Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

CHAPTER 5

IP Protocol and
Network
Applications

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
IP Protocol
❑ At the network layer, TCP/IP model supports the
internetwork (IP) protocol. It is unreliable and connection
less protocol.
❑ IP provides no error checking. IP provides no error control
or flow control. IP uses only error detection mechanism
and discards the corrupted packet.
❑ Datagram is a variable length packet consisting of two
parts
1. Header
2. Data

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
IPV4 header

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
Addressing schemes
❑ An address that identifies the connection of host to its
network is called Internet address or IP address.
❑ An IP address is 32 bit address. Its unique and universal
address. Unique means two devices on Internet can never
have same address at same time.
❑ Universal means that the addressing system must be
accepted by any host that wants to be connected to
the Internet.
❑ Two notations that shows the IP address
❑ 1. Binary notation.
❑ 2. Dotted Decimal notation.
Dept. of Computer Engineering LJ Polytechnic
IP Protocol and Network Applications
Classful Addressing
❑ The address space is divided into five classes: Class A, Class B,
Class C, Class D & Class E.
❑ Addresses in classes A, Band C are used for unicast
communication i.e. one source to one destination. (one
to one communication). Addresses in class D are used for
multicast communication i.e. one source to many
destination. (one to many communication). Addresses in class
E are reserved for future use.
❑ IP addresses in class A, Band C is divided into net id and
host id. Net id: - Network Identification Number. Host id: -
Host Address.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
Classful Addressing

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
Subnet & Masking
❑ IP addressing are designed with Two-level of hierarchy.
[Network Net id → host id]
❑ Sometimes this two level of hierarchy is not suitable to the
organization, so at that point network needs to be divided
into several smaller networks. The further division of a
network into smaller networks called sub networks.
❑ For example University has many departments. The
university has one network address, but its departments
have several sub network addresses.
❑ When we divide a network into several subnets we have
three level of hierarchy. [Network → sub network → Host]
Dept. of Computer Engineering LJ Polytechnic
IP Protocol and Network Applications
Subnet & Masking

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
Masking
❑ When a router receive a packet with destination address, it
needs to route the packet. The routing is based on network
address and sub network address.
❑ The router outside the organization (Network) route the
packet based on the network address.
❑ The router inside the organization routes the packet based
on sub network address.
❑ How can a router find the network address or sub
network address? A network administrator knows the
network address and sub network addresses but router does
not. Router uses masking process.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
Masking
❑ Masking is a process that extracts the address of network
from an IP address.
❑ Masking can be done whether we have sub-netting or not.
If we not have sub-netted the network, masking extracts the
network address from an IP address. If we have sub-netted,
masking extracts the sub-network address from an IP
address.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
IPv6
❑ IPv6 Internetwork Protocol Version 6. IPv6 also known as IPng.
(Internetwork Protocol, next generation) In IPv6, format and
length of IP addresses were changed along with the packet
format. IPv6 provide 128 bits addressing.
❑ Features of IPv6 :
1. Large Address Space
2. Better Header Format
3. New Options
4. Allowance for extension
5. Support for Resource Allocation
6. Support for more Security
Dept. of Computer Engineering LJ Polytechnic
IP Protocol and Network Applications
DNS
❑ To identify an entity, the internet uses an IP address, which
uniquely identifies the connection of a computer to the
internet.
❑ But user prefers to use names instead of numeric addresses.
❑ Because of remember numeric addresses are difficult
compare to names.
❑ Therefore we need a system that can map a name to an
address or an address to name. The naming scheme
used in internet is called the DNS (Domain Name System).
❑ In DNS names must be unique because the addresses are
unique.
Dept. of Computer Engineering LJ Polytechnic
IP Protocol and Network Applications
DNS
❑ Domain Name:
Each node in a tree has a domain name. A full domain
name is a sequence of labels separated by dots. Full path
names must not exceed 255 characters. Domain names are
always read from the bottom to top. Last label is the label of
the root. The root label is a null string (Empty String). Means
a full domain name always ends in a null label.
❑ Name Server:
Information contained in the domain name system
must be stored.It is very inefficient and not reliable to
have just one computer store such large information.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
E-mail Protocols
❑ Electronic mail, often abbreviated to e-mail, or simply
mail, is a store-and-forward method of writing, sending,
receiving and saving messages over electronic communication
systems.
❑ The term fie-mail" applies to the internet e-mail systems
based on simple mail transfer protocol (SMTP), to network
systems based on other protocols and to various mainframe,
minicomputer, or intranet systems allowing users within
one organization to send messages to each other in
support of workgroup collaboration.
❑ E-mail is most popular network services.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
SMTP
❑ Simple Mail Transfer Protocol, a protocol for sending e-mail
messages between servers. Most e-mail systems that send
mail over the internet use SMTP to send messages from one
server to another.
❑ The messages can then be retrieved with an e-mail client
using either POP (Post Office Protocol) or IMAP (Internet
Message Access Protocol). In addition, SMTP is generally used
to send messages from mail client to mail server.
❑ SMTP client and SMTP server has two components
❑ 1. UA - User Agent
❑ 2. MTA - Mail Transfer Agent
Dept. of Computer Engineering LJ Polytechnic
IP Protocol and Network Applications
POP3
❑ Post Office Protocol, a protocol used to retrieve e-mail
server.
❑ Most e-mail applications sometimes called an e-mail
client use the POP protocol, although some can use the
newer IMAP {Internet Message Access Protocol}.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
MIME
❑ Multipurpose Internet Mail Extensions, a specification
for formatting non-ASCII messages so they can be sent over
the internet.
❑ Many e-mail clients now support MIME, which enables
them to send and receive graphics, audio and video files via
the internet mail systems.
❑ In addition, MIME supports messages in character sets other
than ASCII.
❑ MIME was defined in 1992 by the Internet Engineering
Task Force (IETF). A new version, called S/MIME, supports
encrypted messages.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
FTP
❑ FTP is a standard mechanism provided by TCP/IP model
for copying a file from one computer to another.
❑ Transferring files from one computer to another is one of
the most common tasks expected from a networking or
internetworking environment.
❑ File Transfer Protocol, the protocol for exchanging files
over the Internet.
❑ FTP works in the same way as HTIP for transferring web
pages from a server to user's browser and SMTP for
transferring electronic mail across the Internet in that,
like these technologies.

Dept. of Computer Engineering LJ Polytechnic


IP Protocol and Network Applications
HTTP
❑ Communication between client computers and web servers is
done by sending HTTP Requests and receiving HTTP Response.
❑ Communication between clients and servers is done
by requests and responses.
❑ HTTP is said to be a connectionless protocol and is used to
interconnect web pages.

Dept. of Computer Engineering LJ Polytechnic

You might also like