the internet protocol
DESCRIPTION
The Internet Protocol. Eliot Grove Danny Friel Stuart Anderson. OSI Model. Application. Presentation. Session. Transport. Network. Data Link. Physical. The Network Layer. Navigating data Source Destination. Internet Protocol. Numbering scheme - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/1.jpg)
The Internet ProtocolThe Internet Protocol
Eliot Grove
Danny Friel
Stuart Anderson
![Page 2: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/2.jpg)
OSI ModelOSI Model Application
Presentation
Session
Transport
Network
Physical
Data Link
![Page 3: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/3.jpg)
The Network LayerThe Network Layer
Navigating data
Source
Destination
![Page 4: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/4.jpg)
Internet ProtocolInternet Protocol
Numbering scheme
Largest network of computers
American Registry of Internetwork Numbers (ARIN)
![Page 5: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/5.jpg)
What is an IP addressWhat is an IP address
A way to identify machines on a network
A unique identifier
![Page 6: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/6.jpg)
IP usageIP usage
Used to connect to another computer
Allows transfers of files and e-mail
![Page 7: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/7.jpg)
IP structureIP structure
IP addresses consist of four sections
Each section is 8 bits long
Each section can range from 0 to 255
Written, for example, 128.35.0.72
![Page 8: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/8.jpg)
IP structureIP structure
These four sections represent the machine itself and the network it is on
The network portion is assigned.
The host section is determined by the network administrator
![Page 9: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/9.jpg)
IP structureIP structure
5 Classes of IP address A B C D and E
Class A reserved for governments
Class B reserved for medium companies
Class C reserved for small companies
![Page 10: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/10.jpg)
IP structureIP structure
Class D are reserved for multicasting
Class E are reserved for future use
![Page 11: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/11.jpg)
IP structureIP structure
Class A begins 1 to 126
Class B begins 128 to 191
Class C begins 192 to 223
![Page 12: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/12.jpg)
Reserved addressesReserved addresses
Addresses beginning 127 are reserved for loopback and internal testing
xxx.0.0.0 reserved for network address
xxx.255.255.255 reserved for broadcast
![Page 13: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/13.jpg)
IP AddressesIP Addresses
IP addresses are:
Unique
Global and Standardised
Essential
![Page 14: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/14.jpg)
Subnetting - Why?Subnetting - Why?
Division of local networks
Greater number of networks
Simplifies addressing
![Page 15: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/15.jpg)
Subnetting - HowSubnetting - How
Bits borrowed from host field
Network Network Host Host
Network Network Subnet Host
Network Network Subnet Subnet/Host
![Page 16: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/16.jpg)
Subnetting -ExampleSubnetting -Example
130.5.0.0 - Network address 130.5.2.144 - Host address 255.255.255.0 - Subnet Mask 130.5.2.0 - Subnet
![Page 17: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/17.jpg)
Where do you want to goWhere do you want to go
Computer controlled dwellings
Road and rail systems
Criminal tagging
Tomorrow?Tomorrow?
![Page 18: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/18.jpg)
The Internet ProtocolThe Internet Protocol
Running out!!
Upgraded to IPv6
![Page 19: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/19.jpg)
Thank you!Thank you!
![Page 20: The Internet Protocol](https://reader036.vdocuments.us/reader036/viewer/2022082818/568132aa550346895d9952a2/html5/thumbnails/20.jpg)
And goodnight!And goodnight!