SlideShare une entreprise Scribd logo
1  sur  72
  All About IP’S ,[object Object],[object Object],[object Object]
Chapter  4 Objectives  Upon completion you will be able to: IP Addresses: Classful Addressing ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.1  INTRODUCTION 4.1  INTRODUCTION The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a  32-bit address  that uniquely and universally defines the connection of a host or a router to the Internet. IP addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address.  The topics discussed in this section include: Address Space Notation
An IP address is a 32-bit address. Note:
The IP addresses are unique. Note:
The address space of IPv4 is 2 32  or  4,294,967,296. Note:
Figure 4.1   Dotted-decimal notation
The binary, decimal, and hexadecimal number systems are reviewed in Appendix B. Note:
Change the following IP addresses from binary notation to dotted-decimal notation. a.  10000001 00001011 00001011 11101111 b . 11000001 10000011 00011011 11111111 c.  11100111 11011011 10001011 01101111 d.  11111001 10011011 11111011 00001111 Example  1 Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation: a.  129.11.11.239    b.  193.131.27.255 c.  231.219.139.111  d.   249.155.251.15
Change the following IP addresses from dotted-decimal notation to binary notation. a.  111.56.45.78 b.  221.34.7.82 c.  241.8.56.12 d.  75.45.34.78 Example  2 Solution We replace each decimal number with its binary equivalent: a.  01101111 00111000 00101101 01001110 b.  11011101 00100010 00000111 01010010 c.  11110001 00001000 00111000 00001100 d.  01001011 00101101 00100010 01001110
Find the error, if any, in the following IP addresses: a.  111.56.045.78 b.  221.34.7.8.20 c.  75.45.301.14 d.  11100010.23.14.67 Example  3 Solution a.  There are no leading zeroes in dotted-decimal notation (045). b.  We may not have more than four numbers in an IP address. c.   In dotted-decimal notation, each number is less than or equal   to 255; 301 is outside this range. d.  A mixture of binary notation and dotted-decimal notation is not   allowed.
Change the following IP addresses from binary notation to hexadecimal notation. a.  10000001 00001011 00001011 11101111 b.  11000001 10000011 00011011 11111111 Example  4 Solution We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B). Note that hexadecimal notation normally has no added spaces or dots; however, 0X (or 0x) is added at the beginning or the subscript 16 at the end to show that the number is in hexadecimal. a.  0X810B0BEF or 810B0BEF 16 b.  0XC1831BFF or C1831BFF 16
4.2  CLASSFUL ADDRESSING IP addresses, when started a few decades ago, used the concept of classes. This architecture is called  classful addressing . In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture. However, part of the Internet is still using classful addressing, but the migration is very fast.  The topics discussed in this section include: Recognizing Classes Netid and Hostid Classes and Blocks Network Addresses Sufficient Information Mask CIDR Notation Address Depletion
Figure 4.2   Occupation of the address space
Table 4.1   Addresses per class
Figure 4.3   Finding the class in binary notation
Figure 4.4   Finding the address class
How can we prove that we have 2,147,483,648 addresses in class A? Example  5 Solution In class A, only 1 bit defines the class. The remaining 31 bits are available for the address. With 31 bits, we can have 2 31 or 2,147,483,648 addresses.
Find the class of each address: a.   0 0000001 00001011 00001011 11101111 b.   110 00001 10000011 00011011 11111111 c.   10 100111 11011011 10001011 01101111 d.   1111 0011 10011011 11111011 00001111 Example  6 Solution See the procedure in Figure 4.4. a.  The first bit is 0. This is a class A address. b.  The first 2 bits are 1; the third bit is 0. This is a class C address. c.  The first bit is 0; the second bit is 1. This is a class B address. d.  The first 4 bits are 1s. This is a class E address..
Figure 4.5   Finding the class in decimal notation
Find the class of each address: a.  227.12.14.87 b. 193.14.56.22 c. 14.23.120.8 d.  252.5.15.111 e. 134.11.78.56 Example  7 Solution a.  The first byte is 227 (between 224 and 239); the class is D. b . The first byte is 193 (between 192 and 223); the class is C. c.  The first byte is 14 (between 0 and 127); the class is A. d.  The first byte is 252 (between 240 and 255); the class is E. e.  The first byte is 134 (between 128 and 191); the class is B.
In Example 5 we showed that class A has 2 31  (2,147,483,648) addresses. How can we prove this same fact using dotted-decimal notation? Example  8 Solution The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show that the difference between these two numbers is 2,147,483,648. This is a good exercise because it shows us how to define the range of addresses between two addresses. We notice that we are dealing with base 256 numbers here. Each byte in the notation has a weight. The weights are as follows (see Appendix B): See Next Slide
256 3 , 256 2 , 256 1 , 256 0 Example  8  (continued) Last address: 127 × 256 3  + 255 × 256 2  +    255 × 256 1  + 255 × 256 0  = 2,147,483,647 First address: = 0 Now to find the integer value of each number, we multiply each byte by its weight: If we subtract the first from the last and add 1 to the result (remember we always add 1 to get the range), we get 2,147,483,648 or 2 31 .
Figure 4.6   Netid and hostid
Millions of class A addresses are wasted. Note:
Figure 4.7   Blocks in class A
Figure 4.8   Blocks in class B
Many class B addresses are wasted. Note:
Figure 4.9   Blocks in class C
The number of addresses in class C is smaller than the needs of most organizations. Note:
Class D addresses are used for multicasting; there is only one block in this class. Note:
Class E addresses are reserved for future purposes; most of the block is wasted. Note:
In classful addressing, the network address (the first address in the block) is the one that is assigned to the organization. The range of addresses can automatically be inferred from the network address. Note:
Given the network address 17.0.0.0, find the class, the block, and the range of the addresses. Example  9 Solution The class is A because the first byte is between 0 and 127. The block has a netid of 17. The addresses range from 17.0.0.0 to 17.255.255.255.
Given the network address 132.21.0.0, find the class, the block, and the range of the addresses. Example  10 Solution The class is B because the first byte is between 128 and 191. The block has a netid of 132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
Given the network address 220.34.76.0, find the class, the block, and the range of the addresses. Example  11 Solution The class is C because the first byte is between 192 and 223. The block has a netid of 220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
Figure 4.10   Masking concept
Figure 4.11   AND operation
Table 4.2  Default masks
The network address is the beginning address of each block. It can be found by applying the default mask to any of the addresses in the block (including itself). It retains the netid of the block and sets the hostid to zero. Note:
Given the address 23.56.7.91, find the beginning address (network address). Example  12 Solution The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is  23.0.0.0.
Given the address 132.6.17.85, find the beginning address (network address). Example  13 Solution The default mask is 255.255.0.0, which means that the first 2 bytes are preserved and the other 2 bytes are set to 0s. The network address is  132.6.0.0 .
Given the address 201.180.56.5, find the beginning address (network address). Example  14 Solution The default mask is 255.255.255.0, which means that the first 3 bytes are preserved and the last byte is set to 0. The network address is  201.180.56.0 .
Note that we must not apply the default mask of one class to an address belonging to another class. Note:
4.3  OTHER ISSUES In this section, we discuss some other issues that are related to addressing in general and classful addressing in particular.  The topics discussed in this section include: Multihomed Devices Location, Not Names Special Addresses Private Addresses Unicast, Multicast, and Broadcast Addresses
Figure 4.12   Multihomed devices
Table 4.3  Special addresses
Figure 4.13   Network address
Figure 4.14   Example of direct broadcast address
Figure 4.15   Example of limited broadcast address
Figure 4.16   Examples of “this host on this network”
Figure 4.17   Example of “specific host on this network”
Figure 4.18   Example of loopback address
Table 4.5  Addresses for private networks
Multicast delivery will be discussed in depth in Chapter 15. Note:
Table 4.5  Category addresses
Table 4.6  Addresses for conferencing
Figure 4.19   Sample internet
4.4  SUBNETTING AND    SUPERNETTING In the previous sections we discussed the problems associated with classful addressing. Specifically, the network addresses available for assignment to organizations are close to depletion. This is coupled with the ever-increasing demand for addresses from organizations that want connection to the Internet. In this section we briefly discuss two solutions: subnetting and supernetting. The topics discussed in this section include: Subnetting Supernetting Supernet Mask Obsolescence
IP addresses are designed with two levels of hierarchy. Note:
Figure 4.20   A network with two levels of hierarchy (not subnetted)
Figure 4.21   A network with three levels of hierarchy (subnetted)
Figure 4.22   Addresses in a network with and without subnetting
Figure 4.23   Hierarchy concept in a telephone number
Figure 4.24   Default mask and subnet mask
What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Example  15 Solution We apply the AND operation on the address and the subnet mask. Address    ➡  11001000 00101101 00100010 00111000 Subnet Mask    ➡  11111111 11111111 11110000 00000000 Subnetwork Address  ➡  11001000 00101101 00100000 00000000.
Figure 4.25   Comparison of a default mask and a subnet mask
Figure 4.26   A supernetwork
In subnetting, we need the first address of the subnet and the subnet mask to define the range of addresses. In supernetting, we need the first address of the supernet and the supernet mask to define the range of addresses. Note:
Figure 4.27   Comparison of subnet, default, and supernet masks
The idea of subnetting and supernetting of classful addresses is almost obsolete. Note:
T H A N K Y O U

Contenu connexe

Tendances (20)

Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Input output in linux
Input output in linuxInput output in linux
Input output in linux
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 

En vedette (12)

Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
Ch13
Ch13Ch13
Ch13
 
IP Address
IP AddressIP Address
IP Address
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
 
Ch12
Ch12Ch12
Ch12
 
Ch14
Ch14Ch14
Ch14
 
IP adress and routing(networking)
IP adress and routing(networking)IP adress and routing(networking)
IP adress and routing(networking)
 
Ip address
Ip addressIp address
Ip address
 
Protocols
ProtocolsProtocols
Protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similaire à About ip address

Chap 04
Chap 04Chap 04
Chap 04IGNOU
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxssuserc1e786
 
IPv4 Address uploading.ppt
IPv4 Address uploading.pptIPv4 Address uploading.ppt
IPv4 Address uploading.pptSanthiS10
 
1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.ppt1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.pptPUSHPAKJAIN8
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptxlaiba29012
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.pptsol zem
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSubnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSovonesh Pal
 
Chapter5(i pv4 address)
Chapter5(i pv4 address)Chapter5(i pv4 address)
Chapter5(i pv4 address)raghad mejeed
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Chap 05
Chap 05Chap 05
Chap 05IGNOU
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classfulNoctorous Jamal
 

Similaire à About ip address (20)

Chap 04
Chap 04Chap 04
Chap 04
 
Ch04
Ch04Ch04
Ch04
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptx
 
IPv4 Address uploading.ppt
IPv4 Address uploading.pptIPv4 Address uploading.ppt
IPv4 Address uploading.ppt
 
ip address
ip addressip address
ip address
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.ppt1606660774-ip-addresses-classful-3.ppt
1606660774-ip-addresses-classful-3.ppt
 
Chap 04
Chap 04Chap 04
Chap 04
 
IP addressing
IP addressingIP addressing
IP addressing
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptx
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.ppt
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSubnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
 
Chapter5(i pv4 address)
Chapter5(i pv4 address)Chapter5(i pv4 address)
Chapter5(i pv4 address)
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Ch19
Ch19Ch19
Ch19
 
Chap 05
Chap 05Chap 05
Chap 05
 
Ch05
Ch05Ch05
Ch05
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
 

Plus de gaurav koriya

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
ALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMSALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMSgaurav koriya
 
INDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJABINDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJABgaurav koriya
 
Katrin Aand Shruti Pps
Katrin Aand Shruti PpsKatrin Aand Shruti Pps
Katrin Aand Shruti Ppsgaurav koriya
 

Plus de gaurav koriya (7)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Hacking techniques
Hacking techniquesHacking techniques
Hacking techniques
 
pointers 1
pointers 1pointers 1
pointers 1
 
ALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMSALL ABOUT SQL AND RDBMS
ALL ABOUT SQL AND RDBMS
 
INDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJABINDIA N heritage -THE PUNJAB
INDIA N heritage -THE PUNJAB
 
Katrin Aand Shruti Pps
Katrin Aand Shruti PpsKatrin Aand Shruti Pps
Katrin Aand Shruti Pps
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Dernier

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Dernier (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

About ip address

  • 1.
  • 2.
  • 3. 4.1 INTRODUCTION 4.1 INTRODUCTION The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address that uniquely and universally defines the connection of a host or a router to the Internet. IP addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address. The topics discussed in this section include: Address Space Notation
  • 4. An IP address is a 32-bit address. Note:
  • 5. The IP addresses are unique. Note:
  • 6. The address space of IPv4 is 2 32 or 4,294,967,296. Note:
  • 7. Figure 4.1 Dotted-decimal notation
  • 8. The binary, decimal, and hexadecimal number systems are reviewed in Appendix B. Note:
  • 9. Change the following IP addresses from binary notation to dotted-decimal notation. a. 10000001 00001011 00001011 11101111 b . 11000001 10000011 00011011 11111111 c. 11100111 11011011 10001011 01101111 d. 11111001 10011011 11111011 00001111 Example 1 Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation: a. 129.11.11.239 b. 193.131.27.255 c. 231.219.139.111 d. 249.155.251.15
  • 10. Change the following IP addresses from dotted-decimal notation to binary notation. a. 111.56.45.78 b. 221.34.7.82 c. 241.8.56.12 d. 75.45.34.78 Example 2 Solution We replace each decimal number with its binary equivalent: a. 01101111 00111000 00101101 01001110 b. 11011101 00100010 00000111 01010010 c. 11110001 00001000 00111000 00001100 d. 01001011 00101101 00100010 01001110
  • 11. Find the error, if any, in the following IP addresses: a. 111.56.045.78 b. 221.34.7.8.20 c. 75.45.301.14 d. 11100010.23.14.67 Example 3 Solution a. There are no leading zeroes in dotted-decimal notation (045). b. We may not have more than four numbers in an IP address. c. In dotted-decimal notation, each number is less than or equal to 255; 301 is outside this range. d. A mixture of binary notation and dotted-decimal notation is not allowed.
  • 12. Change the following IP addresses from binary notation to hexadecimal notation. a. 10000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 Example 4 Solution We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B). Note that hexadecimal notation normally has no added spaces or dots; however, 0X (or 0x) is added at the beginning or the subscript 16 at the end to show that the number is in hexadecimal. a. 0X810B0BEF or 810B0BEF 16 b. 0XC1831BFF or C1831BFF 16
  • 13. 4.2 CLASSFUL ADDRESSING IP addresses, when started a few decades ago, used the concept of classes. This architecture is called classful addressing . In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture. However, part of the Internet is still using classful addressing, but the migration is very fast. The topics discussed in this section include: Recognizing Classes Netid and Hostid Classes and Blocks Network Addresses Sufficient Information Mask CIDR Notation Address Depletion
  • 14. Figure 4.2 Occupation of the address space
  • 15. Table 4.1 Addresses per class
  • 16. Figure 4.3 Finding the class in binary notation
  • 17. Figure 4.4 Finding the address class
  • 18. How can we prove that we have 2,147,483,648 addresses in class A? Example 5 Solution In class A, only 1 bit defines the class. The remaining 31 bits are available for the address. With 31 bits, we can have 2 31 or 2,147,483,648 addresses.
  • 19. Find the class of each address: a. 0 0000001 00001011 00001011 11101111 b. 110 00001 10000011 00011011 11111111 c. 10 100111 11011011 10001011 01101111 d. 1111 0011 10011011 11111011 00001111 Example 6 Solution See the procedure in Figure 4.4. a. The first bit is 0. This is a class A address. b. The first 2 bits are 1; the third bit is 0. This is a class C address. c. The first bit is 0; the second bit is 1. This is a class B address. d. The first 4 bits are 1s. This is a class E address..
  • 20. Figure 4.5 Finding the class in decimal notation
  • 21. Find the class of each address: a. 227.12.14.87 b. 193.14.56.22 c. 14.23.120.8 d. 252.5.15.111 e. 134.11.78.56 Example 7 Solution a. The first byte is 227 (between 224 and 239); the class is D. b . The first byte is 193 (between 192 and 223); the class is C. c. The first byte is 14 (between 0 and 127); the class is A. d. The first byte is 252 (between 240 and 255); the class is E. e. The first byte is 134 (between 128 and 191); the class is B.
  • 22. In Example 5 we showed that class A has 2 31 (2,147,483,648) addresses. How can we prove this same fact using dotted-decimal notation? Example 8 Solution The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show that the difference between these two numbers is 2,147,483,648. This is a good exercise because it shows us how to define the range of addresses between two addresses. We notice that we are dealing with base 256 numbers here. Each byte in the notation has a weight. The weights are as follows (see Appendix B): See Next Slide
  • 23. 256 3 , 256 2 , 256 1 , 256 0 Example 8 (continued) Last address: 127 × 256 3 + 255 × 256 2 + 255 × 256 1 + 255 × 256 0 = 2,147,483,647 First address: = 0 Now to find the integer value of each number, we multiply each byte by its weight: If we subtract the first from the last and add 1 to the result (remember we always add 1 to get the range), we get 2,147,483,648 or 2 31 .
  • 24. Figure 4.6 Netid and hostid
  • 25. Millions of class A addresses are wasted. Note:
  • 26. Figure 4.7 Blocks in class A
  • 27. Figure 4.8 Blocks in class B
  • 28. Many class B addresses are wasted. Note:
  • 29. Figure 4.9 Blocks in class C
  • 30. The number of addresses in class C is smaller than the needs of most organizations. Note:
  • 31. Class D addresses are used for multicasting; there is only one block in this class. Note:
  • 32. Class E addresses are reserved for future purposes; most of the block is wasted. Note:
  • 33. In classful addressing, the network address (the first address in the block) is the one that is assigned to the organization. The range of addresses can automatically be inferred from the network address. Note:
  • 34. Given the network address 17.0.0.0, find the class, the block, and the range of the addresses. Example 9 Solution The class is A because the first byte is between 0 and 127. The block has a netid of 17. The addresses range from 17.0.0.0 to 17.255.255.255.
  • 35. Given the network address 132.21.0.0, find the class, the block, and the range of the addresses. Example 10 Solution The class is B because the first byte is between 128 and 191. The block has a netid of 132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
  • 36. Given the network address 220.34.76.0, find the class, the block, and the range of the addresses. Example 11 Solution The class is C because the first byte is between 192 and 223. The block has a netid of 220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
  • 37. Figure 4.10 Masking concept
  • 38. Figure 4.11 AND operation
  • 39. Table 4.2 Default masks
  • 40. The network address is the beginning address of each block. It can be found by applying the default mask to any of the addresses in the block (including itself). It retains the netid of the block and sets the hostid to zero. Note:
  • 41. Given the address 23.56.7.91, find the beginning address (network address). Example 12 Solution The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is 23.0.0.0.
  • 42. Given the address 132.6.17.85, find the beginning address (network address). Example 13 Solution The default mask is 255.255.0.0, which means that the first 2 bytes are preserved and the other 2 bytes are set to 0s. The network address is 132.6.0.0 .
  • 43. Given the address 201.180.56.5, find the beginning address (network address). Example 14 Solution The default mask is 255.255.255.0, which means that the first 3 bytes are preserved and the last byte is set to 0. The network address is 201.180.56.0 .
  • 44. Note that we must not apply the default mask of one class to an address belonging to another class. Note:
  • 45. 4.3 OTHER ISSUES In this section, we discuss some other issues that are related to addressing in general and classful addressing in particular. The topics discussed in this section include: Multihomed Devices Location, Not Names Special Addresses Private Addresses Unicast, Multicast, and Broadcast Addresses
  • 46. Figure 4.12 Multihomed devices
  • 47. Table 4.3 Special addresses
  • 48. Figure 4.13 Network address
  • 49. Figure 4.14 Example of direct broadcast address
  • 50. Figure 4.15 Example of limited broadcast address
  • 51. Figure 4.16 Examples of “this host on this network”
  • 52. Figure 4.17 Example of “specific host on this network”
  • 53. Figure 4.18 Example of loopback address
  • 54. Table 4.5 Addresses for private networks
  • 55. Multicast delivery will be discussed in depth in Chapter 15. Note:
  • 56. Table 4.5 Category addresses
  • 57. Table 4.6 Addresses for conferencing
  • 58. Figure 4.19 Sample internet
  • 59. 4.4 SUBNETTING AND SUPERNETTING In the previous sections we discussed the problems associated with classful addressing. Specifically, the network addresses available for assignment to organizations are close to depletion. This is coupled with the ever-increasing demand for addresses from organizations that want connection to the Internet. In this section we briefly discuss two solutions: subnetting and supernetting. The topics discussed in this section include: Subnetting Supernetting Supernet Mask Obsolescence
  • 60. IP addresses are designed with two levels of hierarchy. Note:
  • 61. Figure 4.20 A network with two levels of hierarchy (not subnetted)
  • 62. Figure 4.21 A network with three levels of hierarchy (subnetted)
  • 63. Figure 4.22 Addresses in a network with and without subnetting
  • 64. Figure 4.23 Hierarchy concept in a telephone number
  • 65. Figure 4.24 Default mask and subnet mask
  • 66. What is the subnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Example 15 Solution We apply the AND operation on the address and the subnet mask. Address ➡ 11001000 00101101 00100010 00111000 Subnet Mask ➡ 11111111 11111111 11110000 00000000 Subnetwork Address ➡ 11001000 00101101 00100000 00000000.
  • 67. Figure 4.25 Comparison of a default mask and a subnet mask
  • 68. Figure 4.26 A supernetwork
  • 69. In subnetting, we need the first address of the subnet and the subnet mask to define the range of addresses. In supernetting, we need the first address of the supernet and the supernet mask to define the range of addresses. Note:
  • 70. Figure 4.27 Comparison of subnet, default, and supernet masks
  • 71. The idea of subnetting and supernetting of classful addresses is almost obsolete. Note:
  • 72. T H A N K Y O U