Professional Documents
Culture Documents
S.No. 1 2 3 4 5 6 7 IP Addressing schemes CLASSFUL IP addressing SUBNETTING VLSM CIDR IP over ATM MPLS Topic
IP Addressing schemes
Properties of IP address
1. Globally unique 2. Hierarchical
IPV4
32-bit addresses Commonly expressed in dotted decimal format (e.g., 192.168.10.12) Each dotted decimal is commonly called an octet (8 bits) Address is divided into two parts, Network number & host number.
Network number
Classful IP addressing
8 bits 1. Class A :8 bits 8 bits 8 bits xxxxxxxx 0xxxxxxx xxxxxxxx xxxxxxxx
Network
8 bits 2. Class B :-
Host
8 bits
Host
8 bits
Host
8 bits xxxxxxxx Host 8 bits xxxxxxxx Host
3. Class C :-
Classful IP addressing
CLASS Class A Class B Class C Class D Class E RANGE 1-126 128-191 192-223 224-239 240-254 NETWORKS HOSTS 126 16384 2097152 16777214 65534 254 DEFAULT SUNET MASK 255.0.0.0 255.255.0.0 255.255.255.0
Addresses beginning with 127 are reserved for loopback & internal testing of machine PRIVATE SUBNETS :10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 These can be used by anyone for setting up of internal IP n/w.
Class B IP Address
11110000
11001000
11111111
11111111
00000000 00000000
10001100 10110011
00000000 00000000
N/W address obtained by performing bitwise logical AND operation b/w IP address & subnet mask
SUBNETTING
Chopping up of n/w into a no. of smaller n/w is called subnetting. Allows to assign some of the bits, normally used by the host portion of the address, to the network portion of the address. Efficient use of the full n/w address Any of the class can be subnetted.
network
host
network
subnet 32 bits
host
Subnetting (1 bit)
N.N.N.H Subnet 2 Subnet 1 N.N.N.128/25 N.N.N.0/25
N.N.N.0hhhhhhh N.N.N.1hhhhhhh
Hosts 126
Hosts 126
Subnetting (2 bits)
N.N.N.H N.N.N.00hhhhhh N.N.N.01hhhhhh N.N.N.10hhhhhh N.N.N.11hhhhhh
0 1 1 0 0
Hosts: 62
SN4 N.N.N.192/26
Hosts: 62
SN1 N.N.N.0/26
201.222.5.121/29 11001001
Subnet Mask 201.222.5.120 ANDing 11111111 11001001
11011110
11111111 11011110
00000101
11111111 00000101
01111001
11111000 01111000
Example Of VLSM
202.195.32.0 A 50H E0 router E1 S1 S0 Link 2 router E0 Link 3 S0 E 100H
E-100H = 27 = 128 A-50H = 26 = 64 C-14H = 24 =16 B-13H = 24 =16 D-6H = 23 = 8 SL1 =22 = 4 SL2 =22 =4 SL3 =22 =4
B 13H router C 14 H D 6H
VLSM
E-100H = 27 = 128 A-50H = 26 = 64 C-14H = 24 =16 B-13H = 24 =16 D-6H = 23 = 8 SL1 =22 = 4 SL2 =22 =4 SL3 =22 =4
A
0 1 0
E - 202.195.32.00000000 A - 202.195.32.10000000 C - 202.195.32.11000000 B - 202.195.32.11010000 D - 202.195.32.11100000 SL1 - 202.195.32.11101000 SL2 - 202.195.32.11101100 SL3 - 202.195.32.11110000
C B
0 1
1 1 1
0 1 0
VLSM
N/W E A C B D SL1 SL2 SL3 Subnet Mask N/W Address B/C Address 202.195.32.127 202.195.32.191 202.195.32.207 202.195.32.223 202.195.32.231 202.195.32.235 202.195.32.239 202.195.32.243 202.195.32.00000000 202.195.32.0 202.195.32.10000000 202.195.32.128 202.195.32.11000000 202.195.32.11010000 202.195.32.11100000 202.195.32.11101000 202.195.32.11101100 202.195.32.11110000 202.195.32.192 202.195.32.208 202.195.32.224 202.195.32.232 202.195.32.236 202.195.32.240
& r reachable through an ISP router(16 entries in an isp router) 144.16.16.x 144.16.31.x ------------144.16.00010000.x 144.16.00011111.x
Actually first 20 bits are common so these 16 n/w can be aggregated into 1 super n/w, where the n/w no. is first 20 bits Now fwd. table of router have only entry as 144.16.16/20
Ip over atm
IP Protocol is popular because of :1. Robustness of IP protocol 2. Scalability of IP addresses 3. Routing aggregation Bottleneck of IP 1.Longest prefix match 2. Traffic engineering in IP n/w is difficult 3. Best effort delivery.
Advantages of ATM
1. It uses short fixed length packets called cells of size 53 byte. 2. Label swapping paradigm. 3. VC based switching simplifies switch. 4. VCI & VPI labels can be swapped at intermediate node, leads to efficient use of VCI & VPI no. space. 5. Traffic engineering simplified.
MPLS
A path is established b/w two end points. Packets are classified into fwd equivalence class (FEC). Each FEC is associated with a label. Labels are used to determine next hop and new label.
Basic Concept
1 Only edge routers must perform a routing loockup. 2 Core router switch packets based on simple label loocups & swap labels. 3 Traffic can be forwarded based on other parameters (Qos, source,). 4 Load sharing across unequal paths cab be achieved.
MPLS Labels
1 MPLS technology is intended to be used anywhere regardless of layer 1 media and layer 2 protocol. 2. MPLS uses a 32-bit label field that is inserted between layer 2 & layer 3 headers LABEL EXP S TTL
MPLS uses a 32-bit label field that contains the following information: .20-bit label. .3-bit experimental field. .1-bit bottom of stack indicator. .8-bit TTL field.
THANK YOU