SlideShare una empresa de Scribd logo
1 de 20
IPv4
GROUP MEMBER : SHAKEEL KHAN
TAJAMMUL
SHAH
Internet Protocol
The Internet Protocol (IP) is the principal communications
protocol in the Internet protocol suite for relaying datagrams
across network boundaries.
OR
An IP address is an identifier for a particular machine on a
particular network. It is part of a scheme to identify computers
on the internet.
IP address consists of 2 components the network id and the
host id.
IPv4
Internet Protocol version 4 (IPv4) is the fourth version in the
development of the Internet Protocol (IP) Internet, and routes
most traffic on the Internet .
IPv4 is a connectionless protocol for use on packet-switched
networks.
Most widely used protocol at present
IPv4 Addresses
An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for example, a
computer or a router) to the Internet.
The IPv4 addresses are unique and universal.
They are unique in the sense that each address defines one,
and only one, connection to the Internet.
The IPv4 addresses are universal in the sense that the
addressing system must be accepted by any host that wants to
be connected to the Internet.
Address Space
An address space is the total number of addresses used by the
protocol.
IPv4 allows 232 unique address which section of IP address
show the network id & which section show the machine or host
id depend on the class network.
IPv4 uses 32-bit addresses, which means that the address
space is 232 or 4,294,967,296 .
This means that, if there were no restrictions, more than 4 billion
devices could be connected to the Internet.
Notation
There are two prevalent notations to show an IPv4 address:
1)binary notation
2)dotted-decimal notation.
binary notation vs Dot-decimal notation
In binary notation, the IPv4 address is displayed as 32 bits.
Each octet is often referred to as a byte.
The following is an example of an IPv4 address in binary
notation: 01110101 10010101 00011101 00000010
Dot-decimal notation is a presentation format for numerical
data.
The following is an example of an IPv4 address in DD notation:
Rules for Ipv4 notations
 There must be no leading zero (045).
 There can be no more than four numbers in an IPv4 address.
 Each number needs to be less than or equal to 255 .
 A mixture of binary notation and dotted-decimal notation is
not allowed.
IPv4 classes
There are five classes of IP addresses:-
 Class A
 Class B
 Class C
 Class D
 Class E
Class A
 The first byte is a network id (8 bits) & the last 3 bytes are for
host id (24 bits).
 The first bit is ‘0’.
 Range of network number-1.0.0.0 to 126.0.0.0
 Number of possible networks-127(1-126 usable, 127 is reserve)
 Number of possible values in the host portion-16,777,216
 It is used for large network.
Class B
 The first 2 bytes are a network id (16 bits) & the last 2 bytes are
for host id (16 bits).
 The first 2 bits are ‘10’.
 Range of network number- 128.0.0.0 to 191.255.0.0
 Number of possible networks- 16,384
 Number of possible values in the host portion- 65536
 Used for medium size network.
Class C
 The first 3 bytes are a network id (24 bits) & the last 1 byte
are for host id (8 bit).
 The first 3 bits are ‘110’.
 Range of network number- 192.0.0.0 to 223.255.255.0
 Number of possible networks- 2,097,152
 Number of possible values in the host portion- 256
 Used in local area network(LAN).
Class D
 An IP address which belong to class D has the first octet has
its 4bit set to ‘1110’.
 Range of network number- 224.0.0.0 to 239.255.255.255
 Used for multicasting
Class E
 It reserved for experimental & for future testing purpose.
 Range of network number-
240.0.0.0 to 255.255.255.254
Mask
 Although the length of the network id and host id (in bits) is
predetermined in classful addressing, we can also use a
mask (also called the default mask), a 32-bit number made of
contiguous 1s followed by contiguous 0s.
 The concept does not apply to classes D and E.
Mask Cont…
 The mask can help us to find the network id and the host id
 For example, the mask for a class A address has eight 1s,
which means the first 8 bits of any address in class A define
the network id; the next 24 bits define the host id.
 The last column of Table shows the mask in the form /n
where n can be 8, 16, or 24 in classful addressing. This
notation is also called slash notation or Classless
Interdomain Routing (CIDR) notation.
Problems of IPv4
 Insufficiency
 Only four bytes
Maximum nodes ~ 4.3 billion
Much less than the human population (6.799 billion)
 Not enough for growing number of users
 Will be exhausted in near future
 Increasing routing information
 Rapid growth of routing tables in backbones
 Increasing the number of Network Address Translation
 Breaking the Internet architecture
Cont…
 Security issues
 Number of ways to encrypt IPv4 traffic Example: IPSec
 No real standard encryption method
 Real-time delivery of multimedia content and necessary
bandwidth allocation
 Quality of Service (QoS)
 Different interpretations
 QoS compliant devices are not compatible one another
Any Question…
THANK YOU

Más contenido relacionado

La actualidad más candente (20)

ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
IP Address
IP AddressIP Address
IP Address
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Address
IP AddressIP Address
IP Address
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Ip address
Ip addressIp address
Ip address
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Similar a IPv4 Addressing Fundamentals Explained

https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/Rathodpradip1
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptListonKiwoli1
 
6 ccna (fundamentals of i pv4 addressing and routing)
6  ccna (fundamentals of i pv4 addressing and routing)6  ccna (fundamentals of i pv4 addressing and routing)
6 ccna (fundamentals of i pv4 addressing and routing)Ulaş Ural
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxDESTROYER39
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4praveenps17
 
IPv4 & IPv6 .pptx
IPv4 & IPv6 .pptxIPv4 & IPv6 .pptx
IPv4 & IPv6 .pptxhakxcore
 

Similar a IPv4 Addressing Fundamentals Explained (20)

https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
IP & MAC Addressing
IP & MAC Addressing IP & MAC Addressing
IP & MAC Addressing
 
Ramakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressingRamakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressing
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.ppt
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
 
6 ccna (fundamentals of i pv4 addressing and routing)
6  ccna (fundamentals of i pv4 addressing and routing)6  ccna (fundamentals of i pv4 addressing and routing)
6 ccna (fundamentals of i pv4 addressing and routing)
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
chapter 6.pptx
chapter 6.pptxchapter 6.pptx
chapter 6.pptx
 
Ip and mac addressing
Ip and mac addressingIp and mac addressing
Ip and mac addressing
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Ip address
Ip addressIp address
Ip address
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
 
Subnet Design
Subnet DesignSubnet Design
Subnet Design
 
Index
IndexIndex
Index
 
Index
IndexIndex
Index
 
Ip address
Ip address Ip address
Ip address
 
IPv4 & IPv6 .pptx
IPv4 & IPv6 .pptxIPv4 & IPv6 .pptx
IPv4 & IPv6 .pptx
 
Day 2.2 ip addressing
Day 2.2 ip addressingDay 2.2 ip addressing
Day 2.2 ip addressing
 
IP and MAC addressing
IP and MAC addressingIP and MAC addressing
IP and MAC addressing
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

IPv4 Addressing Fundamentals Explained

  • 1. IPv4 GROUP MEMBER : SHAKEEL KHAN TAJAMMUL SHAH
  • 2. Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. OR An IP address is an identifier for a particular machine on a particular network. It is part of a scheme to identify computers on the internet. IP address consists of 2 components the network id and the host id.
  • 3. IPv4 Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) Internet, and routes most traffic on the Internet . IPv4 is a connectionless protocol for use on packet-switched networks. Most widely used protocol at present
  • 4. IPv4 Addresses An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet. The IPv4 addresses are unique and universal. They are unique in the sense that each address defines one, and only one, connection to the Internet. The IPv4 addresses are universal in the sense that the addressing system must be accepted by any host that wants to be connected to the Internet.
  • 5. Address Space An address space is the total number of addresses used by the protocol. IPv4 allows 232 unique address which section of IP address show the network id & which section show the machine or host id depend on the class network. IPv4 uses 32-bit addresses, which means that the address space is 232 or 4,294,967,296 . This means that, if there were no restrictions, more than 4 billion devices could be connected to the Internet.
  • 6. Notation There are two prevalent notations to show an IPv4 address: 1)binary notation 2)dotted-decimal notation.
  • 7. binary notation vs Dot-decimal notation In binary notation, the IPv4 address is displayed as 32 bits. Each octet is often referred to as a byte. The following is an example of an IPv4 address in binary notation: 01110101 10010101 00011101 00000010 Dot-decimal notation is a presentation format for numerical data. The following is an example of an IPv4 address in DD notation:
  • 8. Rules for Ipv4 notations  There must be no leading zero (045).  There can be no more than four numbers in an IPv4 address.  Each number needs to be less than or equal to 255 .  A mixture of binary notation and dotted-decimal notation is not allowed.
  • 9. IPv4 classes There are five classes of IP addresses:-  Class A  Class B  Class C  Class D  Class E
  • 10. Class A  The first byte is a network id (8 bits) & the last 3 bytes are for host id (24 bits).  The first bit is ‘0’.  Range of network number-1.0.0.0 to 126.0.0.0  Number of possible networks-127(1-126 usable, 127 is reserve)  Number of possible values in the host portion-16,777,216  It is used for large network.
  • 11. Class B  The first 2 bytes are a network id (16 bits) & the last 2 bytes are for host id (16 bits).  The first 2 bits are ‘10’.  Range of network number- 128.0.0.0 to 191.255.0.0  Number of possible networks- 16,384  Number of possible values in the host portion- 65536  Used for medium size network.
  • 12. Class C  The first 3 bytes are a network id (24 bits) & the last 1 byte are for host id (8 bit).  The first 3 bits are ‘110’.  Range of network number- 192.0.0.0 to 223.255.255.0  Number of possible networks- 2,097,152  Number of possible values in the host portion- 256  Used in local area network(LAN).
  • 13. Class D  An IP address which belong to class D has the first octet has its 4bit set to ‘1110’.  Range of network number- 224.0.0.0 to 239.255.255.255  Used for multicasting
  • 14. Class E  It reserved for experimental & for future testing purpose.  Range of network number- 240.0.0.0 to 255.255.255.254
  • 15. Mask  Although the length of the network id and host id (in bits) is predetermined in classful addressing, we can also use a mask (also called the default mask), a 32-bit number made of contiguous 1s followed by contiguous 0s.  The concept does not apply to classes D and E.
  • 16. Mask Cont…  The mask can help us to find the network id and the host id  For example, the mask for a class A address has eight 1s, which means the first 8 bits of any address in class A define the network id; the next 24 bits define the host id.  The last column of Table shows the mask in the form /n where n can be 8, 16, or 24 in classful addressing. This notation is also called slash notation or Classless Interdomain Routing (CIDR) notation.
  • 17. Problems of IPv4  Insufficiency  Only four bytes Maximum nodes ~ 4.3 billion Much less than the human population (6.799 billion)  Not enough for growing number of users  Will be exhausted in near future  Increasing routing information  Rapid growth of routing tables in backbones  Increasing the number of Network Address Translation  Breaking the Internet architecture
  • 18. Cont…  Security issues  Number of ways to encrypt IPv4 traffic Example: IPSec  No real standard encryption method  Real-time delivery of multimedia content and necessary bandwidth allocation  Quality of Service (QoS)  Different interpretations  QoS compliant devices are not compatible one another