SlideShare una empresa de Scribd logo
1 de 36
Addressing

The ‘What’ and ‘Where’ of
Communication
Addressing
   Addressing is necessary for any
    communication
    –   To talk: Appearance, name, …
    –   To call: Telephone numbers
    –   To mail: Postal address
    –   To visit: Postal address + directions
    –   To E-Mail: E-Mail addresses
    –   To instant message: ICQ#, AIM ID, etc.
   These ‘addresses’ allow us to uniquely
    identify the entity with which we wish to
    communicate
Addressing a la Shoch
   Name/Identifier: What
    – Names normally identify the entity
    – If an entity moves, the name/identity will remain
      the same
   Address: Where
    – Addresses identify the location of the entity
    – If an entity moves, the address will change
   Route: How to get there
    – Routes identify the path to get to an entity
    – If an entity moves, the route will change
Addressing

 Addressing deals with how to define an
  entity’s location (uniquely)
 Addressing is necessary for message
  delivery
    – An address is the start and end point for
      the route
      • However, routing is another subject
    – Where do we want the message to go?
Addresses
   We have already seen MAC addresses (for
    Ethernet and some other LANs):
    –   e.g. 02-60-8C-08-E1-0C
    –   6 octet address
    –   Globally unique
    –   Defined statically by the hardware manufacturer
   Most people are familiar with the IP
    addresses used by TCP/IP networks:
    –   e.g. 137.207.32.2
    –   4 octet address
    –   Not necessarily globally unique
    –   Defined dynamically by DHCP servers or
        negotiated by the operating system
IP Addressing

A Closer Look
IP Addresses
   TCP/IP networks use IP for the network layer
    protocol
   IP defines 4 octet addresses
    – 4 billion possible addresses
   Usually written in the form A.B.C.D
    – A, B, C, and D are each 1 octet (0-255), normally
      written in decimal notation
    – Thus, IP addresses fall in the range:
      0.0.0.0 – 255.255.255.255
IP Addresses
   Originally intended for separate
    internets (interconnected LANs)
    – Thus, the 32 bit size was not a concern
    – 48 bits is generally considered a fairly safe
      size for globally unique addressing
    – Computers connected to ARPANET (and
      later incarnations) were just given
      consecutive addresses
       1.0.0.0, 1.0.0.1, 1.0.0.2, …
IP Addresses

 Any computer connected to a TCP/IP
  network (e.g. the Internet) must have an
  IP address
 Further, any network interface card
  (NIC) using TCP/IP to access an
  network (e.g. the Internet) must have a
  different IP address
IP Addresses
 Even though there are 4 billion possible
  IP addresses, they are running out
 Here’s why:
    – Some of the bits are dedicated to header
      information (discussed later)
      • ½ the addresses for each lost bit
    – Addresses are categorized, and some of
      the categories are running out of
      addresses (while others are not)
Non-Classed Addresses
   Part of the address represented the network
    the computer resided on, and part
    represented the computer itself
    – Network: 7 bits (up to 128 networks)
    – Computer: 24 bits (up to 1.6 million computers on
      each network)
   Since there were very few networks on
    ARPANET originally, this wasn’t a problem
Address Classes
   When private organizations started
    joining the Internet, the needs became
    obvious
    – Some (fewer) networks have multitudes of
      computers (thousands)
       • e.g. The @Home network
    – Some (many) networks have very few
      computers (a few hundred or less)
       • e.g. The Windsor Police Department
Address Classes

   Quickly, the addresses were separated
    into 3 classes (plus room for more
    classes if needed):
    – Class A: Fewer networks, many nodes
    – Class B: Medium networks, medium nodes
    – Class C: Many networks, fewer nodes
IP Address Classes
    Class A:
bit index: 0    1-7                8-31
            0 network         host (machine)

    Class B:
bit index: 0 1       2-15                16-31
            1 0     network               host

    Class C:
bit index: 0 1 2     3-23                      24-31
            1 1 0   network                     host
IP Address Classes
   Class A:
    – Range: 1.0.0.0 – 126.0.0.0
    – Networks: 128 max, Machines: 65537-1.6 million
    – e.g. huge networks, such as large
      military/government organizations (e.g. FBI), the
      @Home network, etc…
   Class B:
    – Range: 128.1.0.0 – 191.255.0.0
    – Networks: 16384 max, Machines: 257-65536
    – e.g. Internet service providers (ISPs) (dial-up)
   Class C:
    – Range: 192.1.0.0 – 223.255.255.0
    – Networks: 2 million max, Machines: 1-256
    – e.g. Small businesses
IP Address Classes
   The IP address classes are self-identifying
    – Which means that given the address, you can
      determine what class an address is
       • Actually, using only the first number
    – Examples:
       • 137.207.32.2 (server.uwindsor.ca)
           – 137 -> Class B
       • 24.0.0.1 (@Home DHCP server)
           – 24 -> Class A
Other IP Address Classes
    Class D:
bit index: 0 1 2 3                     4-31
            1 1 1 0          Multicast group address
     •These addresses are used to represent multicast groups
        •Discussed later

    Class E:
bit index: 0 1 2 3 4                   5-31
            1 1 1 1 0          Reserved for future use
     •These addresses were left open to be used and divided
     into classes as needed
Special IP Addresses
   0.0.0.0: Used to indicate that this machine is
    without an assigned IP
    – Used during bootstrapping (e.g. requesting an IP
      from a DHCP server)
   <all 0s (binary)><hostID>: Used to send
    messages to some machine on this network
   255.255.255.255: Used to send broadcast
    messages across this machine’s network
   <netID><all 1s (binary)>: Used to send
    broadcast messages to the specified network
   127.0.0.1: Used to send messages back to
    this machine (called loopback or localhost)
IP Addressing Comments

   In IP addressing:
    – 0’s usually represent ‘this’
    – 1’s usually represent ‘all’
   Broadcasting, although discussed here
    in terms of addressing, will be
    discussed further
Loopback
   The 127.0.0.1 address, does not normally
    exist on the network
    – Either as the source address or destination
      address of a packet
   The address is used internally by NICs
    – When a NIC receives a message addressed with
      127.0.0.1 to be transmitted, it passes the message
      directly to the receiver hardware
    – The receiver hardware returns the message to the
      operating system exactly as if the message were
      received from the network
       • However, the message never entered the network
         medium
Internal IP Addresses
   Depending on the address class needed by
    an organization, a range of internal
    addresses is available:
    – Class A: 10.0.0.0 – 10.255.255.255
    – Class B: 172.16.0.0 – 172.31.255.255
    – Class C: 192.168.0.0 – 192.168.255.255
   IP routers outside a private (connection-
    shared) network, will not forward datagrams
    designated for addresses in these ranges
Multi-homed Machines

   There is no restriction preventing
    machines from participating in multiple
    networks
    – A machine could have multiple NICs
    – Each NIC would have its own MAC
      address
    – On TCP/IP networks, each of these NICs
      would be given a different IP address
Routers
   Routers are multi-homed machines
    – They have a number of network ports, each of
      which represents a different path
   Routers use tables that relate destinations to
    network paths
    – Internet routers relate destination network
      addresses with one of their network ports
    – When a datagram arrives at a router:
       • Its destination address is used to determine the network
         address
       • The network address is used to look up the destination
         port in the routing table
Network Addresses
   An IP address can be used to calculate the
    address of the network
   The machine address is passed through a
    filter (called a subnet filter):
    – This filter extracts the bits of the address that
      represent the network and sets the bits that
      represent the machine to zero
    – The filter determines which part of the address
      represent the network address, by using the
      subnet mask
Subnet Mask
   The subnet mask is a binary number, that has
    0s in the machine portion of the address, and
    1s in the network portion
   Most networks of each type use a constant
    subnet mask
    – Class A: 255.0.0.0
       (Binary: 11111111000000000000000000000000)
    – Class B: 255.255.0.0
       (Binary: 11111111111111110000000000000000)
    – Class C: 255.255.255.0
       (Binary: 11111111111111111111111100000000)
Using Subnet Masks

   Example:
    – Address: 137.207.32.2
    – Subnet Mask: 255.255.0.0
Address:     10001001110011110010000000000010
Mask:        11111111111111110000000000000000
Net Address: 10001001110011110000000000000000
   Network address: 137.207.0.0
IPv6

Next Generation Addressing
in TCP/IP Networks
IPv6
 Due to the limited nature of existing IP
  addressing (IPv4), a new version of IP
  addressing was developed
 This new scheme uses 16 octets for
  addresses, instead of 4 octets
 Written using hex notation:


3A57:0000:0000:9CD5:3412:912D:6738:1928
IPv6 Features
   16 octet addresses (128 bits)
   Larger numbers of address classes
    – More accurate control of network/machine counts
   Variable-sized headers
    – Optional information can be placed into the header
      when needed
    – Reduces header size in most cases
   Extendible protocol
    – IPv6 allows for new header information to be
      added to support different protocols
IPv6 Features
   Automatically reconfigurable
    – Addresses can be automatically reassigned
      dynamically
    – e.g. when a certain number of nodes join the
      network, a different address class may be desired
   Autoconfigurable
    – The use of autoconfiguration (such as DHCP)
      allows dynamic private addressing and dynamic
      public addressing
IPv6 Datagram Format

              optional


 header   extension headers   data
IPv6 Header Format
0             4                   12                                   31
    version       traffic class              flow label


32                                     48             56           63
         payload length                 next header        hop limit


64                                     96                          128

         source address                     destination address
IPv6 Integration
   Will IPv6 replace IP addresses?
    – Who knows?
   Currently, temporary solutions have made
    IPv4 addresses capable of lasting longer than
    originally predicted
   If and when IPv6 is to be integrated, the
    process must be a transition
    – Closing the entire Internet down to convert
      hardware and software to IPv6 not going to
      happen
    – Some stations may take longer to transition than
      other stations
       • e.g. Bob’s Internet Shack vs. the Telus Network
IPv6 Integration
    NAT (network address translators) provide one
     example of such a temporary solution
    NATs provide three benefits:
    1.   NATs provide IP masquerading
         •   Messages using these addresses pass through a network
             address translator (NAT) to be transformed into external IPs
    2.   NATs provide IP sharing
         •   ISPs for example, have many customers, but significantly
             less at any given time are logged onto their system
             –   IP addresses can be assigned dynamically to these customers
                 when they log in
    3.   NATs provide schemes to allow networks to use either
         IPv4 or IPv6
         –   Addresses would be converted as they pass through a NAT
IPv6 Integration
   Another method that may be used for the
    transition between IPv4 and IPv6 is address
    inclusion:
    –   IPv4 addresses could be embedded into IPv6
        addresses
        •   Translation between the two types of addresses is
            possible without any other information
    –   Some problems exist with this approach, but in
        general it simplifies communication between
        IPv6 networks and IPv4
Special IPv6 Addresses
   0:0:0:0:0:0:0:0 Used to indicate that this
    machine is without an assigned IP
    – Used during bootstrapping (e.g. requesting an IP
      from a DHCP server)
   0:0:0:0:0:0:0:1 Used to send messages back
    to this machine (called loopback)
    – These two addresses are not valid on the actual
      network medium (same as with IPv4)
   00:… Reserved (including IPv4 and IPX
    address inclusion)
   FF:… Multicast addresses

Más contenido relacionado

La actualidad más candente

Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
IP Address
IP AddressIP Address
IP AddressRahul P
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer NetworksJanki Shah
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
Classless inter domain routing
Classless inter domain routingClassless inter domain routing
Classless inter domain routingVikash Gangwar
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 

La actualidad más candente (20)

Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
IP Address
IP AddressIP Address
IP Address
 
IPv4
IPv4IPv4
IPv4
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Classless inter domain routing
Classless inter domain routingClassless inter domain routing
Classless inter domain routing
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Ip address
Ip addressIp address
Ip address
 

Destacado

Island Photo Center
Island Photo Center Island Photo Center
Island Photo Center Zandro Steve
 
NIssan NV Cargo Van - California
NIssan NV Cargo Van - CaliforniaNIssan NV Cargo Van - California
NIssan NV Cargo Van - CaliforniaSCOTT FOY
 
Enfermeros en Reino Unido
Enfermeros en Reino UnidoEnfermeros en Reino Unido
Enfermeros en Reino UnidoMundo Spanish
 
القضاء في العراق
القضاء في العراقالقضاء في العراق
القضاء في العراقahmed rahmouni
 
CWAID meetup - WAI update 2015
CWAID meetup -  WAI update 2015CWAID meetup -  WAI update 2015
CWAID meetup - WAI update 2015Andrew Arch
 
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS""AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"DREAMWISHMAKER
 

Destacado (6)

Island Photo Center
Island Photo Center Island Photo Center
Island Photo Center
 
NIssan NV Cargo Van - California
NIssan NV Cargo Van - CaliforniaNIssan NV Cargo Van - California
NIssan NV Cargo Van - California
 
Enfermeros en Reino Unido
Enfermeros en Reino UnidoEnfermeros en Reino Unido
Enfermeros en Reino Unido
 
القضاء في العراق
القضاء في العراقالقضاء في العراق
القضاء في العراق
 
CWAID meetup - WAI update 2015
CWAID meetup -  WAI update 2015CWAID meetup -  WAI update 2015
CWAID meetup - WAI update 2015
 
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS""AMÉRICA; DE PIRATAS Y TEMPLARIOS"
"AMÉRICA; DE PIRATAS Y TEMPLARIOS"
 

Similar a Addressing

SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsAniekan Akpaffiong
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptssuserde23af
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3VISHNU N
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routingVikas Jagtap
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptListonKiwoli1
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-finalTaymoor Nazmy
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 

Similar a Addressing (20)

SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS Administrators
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.ppt
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
lecture 6.pptx
lecture 6.pptxlecture 6.pptx
lecture 6.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 

Más de Gichelle Amon (20)

Kerberos
KerberosKerberos
Kerberos
 
Network security
Network securityNetwork security
Network security
 
Os module 2 d
Os module 2 dOs module 2 d
Os module 2 d
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Lec3 final
Lec3 finalLec3 final
Lec3 final
 
Lec 3
Lec 3Lec 3
Lec 3
 
Lec2 final
Lec2 finalLec2 final
Lec2 final
 
Lec 4
Lec 4Lec 4
Lec 4
 
Lec1 final
Lec1 finalLec1 final
Lec1 final
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contracts
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architecture
 
Time triggered arch.
Time triggered arch.Time triggered arch.
Time triggered arch.
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Os module 2 ba
Os module 2 baOs module 2 ba
Os module 2 ba
 
Lec5
Lec5Lec5
Lec5
 
Delivery
DeliveryDelivery
Delivery
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 
Medical image analysis
Medical image analysisMedical image analysis
Medical image analysis
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Addressing

  • 1. Addressing The ‘What’ and ‘Where’ of Communication
  • 2. Addressing  Addressing is necessary for any communication – To talk: Appearance, name, … – To call: Telephone numbers – To mail: Postal address – To visit: Postal address + directions – To E-Mail: E-Mail addresses – To instant message: ICQ#, AIM ID, etc.  These ‘addresses’ allow us to uniquely identify the entity with which we wish to communicate
  • 3. Addressing a la Shoch  Name/Identifier: What – Names normally identify the entity – If an entity moves, the name/identity will remain the same  Address: Where – Addresses identify the location of the entity – If an entity moves, the address will change  Route: How to get there – Routes identify the path to get to an entity – If an entity moves, the route will change
  • 4. Addressing  Addressing deals with how to define an entity’s location (uniquely)  Addressing is necessary for message delivery – An address is the start and end point for the route • However, routing is another subject – Where do we want the message to go?
  • 5. Addresses  We have already seen MAC addresses (for Ethernet and some other LANs): – e.g. 02-60-8C-08-E1-0C – 6 octet address – Globally unique – Defined statically by the hardware manufacturer  Most people are familiar with the IP addresses used by TCP/IP networks: – e.g. 137.207.32.2 – 4 octet address – Not necessarily globally unique – Defined dynamically by DHCP servers or negotiated by the operating system
  • 7. IP Addresses  TCP/IP networks use IP for the network layer protocol  IP defines 4 octet addresses – 4 billion possible addresses  Usually written in the form A.B.C.D – A, B, C, and D are each 1 octet (0-255), normally written in decimal notation – Thus, IP addresses fall in the range: 0.0.0.0 – 255.255.255.255
  • 8. IP Addresses  Originally intended for separate internets (interconnected LANs) – Thus, the 32 bit size was not a concern – 48 bits is generally considered a fairly safe size for globally unique addressing – Computers connected to ARPANET (and later incarnations) were just given consecutive addresses 1.0.0.0, 1.0.0.1, 1.0.0.2, …
  • 9. IP Addresses  Any computer connected to a TCP/IP network (e.g. the Internet) must have an IP address  Further, any network interface card (NIC) using TCP/IP to access an network (e.g. the Internet) must have a different IP address
  • 10. IP Addresses  Even though there are 4 billion possible IP addresses, they are running out  Here’s why: – Some of the bits are dedicated to header information (discussed later) • ½ the addresses for each lost bit – Addresses are categorized, and some of the categories are running out of addresses (while others are not)
  • 11. Non-Classed Addresses  Part of the address represented the network the computer resided on, and part represented the computer itself – Network: 7 bits (up to 128 networks) – Computer: 24 bits (up to 1.6 million computers on each network)  Since there were very few networks on ARPANET originally, this wasn’t a problem
  • 12. Address Classes  When private organizations started joining the Internet, the needs became obvious – Some (fewer) networks have multitudes of computers (thousands) • e.g. The @Home network – Some (many) networks have very few computers (a few hundred or less) • e.g. The Windsor Police Department
  • 13. Address Classes  Quickly, the addresses were separated into 3 classes (plus room for more classes if needed): – Class A: Fewer networks, many nodes – Class B: Medium networks, medium nodes – Class C: Many networks, fewer nodes
  • 14. IP Address Classes Class A: bit index: 0 1-7 8-31 0 network host (machine) Class B: bit index: 0 1 2-15 16-31 1 0 network host Class C: bit index: 0 1 2 3-23 24-31 1 1 0 network host
  • 15. IP Address Classes  Class A: – Range: 1.0.0.0 – 126.0.0.0 – Networks: 128 max, Machines: 65537-1.6 million – e.g. huge networks, such as large military/government organizations (e.g. FBI), the @Home network, etc…  Class B: – Range: 128.1.0.0 – 191.255.0.0 – Networks: 16384 max, Machines: 257-65536 – e.g. Internet service providers (ISPs) (dial-up)  Class C: – Range: 192.1.0.0 – 223.255.255.0 – Networks: 2 million max, Machines: 1-256 – e.g. Small businesses
  • 16. IP Address Classes  The IP address classes are self-identifying – Which means that given the address, you can determine what class an address is • Actually, using only the first number – Examples: • 137.207.32.2 (server.uwindsor.ca) – 137 -> Class B • 24.0.0.1 (@Home DHCP server) – 24 -> Class A
  • 17. Other IP Address Classes Class D: bit index: 0 1 2 3 4-31 1 1 1 0 Multicast group address •These addresses are used to represent multicast groups •Discussed later Class E: bit index: 0 1 2 3 4 5-31 1 1 1 1 0 Reserved for future use •These addresses were left open to be used and divided into classes as needed
  • 18. Special IP Addresses  0.0.0.0: Used to indicate that this machine is without an assigned IP – Used during bootstrapping (e.g. requesting an IP from a DHCP server)  <all 0s (binary)><hostID>: Used to send messages to some machine on this network  255.255.255.255: Used to send broadcast messages across this machine’s network  <netID><all 1s (binary)>: Used to send broadcast messages to the specified network  127.0.0.1: Used to send messages back to this machine (called loopback or localhost)
  • 19. IP Addressing Comments  In IP addressing: – 0’s usually represent ‘this’ – 1’s usually represent ‘all’  Broadcasting, although discussed here in terms of addressing, will be discussed further
  • 20. Loopback  The 127.0.0.1 address, does not normally exist on the network – Either as the source address or destination address of a packet  The address is used internally by NICs – When a NIC receives a message addressed with 127.0.0.1 to be transmitted, it passes the message directly to the receiver hardware – The receiver hardware returns the message to the operating system exactly as if the message were received from the network • However, the message never entered the network medium
  • 21. Internal IP Addresses  Depending on the address class needed by an organization, a range of internal addresses is available: – Class A: 10.0.0.0 – 10.255.255.255 – Class B: 172.16.0.0 – 172.31.255.255 – Class C: 192.168.0.0 – 192.168.255.255  IP routers outside a private (connection- shared) network, will not forward datagrams designated for addresses in these ranges
  • 22. Multi-homed Machines  There is no restriction preventing machines from participating in multiple networks – A machine could have multiple NICs – Each NIC would have its own MAC address – On TCP/IP networks, each of these NICs would be given a different IP address
  • 23. Routers  Routers are multi-homed machines – They have a number of network ports, each of which represents a different path  Routers use tables that relate destinations to network paths – Internet routers relate destination network addresses with one of their network ports – When a datagram arrives at a router: • Its destination address is used to determine the network address • The network address is used to look up the destination port in the routing table
  • 24. Network Addresses  An IP address can be used to calculate the address of the network  The machine address is passed through a filter (called a subnet filter): – This filter extracts the bits of the address that represent the network and sets the bits that represent the machine to zero – The filter determines which part of the address represent the network address, by using the subnet mask
  • 25. Subnet Mask  The subnet mask is a binary number, that has 0s in the machine portion of the address, and 1s in the network portion  Most networks of each type use a constant subnet mask – Class A: 255.0.0.0 (Binary: 11111111000000000000000000000000) – Class B: 255.255.0.0 (Binary: 11111111111111110000000000000000) – Class C: 255.255.255.0 (Binary: 11111111111111111111111100000000)
  • 26. Using Subnet Masks  Example: – Address: 137.207.32.2 – Subnet Mask: 255.255.0.0 Address: 10001001110011110010000000000010 Mask: 11111111111111110000000000000000 Net Address: 10001001110011110000000000000000  Network address: 137.207.0.0
  • 28. IPv6  Due to the limited nature of existing IP addressing (IPv4), a new version of IP addressing was developed  This new scheme uses 16 octets for addresses, instead of 4 octets  Written using hex notation: 3A57:0000:0000:9CD5:3412:912D:6738:1928
  • 29. IPv6 Features  16 octet addresses (128 bits)  Larger numbers of address classes – More accurate control of network/machine counts  Variable-sized headers – Optional information can be placed into the header when needed – Reduces header size in most cases  Extendible protocol – IPv6 allows for new header information to be added to support different protocols
  • 30. IPv6 Features  Automatically reconfigurable – Addresses can be automatically reassigned dynamically – e.g. when a certain number of nodes join the network, a different address class may be desired  Autoconfigurable – The use of autoconfiguration (such as DHCP) allows dynamic private addressing and dynamic public addressing
  • 31. IPv6 Datagram Format optional header extension headers data
  • 32. IPv6 Header Format 0 4 12 31 version traffic class flow label 32 48 56 63 payload length next header hop limit 64 96 128 source address destination address
  • 33. IPv6 Integration  Will IPv6 replace IP addresses? – Who knows?  Currently, temporary solutions have made IPv4 addresses capable of lasting longer than originally predicted  If and when IPv6 is to be integrated, the process must be a transition – Closing the entire Internet down to convert hardware and software to IPv6 not going to happen – Some stations may take longer to transition than other stations • e.g. Bob’s Internet Shack vs. the Telus Network
  • 34. IPv6 Integration  NAT (network address translators) provide one example of such a temporary solution  NATs provide three benefits: 1. NATs provide IP masquerading • Messages using these addresses pass through a network address translator (NAT) to be transformed into external IPs 2. NATs provide IP sharing • ISPs for example, have many customers, but significantly less at any given time are logged onto their system – IP addresses can be assigned dynamically to these customers when they log in 3. NATs provide schemes to allow networks to use either IPv4 or IPv6 – Addresses would be converted as they pass through a NAT
  • 35. IPv6 Integration  Another method that may be used for the transition between IPv4 and IPv6 is address inclusion: – IPv4 addresses could be embedded into IPv6 addresses • Translation between the two types of addresses is possible without any other information – Some problems exist with this approach, but in general it simplifies communication between IPv6 networks and IPv4
  • 36. Special IPv6 Addresses  0:0:0:0:0:0:0:0 Used to indicate that this machine is without an assigned IP – Used during bootstrapping (e.g. requesting an IP from a DHCP server)  0:0:0:0:0:0:0:1 Used to send messages back to this machine (called loopback) – These two addresses are not valid on the actual network medium (same as with IPv4)  00:… Reserved (including IPv4 and IPX address inclusion)  FF:… Multicast addresses