You are on page 1of 21

Chapter Three

1. Network Layer
Network layer is a layer 3 that manages device addressing, tracks the location of devices on the
network. Also it determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors. The Network link layer is responsible
for routing and forwarding the packets. Routers are the layer 3 devices, they are specified in this
layer and used to provide the routing services within an internetwork. The protocols used to route
the network traffic are known as Network layer protocols. Examples of protocols are IP and Ipv6.

1.1. Functions of Network Layer:


Internetworking: An internetworking is the main responsibility of the network layer. It provides
a logical connection between different devices.

Addressing: A Network layer adds the source and destination address to the header of the frame.
Addressing is used to identify the device on the internet.

1 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
Routing: Routing is the major component of the network layer, and it determines the best optimal
path out of the multiple paths from source to the destination.

Packetizing: A Network Layer receives the packets from the upper layer and converts them into
packets. This process is known as Packetizing. It is achieved by internet protocol (IP). It is
encapsulation of packets received from upper-layer protocols and makes new packets. This new
packet called packet data units (PDU). Each PDU contains not only data but also control
information.

Fragmentation: It is decapsulates of the IPv4 datagram from the frame it receives and then
encapsulates again it in another frame. Or it making data or frame possible to pass through other
networks which is this is called fragmentation.

IP Packet
3 2 1

Defragmentation: It is restoring or reassembling of the original IP packets. It only occurs once at


end router.
Source
Host
Internet

IP Packet 3 2 1 IP Packet

Original message
Fragmentation

Destination
Host
Defragmentation
2 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
Network layer protocol

1. The Internet Control Message Protocol (ICMP)

It is is a network layer protocol used by network devices to diagnose network communication


issues. ICMP is mainly used to determine whether or not data is reaching its intended destination
in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers.

The primary purpose of ICMP is for error reporting. When two devices connect over the Internet,
the ICMP generates errors to share with the sending device in the event that any of the data did not
get to its intended destination. For example, if a packet of data is too large for a router, the router
will drop the packet and send an ICMP message back to the original source for the data.

A secondary use of ICMP protocol is to perform network diagnostics; the commonly used terminal
utilities traceroute and ping both operate using ICMP. The traceroute utility is used to display the
routing path between two Internet devices. The routing path is the actual physical path of connected
routers that a request must pass through before it reaches its destination. The journey between one
router and another is known as a ‘hop,’ and a traceroute also reports the time required for each hop
along the way. This can be useful for determining sources of network delay. Host or network
unreachable.

Error reporting message: e.g. Destination unreachable, time exceeded, parameters problem

Query message: help in getting specific information. e.g. neighbors

Network congestion message:-when router buffers too many packets, and cannot process with
same speed as received, it generates source quench message
3 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
2. The Internet Group Management Protocol (IGMP)

It is a protocol that allows several devices to share one IP address so they can all receive the same
data. IGMP is a network layer protocol used to set up multicasting on networks that use the Internet
Protocol version 4 (IPv4). Specifically, IGMP allows devices to join a multicasting group. But
IGMP is not a multicasting routing protocol; it is a protocol that manages group membership. In
any network, there are one or more multicast routers that distribute multicast packets to hosts or
other routers. The IGMP protocol gives the multicast routers information about the membership
status of hosts (routers) connected to the network. IGMP helps the multicast router create and
update a list of loyal members related to each router interface.

Leaving a Group

When a host sees that no process is interested in a specific group, it sends a leave report. Similarly,
when a router sees that none of the networks connected to its interfaces is interested in a specific
group, it sends a leave report about that group. IGMP has three types of messages: the query, the
membership report, and the leave report.

IGMP Message Format

Type: This 8-bit field defines the type of message,


✓ Membership reports: Devices send these to a multicast router in order to become a member of
a multicast group.
✓ Leave group" messages: These messages go from a device to a router and allow devices to
leave a multicast group.
✓ General membership queries: A multicast-capable router sends out these messages to the entire
connected network of devices to update multicast group membership for all groups on the
network.
✓ Group-specific membership queries: Routers send these messages to a specific multicast
group, instead of the entire network.
2.Maximum Response Time: This 8-bit field defines the amount of time in which a query must
be answered.
3.Checksum: this is a 16-bit field carrying the checksum. The checksum is calculated over the 8-
byte message.

4 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
IGMP Operation

IGMP operates locally. A multicast router connected to a network has a list of multicasts addresses
of the groups with at least one loyal member in that network

3. Internet Protocol (IP)

It is a protocol, or set of rules, for routing and addressing packets of data so that they can travel
across networks and arrive at the correct destination. Data traversing the Internet is divided into
smaller pieces, called packets. IP information is attached to each packet, and this information helps
routers to send packets to the right place. Every device or domain that connects to the Internet is
assigned an IP address, and as packets are directed to the IP address attached to them, data arrives
where it is needed.

4. Address Resolution Protocol (ARP):

It is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a


fixed physical machine address, also known as a media access control (MAC) address, in a local-
area network (LAN).

This mapping procedure is important because the lengths of the IP and MAC addresses differ, and
a translation is needed so that the systems can recognize one another. The most used IP today is
IP version 4 (IPv4). An IP address is 32 bits long. However, MAC addresses are 48 bits long. ARP
translates the 32-bit address to 48 and vice versa.

There is a networking model known as the Open Systems Interconnection (OSI) model. First
developed in the late 1970s, the OSI model uses layers to give IT teams a visualization of what is
going on with a particular networking system. This can be helpful in determining which layer
affects which application, device, or software installed on the network, and further, which IT or
engineering professional is responsible for managing that layer.

5 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
The MAC address is also known as the data link layer, which establishes and terminates a
connection between two physically connected devices so that data transfer can take place. The
IP address is also referred to as the network layer or the layer responsible for forwarding
packets of data through different routers. ARP works between these layers. Generally, ARP
sender sends ARP request to receiver which contains logical address of sender and logical
address of receiver. Then the receiver sends ARP response packet which contains the logical
(IP) address and physical address of the receiver with unicast directly to the sender because
sender knows logical address of receiver but not physical address of receiver at network layer
ARP used to maps the logical address of the receiver to physical address it obtains from
receiver. So, ARP retrieves the physical address of the receiver and maps 32-bit logical (IP)
address to 48-bit physical address.

5. Reverse Address Resolution Protocol (RARP)

Reverse ARP is a networking protocol used by a client machine in a local area network to request
its Internet Protocol address (IPv4) from the gateway-router’s ARP table. The network
administrator creates a table in gateway-router, which is used to map the MAC address to
corresponding IP address.

When a new machine is setup or any machine which don’t have memory to store IP address, needs
an IP address for its own use. So the machine sends a RARP broadcast packet which contains its
own MAC address in both sender and receiver hardware address field. Therefore, RARP is a
TCP/IP protocol that allows any host to obtain its IP address from the server. RARP perform
following steps to obtain an IP address from the server and the sender broadcast the RARP request
to all hots. The RARP request packet contains the physical address of the sender. All the host
receiving the RARP request packet process it but, the authorized host only which can serve RARP
service. The authorized RARP server replies directly to requesting host. Generally, Retrieves the
logical address for a computer from the server and maps 48-bit physical address to 32-bit logical
(IP) address.

6 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
IP Addressing
An IP address is a unique address that identifies a device on the internet or a local network. IP
stands for "Internet Protocol," which is the set of rules governing the format of data sent via the
internet or local network.

In essence, IP addresses are the identifier that allows information to be sent between devices on a
network: they contain location information and make devices accessible for communication. The
internet needs a way to differentiate between different computers, routers, and websites. IP
addresses provide a way of doing so and form an essential part of how the internet works.

What is an IP?

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of


four numbers — an example address might be 192.158.1.38. Each number in the set can range
from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet
Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names
and Numbers (ICANN). ICANN is a non-profit organization that was established in the United
States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each
time anyone registers a domain on the internet, they go through a domain name registrar, who pays
a small fee to ICANN to register the domain.

Types of IP addresses

There are different categories of IP addresses, and within each category, different types.

Private IP addresses

Every device that connects to your internet network has a private IP address. This includes
computers, smartphones, and tablets but also any Bluetooth-enabled devices like speakers,
printers, or smart TVs. With the growing internet of things, the number of private IP addresses you
have at home is probably growing. Your router needs a way to identify these items separately, and
many items need a way to recognize each other. Therefore, your router generates private IP
7 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
addresses that are unique identifiers for each device that differentiate them on the network. Private
IP address, 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255 and 192.168.0.0 –
192.168.255.255

Public IP addresses

A public IP address is the primary address associated with your whole network. While each
connected device has its own IP address, they are also included within the main IP address for your
network. As described above, your public IP address is provided to your router by your ISP.
Typically, ISPs have a large pool of IP addresses that they distribute to their customers. Your
public IP address is the address that all the devices outside your internet network will use to
recognize your network.

Differences between IPv4 and IPv6

The Internet Protocol version 4 (IPv4) is a protocol for use on packet-switched Link Layer
networks (e.g. Ethernet).IPv4 provides an addressing capability of approximately 4.3 billion
addresses.

The Internet Protocol version 6 (IPv6) is more advanced and has better features compared to
IPv4. It has the capability to provide an infinite number of addresses. It is replacing IPv4 to
accommodate the growing number of networks worldwide and help solve the IP address
exhaustion problem. One of the differences between IPv4 and IPv6 is the appearance of the IP
addresses. IPv4 uses four 1 byte decimal numbers, separated by a dot (i.e. 192.168.1.1). IPv6 uses
hexadecimal numbers that are separated by colons (i.e. fe80:: d4a8:6435:d2d8:d9f3b11).

8 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
General characteristics of IPv4

➢ Uses 32 bit address.


➢ Possible addresses 2^32 = 4,294,967,296 (4.3 billion)
➢ Some addresses are reserved like private addresses plus multicast addresses.

Internet Protocol hierarchy contains several classes of IP Addresses to be used efficiently in


various situations as per the requirement of hosts per network. Broadly, the IPv4 Addressing
system is divided into five classes of IP Addresses. All the five classes are identified by the first
octet of IP Address. Internet Corporation for Assigned Names and Numbers is responsible for
assigning IP addresses.

The first octet referred here is the left most of all. The octets numbered as follows depicting dotted
decimal notation of IP Address −

The number of networks and the number of hosts per class can be derived by this formula:

When calculating hosts' IP addresses, 2 IP addresses are decreased because they cannot be
assigned to hosts, i.e. the first IP of a network is network number and the last IP is reserved for
Broadcast IP.

Classes of IPv4 Address

In the IPv4 IP address space, there are five classes: A, B, C, D and E. Each class has a specific
range of IP addresses (and ultimately dictates the number of devices you can have on your

9 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
network). Primarily, class A, B, and C are used by the majority of devices on the Internet. Class
D and class E are for special uses.

Class A Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e.

Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x
is reserved for loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing
can have 126 networks (27-2) and 16777214 hosts (224-2).
Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH

Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.

Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B
is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is −

Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class
C is 255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH

10 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of −

Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not destined for a particular host, that is why there is no need
to extract host address from the IP address, and Class D does not have any subnet mask.

Class E Address
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this
class ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with
any subnet mask. Generally classes of IP Address in the following table:

Classful and Classless Routing

Routing is an important term in the world of computer networks. It is basically the name given to
the process of selecting a path for traffic in a network or between across multiple networks.
Routing is basically performed in many types of networks like circuit-switched networks, for
example, the public switched telephone network, commonly known as the PSTN or computer
networks, for example, the internet.

Routing is the higher-level decision making in packet switching networks as it directs network
packets from their source to their destination through intermediate network nodes with the help of
particular packet forwarding mechanisms. When we talk about Packet forwarding, we refer to the
transit of network packets from one network interface to another. The nodes in intermediate are
basically hardware devices in the network, for example, routers, gateways, firewalls, switches
including others. Packet forwarding is also done by general-purpose computers although there is
no specially optimized hardware for the task.
11 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
When we talk about routing, one important term is routing tables. The process usually directs
forwarding on the basis of routing tables that might be specified by an administrator. It basically
maintains a record of the routes to different network destinations. Routing tables either learn by
observing network traffic or are built with the assistance of particular routing protocols.

When the concept of routing is discussed, usually IP routing is talked about. IP routing basically
assumes that network addresses are structured and that similar addresses have proximity within
the network. In the concept of structured addresses, a single routing table entry is allowed to
represent the entire route to a group of devices. In large networks, structured addressing, which is
basically routing performs better than unstructured addressing, also known as bridging.

Routing has now become the most popular and widely used form of addressing on the Internet
whereas bridging is still widely used within local area networks, also known as LAN.

In today’s blog, we are going to talk about an important concept related to the routing in computer
networks. Classful and classless routing are protocols of routing. In today’s blog we are going to
discuss the difference between classful and classless routing.

Before understanding the difference, it’s important to get a hang of classful and classless routing
and the important terms associated with these routing protocols. Let’s get started with the blog in
order to advance our knowledge in computer networks.

1. Classful Addressing

Classful Addressing or Classful Routing was Introduced in 1981 where IPV4 addresses were
divided into 5 classes namely from class A to class E. Where classes A to C contain unicast
addresses and Class D talks about multicast addresses and Class E is reserved for future use. In
this segment, we are going to talk about each class in detail beginning from Class A.

Class A has addresses where the first bit of the first octet is always ‘0’ and hence the address range
of class A starts from 0.0.0.0 and reaches up to 127.255.255.255 (the decimal conversion of the
binary number ‘0111’ is 127). The IP address is divided into four octets (with each octet having 8
bits) where the first octet denotes the network portion and the rest of the 3 octets (or the 24 bits)
belong to the host portion. One example of Class A IP address can be 10.1.1.1

12 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
There is one exception in the Class A IP address. The address range 127.X.X.X is reserved for
loopback while the address range 0.X.X.X is reserved for default network. Hence, the actual range
of class A addresses starts from 1.0.0.0 and goes only up till the address 126.255.255.255

Class B has a range of addresses where the first octet would always start with ’10’ and hence the
range of Class B starts from 128.0.0.0 and goes up to 191.255.255.255. The first two octets (that
means 16 bits) denote the network portion and the remaining two octets (or the remaining 16 bits)
belong to the host portion. One example of Class B IP address is 172.16.1.1

The next in line is the Class C where the first octet starts from ‘110’ and hence the addresses range
starts from 192.0.0.0 and goes up to 223.255.255.255. In this class address, the first three octets,
i.e., the first 24 bits denote the network portion and the rest of the bits or the remaining last octet
belongs to the host portion. One example of Class C address is 192.168.1.1

Multicast addressing is represented in Class D where the first octet starts with ‘1110’ and hence
the range of IP addresses start from 224.0.0.0 and ends with 239.255.255.255. An example of a
Class D IP address is 239.2.2.2. In routing protocols like OSPF, RIP and others, IP addresses of
Class D are used.

The last class is classful addressing is Class E which is reserved for research purposes and future
use. The first octet in IP addresses from class E starts with ‘1111’ and thus, the IP address range
in Class E is from 240.0.0.0 to 255.255.255.255.

We have discussed all the classes that are a major part of classful addressing. We hope that the
concept is now clear in your mind. Classful Routing does not import subnet masks and subnet
mask is provided after the route update. For classful routing, subnet mask does not vary for devices.
In classful routing, VLMS which is the Variable Length Subnet Mask and CIDR which is an
abbreviation for Classless Inter-Domain Routing is not supported.

Now that we have discussed the various nuances of classful addressing, it is time we discuss the
disadvantages of Classful Addressing. We discussed that Class A has a mask of 255.0.0.0 and
hence can support 16, 777, 214 addresses and Class B with a mask of 255.255.0.0 supports 65,
534 addresses whereas Class C with a mask of 255.255.255.0 support 254 addresses. The problem
of classful addressing arises when 2000 addresses are required. The probable solution to this
13 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
problem is to provide the user Class B or Class C address but that would result in a waste of either
so many addresses or too many networks to handle. Hence, CIDR was introduced to resolve this
issue.

This brings us to our next segment where we discuss Classless Inter-Domain Routing (CIDR).

Classful and Classless Routing

This section depicts a contrast between the two routing protocols. In this segment, we will look at
the difference between classful routing and classless routing under broad sections. Let’s begin.

VLSM: VLMS (Variable Length Subnet Mask) is not supported in classful routing while it is
supported in classless routing.

Bandwidth: More bandwidth is required to perform Classful routing; however, less bandwidth is
required for classless routing.

Messages: Unlike in classless routing, the "hello" messages are not used in classful routing.

Subnet Mask: The subnet mask is not imported for classful routing and subnets are also not
displayed but the classless routing imports subnet masks and are also displayed in other major
subnets.

Address: In case of classful routing, the address is divided into three parts, that is, Network, Subnet
and Host. In classless routing, the address is divided into two parts: Subnet and Host.

Updates: Regular or periodic updates are used in classful routing but in classless routing, triggered
updates are used.

Some values calculated in subnetting:

1. Number of subnets: Given bits for mask – No. of bits in default mask

2. Subnet address: AND result of subnet mask and the given IP address

3. Broadcast address: By putting the host bits as 1 and retaining the network bits as in the IP
address

4. Number of hosts per subnet: 2(32 – Given bits for mask) – 2


14 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
5. First Host ID: Subnet address + 1 (adding one to the binary representation of the subnet
address).

What is Network Masks?

A network mask helps you know which portion of the address identifies the network and which
portion of the address identifies the node. Class A, B, and C networks have default masks, also
known as natural masks, as shown here:

Class A: 255.0.0.0, Class B: 255.255.0.0, Class C: 255.255.255.0

An IP address on a Class A network that has not been subnetted would have an address/mask pair
similar to: 8.20.15.1 255.0.0.0. In order to see how the mask helps you identify the network and
node parts of the address, convert the address and mask to binary numbers.

8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
Once you have the address and the mask represented in binary, then identification of the network
and host ID is easier. Any address bits which have corresponding mask bits set to 1 represent the
network ID. Any address bits that have corresponding mask bits set to 0 represent the node ID.

8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
-------------------------------------------------------
net id | host id
netid = 00001000 = 8

hostid = 00010100.00001111.00000001 = 20.15.1

2. Understand Subnetting or classless address

Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or
C network. Each data link on a network must have a unique network ID, with every node on that
link being a member of the same network. If you break a major network (Class A, B, or C) into
smaller subnetworks, it allows you to create a network of interconnecting subnetworks. Each data
link on this network would then have a unique network/subnetwork ID. Any device, or gateway,

15 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
that connects n networks/subnetworks has n distinct IP addresses, one for each network /
subnetwork that it interconnects.

In order to subnet a network, extend the natural mask with some of the bits from the host ID portion
of the address in order to create a subnetwork ID. For example, given a Class C network of
204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this manner:

204.17.5.0 - 11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
------------------------------------------------|sub|----
By extending the mask to be 255.255.255.224, you have taken three bits (indicated by "sub") from
the original host portion of the address and used them to make subnets. With these three bits, it is
possible to create eight subnets. With the remaining five host ID bits, each subnet can have up to
32 host addresses, 30 of which can actually be assigned to a device since host ids of all zeros or
all ones are not allowed (it is very important to remember this). So, with this in mind, the following
subnet with host ranges have been created.

1. 204.17.5.0 255.255.255.224 host address range 1 to 30


2. 204.17.5.32 255.255.255.224 host address range 33 to 62
3. 204.17.5.64 255.255.255.224 host address range 65 to 94
4. 204.17.5.96 255.255.255.224 host address range 97 to 126
5. 204.17.5.128 255.255.255.224 host address range 129 to 158
6. 204.17.5.160 255.255.255.224 host address range 161 to 190
7. 204.17.5.192 255.255.255.224 host address range 193 to 222
8. 204.17.5.224 255.255.255.224 host address range 225 to 254

These 8 network subnetting schemes in this section allows for eight subnets, and the network might
appear as in the following figure:

16 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
Parts of the IPv6 Address
An IPv6 address is 128 bits in length and consists of eight, 16-bit fields, with each field bounded
by a colon. Each field must contain a hexadecimal number, in contrast to the dotted-decimal
notation of IPv4 addresses. In the next figure, the x's represent hexadecimal numbers.

Basic IPv6 Address Format

The leftmost three fields (48 bits) contain the site prefix. The prefix describes the public
topology that is usually allocated to your site by an ISP or Regional Internet Registry (RIR).

17 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
The next field is the 16-bit subnet ID, which you (or another administrator) allocate for your site.
The subnet ID describes the private topology, also known as the site topology, because it is
internal to your site.

The rightmost four fields (64 bits) contain the interface ID, also referred to as a token. The
interface ID is either automatically configured from the interface's MAC address or manually
configured in EUI-64 format. Example: 2001:0db8:3c4d:0015:0000:0000:1a2f:1a2b

This example shows all 128 bits of an IPv6 address. The first 48 bits, 2001:0db8:3c4d, contain
the site prefix, representing the public topology. The next 16 bits, 0015, contain the subnet ID,
representing the private topology for the site. The lower order, rightmost 64
bits, 0000:0000:1a2f:1a2b, contain the interface ID.

Abbreviating IPv6 Addresses

Most IPv6 addresses do not occupy all of their possible 128 bits. This condition results in fields
that are padded with zeros or contain only zeros. The IPv6 addressing architecture allows you use
the two-colon (::) notation to represent contiguous 16-bit fields of zeros. For example, you might
abbreviate the IPv6 address 2001:0db8:3c4d:0015:0000:0000:1a2f:1a2b by replacing the two
contiguous fields of zeros in the interface ID with two colons.

The resulting address is 2001:0db8:3c4d:0015::1a2f:1a2b. Other fields of zeros can be


represented as a single 0. You can also omit any leading zeros in a field, such as
changing 0db8 to db8. So the address 2001:0db8:3c4d:0015:0000:0000:1a2f:1a2b can be
abbreviated as 2001:db8:3c4d:15::1a2f:1a2b.

You can use the two-colon notation to replace any contiguous fields of all zeros in the IPv6 address.
For example, the IPv6 address 2001:0db8:3c4d:0015:0000:d234::3eee:0000 can be collapsed
into 2001:db8:3c4d:15:0:d234:3eee::.

Prefixes in IPv6

The leftmost fields of the IPv6 address contain the prefix, which is used for routing IPv6 packets.
IPv6 prefixes have the following format:
18 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
prefix/length in bits

Prefix length is stated in classless inter-domain routing (CIDR) notation. CIDR notation is a slash
at the end of the address that is followed by the prefix length in bits. For information on CIDR
format IP addresses, refer to Designing Your CIDR IPv4 Addressing Scheme.

The site prefix of an IPv6 address occupies up to 48 of the leftmost bits of the IPv6 address. For
example, the site prefix of the IPv6 address 2001:db8:3c4d:0015:0000:0000:1a2f:1a2b/48 is
contained in the leftmost 48 bits, 2001:db8:3c4d. You use the following representation, with zeros
compressed, to represent this prefix: 2001:db8:3c4d::/48

Note - The prefix 2001:db8::/32 is a special IPv6 prefix that is used specifically for documentation
examples.

You can also specify a subnet prefix, which defines the internal topology of the network to a
router. The example IPv6 address has the following subnet prefix.

2001:db8:3c4d:15::/64

The subnet prefix always contains 64 bits. These bits include 48 bits for the site prefix, in addition
to 16 bits for the subnet ID.

The following prefixes have been reserved for special use:

2002::/16 Indicates that a 6 to 4 routing prefix follows.

fe80::/10 Indicates that a link-local address follows.

ff00::/8 Indicates that a multicast address follows.

What is Unicast in Computer Network?

19 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
Unicast information transfer is very helpful when a single sender transmits data to a single
recipient. In simple words, it is called a one-to-one type of transmission. For instance, we can
consider a device with an IP address of 10.1.2.0 that is willing to send data packets (traffic stream)
to a device with an IP address 20.12.42 (while both of these belong to different networks). In this
case, the device will use a unicast data transfer. This mode of data transfer is the most common
one among various networks.

Generally, this type of information transfer is useful when there is a participation of single sender
and single recipient which shortly term it as a one-to-one transmission.

What is Multicast in Computer Network?

Multiple senders and recipients participate in the process of data transfer in Multicasting. In the
multicast method, the traffic reclines between the boundaries of broadcast (from one to all) to
unicast (from one to one). The multicast process lets the servers direct a single copy of data streams
to get simulated and routed to the hosts that requested them in the first place (or routed to groups
of devices). The IP multicast requires support from various other protocols such as Internet Group
Management Protocol (IGMP) and Multicast routing for the working. Also, Class D stays reserved
for multicast groups in the case of Classful IP addressing.

Generally, multicasting is when a group of devices all receive the same messages or packets and
any network traffic directed at that IP address will reach all devices that share the IP address,
instead of just one device.

What is broadcast in Computer Network?

Broadcast data transfer occurs when one sender transmits data to multiple recipients at any given
time. There are basically two major types of broadcasting transfer techniques:
20 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.
Limited Broadcasting – It is helpful when a sender in a network wants to transmit data to the
devices over the same network in which it resides. A device will append a limited broadcasting
address in the datagram’s destination address to achieve limited broadcasting. It is reserved for
transferring data from a single client to all the recipients over the same network.

Direct Broadcasting – It is helpful when a sender in a network wants to transmit data to the
devices residing in an altogether different network. A device translates all the part bits of the Host
ID of a destination address to 1. It is known as Direct Broadcast Address for transferring
information in the datagram header.

Broadcasting is mainly helpful for audio and video distribution by television networks. ARP
(Address Resolution Protocol) is one of the most important protocols in this class that resolves the
IP address to a physical address. It is an important step for underlying communication.

21 | P a g e : Sources: Top-down 6th edition by James Kurose; Data Communications and Networking
fourth edition By Behrouz A.Forouzan; Data & Computer.Communications.8e.WilliamStallings Prepared
By Endale M.

You might also like