Internet Protocol version 4
|
|
- Lorin Lamb
- 7 years ago
- Views:
Transcription
1 Internet Protocol version 4 Claudio Cicconetti <c.cicconetti@iet.unipi.it> International Master on Communication Networks Engineering 2006/2007
2 Table of Contents IP Addressing Class-based IP addresses IP subnets IP routing Methods of delivery IP address exhaustion problem Private IP addresses Classless Inter-Domain Routing IP datagram IP fragmentation
3 Internet Protocol (IP) IP is a standard protocol with STD number 5 (see IP is the protocol that hides the underlying physical network by creating a virtual network view. It is an unreliable, best-effort, and connectionless packet delivery protocol.
4 Internet Protocol (IP) Best-effort means that datagrams may: belost; arrive out of order; even be duplicated. IP assumes that higher layer protocols (e.g., TCP) will address these anomalies. This makes IP a very robust network protocol. In fact, the US DoD intended to deploy a network that would still be operational if parts of the country were destroyed.
5 IP Addressing In any network protocol, such as IP, addressing is needed to allow any two hosts to communicate between each other. IP addresses are represented by a 32-bit unsigned binary value, which is usually expressed in a dotted decimal format (e.g., ) because the numeric form (e.g., ) is hard to read.
6 IP Addressing The binary format of the 32-bit IP address is: An easier way to remember IP addresses is by assigning to them a name (e.g., which is resolver through the Domain Name System (DNS).
7 IP Addressing Strictly speaking, an IP address identifies an interface that is capable of sending and receiving IP datagrams. One system can have multiple such interfaces. Usually, hosts have only one interface (thus, one IP address), whereas routers have many interfaces (thus, many IP addresses).
8 IP Addressing IP datagrams (the basic data packets exchanged between hosts) are transmitted by a physical network attached to the host. Each IP datagram contains a source IP address and a destination IP address.
9 Class-based IP addresses There are five classes of IP addresses. The prefix is referred to as the network part, the suffix as the host part.
10 Class-based IP addresses The division of an IP address into two parts also separates the responsibility for selecting the complete IP address. The network number portion of the address is assigned by the Regional Internet Registries (RIRs). The host number portion is assigned by the authority controlling the network.
11 Class-based IP addresses Not all suffixes are available: all 0 s: this address refers to the network itself, e.g., means the whole network 10.*. all 1 s: this is the directed broadcast for this network, e.g., means all the hosts on network 10.*.
12 Class-based IP addresses The Class A network is defined as the loopback network. Usually, the host part is set to 1, which results in being the loopback IP address of the host. Addresses from that network are assigned to interfaces that process data within the local system. Thus, these loopback interfaces never access a physical network.
13 Class-based IP addresses Class A addresses These addresses use 7 bits for the network and 24 bits for the host portion of the IP address. This allows for (126) networks (both 0 and 127 are reserved values) each with (16,777,214) hosts, for a total of 2,113,928,964 available addresses.
14 Class-based IP addresses Class B addresses These addresses use 14 bits for the network and 16 bits for the host portion of the IP address. This allows for 2 14 (16384) networks each with (65,534) hosts, for a total of 1,073,709,056 available addresses.
15 Class-based IP addresses Class C addresses These addresses use 21 bits for the network and 8 bits for the host portion of the IP address. This allows for 2 21 ( ) networks each with (254) hosts, for a total of 532,676,608 available addresses.
16 Class-based IP addresses Class D addresses are reserved for multicasting (a sort of broadcasting, but not in a limited area, and only to hosts using the same class D addresses). Class E addresses are reserved for future use (likely, they will never be used at all).
17 Class-based IP addresses A Class A address is suitable for networks with an extremely large number of hosts. Class C addresses are suitable for networks with a small number of hosts. This means that medium-sized networks (those with more than 254 hosts or where there is an expectation of more than 254 hosts) must use Class B addresses.
18 Class-based IP addresses However, the number of small- to mediumsized networks has been growing very rapidly. It was feared that if this growth had been allowed to continue unabated, all of the available Class B network addresses would have been used by the mid-1990s. This is known as the IP address exhaustion problem.
19 IP subnets An additional problem of the original IP addressing scheme was that it required a centralized authority, i.e., the RIR, to assign network numbers. This problem was then solved through IP subnetting, which allows the network administrator to locally partition her network into several IP subnets.
20 IP subnets The host number part of the IP address is subdivided into a second network number (i.e., subnet) and a host number. The entire network still appears as one IP network to the outside world. Thus, a host within a network that has subnets is aware of the subnetting structure. A host in a different network is not. This remote host still regards the local part (subnet + host) of the IP address as a host number.
21 IP subnets Any bits in the local portion can be used to form the subnet. The division is done using a 32-bit subnet mask, which is usually written in dotted decimal form network subnet- --host network mask
22 IP subnets The special treatment of all bits zero and all bits one applies to each of the three parts of a subnetted IP address just as it does to both parts of an IP address that has not been subnetted. There are two types of subnetting: static subnetting, i.e., all subnets have the same prefix; variable subnetting, i.e., subnets may have different prefixes.
23 IP subnets For example, assume that you have been assigned an address pool ( /24) to be subnetted so as to serve a set of 6 LANs with the following requirements: LAN 1: 2 hosts LAN 3: 2 hosts LAN 5: 2 hosts LAN 2: 2 hosts LAN 4: 2 hosts LAN 6: 30 hosts
24 IP subnets An example of variable length subnetting is : /27 -> 30 hosts (30 needed) /30 -> 2 hosts (2 needed) /30 -> 2 hosts (2 needed) /30 -> 2 hosts (2 needed) /30 -> 2 hosts (2 needed) /30 -> 2 hosts (2 needed) With static subnetting you can have: /27 -> 30 hosts (30 needed) /27 -> 30 hosts (2 needed) /27 -> 30 hosts (2 needed) /27 -> 30 hosts (2 needed) /27 -> 30 hosts (2 needed) /27 -> 30 hosts (2 needed)
25 IP subnets For example, assume that you have been assigned the Class C network , and you need to partition the networks so that the following requirements are satisfied: LAN 1: 50 hosts LAN 2: 50 hosts LAN 3: 50 hosts LAN 4: 30 hosts LAN 5: 30 hosts
26 IP subnets This cannot be achieved with static subnetting, because you would require five subnets, each allowing up to 64 hosts (i.e., masks). However, you can accomplish your task with variable length subnetting, by partitioning the network into three subnetworks, and two subnetworks.
27 IP routing Whenever a host has a physical connection to multiple networks or subnets, it is described as being multi-homed. Typically, a multihomed host has different IP addresses associated with all its network adapters, each connected to a different subnet or network. Such a multi-homed host is usually employed as router.
28 IP routing A router forwards incoming IP datagrams towards a destination through a physical interface. Its decisions are based on the datagrams destination IP addresses, according to its routing table.
29 IP routing Four kinds of destinations: hosts or networks that are directly attached to one of the physical networks to which the router is attached (e.g., / ); hosts or networks for which the router has been given explicit definitions (e.g., / ); hosts or networks for which the router has received an ICMP redirect message; adefault for all other destinations (e.g., last entry of the routing table above).
30 IP routing There are many Interior Gateway Protocols (IGPs), such as: Open Shortest Path First (OSPF); Routing Information Protocol (RIP); Interior Gateway Routing Protocol (IGRP); Enhanced IGRP (EIGRP). On the other hand, the most common Exterior Gateway Protocol (EGP) is the Border Gateway Protocol version 4 (BGP4).
31 IP routing If the destination host is attached to the same physical network as the source host, IP datagrams can be directly exchanged. This is done by encapsulating the IP datagram in the physical network frame. This is called direct routing. Indirect routing occurs when the destination host is not connected to a network directly attached to the source host. The only way to reach the destination is via one or more IP routers.
32 IP routing lan /26 Host A Router R lan0: lan1: lan /26 Host B Host C
33 IP routing Host B communicates directly with Host B. Host A communicates with Host B and Host C indirectly via Route R. Router R routing table: Destination Netmask Interface Next-hop lan lan1 Host A routing table: Destination Netmask Interface Next-hop lan lan
34 IP routing
35 IP routing Even though Host A and Host B are connected to the same physical network, they cannot communicate directly, because they belong to different logical subnetwork. Router R routing table: Destination Netmask Interface Next-hop lan lan0 Host A routing table: Destination Netmask Interface Next-hop lan lan
36 IP routing Without subnetting, IP uses the following algorithm to route datagrams: Is the destination IP network address equal to my IP network address? If so, send the IP datagram on local network. Otherwise send the IP datagram to the router corresponding to the destination IP network address.
37 IP routing With subnetting, IP uses the following algorithm to route datagrams: - Is (destination IP address & subnet mask) equal to (my IP address & subnet mask)? - If so, send the IP datagram on local network. - Otherwise send IP datagram to router corresponding to the destination IP (sub)network address.
38 Methods of delivery The majority of IP addresses refer to a single recipient, this is called a unicast address. Unicast connections specify a one-to-one relationship between a single source and a single destination. Additionally, there are three special types of IP addresses used for addressing multiple recipients: broadcast addresses, multicast addresses and anycast addresses.
39 Methods of delivery Broadcast addresses are never valid as a source address. They must specify the destination address. Different types of broadcast addresses: limited broadcast address; network-directed broadcast address; subnet-directed broadcast address; all-subnets-directed broadcast address.
40 Methods of delivery Limited broadcast address Address (all bits 1 in all parts of the IP address), meaning all hosts on the local subnet. Routers do not forward this packet.
41 Methods of delivery Network-directed broadcast address This is used in an unsubnetted environment, with the host part being all 1 s, e.g., , meaning all hosts on a network. Routers should forward these broadcast messages.
42 Methods of delivery With multicasting, any host in the Internet can associate to a multicast group, which is identified by a Class D multicast address. Packets sent to a multicast address are forwarded only to the members of the corresponding host group, which allows for one-to-many connections. E.g., used for audio/video brodcasting.
43 Methods of delivery With anycasting (not available in IPv4), hosts can be grouped into anycast pools, which are considered by the network to be interchangeable. When a remote host sends an IP datagram to an anycast address, that datagram is delivered to any of the hosts in the pool. E.g., used for web proxies.
44 The IP address exhaustion problem The number of networks on the Internet has been approximately doubling annually for a number of years. Nearly all of the new networks assigned in the late 1980s were Class B, and in 1990 it became apparent that if this trend continued, the last Class B network number would be assigned during On the other hand, Class C networks were hardly being used.
45 The IP address exhaustion problem To mitigate the exhaustion problem, Class B networks have been only assigned to organizations that: have a subnetting plan that documents more than 32 subnets within its organizational network; have more than 4096 hosts. Otherwise, a consecutively numbered block of Class C network numbers are assigned instead. Any requirements for a Class A network would be handled on an individual case basis.
46 Private IP addresses Another approach to conserve the IP address space is to use private IP addresses. Private IP addresses do not need to be unique within the Internet. However, hosts with private IP addresses cannot communicate with hosts outside their local networks.
47 Private IP addresses Three ranges of addresses have been reserved for this purpose: , as a single Class A network; through , as 16 contiguous Class B networks; through , as 256 contiguous Class C networks. These addresses can be used without requesting authorization from the RIR.
48 Classless Inter-Domain Routing While subnetting and careful assignment of IP addresses mitigated the IP address exhaustion problem, a new issue arised: the routing table explosion problem. Assume an organization has 4000 hosts. Then, it cannot be assigned a Class B network, and is allocate 16 Class C networks instead. This requires 16 entries in the routing table of every router in the world for the same organization.
49 Classless Inter-Domain Routing The solution to this problem is called Classless Inter-Domain Routing (CIDR). CIDR does not route according to the class of the network number (hence the term classless). On the other hand, it is based solely on the high order bits of the IP address.
50 Classless Inter-Domain Routing Each CIDR routing table entry contains a 32-bit IP address and a 32-bit network mask, which together give the length and value of the IP prefix: <IP_address> <network_mask> For example, to address a block of eight Class C addresses with one single routing table entry, the following representation suffices: < > < >
51 Classless Inter-Domain Routing This process of combining multiple networks into a single entry is referred to as supernetting. Routing is based on network masks that are shorter than the natural network mask of an IP address. This contrasts subnetting where the subnet masks are longer than the natural network mask.
52 Classless Inter-Domain Routing Supernetting example = (class C address) (network mask) ======== ======== ======== ======== logical_and = (IP prefix) = (class C address) (network mask) ======== ======== ======== ======== logical_and = (same IP prefix)
53 IP datagram The unit of transfer in an IP network is called an IP datagram. It consists of an IP header and data relevant to higher level protocols.
54 IP datagram
55 IP datagram VER is the field that contains the IP protocol version. The current version is 4. 5 is an experimental version. 6 is the version for IPv6. HLEN is the length of the IP header in multiples of 32 bits, without the data field. The minimum value for a correct header is 5 (i.e., 20 bytes), the maximum value is 15 (i.e., 60 bytes).
56 IP datagram Service Type The service type is an indication of the quality of service requested for this IP datagram. It contains the following information. Precedence specifies the nature/priority: 000: Routine 001: Priority 010: Immediate 011: Flash 100: Flash override 101: Critical 110: Internetwork control 111: Network control
57 IP datagram TOS specifies the type of service value: 1000: Minimize delay 0100: Maximize throughput 0010: Maximize reliability 0001: Minimize monetary cost 0000: Normal service The last bit is reserved for future use.
58 IP datagram Total Length specifies the total length of the datagram, header and data, in octets. Identification is a unique number assigned by the sender used with fragmentation. Flags contains control flags: the first bit is reserved and must be zero; the 2nd bit is DF (Do not Fragment), 0 means allow fragmentation; the third is MF (More Fragments), 0 means that this is the last fragment.
59 IP datagram Fragment Offset is used to reassemble the full datagram. The value in this field contains the number of 64-bit segments (header bytes are not counted) contained in earlier fragments. If this is the first (or only) fragment, this field contains a value of zero. TTL (Time to Live) specifies the time (in seconds) the datagram is allowed to travel. In practice, this is used as a hop counter to detect routing loops.
60 IP datagram Protocol Number indicates the higher level protocol to which IP should deliver the data in this datagram. E.g., ICMP = 1; TCP = 6; UDP = 17. Header Checksum is a checksum for the information contained in the header. If the header checksum does not match the contents, the datagram is discarded. Source/Destination IP Addresses are the 32-bit source/destination IP addresses.
61 IP datagram IP Options is a variable-length field (there may be zero or more options) used for control or debugging and measurement. For instance: the loose source routing option provides a means for the source of an IP datagram to supply explicit routing information; the timestamp option tells the routers along the route to put timestamps in the option data. Padding is used to ensure that the IP header ends on a 32 bit boundary. The padding is zero.
62 IP fragmentation IP provides fragmentation/reassembly of datagrams. The maximum length of an IP datagram is 65,535 octets. When an IP datagram travels from one host to another, it may pass through different physical networks. Each physical network has a maximum frame size, called maximum transmission unit (MTU), which limits the datagram length.
63 IP fragmentation A fragment is treated as a normal IP datagram while being transported to their destination. Thus, fragments of a datagram each have a header. If one of the fragments gets lost, the complete datagram is considered lost. It is possible that fragments of the same IP datagram reach the destination host via multiple routes. Finally, Since they may pass through networks with a smaller MTU than the sender s one, they are subject to further fragmentation.
64 Fragment #2 Fragment #1 H H H Fragment #1 Fragment #2 H H Fragment #1 H Fragment #2 H Fragment #1 Fragment #2 H H H IP fragmentation IP datagram Fragment #1 H Fragment #2 H IP datagram
65 IP fragmentation
66 IP fragmentation Fragmentation process: The DF flag bit is checked to see if fragmentation is allowed. If the bit is set, the datagram will be discarded and an ICMP error returned to the originator. Based on the MTU value, the data field is split into two or more parts. All newly created data portions must have a length that is a multiple of 8 octets, with the exception of the last data portion. Each data portion is placed in an IP datagram.
67 IP fragmentation LEN = 1500 OFFSET = 0 DF = 0, MF = 1 LEN = 3499 OFFSET = 0 DF = 0, MF = 0 DATA (3500 bytes) MTU = 1500 DATA (1500 bytes) LEN = 1500 OFFSET = 1500 DF = 0, MF = 1 DATA (1500 bytes) LEN = 499 OFFSET = 3000 DF = 0, MF = 0 DATA (499 bytes)
68 IP fragmentation Modification to the headers of fragments: the MF flag is set in all fragments except the last; the fragment offset field is updated; if options were included in the original datagram, they may be copied to all fragment datagrams or only the first datagram (depends on the option); the header length field is set; the total length field is set; the header checksum is re-calculated.
69 IP fragmentation At the destination host, data are reassembled into the original datagram. The identification field set by the sending host is used together with the source and destination IP addresses in the datagram. Fragmentation does not alter this field. In order to reassemble the fragments, the receiving host allocates a storage buffer when the first fragment arrives.
70 IP fragmentation The host also starts a timer. If the timer is exceeded and fragments remain outstanding, the datagram is discarded (in linux this value, in seconds, is stored into /proc/sys/net/ipv4/ipfrag_time). When subsequent fragments of the datagram arrive, data are copied into the buffer storage at the location indicated by the fragment offset field. When all fragments have arrived, the original unfragmented datagram is restored and passed to upper layers, if needed.
Internet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
More information2.1.2.2.2 Variable length subnetting
2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationFuture Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationInternet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationIP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationIP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationInternet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationInternet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationThe Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
More information- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationSavera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More information1. How many unique network IDs are there in class A addresses? # of unique hosts?
CS445: IPv4 Addresses In-class activity Names: Part 1: Address Classes Original three classes of IPv4 addresses: A: 0 network (7 bits) host (24 bits) B: 10 network (14 bits) host (16 bits) C: 110 network
More informationInternet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
More informationScaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1
Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationAdvanced IP Addressing
Advanced IP Addressing CS-765 A Aspects Of Systems Administration Spring-2005 Instructure: Jan Schauman Stevens Institute Of Technology, NJ. Prepared By: Modh, Jay A. M.S. NIS SID: 999-14-0352 Date: 05/02/2005
More informationAddress Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi
More informationIP Subnetting. Subnetting
IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationIP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
More informationHow To Make A Network Address Prefix Smaller
CSC521 Communication Protocols 網 路 通 訊 協 定 Ch.9 Classless And Subnet Address Extensions (CIDR) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Review Of Relevant Facts 3. Minimizing Network Numbers
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationLecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationInternet Protocol Version 6 (IPv6)
Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationCS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationIP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
More informationModule 2: Assigning IP Addresses in a Multiple Subnet Network
Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations
More informationPART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationIP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
More informationICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More information(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationWHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know
WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3
More informationIP Addressing and Subnetting, Including IPv6
Untitled Document Page 1 of 1 IP Addressing and Subnetting, Including IPv6 Author: J. D. Wegner, Robert Rockell ISBN: 1928994016 Published: 2000 Publisher: Syngress Media See Table of Contents IP Addressing
More informationChapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationGary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
More informationTCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
More informationIPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011
IPv4 Addressing Simplified by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 The concept of IP Addressing is foundational to overall routing in general. Without
More informationModule 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
More informationPPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK)
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) September 2011 Zielsetzung Von unserer Webpage: Das Ziel dieser PPS-Veranstaltung ist es,
More informationThemen der Praktikumsnachmittage. PPS Internet-Praktikum. Zielsetzung. Infrastruktur im ETF B5
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) Themen der Praktikumsnachmittage Aufbau und Analyse eines kleinen Netzwerks Routing Anwendungen
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationWe Are HERE! Subne\ng
TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationInternet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
More informationSUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com
Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et
More informationComputer Networks. Main Functions
Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching
More informationiseries TCP/IP routing and workload balancing
iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted
More informationVLSM and CIDR Malin Bornhager Halmstad University
VLSM and CIDR Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Classless routing VLSM Example of a VLSM calculation 2 Classless routing CIDR (Classless
More informationInternet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing
Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationLab#2: IP Addressing and Subnetting
IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by
More informationSUBNETS, CIDR, AND CLASSLESS ADDRESSING
Announcements SUBNETS, CIDR, AND CLASSLESS ADDRESSING Internet Protocols CSC / ECE 573 Fall, 005 No office hours tomorrow (Wednesday) out of town No class on Thursday Fall break! Midterm exam next Tuesday!
More informationGuide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics
Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe
More information101 Application Delivery Fundamentals
CERTIFIED F5 STUDY GUIDE Eric Mitchell Channel SE, East US and Federal F5 Networks Contents Overview 4 Printed References 4 Section 1 - OSI 5 Objective - 1.01 Explain, compare, and contrast the OSI layers
More informationClassful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics
Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer
More informationComputer Networks and the Internet
Computer Networks and the Internet Wolfgang Schreiner Research Institute for Symbolic Computation (RISC-Linz) Johannes Kepler University Wolfgang.Schreiner@risc.uni-linz.ac.at http://www.risc.uni-linz.ac.at/people/schreine
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationInternetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
More informationWhat methods / approaches do you know, to realize a CSMA / CA access?
Chapt 2.3 Lay 3 Network Lay 1 Warm up! What methods / approaches do you know, to realize a CSMA / CA access? Explain the diffence between an adressed based and an Information based Lay 2 addressing. consid
More informationChapter 19 Network Layer: Logical Addressing 19.1
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that
More information