SlideShare une entreprise Scribd logo
1  sur  48
Configuring TCP/IP
PREPARED HAMEDA HURMAT
Knowing TCP/IP
Learning IP Address
Different type of IP Address
Configure IPv4 or IPv6
Understanding IP types
Understanding supernetting
Different between IPv4 and IPv6
Details of the TCP/IP Model
Application Layer The Application layer is where the applications that use the protocol stack
reside. These applications include File Transfer Protocol (FTP), Trivial File Transfer Protocol
(TFTP), Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP).
Transport Layer The Transport layer is where the two Transport layer protocols reside. These are
TCP and the User Datagram Protocol (UDP). TCP is a connection-oriented protocol, and delivery
is guaranteed. UDP is a connectionless protocol. This means that UDP does its best job to deliver
the message, but there is no guarantee.
Internet Layer The Internet layer is where IP resides. IP is a connectionless protocol that relies
on the upper layer (Transport layer) for guaranteeing delivery. Address Resolution Protocol (ARP)
also resides on this layer. ARP turns an IP address into a Media Access Control (MAC) address. All
upper and lower layers travel through the IP protocol.
Link Layer The data link protocols like Ethernet and Token Ring reside in the Link layer. This layer
is also referred to as the Network Access layer.
HowTCP/IP LayersCommunicate
When an application like FTP is called
upon, the application moves down the
layers and TCP is retrieved. TCP then
connects itself to the IP protocol and gets
released onto the network through the
Link layer
Understanding Port Numbers
TCP and UDP rely on port numbers assigned by the Internet Assigned Numbers Authority (IANA)
to forward packets to the appropriate application process.
Port numbers are 16-bit integers that are part of a message header.
Understanding IP Addressing
identifier assigned to each device on an IP network
Logical software address that designates the device’s location on the network
 All computers in the Internet understandIP.
 The main tasks of IP are:
 The addressing of the computers, and the fragmentation of packets.
There are two types of Internet Protocol:
 Internet Protocol version 4 (IPv4): currently used version ofInternet
Protocol.
 Internet Protocol version 6 (IPv6): the upcoming replacement for IPv4.It contains some
major improvements and new features.
IPv4 Address:
 An IPv4 address is a 32-bit address that uniquely and universally defines the
connection of a device (for example, a computer or a router) to the Internet.
◦ Connectionless protocol
◦ Fragments (divides) packets where necessary
◦ Addressing via 32 bit Internet addresses
 However, it contains no functions for end-to-end message reliability or flow
control. IP makes the ‘best effort’ to forward packets to the next destination, but
does not guarantee delivery because it is connectionless.
The IP address can be classify into
two classes:
 Public address:
This address considered as any valid address assigned to any user, and the organization who is
responsible for registering IP ranges called Internet Service Providers (ISPs), and this address
will be unique.
 PrivateAddress:
Any number or address assigned to a device on a private TCP/IP Local Area Network that is
accessible only within the LocalArea Network.
Internet Protocol Version 6 (IPv6)
Maintains good features of IPv4, discards bad ones.
Not compatible with IPv4
Compatible with all other Internet protocolsincluding TCP, UDP,ICMP, DNS, etc.
Main features:
–Long addresses (128 bits) ⇒ supports billions of hosts.
–Simplified, fixed size header ⇒ routers can process packets faster.
–Support for authentication and privacy
–Better support for type of service.
Internet addresses
Each network interface connected to the Internet has aunique
address consisting of two parts:
 Network address, address of the network within the Internet (used by gateways for routing IP
packets betweennetworks).
 Host address, address of the computer within the network (used for delivering packets to a
particular network interface within the network).
Internet address format
 The 32-bit IP address is separated into four 8-bit octets, allowing each octet to have a value ranging
from 0 to 255.
 Furthermore, the IP address is logically separated into two distinct components: the network ID and
the host ID. The network ID is used to identify the subnet upon which the host resides. The host ID
is used to identify the host itself within the given subnet.
 IP addresses can be displayed in three typical formats:
 Binary notation Binary notation is the format that systems on the network use to process the
address. An example of binary notation is 11000000.10101000.00000001.01100100.
 Hexadecimal notation Hexadecimal notation is the format typically used when identifying IPv6
addresses. An example of hexadecimal notation of an IPv4 address is C0.A8.01.64
Dotted-decimal notation Dotted-decimal notation is the format that is typically used for displaying the
IP address in a human-readable format. An example of dotted-decimal notation is 192.168.1.100
Classes of IP addresses
 Different networks have different sizes. Basically, there are many small
networks and few large networks.
 To provide efficient use of 32-bit address space, IPv4 defined several
address classes and associated address formats:
 Class A: allows 128 networks, 16 million hostseach.
The IP address start from 1.0.0.0 to 127.255.255.255, and the mask address is 255.0.0.0
 Class B: allows 16,382 networks, 65,534 hostseach. The IP address start from 128.0.0.0 to 191.255.255.255, and
the mask address is 255.255.0.0
Classes of IP addresses
 Class C: allows 2 million networks, 254 hosts each.
The IP address start from 192.0.0.0 to 223.255.255.255, and the mask address is 255.255.255.0
 Class D: multicast networks The IP address start from 224.0.0.0 to
239.255.255.255.
 Class E: reserved for future use. From 240 to 255 and the 255.255.255.255
used for broadcast to all the subnet.
One of the benefits of classful addresses is that they provide a hierarchy to the network through the
use of the network ID. This translates into an efficient routing environment because it is easy for a
router to determine what networks can be grouped together and treated as a single routing entry.
Private Address
 It means If the internetwork is limited to one organization, the IP addresses need only be unique
within that organization. Only networks that interface with public networks such as the Internet need
public addresses. Using public addresses on the outside and private addresses for inside networks is
very effective.
PrivateAddresses:-
RFC1918 designates three ranges of IP addresses asprivate:
 10.0.0.0 through 10.255.255.255
 172.16.0.0 through 172.31.255.255
 192.168.0.0 through 192.168.255.255
Addressing without Subnets
 If we have a class B with a Flat Network, the number of host will be more than 216=65536 hosts,
 So the problem is here, that managing this network with this number of host is too tricky and the
performance of this network will get down because of the heavy load. In other word, any single
broadcast can slowdown the network.
 Therefore, the solution is the subnetting. Subnetting means divide or separate the single
network into multiple networks that can reducethe loading from one network.
 The advantage of using subnetting is:-
1. Reduce the traffic and the increase the performance.
2. The smaller network can easier to manage.
Subnetting
 As the number of distinct local networks grows, managing them become a serious headache.
Every time a new network is installed the system administrator must contact NIC to get a new
network number.
 The solution to the problem is to allow a network to be split into several independent parts for
internal use but still act like a single network to the outside world. In the internet literature
these parts are called subnets.
Subnet masks
A mask is a 32-bit binary number that is expressed in dotted decimal notation. By default, a mask
contains two fields, the network field and the host field. These correspond to the network number
and the locally administered part of the network address. When an administrator subnets, they are
adjusting the way they view the IP address. Table 1: Default masks for classful addressing
 There three important things that should be taken into our account when we thinking about
subnetting:-
1. Network address – the first one
2. Broadcast address – the last one
3. Host addresses – everything in between
As well as, to find the number of hosts per subnet. We can use formal 2x -2,
where (x) is the number of unmasked bits (0’s) .
Example 4
An organization has purchased the Class C Address 216.21.5.0 and wouldlike
to use it to address the following 5 networks.
Example 6
Supernetting
Supernetting allows you to have two or more blocks of contiguous subnetwork addresses.
VLSM
Variable Length Subnet Masking is a technique that allows network administrators to divide an
IP address space to subnets of different sizes, unlike simple same-size subnetting.
It allows network administrator to divide an IP address into subnets of different sizes.
IPv6
An IPv6 address is 128 bits long. A mask of /64 following the IP address means the first 64 bits
are the network address
128 bits (or 16 bytes) long: four times as long as its predecessor.
2128 : about 340 billion billion billion billion different addresses
Colon hexadecimal notation:
◦ addresses are written using 32 hexadecimal digits.
◦ digits are arranged into 8 groups of four to improve the readability.
◦ Groups are separated by colons
2001:0718:1c01:0016:020d:56ff:fe77:52a3
Colon-Hex
◦ 3ffe:3600:2000:0800:0248:54ff:fe5c:8868
Compressed Format:
◦ 3ffe:0b00:0c18:0001:0000:0000:0000:0010
◦ becomes 3ffe:b00:c18:1::10
IPv6 Address Categories
IPv6 Address Types
Unicast IPv6 Addresses
The following types of addresses are unicast IPv6 addresses:
◦ Global unicast addresses
◦ Link-local addresses
◦ Site-local addresses
◦ Unique local IPv6 unicast addresses
◦ Special addresses
Global Unicast Addresses
Equivalent to public IPv4 addresses.
Globally routable and reachable on the IPv6 portion of the Internet.
Unlike the current IPv4-based Internet, which is a mixture of both flat and hierarchical routing,
the IPv6-based Internet has been designed from its foundation to support efficient, hierarchical
addressing and routing.
The scope, the portion of the IPv6 internetwork over which the address is unique, of a global
unicast address is the entire IPv6 Internet.
Global scoped communication are identified by high-level 3 bits set to 001 (2000::/3)
Global Unicast Address
Each aggregatable global unicast IPv6 address has three parts:
Fixed portion set to 001 – The three high-order bits are set to 001. The address prefix for currently assigned global
addresses is 2000::/3.
Global Routing Prefix – Site Prefix
◦ Site prefix assigned to an organization (leaf site) by a provider should be at least a /48 prefix = 45 + high-order bits
(001).
◦ /48 prefix represents the high-order 48-bit of the network prefix.
◦ prefix assigned to the organization is part of the provider’s prefix.
Subnet-id - Site
◦ With one /48 prefix allocated to an organization by a provider, it is possible for that organization to enable up to
65,535 subnets (assignment of 64-bit’s prefix to subnets).
◦ The organization can use bits 49 to 64 (16-bit) of the prefix received for subnetting.
Interface-id – Host
◦ The host part uses each node’s interface identifier.
◦ This part of the IPv6 address, which represents the address’s low-order 64-bit, is called the interface ID.
Special IPv6 Addresses
The following are special IPv6 addresses:
Unspecified address
◦ unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an address.
◦ equivalent to the IPv4 unspecified address of 0.0.0.0.
◦ used as a source address for packets attempting to verify the uniqueness of a tentative
address.
◦ never assigned to an interface or used as a destination address.
Loopback address
◦ The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling
a node to send packets to itself.
◦ It is equivalent to the IPv4 loopback address of 127.0.0.1.
◦ Packets addressed to the loopback address must never be sent on a link or forwarded by an
IPv6 router.
Multicast Addresses
Multicast Address
Main goal of multicasting is having an efficient network to save bandwidth
on links by optimizing the number of packets exchanged between nodes
In IPv4:
◦ 224.0.0.0/3, where the high-order 3-bit of the IPv4 address is set to 111
In IPv6:
Anycast Address
Anycast addresses can be considered a conceptual cross between unicast and multicast addressing.
◦ Unicast  send to this one address
◦ Multicast  send to every member of this group
◦ Anycast  send to any one member of this group
In choosing which member to send to, for efficiency reasons normally send to the closest one - closest
in routing terms.
So, anycast mean “send to the closest member of this group”.
The network itself plays the key role in anycast by routing the packet to the nearest destination by
measuring network distance.
Anycast addresses use aggregable global unicast addresses.
They can also use site-local or link-local addresses.
Note that it is impossible to distinguish an anycast address from a unicast address.
Reserved Anycast Address
Also called the subnet-router anycast address.
All IPv6 routers are required to support subnet-router anycast addresses for each of their subnet
interfaces.
Mobile IPv6 is an example of a protocol designed to use anycasting.
Thank you

Contenu connexe

Tendances

Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
Amandeep Kaur
 

Tendances (20)

Network address translation
Network address translationNetwork address translation
Network address translation
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Dhcp
DhcpDhcp
Dhcp
 
main
mainmain
main
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
DNS server config on cisco packet tracer
DNS server config on cisco packet tracerDNS server config on cisco packet tracer
DNS server config on cisco packet tracer
 
DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Dhcp
DhcpDhcp
Dhcp
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IP Address
IP AddressIP Address
IP Address
 
Dhcp
DhcpDhcp
Dhcp
 
DHCP
DHCPDHCP
DHCP
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
DHCP
DHCPDHCP
DHCP
 
net work iTM3
net work iTM3net work iTM3
net work iTM3
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 

Similaire à 5 configuring TCP/IP

07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
nandiaditi2010
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 

Similaire à 5 configuring TCP/IP (20)

IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
Hardware9
Hardware9Hardware9
Hardware9
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
IP classes
IP classesIP classes
IP classes
 
Subnet Design
Subnet DesignSubnet Design
Subnet Design
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Ip seminar
Ip seminarIp seminar
Ip seminar
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
IP Address
IP AddressIP Address
IP Address
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 

Plus de Hameda Hurmat (20)

15 Setup BIND 9
15 Setup BIND 915 Setup BIND 9
15 Setup BIND 9
 
14 FILE Server
14 FILE Server14 FILE Server
14 FILE Server
 
13 DHCP Configuration in Linux
13 DHCP Configuration in Linux13 DHCP Configuration in Linux
13 DHCP Configuration in Linux
 
11-IIS server 2016
11-IIS server 201611-IIS server 2016
11-IIS server 2016
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
7 understanding DNS
7 understanding DNS7 understanding DNS
7 understanding DNS
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
 
3 configuring basic and dynamic disks
3 configuring basic and dynamic disks3 configuring basic and dynamic disks
3 configuring basic and dynamic disks
 
2 introduction of storage
2 introduction of storage2 introduction of storage
2 introduction of storage
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OS
 
Flowers Album
Flowers AlbumFlowers Album
Flowers Album
 
Change management
Change managementChange management
Change management
 
ویندو7
ویندو7ویندو7
ویندو7
 
Interview skill
Interview skillInterview skill
Interview skill
 
Waste management
Waste managementWaste management
Waste management
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
Rule of Work
Rule of WorkRule of Work
Rule of Work
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

5 configuring TCP/IP

  • 2. Knowing TCP/IP Learning IP Address Different type of IP Address Configure IPv4 or IPv6 Understanding IP types Understanding supernetting Different between IPv4 and IPv6
  • 3. Details of the TCP/IP Model Application Layer The Application layer is where the applications that use the protocol stack reside. These applications include File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP). Transport Layer The Transport layer is where the two Transport layer protocols reside. These are TCP and the User Datagram Protocol (UDP). TCP is a connection-oriented protocol, and delivery is guaranteed. UDP is a connectionless protocol. This means that UDP does its best job to deliver the message, but there is no guarantee. Internet Layer The Internet layer is where IP resides. IP is a connectionless protocol that relies on the upper layer (Transport layer) for guaranteeing delivery. Address Resolution Protocol (ARP) also resides on this layer. ARP turns an IP address into a Media Access Control (MAC) address. All upper and lower layers travel through the IP protocol. Link Layer The data link protocols like Ethernet and Token Ring reside in the Link layer. This layer is also referred to as the Network Access layer.
  • 4.
  • 5. HowTCP/IP LayersCommunicate When an application like FTP is called upon, the application moves down the layers and TCP is retrieved. TCP then connects itself to the IP protocol and gets released onto the network through the Link layer
  • 6. Understanding Port Numbers TCP and UDP rely on port numbers assigned by the Internet Assigned Numbers Authority (IANA) to forward packets to the appropriate application process. Port numbers are 16-bit integers that are part of a message header.
  • 7.
  • 8. Understanding IP Addressing identifier assigned to each device on an IP network Logical software address that designates the device’s location on the network  All computers in the Internet understandIP.  The main tasks of IP are:  The addressing of the computers, and the fragmentation of packets.
  • 9. There are two types of Internet Protocol:  Internet Protocol version 4 (IPv4): currently used version ofInternet Protocol.  Internet Protocol version 6 (IPv6): the upcoming replacement for IPv4.It contains some major improvements and new features.
  • 10. IPv4 Address:  An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet. ◦ Connectionless protocol ◦ Fragments (divides) packets where necessary ◦ Addressing via 32 bit Internet addresses  However, it contains no functions for end-to-end message reliability or flow control. IP makes the ‘best effort’ to forward packets to the next destination, but does not guarantee delivery because it is connectionless.
  • 11. The IP address can be classify into two classes:  Public address: This address considered as any valid address assigned to any user, and the organization who is responsible for registering IP ranges called Internet Service Providers (ISPs), and this address will be unique.  PrivateAddress: Any number or address assigned to a device on a private TCP/IP Local Area Network that is accessible only within the LocalArea Network.
  • 12. Internet Protocol Version 6 (IPv6) Maintains good features of IPv4, discards bad ones. Not compatible with IPv4 Compatible with all other Internet protocolsincluding TCP, UDP,ICMP, DNS, etc. Main features: –Long addresses (128 bits) ⇒ supports billions of hosts. –Simplified, fixed size header ⇒ routers can process packets faster. –Support for authentication and privacy –Better support for type of service.
  • 13. Internet addresses Each network interface connected to the Internet has aunique address consisting of two parts:  Network address, address of the network within the Internet (used by gateways for routing IP packets betweennetworks).  Host address, address of the computer within the network (used for delivering packets to a particular network interface within the network).
  • 14. Internet address format  The 32-bit IP address is separated into four 8-bit octets, allowing each octet to have a value ranging from 0 to 255.  Furthermore, the IP address is logically separated into two distinct components: the network ID and the host ID. The network ID is used to identify the subnet upon which the host resides. The host ID is used to identify the host itself within the given subnet.  IP addresses can be displayed in three typical formats:  Binary notation Binary notation is the format that systems on the network use to process the address. An example of binary notation is 11000000.10101000.00000001.01100100.  Hexadecimal notation Hexadecimal notation is the format typically used when identifying IPv6 addresses. An example of hexadecimal notation of an IPv4 address is C0.A8.01.64
  • 15. Dotted-decimal notation Dotted-decimal notation is the format that is typically used for displaying the IP address in a human-readable format. An example of dotted-decimal notation is 192.168.1.100
  • 16. Classes of IP addresses  Different networks have different sizes. Basically, there are many small networks and few large networks.  To provide efficient use of 32-bit address space, IPv4 defined several address classes and associated address formats:  Class A: allows 128 networks, 16 million hostseach. The IP address start from 1.0.0.0 to 127.255.255.255, and the mask address is 255.0.0.0  Class B: allows 16,382 networks, 65,534 hostseach. The IP address start from 128.0.0.0 to 191.255.255.255, and the mask address is 255.255.0.0
  • 17. Classes of IP addresses  Class C: allows 2 million networks, 254 hosts each. The IP address start from 192.0.0.0 to 223.255.255.255, and the mask address is 255.255.255.0  Class D: multicast networks The IP address start from 224.0.0.0 to 239.255.255.255.  Class E: reserved for future use. From 240 to 255 and the 255.255.255.255 used for broadcast to all the subnet.
  • 18. One of the benefits of classful addresses is that they provide a hierarchy to the network through the use of the network ID. This translates into an efficient routing environment because it is easy for a router to determine what networks can be grouped together and treated as a single routing entry.
  • 19. Private Address  It means If the internetwork is limited to one organization, the IP addresses need only be unique within that organization. Only networks that interface with public networks such as the Internet need public addresses. Using public addresses on the outside and private addresses for inside networks is very effective. PrivateAddresses:- RFC1918 designates three ranges of IP addresses asprivate:  10.0.0.0 through 10.255.255.255  172.16.0.0 through 172.31.255.255  192.168.0.0 through 192.168.255.255
  • 20.
  • 21.
  • 22. Addressing without Subnets  If we have a class B with a Flat Network, the number of host will be more than 216=65536 hosts,  So the problem is here, that managing this network with this number of host is too tricky and the performance of this network will get down because of the heavy load. In other word, any single broadcast can slowdown the network.  Therefore, the solution is the subnetting. Subnetting means divide or separate the single network into multiple networks that can reducethe loading from one network.  The advantage of using subnetting is:- 1. Reduce the traffic and the increase the performance. 2. The smaller network can easier to manage.
  • 23. Subnetting  As the number of distinct local networks grows, managing them become a serious headache. Every time a new network is installed the system administrator must contact NIC to get a new network number.  The solution to the problem is to allow a network to be split into several independent parts for internal use but still act like a single network to the outside world. In the internet literature these parts are called subnets.
  • 24. Subnet masks A mask is a 32-bit binary number that is expressed in dotted decimal notation. By default, a mask contains two fields, the network field and the host field. These correspond to the network number and the locally administered part of the network address. When an administrator subnets, they are adjusting the way they view the IP address. Table 1: Default masks for classful addressing
  • 25.  There three important things that should be taken into our account when we thinking about subnetting:- 1. Network address – the first one 2. Broadcast address – the last one 3. Host addresses – everything in between As well as, to find the number of hosts per subnet. We can use formal 2x -2, where (x) is the number of unmasked bits (0’s) .
  • 26.
  • 27.
  • 28. Example 4 An organization has purchased the Class C Address 216.21.5.0 and wouldlike to use it to address the following 5 networks.
  • 29.
  • 31. Supernetting Supernetting allows you to have two or more blocks of contiguous subnetwork addresses.
  • 32. VLSM Variable Length Subnet Masking is a technique that allows network administrators to divide an IP address space to subnets of different sizes, unlike simple same-size subnetting. It allows network administrator to divide an IP address into subnets of different sizes.
  • 33.
  • 34.
  • 35. IPv6 An IPv6 address is 128 bits long. A mask of /64 following the IP address means the first 64 bits are the network address 128 bits (or 16 bytes) long: four times as long as its predecessor. 2128 : about 340 billion billion billion billion different addresses Colon hexadecimal notation: ◦ addresses are written using 32 hexadecimal digits. ◦ digits are arranged into 8 groups of four to improve the readability. ◦ Groups are separated by colons 2001:0718:1c01:0016:020d:56ff:fe77:52a3
  • 36.
  • 37. Colon-Hex ◦ 3ffe:3600:2000:0800:0248:54ff:fe5c:8868 Compressed Format: ◦ 3ffe:0b00:0c18:0001:0000:0000:0000:0010 ◦ becomes 3ffe:b00:c18:1::10
  • 40. Unicast IPv6 Addresses The following types of addresses are unicast IPv6 addresses: ◦ Global unicast addresses ◦ Link-local addresses ◦ Site-local addresses ◦ Unique local IPv6 unicast addresses ◦ Special addresses
  • 41. Global Unicast Addresses Equivalent to public IPv4 addresses. Globally routable and reachable on the IPv6 portion of the Internet. Unlike the current IPv4-based Internet, which is a mixture of both flat and hierarchical routing, the IPv6-based Internet has been designed from its foundation to support efficient, hierarchical addressing and routing. The scope, the portion of the IPv6 internetwork over which the address is unique, of a global unicast address is the entire IPv6 Internet. Global scoped communication are identified by high-level 3 bits set to 001 (2000::/3)
  • 42. Global Unicast Address Each aggregatable global unicast IPv6 address has three parts: Fixed portion set to 001 – The three high-order bits are set to 001. The address prefix for currently assigned global addresses is 2000::/3. Global Routing Prefix – Site Prefix ◦ Site prefix assigned to an organization (leaf site) by a provider should be at least a /48 prefix = 45 + high-order bits (001). ◦ /48 prefix represents the high-order 48-bit of the network prefix. ◦ prefix assigned to the organization is part of the provider’s prefix. Subnet-id - Site ◦ With one /48 prefix allocated to an organization by a provider, it is possible for that organization to enable up to 65,535 subnets (assignment of 64-bit’s prefix to subnets). ◦ The organization can use bits 49 to 64 (16-bit) of the prefix received for subnetting. Interface-id – Host ◦ The host part uses each node’s interface identifier. ◦ This part of the IPv6 address, which represents the address’s low-order 64-bit, is called the interface ID.
  • 43. Special IPv6 Addresses The following are special IPv6 addresses: Unspecified address ◦ unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an address. ◦ equivalent to the IPv4 unspecified address of 0.0.0.0. ◦ used as a source address for packets attempting to verify the uniqueness of a tentative address. ◦ never assigned to an interface or used as a destination address. Loopback address ◦ The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. ◦ It is equivalent to the IPv4 loopback address of 127.0.0.1. ◦ Packets addressed to the loopback address must never be sent on a link or forwarded by an IPv6 router.
  • 45. Multicast Address Main goal of multicasting is having an efficient network to save bandwidth on links by optimizing the number of packets exchanged between nodes In IPv4: ◦ 224.0.0.0/3, where the high-order 3-bit of the IPv4 address is set to 111 In IPv6:
  • 46. Anycast Address Anycast addresses can be considered a conceptual cross between unicast and multicast addressing. ◦ Unicast  send to this one address ◦ Multicast  send to every member of this group ◦ Anycast  send to any one member of this group In choosing which member to send to, for efficiency reasons normally send to the closest one - closest in routing terms. So, anycast mean “send to the closest member of this group”. The network itself plays the key role in anycast by routing the packet to the nearest destination by measuring network distance. Anycast addresses use aggregable global unicast addresses. They can also use site-local or link-local addresses. Note that it is impossible to distinguish an anycast address from a unicast address.
  • 47. Reserved Anycast Address Also called the subnet-router anycast address. All IPv6 routers are required to support subnet-router anycast addresses for each of their subnet interfaces. Mobile IPv6 is an example of a protocol designed to use anycasting.