© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.

Slides:



Advertisements
Similar presentations
IP-Internet Protocol Addresses. Computer Engineering Department 2 Addresses for the Virtual Internet The goal of internetworking is to provide a seamless.
Advertisements

Chapter 5 IPv4 Addresses TCP/IP Protocol Suite
Network Layer: Logical Addressing. 4-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
IP Addressing and Subnetting
Chapter 18. IP: Internet Protocol Addresses
CSCI 4550/8556 Computer Networks Comer, Chapter 18: IP: Internet Protocol Addresses.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Based Computer Networks and Internets (Comer)
1 IP: Internet Protocol Addresses. 2 Internet Protocol (IP) Only protocol at Layer 3 Fundamental in suite Defines –Internet addressing –Internet packet.
IP Addressing. TCP/IP addresses -Addressing in TCP/IP is specified by the Internet Protocol (IP) -Each host is assigned a 32-bit number -Called the IP.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
1 IP Addressing (IPv4 ADDRESSES). 2 Universal Service Concept Any computer can communicate with any other computer in the world. Multiple independently.
TCP/IP Protocol Suite 1 Chapter 4 Objectives Upon completion you will be able to: IP Addresses: Classful Addressing Understand IPv4 addresses and classes.
Q and A, Ch. 21 IS333, Spring 2015 Victor Norman.
IP Addressing. Each TCP/IP host is identified by a logical IP address. –The IP address is a network layer address –No dependence on the Data-Link layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 19 Network Layer Logical Addressing © 2012 by McGraw-Hill Education. This is proprietary material.
NETWORK LAYER IP Addressing 1. ANNOUNCEMENT: Rescheduled  NO PRACTICAL SESSIONS ON TUESDAY 22, November 2010  Rescheduled sessions: MONDAY: November.
Functions 1.  How long is MAC address?  How is mac address used in data communication?  What is a frame?  What does an IP address look like? 2.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
1 TCOM 509 – Internet Protocols (TCP/IP) Lecture 02_b Instructor: Dr. Li-Chuan Chen Date: 09/08/2003 Based in part upon slides of Prof. J. Kurose (U Mass),
21-IP addressing Dr. John P. Abraham Professor UTPA.
IP Addressing. Dotted Decimal Notation IP addresses are written in a so-called dotted decimal notation Each byte is identified by a decimal number in.
Spring Ch 18 IP Addresses. 2 Internet Protocol  Only protocol at Layer 3  Defines Internet addressing Internet packet format Internet routing.
ECE 4110 – Internetwork Programming Subnetting, Supernetting, and Classless Addressing.
Classless and Subnet Address Extensions (CIDR)
IP Addressing Introductory material. An entire module devoted to IP addresses.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Part 3: Internetworking Internet architecture, addressing, encapsulation, reliable transport and the TCP/IP protocol suite.
Chapter 18 IP: Internet Protocol Addresses
Chapter 4, slide: 1 CS 372 – introduction to computer networks* Friday July 23, 2010 Announcements: r Midterms are graded. r Lab 4 is posted. Acknowledgement:
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
21-IP addressing Dr. John P. Abraham Professor UTPA.
Universal Identifier UNIVERSAL IDENTIFIER Universal network = globally accepted method for identifying each computer. Host identifier = host is identify.
Chapter 4 Objectives Upon completion you will be able to: Classful Internet Addressing Understand IPv4 addresses and classes Identify the class of an.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Chapter 18 IP: Internet Protocol Addresses. Internet protocol software used to make the internet appear to be a single, seamless communication system.
Subnet Design and IP Addressing
Classful Internet Addresses Chapter 4. Universal Identifiers Designers of TCP/IP determined that each host on the internet would have a 32-bit identifier.
21-IP addressing Dr. John P. Abraham Professor UTPA.
CS470 Computer Networking Protocols
IP ADDRESSING Lecture 2: IP addressing Networks and Communication Department 1.
INTERNET ADDRESSING Today’s topics:  What are Internet addresses?  Why do we need them?  How are they used?
Q and A, Ch. 21 IS333, Spring 2016 Victor Norman.
TCP/IP Protocol Suite 1 Chapter 4 Objectives Upon completion you will be able to: IP Addresses: Classful Addressing Understand IPv4 addresses and classes.
Introduction to Internetworking. 2 The IP Addressing Scheme (IPv4) (psu.edu) Dotted Decimal Notation: A notation more convenient for humans.
TCP/IP Protocol Suite 1 Objectives Upon completion you will be able to: IP Addresses: Classful Addressing Understand IPv4 addresses and classes Identify.
COMPUTER NETWORKS CS610 Lecture-26 Hammad Khalid Khan.
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
COMPUTER NETWORKS CS610 Lecture-25 Hammad Khalid Khan.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
IP Addressing, Sub-netting & VLSM
IP – Subnetting and CIDR
IP Addresses: Classful Addressing
IP Addressing and Subnetting
The Concept of Universal Service
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite
Network Layer: IP Addressing
CS4470 Computer Networking Protocols
Objective: Classful Internet Addressing
IP Addresses: Classful Addressing
Dr. John P. Abraham Professor UTPA
Supernetting Recall: subnetting allows an organization to share a single IP network address among multiple physical networks Supernetting (a.k.a. classless.
Internet Addressing Today’s topics: What are Internet addresses?
Dr. John P. Abraham Professor UTRGV
Dr. John P. Abraham Professor UTRGV
Introduction to Network
Layering and the TCP/IP protocol Suite
Presentation transcript:

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints By Lami Kaya, Süleyman Kondakcı,

2 Topics Covered Addresses for the Virtual Internet The IP Addressing Scheme The IP Address Hierarchy Original Classes of IP Addresses Dotted Decimal Notation Division of the Address Space (Subnetting) Authority for Addresses Subnet and Classless Addressing Address Masks

3 Topics Covered CIDR Notation Special IP Addresses Summary of Special IP Addresses Routers and the IP Addressing Principle Multi-Homed Hosts

4 Addresses for the Virtual Internet All host computers must use a uniform addressing scheme Each address of a node must be unique MAC addresses do not suffice because –the Internet can include multiple network technologies –and each technology defines its own MAC addresses The advantage of IP addressing lies in uniformity: –an arbitrary pair of application programs can communicate without knowing the type of network hardware or MAC addresses being used IP addresses are supplied by protocol software –They are not part of the underlying network Many layers of protocol software use IP addresses

5 The IP Addressing Scheme Each host is assigned a unique 32-bit number –known as the host's IP address or Internet address When sending a packet across the Internet, sender’s protocol software must specify –its own 32-bit IP address (the source address) –and the address of the intended recipient (the destination address)

6 IP Address Structure & Hierarchy IP address is divided into two parts: A prefix (Network part) –identifies the physical network to which the host is attached –Each network in the Internet is assigned a unique network number A suffix (Host part) –identifies a specific computer (host/node) on the network –Each computer on a given network is assigned a unique suffix IP address scheme guarantees two properties: –Each computer is assigned a unique address Network number assignments must be coordinated globally – Suffixes are assigned locally without global coordination bit 0bit 31 Prefix(Net-ID)Suffix(Host-ID)

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.7 Original Classes of IP Addresses The original classful IP addressing divides the IP address space into three (3) primary classes, A, B, and C –each class has a different size of prefix and suffix

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.8 Dotted Decimal Notation –express each 8-bit section of a 32-bit number as a decimal value –uses periods (dots) to separate the sections –The scheme is known as dotted decimal notation Each octet (byte) is an unsigned binary integer –dotted decimal addresses range is through

9 Division of the Address Space The classful scheme divides the address space into unequal sizes

10 Authority for Addresses AFRINIC: Africa RegionAFRINIC APNIC: Asia/Pacific RegionAPNIC ARIN: North America Region:ARIN LACNIC: Latin America and some Caribbean Islands:LACNIC RIPE NCC: Europe, the Middle East, and Central AsiaRIPE NCC

11 Subnet and Classless Addressing As the Internet grew –the original classful addressing scheme became a limitation Everyone demanded a class A or class B address –So they would have enough addresses for future growth but many addresses in class A and B were unused –Many class C addresses remained, but few wanted to use them Two mechanisms were invented to overcome the limitation: 1.Subnet addressing 2.Classless addressing The two mechanisms are closely related –they can be considered to be part of a single abstraction: instead of having three distinct address classes, allow the division between prefix/suffix on an arbitrary bit boundary

12 Subnet and Classless Addressing Subnet addressing was initially used within large organizations Classless addressing extended the approach to all Internet Consider an ISP that hands out prefixes. And suppose a customer of the ISP requests a prefix for a network that contains 55 hosts –classful addressing requires a complete class C prefix –only 4 bits of suffix are needed to represent all possible host values means 219 of the 254 possible suffixes would never be assigned –most of the class C address space is wasted For the above example –classless addressing allows the ISP to assign a prefix that is 26 bits long a suffix that is 6 bits long

13 Subnet and Classless Addressing Assume an ISP owns a class C prefix –Classful addressing assigns the entire prefix to one organization With classless addressing –the ISP can divide the prefix into several longer prefixes –and assign each to a subscriber Figure 21.4 illustrates how classless addressing allows an ISP to divide a class C prefix into four (4) longer prefixes –each one can accommodate a network of up to 62 hosts –the host portion of each prefix is shown in gray The original class C address has 8 bits of suffix –and each of the classless addresses has 6 bits of suffix Assuming that the original class C prefix was unique –each of the classless prefixes will also be unique Thus, instead of wasting addresses –ISP can assign each of the four (4) classless prefixes to a subscriber

14 Subnet and Classless Addressing

15 Subnetworking by Address Masks How can an IP address be divided at an arbitrary boundary? The classless and subnet addressing schemes require hosts and routers to store an additional piece of information: –a value that specifies the exact boundary between the network prefix and the host suffix To mark the boundary, IP uses a 32-bit value –known as an address mask, also called a subnet mask or netmask Why store the boundary size as a bit mask? –A mask makes processing efficient Hosts and routers need to compare the network prefix portion of the address to a value in their forwarding tables –The bit-mask representation makes the comparison efficient

16 Using (Sub)net Masks Given a class C network of )Create 8 subnets 2)Show subnet addressess 3)Show host address range on each subnet |sub| host Number of hosts on each subnet = 2^5-2=30 SubnetNetmaskHost address range to to to to to to to to 254

Overall Structure of the 8 Subnets

18 Address Masks Suppose a router is given –a destination address, D –a network prefix represented as a 32-bit value, N –a 32-bit address mask, M Assume the top bits of N contain a network prefix, and the remaining bits have been set to zero To test whether the destination lies on the specified network, the router tests the condition: N == (D & M) The router –uses the mask with a “logical and (&)” operation to set the host bits of address D to zero (0) –and then compares the result with the network prefix N

Class B subnetting You have As the network ID Take 5 bits from the host ID and use them as subnet bits, |subnet| host Number of subnets = 2^5 = 32 Number of hosts on each subnet = 2^11-2= = 2046

Class A subnetting You have As the network ID Take 7 bits from the host ID and use them as subnet bits, |subnet| host Number of subnets = 2^7 = 128 Number of hosts on each subnet = 2^17-2= =

21 Address Masks in Action As an example: Consider the following 32-bit network prefix: = Consider a 32-bit mask: = Consider a 32-bit destination address = A logical AND between the destination address and the address mask extracts the high-order 16-bits =

22 CIDR Notation Classless Inter-Domain Routing (CIDR) –The name is unfortunate because CIDR only specifies addressing and forwarding –Designers wanted to make it easy for a human to specify a mask Consider the mask needed for the example in Figure 21.4b –It has 26 bits of 1s followed by 6 bits of 0s –In dotted decimal, the mask is: The general form of CIDR notation is: ddd.ddd.ddd.ddd/m – ddd is the decimal value for an octet of the address – m is the number of one bits in the mask Thus, one might write the following: /26 –which specifies a mask of 26 bits Figure 21.5 lists address masks in CIDR notation –along with the dotted decimal equivalent of each

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.23 Figure 21.5 A list of address masks in CIDR notation and in dotted decimal

24 A CIDR Example Assume an ISP has the following block /16 Suppose the ISP has 2 customers –one customer needs 12 IP addresses and the other needs 9 The ISP can assign –customer1 CIDR: /28 –customer2 CIDR: /28 –both customers have the same mask size (28 bits), the prefixes differ The binary value assigned to customer1 is: The binary value assigned to customer2 is: There is no ambiguity –Each customer has a unique prefix –More important, the ISP retains most of the original address block it can then allocate to other customers

25 CIDR Host Addresses

26 Special IP Addresses IP defines a set of special address forms that are reserved –Special addresses are reserved and never assigned to hosts

27 Special IP Addresses Loopback Address Special addresses are reserved and never assigned to hosts Loopback address ( ) is used to test network applications It is used for preliminary debugging after a network application has been created A programmer must have two application programs that are intended to communicate across a network –Each application includes the code needed to interact with TCP/IP Instead of executing each program on a separate computer –the programmer runs both programs on a single computer –and instructs them to use a loopback address when communicating When one application sends data to another –data travels down the protocol stack to the IP software –then forwards it back up through the protocol stack to the second program

28 Special IP Addresses Loopback Address A programmer can test the program logic quickly –without needing two computers and without sending packets across a network IP reserves the network prefix 127/8 for use with loopback The host address used with 127 is irrelevant –all host addresses are treated the same –programmers often use host number 1 –so it makes the most popular loopback address During loopback testing no packets ever leave a computer –the IP software forwards packets from one application to another The loopback address never appears in a packet traveling across a network

29 Summary of Special IP Addresses The following table summarizes the special IP addresses

30 Routers and the IP Addressing Principle Each router is assigned two or more IP addresses –one address for each network to which the router attaches To understand why, recall two facts: –A router has connections to multiple physical networks –Each IP address contains a prefix that specifies a physical network A single IP address does not suffice for a router –because each router connects to multiple networks –and each network has a unique prefix The IP scheme can be explained by a principle: –An IP address does not identify a specific computer –each address identifies a connection between a computer and a network –A computer with multiple network connections (e.g., a router) must be assigned one IP address for each connection

31 Routers and the IP Addressing Principle