Sie sind auf Seite 1von 1

IP ADDRESS Class A 1-126 Subnet 255.0.0.0 There are 126 Class A network addresses.

There are 16,777,214 host addresses in a Class A IP address. Class B 128-191 Subnet 255.255.0.0 There are 18,384 Class B network addresses. There are 65,536 host addresses in a Class B IP address. Class C 192-223 Subnet 255.255.255.0 There are 2,097,152 Class C network addresses. There are 254 host addresses in a Class C IP address. Network Mask- is used to hide the host part of a given IP address yielding the network address. Subnetting-is the process of subdividing a network into smaller network parts. -Smaller networks in subnetting are called subnets. Subnetting is used for traffic segmentation and remote connections. Subnet Mask-is used to obtain the subnet ID from given IP address. Subnet mask follows the network mask principle. The subnet mask is a series of one covering the network and subnet bits. Determine the minimum number of subnet bits for subnet identification Obtain the highest figure among the number of hosts per subnet identified. Determine the minimum number of host bits of host identification. ROUTING Interior outing includes RIP and OSPF -RIP stands for Routing Information Protocol. -OSPF stands for Open Shortest Path First. Exterior routing includes BGP. -BGP stands for Border Gateway Protocol. ARP MAC-to-IP address mapping is stored in the ARP Cache. Address Resolution Protocol-refers to the utility protocol used by IP in obtaining the MAC address of the target IP host. Reverse Address Resolution Protocol-Refers to the utility protocol used by IP in securing an IP address upon the initialization process.

Internet Control Message Protocol utility protocol used by IP in sending control messages over the IP network. IP is a best effort protocol. IP PACKET The header contains information about the packet. The payload contains the upper-layer information. IP PACKET HEADER FORMAT Version field specifies the format of the IP header. IHL is used to specify how long the IP header is in 32 bit word. IHL field is 4 bits wide. Type of service field is 8 bits wide. Identification-is used to identify the packet as belonging to a datagram that has been fragmented. FLAG- is used in specifying how the fragmentation of packets handled. TTL-is used to specify the maximum time the IP packet can stay moving within the network. Option Field may be used to introduce additional packet handling information for the hosts. Source and Destination Port-is used to identify the network service or application information transported by the packet. The urgent pointer field is a 16-bit number. The code bit field is 6 bit number. IP HEADER TOTAL LENGTH IP Packets have a maximum length of only 576 bytes. Sequence and Acknowledgment Numbers-is used to label the packet and its corresponding acknowledgments. Checksum field-is used to ensure data integrity of the received TCP Segment. UDP-is unreliable because it does not guarantee the delivery of every packet sent. Message Length-is used to indicate the length of the entire UDP Segment in bytes. Network Sessions-is the implicit connections between hosts. The Precedence sub-field is used to indicate the importance of each packet. Identification field is 16 bits wide. Fragment offset filed is 13 bit numeric value. Packet flow Control describes how host handle packets that are received from other hosts. Physical and Logical connections are tangible links between hosts. There is no three-way handshake required to set-up a host to host connection. The TCP handshake is also known as SYN-SYN-ACK.

Das könnte Ihnen auch gefallen