CNE #Micro Project
CNE #Micro Project
S.V.P.M’S,
A
Report
On
MICROPROJECT
ACADEMIC YEAR 2022-23
TITLE OF PROJECT
Internet Protocol ( IP )
Guided By: Mr. Kadam H.S.
ANNEXURE II
EVALUATION SHEET FOR MICRO PROJECT
Academic Year: 2022-2023 Name of Faculty: Prof.H.S.Kadam
Course: Computer Networks Course Code:22417 Semester: IV
Title of the Project: .Internet Protocol (IP)………………………………………..……….
CO’s addressed by the Micro Project.
a) …………………………………………………………………………………………………….…….…………
b) …………………………………………………………………………………………………….………………..
c) …………………………………………………………………………………………………….…….…………..
……………………………………………………………………………………………………..
Marks out of 6 for Marks out of 4 for
Roll No./ performance in performance in Total out
Student Name
Sr.No group activity oral / presentation of 10
(D5 Col. 8) (D5 Col. 9)
……………………………………………………………………………………………………..
The current version of Internet Protocol (IPv4) has not been substantially changed in the past
25 years. IPv4 has proven to be robust and easily implemented. In the early stage, the
deployment of IPv6 is prepared and begun on the IPv4-based network. In the intermediate
stage, IPv4 and IPv6 coexist. In the later stage, IPv6 plays a leading role on the network and
the IPv4 network is gradually withdrawing from the market.
Meanwhile, researchers put forward many transition mechanisms for different network
infrastructures and different evolution stages. In this paper, a detailed study is made on IPv4
along with its different smart saving techniques. Which help in delay of IPv4 to IPv6 shifting
delays. Also different addressing schemes are discussed which remains unchanged in future.
Along with that limitations of IPv4 is also focused so present IPv4 network infrastructure can
be more secured till IPv6 realization.
NTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
NTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www connects all e-resources together where clients and server can use
and give such services. Whenever any service or resource is demanded the client should
first able to locate the server carrying the resources. After resource has been found out the
particular directory or server disk has to be checked to get the location of the file. Once
location is identified then there is a need for different protocols which deliver such resources
on the internet in electrical forms while keeping it intact. To get the resource we have
different addressing schemes while protocols stand to deliver the content.
In this paper Internet Protocol version 4 is studied in order to understand its pros and cons.
The different addressing levels such as logical, physical, port and specific addressing is
mentioned in their own aspects of need and certainty. Further the relation of such
addressing schemes with OSI and TCP/IP models are shown. IPv4 is talked about with its
size and different classes, where each class differs by its network and host ID part.
IPv4 addresses are already scarce and IPv6 addressing is under deployment progress. Till all
the IPv4 devices are improved to IPv6 devices the only option is to use IPv4. In such
scenarios how to use IPv4 addressing scheme with more efficiency is discussed and it covers
the different techniques like classful and classless IP addressing. Subnetting is other way
by which one can expand the network while keeping the public network id unchanged.
Advance to that the private and public IP addresses are mentioned along with their ranges, so
one can make use of them in their private and public networks accordingly. The other
possible way to have more users in less range of available IP is DHCP which is focused too,
followed by the Network Address Translation technique which makes communication
possible for private networks over public domains.
IP addresses structure :
An IP address consists of 32 bits. These bits are divided into four sections. Sections are
separated by a dot (.). Each section contains 8 bits. 8 bits are equal to 1 byte or 1 octet. The
following image shows how bits are organized in an IP address.
By using 32 bits with two possible values for each position, the binary system can create
4,294,967,296 (232) unique combinations or IP addresses. These addresses can be used without
any addressing scheme or with an addressing scheme that arranges them in such a way that it
becomes easier to access them.
If addresses are used without any addressing scheme, all routers on the network will need to
store the address of each and every interface on the network. Depending on the size of the
network, this may affect routing. If the network size is small, it can make routing slow. If the
network size is moderate, it can make routing very slow. If the network size is large, it can
make routing completely impossible.
For efficient routing, addresses are organized into the hierarchical addressing scheme. In this
scheme, all addresses are divided into five classes and each address is divided into two
addresses: the network address and the host address.
Types of IP Address :
IP Address is of two types:
1. IPv4 :
Internet Protocol version 4. It consists of 4 numbers separated by the dots. Each number can
be from 0-255 in decimal numbers. But computers do not understand decimal numbers, they
instead change them to binary numbers which are only 0 and 1. Therefore, in binary, this (0-
255) range can be written as (00000000 – 11111111). Since each number N can be
represented by a group of 8-digit binary digits. So, a whole IPv4 binary address can be
represented by 32-bits of binary digits. In IPv4, a unique sequence of bits is assigned to a
computer, so a total of (2^32) devices approximately = 4,294,967,296 can be assigned with
IPv4.
Ex. 189.123.123.90
2. IPv6:
But, there is a problem with the IPv4 address. With IPv4, we can connect only the above
number of 4 billion devices uniquely, and apparently, there are much more devices in the
world to be connected to the internet. So, gradually we are making our way to IPv6
Address which is a 128-bit IP address. In human-friendly form, IPv6 is written as a group of
8 hexadecimal numbers separated with colons(:). But in the computer-friendly form, it can be
written as 128 bits of 0s and 1s. Since, a unique sequence of binary digits is given to
computers, smartphones, and other devices to be connected to the internet. So, via IPv6 a
total of (2^128) devices can be assigned with unique addresses which are actually more than
enough for upcoming future generations.
Ex. 2011:0bd9:75c5:0000:0000:6b3e:0170:8394
IP address classes :
Based on the following rules, IP addresses are categorized into five classes; A, B, C, D, and
E.
In class A, the first bit of the first byte always remains OFF (0).
In class B, the first bit of the first byte always remains ON and the second bit of the
first byte always remains OFF.
In class C, the first two bits of the first byte always remain ON and the third bit of the
first byte always remains OFF.
In class D, the first three bits of the first byte always remain ON and the fourth bit of
the first byte always remains OFF.
In class E, the first four bits of the first byte always remain ON.
By turning all remaining bits of the first byte ON and OFF, we can make the first and last
address of that class.
The following table lists the value of the first byte or octet in both notations.
Classification of IP Address :
An IP address is classified into the following types:
1. Public IP Address:
This address is available publicly and it is assigned by your network provider to your router,
which further divides it to your devices. Public IP Addresses are of two types,
Dynamic IP Address :
When you connect a smartphone or computer to the internet, your Internet Service Provider
provides you an IP Address from the range of available IP Addresses. Now, your device has
an IP Address and you can simply connect your device to the Internet and send and receive
data to and from your device. The very next time when you try to connect to the internet with
the same device, your provider provides you with different IP Addresses to the same device
and also from the same available range. Since IP Address keeps on changing every time when
you connect to the internet, it is called a Dynamic IP Address.
Static IP Address :
Static address never changes. They serve as a permanent internet address. These are used by
DNS servers. What are DNS servers? Actually, these are computers that help you to open a
website on your computer. Static IP Address provides information such as device is located
on which continent, which country, which city, and which Internet Service Provider provides
internet connection to that particular device. Once, we know who is the ISP, we can trace the
location of the device connected to the internet. Static IP Addresses provide less security than
Dynamic IP Addresses because they are easier to track.
2. Private IP Address :
This is an internal address of your device which are not routed to the internet and no
exchange of data can take place between a private address and the internet.
3. Shared IP addresses :
Many websites use shared IP addresses where the traffic is not huge and very much
controllable, they decide to rent it to other similar websites so to make it cost-friendly.
Several companies and email sending servers use the same IP address (within a single mail
server) to cut down the cost so that they could save for the time the server is idle.
4. Dedicated IP addresses :
Network addresses are used to combine multiple IP addresses in a group while host addresses
are used to provide a unique identity to each IP address in the group. A network address is the
group address. All group members use the same network address. A host address is a unique
address in the group.
The length of network addresses and host addresses in IP addresses are different in all IP
classes. In class A, the first bits are reserved for the network address. The remaining 24 bits
are available for the host address. In class B, the first 16 bits are reserved for the network
address while the last 16 bits are available for the host address. In class C, the first 24 bits are
reserved for the network address while the last 8 bits available for the host address.
The following image shows how bits are defined for network addresses and host addresses in
each IP class.
In
IP
Class D and E are not used for the host addressing. Class D addresses are used for multicast
addresses. Class E addresses are reserved for research and development purposes.
IP addresses are always written with the subnet mask. The following table lists the default
subnet mask for all IP classes.
Class Decimal Notation Binary Notation
A 255.0.0.0 11111111.00000000.00000000.00000000
B 255.255.0.0 11111111.11111111.00000000.00000000
C 255.255.255.0 11111111.11111111.11111111.00000000
If the value is in the range 128 to 191, the address belongs to class B.
If the value is in the range 192 to 223, the address belongs to class C.
If the value is in the range 224 to 239, the address belongs to class D.
If the value is in the range 240 to 255, the address belongs to class E.
If the first bit is ON and the second bit is OFF, the address belongs to class B.
If the first two bits are ON and the third bit is OFF, the address belongs to class C.
If the first three bits are ON and the fourth bit is OFF, the address belongs to class D.
If the first four bits are ON, the address belongs to class E.
Examples of IP addresses :
Examples of class A IP addresses are the following.
Decimal Notation Binary Notation
1.2.3.4
255.0.0.0 00000001.00000010.00000011.00000100
11111111.00000000.00000000.00000000
10.10.10.10 00001010.00001010.00001010.00001010
255.0.0.0 11111111.00000000.00000000.00000000
25.147.191.14 00011001.10010011.10111111.00001110
255.0.0.0 11111111.00000000.00000000.00000000
95.86.75.4 01011111.01010110.01001011.00000100
255.0.0.0 11111111.00000000.00000000.00000000
127.0.0.1 01111111.00000000.00000000.00000001
255.0.0.0 11111111.00000000.00000000.00000000
129.12.36.42 10000001.00001100.00100100.00101010
255.255.0.0 11111111.11111111.00000000.00000000
168.172.1.1 10101000.10101100.00000001.00000001
255.255.0.0 11111111.11111111.00000000.00000000
175.66.43.12 10101111.01000010.00101011.00001100
255.255.0.0 11111111.11111111.00000000.00000000
145.186.175.234 10010001.10111010.10101111.11101010
255.255.0.0 11111111.11111111.00000000.00000000
190.60.152.25 10111110.00111100.10011000.00011001
255.255.0.0 11111111.11111111.00000000.00000000
210.20.30.40 11010010.00010100.00011110.00101000
255.255.255.0 11111111.11111111.11111111.00000000
216.123.145.16 11011000.01111011.10010001.00010000
255.255.255.0 11111111.11111111.11111111.00000000
220.86.76.43 11011100.01010110.01001100.00101011
255.255.255.0 11111111.11111111.11111111.00000000
220.60.80.100 11011100.00111100.01010000.01100100
255.255.255.0 11111111.11111111.11111111.00000000
Lookup IP addresses :
To know your public IP, you can simply search “What is my IP?” on google. Other websites
will show you equivalent information: they will see your public IP address because, by
visiting the location, your router has made an invitation/request and thus revealed the
information. the location IP location goes further by showing the name of your Internet
Service Provider and your current city.
Finding your device’s private IP Address depends on the OS or platform you are using.
On Windows: Click Start and type “cmd” in the search box and run the command
prompt. In the black command prompt dialog box type “ipconfig” and press enter.
You will be able to see your IP Address there.
On Mac: Go to system preferences and select Network, you will be able to see the
information regarding your network which includes your IP Address.
Various online activities can reveal your IP address from playing games or accepting bad
cookies from a trap website or commenting on a website or forum. Once, they have your IP,
there are websites that help them get a decent idea of your location. They can further use
social media websites to track your online presence and cross verify everything that they got
from these sites and use your information for their benefits or can sell these data collected on
the dark web which can further exploit you.
The worst which I have seen in my friend’s pc got infected while he was installing an
application that he downloaded from a pirated website. The moment he hit install, a number
of command prompt boxes started appearing, tens of commands started running and after a
while, it was back to normal. Some malware was installed in the process. After a few days,
someone was trying to log in to his social media account and other accounts using his
computer as a host pc (his own IP address) but his computer was idle. The hacker was using
his pc and his network, i.e., his IP address to do some serious stuff. He formatted his
computer then and there, secured all his emails and other accounts, and changed all the
passwords and all the security measures that had to be taken.
Cybercriminals use different techniques to get hands-on with your IP address and know your
location, get into your network and hack into your computers. For instance, they will find you
through Skype which uses IP addresses to speak. If you are using these apps, it’s important to
notice that your IP address might be vulnerable. Attackers can use the various tools, where
they will find your IP address. Some of the threats are: Online stalking, downloading illegal
content using your IP address, tracking your location, directly attacking your network, and
hacking into your device.
Use a virtual private network (VPN) when using public Wi-Fi, you are traveling,
working remotely, or just want some privacy.
It is also not recommended to use torrent or pirated websites which are a threat to
your online identity and can compromise your device or emails or any other
information about you.
Conclusion
Hopefully by now, you should have a working understanding of some of the networking
implications of the IP protocol. While dealing with this type of networking is not always
intuitive, and may be difficult to work with at times, it is important to understand what is
going on in order to configure your software and components correctly.
There are various calculators and tools online that will help you understand some of these
concepts and get the correct addresses and ranges that you need by typing in certain
information. CIDR.xyz provides a translation from decimal-based IP addresses to octets,
and lets you visualize different CIDR netmasks.
References
1. www.google.com
2. www.unacademy.com
3. www.byjus.com