SlideShare a Scribd company logo
Addressing

The ‘What’ and ‘Where’ of
Communication
Addressing
   Addressing is necessary for any
    communication
    –   To talk: Appearance, name, …
    –   To call: Telephone numbers
    –   To mail: Postal address
    –   To visit: Postal address + directions
    –   To E-Mail: E-Mail addresses
    –   To instant message: ICQ#, AIM ID, etc.
   These ‘addresses’ allow us to uniquely
    identify the entity with which we wish to
    communicate
Addressing a la Shoch
   Name/Identifier: What
    – Names normally identify the entity
    – If an entity moves, the name/identity will remain
      the same
   Address: Where
    – Addresses identify the location of the entity
    – If an entity moves, the address will change
   Route: How to get there
    – Routes identify the path to get to an entity
    – If an entity moves, the route will change
Addressing

 Addressing deals with how to define an
  entity’s location (uniquely)
 Addressing is necessary for message
  delivery
    – An address is the start and end point for
      the route
      • However, routing is another subject
    – Where do we want the message to go?
Addresses
   We have already seen MAC addresses (for
    Ethernet and some other LANs):
    –   e.g. 02-60-8C-08-E1-0C
    –   6 octet address
    –   Globally unique
    –   Defined statically by the hardware manufacturer
   Most people are familiar with the IP
    addresses used by TCP/IP networks:
    –   e.g. 137.207.32.2
    –   4 octet address
    –   Not necessarily globally unique
    –   Defined dynamically by DHCP servers or
        negotiated by the operating system
IP Addressing

A Closer Look
IP Addresses
   TCP/IP networks use IP for the network layer
    protocol
   IP defines 4 octet addresses
    – 4 billion possible addresses
   Usually written in the form A.B.C.D
    – A, B, C, and D are each 1 octet (0-255), normally
      written in decimal notation
    – Thus, IP addresses fall in the range:
      0.0.0.0 – 255.255.255.255
IP Addresses
   Originally intended for separate
    internets (interconnected LANs)
    – Thus, the 32 bit size was not a concern
    – 48 bits is generally considered a fairly safe
      size for globally unique addressing
    – Computers connected to ARPANET (and
      later incarnations) were just given
      consecutive addresses
       1.0.0.0, 1.0.0.1, 1.0.0.2, …
IP Addresses

 Any computer connected to a TCP/IP
  network (e.g. the Internet) must have an
  IP address
 Further, any network interface card
  (NIC) using TCP/IP to access an
  network (e.g. the Internet) must have a
  different IP address
IP Addresses
 Even though there are 4 billion possible
  IP addresses, they are running out
 Here’s why:
    – Some of the bits are dedicated to header
      information (discussed later)
      • ½ the addresses for each lost bit
    – Addresses are categorized, and some of
      the categories are running out of
      addresses (while others are not)
Non-Classed Addresses
   Part of the address represented the network
    the computer resided on, and part
    represented the computer itself
    – Network: 7 bits (up to 128 networks)
    – Computer: 24 bits (up to 1.6 million computers on
      each network)
   Since there were very few networks on
    ARPANET originally, this wasn’t a problem
Address Classes
   When private organizations started
    joining the Internet, the needs became
    obvious
    – Some (fewer) networks have multitudes of
      computers (thousands)
       • e.g. The @Home network
    – Some (many) networks have very few
      computers (a few hundred or less)
       • e.g. The Windsor Police Department
Address Classes

   Quickly, the addresses were separated
    into 3 classes (plus room for more
    classes if needed):
    – Class A: Fewer networks, many nodes
    – Class B: Medium networks, medium nodes
    – Class C: Many networks, fewer nodes
IP Address Classes
    Class A:
bit index: 0    1-7                8-31
            0 network         host (machine)

    Class B:
bit index: 0 1       2-15                16-31
            1 0     network               host

    Class C:
bit index: 0 1 2     3-23                      24-31
            1 1 0   network                     host
IP Address Classes
   Class A:
    – Range: 1.0.0.0 – 126.0.0.0
    – Networks: 128 max, Machines: 65537-1.6 million
    – e.g. huge networks, such as large
      military/government organizations (e.g. FBI), the
      @Home network, etc…
   Class B:
    – Range: 128.1.0.0 – 191.255.0.0
    – Networks: 16384 max, Machines: 257-65536
    – e.g. Internet service providers (ISPs) (dial-up)
   Class C:
    – Range: 192.1.0.0 – 223.255.255.0
    – Networks: 2 million max, Machines: 1-256
    – e.g. Small businesses
IP Address Classes
   The IP address classes are self-identifying
    – Which means that given the address, you can
      determine what class an address is
       • Actually, using only the first number
    – Examples:
       • 137.207.32.2 (server.uwindsor.ca)
           – 137 -> Class B
       • 24.0.0.1 (@Home DHCP server)
           – 24 -> Class A
Other IP Address Classes
    Class D:
bit index: 0 1 2 3                     4-31
            1 1 1 0          Multicast group address
     •These addresses are used to represent multicast groups
        •Discussed later

    Class E:
bit index: 0 1 2 3 4                   5-31
            1 1 1 1 0          Reserved for future use
     •These addresses were left open to be used and divided
     into classes as needed
Special IP Addresses
   0.0.0.0: Used to indicate that this machine is
    without an assigned IP
    – Used during bootstrapping (e.g. requesting an IP
      from a DHCP server)
   <all 0s (binary)><hostID>: Used to send
    messages to some machine on this network
   255.255.255.255: Used to send broadcast
    messages across this machine’s network
   <netID><all 1s (binary)>: Used to send
    broadcast messages to the specified network
   127.0.0.1: Used to send messages back to
    this machine (called loopback or localhost)
IP Addressing Comments

   In IP addressing:
    – 0’s usually represent ‘this’
    – 1’s usually represent ‘all’
   Broadcasting, although discussed here
    in terms of addressing, will be
    discussed further
Loopback
   The 127.0.0.1 address, does not normally
    exist on the network
    – Either as the source address or destination
      address of a packet
   The address is used internally by NICs
    – When a NIC receives a message addressed with
      127.0.0.1 to be transmitted, it passes the message
      directly to the receiver hardware
    – The receiver hardware returns the message to the
      operating system exactly as if the message were
      received from the network
       • However, the message never entered the network
         medium
Internal IP Addresses
   Depending on the address class needed by
    an organization, a range of internal
    addresses is available:
    – Class A: 10.0.0.0 – 10.255.255.255
    – Class B: 172.16.0.0 – 172.31.255.255
    – Class C: 192.168.0.0 – 192.168.255.255
   IP routers outside a private (connection-
    shared) network, will not forward datagrams
    designated for addresses in these ranges
Multi-homed Machines

   There is no restriction preventing
    machines from participating in multiple
    networks
    – A machine could have multiple NICs
    – Each NIC would have its own MAC
      address
    – On TCP/IP networks, each of these NICs
      would be given a different IP address
Routers
   Routers are multi-homed machines
    – They have a number of network ports, each of
      which represents a different path
   Routers use tables that relate destinations to
    network paths
    – Internet routers relate destination network
      addresses with one of their network ports
    – When a datagram arrives at a router:
       • Its destination address is used to determine the network
         address
       • The network address is used to look up the destination
         port in the routing table
Network Addresses
   An IP address can be used to calculate the
    address of the network
   The machine address is passed through a
    filter (called a subnet filter):
    – This filter extracts the bits of the address that
      represent the network and sets the bits that
      represent the machine to zero
    – The filter determines which part of the address
      represent the network address, by using the
      subnet mask
Subnet Mask
   The subnet mask is a binary number, that has
    0s in the machine portion of the address, and
    1s in the network portion
   Most networks of each type use a constant
    subnet mask
    – Class A: 255.0.0.0
       (Binary: 11111111000000000000000000000000)
    – Class B: 255.255.0.0
       (Binary: 11111111111111110000000000000000)
    – Class C: 255.255.255.0
       (Binary: 11111111111111111111111100000000)
Using Subnet Masks

   Example:
    – Address: 137.207.32.2
    – Subnet Mask: 255.255.0.0
Address:     10001001110011110010000000000010
Mask:        11111111111111110000000000000000
Net Address: 10001001110011110000000000000000
   Network address: 137.207.0.0
IPv6

Next Generation Addressing
in TCP/IP Networks
IPv6
 Due to the limited nature of existing IP
  addressing (IPv4), a new version of IP
  addressing was developed
 This new scheme uses 16 octets for
  addresses, instead of 4 octets
 Written using hex notation:


3A57:0000:0000:9CD5:3412:912D:6738:1928
IPv6 Features
   16 octet addresses (128 bits)
   Larger numbers of address classes
    – More accurate control of network/machine counts
   Variable-sized headers
    – Optional information can be placed into the header
      when needed
    – Reduces header size in most cases
   Extendible protocol
    – IPv6 allows for new header information to be
      added to support different protocols
IPv6 Features
   Automatically reconfigurable
    – Addresses can be automatically reassigned
      dynamically
    – e.g. when a certain number of nodes join the
      network, a different address class may be desired
   Autoconfigurable
    – The use of autoconfiguration (such as DHCP)
      allows dynamic private addressing and dynamic
      public addressing
IPv6 Datagram Format

              optional


 header   extension headers   data
IPv6 Header Format
0             4                   12                                   31
    version       traffic class              flow label


32                                     48             56           63
         payload length                 next header        hop limit


64                                     96                          128

         source address                     destination address
IPv6 Integration
   Will IPv6 replace IP addresses?
    – Who knows?
   Currently, temporary solutions have made
    IPv4 addresses capable of lasting longer than
    originally predicted
   If and when IPv6 is to be integrated, the
    process must be a transition
    – Closing the entire Internet down to convert
      hardware and software to IPv6 not going to
      happen
    – Some stations may take longer to transition than
      other stations
       • e.g. Bob’s Internet Shack vs. the Telus Network
IPv6 Integration
    NAT (network address translators) provide one
     example of such a temporary solution
    NATs provide three benefits:
    1.   NATs provide IP masquerading
         •   Messages using these addresses pass through a network
             address translator (NAT) to be transformed into external IPs
    2.   NATs provide IP sharing
         •   ISPs for example, have many customers, but significantly
             less at any given time are logged onto their system
             –   IP addresses can be assigned dynamically to these customers
                 when they log in
    3.   NATs provide schemes to allow networks to use either
         IPv4 or IPv6
         –   Addresses would be converted as they pass through a NAT
IPv6 Integration
   Another method that may be used for the
    transition between IPv4 and IPv6 is address
    inclusion:
    –   IPv4 addresses could be embedded into IPv6
        addresses
        •   Translation between the two types of addresses is
            possible without any other information
    –   Some problems exist with this approach, but in
        general it simplifies communication between
        IPv6 networks and IPv4
Special IPv6 Addresses
   0:0:0:0:0:0:0:0 Used to indicate that this
    machine is without an assigned IP
    – Used during bootstrapping (e.g. requesting an IP
      from a DHCP server)
   0:0:0:0:0:0:0:1 Used to send messages back
    to this machine (called loopback)
    – These two addresses are not valid on the actual
      network medium (same as with IPv4)
   00:… Reserved (including IPv4 and IPX
    address inclusion)
   FF:… Multicast addresses

More Related Content

What's hot

Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
SangeethaSasi1
 
ARP
ARPARP
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
Mustafa Salam
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
NETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingNETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical Addressing
Pankaj Debbarma
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
muhammad amir
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
TCP/ IP
TCP/ IP TCP/ IP
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
Rishav Bhurtel
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
Rekha Yadav
 

What's hot (20)

Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
ARP
ARPARP
ARP
 
Tcp
TcpTcp
Tcp
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
NETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingNETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical Addressing
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Ipv4
Ipv4Ipv4
Ipv4
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 

Viewers also liked

Island Photo Center
Island Photo Center Island Photo Center
Island Photo Center
Zandro Steve
 
NIssan NV Cargo Van - California
NIssan NV Cargo Van - CaliforniaNIssan NV Cargo Van - California
NIssan NV Cargo Van - California
SCOTT FOY
 
Enfermeros en Reino Unido
Enfermeros en Reino UnidoEnfermeros en Reino Unido
Enfermeros en Reino Unido
Mundo Spanish
 
القضاء في العراق
القضاء في العراقالقضاء في العراق
القضاء في العراقahmed rahmouni
 
CWAID meetup - WAI update 2015
CWAID meetup -  WAI update 2015CWAID meetup -  WAI update 2015
CWAID meetup - WAI update 2015
Andrew Arch
 
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS""AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
DREAMWISHMAKER
 

Viewers also liked (6)

Island Photo Center
Island Photo Center Island Photo Center
Island Photo Center
 
NIssan NV Cargo Van - California
NIssan NV Cargo Van - CaliforniaNIssan NV Cargo Van - California
NIssan NV Cargo Van - California
 
Enfermeros en Reino Unido
Enfermeros en Reino UnidoEnfermeros en Reino Unido
Enfermeros en Reino Unido
 
القضاء في العراق
القضاء في العراقالقضاء في العراق
القضاء في العراق
 
CWAID meetup - WAI update 2015
CWAID meetup -  WAI update 2015CWAID meetup -  WAI update 2015
CWAID meetup - WAI update 2015
 
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS""AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
 

Similar to Addressing

SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
Prof Ansari
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS Administrators
Aniekan Akpaffiong
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
Atika Zaimi
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
ssuserde23af
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
VISHNU N
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
Hameda Hurmat
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
gamerchan1
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
shucaybcabdi
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
Vikas Jagtap
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
kurtmctaggart
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
vishweshbhat4
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
Pijush Kanti Das
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
SintayehuBeyene2
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.ppt
ListonKiwoli1
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
Mahmmoud Mahdi
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 
lecture 6.pptx
lecture 6.pptxlecture 6.pptx
lecture 6.pptx
MelkamuEndale1
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
aakritii765
 

Similar to Addressing (20)

SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS Administrators
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.ppt
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
lecture 6.pptx
lecture 6.pptxlecture 6.pptx
lecture 6.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 

More from Gichelle Amon

Kerberos
KerberosKerberos
Kerberos
Gichelle Amon
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contractsGichelle Amon
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architectureGichelle Amon
 
Time triggered arch.
Time triggered arch.Time triggered arch.
Time triggered arch.Gichelle Amon
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2Gichelle Amon
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1Gichelle Amon
 
Medical image analysis
Medical image analysisMedical image analysis
Medical image analysis
Gichelle Amon
 

More from Gichelle Amon (20)

Kerberos
KerberosKerberos
Kerberos
 
Network security
Network securityNetwork security
Network security
 
Os module 2 d
Os module 2 dOs module 2 d
Os module 2 d
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Lec3 final
Lec3 finalLec3 final
Lec3 final
 
Lec 3
Lec 3Lec 3
Lec 3
 
Lec2 final
Lec2 finalLec2 final
Lec2 final
 
Lec 4
Lec 4Lec 4
Lec 4
 
Lec1 final
Lec1 finalLec1 final
Lec1 final
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contracts
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architecture
 
Time triggered arch.
Time triggered arch.Time triggered arch.
Time triggered arch.
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Os module 2 ba
Os module 2 baOs module 2 ba
Os module 2 ba
 
Lec5
Lec5Lec5
Lec5
 
Delivery
DeliveryDelivery
Delivery
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 
Medical image analysis
Medical image analysisMedical image analysis
Medical image analysis
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Addressing

  • 1. Addressing The ‘What’ and ‘Where’ of Communication
  • 2. Addressing  Addressing is necessary for any communication – To talk: Appearance, name, … – To call: Telephone numbers – To mail: Postal address – To visit: Postal address + directions – To E-Mail: E-Mail addresses – To instant message: ICQ#, AIM ID, etc.  These ‘addresses’ allow us to uniquely identify the entity with which we wish to communicate
  • 3. Addressing a la Shoch  Name/Identifier: What – Names normally identify the entity – If an entity moves, the name/identity will remain the same  Address: Where – Addresses identify the location of the entity – If an entity moves, the address will change  Route: How to get there – Routes identify the path to get to an entity – If an entity moves, the route will change
  • 4. Addressing  Addressing deals with how to define an entity’s location (uniquely)  Addressing is necessary for message delivery – An address is the start and end point for the route • However, routing is another subject – Where do we want the message to go?
  • 5. Addresses  We have already seen MAC addresses (for Ethernet and some other LANs): – e.g. 02-60-8C-08-E1-0C – 6 octet address – Globally unique – Defined statically by the hardware manufacturer  Most people are familiar with the IP addresses used by TCP/IP networks: – e.g. 137.207.32.2 – 4 octet address – Not necessarily globally unique – Defined dynamically by DHCP servers or negotiated by the operating system
  • 7. IP Addresses  TCP/IP networks use IP for the network layer protocol  IP defines 4 octet addresses – 4 billion possible addresses  Usually written in the form A.B.C.D – A, B, C, and D are each 1 octet (0-255), normally written in decimal notation – Thus, IP addresses fall in the range: 0.0.0.0 – 255.255.255.255
  • 8. IP Addresses  Originally intended for separate internets (interconnected LANs) – Thus, the 32 bit size was not a concern – 48 bits is generally considered a fairly safe size for globally unique addressing – Computers connected to ARPANET (and later incarnations) were just given consecutive addresses 1.0.0.0, 1.0.0.1, 1.0.0.2, …
  • 9. IP Addresses  Any computer connected to a TCP/IP network (e.g. the Internet) must have an IP address  Further, any network interface card (NIC) using TCP/IP to access an network (e.g. the Internet) must have a different IP address
  • 10. IP Addresses  Even though there are 4 billion possible IP addresses, they are running out  Here’s why: – Some of the bits are dedicated to header information (discussed later) • ½ the addresses for each lost bit – Addresses are categorized, and some of the categories are running out of addresses (while others are not)
  • 11. Non-Classed Addresses  Part of the address represented the network the computer resided on, and part represented the computer itself – Network: 7 bits (up to 128 networks) – Computer: 24 bits (up to 1.6 million computers on each network)  Since there were very few networks on ARPANET originally, this wasn’t a problem
  • 12. Address Classes  When private organizations started joining the Internet, the needs became obvious – Some (fewer) networks have multitudes of computers (thousands) • e.g. The @Home network – Some (many) networks have very few computers (a few hundred or less) • e.g. The Windsor Police Department
  • 13. Address Classes  Quickly, the addresses were separated into 3 classes (plus room for more classes if needed): – Class A: Fewer networks, many nodes – Class B: Medium networks, medium nodes – Class C: Many networks, fewer nodes
  • 14. IP Address Classes Class A: bit index: 0 1-7 8-31 0 network host (machine) Class B: bit index: 0 1 2-15 16-31 1 0 network host Class C: bit index: 0 1 2 3-23 24-31 1 1 0 network host
  • 15. IP Address Classes  Class A: – Range: 1.0.0.0 – 126.0.0.0 – Networks: 128 max, Machines: 65537-1.6 million – e.g. huge networks, such as large military/government organizations (e.g. FBI), the @Home network, etc…  Class B: – Range: 128.1.0.0 – 191.255.0.0 – Networks: 16384 max, Machines: 257-65536 – e.g. Internet service providers (ISPs) (dial-up)  Class C: – Range: 192.1.0.0 – 223.255.255.0 – Networks: 2 million max, Machines: 1-256 – e.g. Small businesses
  • 16. IP Address Classes  The IP address classes are self-identifying – Which means that given the address, you can determine what class an address is • Actually, using only the first number – Examples: • 137.207.32.2 (server.uwindsor.ca) – 137 -> Class B • 24.0.0.1 (@Home DHCP server) – 24 -> Class A
  • 17. Other IP Address Classes Class D: bit index: 0 1 2 3 4-31 1 1 1 0 Multicast group address •These addresses are used to represent multicast groups •Discussed later Class E: bit index: 0 1 2 3 4 5-31 1 1 1 1 0 Reserved for future use •These addresses were left open to be used and divided into classes as needed
  • 18. Special IP Addresses  0.0.0.0: Used to indicate that this machine is without an assigned IP – Used during bootstrapping (e.g. requesting an IP from a DHCP server)  <all 0s (binary)><hostID>: Used to send messages to some machine on this network  255.255.255.255: Used to send broadcast messages across this machine’s network  <netID><all 1s (binary)>: Used to send broadcast messages to the specified network  127.0.0.1: Used to send messages back to this machine (called loopback or localhost)
  • 19. IP Addressing Comments  In IP addressing: – 0’s usually represent ‘this’ – 1’s usually represent ‘all’  Broadcasting, although discussed here in terms of addressing, will be discussed further
  • 20. Loopback  The 127.0.0.1 address, does not normally exist on the network – Either as the source address or destination address of a packet  The address is used internally by NICs – When a NIC receives a message addressed with 127.0.0.1 to be transmitted, it passes the message directly to the receiver hardware – The receiver hardware returns the message to the operating system exactly as if the message were received from the network • However, the message never entered the network medium
  • 21. Internal IP Addresses  Depending on the address class needed by an organization, a range of internal addresses is available: – Class A: 10.0.0.0 – 10.255.255.255 – Class B: 172.16.0.0 – 172.31.255.255 – Class C: 192.168.0.0 – 192.168.255.255  IP routers outside a private (connection- shared) network, will not forward datagrams designated for addresses in these ranges
  • 22. Multi-homed Machines  There is no restriction preventing machines from participating in multiple networks – A machine could have multiple NICs – Each NIC would have its own MAC address – On TCP/IP networks, each of these NICs would be given a different IP address
  • 23. Routers  Routers are multi-homed machines – They have a number of network ports, each of which represents a different path  Routers use tables that relate destinations to network paths – Internet routers relate destination network addresses with one of their network ports – When a datagram arrives at a router: • Its destination address is used to determine the network address • The network address is used to look up the destination port in the routing table
  • 24. Network Addresses  An IP address can be used to calculate the address of the network  The machine address is passed through a filter (called a subnet filter): – This filter extracts the bits of the address that represent the network and sets the bits that represent the machine to zero – The filter determines which part of the address represent the network address, by using the subnet mask
  • 25. Subnet Mask  The subnet mask is a binary number, that has 0s in the machine portion of the address, and 1s in the network portion  Most networks of each type use a constant subnet mask – Class A: 255.0.0.0 (Binary: 11111111000000000000000000000000) – Class B: 255.255.0.0 (Binary: 11111111111111110000000000000000) – Class C: 255.255.255.0 (Binary: 11111111111111111111111100000000)
  • 26. Using Subnet Masks  Example: – Address: 137.207.32.2 – Subnet Mask: 255.255.0.0 Address: 10001001110011110010000000000010 Mask: 11111111111111110000000000000000 Net Address: 10001001110011110000000000000000  Network address: 137.207.0.0
  • 28. IPv6  Due to the limited nature of existing IP addressing (IPv4), a new version of IP addressing was developed  This new scheme uses 16 octets for addresses, instead of 4 octets  Written using hex notation: 3A57:0000:0000:9CD5:3412:912D:6738:1928
  • 29. IPv6 Features  16 octet addresses (128 bits)  Larger numbers of address classes – More accurate control of network/machine counts  Variable-sized headers – Optional information can be placed into the header when needed – Reduces header size in most cases  Extendible protocol – IPv6 allows for new header information to be added to support different protocols
  • 30. IPv6 Features  Automatically reconfigurable – Addresses can be automatically reassigned dynamically – e.g. when a certain number of nodes join the network, a different address class may be desired  Autoconfigurable – The use of autoconfiguration (such as DHCP) allows dynamic private addressing and dynamic public addressing
  • 31. IPv6 Datagram Format optional header extension headers data
  • 32. IPv6 Header Format 0 4 12 31 version traffic class flow label 32 48 56 63 payload length next header hop limit 64 96 128 source address destination address
  • 33. IPv6 Integration  Will IPv6 replace IP addresses? – Who knows?  Currently, temporary solutions have made IPv4 addresses capable of lasting longer than originally predicted  If and when IPv6 is to be integrated, the process must be a transition – Closing the entire Internet down to convert hardware and software to IPv6 not going to happen – Some stations may take longer to transition than other stations • e.g. Bob’s Internet Shack vs. the Telus Network
  • 34. IPv6 Integration  NAT (network address translators) provide one example of such a temporary solution  NATs provide three benefits: 1. NATs provide IP masquerading • Messages using these addresses pass through a network address translator (NAT) to be transformed into external IPs 2. NATs provide IP sharing • ISPs for example, have many customers, but significantly less at any given time are logged onto their system – IP addresses can be assigned dynamically to these customers when they log in 3. NATs provide schemes to allow networks to use either IPv4 or IPv6 – Addresses would be converted as they pass through a NAT
  • 35. IPv6 Integration  Another method that may be used for the transition between IPv4 and IPv6 is address inclusion: – IPv4 addresses could be embedded into IPv6 addresses • Translation between the two types of addresses is possible without any other information – Some problems exist with this approach, but in general it simplifies communication between IPv6 networks and IPv4
  • 36. Special IPv6 Addresses  0:0:0:0:0:0:0:0 Used to indicate that this machine is without an assigned IP – Used during bootstrapping (e.g. requesting an IP from a DHCP server)  0:0:0:0:0:0:0:1 Used to send messages back to this machine (called loopback) – These two addresses are not valid on the actual network medium (same as with IPv4)  00:… Reserved (including IPv4 and IPX address inclusion)  FF:… Multicast addresses