SlideShare une entreprise Scribd logo
1  sur  72
  All About IP’S ,[object Object],[object Object],[object Object]
Chapter  4 Objectives  Upon completion you will be able to: IP Addresses: Classful Addressing ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.1  INTRODUCTION 4.1  INTRODUCTION The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a  32-bit address  that uniquely and universally defines the connection of a host or a router to the Internet. IP addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address.  The topics discussed in this section include: Address Space Notation
An IP address is a 32-bit address. Note:
The IP addresses are unique. Note:
The address space of IPv4 is 2 32  or  4,294,967,296. Note:
Figure 4.1   Dotted-decimal notation
The binary, decimal, and hexadecimal number systems are reviewed in Appendix B. Note:
Change the following IP addresses from binary notation to dotted-decimal notation. a.  10000001 00001011 00001011 11101111 b . 11000001 10000011 00011011 11111111 c.  11100111 11011011 10001011 01101111 d.  11111001 10011011 11111011 00001111 Example  1 Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation: a.  129.11.11.239    b.  193.131.27.255 c.  231.219.139.111  d.   249.155.251.15
Change the following IP addresses from dotted-decimal notation to binary notation. a.  111.56.45.78 b.  221.34.7.82 c.  241.8.56.12 d.  75.45.34.78 Example  2 Solution We replace each decimal number with its binary equivalent: a.  01101111 00111000 00101101 01001110 b.  11011101 00100010 00000111 01010010 c.  11110001 00001000 00111000 00001100 d.  01001011 00101101 00100010 01001110
Find the error, if any, in the following IP addresses: a.  111.56.045.78 b.  221.34.7.8.20 c.  75.45.301.14 d.  11100010.23.14.67 Example  3 Solution a.  There are no leading zeroes in dotted-decimal notation (045). b.  We may not have more than four numbers in an IP address. c.   In dotted-decimal notation, each number is less than or equal   to 255; 301 is outside this range. d.  A mixture of binary notation and dotted-decimal notation is not   allowed.
Change the following IP addresses from binary notation to hexadecimal notation. a.  10000001 00001011 00001011 11101111 b.  11000001 10000011 00011011 11111111 Example  4 Solution We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B). Note that hexadecimal notation normally has no added spaces or dots; however, 0X (or 0x) is added at the beginning or the subscript 16 at the end to show that the number is in hexadecimal. a.  0X810B0BEF or 810B0BEF 16 b.  0XC1831BFF or C1831BFF 16
4.2  CLASSFUL ADDRESSING IP addresses, when started a few decades ago, used the concept of classes. This architecture is called  classful addressing . In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture. However, part of the Internet is still using classful addressing, but the migration is very fast.  The topics discussed in this section include: Recognizing Classes Netid and Hostid Classes and Blocks Network Addresses Sufficient Information Mask CIDR Notation Address Depletion
Figure 4.2   Occupation of the address space
Table 4.1   Addresses per class
Figure 4.3   Finding the class in binary notation
Figure 4.4   Finding the address class
How can we prove that we have 2,147,483,648 addresses in class A? Example  5 Solution In class A, only 1 bit defines the class. The remaining 31 bits are available for the address. With 31 bits, we can have 2 31 or 2,147,483,648 addresses.
Find the class of each address: a.   0 0000001 00001011 00001011 11101111 b.   110 00001 10000011 00011011 11111111 c.   10 100111 11011011 10001011 01101111 d.   1111 0011 10011011 11111011 00001111 Example  6 Solution See the procedure in Figure 4.4. a.  The first bit is 0. This is a class A address. b.  The first 2 bits are 1; the third bit is 0. This is a class C address. c.  The first bit is 0; the second bit is 1. This is a class B address. d.  The first 4 bits are 1s. This is a class E address..
Figure 4.5   Finding the class in decimal notation
Find the class of each address: a.  227.12.14.87 b. 193.14.56.22 c. 14.23.120.8 d.  252.5.15.111 e. 134.11.78.56 Example  7 Solution a.  The first byte is 227 (between 224 and 239); the class is D. b . The first byte is 193 (between 192 and 223); the class is C. c.  The first byte is 14 (between 0 and 127); the class is A. d.  The first byte is 252 (between 240 and 255); the class is E. e.  The first byte is 134 (between 128 and 191); the class is B.
In Example 5 we showed that class A has 2 31  (2,147,483,648) addresses. How can we prove this same fact using dotted-decimal notation? Example  8 Solution The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show that the difference between these two numbers is 2,147,483,648. This is a good exercise because it shows us how to define the range of addresses between two addresses. We notice that we are dealing with base 256 numbers here. Each byte in the notation has a weight. The weights are as follows (see Appendix B): See Next Slide
256 3 , 256 2 , 256 1 , 256 0 Example  8  (continued) Last address: 127 × 256 3  + 255 × 256 2  +    255 × 256 1  + 255 × 256 0  = 2,147,483,647 First address: = 0 Now to find the integer value of each number, we multiply each byte by its weight: If we subtract the first from the last and add 1 to the result (remember we always add 1 to get the range), we get 2,147,483,648 or 2 31 .
Figure 4.6   Netid and hostid
Millions of class A addresses are wasted. Note:
Figure 4.7   Blocks in class A
Figure 4.8   Blocks in class B
Many class B addresses are wasted. Note:
Figure 4.9   Blocks in class C
The number of addresses in class C is smaller than the needs of most organizations. Note:
Class D addresses are used for multicasting; there is only one block in this class. Note:
Class E addresses are reserved for future purposes; most of the block is wasted. Note:
In classful addressing, the network address (the first address in the block) is the one that is assigned to the organization. The range of addresses can automatically be inferred from the network address. Note:
Given the network address 17.0.0.0, find the class, the block, and the range of the addresses. Example  9 Solution The class is A because the first byte is between 0 and 127. The block has a netid of 17. The addresses range from 17.0.0.0 to 17.255.255.255.
Given the network address 132.21.0.0, find the class, the block, and the range of the addresses. Example  10 Solution The class is B because the first byte is between 128 and 191. The block has a netid of 132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
Given the network address 220.34.76.0, find the class, the block, and the range of the addresses. Example  11 Solution The class is C because the first byte is between 192 and 223. The block has a netid of 220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
Figure 4.10   Masking concept
Figure 4.11   AND operation
Table 4.2  Default masks
The network address is the beginning address of each block. It can be found by applying the default mask to any of the addresses in the block (including itself). It retains the netid of the block and sets the hostid to zero. Note:
Given the address 23.56.7.91, find the beginning address (network address). Example  12 Solution The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is  23.0.0.0.
Given the address 132.6.17.85, find the beginning address (network address). Example  13 Solution The default mask is 255.255.0.0, which means that the first 2 bytes are preserved and the other 2 bytes are set to 0s. The network address is  132.6.0.0 .
Given the address 201.180.56.5, find the beginning address (network address). Example  14 Solution The default mask is 255.255.255.0, which means that the first 3 bytes are preserved and the last byte is set to 0. The network address is  201.180.56.0 .
Note that we must not apply the default mask of one class to an address belonging to another class. Note:
4.3  OTHER ISSUES In this section, we discuss some other issues that are related to addressing in general and classful addressing in particular.  The topics discussed in this section include: Multihomed Devices Location, Not Names Special Addresses Private Addresses Unicast, Multicast, and Broadcast Addresses
Figure 4.12   Multihomed devices
Table 4.3  Special addresses
Figure 4.13   Network address
Figure 4.14   Example of direct broadcast address
Figure 4.15   Example of limited broadcast address
Figure 4.16   Examples of “this host on this network”
Figure 4.17   Example of “specific host on this network”
Figure 4.18   Example of loopback address
Table 4.5  Addresses for private networks
Multicast delivery will be discussed in depth in Chapter 15. Note:
Table 4.5  Category addresses
Table 4.6  Addresses for conferencing
Figure 4.19   Sample internet
4.4  SUBNETTING AND    SUPERNETTING In the previous sections we discussed the problems associated with classful addressing. Specifically, the network addresses available for assignment to organizations are close to depletion. This is coupled with the ever-increasing demand for addresses from organizations that want connection to the Internet. In this section we briefly discuss two solutions: subnetting and supernetting. The topics discussed in this section include: Subnetting Supernetting Supernet Mask Obsolescence
IP addresses are designed with two levels of hierarchy. Note:
Figure 4.20   A network with two levels of hierarchy (not subnetted)
Figure 4.21   A network with three levels of hierarchy (subnetted)
Figure 4.22   Addresses in a network with and without subnetting
Figure 4.23   Hierarchy concept in a telephone number
Figure 4.24   Default mask and subnet mask
What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Example  15 Solution We apply the AND operation on the address and the subnet mask. Address    ➡  11001000 00101101 00100010 00111000 Subnet Mask    ➡  11111111 11111111 11110000 00000000 Subnetwork Address  ➡  11001000 00101101 00100000 00000000.
Figure 4.25   Comparison of a default mask and a subnet mask
Figure 4.26   A supernetwork
In subnetting, we need the first address of the subnet and the subnet mask to define the range of addresses. In supernetting, we need the first address of the supernet and the supernet mask to define the range of addresses. Note:
Figure 4.27   Comparison of subnet, default, and supernet masks
The idea of subnetting and supernetting of classful addresses is almost obsolete. Note:
T H A N K Y O U

Contenu connexe

Tendances (20)

IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
IPv4
IPv4IPv4
IPv4
 
IP addressing
IP addressingIP addressing
IP addressing
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Transport layer
Transport layer Transport layer
Transport layer
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Logical addressing
Logical  addressingLogical  addressing
Logical addressing
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 

En vedette (12)

Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
Ch13
Ch13Ch13
Ch13
 
IP Address
IP AddressIP Address
IP Address
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
 
Ch12
Ch12Ch12
Ch12
 
Ch14
Ch14Ch14
Ch14
 
IP adress and routing(networking)
IP adress and routing(networking)IP adress and routing(networking)
IP adress and routing(networking)
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Protocols
ProtocolsProtocols
Protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similaire à About ip address

Chap 04
Chap 04Chap 04
Chap 04IGNOU
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxssuserc1e786
 
IPv4 Address uploading.ppt
IPv4 Address uploading.pptIPv4 Address uploading.ppt
IPv4 Address uploading.pptSanthiS10
 
1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.ppt1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.pptPUSHPAKJAIN8
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptxlaiba29012
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.pptsol zem
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSubnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSovonesh Pal
 
Chapter5(i pv4 address)
Chapter5(i pv4 address)Chapter5(i pv4 address)
Chapter5(i pv4 address)raghad mejeed
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptJayaprasanna4
 
Chap 05
Chap 05Chap 05
Chap 05IGNOU
 

Similaire à About ip address (20)

Chap 04
Chap 04Chap 04
Chap 04
 
Ch04
Ch04Ch04
Ch04
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptx
 
IPv4 Address uploading.ppt
IPv4 Address uploading.pptIPv4 Address uploading.ppt
IPv4 Address uploading.ppt
 
ip address
ip addressip address
ip address
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.ppt1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.ppt
 
Chap 04
Chap 04Chap 04
Chap 04
 
IP addressing
IP addressingIP addressing
IP addressing
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptx
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.ppt
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSubnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
 
Chapter5(i pv4 address)
Chapter5(i pv4 address)Chapter5(i pv4 address)
Chapter5(i pv4 address)
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
 
Chap 05
Chap 05Chap 05
Chap 05
 
Ch05
Ch05Ch05
Ch05
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 

Plus de gaurav koriya

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
ALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMSALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMSgaurav koriya
 
INDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJABINDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJABgaurav koriya
 
Katrin Aand Shruti Pps
Katrin Aand Shruti PpsKatrin Aand Shruti Pps
Katrin Aand Shruti Ppsgaurav koriya
 

Plus de gaurav koriya (7)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Hacking techniques
Hacking techniquesHacking techniques
Hacking techniques
 
pointers 1
pointers 1pointers 1
pointers 1
 
ALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMSALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMS
 
INDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJABINDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJAB
 
Katrin Aand Shruti Pps
Katrin Aand Shruti PpsKatrin Aand Shruti Pps
Katrin Aand Shruti Pps
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Dernier

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

About ip address

  • 1.
  • 2.
  • 3. 4.1 INTRODUCTION 4.1 INTRODUCTION The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address that uniquely and universally defines the connection of a host or a router to the Internet. IP addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address. The topics discussed in this section include: Address Space Notation
  • 4. An IP address is a 32-bit address. Note:
  • 5. The IP addresses are unique. Note:
  • 6. The address space of IPv4 is 2 32 or 4,294,967,296. Note:
  • 7. Figure 4.1 Dotted-decimal notation
  • 8. The binary, decimal, and hexadecimal number systems are reviewed in Appendix B. Note:
  • 9. Change the following IP addresses from binary notation to dotted-decimal notation. a. 10000001 00001011 00001011 11101111 b . 11000001 10000011 00011011 11111111 c. 11100111 11011011 10001011 01101111 d. 11111001 10011011 11111011 00001111 Example 1 Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation: a. 129.11.11.239 b. 193.131.27.255 c. 231.219.139.111 d. 249.155.251.15
  • 10. Change the following IP addresses from dotted-decimal notation to binary notation. a. 111.56.45.78 b. 221.34.7.82 c. 241.8.56.12 d. 75.45.34.78 Example 2 Solution We replace each decimal number with its binary equivalent: a. 01101111 00111000 00101101 01001110 b. 11011101 00100010 00000111 01010010 c. 11110001 00001000 00111000 00001100 d. 01001011 00101101 00100010 01001110
  • 11. Find the error, if any, in the following IP addresses: a. 111.56.045.78 b. 221.34.7.8.20 c. 75.45.301.14 d. 11100010.23.14.67 Example 3 Solution a. There are no leading zeroes in dotted-decimal notation (045). b. We may not have more than four numbers in an IP address. c. In dotted-decimal notation, each number is less than or equal to 255; 301 is outside this range. d. A mixture of binary notation and dotted-decimal notation is not allowed.
  • 12. Change the following IP addresses from binary notation to hexadecimal notation. a. 10000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 Example 4 Solution We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B). Note that hexadecimal notation normally has no added spaces or dots; however, 0X (or 0x) is added at the beginning or the subscript 16 at the end to show that the number is in hexadecimal. a. 0X810B0BEF or 810B0BEF 16 b. 0XC1831BFF or C1831BFF 16
  • 13. 4.2 CLASSFUL ADDRESSING IP addresses, when started a few decades ago, used the concept of classes. This architecture is called classful addressing . In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture. However, part of the Internet is still using classful addressing, but the migration is very fast. The topics discussed in this section include: Recognizing Classes Netid and Hostid Classes and Blocks Network Addresses Sufficient Information Mask CIDR Notation Address Depletion
  • 14. Figure 4.2 Occupation of the address space
  • 15. Table 4.1 Addresses per class
  • 16. Figure 4.3 Finding the class in binary notation
  • 17. Figure 4.4 Finding the address class
  • 18. How can we prove that we have 2,147,483,648 addresses in class A? Example 5 Solution In class A, only 1 bit defines the class. The remaining 31 bits are available for the address. With 31 bits, we can have 2 31 or 2,147,483,648 addresses.
  • 19. Find the class of each address: a. 0 0000001 00001011 00001011 11101111 b. 110 00001 10000011 00011011 11111111 c. 10 100111 11011011 10001011 01101111 d. 1111 0011 10011011 11111011 00001111 Example 6 Solution See the procedure in Figure 4.4. a. The first bit is 0. This is a class A address. b. The first 2 bits are 1; the third bit is 0. This is a class C address. c. The first bit is 0; the second bit is 1. This is a class B address. d. The first 4 bits are 1s. This is a class E address..
  • 20. Figure 4.5 Finding the class in decimal notation
  • 21. Find the class of each address: a. 227.12.14.87 b. 193.14.56.22 c. 14.23.120.8 d. 252.5.15.111 e. 134.11.78.56 Example 7 Solution a. The first byte is 227 (between 224 and 239); the class is D. b . The first byte is 193 (between 192 and 223); the class is C. c. The first byte is 14 (between 0 and 127); the class is A. d. The first byte is 252 (between 240 and 255); the class is E. e. The first byte is 134 (between 128 and 191); the class is B.
  • 22. In Example 5 we showed that class A has 2 31 (2,147,483,648) addresses. How can we prove this same fact using dotted-decimal notation? Example 8 Solution The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show that the difference between these two numbers is 2,147,483,648. This is a good exercise because it shows us how to define the range of addresses between two addresses. We notice that we are dealing with base 256 numbers here. Each byte in the notation has a weight. The weights are as follows (see Appendix B): See Next Slide
  • 23. 256 3 , 256 2 , 256 1 , 256 0 Example 8 (continued) Last address: 127 × 256 3 + 255 × 256 2 + 255 × 256 1 + 255 × 256 0 = 2,147,483,647 First address: = 0 Now to find the integer value of each number, we multiply each byte by its weight: If we subtract the first from the last and add 1 to the result (remember we always add 1 to get the range), we get 2,147,483,648 or 2 31 .
  • 24. Figure 4.6 Netid and hostid
  • 25. Millions of class A addresses are wasted. Note:
  • 26. Figure 4.7 Blocks in class A
  • 27. Figure 4.8 Blocks in class B
  • 28. Many class B addresses are wasted. Note:
  • 29. Figure 4.9 Blocks in class C
  • 30. The number of addresses in class C is smaller than the needs of most organizations. Note:
  • 31. Class D addresses are used for multicasting; there is only one block in this class. Note:
  • 32. Class E addresses are reserved for future purposes; most of the block is wasted. Note:
  • 33. In classful addressing, the network address (the first address in the block) is the one that is assigned to the organization. The range of addresses can automatically be inferred from the network address. Note:
  • 34. Given the network address 17.0.0.0, find the class, the block, and the range of the addresses. Example 9 Solution The class is A because the first byte is between 0 and 127. The block has a netid of 17. The addresses range from 17.0.0.0 to 17.255.255.255.
  • 35. Given the network address 132.21.0.0, find the class, the block, and the range of the addresses. Example 10 Solution The class is B because the first byte is between 128 and 191. The block has a netid of 132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
  • 36. Given the network address 220.34.76.0, find the class, the block, and the range of the addresses. Example 11 Solution The class is C because the first byte is between 192 and 223. The block has a netid of 220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
  • 37. Figure 4.10 Masking concept
  • 38. Figure 4.11 AND operation
  • 39. Table 4.2 Default masks
  • 40. The network address is the beginning address of each block. It can be found by applying the default mask to any of the addresses in the block (including itself). It retains the netid of the block and sets the hostid to zero. Note:
  • 41. Given the address 23.56.7.91, find the beginning address (network address). Example 12 Solution The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is 23.0.0.0.
  • 42. Given the address 132.6.17.85, find the beginning address (network address). Example 13 Solution The default mask is 255.255.0.0, which means that the first 2 bytes are preserved and the other 2 bytes are set to 0s. The network address is 132.6.0.0 .
  • 43. Given the address 201.180.56.5, find the beginning address (network address). Example 14 Solution The default mask is 255.255.255.0, which means that the first 3 bytes are preserved and the last byte is set to 0. The network address is 201.180.56.0 .
  • 44. Note that we must not apply the default mask of one class to an address belonging to another class. Note:
  • 45. 4.3 OTHER ISSUES In this section, we discuss some other issues that are related to addressing in general and classful addressing in particular. The topics discussed in this section include: Multihomed Devices Location, Not Names Special Addresses Private Addresses Unicast, Multicast, and Broadcast Addresses
  • 46. Figure 4.12 Multihomed devices
  • 47. Table 4.3 Special addresses
  • 48. Figure 4.13 Network address
  • 49. Figure 4.14 Example of direct broadcast address
  • 50. Figure 4.15 Example of limited broadcast address
  • 51. Figure 4.16 Examples of “this host on this network”
  • 52. Figure 4.17 Example of “specific host on this network”
  • 53. Figure 4.18 Example of loopback address
  • 54. Table 4.5 Addresses for private networks
  • 55. Multicast delivery will be discussed in depth in Chapter 15. Note:
  • 56. Table 4.5 Category addresses
  • 57. Table 4.6 Addresses for conferencing
  • 58. Figure 4.19 Sample internet
  • 59. 4.4 SUBNETTING AND SUPERNETTING In the previous sections we discussed the problems associated with classful addressing. Specifically, the network addresses available for assignment to organizations are close to depletion. This is coupled with the ever-increasing demand for addresses from organizations that want connection to the Internet. In this section we briefly discuss two solutions: subnetting and supernetting. The topics discussed in this section include: Subnetting Supernetting Supernet Mask Obsolescence
  • 60. IP addresses are designed with two levels of hierarchy. Note:
  • 61. Figure 4.20 A network with two levels of hierarchy (not subnetted)
  • 62. Figure 4.21 A network with three levels of hierarchy (subnetted)
  • 63. Figure 4.22 Addresses in a network with and without subnetting
  • 64. Figure 4.23 Hierarchy concept in a telephone number
  • 65. Figure 4.24 Default mask and subnet mask
  • 66. What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Example 15 Solution We apply the AND operation on the address and the subnet mask. Address ➡ 11001000 00101101 00100010 00111000 Subnet Mask ➡ 11111111 11111111 11110000 00000000 Subnetwork Address ➡ 11001000 00101101 00100000 00000000.
  • 67. Figure 4.25 Comparison of a default mask and a subnet mask
  • 68. Figure 4.26 A supernetwork
  • 69. In subnetting, we need the first address of the subnet and the subnet mask to define the range of addresses. In supernetting, we need the first address of the supernet and the supernet mask to define the range of addresses. Note:
  • 70. Figure 4.27 Comparison of subnet, default, and supernet masks
  • 71. The idea of subnetting and supernetting of classful addresses is almost obsolete. Note:
  • 72. T H A N K Y O U