Unit-2 Network Layer - IP Addressing
Unit-2 Network Layer - IP Addressing
Network Layer
▪ IP Addressing
▪ Subnetting
▪ Super-netting
13.1
ADDRESSING
Addresses in TCP/IP
2.2
Relationship of Layers and Addresses in TCP/IP
2.3
Physical Addresses
• Also known as Link Address
• Address of a node as defined by LAN or WAN
• Included in the frame used by DLL
• Lowest level address
• Size and format of P.A. Depends on the Network
• Ethernet uses 48 bit P.A.
• Most LANs use 48 bit P.A. In form of 12 Hexadecimal
digits 07:15:45:2C:55:T6
• Not suitable for Internetwork where diff networks have
diff network formats
• Changes from hop to hop
2.4
Physical Addresses
2.5
Logical Addresses
• Necessary for Universal Communication
• Independent of underlying Physical
Networks
• Each host identified uniquely irrespective of
underlying physical network
• Currently its of 32 bits and can uniquely
identify each host
• Remains same from hop to hop
2.6
Port Addresses
• IP add and Physical Add are necessary for the
quantity of data to travel from source to
destination.
2.8
Specific Addresses
2.10
Example 2.2
07:01:02:01:2C:4B
2.11
Logical Addresses
• Necessary for Universal Communication
• Independent of underlying Physical
Networks
• Each host identified uniquely irrespective of
underlying physical network
• Currently its of 32 bits and can uniquely
identify each host
• Remains same from hop to hop
2.12
Classful Addressing
• IANA(Internet Assigned Number Authority)
Net ID
Host
Host
……….
Host Host
(1-126) Class A
0 and 127 are special IP addresses so we have
subtracted 2 in the Network portion of Class A.
Class B
• Class B # of Networks # of Hosts in a Network
10 111111 =191
• 1110 0000=224
1110 1111=239
(224-239) Class D Range
• This IP is not given to any computer.
• No N/W bits and Host bits division.
• Classes A, B and C are used for Unicasting and
Class D is used for Multicasting.
Class E
• Used for Research purpose.
1111….
Not A
Not D
Not B Not C
1111 1111=255
Network Mask/ Default Mask
• Network Mask is a mathematical tool which
can solve some of the networking problems.
• For masking: In network bits place all 1’s and
in Host bits place all 0’s.
Class A
• Network Bits Host Bits
201.15.19.0 = Net ID
201.15.19.1 201.15.19.254
201.15.19.2
Host
Host Host
• In Host you can’t use 201.15.19.0 because it is
used as Net ID and 201.15.19.255 is used as
DBA.
• We have subtracted 2 from No. of Hosts
because one is used as NetID and the other is
used as DBA of the N/W.
Example
1. IP : 59.63.120.119
What is the Network ID and DBA?
IP Address
1. Private IP addresses are free of cost. Any organization can use an address out of
this set without permission from the Internet authorities. They are unique inside
an organization but not unique globally. No router will forward a packet that has
one of these addresses as Destination address.
2. In a LAN, one computer acts as Server and rest act as Client. This server has group
of private IP addresses and assigns it to the hosts in the LAN network.
3. Scope of Private IP is LOCAL. These IP’s won’t work outside the LAN. Some IP’s can
be repeatedly used in different LANs.
4. In every LAN network, private IP’s are used. Same private IP’s can be used in other
LANs because the scope is Local.
• Public IP Address- provides Internet Service
ISP Router
X Google
Server
Public IP provided 16.7.1.8
to College
X 144.15.16.8
144.15.16.19
• NAT Router converts private IP into public IP when the
packet is going outside the Network and it converts
public IP into private IP when the packet is coming
inside the Router.
• NAT Router can understand that which computer in
LAN is transmitting by using MAC address. Every
computer’s private IP address is converted into same
public IP but it can internally distinguish different
clients with the help of MAC Address.
• Identification of a system in Network Environment can
be done by IP address and Identification of a process in
Network Environment can be done by Port address
which is given by TCP/IP software.
• Purpose of private IP addresses are to efficiently utilize
the public IP addresses,
Drawback of Classfull Addressing
• Class A has 27 -2 networks and each network has 224 -2
hosts i.e. 1.5 Crores (Wastage---Because If u want
10,000 IP’s of class A then many addresses of Class A
are wasted).
• Class B has 214 networks and each network has 216 -2
hosts. (Wastage---Because If u want 10,000 IP’s of class
B then many addresses 55534 of Class B are wasted).
SOLUTION is SUBNETTING.
• Class C has 221 networks and each network has 28 -2
hosts=254. IP addresses are not sufficient to the
requirement of users because for 1000 hosts 254 are
not enough. SOLUTION is SUPERNETTING.
Subnetting
• Dividing a large network into smaller network
for efficient utilization of IP addresses is
known as Subnetting.
• Subnet Mask is used in Subnetting.
• Ex. In class C, if subnet mask is
255.255.255.224 then no. of Subnets=? And
no. of hosts in each subnet=?
• Subnet Mask: 255.255.255.224
Class C Host Bits
11111111.1111111.11111111.11100000
Propagation
Time
Source Destination
52
• Bit rate units:
1Kbps = 103bps
1Mbps = 106bps
1 Gbps = 109bps
[For memory: 1 Kbyte = 210 bytes = 1024 bytes]
Delay Related Metrics
• Delay (Latency) of bit (packet, file) from A to B
– The time required for bit (packet, file) to go from A to
B
• Jitter
– Variability in delay
• Round-Trip Time (RTT)
– Two-way delay from sender to receiver and back
• Bandwidth-Delay product
– Product of bandwidth and delay → “storage” capacity
of network
54
SCTP
• Stream Control Transmission Protocol (SCTP) is a new
reliable, message-oriented transport layer protocol. SCTP,
however, is mostly designed for Internet applications that have
recently been introduced.
23.55
Figure 23.27 Multiple-stream concept
SCTP
• SCTP association allows multiple IP addresses
for each end.
• In SCTP, control information and data
information are carried in separate chunks.