Business Data Communications Addressing at the NL and TL.

Slides:



Advertisements
Similar presentations
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite
Advertisements

19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Classifying Network Addressing
Chapter 19 Network Layer: Logical Addressing Stephen Kim.
Chapter 21 Exercises 1. A router forwards packets between networks. (Given a destination host address, it must be able to figure out which network that.
Mr. Mark Welton.  IPv4 address are 32-bit numbers represented in dotted decimal notation of 8 bit segments  
Based Computer Networks and Internets (Comer)
Prepared By: Eng.Ola M. Abd El-Latif
Module 10: Routing Fundamentals and Subnets Small Router Purchase Subnetting Example a Basic Subnetting b Subnetting a Class A Network.
TCP/IP Protocol Suite 1 Chapter 5 Objectives Upon completion you will be able to: IP Addresses: Classless Addressing Understand the concept of classless.
Chapter 5 - Transport and Network Layers TCP/IP (Part 1) Dr. V.T. Raja Oregon State University Chapter Objectives: Understand primary functions of transport.
1 IP Addressing (IPv4 ADDRESSES). 2 Universal Service Concept Any computer can communicate with any other computer in the world. Multiple independently.
TCP/IP Protocol Suite 1 Chapter 5 Objectives Upon completion you will be able to: IP Addresses: Classless Addressing Understand the concept of classless.
2440: 141 Web Site Administration IP Addressing Instructor: Enoch E. Damson.
IP Addressing & Subnetting
IP Addressing Internet Protocol (IP) A unique identifier for host, on an IP network 32-bit binary number, usually expressed as 4 “dotted decimal” values.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 4 IP Addresses: Classful Addressing.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
Week 3 - IP addressing 4 Introduction to IP addressing 4 Classes of IP addressing 4 Why Subnet Masks are necessary? 4 How to create subnet masks.
Why create a subnet mask? Tells device which part of an address is the network # including the subnet and which part is the host Filters the node IP address.
IPv4 Addresssing An IP address is four bytes (octets). Each contains eight bits (total of 32 bits in length). IP addresses are given as dotted decimal.
Types of Addresses in IPv4 Network Range
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
Network Addressing IP Addresses. IP Address Space The Structure of an IP Address – Binary Representation The only thing a network device understands,
IP Addressing and Network Software. IP Addressing  A computer somewhere in the world needs to communicate with another computer somewhere else in the.
30/11/ Q & A on Networking. Question No. 1 What is Networking? Two or more computers that are linked in order to share – Resources (such as printers.
IP Addressing Part 1. IP Addressing An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location.
2 © 2003, Cisco Systems, Inc. All rights reserved. RST-2002 IP Addressing.
IP Addresses & Classes Presented By: M.Usman Khan Ghauri Nauman Aslam.
TCP/IP Addressing & Subnetting Unit objectives Discuss TCP/IP addressing and determine the IP address class and default subnet mask Discuss subnetting.
 An Internet address is made of four bytes (32 bits) that define the host connection to a network.  It is uniquely and universally defines the connection.
1 Kyung Hee University Chapter 5 IP addresses Classless Addressing.
1 Exercise: IPv4 subnetting. 2 Task 1 Given is an IP network with address : Divide this network into 8 subnets.
Copyright © Lopamudra Roychoudhuri
By Dana Matcham Caruso SED 695G May 8, 2001
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 IP Addresses: Classful Addressing Teeratorn Saneeyeng, KMUTNB.
21-IP addressing Dr. John P. Abraham Professor UTPA.
HANNAM UNIVERSITY TCP/IP Protocol Suite 1 Chapter 5 Objectives Upon completion you will be able to: IP Addresses: Classless Addressing.
LECTURE ON IP Addressing. What is Networking? –by ‘computer network’ we mean the interconnection between different computers. Why Networking? –to share.
Internet Protocol CLASS E
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
Network layer (Part III)
21-IP addressing Dr. John P. Abraham Professor UTPA.
IP Addresses: Classful Addressing IP Addresses. INTRODUCTION 4.1.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 IPv4 Addresses.
IP ADDRESSES Lecture 6: Network Architectures. IP address  address (IP address) is a numerical label assigned to each device (e.g., computer, printer)
TCP/IP Protocol Suite 1 Chapter 4 Objectives Upon completion you will be able to: IP Addresses: Classful Addressing Understand IPv4 addresses and classes.
Objective 1.Understand Network 2.Understand IP Addressing (IPv4 and IPv6) 3.Understand Subnetting 4.Examples 5.IP addressing and Vlan’s in TIFR 6.TIFR.
Ethernet Basics – 7 IP Addressing. Introducing IP Addressing  IP address (TCP/IP address)  Not unique (but should be), user assigned  Layer 3  4 byte.
INTERNET PROTOCOL ADDRESS AND SUBNET MASK KAAN EREN.
Networks Connecting Two Computers With UTP. Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 IP Addresses: Classful Addressing.
IP Addressing, Sub-netting & VLSM
Created by : Asst. Prof. Ashish Shah, J. M
IP Addresses: Classful Addressing IP Addresses. CONTENTS INTRODUCTION CLASSFUL ADDRESSING Different Network Classes Subnetting Classless Addressing Supernetting.
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite
Chapter-5 TCP/IP Suite.
IPV4.
IP Addresses: Classful Addressing
Objective: Classful Internet Addressing
Introduction to Computers
IP Addressing An IP address is 32-bit long.
Dr. John P. Abraham Professor UTPA
Data Communications and Networking
Dr. John P. Abraham Professor UTRGV
Dr. John P. Abraham Professor UTRGV
Chapter 5 IP addresses Classless Addressing
Dr. John P. Abraham Professor UTPA
Subnetting Subnetting is a method for getting the most out of the limited 32-bit IP addressing space. With any address class, subnetting provides a means.
Layering and the TCP/IP protocol Suite
Presentation transcript:

Business Data Communications Addressing at the NL and TL

Review: Addressing at the DLL DLL addresses are generally assigned to physical devices when they are manufactured. Expressed in hexadecimal. An Ethernet address example: 00-0C-00-F5-03-5A DLL addresses identify hardware on a network.

Addressing at the NL and TL NL addresses are logical concepts. They uniquely identify sources and destinations but not necessarily specific machines. They are mapped to hardware addresses but not permanently. They can be changed.

The IP Address – IPv4 Example: It represents a long binary number divided into four parts. Each part is of eight bits so each part can assume the values since binary = 0 and binary = 255. Called a “dotted quad”. Remember, computers can only deal with bits! How many bits does this address represent? How ever many, it’s not enough…

Address classes There is a large but finite number of addresses in this scheme. So some organization is necessary. We can use the first bit to split all possible addresses into two groups to to

Address classes - A Consider the first group: to In decimal that is to These addresses are called class “A”. About half of all possible addresses are of this class. There are some other rules we’ll consider later.

Address classes Now consider that second group These are the ones that all start with to Let us divide all these possible addresses into two groups by using the second bit, giving… to to

Address classes - B Consider the first of these groups: to In decimal that is to These addresses are called class “B”. About one fourth of all possible addresses are of this class (half of half).

Address classes Now consider that second second group These are the ones that all start with to Let us divide all these possible addresses into two groups by using the third bit, giving… to to

Address classes - C Consider the first of these groups: to In decimal that is to These addresses are called class “C”. About one eighth of all possible addresses are of this class (half of half of half).

Address classes – other Finally, consider the second of these groups: to In decimal that is to These are the other class addresses that are not in general use.

Address Classes Summary The first bit distinguishes Class A from the rest. Class A addresses start with to Class B addresses start with 1. The second bit, being 0, distinguishes Class B, from the rest to Class C addresses start with 11. The third bit, being 0, distinguishes Class C from the rest to

Assigned Class Addresses So we have this huge range of addresses called “Class A” to assign to people… to Q: How do we organize this? A: The number assigning authority decrees that it will assign addresses by fixing the first byte and letting you play with the rest how you will.

Assigned Class Addresses Class A addresses: 1 st byte is assigned to you. Class B addresses: First 2 bytes are assigned to you. Class C addresses: First 3 bytes are assigned to you. Here’s a sample Class A address: 115.x.x.x. You know it’s class A because of the value of the first byte. The values of the other three bytes are up to you to assign to the devices on your network.

Assigned Class Addresses Class B addresses: First 2 bytes are assigned to you. Here’s a sample Class B address: x.x. You know it’s class B because of the value of the first byte. The values of the other two bytes are up to you to assign to the devices on your network

Assigned Class Addresses Class C addresses: First 2 bytes are assigned to you. Here’s a sample Class B address: x. You know it’s class C because of the value of the first byte. The values of the last byte are up to you to assign to the devices on your network.

Subnetting Just as the IANA divides up all the available addresses in a class by assigning fixed values to bytes, we can do the same within our own allocation of addresses. How we do this would depend on how many subnets we wanted to create in our network. Maybe subnet by department or building or floor or whatever…

Subnetting For example, if we’re given the class B address x.x, we have two bytes to play with mostly however we want. It’s up to us to divide those bytes among subnets and the actual equipment on the network, called hosts. We denote the use of bytes using the letters n(etwork), s(ubnet), and h(ost) x.x goes to nnnnnnnn.nnnnnnnn.xxxxxxxx.xxxxxxxx (for now)

Subnetting x.x We control all addresses from to ! Woohoo! Assume the extreme case – we don’t want to subdivide our addresses. We denote this: nnnnnnnn.nnnnnnnn.hhhhhhhh.hhhhhhhh. This means that, on our one big network, we can have host addresses from x.x.0.0 to x.x , only you can’t have a host address of all 0s or all 1s so it’s really x.x.0.1 to x.x (Hosts of all 0s and all 1s have special uses.)

Subnetting x.x Assume that we wanted to divide our network into two subnets. We could do this by using the first bit of the bytes that we control. We denote this: nnnnnnnn.nnnnnnnn.shhhhhhh.hhhhhhhh. Setting this bit to 1 or 0 enables us to divide our addresses into two groups. This is the same system used to create classes.

Subnetting x.x Subnet one is: to Subnet two is: to Remember that you can’t have hosts of all 0s or all 1s so 0 and 255 are right out.

Subnetting x.x Assume that we wanted to divide our network into four subnets. We could do this by using the first two bits of the bytes that we control. We denote this: nnnnnnnn.nnnnnnnn.sshhhhhh.hhhhhhhh. Setting these bits to 00, 01, 10, or 11 enables us to divide our addresses into four groups.

Subnetting x.x Subnet one is: to x.x to x.x Subnet two is: to x.x to x.x Subnet three is: to x.x to x.x Subnet four is: to x.x to x.x

Subnetting x.x Consider our class B address x.x. We decide to use five of the bits to designate subnets: Nnnnnnnn.nnnnnnnn.ssssshhh.hhhhhhhh This gives us 2 5 or 32 subnets. Each subnet has 2 11 – 2 or 2046 host addresses. 32 x 2046 = 65,472 total addresses.

Subnetting x.x Consider our class B address x.x. We decide to use seven of the bits to designate subnets: Nnnnnnnn.nnnnnnnn.sssssssh.hhhhhhhh This gives us 2 7 or 128 subnets. Each subnet has 2 9 – 2 or 510 host addresses. 128 x 510 = 65,280 total addresses.

Subnet masking – basic concept A mask is a bit pattern that we can use to indicate which parts are shared, are the same, among a group of IP addresses. This would indicate that those addresses are on the same part of the network. A mask is an IP-address-like thing created by comparing the bits of two IP addresses, starting from the left. As long as the bits in the same position (1 st, 2 nd, etc) are alike, the corresponding bit in the mask is set to one. But the first time they differ, the corresponding bit in the mask is set to 0 and so are all the remaining bits in the mask.

Subnet masking – basic concept For example, given two addresses, and , we can create a mask that would accommodate them: The mask would be: or

Subnet masking – class mask Given that mask, , why is it not surprising that the first two bytes are both 255? Because these two addresses belong to the same class B network address! The mask for two addresses that are part of the same class B network address will always begin with ! And the mask for two addresses that are part of the same class A network address will always begin with 255. And the mask for two addresses that are part of the same class C network address will always begin with This is called the class mask. Easy to see from the first byte.

Subnet masking – network mask To addresses that are on the same subnet, will share another set of bits in common – those that you decided to use to designate subnets. Consider that you decided to use seven of the bits to designate subnets: nnnnnnnn.nnnnnnnn.sssssssh.hhhhhhhh The mask that identifies your subnets must be: or

Subnet masking – use A network manager wants to allow access to a file server only to requests that come from within the company’s network. The company has been given a class C address of X. The mask is because it is a class C address. The firewall can simply compare all source addresses of requests to its own address, say using the mask. So, given a request from : = = = yyyyyyyy.yyyyyyyy.yyyyynxx.xxxxxxxx = fails!

Subnet masking – use The same guy wants to allow access to a file server only to requests that come from within a certain department that owns the firewall. The company has been given a class C address of X and uses the first two bits to designate subnets. The mask is The first three bytes are the class mask. 192 comes from the use of the first two bits of the fourth byte to designate subnets. The firewall can simply compare all source addresses of requests to its own address, say using the mask. So, given a request from : = = = yyyyyyyy.yyyyyyyy.yyyyyyyy.nxxxxxxx = fails!

IPv6 The problem with IPv4 is that there are not enough addresses. IPv6 addresses this by providing long addresses, hence more potential addresses. Downward compatible with IPv4.