This document discusses computer networks and IPv4 addressing. It covers:
- IPv4 addresses are 32-bit numbers that uniquely identify devices on the internet. They can be written in binary, decimal, or hexadecimal notation.
- Examples are provided to convert between these notations and find network addresses, prefixes, suffixes, and number of addresses in blocks.
- The concept of classful addressing is introduced, which divides IPv4 space into classes A, B, C, D, and E based on address bits. Subnetting and classless addressing are also covered.
- Classless addressing uses variable length blocks and prefix notation to provide more flexibility than classful addressing. Block allocation and extraction of block
This document discusses IP addressing and provides an overview of:
- The IPv4 address space and address notation in binary, dotted-decimal, and hexadecimal formats.
- Classful addressing which divides the IP address space into classes A, B, C, D and E and assigns a fixed number of addresses to each block within a class. This leads to inefficient use of addresses.
- The concept of hierarchical or two-level addressing used in classful addressing where each address contains a network ID and host ID portion.
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
This document discusses IPv4 addressing and subnetting. It begins by explaining IPv4 addresses in binary, decimal, and hexadecimal notation. It then covers classful addressing, including the five address classes (A, B, C, D, E) and how to determine an address's class. The document also discusses subnetting and classless addressing with variable length prefixes. It provides examples of extracting network information from addresses using masks. Finally, it discusses special addresses like loopback addresses and private addresses.
This document discusses IP addressing and classful addressing. It covers the different address classes (A, B, C, D, E), how they divide up the IP address space, network addresses, subnet masks, and provides examples of converting between binary, decimal and hexadecimal notation. It also discusses concepts like broadcast addresses and private addressing blocks.
The document discusses IPv4 addressing and networking concepts. It defines an IPv4 address as a 32-bit address that uniquely identifies devices on the Internet. IPv4 addresses have either a binary or dotted decimal notation. The document also covers IPv4 classes, subnetting, supernetting, and classless addressing which allow for flexible allocation of address blocks.
This document provides an overview of IPv4 addressing and classful addressing. It discusses IP address classes and how to identify the class of an address. It also covers network addresses, subnetting, and supernetting. The key points are:
- IPv4 addresses are 32-bit addresses divided into classes A, B, C, D and E based on the high-order bits.
- Classful addressing assigns address blocks to networks but wastes many addresses.
- Subnetting and supernetting were introduced to allow better allocation of addresses within classful blocks through the use of subnet and supernet masks.
The network layer is a part of the internet communication process that sends ...kiruthikeducation
油
The network layer is a part of the internet communication process that sends data packets between networks. It's also known as the internet layer.
What does the network layer do?
Sends data packets between networks
Ensures that packets reach their destination, regardless of the route taken
Provides a reliable and efficient network infrastructure platform for upper layers
Where is the network layer in the OSI model?
In the Open Systems Interconnection (OSI) model, the network layer is layer 3.
How does the network layer work?
The network layer receives data from the data link layer, which splits data into packets and transmits it over the network. The network layer then sends the packets to their destination.
Other layers in the OSI model:
Physical layer: Defines the electrical aspects of activating and maintaining physical links in networks
Session layer: Establishes and manages sessions between applications on different devices
Presentation layer: Translates from the application to the network format
Data link layer: Transfers data between adjacent network nodes
NP - Unit 2 - Internet Addressing, ARP and RARP hamsa nandhini
油
This document discusses Internet addressing, ARP, and RARP. It begins by defining IP addresses and how they identify both the network and specific host. It then covers IPv4 addressing schemes including classful addressing using classes A-D, classless addressing using CIDR, and subnetting. The document also discusses address resolution using ARP for dynamic binding between IP and MAC addresses when they differ in size. IPv6 improvements such as larger addresses and direct mapping of IP to MAC are briefly mentioned.
The document discusses IP addressing and networking concepts. It covers IP address classes A, B, C, D and E; converting between binary and dotted-decimal notation; finding the network address and class of an IP; default subnet masks; and IP addressing hierarchy with network and host IDs.
The document discusses IP addressing and networking concepts. It covers IP address classes A, B, C, D and E; converting between binary and dotted-decimal notation; finding the network address and class of an IP; default subnet masks; and IP addressing hierarchy with network and host IDs.
This document discusses addressing in networks using TCP/IP. It defines physical addresses (MAC addresses), logical addresses (IP addresses), and port addresses. It explains IP version 4 addressing using dotted decimal notation and how addresses are divided into network and host portions based on class (A, B, C). Subnetting and supernetting allow networks to be divided into subnets or combined into larger supernets. The document provides examples of addressing calculation, network/broadcast addresses, subnet and supernet masks.
IP addresses are divided into classes (A, B, C, D, E) based on the first bits of the address. Classful addressing wastes address space. Subnetting and supernetting borrow bits from the host/network parts to create more efficient variable length subnets and supernets. Classless addressing uses CIDR notation of address/prefix length to define variable length blocks.
The document discusses IPv4 addressing and subnetting. It provides an example where an ISP is granted a block of 65,536 IPv4 addresses. The ISP needs to allocate these addresses to three groups of customers with different address requirements. It designs the subnet blocks for each group using variable length subnet masking to efficiently allocate the addresses. In total, 40,960 addresses are allocated, leaving 24,576 addresses still available.
This document discusses TCP/IP addressing and the IPv4 address space. It covers IP address classes, classful addressing, and how addresses are assigned in blocks to networks. It also introduces the concepts of subnetting and supernetting which were approaches used to help alleviate the depletion of available classful address space as demand grew. Subnetting created additional hierarchy by dividing network blocks into smaller subnets, while supernetting combined blocks into larger supernets. Both techniques are now largely obsolete with the introduction of classless or CIDR addressing.
The document discusses IPv4 and IPv6 addressing. It covers key topics such as:
- IPv4 addresses are 32-bit and represented in dotted-decimal or binary notation. IPv6 addresses are 128-bit and represented in hexadecimal notation.
- Subnetting allows an IPv4 network to be divided into smaller sub-networks to reduce broadcast domains and improve performance.
- Network Address Translation (NAT) allows private IP addresses to be translated to public IP addresses, conserving public address space.
- IPv6 was developed to replace IPv4 due to the limited address space of 232 addresses in IPv4. IPv6 addresses issues each host a unique 128-bit address.
This document discusses IPv4 and IPv6 addressing and routing. It covers topics such as:
- IPv4 addresses are 32-bit and unique, while IPv6 addresses are 128-bit
- Classful and classless addressing in IPv4, including network masks
- Network address translation (NAT) allows private addresses to connect to the public internet
- Routing protocols like RIP, OSPF, and BGP are used for intradomain and interdomain routing based on metrics and shortest paths
- IPv6 was developed to address the long-term address depletion problem in IPv4
This document discusses IP addressing and the TCP/IP protocol suite. It covers the following topics:
- IP addresses are 32-bit addresses that uniquely identify devices on the Internet. Early IP addressing used a system of address classes (A, B, C, etc.) that is now obsolete.
- Subnetting and supernetting were techniques used to work around the limitations of classful addressing and allow for more flexible allocation of address blocks.
- The document provides examples of converting between binary, decimal and hexadecimal IP address notations. It also covers how to determine the network address, subnet mask, and address range for given IP addresses.
This document discusses IP addressing and classful addressing in TCP/IP networking. It covers the following key points:
- IP addresses are 32-bit addresses that uniquely identify devices on the Internet. They are organized into classes A, B, C, D and E based on the binary pattern of the address.
- Classful addressing allocates address blocks to organizations based on these classes. However, this led to inefficient address usage and rapid depletion of available addresses.
- Subnetting and supernetting were introduced to allow better allocation of addresses within the original classful blocks through the use of subnet and supernet masks. However, classful addressing is now mostly obsolete.
hello everyone this a very interesting pps about general concepts of ip address here u can find lot of stuff and all those matter which u could not find even in a search engine
HOPE U LOVE IT
This document provides an overview of TCP/IP addressing and classful IP addressing. It discusses IP address notation and classes, how addresses are divided into network and host portions based on class, default network masks for each class, how to determine the network address range from an individual address, and examples of finding network information like number of hosts from addresses of different classes. The key points covered are IP address format and classes, default subnet masks, how addresses are allocated into blocks for each class, and techniques for extracting network information from individual IP addresses.
This document discusses subnetting, supernetting, and classless addressing. It provides examples of how to calculate subnet masks, subnet addresses, supernet masks, and address ranges for subnets and supernetworks. It also discusses variable length subnetting and classless inter-domain routing (CIDR) notation.
Virtual Power plants-Cleantech-RevolutionAshoka Saket
油
VPPs are virtual aggregations of distributed energy resources, such as energy storage, solar panels, and wind turbines, that can be controlled and optimized in real-time to provide grid services.
Welcome to the April 2025 edition of WIPAC Monthly, the magazine brought to you by the LInkedIn Group Water Industry Process Automation & Control.
In this month's issue, along with all of the industries news we have a number of great articles for your edification
The first article is my annual piece looking behind the storm overflow numbers that are published each year to go into a bit more depth and look at what the numbers are actually saying.
The second article is a taster of what people will be seeing at the SWAN Annual Conference next month in Berlin and looks at the use of fibre-optic cable for leak detection and how its a technology we should be using more of
The third article, by Rob Stevens, looks at what the options are for the Continuous Water Quality Monitoring that the English Water Companies will be installing over the next year and the need to ensure that we install the right technology from the start.
Hope you enjoy the current edition,
Oliver
The network layer is a part of the internet communication process that sends ...kiruthikeducation
油
The network layer is a part of the internet communication process that sends data packets between networks. It's also known as the internet layer.
What does the network layer do?
Sends data packets between networks
Ensures that packets reach their destination, regardless of the route taken
Provides a reliable and efficient network infrastructure platform for upper layers
Where is the network layer in the OSI model?
In the Open Systems Interconnection (OSI) model, the network layer is layer 3.
How does the network layer work?
The network layer receives data from the data link layer, which splits data into packets and transmits it over the network. The network layer then sends the packets to their destination.
Other layers in the OSI model:
Physical layer: Defines the electrical aspects of activating and maintaining physical links in networks
Session layer: Establishes and manages sessions between applications on different devices
Presentation layer: Translates from the application to the network format
Data link layer: Transfers data between adjacent network nodes
NP - Unit 2 - Internet Addressing, ARP and RARP hamsa nandhini
油
This document discusses Internet addressing, ARP, and RARP. It begins by defining IP addresses and how they identify both the network and specific host. It then covers IPv4 addressing schemes including classful addressing using classes A-D, classless addressing using CIDR, and subnetting. The document also discusses address resolution using ARP for dynamic binding between IP and MAC addresses when they differ in size. IPv6 improvements such as larger addresses and direct mapping of IP to MAC are briefly mentioned.
The document discusses IP addressing and networking concepts. It covers IP address classes A, B, C, D and E; converting between binary and dotted-decimal notation; finding the network address and class of an IP; default subnet masks; and IP addressing hierarchy with network and host IDs.
The document discusses IP addressing and networking concepts. It covers IP address classes A, B, C, D and E; converting between binary and dotted-decimal notation; finding the network address and class of an IP; default subnet masks; and IP addressing hierarchy with network and host IDs.
This document discusses addressing in networks using TCP/IP. It defines physical addresses (MAC addresses), logical addresses (IP addresses), and port addresses. It explains IP version 4 addressing using dotted decimal notation and how addresses are divided into network and host portions based on class (A, B, C). Subnetting and supernetting allow networks to be divided into subnets or combined into larger supernets. The document provides examples of addressing calculation, network/broadcast addresses, subnet and supernet masks.
IP addresses are divided into classes (A, B, C, D, E) based on the first bits of the address. Classful addressing wastes address space. Subnetting and supernetting borrow bits from the host/network parts to create more efficient variable length subnets and supernets. Classless addressing uses CIDR notation of address/prefix length to define variable length blocks.
The document discusses IPv4 addressing and subnetting. It provides an example where an ISP is granted a block of 65,536 IPv4 addresses. The ISP needs to allocate these addresses to three groups of customers with different address requirements. It designs the subnet blocks for each group using variable length subnet masking to efficiently allocate the addresses. In total, 40,960 addresses are allocated, leaving 24,576 addresses still available.
This document discusses TCP/IP addressing and the IPv4 address space. It covers IP address classes, classful addressing, and how addresses are assigned in blocks to networks. It also introduces the concepts of subnetting and supernetting which were approaches used to help alleviate the depletion of available classful address space as demand grew. Subnetting created additional hierarchy by dividing network blocks into smaller subnets, while supernetting combined blocks into larger supernets. Both techniques are now largely obsolete with the introduction of classless or CIDR addressing.
The document discusses IPv4 and IPv6 addressing. It covers key topics such as:
- IPv4 addresses are 32-bit and represented in dotted-decimal or binary notation. IPv6 addresses are 128-bit and represented in hexadecimal notation.
- Subnetting allows an IPv4 network to be divided into smaller sub-networks to reduce broadcast domains and improve performance.
- Network Address Translation (NAT) allows private IP addresses to be translated to public IP addresses, conserving public address space.
- IPv6 was developed to replace IPv4 due to the limited address space of 232 addresses in IPv4. IPv6 addresses issues each host a unique 128-bit address.
This document discusses IPv4 and IPv6 addressing and routing. It covers topics such as:
- IPv4 addresses are 32-bit and unique, while IPv6 addresses are 128-bit
- Classful and classless addressing in IPv4, including network masks
- Network address translation (NAT) allows private addresses to connect to the public internet
- Routing protocols like RIP, OSPF, and BGP are used for intradomain and interdomain routing based on metrics and shortest paths
- IPv6 was developed to address the long-term address depletion problem in IPv4
This document discusses IP addressing and the TCP/IP protocol suite. It covers the following topics:
- IP addresses are 32-bit addresses that uniquely identify devices on the Internet. Early IP addressing used a system of address classes (A, B, C, etc.) that is now obsolete.
- Subnetting and supernetting were techniques used to work around the limitations of classful addressing and allow for more flexible allocation of address blocks.
- The document provides examples of converting between binary, decimal and hexadecimal IP address notations. It also covers how to determine the network address, subnet mask, and address range for given IP addresses.
This document discusses IP addressing and classful addressing in TCP/IP networking. It covers the following key points:
- IP addresses are 32-bit addresses that uniquely identify devices on the Internet. They are organized into classes A, B, C, D and E based on the binary pattern of the address.
- Classful addressing allocates address blocks to organizations based on these classes. However, this led to inefficient address usage and rapid depletion of available addresses.
- Subnetting and supernetting were introduced to allow better allocation of addresses within the original classful blocks through the use of subnet and supernet masks. However, classful addressing is now mostly obsolete.
hello everyone this a very interesting pps about general concepts of ip address here u can find lot of stuff and all those matter which u could not find even in a search engine
HOPE U LOVE IT
This document provides an overview of TCP/IP addressing and classful IP addressing. It discusses IP address notation and classes, how addresses are divided into network and host portions based on class, default network masks for each class, how to determine the network address range from an individual address, and examples of finding network information like number of hosts from addresses of different classes. The key points covered are IP address format and classes, default subnet masks, how addresses are allocated into blocks for each class, and techniques for extracting network information from individual IP addresses.
This document discusses subnetting, supernetting, and classless addressing. It provides examples of how to calculate subnet masks, subnet addresses, supernet masks, and address ranges for subnets and supernetworks. It also discusses variable length subnetting and classless inter-domain routing (CIDR) notation.
Virtual Power plants-Cleantech-RevolutionAshoka Saket
油
VPPs are virtual aggregations of distributed energy resources, such as energy storage, solar panels, and wind turbines, that can be controlled and optimized in real-time to provide grid services.
Welcome to the April 2025 edition of WIPAC Monthly, the magazine brought to you by the LInkedIn Group Water Industry Process Automation & Control.
In this month's issue, along with all of the industries news we have a number of great articles for your edification
The first article is my annual piece looking behind the storm overflow numbers that are published each year to go into a bit more depth and look at what the numbers are actually saying.
The second article is a taster of what people will be seeing at the SWAN Annual Conference next month in Berlin and looks at the use of fibre-optic cable for leak detection and how its a technology we should be using more of
The third article, by Rob Stevens, looks at what the options are for the Continuous Water Quality Monitoring that the English Water Companies will be installing over the next year and the need to ensure that we install the right technology from the start.
Hope you enjoy the current edition,
Oliver
irst-order differential equations find applications in modeling various phenomena, including growth and decay processes, Newton's law of cooling, electrical circuits, falling body problems, and mixing problems.
SIMULATION OF FIR FILTER BASED ON CORDIC ALGORITHMVLSICS Design
油
Coordinate Rotation Digital Computer (CORDIC) discovered by Jack E Volder. It is a shift-add operation and iterative algorithm. CORDIC algorithm has wide area for several applications like digital signal processing, biomedical processing, image processing, radar signal processing, 8087 math coprocessor, the HP-35 calculator, Discrete Fourier, Discrete Hartley and Chirp-Z transforms, filtering, robotics, real time navigational system and also in communication systems. In this paper, we discussed about the CORDIC algorithm and CORDIC algorithm based finite impulse response low pass & high pass filter. We have generated the M-code for the CORDIC Algorithm and CORDIC Algorithm based FIR filter with the help of MATLAB 2010a.We also discussed about the frequency response characteristics of FIR filter.
Industry 4.0: Transforming Modern Manufacturing and BeyondGtxDriver
油
This document explores the fundamental concepts, technologies, and applications of Industry 4.0. Topics include automation, IoT (Internet of Things), smart factories, cyber-physical systems, and the integration of AI and big data analytics in industrial processes. It serves as a comprehensive resource for students, professionals, and enthusiasts eager to delve into the fourth industrial revolution.
"Introduction to VLSI Design: Concepts and Applications"GtxDriver
油
This document offers a detailed exploration of VLSI (Very Large-Scale Integration) design principles, techniques, and applications. Topics include transistor-level design, digital circuit integration, and optimization strategies for modern electronics. Ideal for students, researchers, and professionals seeking a comprehensive guide to VLSI technology.
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...Priyanka Dange
油
Definition of airport engineering and airport planning, Types of surveys required for airport site, Factors affecting the selection of site for Airport
Knowledge-Based Agents in AI: Principles, Components, and FunctionalityRashmi Bhat
油
This PowerPoint presentation provides an in-depth exploration of Knowledge-Based Agents (KBAs) in Artificial Intelligence (AI). It explains how these agents make decisions using stored knowledge and logical reasoning rather than direct sensor input. The presentation covers key components such as the Knowledge Base (KB), Inference Engine, Perception, and Action Execution.
Key topics include:
Definition and Working Mechanism of Knowledge-Based Agents
The Process of TELL, ASK, and Execution in AI Agents
Representation of Knowledge and Decision-Making Approaches
Logical Inference and Rule-Based Reasoning
Applications of Knowledge-Based Agents in Real-World AI
This PPT is useful for students, educators, and AI enthusiasts who want to understand how intelligent agents operate using stored knowledge and logic-based inference. The slides are well-structured with explanations, examples, and an easy-to-follow breakdown of AI agent functions.
3. Introduction
Identifier of each device connected to the Internet : IP
Address
IPv4 Address : 32 bits
The address space of IPv4 is 232 or 4,294,967,296
The IPv4 addresses are unique and universal
Two devices on the Internet can never have the same address
at same time
Number in base 2, 16, and 256
Refer to Appendix B
4. Binary Notation and Dotted-Decimal Notation
Binary notation
01110101 10010101 00011101 11101010
32 bit address, or a 4 octet address or a 4-byte address
Decimal point notation
6. Example
Change the following IPv4 addresses from binary notation to dotted-decimal
notation
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
Solution
We replace each group of 8 bits with its equivalent decimal number (see Appendix B)
and add dots for separation.
a. 129.11.11.239
b. 193.131.27.255
c. 231.219.139.111
d. 249.155.251.15
7. Example
Change the following IPv4 address in hexadecimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
Solution
We replace each group of 4 bits with its hexadecimal
equivalent. Note that hexadecimal notation normally has no
added spaces or dots; however, 0x is added at the beginning of
the subscript 16 at the end
a. 0X810B0BEF or 810B0BEF16
b. 0XC1831BFF or C1831BFF16
8. Example
Find the number of addresses in a range if the first
address is 146.102.29.0 and last address is
146.102.32.225.
Solution
We can subtract the first address from the last address in
base 256(see Appendix B). The result is 0.0.3.255 in this
base. To find the number of addresses in the range, we
convert this number to base 10 and add 1 to the result
Number of addresses = (0 x 2563 + 0 x 2562 + 3 x 2561 + 255 x 2560)+ 1 = 1024
9. Operations
Need to apply some operations on 32-bit numbers in
binary or dotted-decimal notation.
Bitwise NOT operation
12. Classful Addressing
IP addresses, when started a few decades ago, used
the concept of classes
In the mid-1990s, a new architecture, called classless
addressing, was introduced
We will discuss classful addressing in this section,
first. Classless addressing will be discussed in next
section.
15. Finding the Addresses Class Using Continuous Checking
1
Class: A
0
Start
1
0
Class: B
1
0
Class: C
1
0
Class: D Class: E
16. Example
Find the class of each address:
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 10100111 11011011 10001011 01101111
d. 11110011 10011011 11111011 00001111
Solution
See the procedure in Figure 5.7
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C address.
c. The first bit is 1; the second bit is 0. This is a class B address.
d. The first 4 bits are 1s. This is a class E address.
17. Netid and hostid of A, B, and C Classes
netid and hostid are of varying lengths, depending on
the class of the address
18. Blocks in Class A
Only 1 byte in class A defines the netid
The leftmost bit should be 0
Class A is divided into 27 = 128 blocks
Each block in class A contains 16,777,216 addresses
19. Blocks in Class B
2 bytes in class B define the class
The two leftmost bits should be 10
Class B is divided into 214 = 16,384 blocks
Each block in class B contains 65,536 addresses
20. Blocks in Class C
3 bytes in class C define the class
The three leftmost bits should be 110
Class C is divided into 221 = 2,097,152 blocks
Each block in class C contains 256 addresses
21. The Single Block in Class D and E
Class D
Class D is designed for multicasting
Used to define one group of hosts on the Internet
Class E
Reserved for future purposes
23. Information Extraction in Classful Addressing
The number of addresses
The first address
The last address
netid
First address
000 ... 0
24. Example
An address in a block is given as 173.22.17.25. Find the
number of addresses in the block, the first address, and the
last address
Solution
1. The number of addresses in this block is
N = 232-n = 216
2. To find the first address, we keep the left most 16 bits and
set the rightmost 16 bits all to 0s. The first address is
173.22.0.0/16 in which 16 is the value of n.
3. To find the last address, we keep the leftmost 16 bits and
set the rightmost 16 bits all to 1s. The last address is
173.22.255.255
27. Network Address
The first address of block is network address
Used in routing a packet to its destination network
The network address is the identifier of a network
31. Example
A router receives a packet with the destination address
201.24.67.32. Show how the router finds the network
address of the packet.
Solution
Since the class of the address is B, we assume that the
router applies the default mask for class B, 255.255.0.0 to
find the network address.
Destination address -> 201 . 24 . 67 . 32
Default mask -> 255 . 255 . 0 . 0
Network address -> 201 . 24 . 0 . 0
32. Three-Level Addressing : Subnetting
The organization that was granted a block in class A or
B needed to divide its large network into several
subnetworks for better security and management
In subnetting, a network is divided into several smaller
subnetworks with each subnetwork having its own
subnetwork address
33. Example
The next figure shows a network using class B addresses before
subnetting. We have just one network with almost 216 hosts. The
whole network is connected, through one single connection, to
one of the routers in the Internet. Note that we have shown /16 to
show the length of the netid (class B)
36. Supernetting
Combine several class C blocks to create a larger range
of address
An organization that needs 1000 addresses can be
granted four class C blocks.
Supernet mask is the reverse of a subnet mask
38. Classless Addressing
Classful address did not solve the address depletion
problem
Distribution of addresses and the routing process more difficult
With the growth of the Internet, a larger address space was
needed as a long-term solution
Although the long-range solution has already been devised
and is called IPv6, a short-term solution was also devised to
use the same address space but to change the distribution
of addresses
Classless addressing
39. Variable-length blocks in Classless Addressing
In classless addressing, whole address space id
divided into variable length blocks
Theoretically, we can have a block of 20, 21, 22, 232
addresses
40. Prefix and Suffix
Prefix : play the same role as the netid
Suffix : play the same role as the hostid
The prefix length in classless addressing can be 1 to 32
41. Example
What is the prefix length and suffix length if the whole
Internet is considered as one single block with
4,294,967,296 addresses?
Solution
In this case, the prefix length is 0 and suffix length is 32.
All 32 bits vary to define 232 = 4,294,967,296 hosts in this
single block
42. Slash Notation
Notation of address including length of prefix
In classless addressing, we need to know one of the
addresses in the block and the prefix length to define
the block
43. Example
In classless addressing, an address cannot per se
define the block the address belongs to. For example,
the address 230.8.24.56 can belong to many blocks
some of them are shown below with the value of the
prefix associated with that block :
44. Example
One of the address in a block is 167.199.170.82/27. To find the
number of addresses in the network, the first address, and the last
address.
Solution
The value of n is 27. The network mask has twenty-seven 1s and five
0s. It is 255.255.255.240.
a.The number of addresses in the network is 232-n = 25 = 32
b.We use the AND operation to find the first address. The first address is
167.199.170.64/27
Address in Binary 10100111 11000111 10101010 01010010
Network mask 11111111 11111111 11111111 11100000.
First address 10100111 11000111 10101010 01000000
45. Example (contd)
c. To find the last address, we first find the complement of the network mask
and the OR it with the given address : the last address is 167.199.170.95/27
Address in Binary 10100111 11000111 10101010 01010010
Network mask 0000000 00000000 00000000 00011111
Last address 10100111 11000111 10101010 01011111
46. Extracting Block Information
The number of addresses in the block can be found as
N = 232-n
The first address in the block can be found by ANDing
the address with the network mask
First address = (any address) AND (network mask)
The last address in the block can be found by either
adding the first address with the number of addresses
or, directly, by ORing the address with complement
(NOTing) of the network mask
Last address = (any address) OR [NOT (network mask)]
47. Block Allocation
The ultimate responsibility of block allocation is given to a
global authority called ICANN(Internet Corporation for
Assigned Names and Address)
Assign a large block of addresses to an ISP (Internet Service
Provider)
For the proper operation of the CIDR, there are three
restrictions
The number of requested addresses, N, needs to be power of 2.
The value of prefix length can be found from the number of
addresses in the block
The requested block needs to be allocated where there are a
contiguous number of unallocated addresses in the address
space
48. Example
An ISP has requested a block of 1000 addresses. The
following block is granted.
a.Since 1000 is not a power of 2, 1024 addresses are
granted
b.The prefix length for the block is calculated as n = 32
log21024 = 22
c.The beginning address is chosen as 18.14.12.0
The granted block is 18.14.12.0/22. The first address is
18.14.12.0/22 and the last address is 18.14.15.255/22
49. Special Addresses
In classful addressing some addresses were reserved for
special purposes. The classless addressing scheme inherits
some of these special addresses from classful addressing
Special block
All-Zero Address
All-One Address
Loopback Address
Private Address
Multicast Address
Special address in each block
Network Address
Direct broadcast address
50. Example of using the all-zeros address
When a host needs to send an IPv4 packet but it does
not know its own address
Source: 0.0.0.0
Destination: 255.255.255.255
Packet
51. Example of Limited Broadcast Address
All-One Address
A host that wants to send a message to every other
host can use
221.45.71.20/24 221.45.71.178/24
221.45.71.64/24 221.45.71.126/24
Network
53. Private address
Not recognize globally
Used either in isolation or in connection with network
address translation technique
Block Number of addresses Block Number of address
10.0.0.0/8 16,777,216 192.168.0.0/16 65,536
172.16.0.0/12 1,047,584 169.254.0.0/16 65,536
55. NAT
The distribution of addresses through ISPs has created a
new problem
ISP cannot rearrange the range of addresses
But in most situation, only a portion of computers in a small
network need access to the Internet simultaneously
The number of allocated addresses does not have to match the
number of computers in the network
A technology that can provide the mapping between the
private and universal addresses, and at the same time,
support virtual private networks is NAT(Network Address
Translation)
58. Example of NAT
Using a pool of IP address
Using one global address by the NAT router allows only
one private-network host to access the same external
host
To remove this restriction, NAT router can use a pool of
global addresses
Using both IP addresses and port addresses
To allow a many-to-many relationship
Private Address Private Port External Address External Port Transport Protocol
172.18.3.1 1400 25.8.3.2 80 TCP
172.18.3.2 1401 25.8.3.2 80 TCP
...
59. Summary (1)
The identifier used in the IP layer of the TCP/IP layer of the TCP/IP protocol suite is called the
Internet address or IP address. An IPv4 address is 32 bits long. An address space is the total
number of addresses used by the protocol. The address space of IPv4 is 232 or 4,294,967,296.
In classful addressing, the IPv4 address space is divided into five classes: A, B, C, D, and E.
An organization is granted a block in one of the three classes, A, B, or C. Classes D and E is
reserved for special purpose. An IP address in classes A, B, and C is divided into netid and
hostid.
In classful addressing, the first address in the block is called the network address. It defines
the network to which an address belongs. The network address is used in routing a packet to
its destination network.
A network mask or a default mask in classful addressing is a 32-bit number with n leftmost
bits all set to 1s and (32 n) rightmost bits all set to 0s. It is used by a router to find the
network address from the destination address of a packet.
The idea of splitting a network into smaller subnetworks is called subnetting. A subnetwork
mask, like a network mask, is used to find the subnetwork address when a destination IP
address is given. In supernetting, an organization can combine several class C blocks to
create a larger range of addresses.
60. Summary (2)
In 1996, the Internet authorities announced a new architecture called classless
addressing, or CIDR (classless Inter-domain routing) that allows an organization to
have a block addresses of any size as long as the size of the block is a power of two.
The address in classless addressing is also divided into two parts: the prefix and the
suffix. The prefix plays the same role as the netid; the suffix plays the same role as
the hostid. All addresses in the block have the same prefix; each address has a
different suffix
Some of the blocks in IPv4 are reserved for special purpose. In addition, some
addresses in a block are traditionally used for special addresses. These addresses
are not assigned to any host.
To improve the distribution of addresses, NAT technology has been created to allow
separation of private addresses in a network from the global addresses used in the
Internet. A translation table can translate the private addresses, selected from the
blocks allocated for this purpose, to global addresses. The translation table also
translates the IP addresses as well as the port number for mapping from the private
to global addresses and vice versa.