CSC 423 Lecture Materials

Embed Size (px)

Citation preview

  • 8/10/2019 CSC 423 Lecture Materials

    1/33

    Monday, January 05,2015

    1

    CSC 423 : COMPUTER NETWORKS

    * Introduction to Networking* Classification/Types of Networks

    - LAN, WAN, INTRANET, EXTRANET, INTERNET

    * LANDefinition, Scope, Components, Topology

    * Internetworking

    * Interconnectivity, Standards, Protocols.

    Textbooks

    1. Computer Networks and Internets with Internet Applications, 3

    rd

    EditionAuthor: Douglas E-Comer

    2. Data and Computer Communications, 3rdEdition

    Author ; Williams Stallings.

  • 8/10/2019 CSC 423 Lecture Materials

    2/33

    Monday, January 05,2015

    2

    COMPUTER NETWORKS BASICS- Evolution of Computer Networks

    * Batchoriented configuration

    * Timesharing Multi-user

    * SingleUser

    * LAN

    * Private WANs (Metropolitan)* Publicly Switched Data Networks (WAN)

    * Internet

    * Intranet

    Motivation/Benefits of Networks

    * Fast communicationdata/messages:- The first data networks were developed to share large scalecomputational power

    - Information

    - Software

    * Sharing of resourcesData / Messages

    - information

    - software

    - hardwareprocessor, memory, printer, modem, remote devices

    e.t.c

    * Cost effectiveness

    * Convenience

    * Delivered new paradigmsGlobal village, digital economy, information society, common humanity.

    delivered new servicese-services e.g. e-mail, web browsing,, e-purse, e-banking, e-commerce,virtual- learning, virtual lab etc. ftp, teleconferencing etc.

    Network Types

    - LAN, MAN, WAN, INTRANET, INTERNET- LAN

    * Definition & Scope

    * Benefits

    * Requirements

    * Pointtopoint t/Direct & shared LAN

    * Topology / Architecture

  • 8/10/2019 CSC 423 Lecture Materials

    3/33

    Monday, January 05,2015

    3

    -A network is a set or collection of nodes or points which are linked or connected togethere.g. network of roads, a network of fuel depots, a network of product distributors.

    - Computer Network refers to a set or collection of computers that are linked or connectedtogether in some pattern.

    Historical development of computer Networks

    * Development of multi-user systems

    * Limitations of multi-user systems

    * Development of top-end PCs

    * Limitations of PCs

    - Motivation/Benefits of computer networks* Fast Communication

    ** Messages / Information

    ** Data

    ** Software

    ** Access to specified remote devices

    * Sharing of computer resources

    ** Messages / information

    ** Data

    ** Software

    ** Devices e.g. printers, moderns, telephone lines.

    ** RAM space

  • 8/10/2019 CSC 423 Lecture Materials

    4/33

    Monday, January 05,2015

    4

    ** Processor** Hard disk space

    * Cost

    * Convenience

  • 8/10/2019 CSC 423 Lecture Materials

    5/33

    Monday, January 05,2015

    5

    LAN Contd

    * General Introduction

    * PointtoPoint versus shared LAN

    No. of direct = (N2N) / 2

    Connections

    * Locality of reference principle- Temporal locality of reference

    - Physical locality of reference

    * Requirements

    * Topology / Architecture

    Discuss the different lines (cables, cards, connector & other accessories)available in the market based on star, Ring & Bus architecture.

  • 8/10/2019 CSC 423 Lecture Materials

    6/33

    Monday, January 05,2015

    6

    LAN Contd

    The decreasing cost and increasing performance of micros have led to a continuing integration of micro-technology into every facet of business, education, and government.

    SingleSite organizations i.e. organizations whose communication occurs across relatively short distancessuch as a building or a group of offices, benefit from LAN.

    - The initial motivation for LAN was the need to share expensive resources such as laser printers and high-capacity, high-speed mass storage devices etc. among a number of users termed WORKGROUP. This is adirect economic benefit.

    - LAN allows the high-speed exchange of essential information between workgroup members in anorganization. This promotes efficiency and productivity.

    - LAN provides the catalyst to increase the range of potential applications for PCs.

    - LAN could be a visible contributor to increased profitability or some other productivity metric in the caseof non-profit organisations)

    TerminologyCLIENTSWorkstations running host applications.

    The term SERVER refers to a software application that offers a well-defined service to network users. Aserver application can be run on special-purpose hardware or an ordinary PC. In the latter case, the PC

    often has minimum configuration requirements. The most common types of servers are Web servers, mailservers, File Servers, Print servers, Communication Servers, & Database servers etc.

    SERVER could be dedicated or non-dedicated

    A dedicated server is set up to provide one or more services to users on the network.

    A non-dedicated server can simultaneously function as a workstation and one or more servers. LANsconnecting non-dedicated servers are also referred to as PEER-TO-PEER NETWORKS.

  • 8/10/2019 CSC 423 Lecture Materials

    7/33

    Monday, January 05,2015

    7

    Direct

    Point-to-point & shared LANs

    Direct Point-to-point

    The first computer communication systems all used the direct point-to-point pattern ofcommunication. In this pattern, each communication channel or medium connectedexactly two computers, and was available to those computers exclusively. Known as apoint-to-point network or mesh network, the scheme has three useful properties.

    First, because each connection is installed independently, appropriate hardware can beused. For example the transmission capacity i.e. the bandwidth of the underlying circuit

    and the modems used do not need to be the same on all connections. Second, becausethey have exclusive access, the connected computers can decide exactly how to senddata across the connection. They can choose a frame format, an error detectionmechanism and a maximum frame size. More important, because each connection isindependent of others, the details can be changed whenever the owners of the attachedcomputers agree to make a change. Third, because only two computers have access tothe channel, it is easy to enforce security and privacy. No other computers handle data,and no other computers can obtain access.

    However, the main disadvantage of direct point-to-point connection becomes apparentwhen more than two computers need to communicate with one another. In a point-to-pointscheme that provides a separate communication channel for each pair of computers, thenumber of connections grows quickly as the size of the set increases. For example, twocomputers need only one connection, three computers need three connections, and fourcomputers need 6 connections.

  • 8/10/2019 CSC 423 Lecture Materials

    8/33

    Monday, January 05,2015

    8

    The total number of connections grows more rapidly as the total number of computers. Mathematically,the number of connections needed for N computers is proportional to the square of N :

    DIRECT CONNECTIONS REQUIRED = (N2 - N) /2= N(N-1)/2

    These connections are expensive in terms of cabling cost. Local Area Networks (LANs) were devisedas alternatives to expensive, dedicated point-to-point connections. Each LAN consists of a singleshared medium, usually a cable, to which many computers attach. The computers take turn to use themedium to communicate with one another.

    LAN concept is supported by a fundamental principle of computer networking known as LOCALITYOF REFERENCE. It states that communication among a set of computers is not random, but insteadallows two patterns. First, if a pair of computers communicates once, the pair is likely to communicate

    again in the near future and then periodically. This pattern is called TEMPORAL LOCALITY OFREFERENCE to imply a relationship over time. Second, a computer tends to communicate most oftenwith other computers that are nearby. This second pattern is called PHYSICAL LOCALITY OFREFERENCE to emphasize the geographic relationship.

    The locality reference principle is easy to understand because it applies to human communication.For example, people communicate most often with others who are nearby (e.g. working together).Furthermore, if an individual communicates with someone (e.g a friend or family members), theindividual is likely to communicate with the same person again.

    Requirements

    Computers hardware-Workstations /Clients

    -Servers

  • 8/10/2019 CSC 423 Lecture Materials

    9/33

    Monday, January 05,2015

    9

    Computer Software

    -Network Operating System (OS)

    -Server applications (Network versions of application software)-Client OS

    -Client applications

    Communication hardware

    -Network Cards (NAC/NIC)Switches/Hubs

    -Cables-Accessories

    -Protocol Software

    Peopleware

    -Network Administrator/Manager-Network Engineer

    -Network Programmer

    -Database Administrator

    -Web designer

    -Network user

  • 8/10/2019 CSC 423 Lecture Materials

    10/33

    Monday, January 05,2015

    10

    NETWORK ARCHITECTURE OR TOPOLOGY

    Network designs have three categories : Star network, Ring network, and Bus network.

    - A Star network: Contains a central connecting device called or Hub or Switch andone or more workstations connected to the central device, forming a Star.

    The Star arrangement is logical. e.g. Ethernet 10 Base T, Asynchronous TransferMode (ATM).

    - In a Ring network, there is no central system, rather, a series of computer systemscommunicate with one another from one node to the next node in one direction only

    (closed loop). The ring arrangement is logical e.g. IBM Token Ring, Fibre DistributedData Interconnect (FDDI).

    - The Bus network is a kind of Broadcast topology characterised by a singlecommunication channel shared by all communicating computers e.g. consists of asingle, long cable to which computers attach.

    In the Bus network, one computer is allowed to transmit message onto the bus whileothers are required to receive or not to transmit, at any one time e.g. EthernetThicknet and Thinnet (10 Base 2)

    In the Bus network, the message usually bears the address of the intended receivers sothat others will share it.

  • 8/10/2019 CSC 423 Lecture Materials

    11/33

    Monday, January 05,2015

    1111

    NETWORK TOPOLOGY (contd.)

    STAR

    Switch

    Client A Client B Client C Server Client D

  • 8/10/2019 CSC 423 Lecture Materials

    12/33

    Monday, January 05,2015

    1212

    NETWORK TOPOLOGY (contd.)

    RING

    Broadcast methodA message can be sentfrom a PC to multiple destinations at the sametime.

    Client A

    Client C

    Client D

    Server

    Client B

  • 8/10/2019 CSC 423 Lecture Materials

    13/33

    Monday, January 05,2015

    1313

    NETWORK TOPOLOGY (contd.)

    BUS

    Broadcast

    Client D Client C

    Server Client A Client B

    Bus (cable)

    Terminal

    Broadcastmethod

    Terminal

  • 8/10/2019 CSC 423 Lecture Materials

    14/33

    Monday, January 05,2015

    14

    TOPOLOGY

    Network design or ArchitectureThe way a network is physically connected together. Ithas effect on network selection and management.

    Common topology are: Star, Ring, Bus, Distributed Star.

    Factors that influence choice of topology:-

    - The complexity & cost of network cable installation

    - Redundant, or fail-safe design

    - Fault isolation

    - Strategy for physically expanding and reconfiguring the network.

    Ring - Provides redundancy through the use of a backup cable path which can be usedfor network reconfiguration resulting from media failure.

    - Provides built-in hardware features to isolate failed station loops from the activering.

    StarIt is the superior choice for fault detection and isolation.

    BusMore difficult to diagnose since there is no built-in means to isolate faulty cablesegments

  • 8/10/2019 CSC 423 Lecture Materials

    15/33

    Monday, January 05,2015

    15

    Star - Asynchrous Transfer Mode (ATM) uses an electronic switch or a hub to

    which computers are attached by means of fibre optics cables.

    - Twisted Pair Ethernet (10 Base T)

    Twisted pair wiring

    RingIBM Token RingConcept of TOKEN (Broadcasting)

    - Fibre Distributed Data Interconnect (FDDI)

    - Copper Distributed Data Interconnect (CDDI)

    - Uses two layers of rings in a counter rotating form. Outer carries data, while inner is used when theouter ring fails.

    BusEthernetThicknet & Thinnet (Broadcasting)

    * Carrier Sense Multiple Access (CSMA)

    * Carrier Sense Multiple Access / Collision

    1stCollision applies a delay of o to d

    Subsequent collision applies a delay of o to ndwhere nis an even

    factorthis scheme is referred to as the Binary Exponential Back off

    Hub/

    Switch

  • 8/10/2019 CSC 423 Lecture Materials

    16/33

    Monday, January 05,2015

    16

    HARDWARE ADDRESSING IN LAN & FRAME TYPE IDENTIFICATION

    LAN Technologies use an Addressing Scheme to provide direct communication.

    Each workstation on the LAN is assigned a unique numeric value called a PHYSICAL ADDRESS, HARDWARE

    ADDRESS or MEDIA ACCESS ADDRESS (MAC ADDRESS)

    Each Packet or Data Frame transmitted from a Workstation on a LAN consists of two address fieldsSOURCEaddress field, DESTINATION address field.

    Senders address makes it easy for the receiver to generate a reply to the sender in case of errors or for

    acknowledgement.

    Categories of Addressing

    Static:Hardware manufacturer-assigned. Does not change except NIC is changed.

    Configurable:provides a mechanism for users to set the addressmanual through setting of switches or electronicusing EPROM. Configuration usually done once when NIC is f irst installed.

    Dynamic: Aphysical address is assigned to a workstation when the workstation first boots. It uses a random number

    that does not correspond to any other workstation's address.

    Unicasting - a single destination address

    Broadcastingmakes a copyof message available to all connected computers on the network. A reservedBROADCAST address is needed in the DESTINATION field e.g. 11111111 could specify broadcast & 10000001 thestations address

    i.e. either address in the destination field could lead to forwarding of the packet to receiving hosts Operating System.

    MulticastingA restricted form of Broadcasting. NIC is programmed with specs of which multicast frames

    i.e. destination addresses to accept or reject.

  • 8/10/2019 CSC 423 Lecture Materials

    17/33

    Monday, January 05,2015

    17

    Packet Frame

    Packet / Frame formats

    Frame Header Frame Data Area or Payload

    General format

    Frame header contains info. Such as Source & Destination addresses.

    Frame Data Area or Payload contains information or message being sent.

    Preamble Dest Source Frame Data CRC

    Address. Addr type

    Ethernet frame format

    Syn Dest Addr Source Addr Frame type Data Error Checking code

    8Bytes 6bytes 6bytes 2 46-1500 4

  • 8/10/2019 CSC 423 Lecture Materials

    18/33

    Monday, January 05,2015

    18

    INTERNETWORKING COMPONENTS & SYSTEMS

    InternetworkingConnecting multiple physical networks into a large, logically

    uniform communication system.

    Motivation

    - Constraints of specific networks e.g. LANs provide high speed communication

    within a short distance.

    - Diverse networking requirements by large organizations implies multiple

    physical networks.

    - Choice of different networks suited to different tasks.

    Concept of universal service:

  • 8/10/2019 CSC 423 Lecture Materials

    19/33

    Monday, January 05,2015

    19

    INTERCONNECTIVITY, STANDARDS, PROTOCOLS

    Network entities :Computers, Applications, Networks

    Multivendor disparate products exist for these entities. For Interconnectivity & Inter-operability orOPENNESS between diverse, disparate products, upward compatibility, there is need to have certaincommon denominators in network entities design & implementation.

    These common denominators are provided by many national and international organizations.

    Protocol refers to rules, conventions, guidelines, agreed to/adopted by a group of stakeholders for the

    design & implementation of products.

    A protocol or protocol suite adopted by a group & widely circulated and accepted becomes a

    STANDARD.

    Standards could be :

    - Dejure - National - Universal

    - Defactor - International

    Examples of Standards and Regulations Organizations:

    ISOInternational Standards Organization

    IEEEInstitute of Electrical & Electronic Engineers

    ITUInternational Telecommunications Union

    CCITTConsultative Committee in International Telegraphy and Telephony

    NCCNational Communications Commission

    SONStandards Organization of Nigeria

  • 8/10/2019 CSC 423 Lecture Materials

    20/33

    Monday, January 05,2015

    20

    ANSI American National Standards Institute

    ECMA European Computer Manufacturers Association

    DoD Department of Defense, United States of American

    Develop your note on the history & functions of the above bodies especially in the areas of Computers& Networking.

    Connectivity levels / layers : Communications is made possible generally by 3 layers / levels

    - Cognitive, - Understanding the concept

    - Language - Expression

    - Transmission - Physical means of communication

    Independent layers but each depends on at least one other layer for effectiveness.

    OSI (Open Systems Interconnection) reference model of ISO.

    X.200 of CCITT

    TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP)LAN Protocolsieee series

  • 8/10/2019 CSC 423 Lecture Materials

    21/33

    Monday, January 05,2015

    21

    TCP/IP was the first set of protocols developed for use in an internet. It is a result of protocol research and developmentconducted on the experimental packet-switched networkthe ARPANET, funded by the Defense Advanced ResearchProjects Agency (DARPA) of USA, and is generally referred to as the TCP/IP protocol suite.

    Indeed, researchers who devised TCP/IP also developed the internet architecture described earlier. Work on TCP/IP beganin the early 1980s, about the same time that Local Area Networks (LANs) were being developed. The military was among thefirst organisations to have multiple physical networks. Consequently it was among the first to realize the need for universalservice.

    Research on internetworking and TCP/IP protocols has produced dramatic results. Inter-networking has become one of themost important ideas in modern networking. In fact internet technology has revolutionized computer communication. Mostlarge organisations already use internetworking as the primary computer communication mechanism. Smaller organisationsand individuals have started to do so as well. The TCP/IP technology has made this possible.

    Communication task for TCP/IP are organized into five relatively independent layers :

    OSI Model TCP/IP Model

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    Physical

    Process/Application

    Host-to-Host

    (Transport)

    Internet

    Network

    Interface layer

    Physical

  • 8/10/2019 CSC 423 Lecture Materials

    22/33

    Monday, January 05,2015

    22

    The model is a framework for defining standards for linking heterogeneous computers.

    The OSI is concerned with the exchange of information between a pair of open systems and not and

    with the internal functioning of each individual system.

    The OSI model/architecture has seven layers which are listed with a brief definition as follows :

    * PhysicalConcerned with mechanical, electrical functional and procedural

    characteristics of physical links

    * Data linkProvides for the reliable transfer of data across the physical link.

    * Network - Responsible for establishing, maintaining, and terminating network connections

    * TransportProvides reliable, transparent transfer of data between end points.

    * SessionEstablishes, manages, and terminates sessions between cooperating applications

    * PresentationPerforms transformations on data to provide standardised application interface e.g.encryption, text compression.

    * ApplicationProvides services to users of the OSI environment e.g. transaction services, file

    transfer etc.

  • 8/10/2019 CSC 423 Lecture Materials

    23/33

    Monday, January 05,2015 23

    The Physical and Network Interface Layers of the TCP/IP model use existing Physical and

    Data link standards, such as Ethernet and Token Ring, thereby making TCP/IP hardware-

    independent.

    As a result, the protocol is widely used to connect heterogeneous systems.

    The Internet layer provides procedures needed to allow data to traverse multiple

    interconnected networks. The Internet Protocol (IP) is used at this layer to provide the routing

    function across multiple networks.

    The Transport layer (Host-to-Host) provides the requirements needed for data to be exchanged

    reliably regardless of the nature of the applications that are exchanging data. The Transmission

    Control Protocol (TCP) is the most commonly used protocol to provide this functionality.

    Finally, the Application layer contains the logic needed to support the various user applications.

  • 8/10/2019 CSC 423 Lecture Materials

    24/33

    Monday, January 05,2015 24

    The TCP/IP Protocol

    Transmission Control Protocol/Internet Protocol

    The Internet concept :

    a. The illusion of a single network that TCP/IP software provides to users and applications

  • 8/10/2019 CSC 423 Lecture Materials

    25/33

    Monday, January 05,2015 25

    host computer

    router

    b. The underlying physical structure in which a computer attaches to one physical network, and routers

    interconnect the networks.

    net 3

    net 1

    net 2

    net 6

    net 5

    net 4

  • 8/10/2019 CSC 423 Lecture Materials

    26/33

    Monday, January 05,2015 26

    A routeris a special-purpose computer dedicated to the task of interconnecting networks. A router

    can interconnect networks that use different technologies including different media, physical

    addressing schemes, or data frame formats.

    An Internetconsists of a set of networks interconnected by routers. The internet scheme allows each

    organization to choose the number and type of networks, the number of routers to use to

    interconnect them, and the type of interconnection.

    Host Computer :TCP/IP defines the term host computerto refer to any computer system that

    connects to an internet and runs applications. A host can be as small as a PC or as large as a

    mainframe.

  • 8/10/2019 CSC 423 Lecture Materials

    27/33

    Monday, January 05,2015 27

    Application layer

    Transport layer

    Internet layer

    Network Interface layer

    Physical

    TCP/IP PROTOCOL SUITE

    SMTP TELNET FTP DNS HTTP

    TCP UDP NETWORKVOICE PROTOCOL (VoIP)

    IP

    ICMP ARP RARP

    LAN Protocols

  • 8/10/2019 CSC 423 Lecture Materials

    28/33

    Monday, January 05,2015 28

    Simple Mail Transfer Protocol (SMTP) Handles the transfer of emails using

    UDP or TCP as underlying protocols.

    TELNET It is a remote log-in protocol that uses TCP as the underlying

    protocol.

    File Transfer Protocol (FTP) It is the protocol that gives access to

    data/software files stored in folders for general use. It uses TCP as the

    underlying protocol.

    Domain Name Service (DNS) This protocol resolves domain names to IP

    addresses and vice versa. It uses UDP as the lower transport protocol.

  • 8/10/2019 CSC 423 Lecture Materials

    29/33

    Monday, January 05,2015 29

    Internet Control Message Protocol (ICMP) a special purpose set of messages that are used between

    internetwork nodes to resolve problems in packet processing.

    These messages include :

    Echo request, Source quench, Routing change request,

    Time stamp request / Reply.

    Address Resolution Protocol (ARP)

    used to map the 32-bit IP address to a MAC address e.g. (anEthernet 48-bit address). The ARP is necessary because there is no preestablished relationship

    between IP and MAC address.

    Address resolution / Binding can be done in 3 different ways:

    - Table lookup, Closed form computation, Message exchange.

    Reverse Address Resolution Protocol (RARP) It is a who am l broadcast that is transmitted by a

    new station entering the network. The broadcast is responded to by a RARP server that maps the

    Requesters MAC address to an IP address appropriate to the internetwork configuration.

    Connectionless & Connection-oriented Services

    Connectionless - A characteristic of a network system that allows a computer to send data to any

    other computer at anytime. Connectionless networks are analogous to a postal system in which each

    letter carries the address of the recipient; letters can be sent at any time. It is an extension of packet

    Switching.

    Connection-oriented- A characteristic of a network system that requires a pair of a computers to establish a connection

    before sending data. Connection-oriented networks are similar to a telephone system in which a call must be placed

    and answered before communication can begin.

    TCP/IP includes both servicesthe fundamental delivery service is connectionless, however, a reliable connection-oriented service uses the underlying connectionless service.

    An Internet Packet is called an IP Datagram.

  • 8/10/2019 CSC 423 Lecture Materials

    30/33

    Monday, January 05,2015 30

    TCP Transmission Control Protocol

    It is an End-to-End protocol because it provides connection directly from an application on one computerto an application on a remote computer.

    The connections are called VIRTUAL CONNECTIONS because they are achieved by software.

    It provides Reliable Transport Service.

    From an application program's point of view, the service offered by TCP has seven major features:

    - Connection orientation

    - Point-to-Point

    - Complete reliability : Exact delivery ,no duplication, no data missing or out of order

    - Full duplex communication

    - Stream Interface

    - Reliable Connection Startup

    - Graceful Connection Shutdown

    User Datagram Protocol (UDP)

    It is a connectionless transport protocol that permits an application to send a message to anydestination at anytime. When using a connectionless transport protocol, the sending applications mustspecify a destination with each message it sends. An application using UDP can send a sequence ofmessages, where each message is sent to a different destination.

  • 8/10/2019 CSC 423 Lecture Materials

    31/33

    Monday, January 05,2015 31

    Hardware Frame, IP datagram, Fragmentation, Maximum Transmission

    Unit, Encapsulation

    IP datagram is encapsulated in a Hardware frame.

    Each hardware technology has a maximum amount of data that a Frame can carry; this

    limit is known as Maximum Transmission Unit (MTU). Thus, a datagram must be less

    or equal to an MTU in size, or it cannot be encapsulated.

    The Router uses the technique known as FRAGMENTATION to divide the datagram

    into smaller pieces called Fragments, which are then transmitted independently.

    Hardware Hardware Frame data

    Frame Header

    IP Header IP data area

    IP Header Original datagram data area

    IP Header data 1 IP Header data 2 IP Header data 3

  • 8/10/2019 CSC 423 Lecture Materials

    32/33

    Monday, January 05,2015 32

    TCP/IP continued

    IP Addresses

    Internet as a single, uniform Virtual Network.

    To guarantee uniform addressing of routers and hosts, the protocol software defines an

    addressing scheme for all computers on the internet .

    Each host has a unique IP Address used by Application programs & higher layers of protocol softwarefor communication.

    Each host has a unique 32-bit number known as IP address.

    IP address is different from MAC physical address.

    Network number Host number

    Classful IP addressing

    0 8 16 24 31

    Class A

    Class B

    Class C

    Class D

    Class E

    Prefix suffix

    C prefix suffix

    1 0 prefix suffix

    1 1 0 prefix suffix

    1 1 1 0 multicast address

    1 1 1 0 reserved for future use

  • 8/10/2019 CSC 423 Lecture Materials

    33/33

    Monday January 052015 33

    Dotted Decimal Notation

    32-bit Binary Number Equivalent Dotted

    00000010111111100000000100000000 2.254.1.0

    IANAInternet Assigned Number Authority

    ICANNInternet Corporate for Assigned Names and Numbers

    Subnet & Classless Addressing

    0 Address mask or 31 32 Actual host address 63

    The mask specifies the boundary between prefix & suffix.

    1bits mark network prefix0 bits mark host or suffix portion

    Classless Inter-Domain RoutingCIDR

    IP address/mask

    e.g. 200.218.56.18/20

    Subnet mask