IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets"

Transcription

1 Address Classes (Some are Obsolete) Computer Networking Class A 0 Network ID Network ID 8 16 Host ID Host ID Lecture 8 Addressing & Packets Peter Steenkiste Fall Class B 10 Class C 110 Class D 1110 Class E 1111 Multicast Addresses Reserved for experiments 2 Subnetting Add another layer to hierarchy Variable length subnet masks Could subnet a class B into several chunks Network Network Subnet Host Host Subnet Mask Important Concepts Hierarchical addressing critical for scalable system Don t require everyone to know everyone else Reduces number of updates when something changes Interaction with routing tables Sub-netting simplifies network management Break up the network into smaller chunks Managed internally in network 3 4 1

2 Outline CIDR addressing protocol v6 NATs Address Problem (1991) Address space depletion Suppose you need addresses? In danger of running out of classes A and B Class C too small for most domains Very few class A very careful about using them Class B greatest problem Class B sparsely populated But people refuse to give it back Large forwarding tables 2 Million possible class C groups 5 6 Address Utilization ( 97) Classless Inter-Domain Routing (CIDR) RFC1338 Arbitrary split between network & part of address more efficient use of address space Do not use classes to determine network ID Use common part of address as network identifier E.g., addresses have the first 20 bits in common. Thus, we use these 20 bits as the network number /20 Merge forwarding entries smaller tables Use single entry for range in forwarding tables Combined forwarding entries when possible Adjacent in address space and same egress 7 8 2

3 CIDR Example Network is allocated 8 class C chunks, to Move 3 bits of class C address to address Network address is 21 bits: /21 Replaces 8 class C routing entries with 1 entry 8 times But how do s know size of network address? Routing protocols must carry prefix length with address 3 bits Addresses: How to Get One? Network (network portion): Get allocated portion of ISP s address space: ISP's block /20 Organization /23 Organization /23 Organization / Organization / Addresses: How to Get One? How does an ISP get block of addresses? From Regional Internet Registries (RIRs) ARIN (North America, Southern Africa), APNIC (Asia-Pacific), RE (Europe, Northern Africa), LACNIC (South America) How about a single? Hard-coded by system admin in a file DHCP: Dynamic Host Configuration Protocol: dynamically get address: plug-and-play Host broadcasts DHCP discover msg DHCP server responds with DHCP offer msg Host requests address: DHCP request msg DHCP server sends address: DHCP ack msg CIDR Illustration Provider is given /21 Provider / / / /

4 CIDR Implications Outline Longest prefix match!! CIDR addressing Forwarding example Advertise / /23 protocol Provider 1 Provider 2 v / / / /23 or Provider 2 address NATs Host Routing Table Example Routing to the Network Destination Gateway Genmask Iface eth eth lo eth0 From netstat rn Host when plugged into CS ethernet Dest routing to same machine Dest other s on same ethernet Dest special loopback address Dest default route to rest of Internet Main CS : gig.net.cs.cmu.edu ( ) Packet to arrives Path is R2 R1 H1 H2 Provider /16 R H /23 R H3 H H / / /

5 Routing Within the Subnet Routing Within the Subnet Packet to Matches /23 Routing table at R2 Destination Next Hop Interface lo0 Default or 0/0 provider / / / /16 R /23 R H H / H / /24 H Packet to Matches /31 Longest prefix match Routing table at R1 Destination Next Hop Interface lo0 Default or 0/ / / / /16 R /23 R H H3 H H / / / / Outline Service Model CIDR addressing protocol Low-level communication model provided by Internet Datagram Each packet self-contained All information needed to get to destination No advance setup or connection maintenance Analogous to letter or telegram v6 NATs v4 Packet Format version HLen TOS Length Identifier Flag Offset TTL Protocol Checksum Source Address Destination Address Header Options (if any) Data

6 v4 Header Fields v4 Header Fields 3 Version: Version versio TOS Length 1 HLe n n Fl 4 for v4 Identifier ag Offset s TTL Protocol Checksum Source Address HLen: Header Length Destination Address Options (if any) 32-bit words (typically 5) Data TOS: Type of Service Priority information Length: Packet Length Bytes (including header) Header format can change with versions First byte identifies version Length field limits packets to 65,535 bytes In practice, break into much smaller packets for network performance considerations Identifier, flags, fragment offset used for fragmentation Time to live Must be decremented at each Packets with TTL=0 are thrown away Ensure packets exit the network Protocol versio TOS HLe n n Demultiplexing to higher layer protocols Identifier TCP = 6, ICMP = 1, UDP = 17 Header checksum Ensures some degree of header integrity Relatively weak 16 bit Source and destination addresses Options E.g. Source routing, record route, etc. Performance issues Poorly supported Length Fl ag Offset s TTL Protocol Checksum Source Address Destination Address Options (if any) Data Delivery Model Fragmentation Best effort service Network will do its best to get packet to destination Does NOT guarantee: Any maximum latency or even ultimate success Sender will be informed if packet doesn t make it Packets will arrive in same order sent Just one copy of packet will arrive Implications Scales very well Higher level protocols must make up for shortcomings Reliably delivering ordered sequence of bytes TCP Some services not feasible Latency or bandwidth guarantees MTU = 4000 MTU = 2000 MTU = 1500 Every network has own Maximum Transmission Unit (MTU) Largest datagram it can carry within its own packet frame E.g., Ethernet is 1500 bytes Don t know MTUs of all intermediate networks in advance Solution When hit network with small MTU, fragments packet Destination reassembles the paper why?

7 Fragmentation Related Fields Fragmentation Example #1 Length Length of fragment Identification To match up with other fragments Flags Don t fragment flag More fragments flag Fragment offset Where this fragment lies in entire datagram Measured in 8 octet units (13 bit field) MTU = 4000 Length = 3820, M=0 Header Data Fragmentation Example #2 Fragmentation is Harmful Length = 3820, M=0 Header Data MTU = 2000 Length = 2000, M=1, Offset = 0 Header Data Uses resources poorly Forwarding costs per packet Best if we can send large chunks of data Worst case: packet just bigger than MTU Poor end-to-end performance Loss of a fragment 3800 bytes 1980 bytes Length = 1840, M=0, Offset = 1980 Header Data 1820 bytes Path MTU discovery protocol determines minimum MTU along route Uses ICMP error messages Common theme in system design Assure correctness by implementing complete protocol Optimize common cases to avoid full complexity

8 Internet Control Message Protocol (ICMP) MTU Discovery with ICMP Short messages used to send error & other control information Examples Ping request / response Can use to check whether remote reachable Destination unreachable Indicates how packet got & why couldn t go further Flow control Slow down packet delivery rate Redirect Suggest alternate routing path for future messages Router solicitation / advertisement Helps newly connected discover local Timeout Packet exceeded maximum hop limit MTU = 2000 MTU = 1500 MTU = 4000 Typically send series of packets from one to another Typically, all will follow same route Routes remain stable for minutes at a time Makes sense to determine path MTU before sending real packets Operation Send max-sized packet with do not fragment flag set If encounters problem, ICMP message will be returned Destination unreachable: Fragmentation needed Usually indicates MTU problem encountered MTU Discovery with ICMP MTU Discovery with ICMP ICMP Frag. Needed MTU = 2000 MTU = 2000 MTU = 1500 ICMP Frag. Needed MTU = 1500 MTU = 2000 MTU = 1500 MTU = 4000 MTU = 4000 Length = 4000, Don t Fragment Packet Length = 2000, Don t Fragment Packet

9 MTU Discovery with ICMP Important Concepts Packet MTU = 4000 Length = 1500, Don t Fragment MTU = 2000 MTU = 1500 When successful, no reply at level No news is good news Higher level protocol might have some form of acknowledgement Base-level protocol () provides minimal service level Allows highly decentralized implementation Each step involves determining next hop Most of the work at the endpoints ICMP provides low-level error reporting forwarding global addressing, alternatives, lookup tables addressing hierarchical, CIDR service best effort, simplicity of s packets header fields, fragmentation, ICMP Outline CIDR addressing protocol v6 NATs v6 Next generation. Most urgent issue: increasing address space. 128 bit addresses Simplified header for faster processing: No checksum (why not?) No fragmentation (?) Support for guaranteed services: priority and flow id Options handled as next header reduces overhead of handling options V/Pr Length Flow label Next Source address Destination address Hop L

10 v6 Addressing Do we need more addresses? Probably, long term Big panic in 90s: We re running out of addresses! Big worry: Devices. Small devices. Cell phones, toasters, everything. 128 bit addresses provide space for structure (good!) Hierarchical addressing is much easier Assign an entire 48-bit sized chunk per LAN use Ethernet addresses Different chunks for geographical addressing, the v4 address space, Perhaps help clean up the routing tables - just use one huge chunk per ISP and one huge chunk per customer. Sub 010 Registry Provider Subscriber Host Net v6 Autoconfiguration Serverless ( Stateless ). No manual config at all. Only configures addressing items, NOT other things If you want that, use DHCP. Link-local address :: 64 bit interface ID (usually from Ethernet addr) (fe80::/64 prefix) Uniqueness test ( anyone using this address? ) Router contact (solicit, or wait for announcement) Contains globally unique prefix Usually: Concatenate this prefix with local ID globally unique v6 ID DHCP took some of the wind out of this, but nice for zero-conf (many OSes now do this for both v4 and v6) Fast Path versus Slow Path Common case: Switched in silicon ( fast path ) Almost everything Weird cases: Handed to CPU ( slow path, or process switched ) Fragmentation TTL expiration (traceroute) option handling Slow path is evil in today s environment Christmas Tree attack sets weird options, bits, and overloads. Developers can t (really) use things on the slow path for data flow Slows down their traffic If it became popular, they d be in the soup! v6 Header Cleanup Different options handling v4 options: Variable length header field. 32 different options. Rarely used No development / many s/s do not support Worse than useless: Packets w/options often even get dropped! Processed in slow path. v6 options: Next header pointer Combines protocol and options handling Next header: TCP, UDP, etc. Extensions header: Chained together Makes it easy to implement -based options One value hop-by-hop examined by intermediate s Things like source route implemented only at intermediate hops

11 v6 Header Cleanup No checksum Why checksum just the header? Efficiency: If packet corrupted at hop 1, don t waste b/w transmitting on hops 2..N. Useful when corruption frequent, b/w expensive Today: Corruption rare, b/w cheap v6 Fragmentation Cleanup v4: Large MTU Small MTU Router must fragment v6: Discard packets, send ICMP Packet Too Big Similar to v4 Don t Fragment bit handling Sender must support Path MTU discovery Receive Packet too Big messages and send smaller packets Increased minimum packet size Link must support 1280 bytes; 1500 bytes if link supports variable sizes Reduced packet processing and network complexity. Increased MTU a boon to application writers Hosts can still fragment - using fragmentation header. Routers don t deal with it any more Migration from v4 to v6 Outline Interoperability with v4 is necessary for gradual deployment. Alternative mechanisms: Dual stack operation: v6 nodes support both address types Translation: Use form of NAT to connect to the outside world NAT must not only translate addresses but also translate between v4 and v6 protocols Tunneling: tunnel v6 packets through v4 clouds CIDR addressing protocol v6 NATs

12 Altering the Addressing Model Original Model: Every has unique address Implications Any can communicate with any other Any can act as a server Just need to know ID and port number No secrecy or authentication complicates security Packet traffic observable by s and by LANconnected s Possible to forge packets Use invalid source address Easy to address s Private Network Accessing Public Internet W: Workstation S: Server Machine W W Corporation X W S NAT Internet Don t have enough addresses for every in organization Security Don t want every machine in organization known to outside world Want to control or monitor traffic in / out of organization Reducing Addresses Network Address Translation (NAT) W: Workstation S: Server Machine W S Corporation X NAT Internet C: Client C NAT W W C Corporation X C Most machines within organization are used by individuals For most applications, act as clients Small number of machines act as servers for entire organization E.g., mail server, web,.. All traffic to outside passes through firewall (Most) machines within organization don t need actual addresses! Within Organization Assign every an unregistered address addresses 10/8 & /16 unassigned Route within organization by protocol, can do subnetting, Firewall Does not let any packets from internal node escape Outside world does not need to know about internal addresses

13 NAT: Opening Client Connection NAT: Client Request C: Client S: Server C Firewall has valid address Corporation X NAT :1000 Internet :80 S C: Client S: Server C Corporation X NAT :1000 Internet :80 S Client wants to connect to server :80 OS assigns ephemeral port (1000) Connection request intercepted by Int Addr Int Port NAT Port firewall Maps client to port of firewall (5000) Creates NAT table entry 50 source: dest: src port: 1000 dest port: 80 source: dest: src port: 5000 dest port: 80 Int Addr Int Port NAT Port Firewall acts as proxy for client Intercepts message from client and marks itself as sender 51 NAT: Server Response NAT: Enabling Servers C: Client S: Server C Corporation X NAT :1000 Internet :80 S C: Remote Client S: Server Firewall has valid address S Corporation X NAT Internet C source: dest: src port: 80 dest port: 1000 source: dest: src port: 80 dest port: 5000 Int Addr Int Port NAT Port Firewall acts as proxy for client Acts as destination for server messages Relabels destination to local addresses 52 Use port mapping to make servers available Int Addr Int Port NAT Port Manually configure NAT table to include entry for well-known port External users give address :80 Requests forwarded to server 53 13

14 NAT Considerations NAT has to be consistent during a session. Set up mapping at the beginning of a session and maintain it during the session Recall 2nd level goal 1 of Internet: Continue despite loss of networks or gateways What happens if your NAT reboots? Recycle the mapping that the end of the session May be hard to detect NAT only works for certain applications. Some applications (e.g. ftp) pass information in payload Need application level gateways to do a matching translation Breaks a lot of applications. Example: Let s look at FTP NAT is loved and hated - Breaks many apps (FTP) - Inhibits deployment of new applications like p2p (but so do firewalls!) + Little NAT boxes make home networking simple. + Saves addresses. Makes allocation simple

Review: Internet Protocol (IP) 15-441 Computer Networking. IP Address Problem (1991) Review: IP Protocol. IPv6 and NATs

Review: Internet Protocol (IP) 15-441 Computer Networking. IP Address Problem (1991) Review: IP Protocol. IPv6 and NATs Review: Internet Protocol (IP) 15-441 Computer Networking IPv6 and NATs Hour Glass Model Create abstraction layer that hides underlying technology from network application software Make as minimal as possible

More information

Overview. 15-441 Computer Networking. IP Address Classes (Some are Obsolete) Outline. Lecture 9 IP Packets. CIDR IP addressing. Forwarding examples

Overview. 15-441 Computer Networking. IP Address Classes (Some are Obsolete) Outline. Lecture 9 IP Packets. CIDR IP addressing. Forwarding examples Overview 15-441 Computer Networking Lecture 9 Packets Last lecture How does choice of address impact network architecture and scalability? What do addresses look like? This lecture Modern addresses How

More information

Internet Protocols Fall Lectures 7-8 Network Layer Andreas Terzis

Internet Protocols Fall Lectures 7-8 Network Layer Andreas Terzis Internet Protocols Fall 2006 Lectures 7-8 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Forwarding Router Designs Fragmentation

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage

More information

Router Architecture Overview. Input Port Functions. Switching Via Memory. Three types of switching fabrics. Switching Via a Bus

Router Architecture Overview. Input Port Functions. Switching Via Memory. Three types of switching fabrics. Switching Via a Bus Router Architecture Overview Two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP) forwarding grams from incoming to outgoing link Input Port Functions Physical layer: bit-level reception

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Lecture 12: Addressing and Aggregation. CSE 123: Computer Networks Stefan Savage

Lecture 12: Addressing and Aggregation. CSE 123: Computer Networks Stefan Savage Lecture 12: Addressing and Aggregation CSE 123: Computer Networks Stefan Savage Lecture 12 Overview Finish up addressing Class-based addressing Subnetting Classless addressing Address allocation CSE 123

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013 CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols William Stallings Data and Computer Communications Chapter 15 Internetwork Protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection

More information

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

From the previous lecture

From the previous lecture CS 640: Introduction to Computer Networks Aditya Akella Lecture 7 - IP: Addressing and Forwarding From the previous lecture We will cover spanning tree from the last lecture 2 Spanning Tree Bridges More

More information

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1 Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

IP Addressing. IP Addresses. Introductory material.

IP Addressing. IP Addresses. Introductory material. IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

We Are HERE! Subne\ng

We Are HERE! Subne\ng TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

CHAPTER 2 BACKGROUND OF INTERNET PROTOCOL

CHAPTER 2 BACKGROUND OF INTERNET PROTOCOL CHAPTER 2 BACKGROUND OF INTERNET PROTOCOL This chapter presents the background and the using of Internet Protocol version 4 (IPv4). The IPv4 addresses have some problems and limitations. Several solutions

More information

IP Addressing IP Addressing Tópicos Avançados de Redes

IP Addressing IP Addressing Tópicos Avançados de Redes IP Addressing 1 IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting CIDR IP Version 6 addresses 2 IP Addresses 32 bits version (4

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Internet Protocols Fall 2004. Outline

Internet Protocols Fall 2004. Outline Internet Protocols Fall 2004 Lecture 7 Andreas Terzis 9/29/04 Outline Internet Protocol CIDR Forwarding CS 449/Fall 04 2 1 Classless Interdomain Routing (CIDR) Addressing The IP address space is broken

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur Module 6 Internetworking Lesson 2 Internet Protocol (IP) Specific Instructional Objectives At the end of this lesson, the students will be able to: Explain the relationship between TCP/IP and OSI model

More information

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010 IPv4 Addressing There are several non-profit organizations in the world that have the authority for assigning IP addresses to institutions that need access to the Internet. These organizations are (for

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) Relates to Lab 2: A short module on the Internet Control Message Protocol (ICMP). 1 Overview The IP (Internet Protocol) relies on several other protocols to perform

More information

Autumn Oct 21, Oct 21, 2004 CS573: Network Protocols and Standards 1 Oct 21, 2004 CS573: Network Protocols and Standards 2

Autumn Oct 21, Oct 21, 2004 CS573: Network Protocols and Standards 1 Oct 21, 2004 CS573: Network Protocols and Standards 2 IPv4 IP: Addressing, ARP, Routing Protocols and Standards Autumn 2004-2005 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics Subnetting and Supernetting ICMP Address Translation (NAT) Dynamic

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information

Technology Brief IPv6 White Paper.

Technology Brief IPv6 White Paper. Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...

More information

TCP/IP Tutorial. Transmission Control Protocol Internet Protocol

TCP/IP Tutorial. Transmission Control Protocol Internet Protocol TCP/IP Tutorial Transmission Control Protocol Internet Protocol 1 TCP/IP & OSI In OSI reference model terminology -the TCP/IP protocol suite covers the network and transport layers. TCP/IP can be used

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-2 Design Considerations Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments

More information

The Internet/Network Layer

The Internet/Network Layer IP Addresses and Routing Tables Destination Gateway Genmask Flags MSS Window Irtt Iface 138.38.96.0 0.0.0.0 255.255.248.0 U 0 0 0 eth0 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo default 138.38.103.254 0.0.0.0

More information

Компјутерски Мрежи NAT & ICMP

Компјутерски Мрежи NAT & ICMP Компјутерски Мрежи NAT & ICMP Riste Stojanov, M.Sc., Aleksandra Bogojeska, M.Sc., Vladimir Zdraveski, B.Sc Internet AS Hierarchy Inter-AS border (exterior gateway) routers Intra-AS interior (gateway) routers

More information

IPv6 - The Next Generation Internet

IPv6 - The Next Generation Internet IPv6 - The Next Generation Internet Subnetting and Classless Inter-domain Routing (CIDR) improve utilization of IP address space and slow growth of routing information, but at some point, they will not

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG pascal.raemy@asecus.ch Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy , ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Internet Protocol. IP Datagram, Fragmentation and Reassembly

Internet Protocol. IP Datagram, Fragmentation and Reassembly Internet Protocol IP Datagram, Fragmentation and Reassembly IP Datagram Header Data Data (variable length) IP Packet Header number of IP protocol Current version is 4 6 has different header format IP Packet

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Figure 5.1: Issues addressed by network layer protocols. (Figure by Forouzan)

Figure 5.1: Issues addressed by network layer protocols. (Figure by Forouzan) Chapter 5 Network Layer The main responsibility of a network layer protocol is host-to-host data delivery. In doing this, the network layer has to deal with network layer addressing, packetization and

More information

Internet Protocol. Raj Jain. Washington University in St. Louis.

Internet Protocol. Raj Jain. Washington University in St. Louis. Internet Protocol Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 13-1 Overview! Internetworking

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model

More information

Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks

Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site

More information

IPv4 Addresses. Network Layer. Types of IPv4 Addresses. IPv4 Address Classes (old) q 32 bits long q Identifier for host, router interface q Notation:

IPv4 Addresses. Network Layer. Types of IPv4 Addresses. IPv4 Address Classes (old) q 32 bits long q Identifier for host, router interface q Notation: IPv4 Addresses Network Layer q 32 bits long q Identifier for host, router interface q Notation: v Each byte is written in decimal in MSB order, separated by dots v Example: 128.195.1.80 2 Types of IPv4

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Lecture 8. IP Fundamentals

Lecture 8. IP Fundamentals Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities

More information

VLAN und MPLS, Firewall und NAT,

VLAN und MPLS, Firewall und NAT, Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

IPv6 Fundamentals: A Straightforward Approach

IPv6 Fundamentals: A Straightforward Approach IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

ICMP Protocol and Its Security

ICMP Protocol and Its Security Lecture Notes (Syracuse University) ICMP Protocol and Its Security: 1 ICMP Protocol and Its Security 1 ICMP Protocol (Internet Control Message Protocol Motivation Purpose IP may fail to deliver datagrams

More information

Chapter 6 Network Communications and Protocols

Chapter 6 Network Communications and Protocols Chapter 6 Network Communications and Protocols Objectives Explain the function of protocols in a network Describe common protocol suites Guide to Networking Essentials, Fifth Edition 2 Protocols Strictly

More information

Chapter 6 IPv4 Addresses

Chapter 6 IPv4 Addresses Chapter 6 IPv4 Addresses Network Math www.thinkgeek.com 2 Base 10 (Decimal) Number System Digits (10): 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Number of: 10 4 10 3 10 2 10 1 10 0 10,000 s 1,000 s 100 s 10 s 1 s 1,309

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Addresses (You should read Chapter 4 in Forouzan) Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

More information

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

We Are HERE! Dividing Up the Space. Addressing Background. Addressing Strategies. Requirements analysis Flow Analysis Logical Design

We Are HERE! Dividing Up the Space. Addressing Background. Addressing Strategies. Requirements analysis Flow Analysis Logical Design We Are HERE! TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme / Info Sci University of Otago, 21/9/2015 Requirements analysis Flow Analysis

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

This telephone has too many shortcomings to be seriously considered as a means of communication. The device is of no value to us.

This telephone has too many shortcomings to be seriously considered as a means of communication. The device is of no value to us. This telephone has too many shortcomings to be seriously considered as a means of communication. The device is of no value to us. Western Union internal memo, 1876 C H A P T E R 2 IPv6 Addressing After

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

9025- TCP/IP Networking. History and Standards. Review of Numbering Systems. Local Signaling. IP Addressing

9025- TCP/IP Networking. History and Standards. Review of Numbering Systems. Local Signaling. IP Addressing 9025- TCP/IP Networking History and Standards ARPA NCP TCP, IP, ARPANET PARC Collaborative Network Requirements One Protocol? Peer-to-Peer Protocols Documentation and RFCs RFC Categories Where to Find

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Module 1. IP/MAC Addresses and TCP/IP Suite

Module 1. IP/MAC Addresses and TCP/IP Suite Module 1 IP/MAC Addresses and TCP/IP Suite Dr. Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Module 1 Topics 1.1 MAC Address 1.2 Class-based IP

More information

(Refer Slide Time: 01:38 01:37)

(Refer Slide Time: 01:38 01:37) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed

More information

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery

More information

Migrating to an IPv6 Internet while preserving IPv4 addresses

Migrating to an IPv6 Internet while preserving IPv4 addresses A Silicon Valley Insider Migrating to an IPv6 Internet while preserving IPv4 addresses Technology White Paper Serge-Paul Carrasco Abstract The Internet is running out of addresses! Depending on how long

More information

Network Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Network Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Network Layer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross IP addresses: how to get one? Q: how does network get subnet part of IP addr? A: gets allocated

More information

CLASSFUL IPv4 ADDRESSES + DATAGRAM FORWARDING

CLASSFUL IPv4 ADDRESSES + DATAGRAM FORWARDING Today s Lecture CLASSFUL IPv4 ADDRESSES + DATAGRAM FORWARDING Internet Protocols CSC / ECE 573 Fall, 005 N. C. State University I. IPv4 Addresses II. Address Classes III. Special Case Addresses IV. Forwarding

More information