0% found this document useful (0 votes)
51 views17 pages

TCP/IP Protocol and IP Addressing: Hetal Presswala

The document discusses TCP/IP protocols and IP addressing. It describes the layers of the TCP/IP model including the application, transport, internet, and network access layers. It then covers key concepts of IP addressing such as classes of IP addresses, private IP addresses, subnet masks, and how they are used to divide networks into subnetworks.

Uploaded by

ghoshal_10
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views17 pages

TCP/IP Protocol and IP Addressing: Hetal Presswala

The document discusses TCP/IP protocols and IP addressing. It describes the layers of the TCP/IP model including the application, transport, internet, and network access layers. It then covers key concepts of IP addressing such as classes of IP addresses, private IP addresses, subnet masks, and how they are used to divide networks into subnetworks.

Uploaded by

ghoshal_10
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

TCP/IP Protocol and IP Addressing

Hetal Presswala

August 09, 2008


Introduction to TCP/IP
The TCP/IP Suite defines a set of rules to enable
computers to communicate over a network. TCP/IP
provides end-to-end connectivity specifying how data
should be formatted, addressed, shipped, routed and
delivered to the right destination .

2 - Confidential
Application Layer
Handles high-level protocols, issues of representation,
encoding, and dialog control.

3 - Confidential
Transport Layer
Five basic services:
 Segmenting upper-layer application data
 Establishing end-to-end operations
 Sending segments from one end host to another
end host
 Ensuring data reliability
 Providing flow control

4 - Confidential
Internet Layer
Best path determination and packet switching

5 - Confidential
IP as a Routed Protocol
 IP is a connectionless,
unreliable, best-effort
delivery protocol.
 As information flows down
the layers of the OSI model;
the data is processed at
each layer.
 IP accepts whatever data is
passed down to it from the
upper layers.

6 - Confidential
Packet Propagation and Switching Within a Router

7 - Confidential
Network Access Layer
The network access layer is concerned with all of the issues that an
IP packet requires to actually make a physical link to the network
media. It includes the LAN and WAN technology details, and all the
details contained in the OSI physical and data link layers.

8 - Confidential
IPv4 Addressing Overview
 Internet address’s architecture
 Classes of IP addresses

 Subnet mask

9 - Confidential
IP Address
 An IP address is a 32-bit sequence of 1s and 0s.
 To make the IP address easier to use, the address is
usually written as four decimal numbers separated by
periods.
 This way of writing the address is called the dotted
decimal format.

10 - Confidential
IP Address Cont…
Every IP address has two parts:
 Network
 Host

The Class D address class was created to enable multicasting.


IETF reserves Class E addresses for its own research.

11 - Confidential
IP Address Cont…

12 - Confidential
Reserved IP Addresses
 Certain host addresses are
reserved and cannot be
assigned to devices on a
network.
 An IP address that has binary
0s in all host bit positions is
reserved for the network
address.
 An IP address that has binary
1s in all host bit positions is
reserved for the broadcast
address.

13 - Confidential
IP Private Addresses
 No two machines that connect to a public network can have the
same IP address because public IP addresses are global and
standardized
 Private IP addresses are a solution to the problem of the
exhaustion of public IP addresses. Addresses that fall within
these ranges are not routed on the Internet backbone:

 Connecting a network using private addresses to the Internet


requires the usage of NAT

14 - Confidential
Subnet Mask Address
A subnet mask allows you to identify which part of an IP
address is reserved for the network, and which part is
available for host are.

In summary, knowing the subnet mask can allow you to


easily calculate whether IP addresses are on the same
subnet, or not using bitwise AND gate (A Boolean operator
that returns a value of TRUE if both its operands are TRUE,
and FALSE otherwise)
.

15 - Confidential
Establishing the Subnet Mask Address
To determine the number of bits to be used, the network
designer needs to calculate how many hosts the largest
subnetwork requires and the number of subnetworks needed.

16 - Confidential
Subnet example
192.168.10.0/27 (FF.FF.FF.224)

17 - Confidential

You might also like