You are on page 1of 21

Index

S.No. 1 2 3 4 5 6 7 IP Addressing schemes CLASSFUL IP addressing SUBNETTING VLSM CIDR IP over ATM MPLS Topic

IP Addressing schemes
Properties of IP address
1. Globally unique 2. Hierarchical

This makes possible scalable routing

IPV4
32-bit addresses Commonly expressed in dotted decimal format (e.g., 192.168.10.12) Each dotted decimal is commonly called an octet (8 bits) Address is divided into two parts, Network number & host number.

Network number

Host number 32 bits

Classful IP addressing
8 bits 1. Class A :8 bits 8 bits 8 bits xxxxxxxx 0xxxxxxx xxxxxxxx xxxxxxxx

Network
8 bits 2. Class B :-

Host
8 bits

Host
8 bits

Host
8 bits xxxxxxxx Host 8 bits xxxxxxxx Host

10xxxxxx xxxxxxxx xxxxxxxx Network Network 8 bits 8 bits Host 8 bits

3. Class C :-

110xxxxx xxxxxxxx xxxxxxxx Network Network Network

4. Class D :5. Class E :-

Multicast Research x may takes 0 or 1

Classful IP addressing
CLASS Class A Class B Class C Class D Class E RANGE 1-126 128-191 192-223 224-239 240-254 NETWORKS HOSTS 126 16384 2097152 16777214 65534 254 DEFAULT SUNET MASK 255.0.0.0 255.255.0.0 255.255.255.0

Addresses beginning with 127 are reserved for loopback & internal testing of machine PRIVATE SUBNETS :10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 These can be used by anyone for setting up of internal IP n/w.

Identifying N/W address using default Mask


Applying a subnet mask to an IP address allows to identify the network & host part of the address. e.g.

Class B IP Address

140.179.240.200 10001100 10110011

11110000

11001000

Default 255.255.0.0 subnet mask N/W address 140.179.0.0

11111111

11111111

00000000 00000000

10001100 10110011

00000000 00000000

N/W address obtained by performing bitwise logical AND operation b/w IP address & subnet mask

SUBNETTING
Chopping up of n/w into a no. of smaller n/w is called subnetting. Allows to assign some of the bits, normally used by the host portion of the address, to the network portion of the address. Efficient use of the full n/w address Any of the class can be subnetted.

network

host

network

subnet 32 bits

host

Subnetting (1 bit)
N.N.N.H Subnet 2 Subnet 1 N.N.N.128/25 N.N.N.0/25

N.N.N.0hhhhhhh N.N.N.1hhhhhhh

Hosts 126

Hosts 126

0000000 -0 0000001 -1 0000010 -2 . . . . . . 1111110 -126 1111111 -127

Subnetting (2 bits)
N.N.N.H N.N.N.00hhhhhh N.N.N.01hhhhhh N.N.N.10hhhhhh N.N.N.11hhhhhh

SN3 N.N.N.128/26 Hosts: 62

SN2 N.N.N.64/26 Hosts 62

0 1 1 0 0

Hosts: 62
SN4 N.N.N.192/26

Hosts: 62
SN1 N.N.N.0/26

000000 - 0 000001 - 1 000010 - 2 . . . . . . 111110 - 62 111111 - 63

Identifying N/W Address


IP ADDRESS 8 bits 8 bits 8 bits 8 bits

201.222.5.121/29 11001001
Subnet Mask 201.222.5.120 ANDing 11111111 11001001

11011110
11111111 11011110

00000101
11111111 00000101

01111001
11111000 01111000

VLSM ( Variable Length Subnet Mask)


1. Subnetting creates subnets with equal no. of hosts, in a n/w. 2. The length of subnet mask will be same for all the subnets. 3. To cop with the variable no. of hosts in a subnet, in a n/w, the length of subnet mask foe the subnets will also vary. 4. The method of achieving subnetting, with variable length of subnet mask, is known as Variable Length Subnet Mask.

Example Of VLSM
202.195.32.0 A 50H E0 router E1 S1 S0 Link 2 router E0 Link 3 S0 E 100H

E-100H = 27 = 128 A-50H = 26 = 64 C-14H = 24 =16 B-13H = 24 =16 D-6H = 23 = 8 SL1 =22 = 4 SL2 =22 =4 SL3 =22 =4

B 13H router C 14 H D 6H

VLSM
E-100H = 27 = 128 A-50H = 26 = 64 C-14H = 24 =16 B-13H = 24 =16 D-6H = 23 = 8 SL1 =22 = 4 SL2 =22 =4 SL3 =22 =4

A
0 1 0

E - 202.195.32.00000000 A - 202.195.32.10000000 C - 202.195.32.11000000 B - 202.195.32.11010000 D - 202.195.32.11100000 SL1 - 202.195.32.11101000 SL2 - 202.195.32.11101100 SL3 - 202.195.32.11110000

C B

0 1

1 1 1

0 1 0

VLSM
N/W E A C B D SL1 SL2 SL3 Subnet Mask N/W Address B/C Address 202.195.32.127 202.195.32.191 202.195.32.207 202.195.32.223 202.195.32.231 202.195.32.235 202.195.32.239 202.195.32.243 202.195.32.00000000 202.195.32.0 202.195.32.10000000 202.195.32.128 202.195.32.11000000 202.195.32.11010000 202.195.32.11100000 202.195.32.11101000 202.195.32.11101100 202.195.32.11110000 202.195.32.192 202.195.32.208 202.195.32.224 202.195.32.232 202.195.32.236 202.195.32.240

CIDR ( Classless Interdomain Routing)


1. Prefix can be of arbitrary length 2. aggregation can be performed at several lavels.

Consider 16 n/ws 144.16.16.x 144.16.31.x

class b (first 16 bits r common)

& r reachable through an ISP router(16 entries in an isp router) 144.16.16.x 144.16.31.x ------------144.16.00010000.x 144.16.00011111.x

Actually first 20 bits are common so these 16 n/w can be aggregated into 1 super n/w, where the n/w no. is first 20 bits Now fwd. table of router have only entry as 144.16.16/20

Ip over atm
IP Protocol is popular because of :1. Robustness of IP protocol 2. Scalability of IP addresses 3. Routing aggregation Bottleneck of IP 1.Longest prefix match 2. Traffic engineering in IP n/w is difficult 3. Best effort delivery.

Advantages of ATM
1. It uses short fixed length packets called cells of size 53 byte. 2. Label swapping paradigm. 3. VC based switching simplifies switch. 4. VCI & VPI labels can be swapped at intermediate node, leads to efficient use of VCI & VPI no. space. 5. Traffic engineering simplified.

Problems of IP over ATM


1. Segmentation & reassembly overheads 2. Required partial mess of order n2 where n is no of neighboring nodes. The solution to problem of IP over ATM is MPLS.

MPLS
A path is established b/w two end points. Packets are classified into fwd equivalence class (FEC). Each FEC is associated with a label. Labels are used to determine next hop and new label.

Basic Concept
1 Only edge routers must perform a routing loockup. 2 Core router switch packets based on simple label loocups & swap labels. 3 Traffic can be forwarded based on other parameters (Qos, source,). 4 Load sharing across unequal paths cab be achieved.

MPLS Labels
1 MPLS technology is intended to be used anywhere regardless of layer 1 media and layer 2 protocol. 2. MPLS uses a 32-bit label field that is inserted between layer 2 & layer 3 headers LABEL EXP S TTL

MPLS uses a 32-bit label field that contains the following information: .20-bit label. .3-bit experimental field. .1-bit bottom of stack indicator. .8-bit TTL field.

Label Switch Router


LSR primarily forwards labeled packets(label swapping). Edge LSR primarily labels IP packets and forwards them into the MPLS domain, or removes labels and forwards IP packets out of the MPLS domain

Label Distribution protocol


1. LDP is a set of rules that one LSR can use to inform another LSR about which label will be used to forward MPLS traffic between AND through them. 2. The path set up by these bilateral agreement is called label switched path.

THANK YOU

You might also like