Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

C3.

Objectives
Identify the role of the Network Layer, as it describes communication from one end device to another end device Understand the principles used to guide the division or grouping of devices into networks Understand the hierarchical addressing of devices and how this allows communication between networks Explain the structure IP addressing and demonstrate the ability to convert between 8-bit binary and decimal numbers. Given an IPv4 address, classify by type and describe how it is used in the network Determine the network portion of the host address and explain the role of the subnet mask in dividing networks. Given IPv4 addressing information and design criteria, calculate the appropriate addressing components.
1

The Network layer, provides services to exchange the individual pieces of data over the network between identified end devices. To accomplished this end to end transport the segment will go through layer 3 processes:
To address the packet to the proper destination. Encapsulate the packet with necessary data for delivery. Route the packet through the web of connected network for delivery. The destination host decapsulate the data for processing.

The protocol used in the Internets network layer is the called the Internet Protocol (IP).

Communication from host to host


Four basic processes of network layer: addressing, encapsulation, routing, decapsulation.

Network Layer and Internet Protocol (IP)


Describe the role of framing in the Transport Layer and explain that segments are encapsulated as packets

Internet Protocol (IP) Frame Header

Time to Live (TTL) an 8 bit field that specifies the maximum hops the packet can take before it is considered lost or undeliverable. TTL value is decreased by one each time the packet is processed by a router (that is, each hop). When the value becomes zero, the router discards or drops the packet and it is removed from the network. TTL prevents a packet from circulating forever in the network. Protocol - an 8-bit value that specifies the upper layer protocol that will receive this packet after decapsulation. Header Checksum - used for storing error checking code. Source Address IP address of the sending host. Destination Address IP address of the receiving host. Options Additional fields to provide extra services. Is rarely used. Padding Used to fill in bits when header data does not end on a 32-bit boundary.

Version - indicates IP version, either 4 or 6. Internet Header Length (IHL) specifies the size of the packet header. Packet Length specifies the entire packet size (in bytes), including header and data. Identification, Flag and Fragmentation Offset Used for fragmentation. Enables fragmented IP packets to be reconstructed correctly by the receiving host.
5

Grouping Devices into Networks and Hierarchical Addressing

Grouping Devices into Networks and Hierarchical Addressing

Grouping Devices into Networks and Hierarchical Addressing

Network performance
Large number of hosts connected to a single network can produce a large amount of traffic.
This may stretch network resources (bandwidth, routing capability, etc).

Dividing a large network so that hosts who need to communicate are grouped together reduces the traffic across the internetworks.
Traffic only flows between hosts who commonly communicate with each other. Prevent other parts of the network from having to carry unrelated traffic.

Dividing a large network into smaller ones can also reduce the broadcast domain.
A broadcast is a message sent from one host to all other hosts in the network. Useful for certain applications such as DHCP. A broadcast is sent to all hosts in the same network. By having small networks, a broadcast sent by a host will only be sent to the other hosts in the sending hosts network.

Managing the size of broadcast domain ensures that network and host performances are not degraded to unacceptable levels.
9
10

Security issues
Not all hosts in the network should be accessible by everybody. It is important for the network to provide a way to restrict user access.
To ensure that data cannot be accessed by unauthorized users.

IP address
The 32-bit IPv4 address is hierarchical and is made up of two parts:
Network portion identifies the network. Host portion identifies the host on that network.

For convenience, IPv4 addresses are divided in four groups of eight bits (octets).
An octet is a binary number of eight digits, which equals the decimal numbers from 0 to 255. Each octet is converted to its decimal value and the complete address written as the four decimal values separated by a dot (period).

Security between networks is implemented using an intermediary device (a router or firewall) at the perimeter of the network.
Firewall is configured to permit only known, trusted user to access the network. Enable all access to network resources to be prohibited, allowed or monitored.

Example: 192.168.18.57
This format is called dotted-decimal notation.

11

12

Grouping Devices into Networks and Hierarchical Addressing


The network portion of an IP address is inherited down through a network hierarchy, as illustrated below. Each cloud symbolizes a network segment. Subnetting allows the network administrator to divide networks to meet different needs, while at the same time ensuring each host has a unique IP address.

The actual number of bits in the network portion is specified by the prefix length of the network address. Example: Say that we have a network address 172.6.4.0/24. The /24 network prefix means the leftmost 24 bits are the network portion of the address. The IP address 172.16.4.20 would be an IP address in the network: 172.16.4. 0 (network portion) host 20. Hosts in the same network must have the same bits for the network portion of their addresses.

13

14

IP Addressing Structure
Practice converting 8-bit binary to decimal

IP Addressing Structure
Convert decimal to 8-bit binary

15

16

IP Addressing Structure
Practice converting decimal to 8-bit binary

Classify and Define IPv4 Addresses

17

18

Classify and Define IPv4 Addresses Classify and Define IPv4 Addresses
In IPv4 network, hosts can communicate in one of three ways:
Unicastfrom one host to another host. Broadcast from one host to all other hosts in the network. Multicast from one host to a selected group of hosts. Private IP addresses are addresses that only valid within a certain private network. Public IP addresses are addresses that are publicly accessible from the Internet.

Each way require a different type of address to be put inside the destination address field in the IP header.

19

20

Classify and Define IPv4 Addresses


Identify the historic method for assigning addresses and the issues associated with the method

Subnet mask
Subnet mask and prefix length are two different ways of representing the same information which is to define the network portion of an IP address. Subnet mask is a 32-bit value, and uses a dotted decimal notation (same like IP address). Example: 255.255.255.0
In binary: 11111111 11111111 11111111 00000000 Value 1 in the subnet mask represents bit position of the network portion. Value 0 in the subnet mask represent bit position of the host portion.

21

22

Example: Given the IP address 172.16.4.35 and subnet mask 255.255.255.224, find the network address on which this IP address is located.

Determine the network portion of the host address and the role of the subnet mask
Describe how the subnet mask is used to create and specify the network and host portions of an IP address

Since subnet mask and prefix length can both be used to represent the same information, the question can also be rephrased like this: Find the network address of the IP address 172.16.3.35/17.

23

24

Determine the network portion of the host address and the role of the subnet mask
Use the subnet mask and ANDing process to extract the network address from the IP address.

Determine the network portion of the host address and the role of the subnet mask
Observe the steps in the ANDing of an IPv4 host address and subnet mask

25

26

Calculating Addresses
Given a pool of addresses and masks, assign a host parameter with address, mask and gateway

27

You might also like