0% found this document useful (0 votes)
18 views

PROJECT TITLE -NETWORK LAYER AND PROTOCOLS-ss7

The document outlines a project on the Network Layer and Protocols, focusing on key topics such as IP addressing, Internet Protocol, ICMPv4, Mobile IP, and Virtual Private Networks (VPN). It explains concepts like classful and classless IP addressing, subnetting, and the functionality of Internet Protocols in data communication. Additionally, it covers the significance of Mobile IP for maintaining connections across networks and the role of VPNs in creating secure connections over the internet.

Uploaded by

shashank220906
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

PROJECT TITLE -NETWORK LAYER AND PROTOCOLS-ss7

The document outlines a project on the Network Layer and Protocols, focusing on key topics such as IP addressing, Internet Protocol, ICMPv4, Mobile IP, and Virtual Private Networks (VPN). It explains concepts like classful and classless IP addressing, subnetting, and the functionality of Internet Protocols in data communication. Additionally, it covers the significance of Mobile IP for maintaining connections across networks and the role of VPNs in creating secure connections over the internet.

Uploaded by

shashank220906
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

BHARATI VIDYAPEETH’S

JAWAHARLAL NEHRU INSTITUTE OF TECHNOLOGY

BRANCH- COMPUTER TECHNOLOGY

PROJECT TITLE -NETWORK LAYER AND PROTOCOLS

SUBJECT - ADVANCED COMPUTER NETWORK

PROJECT GUIDED BY - MISS SUPARNA NAIK


TOPICS AND SUB-TOPICS

NETWORK LAYER AND PROTOCOLS

IP ADDRESSING INTERNET PROTOCOL ICMPv4

VIRTUAL PRIVATE
MOBILE IP
NETWORK (VPN)
Introduction

Network layer is the third layer in the


conceptual data model OSI (Open Systems
Interconnection), This layer holds major
significance in the OSI reference model
which facilitates communication between
different systems with it’s diverse range of
applications and devices such as, routers,
gateways, modems and others.
01 IP ADDRESSING

1.1 CONCEPT OF IP ADDRESSING :

An Internet Protocol (IP) address is a


unique numerical identifier for every
device or network that connects to the
internet. Typically assigned by an
internet service provider (ISP), an IP
address is an online device address
used for communicating across the
internet.
1.2 NOTATION :

THE NOTATION FOR IP ADDRESESS ARE :

1.Binary Notation(base 2)
2.Dotted-Decimal Notation(base 256)
3.Hexadecimal Notation(base 16)
1.3 CLASSFUL IP ADDRESSING :

Classful IP addressing is a way of organizing


and managing IP addresses, which are used to
identify devices on a network. Think of IP
addresses like street addresses for houses;
each device on a network needs its unique
address to communicate with other devices. In
this article, we will discuss Classful IP
addresses, and their types in detail.

Classful Addressing
The 32-bit IP address is divided into five sub-
classes. These are given below:
Class A
Class B
Class C
Class D
Class E
1.3 CLASSLESS IP ADDRESSING :
1.4 SUBNETTING :

When a bigger network is divided into


smaller networks, to maintain security, then
that is known as Subnetting. So, maintenance
is easier for smaller networks. For example,
if we consider a class A address, the
possible number of hosts is 224 for each
network, it is obvious that it is difficult to
maintain such a huge number of hosts, but it
would be quite easier to maintain if we divide
the network into small parts.
02 INTERNET PROTOCOL

Internet Protocols are a set of rules that


governs the communication and exchange of
data over the internet. Both the sender and
receiver should follow the same protocols
in order to communicate the data.
2.1 DATAGRAM FORMAT OF IP

An IPv4 packet is called a datagram. It


contains a header and a data part.
The IPv4 header contains a 20-byte fixed
mandatory part, followed by optional fields.
Hence, the minimum size of an IPv4 header
is 20 bytes.
The optional part contains options and
padding. It can grow up to 40 bytes in size.
So, the maximum header size is 60 bytes.
2.2 FRAGMENTATION:

IP fragmentation is a process that


breaks large packets into smaller
pieces so they can pass through a
network link with a smaller maximum
transmission unit (MTU). The receiving
host reassembles the fragments.
2.3 OPTIONS FIELD IN IP:

All IP datagrams must have the standard


20-byte header, which contains key
information such as the source and
destination address of the datagram,
fragmentation control parameters, length
information, and more. In addition to these
invariable fields, the creators of IPv4
included the ability to add options that
provide additional flexibility in how IP
handles datagrams.
03 ICMPv4

Internet Control Message Protocol is


known as ICMP. The protocol is at the
network layer. It is mostly utilized on
network equipment like routers and is
utilized for error handling at the network
layer. Since there are various kinds of
network layer faults, ICMP can be
utilized to report and troubleshoot these
errors.
TYPES OF ERROR CODE MESSAGE IN ICMPV4:
04 MOBILE IP

Mobile IP is a communication protocol


(created by extending Internet Protocol, IP)
that allows users to move from one network
to another with the same IP address. It
ensures that the communication will
continue without the user’s sessions or
connections being dropped. Imagine having
a phone number that stays the same no
matter where you go.
REMOTE HOST AND OBILE HOST
COMMUNICATION
05 VIRTUAL PRIVATE NETWORK(VPN)

A virtual private network (VPN) is a technology that


creates a safe and encrypted connection over a
less secure network, such as the Internet. A Virtual
Private Network is a way to extend a private
network using a public network such as the
Internet. The name only suggests that it is a
“Virtual Private Network”, i.e. user can be part of a
local network sitting at a remote location. It makes
use of tuneling protocols to establish a secure
connection.
THANK YOU
--SHASHANK K. SHETE

You might also like