1 Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same IP address. All IP addresses are 32 bits long. IP address space managed by Internet Assigned Numbers Authority (IANA) Hosts within enterprises that use IP can be partitioned into three categories: - Category 1: Hosts that do not require access to hosts in other enterprises or the Internet at large; hosts within this category may use IP addresses that are unambiguous within an enterprise, but may be ambiguous between enterprises. - Category 2: hosts that need access to a limited set of outside services (e.g., , FTP, netnews, remote login)which can be handled by mediating gateways (e.g., application layer gateways). For many hosts in this category an unrestricted external access (provided via IP connectivity) may be unnecessary and even undesirable for privacy/security reasons. Just like hosts within the first category, such hosts may use IP addresses that are unambiguous within an enterprise, but may be ambiguous between enterprises. - Category 3: hosts that need network layer access outside the enterprise (provided via IP connectivity); hosts in the last category require IP addresses that are globally unambiguous. We will refer to the hosts in the first and second categories as "Private". We will refer to the hosts in the third category as "Public". The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets:
2 (10/8 prefix) (172.16/12 prefix) ( /16 prefix) We will refer to the first block as "24-bit block", the second as "20-bit block", and to the third as "16-bit" block. Note that (in pre-cidr notation) the first block is nothing but a single class A network number, while the second block is a set of 16 contiguous class B network numbers, and third block is a set of 256 contiguous class C network numbers. Special IP Addresses represents this host 0 used as the network number represents this network (so hosts don t need to know their own network number, only its class) used for broadcast in the local net All 1 s used as the host number used for broadcast in remote networks 127.x.y.z used for loop-back testing (packets not put on the wire) Datagram Format of IP Protocol
3 Version: The first 4-bit field in a datagram contains the version of the IP protocol that is used. There are two versions, one is IPv4 and IPv6. So it either consists of value 4 or 6. It is used to verify that the sender, receiver and any routers in between them agree on the format of the datagram. Currently we are using version 4, IPv6 is also knows as next generation IP, which will be used in future. Currently lot of research is going on IPv6. For more discussion on IPv6 refer to Comer. IHL: IHL is an acronym for Internet Header length. IHL is of 4 bits, as its name itself says, it contains the length of the header, which is actually whole length of the packet minus the length of data. Type Of Service: This type of service field is one byte in length, and it specified how the datagram should be handled. It is internally divided into three bits D, T, R. D specifies Delay, T species Throughput, and R specified Reliability. So general trend is to achieve low Delay, high Throughput, and high reliability. Total Length: The total length field gives the length of the datagram as a whole. The size of data can be computed, by subtracting IHL from Total Length. Identification, DF, MF, Fragment Offset: In the ideal case, the entire IP datagram fits into one physical frame, making transmission across network efficient. To achieve such efficiency, the designers of IP must agree upon maximum datagram size. But what size need to be chosen. Each packet switching technology places a fixed upper bound on the amount of data that can be transferred in one physical frame. For example, Ethernet limits the maximum size of data unit as 1500 bytes. We refer to these limits as the Maximum Transfer Unit. MTU sizes can be quite small also; it depends upon the hardware technologies. Limiting datagrams to fit the smallest possible MTU in the internet makes transfer inefficient when datagrams pass across the network that can carry long size frames. However, allowing datagrams to be larger than the minimum network MTU, means that the datagram may not always fit into a single network frame. So instead of depending upon the hardware constraints, IP protocol designers agreed upon choosing a minimum datagram size. In case datagram happens to be greater than that minimum size, they need to be fragmented into multiple parts. Each part will have the header part repeated. Refer to the following scenario In the figure, both hosts attach directly to Ethernets (Ethernet have an MTU of 1500 bytes). Thus both hosts can exchange datagrams up to 1500 bytes long. The path between them
4 includes a network, which can only handle 620 bytes of MTU. Now, if host A sends a MTU greater than 620 bytes, router R 1 will fragment the datagram. Similar is the case with B. Fragment size is chosen, such that it can easily ship across the network. Let s now return back to those fields. The fields Identification, DF, MF, and Fragment Offset control fragmentation and reassembly of the datagram. Field Identification contains a unique integer that identifies the datagram. Whenever a router fragments a datagram, it copies most of the fields in the header into each fragment. Its primary purpose is to make easier for the destination to know which fragments belong to which datagrams. For a fragment, fragment Offset, specifies the offset in the original datagram of the data being carried in the fragment, measured in units of 8 bytes. Refer figure above. Since fragments usually don t arrive in order, destination can arrange the fragments in order, depending upon the values of the offset. DF stands for Don t Fragment, If DF is set to 1 in a datagram, means that datagram cannot be fragmented. So whenever a router wants to fragment a datagram with DF bit sit, the router discards the datagram and sends the error report back to the source. Error reports are sent using another protocol called as ICMP (Internet Control Message Protocol). MF stands for More Fragment. It provides information to the receiver about the last fragment. This means that if MF bit is set to 1 in a particular fragment, this means that some more fragments are still expected, but if the MF bit is set to 0, this means that it is the last fragment. So this helps the receiver to arrange the fragments and convert them back in to datagram. So from the fragment offset and total length (Total length field in the fragment refers to the whole length of fragment and not of datagram), destination computes the total length of the original datagram. Then by examining the fragment offset and MF, destination can assure that whether all the fragments have arrived or not and finally arrange them in order. TTL: TTL is an acronym for Time To Live. It specifies for how much time the datagram is allowed to remain in the internet system or network. Whenever a computer (source) issues a datagram into the internet, it sets a maximum time in TTL field, that the datagram should survive. Each Routers through which the datagram is processed, must decrement the value of TTL field by 1. Whenever value in TTL field reaches 0, the router processing that datagram discard it and sends an error message back to the source (using ICMP). Protocol: This field contains the name of the higher level protocol (protocol that can be used in transport layer). Two such protocols that can be present in the field are TCP and UDP. Header Checksum: Header checksum is present to ensure the integrity of header values.
5 Source IP address: Source IP address contains the IP address of the source machine. Destination IP address: Destination IP address contains the IP address of the destination machine. Data: The field Data contains the actual data that need to be sent from source to the destination. Options: The IP Options following the destination address is not required in every datagram; primarily meant for testing or debugging. Each option consists of a single option code, which may be followed by data octets. The option code octet is divided into three fields as shown in figure below. When the COPY bit is set to 1, it means that option should be copied into all fragments. The OPTION CLASS field specified the general class of the option, and the OPTION NUMBER is the number of the respective option in that option class For example: Option Class 0 and Option Number 7, specifies Record Route option Option Class 0 and Option Number 9, specifies Strict Source Route option. Option Class 2 and Option Number 4, specifies Internet timestamp. Used to record timestamps along the route. The Record Route option allows the source to create an empty list of IP addresses, which are filled by the individual routers along the path to the destination i.e. each intermediate router enters its IP address in the empty list. The Source Route option provides a way for the sender to dictate a path through the internet. So source himself provides the sequence of IP addresses in the datagram before sending, and the datagram is bound to follow through those IP addresses only. This kind of routing is called as strict source routing. The timestamp option like the record route option in that the time stamp option contains an empty list, and each intermediate router from the source to the destination fills in the 32-bit integer timestamp. Subnetting The following are the important terms that one should now to understand subnetting. Address Subnet The unique number ID assigned to one host or interface in a network. A portion of a network sharing a particular subnet address.
6 Subnet mask A 32-bit combination used to describe which portion of an address refers to the subnet and which part refers to the host. Interface A network connection. An IP address is an address used to uniquely identify a device on an IP network. The address is made up of 32 binary bits which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in dotted decimal format (for example, ). The value in each octet ranges from 0 to 255 decimal, or binary. Here is how binary octets convert to decimal: The right most bit, or least significant bit, of an octet will hold a value of 2 0. The bit just to the left of that will hold a value of 2 1. This continues until the left-most bit, or most significant bit, which will hold a value of 2 7. So if all binary bits are a one, the decimal equivalent would be 255 as shown below ( =255) Here is a sample octet conversion when not all of the bits are set to ( =65) And this is sample shows an IP address represented in both binary and decimal (decimal) (binary) These octets are broken down to provide an addressing scheme that can accommodate large and small networks. There are five different classes of networks, A to E. This document focuses on addressing classes A to C, since classes D and E are reserved and discussion of them is beyond the scope of this document. Note: Also note that the terms "Class A, Class B" and so on are used in this document to help facilitate the understanding of IP addressing and subnetting. These terms are rarely used in the industry anymore because of the introduction of classless intra domain routing (CIDR). Given an IP address, its class can be determined from the three high-order bits. The following shows the significance in the three high order bits and the range of addresses that fall into each class. For informational purposes, Class D and Class E addresses are also shown. In a Class A address, the first octet is the network portion, so the Class A example above has a major network address of 10. Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into subnets and hosts as she sees fit. Class A addresses are used for networks that have more than 65,536 hosts (actually, up to 16,777,216 hosts!).
7 In a Class B address, the first two octets are the network portion, so the Class B example above has a major network address of Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B addresses are used for networks that have between 256 and 65,536 hosts. In a Class C address, the first three octets are the network portion. The Class C example above has a major network address of Octet 4 (8 bits) is for local subnets and hosts - perfect for networks with less than 256 hosts. An IP address is an address used to uniquely identify a device on an IP network. The address is made up of 32 binary bits which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in dotted decimal format (for example, ). The value in each octet ranges from 0 to 255 decimal, or binary. Here is how binary octets convert to decimal: The right most bit, or least significant bit, of an octet will hold a value of 2 0. The bit just to the left of that will hold a value of 2 1. This continues until the left-most bit, or most significant bit, which will hold a value of 2 7. So if all binary bits are a one, the decimal equivalent would be 255 as shown below ( =255) Here is a sample octet conversion when not all of the bits are set to ( =65) And this is sample shows an IP address represented in both binary and decimal (decimal) (binary) These octets are broken down to provide an addressing scheme that can accommodate large and small networks. There are five different classes of networks, A to E. This document focuses on addressing classes A to C, since classes D and E are reserved and discussion of them is beyond the scope of this document. Note: Also note that the terms "Class A, Class B" and so on are used in this document to help facilitate the understanding of IP addressing and subnetting. These terms are rarely used in the industry anymore because of the introduction of classless intra domain routing (CIDR). Given an IP address, its class can be determined from the three high-order bits. The following shows the significance in the three high order bits and the range of addresses that fall into each class. For informational purposes, Class D and Class E addresses are also shown.
8 In a Class A address, the first octet is the network portion, so the Class A example above has a major network address of 10. Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into subnets and hosts as she sees fit. Class A addresses are used for networks that have more than 65,536 hosts (actually, up to 16,777,216 hosts!). In a Class B address, the first two octets are the network portion, so the Class B example above has a major network address of Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B addresses are used for networks that have between 256 and 65,536 hosts. In a Class C address, the first three octets are the network portion. The Class C example above has a major network address of Octet 4 (8 bits) is for local subnets and hosts - perfect for networks with less than 256 hosts.
9 Network Masks A network mask helps you know which portion of the address identifies the network and which portion of the address identifies the node. Class A, B, and C networks have default masks, also known as natural masks, as shown below. Class A: Class B: Class C: An IP address on a Class A network that has not been subnetted would have an address/mask pair similar to: To see how the mask helps you identify the network and node parts of the address, convert the address and mask to binary numbers = = Once you have the address and the mask represented in binary, then identifying the network and host ID is easier. Any address bits which have corresponding mask bits set to 1 represent the network ID. Any address bits that have corresponding mask bits set to 0 represent the node ID = = net id host id netid = = 8 hostid = = Understanding Subnetting Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you will only be able to use one network from your Class A, B, or C network, which is unrealistic. Each data link on a network must have a unique network ID, with every node on that link being a member of the same network. If you break a major network (Class A, B, or C) into smaller subnetworks, it allows you to create a network of interconnecting subnetworks. Each data link on this network would then have a unique network/subnetwork ID. Any device, or gateway, connecting n networks/subnetworks has n distinct IP addresses, one for each network / subnetwork that it interconnects. To subnet a network, extend the natural mask using some of the bits from the host ID portion of the address to create a subnetwork ID. For example, given a Class C network of which has a natural mask of , you can create subnets in the following manner
10 sub ---- By extending the mask to be , you have taken three bits (seen above as "sub") from the original host portion of the address and used them to make subnets. With these three bits, it is possible to create eight subnets. With the remaining five host ID bits, each subnet can have up to 32 host addresses, 30 of which can actually be assigned to a device since host ids of all zeros or all ones are not allowed (it is very important to remember this). So, with this in mind, the following subnets have been created host address range 1 to host address range 33 to host address range 65 to host address range 96 to host address range 129 to host address range 161 to host address range 193 to host address range 225 to 254 Note: There are two ways to denote the above masks. First, since you are using three bits more than the "natural" Class C mask, you can denote these addresses as having a 3-bit subnet mask. Or, secondly, the mask of can also be denoted as /27 as there are 27 bits that are set in the mask. This second method is used with CIDR. Using this method, one of the above networks can be described with the notation prefix/length. For example, /27 denotes the network When appropriate the prefix/length notation is used to denote the mask throughout the rest of this document. Using the network subnetting scheme above, which allows for eight subnets, the network might appear as shown below. Notice that each of the routers above is attached to four subnetworks, one subnetwork is common to both routers. Also, each router has an IP address for each subnetwork to which it is attached. Each subnetwork could potentially support up to 30 host addresses. This brings up an interesting point. The more host bits you use for a subnet mask, the more subnets you have available. However, the more subnets available, the less host addresses available per subnet. For example, a Class C network of and a mask of (/27) allows you to have eight subnets, each with 32 host addresses (30 of
11 which could be assigned to devices). If you use a mask of (/28), the break down is as follows sub --- Since you now have four bits to make subnets with, you only have four bits left for host addresses. So in this case you can have up to 16 subnets, each of which can have up to 16 host addresses (14 of which can be assigned to devices). Take a look at how a Class B network might be subnetted. If you have network ,then you know that its natural mask is or /16. Extending the mask to anything beyond means you are subnetting. You can quickly see that you have the ability to create a lot more subnets than with the Class C network above. If you use a mask of (/21), how many subnets and hosts per subnet does this allow for? sub You are using five bits from the original host bits for subnets. This will allow you to have 32 subnets (2 5 ). After using the five bits for subnetting, you are left with 11 bits for host addresses. This will allow each subnet so have 2048 host addresses (2 11 ), 2046 of which could be assigned to devices. Note: In the past, there were limitations to the use of a subnet 0 (all subnet bits are set to zero) and all ones subnet (all subnet bits set to one). Some devices would not allow the use of these subnets.
12 This document was created with Win2PDF available at The unregistered version of Win2PDF is for evaluation or non-commercial use only.
IP Addressing and Subnetting for New Users Document ID: 13788 Contents Introduction Prerequisites Requirements Components Used Additional Information Conventions Understanding IP Addresses Network Masks
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations
CERTIFIED F5 STUDY GUIDE Eric Mitchell Channel SE, East US and Federal F5 Networks Contents Overview 4 Printed References 4 Section 1 - OSI 5 Objective - 1.01 Explain, compare, and contrast the OSI layers
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Module 10 Subnetting Class A, B and C addresses Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d 10.3.5a Basic Subnetting Use the following information and answer the following subnet
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
CE363 Data Communications & Networking Chapter 6 Network Layer: Logical Addressing TCP/IP and OSI model APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT NETWORK Host-Network TRANSPORT NETWORK DATA
SUBNET MASK To define the network and host portions of an address, the devices use a separate 32-bit pattern called a subnet mask. We express the subnet mask in the same dotted decimal format as the IPv4
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Expert Reference Series of White Papers Binary and IP Address Basics of Subnetting 1-800-COURSES www.globalknowledge.com Binary and IP Address Basics of Subnetting Alan Thomas, CCNA, CCSI, Global Knowledge
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) September 2011 Zielsetzung Von unserer Webpage: Das Ziel dieser PPS-Veranstaltung ist es,
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) Themen der Praktikumsnachmittage Aufbau und Analyse eines kleinen Netzwerks Routing Anwendungen
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet
Subnetting Study Guide by Boson Software, LLC An octet is a binary number of 8 bits, with the lowest possible number being 00000000 and the highest possible number being 11111111, or 28. The binary number
then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,
Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
.3 IPv4 Address Subnetting Part Objective Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask. When given an IP address, network
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a 32-bit logical address known as an IP address. This topic introduces the components of an IP address.
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
IPv4 Addressing Simplified by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 The concept of IP Addressing is foundational to overall routing in general. Without
Activity 6.7.4: IPv4 Address Subnetting Part 2 Learning Objectives Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask. Background
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011