SlideShare a Scribd company logo
IP addressing
presented by:
Smriti Rastogi .
CSE -3RD YEAR.
1503310230.
5/9/2018 1
What is an IP address?
An unique identifier for a computer or
device (host) on a TCP/IP network.
32 bit binary sequence.
Valid addresses can range from
0.0.0.0 to 255.255.255.255
Total No.Of address= 2^32 =4.3 Billion.
5/9/2018 2
Dotted Decimal Notation
 IP addresses are written in a so-called dotted decimal
notation
 Each byte is identified by a decimal number in the range
[0..255]:
Example:
1000111110000000 10001001 10010000
1st Byte
= 128
2nd Byte
= 143
3rd Byte
= 137
4th Byte
= 144
128.143.137.144
5/9/2018 3
History:
 I P was the connectionless datagram service in the original.
 Transmission Control Program introduced by Vint Cerf and Bob
Kahn in 1974; the other being the connection-oriented Transmission
Control Protocol (TCP). The Internet protocol suite is therefore
often referred to as TCP/IP.
General structure:
5/9/2018
IP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which mIP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which mIP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which m
NETWORK ID HOST ID
HIGH order bits LOW order bits
4
How IP Works?
5/9/2018
HOST
DNS
HOST
3) Process
1) Network
Server
Upon Network layer.
ISP
5
Types of IP addresses:
Static address:
 Permanently fixed for external devices
 Manually Configured for a device.
 Manageable for small networks.
 Security less, more vulnerable to hacking treats.
 Good for web, emails database server and FTP server.
5/9/2018 6
 Dynamic address:
 Assigned by server when host boots.
 Assigned via DHCP and BOOTP protocols .
 Derived automatically from a range of addresses.
 Cheaper than static IP address.
 Changing IP address gives more privacy
5/9/2018 7
IPV4: Classful Network architecture
5/9/2018 8
CLASS—A IP ADDRESS
0_ _ _ _ _ _ _ (8 bit NID) 24 bit HID
• No. of networks =2^7=128
• Range= 1 to 126 (loopback address=127.0.0.0)
• No. Of IP addresses/networks= 2^24=16M
• No. of host configured = 2^24-2
5/9/2018 9
CLASS—B IP ADDRESS
10____________(16 bit NID) 16 bit HID
• No. of networks =2^14=16K.
• Range= 128 to 191.
• No. Of IP addresses/networks= 2^16=64K.
• No. of host configured= 2^16-2.
5/9/2018 10
CLASS—C IP ADDRESS
110____________(24bit NID) 8 bit HID
• No. of networks =2^21=2M.
• Range=192 to 223.
• No. Of IP addresses/networks= 2^8=256.
• No. of host configured=254.
5/9/2018 11
5/9/2018
CLASS—D IP ADDRESS
• Range= 224 to 239
Class –E IP ADDRESS
• Range= 240 to 255
• Not used for host addressing.
12
Reserved IP Address
 First IP address of any class of IP is reserved representing
IP Address of entire network where HID=0.
 Limited Broadcast address (Sending the packet to all the
host in the SAME network)=255.255.255.255 is FIXED.
 Last IP address is reserved for Directed broadcast address
( to all host in DIFFERENT network) where HID=1.
Example: 20.255.255.255
5/9/2018
NID HID=1
13
Classfull : DISADVANTAGES
 Value of first octet determines the NID and HID
part.
 Address space exhaustion.
 Same subnet Mask is used in complete network.
 Used with classfull routing protocol like RIPv1.
 Limited No. of network for a particular class.
5/9/2018 14
CIDR
 Subnet Mask determines the NID and HID portion.
BGP( Border gateway protocol), RIPv2 protocols are used.
 a.b.c.d/x where x is # bits in network portion of address.
Variable length subnet mask (VLSM) is used.
5/9/2018
11001000 00010111 00010000 00000000
network
part
host
part
200.23.16.0/23
15
5/9/2018 4a-16
Public IP Addresses
1. Public IP addresses are global and standardized.
2. Can be accessed over the Internet.
3. Internet Assigned Numbers Authority (IANA) formerly
known as (InterNIC) is responsible for registering IP address
to organizations and ISPs.
4. For multiple computers ;
Private IP addresses to address each
computer and router gets the public IP address, and each of
the computers, connected to your router (via wired or wifi)
gets a private IP address from your router via DHCP (Client-
server)protocol on network layer.
Private IP address
 Local or internal IP connect devices in a private
network and can’t access internet.
 They are Non-Routable.
 To allow direct access to a local device which is assigned a
private IP address, a Network Address Translator (NAT)
should be used.
5/9/2018
CLASS RANGE # of HOST
A 10.0.0.0/8 10.255.255.255 16,777,216
B 172.16.0.0./12 172.31.255.255 1,048,576
C 192.168.0.0/16 192.168.255.255 65,536
17
IP Usage:
 An Internet Protocol provides for a set of rules
that govern Internet activity and facilitate completion of
transfer of files and E-mail on the World Wide Web.
 Used to connect to another computer via host
or network interface identification and location
addressing.
 IP is the core of the TCP/IP protocol suite. IP
provides the fundamental mechanism using which data
is delivered between devices which may or may not be
in the same network.
5/9/2018 18
 DATA ENCAPSULATION which provides security.
 FRAGMENTATION which promotes reliability.
 REASSEMBLING on the receiving device and passes it
on to the higher layers for interpretation.
 FORMATTING/PACKAGING where format and
package is only decipherable by the recipient.
5/9/2018 19
IPv4 and IPv6
• IPv6 is used by less than 1% of the networks, while IPv4 is still in use by
the remaining 99%.
5/9/2018
PARAMETERS IPv4 address IPv6 address
Length • 32 bit • 128 bit
Representation • decimals (.) • Hexadecimal (:)
Security Application dependent Inbuilt IPsec support.
Packet Fragmentation Senders and Router. Only Senders
Packet Flow NOT AVAILABLE FLOW label field in
IPv6 header.
Address Configuration Manual and DHCP support. Auto-configuration.
Address Types Unicast and Broadcast. Multicast and Anycast.
Address Resolution
Protocol (ARP)
ARP is available to map IPv4
addresses to MAC address.
MAC address embedded
HID part.NDP
Available.
20
References:
 www.ibm.com
 www.iplocation.net
 www.ciscopress.com
 www. Livewireit.net
Thank you….
5/9/2018 21

More Related Content

IP addressing seminar ppt

  • 1. IP addressing presented by: Smriti Rastogi . CSE -3RD YEAR. 1503310230. 5/9/2018 1
  • 2. What is an IP address? An unique identifier for a computer or device (host) on a TCP/IP network. 32 bit binary sequence. Valid addresses can range from 0.0.0.0 to 255.255.255.255 Total No.Of address= 2^32 =4.3 Billion. 5/9/2018 2
  • 3. Dotted Decimal Notation  IP addresses are written in a so-called dotted decimal notation  Each byte is identified by a decimal number in the range [0..255]: Example: 1000111110000000 10001001 10010000 1st Byte = 128 2nd Byte = 143 3rd Byte = 137 4th Byte = 144 128.143.137.144 5/9/2018 3
  • 4. History:  I P was the connectionless datagram service in the original.  Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974; the other being the connection-oriented Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as TCP/IP. General structure: 5/9/2018 IP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which mIP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which mIP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which m NETWORK ID HOST ID HIGH order bits LOW order bits 4
  • 5. How IP Works? 5/9/2018 HOST DNS HOST 3) Process 1) Network Server Upon Network layer. ISP 5
  • 6. Types of IP addresses: Static address:  Permanently fixed for external devices  Manually Configured for a device.  Manageable for small networks.  Security less, more vulnerable to hacking treats.  Good for web, emails database server and FTP server. 5/9/2018 6
  • 7.  Dynamic address:  Assigned by server when host boots.  Assigned via DHCP and BOOTP protocols .  Derived automatically from a range of addresses.  Cheaper than static IP address.  Changing IP address gives more privacy 5/9/2018 7
  • 8. IPV4: Classful Network architecture 5/9/2018 8
  • 9. CLASS—A IP ADDRESS 0_ _ _ _ _ _ _ (8 bit NID) 24 bit HID • No. of networks =2^7=128 • Range= 1 to 126 (loopback address=127.0.0.0) • No. Of IP addresses/networks= 2^24=16M • No. of host configured = 2^24-2 5/9/2018 9
  • 10. CLASS—B IP ADDRESS 10____________(16 bit NID) 16 bit HID • No. of networks =2^14=16K. • Range= 128 to 191. • No. Of IP addresses/networks= 2^16=64K. • No. of host configured= 2^16-2. 5/9/2018 10
  • 11. CLASS—C IP ADDRESS 110____________(24bit NID) 8 bit HID • No. of networks =2^21=2M. • Range=192 to 223. • No. Of IP addresses/networks= 2^8=256. • No. of host configured=254. 5/9/2018 11
  • 12. 5/9/2018 CLASS—D IP ADDRESS • Range= 224 to 239 Class –E IP ADDRESS • Range= 240 to 255 • Not used for host addressing. 12
  • 13. Reserved IP Address  First IP address of any class of IP is reserved representing IP Address of entire network where HID=0.  Limited Broadcast address (Sending the packet to all the host in the SAME network)=255.255.255.255 is FIXED.  Last IP address is reserved for Directed broadcast address ( to all host in DIFFERENT network) where HID=1. Example: 20.255.255.255 5/9/2018 NID HID=1 13
  • 14. Classfull : DISADVANTAGES  Value of first octet determines the NID and HID part.  Address space exhaustion.  Same subnet Mask is used in complete network.  Used with classfull routing protocol like RIPv1.  Limited No. of network for a particular class. 5/9/2018 14
  • 15. CIDR  Subnet Mask determines the NID and HID portion. ��BGP( Border gateway protocol), RIPv2 protocols are used.  a.b.c.d/x where x is # bits in network portion of address. Variable length subnet mask (VLSM) is used. 5/9/2018 11001000 00010111 00010000 00000000 network part host part 200.23.16.0/23 15
  • 16. 5/9/2018 4a-16 Public IP Addresses 1. Public IP addresses are global and standardized. 2. Can be accessed over the Internet. 3. Internet Assigned Numbers Authority (IANA) formerly known as (InterNIC) is responsible for registering IP address to organizations and ISPs. 4. For multiple computers ; Private IP addresses to address each computer and router gets the public IP address, and each of the computers, connected to your router (via wired or wifi) gets a private IP address from your router via DHCP (Client- server)protocol on network layer.
  • 17. Private IP address  Local or internal IP connect devices in a private network and can’t access internet.  They are Non-Routable.  To allow direct access to a local device which is assigned a private IP address, a Network Address Translator (NAT) should be used. 5/9/2018 CLASS RANGE # of HOST A 10.0.0.0/8 10.255.255.255 16,777,216 B 172.16.0.0./12 172.31.255.255 1,048,576 C 192.168.0.0/16 192.168.255.255 65,536 17
  • 18. IP Usage:  An Internet Protocol provides for a set of rules that govern Internet activity and facilitate completion of transfer of files and E-mail on the World Wide Web.  Used to connect to another computer via host or network interface identification and location addressing.  IP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which may or may not be in the same network. 5/9/2018 18
  • 19.  DATA ENCAPSULATION which provides security.  FRAGMENTATION which promotes reliability.  REASSEMBLING on the receiving device and passes it on to the higher layers for interpretation.  FORMATTING/PACKAGING where format and package is only decipherable by the recipient. 5/9/2018 19
  • 20. IPv4 and IPv6 • IPv6 is used by less than 1% of the networks, while IPv4 is still in use by the remaining 99%. 5/9/2018 PARAMETERS IPv4 address IPv6 address Length • 32 bit • 128 bit Representation • decimals (.) • Hexadecimal (:) Security Application dependent Inbuilt IPsec support. Packet Fragmentation Senders and Router. Only Senders Packet Flow NOT AVAILABLE FLOW label field in IPv6 header. Address Configuration Manual and DHCP support. Auto-configuration. Address Types Unicast and Broadcast. Multicast and Anycast. Address Resolution Protocol (ARP) ARP is available to map IPv4 addresses to MAC address. MAC address embedded HID part.NDP Available. 20
  • 21. References:  www.ibm.com  www.iplocation.net  www.ciscopress.com  www. Livewireit.net Thank you…. 5/9/2018 21

Editor's Notes

  1. Do not change with time.
  2. BROADCASTING IS to send data to many host .
  3. Hence ip addresses are unique in nature. NO two machines that connect to a public network can have the same IP address. A web server, email server and any server device directly accessible from the Internet 
  4. encapsulating the data into an IP datagram. IP fragments datagram into pieces, so that they can each be carried on the local network.  IP reassembles the datagrams received into the full IP datagram (as they may be fragmented) IP uses a specific formatting and packaging prior to transmission. IP accepts data from the transport layer protocols above it in the OSI layer--UDP and TCP--and passes them to the data layers. 
  5. Enhanced version Internet protocol security IPsec is optional. More In packet switching networks, traffic flow, packet flow or network flow is a sequence of packets from a source computer to a destination, dynAMIC or static configuration. Every packet based network has an MTU (Maximum Transmission Unit) size. The MTU is the size of the largest packet that that network can transmit. Packets larger than the allowable MTU must be divided into smaller packets or fragments to enable them to traverse the network. The Neighbor Discovery Protocol (NDP, ND)[1] is a protocol in the Internet protocol suite used with Internet Protocol Version 6 (IPv6). It operates at the Network Layer of the Internet model (RFC 1122), and is responsible for gathering various information required for internet communication, including the configuration of local connections and the domain name servers and gateways used to communicate with more distant systems.[2]