMP message:
▫ ICMP messages are encapsulated in IP packets. Value 1 in the Protocol field of
the IP packet header indicates ICMP.
▫ Explanation of fields:
▪ The format of an ICMP message depends on the Type and Code fields. The
Type field indicates a message type, and the Code field contains a
parameter mapped to the message type.
▪ The Checksum field is used to check whether a message is complete.
▪ A message contains a 32-bit variable field. This field is not used and is
usually set to 0.
− In an ICMP Redirect message, this field indicates the IP address of a
gateway. A host redirects packets to the specified gateway that is
assigned this IP address.
− In an Echo Request message, this field contains an identifier and a
sequence number. The source associates the received Echo Reply
message with the Echo Request message sent by the local end based
on the identifiers and sequence numbers carried in the messages.
Especially, when the source sends multiple Echo Request messages to
the destination, each Echo Reply message must carry the same
identifier and sequence number as those carried in the Echo Request
message.
ICMP Redirection
⚫ ICMP Redirect messages are a type of ICMP control message. When a router detects that a
host uses a non-optimal route in a specific scenario, the router sends an ICMP Redirect
message to the host, requesting the host to change the route.
Server A Internet
20.0.0.1/24
20.0.0.2/24
RTA RTB
10.0.0.200/24 10.0.0.100/24
3 1
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
1. Host A wants to send packets to server A. Host A sends packets to the default
gateway address that is assigned to the gateway RTB.
2. After receiving the packet, RTB checks packet information and finds that the
packet should be forwarded to RTA. RTA is the other gateway on the same
network segment as the source host. This forwarding path through RTA is better
than that through RTB. Therefore, RTB sends an ICMP Redirect message to the
host, instructing the host to send the packet to RTA.
3. After receiving the ICMP Redirect message, the host sends a packet to RTA. Then
RTA forwards the packet to server A.
ICMP Error Detection
⚫ ICMP Echo messages are used to check network connectivity between the source and
destination and provide other information, such as the round-trip time.
[RTA]ping 20.0.0.2
Echo Request
PING 20.0.0.2: 56 data bytes, press CTRL_C to break
10.0.0.0/24 20.0.0.0/24 Reply from 20.0.0.2: bytes=56 Sequence=1 ttl=254 time=70 ms
.1 .2 .1 .2 Reply from 20.0.0.2: bytes=56 Sequence=2 ttl=254 time=30 ms
RTA RTB Server A Reply from 20.0.0.2: bytes=56 Sequence=3 ttl=254 time=30 ms
Echo Reply Reply from 20.0.0.2: bytes=56 Sequence=4 ttl=254 time=40 ms
Reply from 20.0.0.2: bytes=56 Sequence=5 ttl=254 time=30 ms
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• A typical ICMP application is ping. Ping is a common tool used to check network
connectivity and collect other related information. Different parameters can be
specified in a ping command, such as the size of ICMP messages, number of ICMP
messages sent at a time, and the timeout period for waiting for a reply. Devices
construct ICMP messages based on the parameters and perform ping tests.
ICMP Error Report
⚫ ICMP defines various error messages for diagnosing network connectivity problems. The source can
determine the cause for a data transmission failure based on the received error messages. For example,
after a network device receives a packet, it cannot access the network where the destination device
resides, the network device automatically sends an ICMP Destination Unreachable message to the
source. Data packet [RTA]tracert 20.0.0.2
• ICMP defines various error messages for diagnosing network connectivity problems.
The source can determine the cause for a data transmission failure based on the
received error messages.
▫ If a loop occurs on the network, packets are looped on the network, and the TTL
times out, the network device sends a TTL timeout message to the sender device.
• Tracert is a typical ICMP application. Tracert checks the reachability of each hop on a
forwarding path based on the TTL value carried in the packet header. In a tracert test
for a path to a specific destination address, the source first sets the TTL value in a
packet to 1 before sending the packet. After the packet reaches the first node, the TTL
times out. Therefore, the first node sends an ICMP TTL Timeout message carrying a
timestamp to the source. Then, the source sets the TTL value in a packet to 2 before
sending the packet. After the packet reaches the second node, the TTL times out. The
second node also returns an ICMP TTL Timeout message. The process repeats until the
packet reaches the destination. In this way, the source end can trace each node
through which the packet passes based on the information in the returned packet, and
calculate the round-trip time based on timestamps.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic IP Address Configuration Commands
1. Enter the interface view.
You can run this command to enter the view of a specified interface and configure attributes for the interface.
• interface-type interface-number: specifies the type and number of an interface. The interface type and
number can be closely next to each other or separated by a space character.
You can run this command in the interface view to assign an IP address to the interface on the network devices
to implement network interconnection.
• ip-address: specifies the IP address of an interface. The value is in dotted decimal notation.
• mask: specifies a subnet mask. The value is in dotted decimal notation.
• mask-length: specifies a mask length. The value is an integer ranging from 0 to 32.
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case:
Configuring an IP address for an Interface
Configure an IP address for a physical interface.
192.168.1.1/24 192.168.1.2/24
[RTA] interface gigabitethernet 0/0/1
GE0/0/1 GE0/0/1
[RTA-GigabitEthernet0/0/1] ip address 192.168.1.1 255.255.255.0
Or,
RTA RTB
Loopback 0 Loopback 0 [RTA-GigabitEthernet0/0/1] ip address 192.168.1.1 24
1.1.1.1/32 2.2.2.2/32
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
▪ Once a Loopback interface is created, its physical status and data link
protocol status always stay up, regardless of whether an IP address is
configured for the Loopback interface.
▪ The local device directly discards a packet whose destination address is not
the local IP address but the outbound interface is the local Loopback
interface.
Network IP Address Planning
⚫ IP address planning must be considered together with the network structure, routing
protocols, traffic planning, and service rules. In addition, IP address planning should be
corresponding to the network hierarchy and performed in a top-bottom way.
⚫ In conclusion, IP address planning objectives are to achieve easy management, easy
scalability, and high utilization. Reference Planning Rules
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Planning rules:
A. Class A
B. Class B
C. Class C
D. Class D
2. (Multiple) A company is assigned a class C network segment 192.168.20.0/24. One of its departments
has 40 hosts. Which of the following subnets can be allocated? ( )
A. 192.168.20.64/26
B. 192.168.20.64/27
C. 192.168.20.128/26
D. 192.168.20.190/26
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
1. C
2. AC
Summary
⚫ To connect a PC to the Internet, apply an IP address from the Internet Service
Provider (ISP).
⚫ This presentation provides an overview of the IP protocol and describes concepts
related to IPv4 addresses and subnetting.
⚫ This presentation also describes the planning and basic configuration of IP
addresses.
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.