0% found this document useful (0 votes)
14 views35 pages

ACN - Addressing Scheme

Advanced networking

Uploaded by

Agyei Delight
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views35 pages

ACN - Addressing Scheme

Advanced networking

Uploaded by

Agyei Delight
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

ADVANCED COMPUTER

NETWORKS &
COMMUNICATIONS

ABRAHAM EKOW DADZIE

LESSON – Addressing scheme & Network Devices


OVERVIEW

IP Addressing Scheme


Network devices
INTERNET PROTOCOL (IP)

IP is a set of rules, for routing and addressing


packets of data so that they can travel
across networks and arrive at the correct
destination.
Data traveling on the internet is divided into
smaller pieces called packets.
IP information is attached to each packet
and this information helps routers to send
packets to the right place
IP

IP handles end-to-end delivery


Most commonly used network layer
protocol
All traffic on the internet uses IP
IP accepts whatever data is passed
down to it from the upper layers and
forwards the data in the form of IP
packets.
IP ADDRESS
A unique identifier assigned to each
device connected to a computer
network.
Identify each individual machine on
the network/internet

VERSIONS
IPV4
IPV6
IP ADDRESS (IPV4)
The format is a 32-bit numeric
address written as four numbers
separated by periods.
32 bits, with 8 bit groupings
E.x: 192.168.32.152
Each octets contain any number
between between 0 and 255
COMPONENTS OF IP ADDRESS
An IP address can be split into
network address, which specifies a
specific network
host number, which specifies a particular
machine in that network
IP ADDRESS CLASSES
CLASS A
1.0.0.0 – 126.255.255.255
Subnet – 255.0.0.0
3 octet available for host
Supports 16,777,214 devices
CLASS B
128.0.0.0 – 191.255.255.255
Subnet – 255.255.0.0
2 octets available for host
Supports 65,534 devices
CONT.
 CLASS C
 192.0.0.0 – 223.255.255.255
 Subnet – 255.255.255.0
 1 octet available for host address
 Supports 254 devices
 CLASS D – multicast address
 224.0.0.0 – 239.255.255.255
 Cannot be used as a source address for any traffic
 It identifies a group of hosts sharing the same address
 It is not assigned to a device, rather a device proceeds to
listen for and receive traffic destined to a multicast group
CONT.
A computer uses Internet Group Management Protocol
(IGMP) to report its multicast group membership to multicast
routers.
IGMP is required to be used in host computers that wish to
participate in multicasting.
CLASS E – for experimental & research
purposes.
240.0.0.0 – 255.255.255.254
This class doesn’t have any subnet mask
PUBLIC vrs PRIVATE
PUBLIC
Is the address that is used to
communicate outside the network.
Is basically assigned by the ISP
PUBLIC vrs PRIVATE
 PRIVATE
CLASS A
10.0.0.0 – 10.255.255.255
CLASS B
172.16.0.0 – 172.31.255.255
CLASS C
192.168.0.0 – 192.168.255.255
Use to communicate withing the same network
It works on LAN
Available free of cost
It cannot be used over the internet
Loopback address
127.0.0.0
IP Address that cannot be assigned to any
network
127.0.0.1
The loopback address
Used for diagnostic testing of the local
TCP/IP installation
Automatic Private IP Addressing
(APIPA)

169.254.x.x
IP addresses are self-assigned when
the computer asks for an IP address
and no one responds.
i.e. the computer cannot reach a
DHCP server over the network.
SUBNETTING

Subnet is a segmented piece of a larger


network.
Is a logical partition of an IP network into
multiple, smaller network segments.
Subnet helps minimize network traffic
Subnetting is done by changing the
default subnet mask by borrowing some
of the bits from the host portion.
BROADCAST ADDRESS

Is an IP Address that is used to target


all systems on a specific subnet
network instead of single hosts.
It allows information to be sent to all
devices on a given subnet rather
than to a specific device.
ICANN
 Internet Corporation for Assigned Names and Numbers
 a private sector, nonprofit organization
 responsible for IP address space allocation, protocol
parameter assignment, domain name system
management and root server system management
functions previously performed under U.S. Government
contract
 ICANN's diverse board consists of nineteen Directors,
nine At-Large Directors, who serve one-year terms and
will be succeeded by At-Large Directors elected by an
at-large membership organization. None of the present
interim directors may sit on the board once the
permanent members are selected.
IPv4
IPv4 is the most popular protocol in use today,
although there are some questions about its
capability to serve the Internet community
much longer.
IPv4 was finished in the 1970s and has started
to show its age.
The main issue surrounding IPv4 is addressing,
many experts believe that we are nearly out of
the four billion addresses available in IPv4.
IPv6
Although this seems like a very large number of
addresses, multiple large blocks are given to
government agencies and large organizations.
IPv6 could be the solution to many problems
posed by IPv4
IPv6 uses 128 bit address instead of 32 bit
address.
The IPv6 addresses are being distributed and
are supposed to be used based on
geographical location.
IPv4 vrs IPv6
BASIS OF COMPARISON IPV4 IPV6
Address Configuration Supports Manual and DHCP Supports Auto-configuration and
configuration. renumbering
End-to-end connection integrity Unachievable Achievable

Address Space IPv6 uses 128 bit4.29


It can generate address9
instead
x 10 addresses. It canof
produce quite a large number
38
of addresses, i.e., 3.4 x 10 .
32 bit address.
Security features
The Security
IPv6 is dependent
addresses on application IPSEC is inbuilt in the IPv6 protocol
are being
Address length distributed
32 bits (4 and
bytes) are supposed 128 to bits
be(16 bytes)
Address Representation used In decimal
based on geographical In hexadecimal
Fragmentation performed by location.
Sender and forwarding routers Only by the sender

Packet flow identification Not available Available and uses flow label field in
the header
Checksum Field Available Not available

Message Transmission Scheme Broadcasting Multicasting and Anycasting

Encryption and Authentication Not Provided Provided


NETWORK
DEVICES
REPEATER
A repeater operates at the physical layer.
Its job is to regenerate the signal over the same
network before the signal becomes too weak or
corrupted so as to extend the length to which the
signal can be transmitted over the same network.
An important point to be noted about repeaters is
that they do not amplify the signal. When the signal
becomes weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2 port
device.
HUB
A hub is basically a multiport repeater.
A hub connects multiple wires coming from different
branches, for example, the connector in star
topology which connects different stations.
Hubs cannot filter data, so data packets are sent to
all connected devices.
In other words, collision domain of all hosts
connected through Hub remains one. Also, they do
not have intelligence to find out best path for data
packets which leads to inefficiencies and wastage.
Work at layer 1 of the OSI model
TYPES OF HUB
• Active Hub :- These are the hubs which have their
own power supply and can clean, boost and relay
the signal along the network. It serves both as a
repeater as well as wiring center. These are used to
extend maximum distance between nodes.
• Passive Hub :- These are the hubs which collect
wiring from nodes and power supply from active
hub. These hubs relay signals onto the network
without cleaning and boosting them and can’t be
used to extend distance between nodes.
SWITCH
A switch is a multi port device with a buffer
and a design that can boost its
efficiency(large number of ports imply less
traffic) and performance.
Switch is data link layer device.
Switch can perform error checking before
forwarding data, that makes it very efficient as
it does not forward packets that have errors
and forward good packets selectively to
correct port only.
In other words, switch divides collision domain
of hosts, but broadcast domain remains same.
SWITCH
Data travels faster through switches because
data is not sequenced as it is in a hub
 The information is more secure when it passes
through a switch as opposed to a hub.
Information travels more efficiently through a
switch because travels directly to it’s
destination as opposed to being broadcast to
all PC’s on the network hub.
BRIDGE
A bridge operates at data link layer.
A bridge is a repeater, with add on
functionality of filtering content by
reading the MAC addresses of source
and destination.
It is also used for interconnecting two
LANs working on the same protocol.
It has a single input and single output
port, thus making it a 2 port device
TYPES OF BRIDGES
• Transparent Bridges :- These are the bridges in which
the stations are completely unaware of the bridge’s
existence i.e. whether or not a bridge is added or
deleted from the network, reconfiguration of
the stations is unnecessary. These bridges makes use of
two processes i.e. bridge forwarding and bridge
learning.
• Source Routing Bridges :- In these bridges, routing
operation is performed by source station and the
frame specifies which route to follow. The host can
discover frame by sending a special frame called
discovery frame, which spreads through the entire
network using all possible paths to destination.
ROUTERS
A router is a device that routes data packets based
on their IP addresses.
Router is mainly a Network Layer device. Routers
normally connect LANs and WANs together and
have a dynamically updating routing table based on
which they make decisions on routing the data
packets.
Router divide broadcast domains of hosts
connected through it.
ROUTERS
Transfer packets from network to network
They determine the path that a packet should take
across the network specifying from hop to hop
which network segments the packets should
bounce through as they travel across the network
 Whether a Router is traditional or wireless, its purposes remain
the same.
 Routers are specialized computers that send your messages
and those of every other Internet user speeding to their
destinations along thousands of pathways.
 Routers are crucial devices that let messages flow between
networks, rather than within networks.
BROUTER
It is also known as bridging router
Is a device which combines features of both
bridge and router.
It can work either at data link layer or at
network layer. Working as router, it is capable
of routing packets across networks and
working as bridge, it is capable of filtering local
area network traffic.
GATEWAY
A gateway, as the name suggests, is a passage to
connect two networks together that may work upon
different networking models.
They basically works as the messenger agents that
take data from one system, interpret it, and transfer it
to another system.
Gateways are also called protocol converters and
can operate at any network layer.
FIREWALLS
 A firewall is a hardware/software that can be loaded
on to a network that can serve as a barrier that keeps
destructive forces away from a network of computers.
 Network traffic cops
 Tools that control the flow of traffic going between
networks
 By looking at addresses associated with traffic, firewalls
determine whether connections should be transmitted
or dropped

 Packets of data are analyzed against a set of criteria


or standards called filters.

 Filters block certain designated IP addresses.


Questions?
THANK YOU

You might also like