Week15 IP Protocols
Week15 IP Protocols
1
IP Address
2
IP address
3
IPv4 vs IPv6
the internet.
4
IPv4
• IPv4 uses 32 binary bits to create a
single unique address on the
network.
5
IPv6
• IPv6 uses 128 binary bits to create a
single unique address on the network.
6
Notations
• Binary Notations.
• Dotted Decimal Notations.
7
Notations
Binary Notation
• IPv4 address is displayed as 32 bits.
• Each octet form a byte.
• 4-byte Address.
• Eg.01001110 11001010 10111010 10001111
Dotted Decimal Notation
• Written in decimal form with decimal dot separating bytes.
• Makes more compact.
• Eg.117.137.38.2
8
Conversion
9
Static and Dynamic IP address
11
Classful Addressing
12
Netid and Hostid
13
IP Address Classes
• The class of IP address is used to determine:
▪ the bits used for network ID
▪ the bits used for host ID
▪ and the number of total networks and hosts
• The 32 bit IP address is divided into five sub-classes.
• Each of these classes has a valid range of IP
addresses.
14
Class A Network
• IP address belonging to class A are assigned
to the networks that contain a large number of
hosts.
15
Class B Network
• IP address belonging to class B are assigned
to the networks that ranges from medium-
sized to large-sized networks.
16
Class C Network
• IP address belonging to class C are assigned to small-
sized networks.
• The network ID is 24 bits long and host ID is 8 bits long.
• The higher order bits of the first octet of IP addresses of
class C are always set to 110 so it range is from 192-223.
• There are over 2 million possible Class C networks.
17
Class D Network
• Class D addresses are used for multicasting applications.
• Class D addresses have their first three bits set to “1” and
their fourth bit set to “0”.
18
Class E Network
• IP addresses belonging to class E are reserved for
experimental and research purposes.
• Class E networks are defined by having the first
four network address bits as 1.
• IP addresses of class E ranges from 240.0.0.0 –
255.255.255.254.
• While this class is reserved, its usage was never
defined. As a result, most network
implementations discard these addresses as
illegal or undefined.
• The exception is 255.255.255.255, which is used
as a broadcast address.
19
IP Address Classes – An overview
20
Classless Addressing
• No classes.
• Address are granted in blocks.
• Address in a block are contiguous.
21
Protocol
• A protocol is a standard used to define a method of exchanging data
over a computer network.
• Each protocol has its own method of how to handle data in the following
situations.
▪ How data is formatted when sent.
▪ What to do with data once received.
▪ How data is compressed.
▪ How to check for errors in the data.
22
Application Layer
Protocol
• An application layer protocol defines how application
processes running on different end systems pass messages
to each other.
24
File Transfer Protocol
25
Post Office Protocol
26
Hyper Text Transfer
Protocol
• The Hypertext Transfer Protocol (HTTP) is an
application layer protocol for distributed,
collaborative, hypermedia information systems.
• HTTP is the foundation of data communication
for the World Wide Web, where hypertext
documents include hyperlinks to other resources
that the user can easily access.
27
Domain Name System
28
DNS in the internet
29
Generic Name
30
Country Domain
• The country domains section uses two-character country abbreviations.
• Eg. us,in
• Labels can be organizational, or they can be more specific, national
designations.
31
Inverse Domain
• The inverse domain is used to map an address to a name.
• Query is called an inverse or pointer (PTR) query.
• To handle a pointer query, the inverse domain is added to
the domain name space with the first-level node called arpa.
• The second level is also one single node named in-addr.
• The rest of the domain defines IP addresses.
32
Resolution
33
Hypertext Transfer
Protocol(HTTP)
• Protocol used to access data on the world wide web.
• Transfers file and uses the services of TCP.
• Only data are transferred between server and the client, no
control information.
• Messages can read and interpreted by HTTP server and HTTP
client.
• HTTP messages are delivered immediately.
• HTTP uses the services of TCP on well-known port 80.
34
HTTP Transaction
35
HTTP Transaction
• Request message
• A request message consists of a request line(first line), a header, and
sometimes a body.
• Response message
• A response message consists of a status line(first line), a header, and
sometimes a body.
36
HTTP Messages
• Request types: This field is used in the request message.
• The request type is categorized into methods
• Eg. GET : Requests a document from the server.
• PUT : Sends a document from the server to the client.
• Version: The most current version of HTTP is 1.1
• Status code : Seen in response messages only. It consists of three
digits. Whereas the codes in the 100 range are only informational, the
codes in the 200 range indicate a successful request. The codes in the
300 range redirect the client to another URL, and the codes in the 400
range indicate an error at the client site. Finally, the codes in the 500
range indicate an error at the server site.
37
HTTP Messages
38
HTTP Messages
Four categories of header
• General header, request header, response header, and entity
header.
• A request message can contain only general, request, and
entity headers.
• A response message, on the other hand, can contain only
general, response, and entity headers.
39
HTTP Messages
• General header: The general header gives general
information about the message and can be present in both a request
and a response.
• Request header: The request header can be present only in a request
message. It specifies the client's configuration and the client's preferred
document format.
• Response header: The response header can be present only in a
response message. It specifies the server's configuration and special
information about the request.
• Entity header: The entity header gives infonnation about the body of the
document. Although it is mostly present in response messages, some
request message.
40
Persistent vs non persistent
connection
41
Persistent vs non persistent
connection
42
Hypertext Transfer Protocol
Secure(HTTPS)
43
Working
44
HTTP vs HTTPS
HTTP HTTPS
Encryption not used. Information is encrypted
using TSL/SSL protocol
Default port is 80 Default port is 443
Unreliable Reliable
URL begin with http:// URL begin with https://
45
References and Image Courtesy
[3] https://www.cloudflare.com/en-in/learning/ssl/what-is-https/
46