SlideShare a Scribd company logo
1 of 111
Unit 9
Classless Inter-Domain Routing (CIDR)
• Basically the method that ISPs (Internet Service
Providers) use to allocate an amount of
addresses to a company, a home
• Ex : 192.168.10.32/28
• The slash notation (/) means how many bits are
turned on (1s)
CIDR Values
11111111
Determining Available Host Addresses
172 16 0 0
10101100 00010000 00000000 00000000
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
Network Host
00000000 00000001
11111111 11111111
11111111 11111110
...
...
00000000 00000011
11111101
1
2
3
65534
65535
65536
–
...
2
65534
N
2N – 2 = 216 – 2 = 65534
IP Address Classes Exercise
Address Class Network Host
10.2.1.1
128.63.2.100
201.222.5.64
192.6.141.2
130.113.64.16
256.241.201.10
IP Address Classes Exercise Answers
Address Class Network Host
10.2.1.1
128.63.2.100
201.222.5.64
192.6.141.2
130.113.64.16
256.241.201.10
A
B
C
C
B
Nonexistent
10.0.0.0
128.63.0.0
201.222.5.0
192.6.141.0
130.113.0.0
0.2.1.1
0.0.2.100
0.0.0.64
0.0.0.2
0.0.64.16
• Network 172.16.0.0
172.16.0.0
Addressing Without Subnets
172.16.0.1 172.16.0.2 172.16.0.3
…...
172.16.255.253 172.16.255.254
• Network 172.16.0.0
Addressing with Subnets
172.16.1.0 172.16.2.0
172.16.3.0
172.16.4.0
Subnet Addressing
172.16.2.200
172.16.2.2
172.16.2.160
172.16.2.1
172.16.3.5
172.16.3.100
172.16.3.150
E0
172.16
Network
Network Interface
172.16.0.0
172.16.0.0
E0
E1
New Routing Table
2 160
Host
. .
172.16.3.1
E1
Subnet Addressing
172.16.2.200
172.16.2.2
172.16.2.160
172.16.2.1
172.16.3.5
172.16.3.100
172.16.3.150
172.16.3.1
E0
E1
172.16 2 160
Network Host
. . Network Interface
172.16.2.0
172.16.3.0
E0
E1
New Routing Table
Subnet
Subnet Mask Exercise
Address Subnet Mask Class Subnet
172.16.2.10
10.6.24.20
10.30.36.12
255.255.255.0
255.255.240.0
255.255.255.0
Subnet Mask Exercise Answers
Address Subnet Mask Class Subnet
172.16.2.10
10.6.24.20
10.30.36.12
255.255.255.0
255.255.240.0
255.255.255.0
B
A
A
172.16.2.0
10.6.16.0
10.30.36.0
Broadcast Addresses
172.16.1.0
172.16.2.0
172.16.3.0
172.16.4.0
172.16.3.255
(Directed Broadcast)
255.255.255.255
(Local Network Broadcast)
X
172.16.255.255
(All Subnets Broadcast)
Exercise
• 192.168.10.0
• /27
? – SNM
? – Block Size
?- Subnets
Exercise
• /27
? – SNM – 224
? – Block Size = 256-224 = 32
?- Subnets
Subnets 10.0 10.32 10.64
FHID 10.1 10.33
LHID 10.30 10.62
Broadcast 10.31 10.63
Exercise
• 192.168.10.0
• /30
? – SNM
? – Block Size
?- Subnets
Exercise
• /30
? – SNM – 252
? – Block Size = 256-252 = 4
?- Subnets
Subnets 10.0 10.4 10.8
FHID 10.1 10.5
LHID 10.2 10.6
Broadcast 10.3 10.7
Exercise
Mask Subnets Host
/26 ? ? ?
/27 ? ? ?
/28 ? ? ?
/29 ? ? ?
/30 ? ? ?
Exercise
Mask Subnets Host
/26 192 4 62
/27 224 8 30
/28 240 16 14
/29 248 32 6
/30 252 64 2
Exercise
192.168.10.54 /29
Mask ?
Subnet ?
Broadcast ?
Exercise
192.168.10.130 /28
Mask ?
Subnet ?
Broadcast ?
Exercise
192.168.10.193 /30
Mask ?
Subnet ?
Broadcast ?
Exercise
192.168.1.100 /26
Mask ?
Subnet ?
Broadcast ?
Exercise
192.168.20.158 /27
Mask ?
Subnet ?
Broadcast ?
Class B
172.16.0.0 /19
Subnets ?
Hosts ?
Block Size ?
Class B
172.16.0.0 /19
Subnets 23 = 8
Hosts 213 -2 = 8190
Block Size 256-224 = 32
Subnets 0.0 32.0 64.0 96.0
FHID 0.1 32.1 64.1 96.1
LHID 31.254 63.254 95.254 127.254
Broadcast 31.255 63.255 95.255 127.255
Class B
172.16.0.0 /27
Subnets ?
Hosts ?
Block Size ?
Class B
172.16.0.0 /27
Subnets 211 = 2048
Hosts 25 -2 = 30
Block Size 256-224 = 32
Subnets 0.0 0.32 0.64 0.96
FHID 0.1 0.33 0.65 0.97
LHID 0.30 0.62 0.94 0.126
Broadcast 0.31 0.63 0.95 0.127
Class B
172.16.0.0 /23
Subnets ?
Hosts ?
Block Size ?
Class B
172.16.0.0 /23
Subnets 27 = 128
Hosts 29 -2 = 510
Block Size 256-254 = 2
Subnets 0.0 2.0 4.0 6.0
FHID 0.1 2.1 4.1 6.1
LHID 1.254 3.254 5.254 7.254
Broadcast 1.255 3.255 5.255 7.255
Class B
172.16.0.0 /24
Subnets ?
Hosts ?
Block Size ?
Class B
172.16.0.0 /24
Subnets 28 = 256
Hosts 28 -2 = 254
Block Size 256-255 = 1
Subnets 0.0 1.0 2.0 3.0
FHID 0.1 1.1 2.1 3.1
LHID 0.254 1.254 2.254 3.254
Broadcast 0.255 1.255 2.255 3.255
Class B
172.16.0.0 /25
Subnets ?
Hosts ?
Block Size ?
Class B
172.16.0.0 /25
Subnets 29 = 512
Hosts 27 -2 = 126
Block Size 256-128 = 128
Subnets 0.0 0.128 1.0 1.128 2.0 2.128
FHID 0.1 0.129 1.1 1.129 2.1 2.129
LHID 0.126 0.254 1.126 1.254 2.126 2.254
Broadcast 0.127 0.255 1.127 1.255 2.127 2.255
Find out Subnet and Broadcast Address
• 172.16.85.30/29
Find out Subnet and Broadcast Address
• 172.30.101.62/23
Find out Subnet and Broadcast Address
• 172.20.210.80/24
Class A
10.0.0.0 /10
Subnets ?
Hosts ?
Block Size ?
Class A
10.0.0.0 /10
Subnets 22 = 4
Hosts 222 -2 = 4194302
Block Size 256-192 = 64
Subnets 10.0 10.64 10.128 10.192
FHID 10.0.0.1 10.64.0.1 10.128.0.1 10.192.0.1
LHID 10.63.255.254 10.127.255.254 10.191.255.254 10.254.255.254
Broadcast 10.63.255.255 10.127.255.255 10.191.255.255 10.254.255.255
Class A
10.0.0.0 /18
Subnets ?
Hosts ?
Block Size ?
Class A
10.0.0.0 /18
Subnets 210 = 1024
Hosts 214 -2 = 16382
Block Size 256-192 = 64
Subnets 10.0.0.0 10.0.64.0 10.0.128.0 10.0.192.0
FHID 10.0.0.1 10.0.64.1 10.0.128.1 10.0.192.1
LHID 10.0.63.254 10.0.127.254 10.0.191.254 10.0.254.254
Broadcast 10.0.63.255 10.0.127.255 10.0.191.255 10.0.254.255
VLSM(Variable Length Subnet Mask)
• VLSM extends classic subnetting.
• VLSM is a process of breaking down subnets
into the smaller subnets, according to the
need of individual networks.
VLSM
 An organization with a class C address and
needs to have 5 subnets with the following
number of hosts: 60, 60, 60, 30, 30.
 The site cannot use a subnet mask with only 2
bits in the subnet section because this allows
only 4 subnetworks each 62.
 Nor can the site use a subnet mask with 3 bits in
the subnet section because this allows 8
subnetworks each with 30 hosts.
VLSM
 The router uses 2 different masks, one
applied after the other.
 It first uses the masks with 26 1s(11111111
11111111 11111111 11000000 or
255.255.255.192) to divide the network into
4 subnets.
 Then it applies the mask with 27 1s
(11111111 11111111 11111111
11100000 or 255.255.255.224) to one of the
subnets to divide it into two smaller subnets.
Steps for VLSM
• If an ISP has a 200.1.1.0 Network, he wants to
give assign to 5 customers who need 20, 12, 6,
25, 18 hosts.
– What should the subnet mask be?
– What is the address range in each subnet?
– What should the routing table entries be?
– Can it be done efficiently to conserve IP
addresses?
Question
VLSM - example
Supernetting
• Supernets are the opposite of Subnets in that
they combine multiple Class C networks into
blocks rather than dividing them into segments.
• When Subnetting, we borrow bits from the Host
ID portion, which increases the number of bits
used for the Network ID portion.
• With Supernetting we do exactly the opposite,
meaning we take the bits from the Network ID
portion and give them to the Host ID portion
Supernet Masks
 A supernet mask is the reverse of the subnet
mask.
 In a supernet mask, we change some 1s in
the netid section to 0s.
Example
• With the supernet mask of 255.255.252.0 we
can have 4 class C address combined into one
supernetwork.
• If we choose the first address to be X.Y.32.0, the
other three addresses are X.Y.33.0, X.Y.34.0, and
X.Y.35.0.
• Whenever the router receives a packet, it
applies the supernet mask to the destination
address and compares the result to the lowest
address. If the result and the lowest address are
the same, the packet belongs to the supernet.
NAT: network address translation
10.0.0.1
10.0.0.2
10.0.0.3
10.0.0.4
138.76.29.7
local network
(e.g., home network)
10.0.0/24
rest of
Internet
datagrams with source or
destination in this network
have 10.0.0/24 address for
source, destination (as usual)
all datagrams leaving
local
network have same
single source NAT IP
address:
138.76.29.7,different
motivation: local network uses just one IP
address as far as outside world is concerned:
– range of addresses not needed from ISP: just one
IP address for all devices
– can change addresses of devices in local network
without notifying outside world
– can change ISP without changing addresses of
devices in local network
– devices inside local net not explicitly addressable,
visible by outside world (a security plus)
NAT: network address translation
implementation: NAT router must:
– outgoing datagrams: replace (source IP address, port #)
of every outgoing datagram to (NAT IP address, new port
#)
– remember (in NAT translation table) every (source IP
address, port #) to (NAT IP address, new port #)
translation pair
– incoming datagrams: replace (NAT IP address, new port
#) in dest fields of every incoming datagram with
corresponding (source IP address, port #) stored in NAT
table
NAT: network address translation
10.0.0.1
10.0.0.2
10.0.0.3
S: 10.0.0.1, 3345
D: 128.119.40.186, 80
1
10.0.0.4
138.76.29.7
1: host 10.0.0.1
sends datagram to
128.119.40.186, 80
NAT translation table
WAN side addr LAN side addr
138.76.29.7, 5001 10.0.0.1, 3345
…… ……
S: 128.119.40.186, 80
D: 10.0.0.1, 3345
4
S: 138.76.29.7, 5001
D: 128.119.40.186, 802
2: NAT router
changes datagram
source addr from
10.0.0.1, 3345 to
138.76.29.7, 5001,
updates table
S: 128.119.40.186, 80
D: 138.76.29.7, 5001 3
3: reply arrives
dest. address:
138.76.29.7, 5001
4: NAT router
changes datagram
dest addr from
138.76.29.7, 5001 to 10.0.0.1, 3345
NAT: network address translation
IGMP(Internet Group Management
Protocol)
• IGMP is a protocol that manages group
membership.
• The IGMP protocol gives the multicast routers
information about the membership status of
hosts (routers) connected to the network.
Position of IGMP in network layer
IGMP is a group management protocol.
It helps a multicast router create and
update a list of loyal members related
to each router interface.
Note:
IGMP messages types
• aggregate routers into
regions, “autonomous
systems” (AS)
• routers in same AS run
same routing protocol
– “intra-AS” routing
protocol
– routers in different AS
can run different intra-
AS routing protocol
gateway router:
• at “edge” of its own AS
• has link to router in
another AS
Hierarchical routing
3b
1d
3a
1c
2a
AS3
AS1
AS2
1a
2c
2b
1b
Intra-AS
Routing
algorithm
Inter-AS
Routing
algorithm
Forwarding
table
3c
Interconnected ASes
 forwarding table
configured by both intra-
and inter-AS routing
algorithm
 intra-AS sets entries
for internal dests
 inter-AS & intra-AS sets
entries for external
dests
Inter-AS tasks
 suppose router in AS1
receives datagram
destined outside of AS1:
 router should forward
packet to gateway
router, but which one?
AS1 must:
1. learn which dests are
reachable through AS2,
which through AS3
2. propagate this
reachability info to all
routers in AS1
job of inter-AS routing!
AS3
AS2
3b
3c
3a
AS1
1c
1a
1d
1b
2a
2c
2b
other
networks
other
networks
Intra-AS Routing
also known as interior gateway protocols (IGP)
most common intra-AS routing protocols:
 RIP: Routing Information Protocol
 OSPF: Open Shortest Path First
 IGRP: Interior Gateway Routing Protocol (Cisco
proprietary)
OSPF (Open Shortest Path First)
• “open”: publicly available
• uses link state algorithm
– route computation using Dijkstra’s algorithm
• OSPF advertisement carries one entry per
neighbor
• advertisements flooded to entire AS
– carried in OSPF messages directly over IP
OSPF “advanced” features (not in RIP)
• security: all OSPF messages authenticated (to
prevent malicious intrusion)
• multiple same-cost paths allowed (only one
path in RIP)
• for each link, multiple cost metrics for
different TOS(Type Of Service)
• integrated uni- and multicast support
• hierarchical OSPF in large domains.
Internet inter-AS routing: BGP
• BGP (Border Gateway Protocol): the de facto
inter-domain routing protocol
– “glue that holds the Internet together”
• BGP provides each AS a means to:
– eBGP: obtain subnet reachability information from
neighboring ASs.
– iBGP: propagate reachability information to all AS-
internal routers.
– determine “good” routes to other networks based
on reachability information and policy.
• allows subnet to advertise its existence to rest
of Internet: “I am here”
BGP basics
• when AS3 advertises a prefix to AS1:
– AS3 promises it will forward datagrams towards that prefix
– AS3 can aggregate prefixes in its advertisement
AS3
AS2
3b
3c
3a
AS1
1c
1a
1d
1b
2a
2c
2b
other
networks
other
networks
 BGP session: two BGP routers (“peers”) exchange BGP
messages:
 advertising paths to different destination network
 exchanged over semi-permanent TCP connections
BGP
message
BGP basics: distributing path information
AS3
AS2
3b
3a
AS1
1c
1a
1d
1b
2a
2c
2b
other
networks
other
networks
 using eBGP session between 3a and 1c, AS3 sends prefix
reachability info to AS1.
 1c can then use iBGP do distribute new prefix info to all routers in AS1
 1b can then re-advertise new reachability info to AS2 over 1b-to-2a
eBGP session
 when router learns of new prefix, it creates entry for prefix in
its forwarding table.
eBGP session
iBGP session
IPv6: motivation
• initial motivation: 32-bit address space soon
to be completely allocated.
• additional motivation:
– header format helps speed processing/forwarding
– header changes to facilitate QoS
IPv6 datagram format:
– fixed-length 40 byte header
– no fragmentation allowed
IPv6 datagram format
priority: identify priority among datagrams in flow
flow Label: identify datagrams in same “flow.”
(concept of“flow” not well defined).
next header: identify upper layer protocol for data
data
destination address
(128 bits)
source address
(128 bits)
payload len next hdr hop limit
flow labelpriver
32 bits
Other changes from IPv4
• checksum: removed entirely to reduce
processing time at each hop
• options: allowed, but outside of header,
indicated by “Next Header” field
• ICMPv6: new version of ICMP
– additional message types, e.g. “Packet Too Big
Transition from IPv4 to IPv6
• not all routers can be upgraded simultaneously
– no “flag days”
– how will network operate with mixed IPv4 and IPv6
routers?
• tunneling: IPv6 datagram carried as payload in
IPv4 datagram among IPv4 routers
IPv4 source, dest addr
IPv4 header fields
IPv4 datagram
IPv6 datagram
IPv4 payload
UDP/TCP payload
IPv6 source dest addr
IPv6 header fields
Tunneling
physical view:
IPv4 IPv4
A B
IPv6 IPv6
E
IPv6 IPv6
FC D
logical view:
IPv4 tunnel
connecting IPv6 routers
E
IPv6 IPv6
FA B
IPv6 IPv6
flow: X
src: A
dest: F
data
A-to-B:
IPv6
Flow: X
Src: A
Dest: F
data
src:B
dest: E
B-to-C:
IPv6 inside
IPv4
E-to-F:
IPv6
flow: X
src: A
dest: F
data
B-to-C:
IPv6 inside
IPv4
Flow: X
Src: A
Dest: F
data
src:B
dest: E
physical view:
A B
IPv6 IPv6
E
IPv6 IPv6
FC D
logical view:
IPv4 tunnel
connecting IPv6 routers
E
IPv6 IPv6
FA B
IPv6 IPv6
Tunneling
IPv4 IPv4
IPv6: adoption
• US National Institutes of Standards estimate
[2013]:
– ~3% of industry IP routers
– ~11% of US gov’t routers
• Long (long!) time for deployment, use
– 20 years and counting!
– think of application-level changes in last 20 years:
WWW, Facebook, …
– Why?

More Related Content

What's hot (20)

CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Switching
SwitchingSwitching
Switching
 
Network cable
Network cableNetwork cable
Network cable
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
network Switch
 network Switch network Switch
network Switch
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 

Viewers also liked

Overview of the graphics system
Overview of the graphics systemOverview of the graphics system
Overview of the graphics systemKamal Acharya
 
Micro Programmed Control Unit
Micro Programmed Control UnitMicro Programmed Control Unit
Micro Programmed Control UnitKamal Acharya
 
Array in c language
Array in c languageArray in c language
Array in c languagehome
 
Dedicated fully parallel architecture
Dedicated fully parallel architectureDedicated fully parallel architecture
Dedicated fully parallel architectureGhufran Hasan
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication ArchitectureKamal Acharya
 
Overview of Digital Communication
Overview of Digital CommunicationOverview of Digital Communication
Overview of Digital CommunicationKamal Acharya
 
Data Communication Principles
Data Communication PrinciplesData Communication Principles
Data Communication PrinciplesKamal Acharya
 
Ch1: Operating System- Introduction
Ch1: Operating System- IntroductionCh1: Operating System- Introduction
Ch1: Operating System- IntroductionAhmar Hashmi
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Ismail Mukiibi
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ahmar Hashmi
 
High Performance JavaScript - WebDirections USA 2010
High Performance JavaScript - WebDirections USA 2010High Performance JavaScript - WebDirections USA 2010
High Performance JavaScript - WebDirections USA 2010Nicholas Zakas
 
Dynamic Memory Allocation(DMA)
Dynamic Memory Allocation(DMA)Dynamic Memory Allocation(DMA)
Dynamic Memory Allocation(DMA)Kamal Acharya
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_FirewallsAhmar Hashmi
 

Viewers also liked (20)

Overview of the graphics system
Overview of the graphics systemOverview of the graphics system
Overview of the graphics system
 
Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
 
Strings in C
Strings in CStrings in C
Strings in C
 
Micro Programmed Control Unit
Micro Programmed Control UnitMicro Programmed Control Unit
Micro Programmed Control Unit
 
Array in C
Array in CArray in C
Array in C
 
Array in c language
Array in c languageArray in c language
Array in c language
 
Dedicated fully parallel architecture
Dedicated fully parallel architectureDedicated fully parallel architecture
Dedicated fully parallel architecture
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication Architecture
 
Overview of Digital Communication
Overview of Digital CommunicationOverview of Digital Communication
Overview of Digital Communication
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Data Communication Principles
Data Communication PrinciplesData Communication Principles
Data Communication Principles
 
Ch1: Operating System- Introduction
Ch1: Operating System- IntroductionCh1: Operating System- Introduction
Ch1: Operating System- Introduction
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)
 
High Performance JavaScript - WebDirections USA 2010
High Performance JavaScript - WebDirections USA 2010High Performance JavaScript - WebDirections USA 2010
High Performance JavaScript - WebDirections USA 2010
 
Dynamic Memory Allocation(DMA)
Dynamic Memory Allocation(DMA)Dynamic Memory Allocation(DMA)
Dynamic Memory Allocation(DMA)
 
Operating System
Operating SystemOperating System
Operating System
 
Pointers in C
Pointers in CPointers in C
Pointers in C
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 

Similar to Network Layer

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing ArchitectureShreehari Dhat
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Cisco discovery drs ent module 4 - v.4 in english.
Cisco discovery   drs ent module 4 - v.4 in english.Cisco discovery   drs ent module 4 - v.4 in english.
Cisco discovery drs ent module 4 - v.4 in english.igede tirtanata
 
Cisco discovery drs ent module 5 - v.4 in english.
Cisco discovery   drs ent module 5 - v.4 in english.Cisco discovery   drs ent module 5 - v.4 in english.
Cisco discovery drs ent module 5 - v.4 in english.igede tirtanata
 
Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 

Similar to Network Layer (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Mod6
Mod6Mod6
Mod6
 
Subnetting
SubnettingSubnetting
Subnetting
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
03_cidr.ppt
03_cidr.ppt03_cidr.ppt
03_cidr.ppt
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Cisco discovery drs ent module 4 - v.4 in english.
Cisco discovery   drs ent module 4 - v.4 in english.Cisco discovery   drs ent module 4 - v.4 in english.
Cisco discovery drs ent module 4 - v.4 in english.
 
Cisco discovery drs ent module 5 - v.4 in english.
Cisco discovery   drs ent module 5 - v.4 in english.Cisco discovery   drs ent module 5 - v.4 in english.
Cisco discovery drs ent module 5 - v.4 in english.
 
Day03
Day03 Day03
Day03
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 

More from Kamal Acharya

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computerKamal Acharya
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHPKamal Acharya
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in phpKamal Acharya
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPKamal Acharya
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data WarehousingKamal Acharya
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data MiningKamal Acharya
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data MiningKamal Acharya
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data miningKamal Acharya
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingKamal Acharya
 

More from Kamal Acharya (20)

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
 
Functions in php
Functions in phpFunctions in php
Functions in php
 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data Mining
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 

Recently uploaded (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 

Network Layer

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Classless Inter-Domain Routing (CIDR) • Basically the method that ISPs (Internet Service Providers) use to allocate an amount of addresses to a company, a home • Ex : 192.168.10.32/28 • The slash notation (/) means how many bits are turned on (1s)
  • 33. 11111111 Determining Available Host Addresses 172 16 0 0 10101100 00010000 00000000 00000000 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 Network Host 00000000 00000001 11111111 11111111 11111111 11111110 ... ... 00000000 00000011 11111101 1 2 3 65534 65535 65536 – ... 2 65534 N 2N – 2 = 216 – 2 = 65534
  • 34. IP Address Classes Exercise Address Class Network Host 10.2.1.1 128.63.2.100 201.222.5.64 192.6.141.2 130.113.64.16 256.241.201.10
  • 35. IP Address Classes Exercise Answers Address Class Network Host 10.2.1.1 128.63.2.100 201.222.5.64 192.6.141.2 130.113.64.16 256.241.201.10 A B C C B Nonexistent 10.0.0.0 128.63.0.0 201.222.5.0 192.6.141.0 130.113.0.0 0.2.1.1 0.0.2.100 0.0.0.64 0.0.0.2 0.0.64.16
  • 36. • Network 172.16.0.0 172.16.0.0 Addressing Without Subnets 172.16.0.1 172.16.0.2 172.16.0.3 …... 172.16.255.253 172.16.255.254
  • 37. • Network 172.16.0.0 Addressing with Subnets 172.16.1.0 172.16.2.0 172.16.3.0 172.16.4.0
  • 39. Subnet Addressing 172.16.2.200 172.16.2.2 172.16.2.160 172.16.2.1 172.16.3.5 172.16.3.100 172.16.3.150 172.16.3.1 E0 E1 172.16 2 160 Network Host . . Network Interface 172.16.2.0 172.16.3.0 E0 E1 New Routing Table Subnet
  • 40. Subnet Mask Exercise Address Subnet Mask Class Subnet 172.16.2.10 10.6.24.20 10.30.36.12 255.255.255.0 255.255.240.0 255.255.255.0
  • 41. Subnet Mask Exercise Answers Address Subnet Mask Class Subnet 172.16.2.10 10.6.24.20 10.30.36.12 255.255.255.0 255.255.240.0 255.255.255.0 B A A 172.16.2.0 10.6.16.0 10.30.36.0
  • 43. Exercise • 192.168.10.0 • /27 ? – SNM ? – Block Size ?- Subnets
  • 44. Exercise • /27 ? – SNM – 224 ? – Block Size = 256-224 = 32 ?- Subnets Subnets 10.0 10.32 10.64 FHID 10.1 10.33 LHID 10.30 10.62 Broadcast 10.31 10.63
  • 45. Exercise • 192.168.10.0 • /30 ? – SNM ? – Block Size ?- Subnets
  • 46. Exercise • /30 ? – SNM – 252 ? – Block Size = 256-252 = 4 ?- Subnets Subnets 10.0 10.4 10.8 FHID 10.1 10.5 LHID 10.2 10.6 Broadcast 10.3 10.7
  • 47. Exercise Mask Subnets Host /26 ? ? ? /27 ? ? ? /28 ? ? ? /29 ? ? ? /30 ? ? ?
  • 48. Exercise Mask Subnets Host /26 192 4 62 /27 224 8 30 /28 240 16 14 /29 248 32 6 /30 252 64 2
  • 54. Class B 172.16.0.0 /19 Subnets ? Hosts ? Block Size ?
  • 55. Class B 172.16.0.0 /19 Subnets 23 = 8 Hosts 213 -2 = 8190 Block Size 256-224 = 32 Subnets 0.0 32.0 64.0 96.0 FHID 0.1 32.1 64.1 96.1 LHID 31.254 63.254 95.254 127.254 Broadcast 31.255 63.255 95.255 127.255
  • 56. Class B 172.16.0.0 /27 Subnets ? Hosts ? Block Size ?
  • 57. Class B 172.16.0.0 /27 Subnets 211 = 2048 Hosts 25 -2 = 30 Block Size 256-224 = 32 Subnets 0.0 0.32 0.64 0.96 FHID 0.1 0.33 0.65 0.97 LHID 0.30 0.62 0.94 0.126 Broadcast 0.31 0.63 0.95 0.127
  • 58. Class B 172.16.0.0 /23 Subnets ? Hosts ? Block Size ?
  • 59. Class B 172.16.0.0 /23 Subnets 27 = 128 Hosts 29 -2 = 510 Block Size 256-254 = 2 Subnets 0.0 2.0 4.0 6.0 FHID 0.1 2.1 4.1 6.1 LHID 1.254 3.254 5.254 7.254 Broadcast 1.255 3.255 5.255 7.255
  • 60. Class B 172.16.0.0 /24 Subnets ? Hosts ? Block Size ?
  • 61. Class B 172.16.0.0 /24 Subnets 28 = 256 Hosts 28 -2 = 254 Block Size 256-255 = 1 Subnets 0.0 1.0 2.0 3.0 FHID 0.1 1.1 2.1 3.1 LHID 0.254 1.254 2.254 3.254 Broadcast 0.255 1.255 2.255 3.255
  • 62. Class B 172.16.0.0 /25 Subnets ? Hosts ? Block Size ?
  • 63. Class B 172.16.0.0 /25 Subnets 29 = 512 Hosts 27 -2 = 126 Block Size 256-128 = 128 Subnets 0.0 0.128 1.0 1.128 2.0 2.128 FHID 0.1 0.129 1.1 1.129 2.1 2.129 LHID 0.126 0.254 1.126 1.254 2.126 2.254 Broadcast 0.127 0.255 1.127 1.255 2.127 2.255
  • 64. Find out Subnet and Broadcast Address • 172.16.85.30/29
  • 65. Find out Subnet and Broadcast Address • 172.30.101.62/23
  • 66. Find out Subnet and Broadcast Address • 172.20.210.80/24
  • 67. Class A 10.0.0.0 /10 Subnets ? Hosts ? Block Size ?
  • 68. Class A 10.0.0.0 /10 Subnets 22 = 4 Hosts 222 -2 = 4194302 Block Size 256-192 = 64 Subnets 10.0 10.64 10.128 10.192 FHID 10.0.0.1 10.64.0.1 10.128.0.1 10.192.0.1 LHID 10.63.255.254 10.127.255.254 10.191.255.254 10.254.255.254 Broadcast 10.63.255.255 10.127.255.255 10.191.255.255 10.254.255.255
  • 69. Class A 10.0.0.0 /18 Subnets ? Hosts ? Block Size ?
  • 70. Class A 10.0.0.0 /18 Subnets 210 = 1024 Hosts 214 -2 = 16382 Block Size 256-192 = 64 Subnets 10.0.0.0 10.0.64.0 10.0.128.0 10.0.192.0 FHID 10.0.0.1 10.0.64.1 10.0.128.1 10.0.192.1 LHID 10.0.63.254 10.0.127.254 10.0.191.254 10.0.254.254 Broadcast 10.0.63.255 10.0.127.255 10.0.191.255 10.0.254.255
  • 71. VLSM(Variable Length Subnet Mask) • VLSM extends classic subnetting. • VLSM is a process of breaking down subnets into the smaller subnets, according to the need of individual networks.
  • 72. VLSM  An organization with a class C address and needs to have 5 subnets with the following number of hosts: 60, 60, 60, 30, 30.  The site cannot use a subnet mask with only 2 bits in the subnet section because this allows only 4 subnetworks each 62.  Nor can the site use a subnet mask with 3 bits in the subnet section because this allows 8 subnetworks each with 30 hosts.
  • 73. VLSM  The router uses 2 different masks, one applied after the other.  It first uses the masks with 26 1s(11111111 11111111 11111111 11000000 or 255.255.255.192) to divide the network into 4 subnets.  Then it applies the mask with 27 1s (11111111 11111111 11111111 11100000 or 255.255.255.224) to one of the subnets to divide it into two smaller subnets.
  • 74.
  • 76. • If an ISP has a 200.1.1.0 Network, he wants to give assign to 5 customers who need 20, 12, 6, 25, 18 hosts. – What should the subnet mask be? – What is the address range in each subnet? – What should the routing table entries be? – Can it be done efficiently to conserve IP addresses? Question
  • 78.
  • 79. Supernetting • Supernets are the opposite of Subnets in that they combine multiple Class C networks into blocks rather than dividing them into segments. • When Subnetting, we borrow bits from the Host ID portion, which increases the number of bits used for the Network ID portion. • With Supernetting we do exactly the opposite, meaning we take the bits from the Network ID portion and give them to the Host ID portion
  • 80. Supernet Masks  A supernet mask is the reverse of the subnet mask.  In a supernet mask, we change some 1s in the netid section to 0s.
  • 81. Example • With the supernet mask of 255.255.252.0 we can have 4 class C address combined into one supernetwork. • If we choose the first address to be X.Y.32.0, the other three addresses are X.Y.33.0, X.Y.34.0, and X.Y.35.0. • Whenever the router receives a packet, it applies the supernet mask to the destination address and compares the result to the lowest address. If the result and the lowest address are the same, the packet belongs to the supernet.
  • 82.
  • 83.
  • 84. NAT: network address translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 local network (e.g., home network) 10.0.0/24 rest of Internet datagrams with source or destination in this network have 10.0.0/24 address for source, destination (as usual) all datagrams leaving local network have same single source NAT IP address: 138.76.29.7,different
  • 85. motivation: local network uses just one IP address as far as outside world is concerned: – range of addresses not needed from ISP: just one IP address for all devices – can change addresses of devices in local network without notifying outside world – can change ISP without changing addresses of devices in local network – devices inside local net not explicitly addressable, visible by outside world (a security plus) NAT: network address translation
  • 86. implementation: NAT router must: – outgoing datagrams: replace (source IP address, port #) of every outgoing datagram to (NAT IP address, new port #) – remember (in NAT translation table) every (source IP address, port #) to (NAT IP address, new port #) translation pair – incoming datagrams: replace (NAT IP address, new port #) in dest fields of every incoming datagram with corresponding (source IP address, port #) stored in NAT table NAT: network address translation
  • 87. 10.0.0.1 10.0.0.2 10.0.0.3 S: 10.0.0.1, 3345 D: 128.119.40.186, 80 1 10.0.0.4 138.76.29.7 1: host 10.0.0.1 sends datagram to 128.119.40.186, 80 NAT translation table WAN side addr LAN side addr 138.76.29.7, 5001 10.0.0.1, 3345 …… …… S: 128.119.40.186, 80 D: 10.0.0.1, 3345 4 S: 138.76.29.7, 5001 D: 128.119.40.186, 802 2: NAT router changes datagram source addr from 10.0.0.1, 3345 to 138.76.29.7, 5001, updates table S: 128.119.40.186, 80 D: 138.76.29.7, 5001 3 3: reply arrives dest. address: 138.76.29.7, 5001 4: NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345 NAT: network address translation
  • 88.
  • 89.
  • 90.
  • 91.
  • 92. IGMP(Internet Group Management Protocol) • IGMP is a protocol that manages group membership. • The IGMP protocol gives the multicast routers information about the membership status of hosts (routers) connected to the network.
  • 93. Position of IGMP in network layer
  • 94. IGMP is a group management protocol. It helps a multicast router create and update a list of loyal members related to each router interface. Note:
  • 96. • aggregate routers into regions, “autonomous systems” (AS) • routers in same AS run same routing protocol – “intra-AS” routing protocol – routers in different AS can run different intra- AS routing protocol gateway router: • at “edge” of its own AS • has link to router in another AS Hierarchical routing
  • 97. 3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b Intra-AS Routing algorithm Inter-AS Routing algorithm Forwarding table 3c Interconnected ASes  forwarding table configured by both intra- and inter-AS routing algorithm  intra-AS sets entries for internal dests  inter-AS & intra-AS sets entries for external dests
  • 98. Inter-AS tasks  suppose router in AS1 receives datagram destined outside of AS1:  router should forward packet to gateway router, but which one? AS1 must: 1. learn which dests are reachable through AS2, which through AS3 2. propagate this reachability info to all routers in AS1 job of inter-AS routing! AS3 AS2 3b 3c 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks
  • 99. Intra-AS Routing also known as interior gateway protocols (IGP) most common intra-AS routing protocols:  RIP: Routing Information Protocol  OSPF: Open Shortest Path First  IGRP: Interior Gateway Routing Protocol (Cisco proprietary)
  • 100. OSPF (Open Shortest Path First) • “open”: publicly available • uses link state algorithm – route computation using Dijkstra’s algorithm • OSPF advertisement carries one entry per neighbor • advertisements flooded to entire AS – carried in OSPF messages directly over IP
  • 101. OSPF “advanced” features (not in RIP) • security: all OSPF messages authenticated (to prevent malicious intrusion) • multiple same-cost paths allowed (only one path in RIP) • for each link, multiple cost metrics for different TOS(Type Of Service) • integrated uni- and multicast support • hierarchical OSPF in large domains.
  • 102. Internet inter-AS routing: BGP • BGP (Border Gateway Protocol): the de facto inter-domain routing protocol – “glue that holds the Internet together” • BGP provides each AS a means to: – eBGP: obtain subnet reachability information from neighboring ASs. – iBGP: propagate reachability information to all AS- internal routers. – determine “good” routes to other networks based on reachability information and policy. • allows subnet to advertise its existence to rest of Internet: “I am here”
  • 103. BGP basics • when AS3 advertises a prefix to AS1: – AS3 promises it will forward datagrams towards that prefix – AS3 can aggregate prefixes in its advertisement AS3 AS2 3b 3c 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks  BGP session: two BGP routers (“peers”) exchange BGP messages:  advertising paths to different destination network  exchanged over semi-permanent TCP connections BGP message
  • 104. BGP basics: distributing path information AS3 AS2 3b 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks  using eBGP session between 3a and 1c, AS3 sends prefix reachability info to AS1.  1c can then use iBGP do distribute new prefix info to all routers in AS1  1b can then re-advertise new reachability info to AS2 over 1b-to-2a eBGP session  when router learns of new prefix, it creates entry for prefix in its forwarding table. eBGP session iBGP session
  • 105. IPv6: motivation • initial motivation: 32-bit address space soon to be completely allocated. • additional motivation: – header format helps speed processing/forwarding – header changes to facilitate QoS IPv6 datagram format: – fixed-length 40 byte header – no fragmentation allowed
  • 106. IPv6 datagram format priority: identify priority among datagrams in flow flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). next header: identify upper layer protocol for data data destination address (128 bits) source address (128 bits) payload len next hdr hop limit flow labelpriver 32 bits
  • 107. Other changes from IPv4 • checksum: removed entirely to reduce processing time at each hop • options: allowed, but outside of header, indicated by “Next Header” field • ICMPv6: new version of ICMP – additional message types, e.g. “Packet Too Big
  • 108. Transition from IPv4 to IPv6 • not all routers can be upgraded simultaneously – no “flag days” – how will network operate with mixed IPv4 and IPv6 routers? • tunneling: IPv6 datagram carried as payload in IPv4 datagram among IPv4 routers IPv4 source, dest addr IPv4 header fields IPv4 datagram IPv6 datagram IPv4 payload UDP/TCP payload IPv6 source dest addr IPv6 header fields
  • 109. Tunneling physical view: IPv4 IPv4 A B IPv6 IPv6 E IPv6 IPv6 FC D logical view: IPv4 tunnel connecting IPv6 routers E IPv6 IPv6 FA B IPv6 IPv6
  • 110. flow: X src: A dest: F data A-to-B: IPv6 Flow: X Src: A Dest: F data src:B dest: E B-to-C: IPv6 inside IPv4 E-to-F: IPv6 flow: X src: A dest: F data B-to-C: IPv6 inside IPv4 Flow: X Src: A Dest: F data src:B dest: E physical view: A B IPv6 IPv6 E IPv6 IPv6 FC D logical view: IPv4 tunnel connecting IPv6 routers E IPv6 IPv6 FA B IPv6 IPv6 Tunneling IPv4 IPv4
  • 111. IPv6: adoption • US National Institutes of Standards estimate [2013]: – ~3% of industry IP routers – ~11% of US gov’t routers • Long (long!) time for deployment, use – 20 years and counting! – think of application-level changes in last 20 years: WWW, Facebook, … – Why?