ov 6 - 1 copyright © 2013 logical operations, inc. all rights reserved. tcp/ip addressing and data...
TRANSCRIPT
OV 6 - 1Copyright © 2013 Logical Operations, Inc. All rights reserved.
TCP/IP Addressing and Data Delivery
The TCP/IP Protocol Suite IP Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes Implement IPv6 Addresses Delivery Techniques
OV 6 - 2Copyright © 2013 Logical Operations, Inc. All rights reserved.
TCP
TCP/IP is the native Protocol of the Internet and is required for Internet
connectivity.
Transmission Control Protocol (TCP): Is part of the TCP/IP Protocol Suite along with another Transport-layer protocol
- User Datagram Protocol (UDP) Is a connection-oriented, guaranteed-delivery protocol used to send data
packets between computers over the Internet. Is part of the Internet protocol suite along with the Internet Protocol (IP) Is responsible for breaking up data into datagrams, reassembling them at the
other end, resending data lost in transit, and resequencing data. IP is responsible for routing individual datagrams and addressing.
OV 6 - 3Copyright © 2013 Logical Operations, Inc. All rights reserved.
IP
Internet Protocol (IP): A Network-layer protocol that is responsible for routing individual datagrams
and addressing. A connectionless protocol and acts as an intermediary between higher protocol
layers and the network. Makes no guarantees about packet delivery, corruption of data, or lost packets. Works in concert with TCP, which establishes a connection between a source
and the destination.
OV 6 - 4Copyright © 2013 Logical Operations, Inc. All rights reserved.
The IP Data Packet Delivery Process
203.175.10.25
255.255.255.0
203.175.10.50
255.255.255.0Application
Transport
Internet
Network Interface
TCP/IP model
11
22Passes IP address
to Internet layerPasses IP address
to Internet layer 33Uses subnet mask to determine
the network of the receiving nodeUses subnet mask to determine
the network of the receiving node
Service establishesconnection and
resolves the name
Service establishesconnection and
resolves the name
OV 6 - 5Copyright © 2013 Logical Operations, Inc. All rights reserved.
UDP
User Datagram Protocol (UDP) or Universal Datagram Protocol: Is a connectionless Transport-layer protocol in the Internet Protocol suite Is a best-effort delivery protocol that is used with IP like TCP Transmits data and ensures data integrity as TCP, but lacks reliability, flow-
control, and error-recovery functions. Is less complex than TCP and because it is connectionless, provides faster
service
OV 6 - 6Copyright © 2013 Logical Operations, Inc. All rights reserved.
ARP
Address resolution in ARP is performed by the following three steps: ARP receives an IP address from IP. If ARP has the MAC address in its cache, it returns it to IP. If not, it issues a
broadcast to resolve the IP address. A target node with the corresponding IP address responds with a unicast that
includes its MAC address.
OV 6 - 7Copyright © 2013 Logical Operations, Inc. All rights reserved.
ICMP
Sending Node Receiving Node
33
2211 Data Receiving Node Buffers Fill
Source Quench Message
FloodwarningFlood
warning
OV 6 - 8Copyright © 2013 Logical Operations, Inc. All rights reserved.
IGMP
IGMP is used for multicast packet routing
IGMP is used for multicast packet routing
IGMP
OV 6 - 9Copyright © 2013 Logical Operations, Inc. All rights reserved.
The header part contains the destination and source addresses. The footer part contains an error checking code. The data part contains the actual information or data that is to be transmitted.
Data Packets
HeaderHeader FooterFooter
DataData
OV 6 - 10Copyright © 2013 Logical Operations, Inc. All rights reserved.
A network address typically includes two parts: one that identifies the
network, and the other that identifies a node on the network.
Network Addresses
192.168.100.100
Network portionNetwork portion
Node portionNode portion
OV 6 - 11Copyright © 2013 Logical Operations, Inc. All rights reserved.
Network Names
Descriptive host nameDescriptive host name
IP address mappingIP address mapping
OV 6 - 12Copyright © 2013 Logical Operations, Inc. All rights reserved.
IP Addresses
32-Bit Binary Address
10101100.00010000.00101000.00000000
Network Address (NA) portionNetwork Address (NA) portion Host Address (HA) PortionHost Address (HA) Portion
OV 6 - 13Copyright © 2013 Logical Operations, Inc. All rights reserved.
Subnets
The process of logically dividing a network into smaller subnetworks or subnets, with each subnet having a unique address.
The conventional addressing technique has IP addresses with two hierarchical levels, namely network ID and host ID.
Subnet A Subnet B
Network is divided into smaller subnetworksNetwork is divided into smaller subnetworks
OV 6 - 14Copyright © 2013 Logical Operations, Inc. All rights reserved.
Subnet Masks
1101100.00001000.00001010.01100101
11111111.11111111.00000000.00000000
1101100.00001000.00000000.00000000
IP address
Network address
Subnet mask differentiates the network and node portions
of the binary IP address
Subnet mask differentiates the network and node portions
of the binary IP address
Node portionNode portionNetwork portionNetwork portion
Network portionNetwork portion Subnet mask removes the node portion
Subnet mask removes the node portion
OV 6 - 15Copyright © 2013 Logical Operations, Inc. All rights reserved.
Subnet Mask Structure
11111111.11111111.11111111.00000000
255.255.255.0
The ones in the mask always start at bit 32, to the left of the mask. The zeros in the mask always start at bit 1, to the right of the mask. The ones in the mask must be contiguous, with no zeros interspersed between
the ones.
OV 6 - 16Copyright © 2013 Logical Operations, Inc. All rights reserved.
IP Address Assignment Rules
TCP/IP139.80.100.10255.255.0.0
139.80.100.20255.255.0.0
139.90.100.10255.255.0.0
139.90.50.20255.255.0.0
OV 6 - 17Copyright © 2013 Logical Operations, Inc. All rights reserved.
Binary and Decimal Conversion
1 1 1 1 1 11 1
2 2 2 2 2 22 2
64 32 16 8 4 2128 1
7 06 5 4 3 2 1
+ + + + + + + = 255
Binary numberBinary number
Binary place valueBinary place value
Decimal equivalentDecimal equivalent
OV 6 - 18Copyright © 2013 Logical Operations, Inc. All rights reserved.
Binary ANDing
Subnet mask in binary
10001011.01010111.10001100.01001100
11111111.11111111.11111111.00000000
10001011.01010111.10001100.00000000
IP address in binary
ANDing
Network ID
139.87.140.76IP address
Subnet mask 255.255.255.0
139.87.140.0
Masks the node portionof the IP address
Masks the node portionof the IP address
Network portionNetwork portion Node portionNode portion
OV 6 - 19Copyright © 2013 Logical Operations, Inc. All rights reserved.
ICANN
139.80.0.0 208.123.45.0
ICANNICANN
Companies lease IP addresses from ICANNCompanies lease IP addresses from ICANN
OV 6 - 20Copyright © 2013 Logical Operations, Inc. All rights reserved.
IP Address Classes
Address Class Description
Class A
Provides a small number of network addresses for networks with a large number of nodes per network. Address range: 1.0.0.0 to 127.255.255.255Number of networks: 126Number of nodes per network: 16,777,214Network ID portion: First octetNode ID portion: Last three octetsDefault subnet mask: 255.0.0.0
Class B
Provides a balance between the number of network addresses and the number
of nodes per network.Address range: 128.0.0.0 to 191.255.255.255Number of networks: 16,382Number of nodes per network: 65,534Network ID portion: First two octets, excluding Class A addressesNode ID portion: Last two octetsDefault subnet mask: 255.255.0.0
OV 6 - 21Copyright © 2013 Logical Operations, Inc. All rights reserved.
IP Address Classes (Cont.)
Address Class Description
Class C
Provide a large number of network addresses for networks with a small number of nodes per network.Address range: 192.0.0.0 to 223.255.255.255Number of networks: 2,097,150Number of nodes per network: 254Network ID portion: First three octets, excluding Class A and Class B addressesNode ID portion: Last octetDefault subnet mask: 255.255.255.0
Class D
Addresses are set aside to support multicast transmissions. Any network can use them, regardless of the base network ID.Address range: 224.0.0.0 to 239.255.255.255
Example of a Class D address: 230.43.160.48
Class EAddresses that are set aside for research and experimentation.Address range: 240.0.0.0 to 255.255.255.255
Example of a Class E address: 250.217.39.190
OV 6 - 22Copyright © 2013 Logical Operations, Inc. All rights reserved.
Private IP Addresses
Private IP addresses are addresses that organizations use for nodes requiring IP connectivity within enterprise networks, but not requiring external connections to the Internet.
IP addresses in each of the Classes A, B, and C are reserved as private IP addresses.
OV 6 - 23Copyright © 2013 Logical Operations, Inc. All rights reserved.
The Local and Remote Addressing Process
Node uses a subnet mask to determine the destination of packet
Node applies subnet mask to its own IP address
Node applies the subnet mask to the packet's destination address
The node compares the two network IDs
Are they the same?
Two nodes are on the same subnet
Two nodes are remote to each other
Yes No
OV 6 - 24Copyright © 2013 Logical Operations, Inc. All rights reserved.
Default Gateways
139.87.10.9
139.87.10.10
139.115.30.0
Gateway
Default gateway is the address of the router
connected to the Internet
Default gateway is the address of the router
connected to the Internet
OV 6 - 25Copyright © 2013 Logical Operations, Inc. All rights reserved.
203.175.10.1 - 62
255.255.255.192
203.175.10.65 - 126
255.255.255.192
203.175.10.128 - 190
255.255.255.192
203.175.10.193 - 254
255.255.255.192
Custom TCP/IP Subnets
203.175.10.0
Custom subnet maskCustom subnet mask
Routes traffic between subnets
Routes traffic between subnets
A class of leased addresses that are divided into smaller groups
A class of leased addresses that are divided into smaller groups
OV 6 - 26Copyright © 2013 Logical Operations, Inc. All rights reserved.
Custom Subnet Masks
203.175.10.0
11001011.10101111.00001010.00000000
255.255.255.192
11111111.11111111.11111111.11000000
Class C networkaddress
Class C networkaddress
Custom subnetmask
Custom subnetmask
Borrowed bits fromthe left side of the node
Borrowed bits fromthe left side of the node
OV 6 - 27Copyright © 2013 Logical Operations, Inc. All rights reserved.
Variable Length Subnet Masks
203.175.10.0
255.255.255.254
Subnet 1
6 addresses
Subnet 2
14 addresses
Subnet 3
30 addresses
5 nodes
255.255.255.248
12 nodes
255.255.255.240
28 nodes
255.255.248.0
OV 6 - 28Copyright © 2013 Logical Operations, Inc. All rights reserved.
Classless Inter Domain Routing
192.168.12.0
255.255.255.0
192.168.13.0
255.255.255.0
192.168.12.0
255.255.254.0192.168.12.0/23
CIDR notation combines a network address with a number to represent the number of one bits in the mask.
CIDR combines the network address with a number
CIDR combines the network address with a number
OV 6 - 29Copyright © 2013 Logical Operations, Inc. All rights reserved.
IPv4 Address Space Limitations
Limitations of the IPv4 address space include: The 32-bit IP address space itself, which provides only a theoretical maximum
of 232, or approximately 4,295 billion, separate addresses. The division of the address space into fixed classes; addresses falling either
between classes or between subnets are unavailable for assignment. IP address classes provide a small number of node addresses, leading to
difficulty matching IP address leases to a company's needs. The depletion of Class A and Class B IP address assignments. Unassigned and unused address ranges within existing Class A and Class B
blocks.
OV 6 - 30Copyright © 2013 Logical Operations, Inc. All rights reserved.
IPv6
IPv6: Is the successor to IPv4, an addressing scheme that increases the available
pool of IP addresses by implementing a 128-bit binary address space. Includes new efficiency features. Is incompatible with IPv4.
OV 6 - 31Copyright © 2013 Logical Operations, Inc. All rights reserved.
IPv6 Addresses
An IPv6 address is a 128-bit binary number assigned to a computer on a TCP/IP network.
Some of the bits in the address represent the network segment; the other bits represent the host.
For readability, the IPv6 address is usually separated by colons into eight groups of four hexadecimal digits.
OV 6 - 32Copyright © 2013 Logical Operations, Inc. All rights reserved.
Connections
A connection: Is a virtual link between two nodes established for the duration of a
communication session. Provides flow control, packet sequencing, and error recovery functions to
ensure reliable communications between nodes.
OV 6 - 33Copyright © 2013 Logical Operations, Inc. All rights reserved.
Flow Control
The following are common flow-control techniques: Buffering Data windows
Fixed and sliding windows
OV 6 - 34Copyright © 2013 Logical Operations, Inc. All rights reserved.
Buffering
A flow control technique in which data received is stored on a buffer. Is used when reading information from the disk or RAM.
OV 6 - 35Copyright © 2013 Logical Operations, Inc. All rights reserved.
Data Windows
10
1
Without data windows
With data windows
Packet
ACK
Defines how much data can be sent without waiting for an acknowledgment
Defines how much data can be sent without waiting for an acknowledgment
OV 6 - 36Copyright © 2013 Logical Operations, Inc. All rights reserved.
Error Detection
Data sent with EDC in footer
Receiver generates an EDC and compares it with the one
sent in the footer
Do they match?
Process data
Yes No
Request data be retransmitted
OV 6 - 37Copyright © 2013 Logical Operations, Inc. All rights reserved.
Parity Check
Compare bytes with parity bits
Compare bytes with parity bits
1 0 1 0 0 1 1 0 1 1 0 1 0 0 1 1 0 0
Parity bitParity bit Parity bitParity bit
11
Sender Receiver
Sender adds one bit to each word of dataSender adds one bit to each word of data 22
Receiver compares the transmitted and received bytes
Receiver compares the transmitted and received bytes
33If there is a mismatch, the
receiver requests retransmissionIf there is a mismatch, the
receiver requests retransmission
OV 6 - 38Copyright © 2013 Logical Operations, Inc. All rights reserved.
CRC
Cyclic Redundancy Check
Compare CRCs for errorCompare CRCs for error
1 0 1 1 0 1 0 0 CRC 1 0 1 1 0 1 0 0
11Sender attaches
CRC to dataSender attaches
CRC to data 22Receiver calculates CRC for
received blockReceiver calculates CRC for
received block
33Values match and data is unaltered
Values match and data is unaltered
OV 6 - 39Copyright © 2013 Logical Operations, Inc. All rights reserved.
Reflective Questions
1. In your opinion, which class of IP address will suit your organization?
2. Which delivery techniques will you implement most often on your network?