Unformatted text preview:

Slide 1INTRODUCTIONSlide 3TCP/IP vs OSI ModelInternet ProtocolKey IP CharacteristicsIP FunctionsInternet Protocol Version 4 (IP, IPv4)IPv4 HEADER FORMATIP AddressingSlide 12IP Addressing Overview (contd..)IP Addressing Overview (contd..)IP Addressing Overview (contd..)IP Address SizeIP Address "Dotted Decimal" NotationIP Address SpaceNetwork ID and Host IDNetwork ID and Host ID (contd..)Network ID and Host ID (contd..)IP Addressing CategoriesNumber of IP Addresses and MultihomingIP "Classful" (Conventional) AddressingIP "Classful" Addressing Overview and Address ClassesSlide 26IP "Classful" Addressing Network and Host IdentificationIP "Classful" Address RangesIP ADDRESS FORMATS AND CLASSESIP Address Class A, B and C Network and Host CapacitiesIP Addresses With Special MeaningsIP Address LimitationsIP Reserved, Loopback and Private AddressesIP Reserved, Loopback and Private AddressesIP Multicast AddressingSlide 36IP Multicast AddressingProblems With "Classful" IP AddressingIP Datagram Encapsulation and FormattingIP Datagram IntroductionIP Datagram EncapsulationSlide 42IP Datagram General FormatIP Datagram General FormatIP Datagram Format DescriptionIP Datagram Format Description (contd..)Slide 47IP Datagram Format Description (contd..)Slide 49Slide 50Slide 51Slide 52IP Datagram TransmissionMatching IP Datagram Size to Underlying Network Frame SizeMTU and FragmentationExample of MTU and FragmentationFragmentation Process DescriptionFragmentation Process StepsFragmentation Issues and ConcernsFragmentation-Related Datagram Header FieldsFragmentation Headers (Contd.)Slide 63Slide 64IP Message Reassembly ProcessReassembly Process FunctionsReassembly Process Functions (contd..)Reassembly CompletionSlide 69The Motivation for Subnet AddressingThe Development of Subnet AddressingAdvantages of Subnet AddressingIP Subnetting: "Three-Level" Hierarchical IP Subnet AddressingIP Subnet MasksSlide 75IP Subnet CalculationsIP Subnet Mask NotationIP Subnet Mask NotationSlide 79Slide 80IP Default Subnet Masks For Address Classes A, B and CIP Custom Subnet MasksSlide 83Slide 84IP Custom Subnet MasksSlide 86IP Subnet IdentifiersIP Subnet AddressesSubnet Address FormulasSlide 90IP Host AddressIP Subnetting Summary TablesIP Variable Length Subnet Masking (VLSM)Slide 94Slide 95IP Variable Length Subnet Masking (VLSM)IP Classless Addressing: Classless Inter-Domain Routing (CIDR) / "Supernetting”IP Classless Addressing and "Supernetting" MotivationIP Classless Addressing and "Supernetting"IP CIDR AdvantagesSlide 101IP CIDR DisadvantagesIP "Supernetting": CIDR Hierarchical AddressingIP "Supernetting": CIDR NotationCommon Features of “Classful” and Classless AddressingIP CIDR Addressing ExampleIP CIDR Addressing ExampleIP Datagram Delivery and RoutingIP Datagram Direct Delivery and Indirect Delivery (Routing)Slide 110Slide 111The Relationship Between Datagram Routing and AddressingIP Routing Concepts and the Process of Next-Hop RoutingThe Benefits of Next-Hop RoutingIP Routes and Routing TablesSlide 116Route DeterminationIP Routing In A Subnet or Classless Addressing EnvironmentIP MulticastingSlide 120Multicast AddressingMulticast Group ManagementMulticast Datagram Processing and RoutingSlide 124Internet Protocol Version 6 (IPv6) / IP Next Generation (IPng)REFERENCESSlide 127Slide 128ASHWIN JADHAVASHWIN JADHAVBANDER AL-TURAIFBANDER AL-TURAIFKALYAN MANTRAVADIKALYAN MANTRAVADIPRAVEEN GADIKOTAPRAVEEN GADIKOTAINTRODUCTIONINTRODUCTIONThe first computer networks were designed with The first computer networks were designed with the hardware as the main concern.the hardware as the main concern.Idea of software controlled mechanisms.Idea of software controlled mechanisms.To reduce the design complexity, most networks To reduce the design complexity, most networks were organized as a series of levels or layers, were organized as a series of levels or layers, each one built upon the one below it.each one built upon the one below it.Hardware is considered to be a bottleneck, but Hardware is considered to be a bottleneck, but by improving network software can overcome by improving network software can overcome some of the hardware limitations.some of the hardware limitations.Earlier the ISO-OSI architecture was used. Earlier the ISO-OSI architecture was used.To provide communication amongst various network To provide communication amongst various network infrastructures the TCP/IP reference model was infrastructures the TCP/IP reference model was proposed with the TCP/IP protocol suite as the protocol proposed with the TCP/IP protocol suite as the protocol stack.stack.The requirement led to the choice of a packet-switching The requirement led to the choice of a packet-switching network based on a connectionless internet work layer.network based on a connectionless internet work layer.Its job is to inject packets into any network and have Its job is to inject packets into any network and have them travel independently to the destination.them travel independently to the destination.The network layer is the lowest layer that deals with end-The network layer is the lowest layer that deals with end-to-end communication.to-end communication.The internet layer defines an official packet format and The internet layer defines an official packet format and protocol called IP (Internet Protocol).protocol called IP (Internet Protocol).INTRODUCTIONINTRODUCTIONTCP/IP vs OSI ModelTCP/IP vs OSI Model The protocols and technologies work as a team to The protocols and technologies work as a team to accomplish the goal of communication across the network.accomplish the goal of communication across the network. Like any team, no single member can get the job done Like any team, no single member can get the job done alone, no matter how good they are. Still, if we alone, no matter how good they are. Still, if we werewere to try to to try to pick a “most valuable player” in the world of networking, a good pick a “most valuable player” in the world of networking, a good case could be made that we have it here in this section: the case could be made that we have it here in this section: the TCP/IP TCP/IP Internet Protocol (IP)Internet Protocol (IP).. IP is in fact the “IP is in fact the “workhorseworkhorse” of TCP/IP. It implements key ” of TCP/IP. It implements key network-layer functions including addressing, datagram network-layer functions including addressing, datagram


View Full Document
Download Internet Protocol
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Internet Protocol and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Internet Protocol 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?