SlideShare a Scribd company logo
1 of 24
Download to read offline
Communication
Networks
Network Layer Services
IPv4 - Addressing
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
Training Contents
• What is an IP?
• Need for an IP?
• Representation of an IP
• Classes of an IP Address
• Sub netting and its types
Visit www.youtube.com/GURUKULA for Lecture Videos
Introduction to IP Address
• An IP address is a 32-bit address that identifies a connection to the
Internet.
• The IP addresses are universally unique.
• The address space of IPv4 is 2^32 or 4,294,967,296.
Visit www.youtube.com/GURUKULA for Lecture Videos
Need for IP Address
Visit www.youtube.com/GURUKULA for Lecture Videos
Without IP
Address..??
Visit www.youtube.com/GURUKULA for Lecture Videos
How IP ‘s are used for Identification?
Network
Host
Process
Network
Host
Process
www.google.com
INDIA CALIFORNIA
Visit www.youtube.com/GURUKULA for Lecture Videos
Few Organized Numbering Systems
+91 - 9790410977
COUNTRY
CODE
ACCESS
CODE
SERVICE
PROVIDER
CODE
SUBSCRIBER
NUMBER
1116 – 15 – 106 – 003
111615106003
Visit www.youtube.com/GURUKULA for Lecture Videos
Representation of IP Address
Binary Representation
Dotted Decimal Representation
Visit www.youtube.com/GURUKULA for Lecture Videos
IP Address Space
• Initially 8 bits were allotted for Network ID and remaining 24 bits
were allotted for Host ID
• 8 bits → 28 Networks → 256 Networks
• 24 bits → 224 Hosts Per Network → 16Million hosts per network
• NOT SCALABLE
Visit www.youtube.com/GURUKULA for Lecture Videos
Class Full Addressing
1X 11X 111XX
1
1
.
.
.
0
0
.
.
. 231
231
232 address 231 address
10
10
.
.
.
11
11
.
.
.
230
230
230 address 229 address
110
110
.
.
.
111
111
.
.
.
229
229
1110
1110
.
.
.
1111
1111
.
.
.
228
228
CA CB CC CD
CE
00000000 →0
01111111 →127
10000000 →128
10111111 →191
11000000 →192
11011111 →223
11100000 →224
11101111 →239
11110000 →240
11111111 →255Visit www.youtube.com/GURUKULA for Lecture Videos
Finding Class of a Given IP
Visit www.youtube.com/GURUKULA for Lecture Videos
NID and HID Organization
Visit www.youtube.com/GURUKULA for Lecture Videos
Ok.. Now it’s your Time
• How many Network ID’s and Host ID’s are present in each classes ???
Visit www.youtube.com/GURUKULA for Lecture Videos
Summary of all classes
Visit www.youtube.com/GURUKULA for Lecture Videos
Blocks in
Class A
Visit www.youtube.com/GURUKULA for Lecture Videos
Blocks in
Class B
Visit www.youtube.com/GURUKULA for Lecture Videos
Blocks in
Class C
Visit www.youtube.com/GURUKULA for Lecture Videos
Simple Exercise
Given the network address 17.0.0.0, find the class, the block, and the
range of the addresses.
• Solution:
• Class A because first byte lies between 0 – 127
• Net ID is 17.0.0.0 so address block ranges from (17.0.0.0 to 17.255.255.255)
Visit www.youtube.com/GURUKULA for Lecture Videos
Simple Exercise
• Given the network address 132.21.0.0, find the class, the block, and
the range of the addresses.
• Solution:
• The class is B because the first byte is between 128 and 191.
• The addresses range from 132.21.0.0 to 132.21.255.255
Visit www.youtube.com/GURUKULA for Lecture Videos
Simple Exercise
• Given the network address 220.34.76.0, find the class, the block, and
the range of the addresses.
• Solution:
• The class is C because the first byte is between 192 and 223
• The addresses range from 220.34.76.0 to 220.34.76.255.
Visit www.youtube.com/GURUKULA for Lecture Videos
Not all IP Address are usable…
• Network ID or Net ID – First IP of address block
• Broad cast Address – Last IP of address block
• Types of broadcast
• Limited Broadcast
• Directed Broadcast
11.0.0.0
LBA: 255.255.255.255
11.0.0.0
20.0.0.0
DBA: 20.255.255.255
Try to fill the Table
IP Address Network ID Directed Broadcast ID Limited Broadcast ID
1.2.3.4 1.0.0.0 1.255.255.255 255.255.255.255
10.15.20.60 10.0.0.0 10.255.255.255 255.255.255.255
130.1.2.3 130.1.0.0 130.1.255.255 255.255.255.255
150.0.150.150 150.0.0.0 150.0.255.255 255.255.255.255
200.1.10.100 200.1.10.0 200.1.10.255 255.255.255.255
220.15.1.10 220.15.1.0 220.15.1.255 255.255.255.255
250.0.1.2 NOT POSSIBLE NOT POSSIBLE NOT POSSIBLE
300.1.2.3 INCORRECT IP ADDRESS
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introductionJAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5mlrbrown
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering pptNitin Gehlot
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layerSendhil Kumar
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Sumit Pathak
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...Osama M Askoura
 

What's hot (20)

1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5
 
Mule ftp connector
Mule ftp connectorMule ftp connector
Mule ftp connector
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
 
Mpls basic
Mpls basicMpls basic
Mpls basic
 
Mpls 1
Mpls 1Mpls 1
Mpls 1
 
Mpls
MplsMpls
Mpls
 
Mpls
MplsMpls
Mpls
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
 

Similar to 2.10 network layer services i pv4

2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
Oct. 14, 2011 webcast ch7 subnets bruce hartpenceOct. 14, 2011 webcast ch7 subnets bruce hartpence
Oct. 14, 2011 webcast ch7 subnets bruce hartpenceO'Reilly Media
 
Computer networking
Computer networkingComputer networking
Computer networkingChinmoy Jena
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)Anis Mizi
 
CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)Anis Mizi
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
Implementing IP V4
Implementing IP V4Implementing IP V4
Implementing IP V4Napoleon NV
 
Lync Server 2013: Network Quality considerations in LAN, WAN and Wi-Fi
Lync Server 2013: Network Quality considerations in LAN, WAN and Wi-FiLync Server 2013: Network Quality considerations in LAN, WAN and Wi-Fi
Lync Server 2013: Network Quality considerations in LAN, WAN and Wi-FiStåle Hansen
 

Similar to 2.10 network layer services i pv4 (20)

2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
Oct. 14, 2011 webcast ch7 subnets bruce hartpenceOct. 14, 2011 webcast ch7 subnets bruce hartpence
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
 
Computer networking
Computer networkingComputer networking
Computer networking
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)
 
CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
lecture 6.pptx
lecture 6.pptxlecture 6.pptx
lecture 6.pptx
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Chap3. i pv4
Chap3. i pv4Chap3. i pv4
Chap3. i pv4
 
Implementing IP V4
Implementing IP V4Implementing IP V4
Implementing IP V4
 
Lync Server 2013: Network Quality considerations in LAN, WAN and Wi-Fi
Lync Server 2013: Network Quality considerations in LAN, WAN and Wi-FiLync Server 2013: Network Quality considerations in LAN, WAN and Wi-Fi
Lync Server 2013: Network Quality considerations in LAN, WAN and Wi-Fi
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerJAIGANESH SEKAR
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationJAIGANESH SEKAR
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its typesJAIGANESH SEKAR
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniquesJAIGANESH SEKAR
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversityJAIGANESH SEKAR
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagationJAIGANESH SEKAR
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmskJAIGANESH SEKAR
 

More from JAIGANESH SEKAR (15)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - Explainer
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full Derivation
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
4.3 types of diversity
4.3  types of diversity4.3  types of diversity
4.3 types of diversity
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversity
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagation
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

2.10 network layer services i pv4

  • 2. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Training Contents • What is an IP? • Need for an IP? • Representation of an IP • Classes of an IP Address • Sub netting and its types Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. Introduction to IP Address • An IP address is a 32-bit address that identifies a connection to the Internet. • The IP addresses are universally unique. • The address space of IPv4 is 2^32 or 4,294,967,296. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 5. Need for IP Address Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. How IP ‘s are used for Identification? Network Host Process Network Host Process www.google.com INDIA CALIFORNIA Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8. Few Organized Numbering Systems +91 - 9790410977 COUNTRY CODE ACCESS CODE SERVICE PROVIDER CODE SUBSCRIBER NUMBER 1116 – 15 – 106 – 003 111615106003 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 9. Representation of IP Address Binary Representation Dotted Decimal Representation Visit www.youtube.com/GURUKULA for Lecture Videos
  • 10. IP Address Space • Initially 8 bits were allotted for Network ID and remaining 24 bits were allotted for Host ID • 8 bits → 28 Networks → 256 Networks • 24 bits → 224 Hosts Per Network → 16Million hosts per network • NOT SCALABLE Visit www.youtube.com/GURUKULA for Lecture Videos
  • 11. Class Full Addressing 1X 11X 111XX 1 1 . . . 0 0 . . . 231 231 232 address 231 address 10 10 . . . 11 11 . . . 230 230 230 address 229 address 110 110 . . . 111 111 . . . 229 229 1110 1110 . . . 1111 1111 . . . 228 228 CA CB CC CD CE 00000000 →0 01111111 →127 10000000 →128 10111111 →191 11000000 →192 11011111 →223 11100000 →224 11101111 →239 11110000 →240 11111111 →255Visit www.youtube.com/GURUKULA for Lecture Videos
  • 12. Finding Class of a Given IP Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. NID and HID Organization Visit www.youtube.com/GURUKULA for Lecture Videos
  • 14. Ok.. Now it’s your Time • How many Network ID’s and Host ID’s are present in each classes ??? Visit www.youtube.com/GURUKULA for Lecture Videos
  • 15. Summary of all classes Visit www.youtube.com/GURUKULA for Lecture Videos
  • 16. Blocks in Class A Visit www.youtube.com/GURUKULA for Lecture Videos
  • 17. Blocks in Class B Visit www.youtube.com/GURUKULA for Lecture Videos
  • 18. Blocks in Class C Visit www.youtube.com/GURUKULA for Lecture Videos
  • 19. Simple Exercise Given the network address 17.0.0.0, find the class, the block, and the range of the addresses. • Solution: • Class A because first byte lies between 0 – 127 • Net ID is 17.0.0.0 so address block ranges from (17.0.0.0 to 17.255.255.255) Visit www.youtube.com/GURUKULA for Lecture Videos
  • 20. Simple Exercise • Given the network address 132.21.0.0, find the class, the block, and the range of the addresses. • Solution: • The class is B because the first byte is between 128 and 191. • The addresses range from 132.21.0.0 to 132.21.255.255 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 21. Simple Exercise • Given the network address 220.34.76.0, find the class, the block, and the range of the addresses. • Solution: • The class is C because the first byte is between 192 and 223 • The addresses range from 220.34.76.0 to 220.34.76.255. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 22. Not all IP Address are usable… • Network ID or Net ID – First IP of address block • Broad cast Address – Last IP of address block • Types of broadcast • Limited Broadcast • Directed Broadcast 11.0.0.0 LBA: 255.255.255.255 11.0.0.0 20.0.0.0 DBA: 20.255.255.255
  • 23. Try to fill the Table IP Address Network ID Directed Broadcast ID Limited Broadcast ID 1.2.3.4 1.0.0.0 1.255.255.255 255.255.255.255 10.15.20.60 10.0.0.0 10.255.255.255 255.255.255.255 130.1.2.3 130.1.0.0 130.1.255.255 255.255.255.255 150.0.150.150 150.0.0.0 150.0.255.255 255.255.255.255 200.1.10.100 200.1.10.0 200.1.10.255 255.255.255.255 220.15.1.10 220.15.1.0 220.15.1.255 255.255.255.255 250.0.1.2 NOT POSSIBLE NOT POSSIBLE NOT POSSIBLE 300.1.2.3 INCORRECT IP ADDRESS Visit www.youtube.com/GURUKULA for Lecture Videos
  • 24. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…