Beruflich Dokumente
Kultur Dokumente
Udaipur (Raj.)
Submitted by:
Ali Asgar Ashiq Hussain
Abhimanyu Kapoor
BE II Year IT
CTAE, Udaipur
Submitted to:
Mr. Dharam Singh
Training In-charge
Department of Information Technology
CTAE, Udaipur
ACKNOWLEDGEMENT
The beatitude, bliss and euphoria that accompany the successful competition
of any task would not be completed without the expression of appreciation of
simple virtues to the people who made it possible. So with reverence, veneration
and honor I acknowledge all those whose guidance and encouragement has made
me successful in winding up this.
First I would like to express my gratitude to Mr. Naveen Malkani for
his valuable guidance encouragement during the completion of training. He was a
major support to me throughout my training, being available with his ideas,
inspiration and encouragement. It is through their masterful guidance that I have
been able to complete my practical training.
The successful completion of training is generally not an individual effort. It
is an outcome of the cumulative effort of a number of persons, each having their
own importance to the objective. This section is a vote of thanks and gratitude all
those persons who have directly or indirectly contributed in their own special way
towards the completion of this dissertation.
Every host and router on the internet has an IP address, which encodes
its network number and host number. The combination is unique: in
principle, no two machines on the internet have the same IP address. An
IP address does not actually refer to a host, it really refers to network
interface, so if a host is on two network, it must have two IP addresses.
IP versions
The Internet Protocol (IP) has two versions currently in use, the IPv4
and the IPv6. Because of its prevalence, the generic term IP address
typically still refers to the addresses defined by IPv4.
IP version 4 addresses
IPv4 uses 32-bit (4-byte) addresses, which limits the address space to
4,294,967,296 (2 32) possible unique addresses. IPv4 reserves some
addresses for special purposes such as private networks (~18 million
addresses) or multicast addresses (~270 million addresses). This reduces
the number of addresses that can be allocated to end users and, as the
number of addresses available is consumed, IPv4 address exhaustion is
inevitable. This foreseeable shortage was the primary motivation for
developing IPv6, which is in various deployment stages around the
world and is the only strategy for IPv4 replacement and continued
Internet expansion.
IPv4 networks
In the early stages of development of the Internet protocol network
administrators interpreted an IP address as a structure of network
number and host number. The highest order octet (most significant eight
bits) was designated the network number and the rest of the bits were
called the host identifier and were used for host numbering within a
network. This method soon proved inadequate as additional networks
developed that were independent from the existing networks already
designated by a network number. The Internet addressing specification
was revised with the introduction of Classful Network Architecture.
IP Address Classes
Classful network design allowed for a larger number of individual
network assignments. The first four bits of the most significant octet of
an IP address was defined as the class of the address. Three classes, A,
B, and C were defined for universal unicast addressing and Class D was
defined for multicast and Class E was reserved for future use.
Depending on the class derived, the network identification was based on
octet boundary segments of the entire address. Each class used
successively additional octets in the network identifier, thus reducing the
possible number of hosts in the higher order classes (B and C). The
following table gives an overview of this system.
Table
Class A: Class A addresses are specified to networks with large number
of total hosts. Class A allows for 126 networks by using the first octet
for the network ID. The first bit in this octet, is always set and fixed to
zero. And next seven bits in the octet is all set to one, which then
complete network ID. The 24 bits in the remaining octets represent the
hosts ID, allowing 126 networks and approximately 17 million hosts per
network. Class A network number values begin at 1 and end at 127.
Class B: Class B addresses are specified to medium to large sized of
networks. Class B allows for 16,384 networks by using the first two
octets for the network ID. The two bits in the first octet are always set
and fixed to 1 0. The remaining 6 bits, together with the next octet,
complete network ID. The 16 bits in the third and fourth octet represent
host ID, allowing for approximately 65,000 hosts per network. Class B
network number values begin at 128 and end at 191.
Class C: Class C addresses are used in small local area networks
(LANs). Class C allows for approximately 2 million networks by using
the first three octets for the network ID. In class C address three bits are
always set and fixed to 1 1 0. And in the first three octets 21 bits
complete the total network ID. The 8 bits of the last octet represent the
host ID allowing for 254 hosts per one network. Class C network
number values begin at 192 and end at 223.
Class D and E: Classes D and E are not allocated to hosts. Class D
addresses are used for multicasting, and class E addresses are not
available for general use: they are reserved for future purposes.
Subnet Mask
The subnet mask is used by the TCP/IP protocol to determine whether a
host is on the local subnet or on a remote network.
In TCP/IP, the parts of the IP address that are used as the network and
host addresses are not fixed, so the network and host addresses above
cannot be determined unless you have more information. This
information is supplied in another 32-bit number called a subnet mask.
For example, using our test IP address and the default Class B subnet
mask, we get:
The same mask is applied throughout the physical networks that share
the same subnet part of the IP address. All devices connected to the
networks that compose the subnet must have the same mask.
Subnets
All hosts on a network must have the same network number. This
property of IP addressing can cause problems as networks grow. The
problem is the rule that a single class A, B or C address refers to one
network not a collection of LANs. Thus when many computers are
connected the broadcast requests and other network traffic lead to
network blockages. To avoid this situation we have two options:
Sub-netting breaks a network into smaller realms that may use existing
address space more efficiently, and, when physically separated, may
prevent excessive rates of Ethernet packet collision in a larger network.
The technique of sub-netting can operate in both IPv4 and IPv6
networks. The IP address is divided into two parts: the network address
and the host identifier.
number hos
RFC19 largest CIDR bl
IP address of classful descrip t id
18 ock (subnet
range address tion siz
name mask)
es e
10.0.0.0 –
24-bit 16,777,2 10.0.0.0/8 24
10.255.255.2 single class A
block 16 (255.0.0.0) bits
55
172.16.0.0 –
20-bit 1,048,57 16 contiguous 172.16.0.0/12 20
172.31.255.2
block 6 class B's (255.240.0.0) bits
55
192.168.0.0 –
16-bit 256 contiguous 192.168.0.0/16 16
192.168.255. 65,536
block class C's (255.255.0.0) bits
255
Public IP Addresses
The IP Addresses provided by the Internet Service Providers (ISPs) are
called Public IP Addresses. These addresses are recognizable on the
internet and any machine connecting to internet must have a Public IP
Address. These addresses are provided by the Regional Internet
Registries to the ISPs.
The machines which are assigned Private IP Address must go on the
Internet via NAT server having Public IP Address.
The IP Address Ranges not included in the Private IP Address Ranges
are Public IP Ranges.
Broadcast Address
Limited address space. The most visible and urgent problem with
using IPv4 on the modern Internet is the rapid depletion of public
addresses. Due to the initial address class allocation practices of
the early Internet, public IPv4 addresses are becoming scarce.
Flat routing infrastructure, i.e. the IP address ranges are not
allocated according to any meaningful hierarchy. In the early
Internet, address prefixes were not allocated to create a
summarizable, hierarchical routing infrastructure. Instead,
individual address prefixes were assigned and each address prefix
became a new route in the routing tables of the Internet backbone
routers. Today’s Internet is a mixture of flat and hierarchical
routing, but there are still more than 85,000 routes in the routing
tables of Internet backbone routers. Thus to reach a router from
one country to another the packet might need to go to a backbone
router in a third country thereby increasing cost and delay.
Security for IPv4 is specified by the use of Internet Protocol
security (IPSec). However, IPSec is optional for IPv4
implementations. Because an application cannot rely on IPSec
being present to secure traffic, an application might resort to other
security standards or a proprietary security scheme. The need for
built-in security is even more important today, when we face an
increasingly hostile environment on the Internet.
Another drawback was the 32 bit header which had much of the
values which were generally never used and which only increased
the bandwidth usage.
A final challenge has been the real-time delivery of multimedia
content and the necessary bandwidth allocation that goes along
with it. A bandwidth allocation method called Quality of Service
(QoS) has been used with IPv4. While QoS does work, there are a
number of different interpretations of the IPv4 QoS standards. This
means that not all QoS-compliant devices are compatible with one
another.
Internet Protocol Version 6
The new design is not based on the goal to provide a sufficient quantity
of addresses alone, but rather to allow efficient aggregation of subnet
routing prefixes to occur at routing nodes. As a result, routing table sizes
are smaller, and the smallest possible individual allocation is a subnet
for 264 hosts, which is the size of the square of the size of the entire IPv4
Internet. IPv6 has facilities that automatically change the routing prefix
of entire networks should the global connectivity or the routing policy
change without requiring internal redesign or renumbering.
Benefits of IPv6
Hierarchical routing infrastructure
The Internet is hierarchical in nature, and the IPv6 protocol is designed
with this in mind. Think about it. The computer you're using right now
doesn't have a direct connection to an Internet backbone. Instead, you're
probably behind a NAT firewall, which is connected to an ISP. That ISP
may be connected to another ISP or to a backbone router. Either way, a
packet must make quite a few hops to go from an Internet backbone
router to you.
Network security
Network security is integrated into the design of the IPv6
architecture. Internet Protocol Security (IPSec) was originally developed
for IPv6, but found widespread optional deployment first in IPv4 (into
which it was back-engineered). The IPv6 specifications
mandate IPSec implementation as a fundamental interoperability
requirement.
The IPv6 protocol has a newly designed IP header. It's designed to make
the protocol more efficient by keeping overhead to a minimum. An IP
packet header is made up of required components and optional
components; in IPv6, the required components are moved to the front of
the header. Optional components are moved to an extension header. This
means that if optional components aren't used, the extension headers
aren't necessary, reducing the packet size.
The downside to the new header is that it isn't compatible with IPv4. If a
router is to handle both IPv4 and IPv6, it must be configured to
recognize both protocols. You can't just set up a router to recognize IPv6
and expect it to be backward-compatible with IPv4.
New configuration options
One of the coolest things about IPv6 is the way it's configured. While
you can still manually configure IPv6, or lease an address from a DHCP
server, there is a new automatic configuration option available. If an un-
configured PC tries to connect to a network that doesn't offer a DHCP
server, the PC can look at either the network's router or the other PCs on
the network and determine an address that would be appropriate for it to
use. This technique is referred to as link local addressing.