Download presentation
Presentation is loading. Please wait.
1
TCP/IP Addressing and Data Delivery
The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques
2
OSI Model Location Network 3 Data Link 2 Application 7 Presentation 6
Session Transport 5 4 Network Data Link 3 Physical 2 1
3
The TCP/IP Model Application OSI Model TCP/IP Model Presentation
Session Transport Transport Network Internet Data Link Data Link Physical
4
Encapsulation on TCP/IP Networks
Data is sent from Application layer to Transport layer. Transport layer adds header to datagram and moves datagram to Internet layer. Internet layer adds another header and passes datagram to Network layer. Network layer adds header and trailer. Entire packet with header and trailer is sent. On receipt, headers and trailers are removed from data and it moves to Application layer.
5
Connection-Oriented and Connectionless Protocols
Connection-oriented protocols: Connection established before any data is sent. Stream of data delivered in the order it was sent. Example: TCP. Connectionless protocols: Connection is not established before data is sent. Data may be delivered out of order. Example: UDP.
6
TCP TCP: Connection-oriented protocol. Guaranteed delivery.
Part of the Internet protocol suite. Breaks data into segments then reassembles at the receiver end. Resends any data lost in transit. Resequences data. Sends data, waits for acknowledgement, resubmits, if necessary.
7
The Three-Way Handshake
SYN: Active open by client sending SYN to server. Client sets packet sequence number to random value, A. SYN-ACK: Server replies with SYN-ACK. Acknowledgement number is A+1. Sequence number is another random value, B. ACK: Client sends ACK to server. Sequence number is the received acknowledgement value. Acknowledgement number is B+1.
8
UDP UDP: Connectionless IP suite Transport-layer protocol.
Used with IP. Smaller, simpler header than TCP uses. Faster service: Does not wait for acknowledgement. Used in: VoIP. Real-time video. Network management applications. Used when performance is more important than ability to receive all data.
9
IP OSI Layer 3 protocol. Responsible for routing individual datagrams.
Connectionless protocol. Acts as intermediary between higher protocol layers and the network. Carries TCP or UDP payload. When used with TCP: IP provides connection. TCP provides reliability.
10
Receiving Node Buffers Fill
ICMP Flood warning Sending Node Receiving Node Receiving Node Buffers Fill 2 1 Data 3 Source Quench Message
11
Used for multicast packet routing
IGMP IGMP Used for multicast packet routing
12
ARP
13
Protocol Analyzers Displays captured frames and contents
14
Data Transmission on IP Networks
Sender transmits PDU and waits for ACK signal. Throughput increased if data is sent as larger PDUs. PDUs at Layer 4: Segments for TCP. Datagrams for UDP.
15
Introduction to IP Addressing
Configure: IP address. Subnet mask. Default gateway. Benefits of using IP: Unique network addresses using IP addresses and subnet masks. Nodes can determine if PDU is destined for local or remote network. Routers use network address and default gateway to send PDU to correct network.
16
Binary and Decimal Conversion
17
IP Addresses
18
Dotted Decimal Notation
Binary Format Decimal Notation
19
Subnet mask ignores the node portion
Subnet Masks Network portion Node portion IP address Subnet mask differentiates the network and node portions of the binary IP address Network address Network portion Subnet mask ignores the node portion
20
Network is divided into smaller subnetworks
Subnets Subnet A Subnet B Network is divided into smaller subnetworks
21
IP Address Assignment Rules
TCP/IP
22
IP Address Classes Address Class Address Range Class A
to Class B to Class C to Class D to Class E to
23
Available Host and Network Addresses
Calculate number of available host addresses: 2n-2 Can’t have all zeros or all ones Calculate number of available network addresses: 2a No need to reserve addresses
24
Private IP Addresses 10.0.0.0 to 10.255.255.255
25
Private IP Address Conflicts
/24 /24 Company Intranet
26
Private IP Address Conflicts (Cont.)
/24 /24 /24 Duplicate addresses on this segment Company Intranet
27
Private IP Address Conflicts (Cont.)
/24 /24 VPN tunnel between two private networks Both internal networks use the same IP addresses, causing duplicates. One network needs to be changed, for example, to
28
Default gateway is the address of the router connected to the Internet
Default Gateways Gateway Default gateway is the address of the router connected to the Internet
29
Custom Subnets Routes traffic between subnets Host range that arises from use of a non-default subnet mask A class of leased addresses that are divided into smaller groups
30
Custom Subnet Masks Original subnet mask /24 Custom subnet mask /26
31
Classless Inter-Domain Routing
CIDR combines the network address with a number /23
32
The Custom Subnetting Process
Dividing line Dividing line Network Host Network Host Subnetwork /26 “subnet zero” Subnetwork /26 “subnet 64” One network with 256 host addresses Four subnetworks with 64 host addresses each Network /24 Subnetwork /26 “subnet 128” Subnetwork /26 “subnet 192”
33
Number of subnets you need Move the mask this many bits to the right
The Delta Method Number of subnets you need Move the mask this many bits to the right
34
Network ID Calculation
Step Example 1. Identify octet that contains both network and node bits 2. Convert shared octet for IP address to binary, add leading 0s as needed 3. Remove node bits from shared octet by applying subnet mask 4. Convert shared portion of IP address back to decimal is 112, so the base network ID is
35
Guidelines for Creating Custom IP Addressing Schemes
To create custom subnets: Assign an entire Class C octet to a subnet when possible. If your subnet has many nodes, consider using a shorter mask to create a larger address pool (/23 or /22). Make sure none of your subnets have overlapping IP addresses. To create custom subnet masks: Use the table to quickly map the number of needed subnets to the number of borrowed mask bits. Do not use custom subnet masks (VLSM) unless necessary. Exception: When assigning subnets to point-to-point WAN links, use a /30 mask to conserve IP addresses. To use CIDR: Use CIDR notation (as opposed to dotted decimal) for VLSM. When subnetting, physically organize the network topology so the subnets can be aggregated together into a supernet by a single border router.
36
Guidelines for Creating Custom IP Addressing Schemes (Cont.)
To perform the subnetting process: Determine the number of subnets you need based on how many geographical locations, how many VLANs, or the need to isolate segments. Use the delta method to determine the subnet ID increments and the IP address ranges for each subnet. Use the number of subnets and number of mask bits table to help you with the subnetting process. To perform the delta method: Draw the number of mask bits in a diagram to help you identify the old and new mask positions. Use the number of subnets and number of mask bits table to help you identify the delta. To perform network ID calculation: Remember the network (subnet) ID must be an increment of a binary number (1, 2, 4, 8, 16, 32, 64, or 128). Use a diagram of bits to help identify the delta and the network ID increments.
37
IPv4 Address Space Limitations
A theoretical maximum of approximately 4,295 billion separate addresses. The division of the address space into fixed classes: Node addresses falling either between classes or between subnets are unavailable for assignment. IP address classes provide a small number of node addresses. Depletion of Class A and Class B IP address assignments. Unassigned and unused address ranges within existing Class A and Class B blocks.
38
IPv6 128-bit binary address space.
340 billion, trillion, trillion addresses. New features: Simplified address headers. Hierarchical addressing. Support for time-sensitive network traffic. Required security. New structure for unicast addressing. Benefits include: Non-essential info in headers moved to optional extension headers. Stateless auto-reconfiguration of hosts. New IP header field enables IP to guarantee allocation of network resources. Implements Network-layer encryption and authentication with IPSec.
39
Transmission Types Unicast Multicast Anycast
40
IPv6 Addresses 2001:0db8:85a3:0000:0000:8a2e:0370:7334/64
Global addresses Site-local addresses Link-local addresses IPv6 transitional addresses Site (org) RIR ISP Subnet Host 2001:0db8:85a3:0000:0000:8a2e:0370:7334/64
41
IPv6 Tunneling Envelopes data packet in a form acceptable to the carrier: Microsoft DirectAccess Teredo tunneling Miredo tunneling 6to4 4to6
42
Router Solicitation and Advertising
Router transmits router advertisement messages to nodes on link Nodes can send router solicitation messages to all routers on the link
43
Protocols bound to the network interface
Protocol Binding Network interface Protocols bound to the network interface
44
Guidelines for Implementing IPv6 Addressing
Implement IPv6 in phases. Ensure interoperability between IPv4 and IPv6. IPv4 network classes will not apply to IPv6. Configure AAAA DNS records for IPv6. Upgrade hardware to support IPv6. Ensure IPv6 environment is scalable. Ensure IPv6 packets sent on IPv4 network are encapsulated.
45
Connections Unacknowledged connectionless Acknowledged connectionless
Connection-oriented
46
Flow Control Technique for optimizing data exchange between systems:
Too much data, receiving node may drop packets. Too little data, receiver sits idle. Two flow control techniques are: Buffering. Data windows. TCP uses flow control to regular flow of data. UDP makes no attempt at flow control.
47
Buffering Handled by network card. Cache controller manages caching.
To avoid flooding, squelch signal is used. TCP communicates the receiver’s buffer size so sender knows how much data it can send. UDP discards packets it cannot accommodate and expects the application to manage any errors.
48
Data Windows Without data windows With data windows 1 10 Packet ACK
Defines how much data can be sent without waiting for an acknowledgment
49
Data sent with EDC in trailer Request data be retransmitted
Error Detection Data sent with EDC in trailer Receiver generates an EDC and compares it with the one sent in the trailer Yes Do they match? No Request data be retransmitted Process data
50
Parity Checking Sender Receiver 1 1 1 2 3 4
Devices check data word by word 2 Sender adds one bit to each word of data 3 Receiver compares the transmitted and received bytes Compare bytes with parity bits Sender Receiver If there is a mismatch, the receiver requests retransmission 4 1 1 Parity bit Parity bit
51
Cyclic Redundancy Checking
Sender attaches CRC to data Receiver calculates CRC for received block 1 2 Compare CRCs for error Values match and data is unaltered 3 1 1 1 1 CRC 1 1 1 1 CRC
52
Reflective Questions Where would you expect to use custom subnet masks? What measures have you taken to prepare for implementing IPv6?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.