SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Internet Protocol (IP) and IP Addressing
Prepared By Adugna A.
 IP stands for Internet Protocol
 IP specifies the format of packets, also called
datagrams, and the addressing scheme.
 Most networks combine IP with a higher-
level protocol called Transmission Control
Protocol (TCP), which establishes a virtual
connection between a destination and a
source.
Prepared By Adugna A.
 IP by itself is something like the postal
system.
 It allows you to address a package and drop it
in the system, but there's no direct link
between you and the recipient.
 TCP/IP, on the other hand, establishes a
connection between two hosts so that they
can send messages back and forth for a
period of time.
Prepared By Adugna A.
 Provide a standard means of
communication between devices
 Can’t communicate if speaking two
different languages
Therefore we have a concept called “Protocol”
Prepared By Adugna A.
 Rules and conventions explaining how something
must be done
 Used to describe how devices can communicate
 Protocol also defines the format of Data i.e. : being
exchanged.
If we both utilize the same protocol then you know
how to format data so I will understand it and I know
how to format data so you will understand it
Prepared By Adugna A.
 Each #datagram has two components
◦ Header
◦ Payload
Header + Data (Payload)
Packet
Prepared By Adugna A.
 Delivery service of IP is minimal.
 IP provides an unreliable connectionless best
effort service
◦ Unreliable : IP doesn’t make an attempt to recover
lost packets
◦ Connectionless : Each packet is handled
independently
 IP doesn’t make guarantees on the service (
No throughput , No delay guarantee…)
Prepared By Adugna A.
 IP supports the following services
 One-to-one (unicast)
 One-to-all (broadcast)
 One-to-several (multicast)
unicast
broadcast multicast
Prepared By Adugna A.
Network
Layer
Data Link Layer
IP
ARP
Network
Access
Media
ICMP IGMP
Transport
Layer
TCP UDP
 IP is a Network Layer Protocol
Prepared By Adugna A.
 Because TCP/IP was developed earlier than
the OSI 7 layer model, it doesn’t have 7 layers
but only 4 layers.
Application Layer
Transport Layer
Internet Layer
Network Access Layer
Prepared By Adugna A.
Prepared By Adugna A.
 Application layer protocols defined the
rules when implementing specific network
applications.
 Examples :
◦ FTP – (File Transfer Protocol)
◦ Telnet – ( Remote Terminal Protocol)
◦ SMTP – (Simple Mail Transfer Protocol)
◦ HTTP – (Hyper Text Transfer Protocol)
Prepared By Adugna A.
 End to End data transfer……
 Examples :
◦ TCP (Transmission Control Protocol)
 Connection oriented (connection established before
data exchanged)
 Reliable delivery of data
◦ UDP (User Datagram Protocol)
 Connectionless service
 Delivery is not guaranteed (unreliable)
Prepared By Adugna A.
 Internet layer protocols define the rules of
how to find the routers for a packet to the
destination.
 It only gives best effort delivery. (packets can
be delayed, corrupted, lost or out of order)
 Examples :
◦ IP – Internet Protocol (Provide packet delivery)
◦ ARP – Address Resolution Protocol (Defined the
procedure of network address / mac address
translation(mapping))
◦ ICMP – Internet Control Message Protocol (Defined
the procedure of error message transfer)
Prepared By Adugna A.
 Also known as Network Interface Layer…
 At which data is transmitted and received
across the physical network.
◦ Mostly in hardware
◦ A well known example is Ethernet
 Examples :
◦ Ethernet
◦ Token Ring
◦ Frame Relay
◦ ATM (Asynchronous Transfer Mode)
Prepared By Adugna A.
 MAC address
◦ Identifies a specific NIC in a computer on a network
◦ Each MAC address is unique
◦ TCP/IP networks can use MAC addresses in
communication
 Network devices cannot efficiently route traffic
using MAC addresses because they:
◦ Are not grouped logically
◦ Cannot be modified
◦ Do not give information about physical or logical
network configuration
Prepared By Adugna A.
 IP addressing
◦ Devised for use on large networks
 IP addresses have a hierarchical structure and
do provide logical groupings
◦ IP address identifies both a network and a host
Prepared By Adugna A.
 When any device wishes to send data to another target
device, it must :
 First determine the MAC address of that target given its IP
address.
 These IP-to-MAC address mappings are derived from an
ARP cache maintained on each device.
 If the MAC address of a given IP address does not appear
in a device's cache, that device cannot direct messages to
that target until it obtains a new mapping.
 In this case the sender sends an ARP request broadcast
message on the local subnet.
 The host with the given IP address sends an ARP reply in
response to the broadcast, allowing the initiating device to
update its cache and proceed to deliver messages directly
to the target.
Prepared By Adugna A.
 What is an IP address…?
◦ An IP address is a unique global address for a
network interface
- Is a 32 bit long identifier(IPV4)
- Encodes a network number (network prefix)
and a host number
1000111110000000 10001001 10010000
1st Byte
= 128
2nd Byte
= 143
3rd Byte
= 137
4th Byte
= 144
128.143.137.144Prepared By Adugna A.
 There are two IP addressing scheme:
◦ 1. Class-full
◦ 2. Classless
 In classful addressing the address space is
 divided into 5 classes:
 A, B, C, D, and E.
Prepared By Adugna A.
Address space rule
addr15
addr1
addr2
addr41
addr31
addr226
…………..
…………..
…………..
…………..
…………..
…………..
The address space in a protocol
That uses N-bits to define an
Address is:
2N
The address space of IPv4 is
232
or
4,294,967,296.
Prepared By Adugna A.
Prepared By Adugna A.
 Class A addresses are assigned to networks
with a very large number of hosts
 Reserved for governments and large
corporations throughout the world
 Each Class A address supports 16,777,214
hosts
 The high-order bit(MSB) in a class A address
is always set to zero.
 The next seven bits (completing the first
octet) complete the network ID.
 The remaining 24 bits represent the host ID.
Prepared By Adugna A.
 Class B addresses are assigned to large- and
medium-sized companies
 Each Class B address supports 65,534 hosts
 The two high-order bits in a class B address
are always set to binary 1 0.
 The next 14 bits complete the network ID.
 The remaining 16 bits represent the host ID.
Prepared By Adugna A.
 Class C addresses are used for small
networks.
– Addresses are assigned to groups that do not
meet the qualifications to obtain Class A or B
addresses
– supports 254 hosts
 The three high-order bits in a class C address
are always set to binary 1 1 0.
 The next 21 bits complete the network ID.
 The remaining 8 bits represent the host ID.
Prepared By Adugna A.
 Class D addresses are reserved for IP multicast addresses.
– Also known as multicast addresses
– Multicasting is the sending of a stream of data (usually
audio and video) to multiple computers simultaneously
 The four high-order bits in a class D address are always set to binary 1
1 1 0.
 The remaining bits are for the address that interested hosts recognize.
 Class E addresses are reserved for research, testing, and
experimentation
 The high-order bits in a class E address are set to 1111.
 The Class E range starts where Class D leaves off
Prepared By Adugna A.
 Each Network is assigned a network address
& every device on the network is assigned a
host address.
 There are only 2 specific rules that govern the
value of the address.
Prepared By Adugna A.
 Address cannot be designated by all
zeros or all ones.
 These are special addresses that are
reserved for special purposes.
Example
◦ All 1's in the network ID are reserved for
use as an IP broadcast address.
Prepared By Adugna A.
Prepared By Adugna A.
 The 1st bit, which are always 0, designate the
address as a Class A address
 There are 128 Class A(27) Network
Addresses(the first MSB is used to refer the
class)
 Addresses with all zeros and ones aren’t
used.
 126(27 -2) Class A Networks are available.
 Each of this network can support 224 – 2 or
16,777,214 hosts.
Prepared By Adugna A.
 The 1st 2 bit, which are always 10, designate
the address as a Class B address & 14 bits are
used to designate the Network.
 Using our formula, (214 – 2), there can be
16,382 Class B Networks & each Network can
have (216 – 2) Hosts, or 65,534 Hosts.
Prepared By Adugna A.
 The 1st 3 bits of all class C addresses are set
to 110, leaving 21 bits for the Network
address, which means there can be
2,097,150 (221 – 2) Class C Networks.
 But it can support only 254 (28 – 2) Hosts per
Network.
Prepared By Adugna A.
Address Class First Network ID Last Network ID
Class A 1.0.0.0 126.0.0.0
Class B 128.0.0.0 191.255.0.0
Class C 192.0.0.0 223.255.255.0
Prepared By Adugna A.
 Private IP Addresses:
◦ Many companies use private IP addresses for their
internal networks
 Will not be routable on the Internet
Class Private
A 10.x.x.x (10.0.0-10.255.255.255)
B 127.16.x.x (127.16.0.0-127.16.255.255)
C 192.168.x.x(192.168.0.0-192.168.255.255)
Prepared By Adugna A.
Part -2
Prepared By Adugna A.
•In classful addressing, an IP address in
class A, B, or C is divided into netid and
hostid.
•These parts are of varying lengths,
depending on the class of the address.
•In class A, one byte defines the netid
and three bytes define the hostid.
•In class B, two bytes define the netid and
two bytes define the hosfid.
•In class C, three bytes define the netid
and one byte defines the hostid.
Prepared By Adugna A.
• Although the length of the netid and hostid
(in bits) is predetermined in classful
addressing, we can also use a mask (also
called the default mask)
• The masks for classes A, B, and C are
shown below
• The mask can help us to find the netid and
the hostid. define the netid.
• CIDR(Classless Interdomain Routing) notation also applicable
Prepared By Adugna A.
•The imperfection in classful addressing
scheme combined with the fast growth of
the Internet led to the near depletion of
the available addresses.
•Yet the number of devices on the Internet
is much less than the 232 address space.
•We have run out of class A and B
addresses, and a class C block is too
small for most midsize organizations.
•One solution that has alleviated the
problem is the idea of classless
addressing.
Prepared By Adugna A.
• To overcome address depletion and give
more organizations access to the Internet.
• In this scheme, there are no classes, but
the addresses are still granted in blocks.
Prepared By Adugna A.
o In classless addressing, when an entity, small
or large, needs to be connected to the
Internet, it is granted a block (range) of
addresses.
o The size of the block (the number of
addresses) varies based on the size of the
entity.
o For example, a household may be given only
two addresses; a large organization may be
given thousands of addresses.
o An ISP, as the Internet service provider, may
be given thousands or hundreds of thousands
based on the number of customers it may
serve.
Prepared By Adugna A.
• To simplify the handling of addresses, the
Internet authorities impose three
restrictions on classless address blocks:
1.The addresses in a block must be contiguous,
one after another.
2.The number of addresses in a block must be a
power of 2 (1, 2, 4, 8 .... ).
3.The first address must be evenly divisible by
the number of addresses.
Prepared By Adugna A.
•The above figure shows a block of
addresses granted to a small business
that needs 16 addresses.
•We can see that the restrictions are
applied to this block.
• The addresses are contiguous.
•The number of addresses is a power
of 2 (16 = 24)
•First address is divisible by 16.
Prepared By Adugna A.
• As we discussed before, a mask is a 32-bit
number in which the n leftmost bits are 1s
and the 32 - n rightmost bits are 0s.
• However, in classless addressing the mask
for a block can take any value from 0 to 32.
It is very convenient to give just the value of
n preceded by a slash (CIDR – Classless
Interdomain Routing notation).
• The address and the/n notation completely
define the whole block (the first address,
the last address, and the number of
addresses).
Prepared By Adugna A.
 IP addresses identify both the network and
the host
◦ The division between the two is not specific to a
certain number of octets
 Subnet mask
◦ Indicates how much of the IP address represents
the network or subnet
 Standard (default) subnet masks:
◦ Class A subnet mask is 255.0.0.0
◦ Class B subnet mask is 255.255.0.0
◦ Class C subnet mask is 255.255.255.0
Prepared By Adugna A.
 Reasons for subnetting
◦ To match the physical layout of the organization
◦ To match the administrative structure of the
organization
◦ To plan for future growth
◦ To reduce network traffic
Prepared By Adugna A.
 Subnet masks are frequently expressed in dotted
decimal notation.
 Subnet mask is not an IP address.
 Each host on a TCP/IP network requires a subnet mask
even on a single segment network.
Address Class Bits for Subnet Mask Subnet Mask
Class A 11111111 00000000 00000000 00000000 255.0.0.0
Class B 11111111 11111111 00000000 00000000 255.255.0.0
Class C 11111111 11111111 11111111 00000000 255.255.255.0
Prepared By Adugna A.
 IPV(1-3) : were not formally assigned.
 IPV4 : TCP/IP , 32bit IP address currently used.
 IPV5 : Internet Stream Protocol (SP)
 Experimental Protocol
 Never Introduced for public use.
 IPV6 : Designed to replace IPV4 , 128bit IP
address
Prepared By Adugna A.
 Connectionless protocol and best effort
based.
 Simplicity
 It is simpler and easy to remember
 Require less memory
 Familiarity
 Millions of devices are already knowing it
 Existing infrastructure already support it
Prepared By Adugna A.
 Widely support
 Shorter & Sweeter (header)
 Support of all Operating Systems
 All commonly used protocols are supported
Prepared By Adugna A.
 IPV4 specification didn’t identify any security
mechanism.
 Millions of class A addresses are wasted.
 Many class B addresses also wasted.
 Not so many organizations are so small to
have a class C block.
 Class E addresses were reserved for future
purposes.
Prepared By Adugna A.
 PCs
 Servers
 Modems
 Routers
 Printers
 Cameras
 Smart Phones
 Tablets & Gaming Systems
 Just about anything else connecting to the
Internet
Prepared By Adugna A.
IPV6 provides a platform on new internet
functionality that will be needed in the
immediate future and provide
flexibility for future
growth and
expansion.
Prepared By Adugna A.
IPV6
New header format
Large address space
Built in Security
Extensibility
Better support for QoS
Efficient & hierarchical addressing and
routing infrastructure
Prepared By Adugna A.
 Internet
 VoIP
 IP – TV
 IP-VPN
 Wireless Mobile Technology
 Internet Broadcasting
 Multihoming
Prepared By Adugna A.
Prepared By Adugna A.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
IP Address
IP AddressIP Address
IP Address
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
IP Address
IP AddressIP Address
IP Address
 
Ip address
Ip addressIp address
Ip address
 
Ip address
Ip addressIp address
Ip address
 
Application Layer
Application Layer Application Layer
Application Layer
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
IPv6
IPv6IPv6
IPv6
 
Chapter03 a - network media
Chapter03 a  - network mediaChapter03 a  - network media
Chapter03 a - network media
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
What is Ping
What is PingWhat is Ping
What is Ping
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
IP address
IP addressIP address
IP address
 
Data link layer
Data link layerData link layer
Data link layer
 
Cisco's Three-tier Hierarchical Network Model
Cisco's Three-tier Hierarchical Network ModelCisco's Three-tier Hierarchical Network Model
Cisco's Three-tier Hierarchical Network Model
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 

Andere mochten auch

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Introduction to ip addressing by kalyan kk
Introduction to ip addressing by kalyan kkIntroduction to ip addressing by kalyan kk
Introduction to ip addressing by kalyan kkkalyan kumar
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6RIPE NCC
 
Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...
Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...
Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...Digicomp Academy AG
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS devicescooby_doo
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6Manesh Sharma
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6Pramith P
 

Andere mochten auch (20)

IP addressing
IP addressingIP addressing
IP addressing
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Introduction to ip addressing by kalyan kk
Introduction to ip addressing by kalyan kkIntroduction to ip addressing by kalyan kk
Introduction to ip addressing by kalyan kk
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ipv4
Ipv4Ipv4
Ipv4
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...
Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...
Swiss IPv6 Council: Talking to Dualstack-Websites - Zugriffsperformance mit I...
 
Pengenalan IP
Pengenalan IPPengenalan IP
Pengenalan IP
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS device
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 

Ähnlich wie Computer Networking: Internet Protcol (IP) and IP Addressing

16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/Rathodpradip1
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routingVikas Jagtap
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Lesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docxLesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docxsmile790243
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptJayaprasanna4
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccnarobertoxe
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfNetworkershome
 

Ähnlich wie Computer Networking: Internet Protcol (IP) and IP Addressing (20)

Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
Computer network
Computer networkComputer network
Computer network
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Hardware9
Hardware9Hardware9
Hardware9
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Networking HMT-2
Networking HMT-2Networking HMT-2
Networking HMT-2
 
IP Address
IP AddressIP Address
IP Address
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Ip and mac adress
Ip and mac adressIp and mac adress
Ip and mac adress
 
Lesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docxLesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docx
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
 
C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccna
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccna
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 

Mehr von Bisrat Girma

Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingBisrat Girma
 
Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesBisrat Girma
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6Bisrat Girma
 
Object oriented sad-5 part ii
Object oriented sad-5 part iiObject oriented sad-5 part ii
Object oriented sad-5 part iiBisrat Girma
 
Object oriented sad-5 part i
Object oriented sad-5 part iObject oriented sad-5 part i
Object oriented sad-5 part iBisrat Girma
 
Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085Bisrat Girma
 

Mehr von Bisrat Girma (7)

Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN Technologies
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6
 
Object oriented sad-5 part ii
Object oriented sad-5 part iiObject oriented sad-5 part ii
Object oriented sad-5 part ii
 
Object oriented sad-5 part i
Object oriented sad-5 part iObject oriented sad-5 part i
Object oriented sad-5 part i
 
Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085
 
Chapter5
Chapter5Chapter5
Chapter5
 

Kürzlich hochgeladen

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Kürzlich hochgeladen (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Computer Networking: Internet Protcol (IP) and IP Addressing

  • 1. Internet Protocol (IP) and IP Addressing Prepared By Adugna A.
  • 2.  IP stands for Internet Protocol  IP specifies the format of packets, also called datagrams, and the addressing scheme.  Most networks combine IP with a higher- level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source. Prepared By Adugna A.
  • 3.  IP by itself is something like the postal system.  It allows you to address a package and drop it in the system, but there's no direct link between you and the recipient.  TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time. Prepared By Adugna A.
  • 4.  Provide a standard means of communication between devices  Can’t communicate if speaking two different languages Therefore we have a concept called “Protocol” Prepared By Adugna A.
  • 5.  Rules and conventions explaining how something must be done  Used to describe how devices can communicate  Protocol also defines the format of Data i.e. : being exchanged. If we both utilize the same protocol then you know how to format data so I will understand it and I know how to format data so you will understand it Prepared By Adugna A.
  • 6.  Each #datagram has two components ◦ Header ◦ Payload Header + Data (Payload) Packet Prepared By Adugna A.
  • 7.  Delivery service of IP is minimal.  IP provides an unreliable connectionless best effort service ◦ Unreliable : IP doesn’t make an attempt to recover lost packets ◦ Connectionless : Each packet is handled independently  IP doesn’t make guarantees on the service ( No throughput , No delay guarantee…) Prepared By Adugna A.
  • 8.  IP supports the following services  One-to-one (unicast)  One-to-all (broadcast)  One-to-several (multicast) unicast broadcast multicast Prepared By Adugna A.
  • 9. Network Layer Data Link Layer IP ARP Network Access Media ICMP IGMP Transport Layer TCP UDP  IP is a Network Layer Protocol Prepared By Adugna A.
  • 10.  Because TCP/IP was developed earlier than the OSI 7 layer model, it doesn’t have 7 layers but only 4 layers. Application Layer Transport Layer Internet Layer Network Access Layer Prepared By Adugna A.
  • 12.  Application layer protocols defined the rules when implementing specific network applications.  Examples : ◦ FTP – (File Transfer Protocol) ◦ Telnet – ( Remote Terminal Protocol) ◦ SMTP – (Simple Mail Transfer Protocol) ◦ HTTP – (Hyper Text Transfer Protocol) Prepared By Adugna A.
  • 13.  End to End data transfer……  Examples : ◦ TCP (Transmission Control Protocol)  Connection oriented (connection established before data exchanged)  Reliable delivery of data ◦ UDP (User Datagram Protocol)  Connectionless service  Delivery is not guaranteed (unreliable) Prepared By Adugna A.
  • 14.  Internet layer protocols define the rules of how to find the routers for a packet to the destination.  It only gives best effort delivery. (packets can be delayed, corrupted, lost or out of order)  Examples : ◦ IP – Internet Protocol (Provide packet delivery) ◦ ARP – Address Resolution Protocol (Defined the procedure of network address / mac address translation(mapping)) ◦ ICMP – Internet Control Message Protocol (Defined the procedure of error message transfer) Prepared By Adugna A.
  • 15.  Also known as Network Interface Layer…  At which data is transmitted and received across the physical network. ◦ Mostly in hardware ◦ A well known example is Ethernet  Examples : ◦ Ethernet ◦ Token Ring ◦ Frame Relay ◦ ATM (Asynchronous Transfer Mode) Prepared By Adugna A.
  • 16.  MAC address ◦ Identifies a specific NIC in a computer on a network ◦ Each MAC address is unique ◦ TCP/IP networks can use MAC addresses in communication  Network devices cannot efficiently route traffic using MAC addresses because they: ◦ Are not grouped logically ◦ Cannot be modified ◦ Do not give information about physical or logical network configuration Prepared By Adugna A.
  • 17.  IP addressing ◦ Devised for use on large networks  IP addresses have a hierarchical structure and do provide logical groupings ◦ IP address identifies both a network and a host Prepared By Adugna A.
  • 18.  When any device wishes to send data to another target device, it must :  First determine the MAC address of that target given its IP address.  These IP-to-MAC address mappings are derived from an ARP cache maintained on each device.  If the MAC address of a given IP address does not appear in a device's cache, that device cannot direct messages to that target until it obtains a new mapping.  In this case the sender sends an ARP request broadcast message on the local subnet.  The host with the given IP address sends an ARP reply in response to the broadcast, allowing the initiating device to update its cache and proceed to deliver messages directly to the target. Prepared By Adugna A.
  • 19.  What is an IP address…? ◦ An IP address is a unique global address for a network interface - Is a 32 bit long identifier(IPV4) - Encodes a network number (network prefix) and a host number 1000111110000000 10001001 10010000 1st Byte = 128 2nd Byte = 143 3rd Byte = 137 4th Byte = 144 128.143.137.144Prepared By Adugna A.
  • 20.  There are two IP addressing scheme: ◦ 1. Class-full ◦ 2. Classless  In classful addressing the address space is  divided into 5 classes:  A, B, C, D, and E. Prepared By Adugna A.
  • 21. Address space rule addr15 addr1 addr2 addr41 addr31 addr226 ………….. ………….. ………….. ………….. ………….. ………….. The address space in a protocol That uses N-bits to define an Address is: 2N The address space of IPv4 is 232 or 4,294,967,296. Prepared By Adugna A.
  • 23.  Class A addresses are assigned to networks with a very large number of hosts  Reserved for governments and large corporations throughout the world  Each Class A address supports 16,777,214 hosts  The high-order bit(MSB) in a class A address is always set to zero.  The next seven bits (completing the first octet) complete the network ID.  The remaining 24 bits represent the host ID. Prepared By Adugna A.
  • 24.  Class B addresses are assigned to large- and medium-sized companies  Each Class B address supports 65,534 hosts  The two high-order bits in a class B address are always set to binary 1 0.  The next 14 bits complete the network ID.  The remaining 16 bits represent the host ID. Prepared By Adugna A.
  • 25.  Class C addresses are used for small networks. – Addresses are assigned to groups that do not meet the qualifications to obtain Class A or B addresses – supports 254 hosts  The three high-order bits in a class C address are always set to binary 1 1 0.  The next 21 bits complete the network ID.  The remaining 8 bits represent the host ID. Prepared By Adugna A.
  • 26.  Class D addresses are reserved for IP multicast addresses. – Also known as multicast addresses – Multicasting is the sending of a stream of data (usually audio and video) to multiple computers simultaneously  The four high-order bits in a class D address are always set to binary 1 1 1 0.  The remaining bits are for the address that interested hosts recognize.  Class E addresses are reserved for research, testing, and experimentation  The high-order bits in a class E address are set to 1111.  The Class E range starts where Class D leaves off Prepared By Adugna A.
  • 27.  Each Network is assigned a network address & every device on the network is assigned a host address.  There are only 2 specific rules that govern the value of the address. Prepared By Adugna A.
  • 28.  Address cannot be designated by all zeros or all ones.  These are special addresses that are reserved for special purposes. Example ◦ All 1's in the network ID are reserved for use as an IP broadcast address. Prepared By Adugna A.
  • 30.  The 1st bit, which are always 0, designate the address as a Class A address  There are 128 Class A(27) Network Addresses(the first MSB is used to refer the class)  Addresses with all zeros and ones aren’t used.  126(27 -2) Class A Networks are available.  Each of this network can support 224 – 2 or 16,777,214 hosts. Prepared By Adugna A.
  • 31.  The 1st 2 bit, which are always 10, designate the address as a Class B address & 14 bits are used to designate the Network.  Using our formula, (214 – 2), there can be 16,382 Class B Networks & each Network can have (216 – 2) Hosts, or 65,534 Hosts. Prepared By Adugna A.
  • 32.  The 1st 3 bits of all class C addresses are set to 110, leaving 21 bits for the Network address, which means there can be 2,097,150 (221 – 2) Class C Networks.  But it can support only 254 (28 – 2) Hosts per Network. Prepared By Adugna A.
  • 33. Address Class First Network ID Last Network ID Class A 1.0.0.0 126.0.0.0 Class B 128.0.0.0 191.255.0.0 Class C 192.0.0.0 223.255.255.0 Prepared By Adugna A.
  • 34.  Private IP Addresses: ◦ Many companies use private IP addresses for their internal networks  Will not be routable on the Internet Class Private A 10.x.x.x (10.0.0-10.255.255.255) B 127.16.x.x (127.16.0.0-127.16.255.255) C 192.168.x.x(192.168.0.0-192.168.255.255) Prepared By Adugna A.
  • 36. •In classful addressing, an IP address in class A, B, or C is divided into netid and hostid. •These parts are of varying lengths, depending on the class of the address. •In class A, one byte defines the netid and three bytes define the hostid. •In class B, two bytes define the netid and two bytes define the hosfid. •In class C, three bytes define the netid and one byte defines the hostid. Prepared By Adugna A.
  • 37. • Although the length of the netid and hostid (in bits) is predetermined in classful addressing, we can also use a mask (also called the default mask) • The masks for classes A, B, and C are shown below • The mask can help us to find the netid and the hostid. define the netid. • CIDR(Classless Interdomain Routing) notation also applicable Prepared By Adugna A.
  • 38. •The imperfection in classful addressing scheme combined with the fast growth of the Internet led to the near depletion of the available addresses. •Yet the number of devices on the Internet is much less than the 232 address space. •We have run out of class A and B addresses, and a class C block is too small for most midsize organizations. •One solution that has alleviated the problem is the idea of classless addressing. Prepared By Adugna A.
  • 39. • To overcome address depletion and give more organizations access to the Internet. • In this scheme, there are no classes, but the addresses are still granted in blocks. Prepared By Adugna A.
  • 40. o In classless addressing, when an entity, small or large, needs to be connected to the Internet, it is granted a block (range) of addresses. o The size of the block (the number of addresses) varies based on the size of the entity. o For example, a household may be given only two addresses; a large organization may be given thousands of addresses. o An ISP, as the Internet service provider, may be given thousands or hundreds of thousands based on the number of customers it may serve. Prepared By Adugna A.
  • 41. • To simplify the handling of addresses, the Internet authorities impose three restrictions on classless address blocks: 1.The addresses in a block must be contiguous, one after another. 2.The number of addresses in a block must be a power of 2 (1, 2, 4, 8 .... ). 3.The first address must be evenly divisible by the number of addresses. Prepared By Adugna A.
  • 42. •The above figure shows a block of addresses granted to a small business that needs 16 addresses. •We can see that the restrictions are applied to this block. • The addresses are contiguous. •The number of addresses is a power of 2 (16 = 24) •First address is divisible by 16. Prepared By Adugna A.
  • 43. • As we discussed before, a mask is a 32-bit number in which the n leftmost bits are 1s and the 32 - n rightmost bits are 0s. • However, in classless addressing the mask for a block can take any value from 0 to 32. It is very convenient to give just the value of n preceded by a slash (CIDR – Classless Interdomain Routing notation). • The address and the/n notation completely define the whole block (the first address, the last address, and the number of addresses). Prepared By Adugna A.
  • 44.  IP addresses identify both the network and the host ◦ The division between the two is not specific to a certain number of octets  Subnet mask ◦ Indicates how much of the IP address represents the network or subnet  Standard (default) subnet masks: ◦ Class A subnet mask is 255.0.0.0 ◦ Class B subnet mask is 255.255.0.0 ◦ Class C subnet mask is 255.255.255.0 Prepared By Adugna A.
  • 45.  Reasons for subnetting ◦ To match the physical layout of the organization ◦ To match the administrative structure of the organization ◦ To plan for future growth ◦ To reduce network traffic Prepared By Adugna A.
  • 46.  Subnet masks are frequently expressed in dotted decimal notation.  Subnet mask is not an IP address.  Each host on a TCP/IP network requires a subnet mask even on a single segment network. Address Class Bits for Subnet Mask Subnet Mask Class A 11111111 00000000 00000000 00000000 255.0.0.0 Class B 11111111 11111111 00000000 00000000 255.255.0.0 Class C 11111111 11111111 11111111 00000000 255.255.255.0 Prepared By Adugna A.
  • 47.  IPV(1-3) : were not formally assigned.  IPV4 : TCP/IP , 32bit IP address currently used.  IPV5 : Internet Stream Protocol (SP)  Experimental Protocol  Never Introduced for public use.  IPV6 : Designed to replace IPV4 , 128bit IP address Prepared By Adugna A.
  • 48.  Connectionless protocol and best effort based.  Simplicity  It is simpler and easy to remember  Require less memory  Familiarity  Millions of devices are already knowing it  Existing infrastructure already support it Prepared By Adugna A.
  • 49.  Widely support  Shorter & Sweeter (header)  Support of all Operating Systems  All commonly used protocols are supported Prepared By Adugna A.
  • 50.  IPV4 specification didn’t identify any security mechanism.  Millions of class A addresses are wasted.  Many class B addresses also wasted.  Not so many organizations are so small to have a class C block.  Class E addresses were reserved for future purposes. Prepared By Adugna A.
  • 51.  PCs  Servers  Modems  Routers  Printers  Cameras  Smart Phones  Tablets & Gaming Systems  Just about anything else connecting to the Internet Prepared By Adugna A.
  • 52. IPV6 provides a platform on new internet functionality that will be needed in the immediate future and provide flexibility for future growth and expansion. Prepared By Adugna A.
  • 53. IPV6 New header format Large address space Built in Security Extensibility Better support for QoS Efficient & hierarchical addressing and routing infrastructure Prepared By Adugna A.
  • 54.  Internet  VoIP  IP – TV  IP-VPN  Wireless Mobile Technology  Internet Broadcasting  Multihoming Prepared By Adugna A.