SlideShare a Scribd company logo
1 of 63
UNIT –II
INTERNET ADDRESSING , ARP AND RARP
INTERNET ADDRESSING
Universal host identifiers
• Host - refer to an end system that attaches to the Internet.
• Internet divides all machines into two classes: routers and hosts.
• Each host on an internet is assigned a unique integer address called
its Internet Protocol address or IP address.
• An IP address is divided into two parts: a prefix of the address
identifies the network to which the host attaches and a suffix
identifies a specific host on the network.
4
An IPv4 address is a 32-bit address that uniquely
and universally defines the connection of a device
(for example, a computer or a router) to the
Internet.
Categories of IP addressing
• Classful addressing
• Classless IP addressing
• CIDR – Classless Inter Domain Routing(pronounced as Cider)
5
IPv4 classful addressing schema
Classful IP addressing
Address space is divided into 5 classes A,B,C,D and E
7
Classful IP addressing
8
Dotted decimal notation
Classful addressing
Binary notation
• Example : Find the class of the address 11000001 10000011 00011011 11111111
Solution : The first two bits of the given address are 11, and the third bit is 0. Therefore, it is a
class C address.
10
Classful addressing
Decimal notation
• Example : Find the class of the address 227.12.14.87
Solution : The first byte is 227, which is between 224 and 239, and thus, the given address is a
class D address.
11
Net ID and Host ID
• Net ID is the part of the IP address that identifies the network; and
• Host ID is the part of the IP address that identifies the host on the network.
12
Classful addressing - consolidation
13
1
1
Example…(1)
14
Change the following IPv4 addresses from binary
notation to dotted-decimal notation.
Solution
We replace each group of 8 bits with its equivalent
decimal number and add dots for separation.
Example ... (2)
15
Change the following IPv4 addresses from dotted-decimal
notation to binary notation.
Solution
We replace each decimal number with its binary equivalent
Example... (3)
16
Point out the error, if any, in the following IPv4 addresses.
Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers or octets.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal
notation is not allowed.
Example... (4)
17
Find the class of each address.
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 14.23.120.8
d. 252.5.15.111
Solution
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C
address.
c. The first byte is 14; the class is A.
d. The first byte is 252; the class is E.
Subnetting and supernetting
To manage the address depletion temporarily
• Subnetting
• to divide a large block (Class A block) into smaller ones
• Large org. are unhappy this division
• Supernetting
• to combine several class C blocks into a larger block
• makes the routing of packets more difficult
18
Classless Addressing
• Scarcity of IPV4 addresses – (only 232 addresses)
• Short term solution - Classless Addressing (Uses IPV4 addresses )
• Long term solution – IPV6 Addresses (128 – bit address)
• Classless Addressing makes the allocation of IP Addresses
more efficient.
• It replaces the older classful addressing system which is
based on classes.
• It is also known as Classless Inter Domain Routing (CIDR).
19
Classless Addressing
• In CIDR , the whole address space is divided into variable length blocks.
• One restriction - number of addresses in a block i.e. block size needs
to be a power of 2. we can have a block of 20, 21, 22, . . . , 232
addresses
• Prefix length in classless addressing is variable
• Size of the network is inversely proportional to the length of the prefix.
small prefix  a larger network; large prefix  smaller network
• Prefix length: Slash Notation - prefix length, is added to the address,
separated by a slash
20
Classless Addressing – Slash Notation
Prefix length: Slash Notation - prefix length, is added to the address,
separated by a slash
Prefix tells the number of bits used for the identification of network.
Remaining bits are used for the identification of hosts in the network.
21
Example 1
A classless address is given as 167.199.170.82/27. Find the
three pieces of information.
1) The no. of addresses in the network is 232− 27 = 25 = 32
addresses.
2) Starting address can be found by keeping the first 27
bits and changing the rest of the bits to 0s.
3) Last address can be found by keeping the first 27 bits
and changing the rest of the bits to 1s.
22
Example 2
Given the CIDR representation 100.1.2.35/20. Find the range of
IP Addresses in the CIDR block
Solution:
Given CIDR IP Address may be represented as-
01100100.00000001.00000010.00100011 / 20
First IP Address = 01100100.00000001.00000000.00000000=100.1.0.0
Last IP Address =01100100.00000001.00001111.11111111=100.1.15.255
Range of IP Addresses = [ 100.1.0.0 , 100.1.15.255]
Network size = 2(32-20) = 212 = 4096 addresses
23
Use of address mask in CIDR
Another way to find the first and last addresses in the block is
to use the address mask.
The address mask is a 32-bit number in which the n leftmost
bits are set to 1s and the rest of the bits (32 − n) are set to 0s.
Address mask of a.b.c.d /27 is
11111111 11111111 11111111 11100000 in (255.255.255.224)d
Use bit-wise operations NOT, AND, and OR to extract the
information in a block as follows
 No. of addresses in the block N = NOT (mask) + 1.
 First address in the block = (Any address in the block) AND (mask).
 Last address in the block = (Any address in the block) OR [(NOT
(mask)].
24
IPv4 subnet addressing
• Subnetting allows a single network prefix to be used for multiple
physical networks.
• Only hosts and routers at the site will know that there are multiple
physical networks and how to forward traffic among them.
• Routers and hosts in the rest of the Internet will assume there is a
single physical network at the site with hosts attached.
Problem
A classless address is given as 167.199.170.82/27. Find the three
pieces of information.
26
The mask is 27 leading 1’s ( i.e. ) 11111111 11111111 11111111 11100000
Given Address in binary 167.199.170.82/27 10100111 11000111 10101010 01010010
• First address: First = (address) AND (mask)
Address 10100111 11000111 10101010 01010010 AND
Mask 11111111 11111111 11111111 11100000
Answer : 10100111 11000111 10101010 01000000 167.199.170.64
• Last address: Last = (address) OR (NOT mask)
Address 10100111 11000111 10101010 01010010 OR
NOT mask 00000000 00000000 00000000 00011111
Answer : 10100111 11000111 10101010 01011111  167.199.170.85
• Number of addresses in the block: N = NOT (mask) + 1
Mask 11111111 11111111 11111111 11100000
NOT mask 00000000 00000000 00000000 00011111
Answer 0.0.0.31 + 1 = 32 addresses
Classless addressing
Note
In CIDR, a given address may belongs to several networks which is
based on prefix length.
Example
An address 230.8.24.56 belongs to class D in classful addressing.
But, in classless addressing , it may be belongs to several blocksks
as follows:
27
Classless Addressing
Network Address
• The first address in any network (block)
called network address, mainly used in
routing a packet to its destination
network.
• Each network is identified by its
network address.
• When a packet arrives at the router ,
the router needs to know to which
network the packet should be sent
• After the network address has been
found, the router consults its forwarding
table to find the corresponding interface
through which the packet sent out.
28
Classless Addressing- Subnetting
• Internet Corporation for Assigned Names and Numbers (ICANN) – global
authority allocate a large block of addresses to ISPs (or large organization )
• Subnetting - An organization (or an ISP) that is granted a range of addresses may
divide the range into several subranges and assign each subrange to a
subnetwork (or subnet). A subnetwork can be divided into several sub-
subnetworks and so on.
• Designing subnets
• 3 steps
1. No. of addresses in each subnetwork should be a power of 2.
2. Prefix length for each subnetwork should be found using the following
formula: Prefix length = 32 − log2(Block size)
3. Starting address in each subnetwork should be divisible by the
number of addresses in that subnetwork. This can be achieved if we
first assign addresses to larger subnetworks.
29
Subnetting Examples - 1
An organization is granted a block of addresses with the beginning address
14.24.74.0/24. The organization needs to have 3 subblocks of addresses to use in
its three subnets: one subblock of 10 addresses, one subblock of 60 addresses, and
one subblock of 120 addresses. Design the subblocks.
30
Step-1 : No. of addresses = 232– 24 = 256 addresses .
First address is 14.24.74.0/24;
Last address is 14.24.74.255/24.
Step- 2 : To find out prefix(Net ID), sort blocks from largest to smallest
1st largest subnet requires 120 addresses. We allocate 128 addresses. (power of 2)
Prefix(mask) = 32- log2128 = 32-log227 = 32-7 = 25
2nd largest subnet requires 60 addresses. We allocate 64 addresses.
Prefix(mask) = 32- log264 = 32-log226 = 32-6 = 26
3rd largest subnet requires 10 addresses. We allocate 16 addresses.
Prefix(mask) = 32- log216 = 32-log224 = 32-4 = 28
Step-3: First address Last Address Block size
Subnet I 14.24.74.0/25 14.24.74.127/25 128
Subnet II 14.24.74.128/26 14.24.74.191/26 64
Subnet III 14.24.74.192/28 14.24.74.207/28 16
Unused addrs 14.24.74.208 14.24.74.255 48
Classless addressing
Limited Broadcast vs Direct Broadcast Addresses
Limited-broadcast address
 data reaches from source to all the host in
a same network
 source will send message to all the host
connected to it
 Since message covers all host so
destination Address would be
255.255.255.255
 Same for all networks (subnets)
 Msg - src addr -11.1.2.3
- dest. addr-255.255.255.255
 .
31
Direct-broadcast address
 When host in one network sends message
to all host in another network
 Since network is different, directed
broadcast address is 30.255.255.255
 Usually, the last address in each subnet is
used as direct-broadcast address
 Msg - src addr -11.1.2.3
- dest. addr- 30.255.255.255
IPv6
• 128 bits / 16 octets
• Solves: insufficient capacity
• Dotted notation:
• Colon hexadecimal notation:
Advantage:
• compact and easier to enter .
• Allows zero compression
• Allows dotted decimal suffix
Address space assignment
• Two issues:
• How human manage addr
assignment
• How routers handle the
forwarding table
• Solution: multi-level hierarchy
/ multiple hierarchies
IPv4 to IPv6
• Two reasons for transition from IPv4 to IPv6
• Stateless IP/ICMP translation protocol (SIIT)
• Checksum problem
IPv6 unicast addresses and /64
• 3 parts:
• A globally-unique prefix – identify a site
• A subnet ID - used to distinguish among multiple physical networks at the
destination site
• An interface ID - used to identify a particular computer connected to
the subnet.
IPv6 interface identifier and MAC addresses
• Interface ID <- host identifier
• Lower 64 bits – identifies a specific network interface.
Special addresses
• 0.0.0.0 – temporary source address
• 255.255.255.255 – IPv4 limited broadcast address
• Host portion – all 1’s – directed broadcast address
• Subnet broadcast address – host portion – all 1’s
• Multicast addresses – begins with three 1’s
• Loopback address – 127.0.0.0/8
• Locally scoped – link local scope : 1111 1110 10
• Weaknesses in internet address
• If a host computer moves from one network to another, its internet address
must change – mobility
• Early binding – renumbering – absurd no.of bits(64)
• Forwarding – destination address – network address->router . Pblm:one IP
address is not sufficient, if a network is down.
Internet Address Assignment And Delegation
Of Authority
• Each network prefix - unique
• Internet Assigned Numbers Authority(IANA)
• Internet Corporation for Assigned Names and Numbers(ICANN)
Example for IPv4
ARP & RARP
Address resolution problem
• Consider two machines A and B that connect to the same physical
network. Each machine has an assigned IP address, IA and IB, and a
hardware (MAC) address, HA and HB.
• how does A map B’s Internet address to B’s hardware address,HB?
• The problem of mapping high-level addresses to physical addresses is
known as the address resolution problem.
• There are two basic types of hardware addresses: those that are
larger than the host portion of an IP address and those that are
smaller.
Resolution Through Direct Mapping
• IPv6 uses a technique known as direct mapping. The basic idea is
straightforward: use a computer’s hardware address as the host
portion of the computer’s Internet address.
Resolution in a direct mapped network
• If a computer’s IP address includes the computer’s hardware address,
address resolution is trivial.
• Direct mapping implies, the mapping can be performed without
reference to external data.
• Advantage: new computers can be added to a network without
changing existing assignments and without propagating new
information to existing computers.
• Direct mapping means selecting a function f that maps IP addresses
to physical addresses. Resolving an IP address IA means computing
HA = f(IA)
Address resolution through dynamic binding
• Direct mapping cannot be used with IPv4 if a hardware addresses is
larger than an IPv4 address.
• MAC address is 48 bits long and an IPv4 address is only 32 bits long.
• Designers of TCP/IP protocols found a creative solution to the address
resolution problem.
• The solution allows new hosts or routers to be added to a network
without recompiling code, and does not require maintenance of a
centralized database.
• Designers chose to use a low-level protocol that resolves addresses
dynamically - ARP
Idea behind dynamic resolution with ARP
• when it wants to resolve IP address IB, a host broadcasts an ARP request
packet that asks the host with IP address IB to respond with its hardware
address HB.
• All hosts, including B, receive the request, but only host B recognizes its IP
address and sends a reply that contains its hardware address.
• ARP is only used when a host needs to send an IP packet. Therefore, when
it receives a reply to its request, the host that made the request will use
the information to send an IP packet directly to B.
• The Address Resolution Protocol, ARP, allows a host to find the physical
address of a target host on the same physical network, given only the
target’s IP address
Illustrates the ARP protocol by showing host A
broadcasting a request for B, and B responding
ARP cache
• Cache : recently acquired IP-to-hardware address bindings.
• whenever a computer sends an ARP request and receives an ARP
reply, it saves the IP address and corresponding hardware address
information in its cache temporarily.
• When transmitting a packet, a computer always looks in its cache
before sending an ARP request.
• If it finds the desired binding in its ARP cache, the computer does not
need to broadcast a request.
ARP cache timeout
• soft state - a situation in which information can become stale without
warning
• A timer is set when information is added to the cache; when the
timer expires, the information is deleted.
• With a typical timeout being 20 minutes, when the timer expires, the
information must be removed.
• After removal there are two possibilities.
• If no further packets are sent to the destination, nothing occurs.
• If a packet must be sent to the destination and there is no binding present in
the cache, the computer follows the normal procedure of broadcasting an
ARP request and obtaining the binding.
• If the destination is still reachable, the new binding will be placed in the ARP
cache.
• If not, the sender will discover that the destination is not reachable.
Soft state in ARP has advantages and
disadvantages
• Advantage:
• a computer can determine when information in its ARP cache should be
revalidated independent of other computers.
• a sender does not need successful communication with the receiver or a third
party to determine that a binding has become invalid; if a target does not
respond to an ARP request, the sender will declare the target to be down.
• the scheme does not rely on network hardware to provide reliable transfer or
inform a computer whether another computer is online.
• Disadvantage:
• if the timer interval is N minutes, a sender may not detect that a receiver has
crashed until N minutes elapse.
ARP message format
• An ARP message does not have a fixed format header.
• The design allows ARP to map an arbitrary high-level protocol address
to an arbitrary network hardware address.
• In practice, ARP is only used to map 32-bit IPv4 addresses to 48-bit
Ethernet addresses.
• An ARP reply carries the IPv4 address and hardware address of the
original requester as well as the IPv4 address and hardware address
of the sender.
• In a request, the target hardware address is set to zero because it is
unknown.
The ARP message format when used to map
an IPv4 address to an Ethernet address.
ARP message format
ARP Refinement
• For reducing the amount of network traffic and automate recovery after a
hardware address changes.
1. To anticipate B’s need and avoid extra network traffic, ARP requires A to
include its IP-to-hardware address binding when sending B a request. B
extracts A’s binding from the request and saves the binding in its ARP
cache.
2. because requests are broadcast, all machines on the network receive a
copy of the request. The protocol specifies that each machine extract the
sender’s IP-to-hardware address binding from the request, and use the
information to update the binding in their cache.
3. The computer can notify others of a new address by broadcasting a
gratuitous ARP request.
• Summary :
The sender’s IP-to-hardware address binding is included in
every ARP broadcast; receivers use the information to update
their address binding information. The intended recipient uses
the information to create a new cache entry in anticipation of
a reply.
Relationship Of ARP To Other Protocols
• Because it uses direct mapping, IPv6 does not need ARP.
• ARP merely provides one possible mechanism to map an IP address to
a hardware address.
• Address binding is only needed to hide the underlying hardware
addresses.
• ARP is a low-level protocol that hides the underlying addressing used
by network hardware, permitting us to assign an arbitrary IP address
to every machine.
ARP implementation
• ARP software is divided into two parts:
• address resolution for outgoing packets: given the IP address of a computer
on the network, it finds the hardware address of the computer.
• handles incoming ARP packets.
ARP Encapsulation and Identification
• To identify the frame as carrying an ARP message, the sender assigns
a special value to the type field in the frame header.
• A single type value is used for all frames that carry an ARP message.
• For example, on an Ethernet, frames carrying ARP messages have a
type field of 0x0806, where the prefix 0x indicates a hexadecimal
value.
Automatic ARP Cache Revalidation
• Jitter -variance in packet transfer times.
• The key to avoiding jitter arises from early revalidation.
• The implementation associates two counters with each entry in the
ARP cache:
• traditional timer
• revalidation timer
Reverse Address Resolution (RARP)
• a system broadcasts a RARP request to obtain an IP address.
• The request contains the sender’s Ethernet address. A server on the
network receives the request, looks up the Ethernet address in a
database, extracts the corresponding IPv4 address from the database,
and sends a RARP reply with the information.
• RARP uses Ethernet type 0x8035
• RARP is no longer important for diskless devices, but has an
interesting use in cloud data centers.
ARP Caches In Layer 3 Switches
• An Ethernet switch is classified as a Layer 3 switch if the switch
understands IP packets and can examine IP headers when deciding
how to process a packet.
• The implementation arises from a desire to reduce ARP traffic.
• If each computer implements ARP cache timeouts, the computer will
periodically timeout cache entries and then broadcast an ARP
request.
• a switch can create its own cache of ARP information and can answer
requests.
Proxy ARP
• A technique known as proxy ARP to implement a form of security.
• The ARP Hack - the technique became known by the more formal
term proxy ARP.
• Proxy ARP relies on a computer that has two network connections
and runs special-purpose ARP software.
IPv6 Neighbor Discovery
• IPv6 uses the term neighbor to describe another computer on the
same network.
• IPv6’s Neighbor Discovery Protocol(NDP) replaces ARP and allows a
host to map between an IPv6 address and a hardware address.
• A key difference between ARP and NDP arises from the way each
handles the status of neighbors.
• ARP uses a late-binding approach with soft state. NDP uses early
binding and takes a proactive approach to state maintenance.

More Related Content

What's hot

Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)maamir farooq
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer NumericalsManisha Keim
 
ITFT - IP adressing
 ITFT - IP adressing ITFT - IP adressing
ITFT - IP adressingNavneet Kaur
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnettingAli Nezhad
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersS Khawaja
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1Tutun Juhana
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address conceptsmyrajendra
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressingSourav Jyoti Das
 
Classless addressing
Classless addressingClassless addressing
Classless addressingIqra Abbas
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyKashif Sohail
 
Chap 04
Chap 04Chap 04
Chap 04IGNOU
 

What's hot (20)

Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
Ipv4 Final
Ipv4 FinalIpv4 Final
Ipv4 Final
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
ITFT - IP adressing
 ITFT - IP adressing ITFT - IP adressing
ITFT - IP adressing
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Chapter 19: Logical Addressing
Chapter 19: Logical AddressingChapter 19: Logical Addressing
Chapter 19: Logical Addressing
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
About ip address
About ip addressAbout ip address
About ip address
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
 
IP Address
IP AddressIP Address
IP Address
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressing
 
IP addressing
IP addressingIP addressing
IP addressing
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
Classless addressing
Classless addressingClassless addressing
Classless addressing
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
Day 5.5 subnetting
Day 5.5 subnettingDay 5.5 subnetting
Day 5.5 subnetting
 
Chap 04
Chap 04Chap 04
Chap 04
 

Similar to NP - Unit 2 - Internet Addressing, ARP and RARP

IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptxnaseerahmad707715
 
IPv4 Address uploading.ppt
IPv4 Address uploading.pptIPv4 Address uploading.ppt
IPv4 Address uploading.pptSanthiS10
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.pptsol zem
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2Tutun Juhana
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Tutun Juhana
 
Umutima.ppt
Umutima.pptUmutima.ppt
Umutima.pptkigaliac
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxssuserc1e786
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptxlaiba29012
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptFaysalAhamed32
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptJayaprasanna4
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4Hossam El-Deen Osama
 

Similar to NP - Unit 2 - Internet Addressing, ARP and RARP (20)

IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptx
 
IPv4 Address uploading.ppt
IPv4 Address uploading.pptIPv4 Address uploading.ppt
IPv4 Address uploading.ppt
 
Ramakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressingRamakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressing
 
IPv4
IPv4IPv4
IPv4
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.ppt
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
 
Umutima.ppt
Umutima.pptUmutima.ppt
Umutima.ppt
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptx
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptx
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.ppt
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
 

More from hamsa nandhini

SOA - Unit 5 - SOA and Business Process Management
SOA - Unit   5 - SOA and Business Process ManagementSOA - Unit   5 - SOA and Business Process Management
SOA - Unit 5 - SOA and Business Process Managementhamsa nandhini
 
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit   4 - SOA & Web Services for integration and Multi-Channel accessSOA - Unit   4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel accesshamsa nandhini
 
SOA - Unit 3 - SOA and Web Services
SOA - Unit   3 - SOA and Web ServicesSOA - Unit   3 - SOA and Web Services
SOA - Unit 3 - SOA and Web Serviceshamsa nandhini
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecturehamsa nandhini
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Serviceshamsa nandhini
 
NP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGPNP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGPhamsa nandhini
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicastinghamsa nandhini
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
 
Web application, cookies and sessions
Web application, cookies and sessionsWeb application, cookies and sessions
Web application, cookies and sessionshamsa nandhini
 
Database design and error handling
Database design and error handlingDatabase design and error handling
Database design and error handlinghamsa nandhini
 
Introduction to MySQL in PHP
Introduction to MySQL in PHPIntroduction to MySQL in PHP
Introduction to MySQL in PHPhamsa nandhini
 

More from hamsa nandhini (19)

SOA - Unit 5 - SOA and Business Process Management
SOA - Unit   5 - SOA and Business Process ManagementSOA - Unit   5 - SOA and Business Process Management
SOA - Unit 5 - SOA and Business Process Management
 
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit   4 - SOA & Web Services for integration and Multi-Channel accessSOA - Unit   4 - SOA & Web Services for integration and Multi-Channel access
SOA - Unit 4 - SOA & Web Services for integration and Multi-Channel access
 
SOA - Unit 3 - SOA and Web Services
SOA - Unit   3 - SOA and Web ServicesSOA - Unit   3 - SOA and Web Services
SOA - Unit 3 - SOA and Web Services
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecture
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Services
 
NP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGPNP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGP
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
Unit 1
Unit 1Unit 1
Unit 1
 
Web application, cookies and sessions
Web application, cookies and sessionsWeb application, cookies and sessions
Web application, cookies and sessions
 
PHP with MySQL
PHP with MySQLPHP with MySQL
PHP with MySQL
 
Database design and error handling
Database design and error handlingDatabase design and error handling
Database design and error handling
 
Introduction to MySQL in PHP
Introduction to MySQL in PHPIntroduction to MySQL in PHP
Introduction to MySQL in PHP
 
Basics of PHP
Basics of PHPBasics of PHP
Basics of PHP
 
XML Security
XML SecurityXML Security
XML Security
 
SOAP and Web services
SOAP and Web servicesSOAP and Web services
SOAP and Web services
 
XML Technologies
XML TechnologiesXML Technologies
XML Technologies
 
XML DTD and Schema
XML DTD and SchemaXML DTD and Schema
XML DTD and Schema
 
fundamentals of XML
fundamentals of XMLfundamentals of XML
fundamentals of XML
 

Recently uploaded

Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 

NP - Unit 2 - Internet Addressing, ARP and RARP

  • 3. Universal host identifiers • Host - refer to an end system that attaches to the Internet. • Internet divides all machines into two classes: routers and hosts. • Each host on an internet is assigned a unique integer address called its Internet Protocol address or IP address. • An IP address is divided into two parts: a prefix of the address identifies the network to which the host attaches and a suffix identifies a specific host on the network.
  • 4. 4 An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.
  • 5. Categories of IP addressing • Classful addressing • Classless IP addressing • CIDR – Classless Inter Domain Routing(pronounced as Cider) 5
  • 7. Classful IP addressing Address space is divided into 5 classes A,B,C,D and E 7
  • 10. Classful addressing Binary notation • Example : Find the class of the address 11000001 10000011 00011011 11111111 Solution : The first two bits of the given address are 11, and the third bit is 0. Therefore, it is a class C address. 10
  • 11. Classful addressing Decimal notation • Example : Find the class of the address 227.12.14.87 Solution : The first byte is 227, which is between 224 and 239, and thus, the given address is a class D address. 11
  • 12. Net ID and Host ID • Net ID is the part of the IP address that identifies the network; and • Host ID is the part of the IP address that identifies the host on the network. 12
  • 13. Classful addressing - consolidation 13 1 1
  • 14. Example…(1) 14 Change the following IPv4 addresses from binary notation to dotted-decimal notation. Solution We replace each group of 8 bits with its equivalent decimal number and add dots for separation.
  • 15. Example ... (2) 15 Change the following IPv4 addresses from dotted-decimal notation to binary notation. Solution We replace each decimal number with its binary equivalent
  • 16. Example... (3) 16 Point out the error, if any, in the following IPv4 addresses. Solution a. There must be no leading zero (045). b. There can be no more than four numbers or octets. c. Each number needs to be less than or equal to 255. d. A mixture of binary notation and dotted-decimal notation is not allowed.
  • 17. Example... (4) 17 Find the class of each address. a. 00000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 c. 14.23.120.8 d. 252.5.15.111 Solution a. The first bit is 0. This is a class A address. b. The first 2 bits are 1; the third bit is 0. This is a class C address. c. The first byte is 14; the class is A. d. The first byte is 252; the class is E.
  • 18. Subnetting and supernetting To manage the address depletion temporarily • Subnetting • to divide a large block (Class A block) into smaller ones • Large org. are unhappy this division • Supernetting • to combine several class C blocks into a larger block • makes the routing of packets more difficult 18
  • 19. Classless Addressing • Scarcity of IPV4 addresses – (only 232 addresses) • Short term solution - Classless Addressing (Uses IPV4 addresses ) • Long term solution – IPV6 Addresses (128 – bit address) • Classless Addressing makes the allocation of IP Addresses more efficient. • It replaces the older classful addressing system which is based on classes. • It is also known as Classless Inter Domain Routing (CIDR). 19
  • 20. Classless Addressing • In CIDR , the whole address space is divided into variable length blocks. • One restriction - number of addresses in a block i.e. block size needs to be a power of 2. we can have a block of 20, 21, 22, . . . , 232 addresses • Prefix length in classless addressing is variable • Size of the network is inversely proportional to the length of the prefix. small prefix  a larger network; large prefix  smaller network • Prefix length: Slash Notation - prefix length, is added to the address, separated by a slash 20
  • 21. Classless Addressing – Slash Notation Prefix length: Slash Notation - prefix length, is added to the address, separated by a slash Prefix tells the number of bits used for the identification of network. Remaining bits are used for the identification of hosts in the network. 21
  • 22. Example 1 A classless address is given as 167.199.170.82/27. Find the three pieces of information. 1) The no. of addresses in the network is 232− 27 = 25 = 32 addresses. 2) Starting address can be found by keeping the first 27 bits and changing the rest of the bits to 0s. 3) Last address can be found by keeping the first 27 bits and changing the rest of the bits to 1s. 22
  • 23. Example 2 Given the CIDR representation 100.1.2.35/20. Find the range of IP Addresses in the CIDR block Solution: Given CIDR IP Address may be represented as- 01100100.00000001.00000010.00100011 / 20 First IP Address = 01100100.00000001.00000000.00000000=100.1.0.0 Last IP Address =01100100.00000001.00001111.11111111=100.1.15.255 Range of IP Addresses = [ 100.1.0.0 , 100.1.15.255] Network size = 2(32-20) = 212 = 4096 addresses 23
  • 24. Use of address mask in CIDR Another way to find the first and last addresses in the block is to use the address mask. The address mask is a 32-bit number in which the n leftmost bits are set to 1s and the rest of the bits (32 − n) are set to 0s. Address mask of a.b.c.d /27 is 11111111 11111111 11111111 11100000 in (255.255.255.224)d Use bit-wise operations NOT, AND, and OR to extract the information in a block as follows  No. of addresses in the block N = NOT (mask) + 1.  First address in the block = (Any address in the block) AND (mask).  Last address in the block = (Any address in the block) OR [(NOT (mask)]. 24
  • 25. IPv4 subnet addressing • Subnetting allows a single network prefix to be used for multiple physical networks. • Only hosts and routers at the site will know that there are multiple physical networks and how to forward traffic among them. • Routers and hosts in the rest of the Internet will assume there is a single physical network at the site with hosts attached.
  • 26. Problem A classless address is given as 167.199.170.82/27. Find the three pieces of information. 26 The mask is 27 leading 1’s ( i.e. ) 11111111 11111111 11111111 11100000 Given Address in binary 167.199.170.82/27 10100111 11000111 10101010 01010010 • First address: First = (address) AND (mask) Address 10100111 11000111 10101010 01010010 AND Mask 11111111 11111111 11111111 11100000 Answer : 10100111 11000111 10101010 01000000 167.199.170.64 • Last address: Last = (address) OR (NOT mask) Address 10100111 11000111 10101010 01010010 OR NOT mask 00000000 00000000 00000000 00011111 Answer : 10100111 11000111 10101010 01011111  167.199.170.85 • Number of addresses in the block: N = NOT (mask) + 1 Mask 11111111 11111111 11111111 11100000 NOT mask 00000000 00000000 00000000 00011111 Answer 0.0.0.31 + 1 = 32 addresses
  • 27. Classless addressing Note In CIDR, a given address may belongs to several networks which is based on prefix length. Example An address 230.8.24.56 belongs to class D in classful addressing. But, in classless addressing , it may be belongs to several blocksks as follows: 27
  • 28. Classless Addressing Network Address • The first address in any network (block) called network address, mainly used in routing a packet to its destination network. • Each network is identified by its network address. • When a packet arrives at the router , the router needs to know to which network the packet should be sent • After the network address has been found, the router consults its forwarding table to find the corresponding interface through which the packet sent out. 28
  • 29. Classless Addressing- Subnetting • Internet Corporation for Assigned Names and Numbers (ICANN) – global authority allocate a large block of addresses to ISPs (or large organization ) • Subnetting - An organization (or an ISP) that is granted a range of addresses may divide the range into several subranges and assign each subrange to a subnetwork (or subnet). A subnetwork can be divided into several sub- subnetworks and so on. • Designing subnets • 3 steps 1. No. of addresses in each subnetwork should be a power of 2. 2. Prefix length for each subnetwork should be found using the following formula: Prefix length = 32 − log2(Block size) 3. Starting address in each subnetwork should be divisible by the number of addresses in that subnetwork. This can be achieved if we first assign addresses to larger subnetworks. 29
  • 30. Subnetting Examples - 1 An organization is granted a block of addresses with the beginning address 14.24.74.0/24. The organization needs to have 3 subblocks of addresses to use in its three subnets: one subblock of 10 addresses, one subblock of 60 addresses, and one subblock of 120 addresses. Design the subblocks. 30 Step-1 : No. of addresses = 232– 24 = 256 addresses . First address is 14.24.74.0/24; Last address is 14.24.74.255/24. Step- 2 : To find out prefix(Net ID), sort blocks from largest to smallest 1st largest subnet requires 120 addresses. We allocate 128 addresses. (power of 2) Prefix(mask) = 32- log2128 = 32-log227 = 32-7 = 25 2nd largest subnet requires 60 addresses. We allocate 64 addresses. Prefix(mask) = 32- log264 = 32-log226 = 32-6 = 26 3rd largest subnet requires 10 addresses. We allocate 16 addresses. Prefix(mask) = 32- log216 = 32-log224 = 32-4 = 28 Step-3: First address Last Address Block size Subnet I 14.24.74.0/25 14.24.74.127/25 128 Subnet II 14.24.74.128/26 14.24.74.191/26 64 Subnet III 14.24.74.192/28 14.24.74.207/28 16 Unused addrs 14.24.74.208 14.24.74.255 48
  • 31. Classless addressing Limited Broadcast vs Direct Broadcast Addresses Limited-broadcast address  data reaches from source to all the host in a same network  source will send message to all the host connected to it  Since message covers all host so destination Address would be 255.255.255.255  Same for all networks (subnets)  Msg - src addr -11.1.2.3 - dest. addr-255.255.255.255  . 31 Direct-broadcast address  When host in one network sends message to all host in another network  Since network is different, directed broadcast address is 30.255.255.255  Usually, the last address in each subnet is used as direct-broadcast address  Msg - src addr -11.1.2.3 - dest. addr- 30.255.255.255
  • 32. IPv6 • 128 bits / 16 octets • Solves: insufficient capacity • Dotted notation: • Colon hexadecimal notation: Advantage: • compact and easier to enter . • Allows zero compression • Allows dotted decimal suffix
  • 33. Address space assignment • Two issues: • How human manage addr assignment • How routers handle the forwarding table • Solution: multi-level hierarchy / multiple hierarchies
  • 34. IPv4 to IPv6 • Two reasons for transition from IPv4 to IPv6 • Stateless IP/ICMP translation protocol (SIIT) • Checksum problem
  • 35. IPv6 unicast addresses and /64 • 3 parts: • A globally-unique prefix – identify a site • A subnet ID - used to distinguish among multiple physical networks at the destination site • An interface ID - used to identify a particular computer connected to the subnet.
  • 36. IPv6 interface identifier and MAC addresses • Interface ID <- host identifier • Lower 64 bits – identifies a specific network interface.
  • 37. Special addresses • 0.0.0.0 – temporary source address • 255.255.255.255 – IPv4 limited broadcast address • Host portion – all 1’s – directed broadcast address • Subnet broadcast address – host portion – all 1’s • Multicast addresses – begins with three 1’s • Loopback address – 127.0.0.0/8
  • 38. • Locally scoped – link local scope : 1111 1110 10 • Weaknesses in internet address • If a host computer moves from one network to another, its internet address must change – mobility • Early binding – renumbering – absurd no.of bits(64) • Forwarding – destination address – network address->router . Pblm:one IP address is not sufficient, if a network is down.
  • 39. Internet Address Assignment And Delegation Of Authority • Each network prefix - unique • Internet Assigned Numbers Authority(IANA) • Internet Corporation for Assigned Names and Numbers(ICANN)
  • 42. Address resolution problem • Consider two machines A and B that connect to the same physical network. Each machine has an assigned IP address, IA and IB, and a hardware (MAC) address, HA and HB. • how does A map B’s Internet address to B’s hardware address,HB? • The problem of mapping high-level addresses to physical addresses is known as the address resolution problem. • There are two basic types of hardware addresses: those that are larger than the host portion of an IP address and those that are smaller.
  • 43. Resolution Through Direct Mapping • IPv6 uses a technique known as direct mapping. The basic idea is straightforward: use a computer’s hardware address as the host portion of the computer’s Internet address.
  • 44. Resolution in a direct mapped network • If a computer’s IP address includes the computer’s hardware address, address resolution is trivial. • Direct mapping implies, the mapping can be performed without reference to external data. • Advantage: new computers can be added to a network without changing existing assignments and without propagating new information to existing computers. • Direct mapping means selecting a function f that maps IP addresses to physical addresses. Resolving an IP address IA means computing HA = f(IA)
  • 45. Address resolution through dynamic binding • Direct mapping cannot be used with IPv4 if a hardware addresses is larger than an IPv4 address. • MAC address is 48 bits long and an IPv4 address is only 32 bits long. • Designers of TCP/IP protocols found a creative solution to the address resolution problem. • The solution allows new hosts or routers to be added to a network without recompiling code, and does not require maintenance of a centralized database. • Designers chose to use a low-level protocol that resolves addresses dynamically - ARP
  • 46. Idea behind dynamic resolution with ARP • when it wants to resolve IP address IB, a host broadcasts an ARP request packet that asks the host with IP address IB to respond with its hardware address HB. • All hosts, including B, receive the request, but only host B recognizes its IP address and sends a reply that contains its hardware address. • ARP is only used when a host needs to send an IP packet. Therefore, when it receives a reply to its request, the host that made the request will use the information to send an IP packet directly to B. • The Address Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target’s IP address
  • 47. Illustrates the ARP protocol by showing host A broadcasting a request for B, and B responding
  • 48. ARP cache • Cache : recently acquired IP-to-hardware address bindings. • whenever a computer sends an ARP request and receives an ARP reply, it saves the IP address and corresponding hardware address information in its cache temporarily. • When transmitting a packet, a computer always looks in its cache before sending an ARP request. • If it finds the desired binding in its ARP cache, the computer does not need to broadcast a request.
  • 49. ARP cache timeout • soft state - a situation in which information can become stale without warning • A timer is set when information is added to the cache; when the timer expires, the information is deleted. • With a typical timeout being 20 minutes, when the timer expires, the information must be removed. • After removal there are two possibilities. • If no further packets are sent to the destination, nothing occurs. • If a packet must be sent to the destination and there is no binding present in the cache, the computer follows the normal procedure of broadcasting an ARP request and obtaining the binding. • If the destination is still reachable, the new binding will be placed in the ARP cache. • If not, the sender will discover that the destination is not reachable.
  • 50. Soft state in ARP has advantages and disadvantages • Advantage: • a computer can determine when information in its ARP cache should be revalidated independent of other computers. • a sender does not need successful communication with the receiver or a third party to determine that a binding has become invalid; if a target does not respond to an ARP request, the sender will declare the target to be down. • the scheme does not rely on network hardware to provide reliable transfer or inform a computer whether another computer is online. • Disadvantage: • if the timer interval is N minutes, a sender may not detect that a receiver has crashed until N minutes elapse.
  • 51. ARP message format • An ARP message does not have a fixed format header. • The design allows ARP to map an arbitrary high-level protocol address to an arbitrary network hardware address. • In practice, ARP is only used to map 32-bit IPv4 addresses to 48-bit Ethernet addresses. • An ARP reply carries the IPv4 address and hardware address of the original requester as well as the IPv4 address and hardware address of the sender. • In a request, the target hardware address is set to zero because it is unknown.
  • 52. The ARP message format when used to map an IPv4 address to an Ethernet address.
  • 54. ARP Refinement • For reducing the amount of network traffic and automate recovery after a hardware address changes. 1. To anticipate B’s need and avoid extra network traffic, ARP requires A to include its IP-to-hardware address binding when sending B a request. B extracts A’s binding from the request and saves the binding in its ARP cache. 2. because requests are broadcast, all machines on the network receive a copy of the request. The protocol specifies that each machine extract the sender’s IP-to-hardware address binding from the request, and use the information to update the binding in their cache. 3. The computer can notify others of a new address by broadcasting a gratuitous ARP request.
  • 55. • Summary : The sender’s IP-to-hardware address binding is included in every ARP broadcast; receivers use the information to update their address binding information. The intended recipient uses the information to create a new cache entry in anticipation of a reply.
  • 56. Relationship Of ARP To Other Protocols • Because it uses direct mapping, IPv6 does not need ARP. • ARP merely provides one possible mechanism to map an IP address to a hardware address. • Address binding is only needed to hide the underlying hardware addresses. • ARP is a low-level protocol that hides the underlying addressing used by network hardware, permitting us to assign an arbitrary IP address to every machine.
  • 57. ARP implementation • ARP software is divided into two parts: • address resolution for outgoing packets: given the IP address of a computer on the network, it finds the hardware address of the computer. • handles incoming ARP packets.
  • 58. ARP Encapsulation and Identification • To identify the frame as carrying an ARP message, the sender assigns a special value to the type field in the frame header. • A single type value is used for all frames that carry an ARP message. • For example, on an Ethernet, frames carrying ARP messages have a type field of 0x0806, where the prefix 0x indicates a hexadecimal value.
  • 59. Automatic ARP Cache Revalidation • Jitter -variance in packet transfer times. • The key to avoiding jitter arises from early revalidation. • The implementation associates two counters with each entry in the ARP cache: • traditional timer • revalidation timer
  • 60. Reverse Address Resolution (RARP) • a system broadcasts a RARP request to obtain an IP address. • The request contains the sender’s Ethernet address. A server on the network receives the request, looks up the Ethernet address in a database, extracts the corresponding IPv4 address from the database, and sends a RARP reply with the information. • RARP uses Ethernet type 0x8035 • RARP is no longer important for diskless devices, but has an interesting use in cloud data centers.
  • 61. ARP Caches In Layer 3 Switches • An Ethernet switch is classified as a Layer 3 switch if the switch understands IP packets and can examine IP headers when deciding how to process a packet. • The implementation arises from a desire to reduce ARP traffic. • If each computer implements ARP cache timeouts, the computer will periodically timeout cache entries and then broadcast an ARP request. • a switch can create its own cache of ARP information and can answer requests.
  • 62. Proxy ARP • A technique known as proxy ARP to implement a form of security. • The ARP Hack - the technique became known by the more formal term proxy ARP. • Proxy ARP relies on a computer that has two network connections and runs special-purpose ARP software.
  • 63. IPv6 Neighbor Discovery • IPv6 uses the term neighbor to describe another computer on the same network. • IPv6’s Neighbor Discovery Protocol(NDP) replaces ARP and allows a host to map between an IPv6 address and a hardware address. • A key difference between ARP and NDP arises from the way each handles the status of neighbors. • ARP uses a late-binding approach with soft state. NDP uses early binding and takes a proactive approach to state maintenance.