Example Of How The Network Mask Is Used - Hirschmann MS30, Power MICE, MACH 4000, OCTOPUS User Manual

Industrial ethernet gigabit switch
Hide thumbs Also See for MS30, Power MICE, MACH 4000, OCTOPUS:
Table of Contents

Advertisement

Entering the IP parameters

2.1.3 Example of how the network mask is used

In a large network it is possible that gateways and routers separate the man-
agement agent from its management station. How does addressing work in
such a case?
LAN 1
Fig. 8:
Management agent that is separated from its management station by a
router
The management station "Romeo" wants to send data to the management
agent "Juliet". Romeo knows Juliet's IP address and also knows that the
router "Lorenzo" knows the way to Juliet.
Romeo therefore puts his message in an envelope and writes Juliet's IP ad-
dress as the destination address. For the source address he writes his own
IP address on the envelope.
Romeo then places this envelope in a second one with Lorenzo's MAC ad-
dress as the destination and his own MAC address as the source. This pro-
cess is comparable to going from layer 3 to layer 2 of the ISO/OSI base
reference model.
Finally, Romeo puts the entire data packet into the mailbox. This is compa-
rable to going from layer 2 to layer 1, i.e. to sending the data packet over the
Ethernet.
30
Juliet
2.1 Basics IP parameter
Lorenzo
Layer 2 Enhanced with Layer 2 Professional
Romeo
LAN 2
Release 1.0 10/05

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rs30, ms20Rs20

Table of Contents