Design an IP address scheme according to organisational requirements What is a protocol? Why protocols are used in networking 2 Examples of different protocols 3 The ISO/OSI reference model The seven layers explained 4 6 Introduction to TCP/IP 9 How TCP/IP works 9 What is an IP address? 12 Components of an IP address 12 Classes of IP addresses 13 Subnet masks 15 Binary and decimal conversion 17 Subnetting 19 Routing 20 Routing tables 21 IP Version 6 (IPv6) 23 Summary 24 Check your progress Readings: Design an IP address scheme according to organisational requirements 2005 2 24 1 What is a protocol? For communication to occur there has to be some form of common language and some guidelines that are used to manage the communication process. With respect to computers and information technology, a protocol is a standard framework, which dictates how two or more computers communicate with each other and share information over a particular data link. Why protocols are used in networking Protocols define the rules or standards for communication between network devices. A printer cannot interpret signals sent by other devices, such as a workstation or file server, unless there is a common protocol. Protocols enable data to be sent between two devices in sequence and without errors. Examples of protocols used on networks include: Transmission Control Protocol/Internet Protocol (TCP/IP) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) NetBIOS (Network Basic Input Output System) NetBIOS Enhanced User Interface (NetBEUI) AppleTalk. Protocols need to be installed and configured on both devices before communication can take place between those devices, eg a workstation and a file server. With respect to networking, the term ‘protocol’ actually refers to a group or suite of individual protocols that work together. Different tasks are assigned to protocols within a suite, such as data translation, data handling, addressing or error checking. There are many factors that determine which protocol (protocol suite) you may use on a network. Factors include: 2 the error rate on the data link whether Internet access is required (this is important as some protocols are not routable) Readings: Design an IP address scheme according to organisational requirements 2005 the network operating system being used how much network security will be required the speed requirements of the network. Examples of different protocols Below you will find some examples of the different protocols with a brief explanation for each. Internet Packet Exchange (IPX) and Sequenced Packet Exchange (SPX) This is a suite of protocols, made up of many protocols, not just IPX and SPX. It was originally developed by Xerox and adopted by Novell in the 1980s. Novell’s NetWare clients and servers use this suite of protocols. It is routable, meaning that it can cross many LAN segments. IPX works at the network layer and is connectionless, that is the protocol does not guarantee delivery of data. The IPX protocol is responsible for addressing. SPX is responsible for ensuring that data is received in sequence and error free. NetBIOS and NetBEUI The Network Basic Input Output System (NetBIOS) was originally developed by IBM and later adopted by Microsoft to be used in small local area networks. NetBEUI (NetBIOS Enhanced User Interface) is a fast and efficient protocol that is still used on small networks. However, this protocol is not routable, that is it cannot span the Internet. However, many systems still require the presence of the NetBIOS protocol services to function correctly. The NetBIOS protocol services can be implemented on routed networks by ‘riding’ on TCP/IP through the routers, that is TCP/IP encapsulates NetBIOS. AppleTalk This protocol was developed to interconnect Apple Macintosh computers. This is a routable protocol. To find out more information on these and other protocols, you can follow the links in the Research section of this Learning Pack. Readings: Design an IP address scheme according to organisational requirements 2005 3 The ISO/OSI reference model In the early 1980s the International Standards Organisation (ISO) developed a model or theoretical representation of what happens between two computers on a network. The model known as the Open Systems Interconnection (OSI) is the blueprint that has helped networking specialists to understand and develop computer-to-computer communications. The goal of establishing the reference model was to allow different computers from different manufacturers, running different operating systems to communicate with each other, so long as each system conformed to the OSI reference model. The model has seven layers: 1 application 2 presentation 3 session 4 transport 4 network 6 data link 7 physical. Each layer of the OSI model has its own function and interacts with the layers directly above and below it. Figure 1 below shows information going down the seven layers from one device across intermediate devices, and then up through the seven layers on the destination device. These devices can be any type of network equipment such as networked computers, printers and internetworking devices such as routers and switches. 4 Readings: Design an IP address scheme according to organisational requirements 2005 Sending device Receiving device Application Application \ Presentation Presentation Session Session Transport Transport Network Network Network Network Data Link Data Link Data Link Data Link Physical Physical Physical Physical Figure 1: The ISO/OSI reference model showing communication between two devices Here is a simple mnemonic to help you remember the order of the seven layers of the OSI model: All Application 7 People Presentation 6 Seem Session 5 To Transport 4 Need Network 3 Data Data Link 2 Processing Physical 1 Figure 2: Remembering the seven layers of the OSI model Readings: Design an IP address scheme according to organisational requirements 2005 5 The seven layers explained Physical layer The physical layer is the bottom layer of the OSI model. Its function is to simply: Transmit bits over the network media. This layer contains the physical networking media such as cabling, connectors and repeaters. Specify the mechanical, electrical and functional means of establishing and maintaining the physical connections. That is, how the electrical signals are amplified and transmitted over the wire. The layer sets the data transmission rate and monitors data error rates, although it does not provide for error correction — which is done at another level. The physical layer thus activates and deactivates the physical connection. A severed wire or a NIC (network interface card) not seated deeply enough are some of the network problems that can be experienced at the physical layer. Data link layer The second layer of the OSI model is the data link layer. Its primary purpose is to provide a reliable method of transmitting data across the physical media. The data link layer divides data it receives from the network layer into frames that can then be transmitted by the physical layer. A header and trailer are added to the frames. These allow the destination device to see when a frame begins or ends on the physical media. The frames are then transmitted sequentially, and the sender’s data link layer waits for an acknowledgement from the receiver that data was received correctly. If the sender does not get this acknowledgment, its data link layer gives instructions to retransmit the information. The data link layer is divided into two sub-layers — the Media Access Control (MAC) sub-layer and the Logical Link Control (LLC) sub-layer. Media Access Control (MAC) The MAC sub-layer is responsible for the physical addressing of devices on the network and how these devices gain access to the network media. The physical addressing at the data link layer is called a physical address, because this address is hard-coded into the network interface card by the manufacturer. The address is also known as the MAC layer address. Each device has a unique address that provides the necessary information to direct data to and from devices on the local network. 6 Readings: Design an IP address scheme according to organisational requirements 2005 Logical Link Control (LLC) The LLC sub-layer is responsible for flow control and error correction at this layer and provides two service types: The unacknowledged connectionless service is unreliable as data is transferred with no error checking. The Connection-oriented service — is slower than the connectionless service, as data is checked for errors using Cyclic Redundancy Checks (CRC). CRC is one method of detecting errors in transmitted data. Before the data is sent, a CRC number is calculated by running the data through an algorithm, which produces a unique number. The data is run through the same algorithm again at the receiving end. If the numbers are the same, the data was then sent error free. The number generated by the algorithm is called a checksum. Flow control is important not only at the LLC sub-layer but also at all layers of the OSI model. It’s important to make sure that the transmitter doesn’t flood the receiver with data resulting in buffer overflow and lost data. Network layer The network layer is responsible for routing information from the sender to the receiver. It accepts messages from the transport layer, converts them into packets and ensures that the packets are directed towards their destination. The network layer determines the best path that the packets should take from point A on one network to point B on another network. It does this by checking to see if the destination device is on another network. Transport layer The prime responsibility of the transport layer is to ensure that the data transferred from point A to point B is reliable, in the correct sequence and without errors. The transport layer accepts the data from the session layer and splits it up, if required. It then forwards the data to the network layer and checks that the data has arrived successfully on the destination device — this is a connection-oriented service. If an acknowledgement is not received within a specified period of time, the data is re-sent by the sending device. Acknowledgements are used to control the flow of data. Session layer The session layer allows users to establish a connection — a session. Once the session has been established the session layer maintains and coordinates the communication. For the user to establish a session, they need to provide a remote address. The address can be a domain name such as www.tafensw.edu.au or the NetBIOS name of the computer, for example, Serv007. Readings: Design an IP address scheme according to organisational requirements 2005 7 Presentation layer The presentation layer is responsible for translating data into a format that can be understood by each computer. The important task at this layer is code translation. For example an IBM mainframe may transmit a message in EBCDIC format to a PC that uses ASCII format. Despite the coding differences, data can still be displayed on the receiving device, the PC. ASCII, EBCDIC, BMP, WAV and UNICODE are examples of presentation layer code translations. (Refer to Terms for definitions of these.) The presentation layer is also responsible for data encryption and foreign language translations. Application layer The application layer is the seventh and last layer of the model. It is the only level at which the user has direct contact with the model. This layer starts a network application, such as transferring files, or provides access to the Internet. Do not confuse the application layer with software such as word processing or spreadsheet applications. The application layer makes network services such as file, print, message, application and database services available to a computer’s local operating system. The application layer determines the quality of service at the lower layers. If a problem occurs at a lower layer, the application layer provides a means of notifying the user that there is a problem. The notification is usually in the form of an error message, for example, host not reachable, printing device not connected, etc. 8 Readings: Design an IP address scheme according to organisational requirements 2005 Introduction to TCP/IP TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the basic protocol of the Internet. It is a scalable protocol, which can be used on a small private network, such as your home network or a company’s private Intranet, or it can be used on a large company network like the one at Forth Management Associates. TCP/IP has become the de-facto standard for Internet communications. There are many reasons for this: TCP/IP has been accepted as the industry standard protocol. It is a routable protocol suite. Almost all computer operating systems support the TCP/IP protocol. It allows computers using different operating systems to connect to each other (such as a UNIX computer to a Windows XP computer). It is an open standard — no company has control over the protocol. Anyone is allowed to use it and develop applications based on it. It is a well-designed protocol. How TCP/IP works TCP/IP is not just two protocols, but a suite of which includes TCP, IP, UDP, ARP, ICMP and other sub-protocols. The suite of protocols can be divided into four layers that roughly correspond to the seven layers of the OSI model, as shown in Figure 3. Application Presentation Application Session Transport Transport Network Internet Data link Physical Network interface Figure 3: Approximate correspondence of four layers of TCP/IP to OSI model Readings: Design an IP address scheme according to organisational requirements 2005 9 TCP/IP is a multiple-layer protocol, which provides an application service as well as a network service, as can be seen in Figure 4 below. HTTP FTP Application Sockets Transportation Internet Network Interface TCP ICMP UDP IP ARP Network Device Figure 4: TCP/IP application and network services TCP and IP are the core protocols in the suite, and along with UDP, ICMP, ARP and other sub-protocols provide a network service. Internet Protocol (IP) The Internet Protocol belongs to the Internet Layer of the TCP/IP model. It provides information on how and where data is to be delivered — a key feature of Internetworking. For this reason the TCP/IP protocol is able to span more than one LAN segment, usually through a router. The IP portion of the data frame is called an IP datagram. The datagram contains information for routers so that data can be transferred between individual networks. IP is a connectionless protocol. This means that it does not guarantee delivery of data. Higher-level protocols use IP information to ensure that data packets are delivered to the right address. 10 Readings: Design an IP address scheme according to organisational requirements 2005 Transmission Control Protocol (TCP) TCP belongs to the transport layer of the TCP/IP suite. It provides a reliable data delivery service known as a connection-oriented service — this means that a connection must be established between two devices before TCP will transmit data. TCP provides checksum, flow control and sequencing information, which ensures that the data is reassembled in the correct order. User Datagram Protocol (UDP) UDP belongs to the transport layer of the TCP/IP suite. It is a connectionless service — it does not guarantee that the packets will be received in the correct order and provides no error checking or sequencing. UDP is used when data needs to be transferred quickly, for example, in live audio or video transmissions over the Internet. Internet Control Message Protocol (ICMP) ICMP belongs to the Internet layer of the TCP/IP suite. It is responsible for notifying the sending device of a problem with transmission, for example, when packets are not delivered. It provides a message to the sending device, such as ‘Host unreachable’ (how many times have you seen this?). ICMP is used by diagnostic utilities, such as PING. Address Resolution Protocol (ARP) ARP also belongs to the Internet layer of the TCP/IP suite. ARP is used to determine an unknown MAC address of a remote device to which a packet is to be sent. The header of an IP packet contains the MAC and IP address of the source and the MAC and IP address of the destination. The resulting IP/MAC address information is held on the sending machine in an ARP table. Application service The TCP/IP suite also provides an application service with the protocols: Hypertext Transfer Protocol (HTTP) Telnet Hypertext Transfer Protocol security (HTTPs) File Transfer Protocol (FTP) Simple Network Management Protocol (SNMP) Simple Mail Transfer Protocol (SMTP) Readings: Design an IP address scheme according to organisational requirements 2005 11 What is an IP address? Every device on a network (printer, workstation, server, etc) requires a unique identifier. If all the devices are on the same local area network, then only a physical (MAC) address is required. This is the same as saying that all we need to uniquely identify any house in the same street is to have its house number. However, if the destination device is on a different network then a logical address is also required. This is the same as saying that all we need to uniquely identify any house in NSW is to have its house number, its street name and its town name. The IP address is the logical address that allows data to be sent to devices on different networks. Logical addresses must conform to the standards and rules of the protocol, thus IP addresses are assigned according to specific rules and standards and are configured by the network administrator. Components of an IP address An IP address is a 32-bit binary number, for example: 11001011 00111100 00000001 00000010 For ease of use, this is normally represented in a dotted decimal format, eg: 203.60.1.2. Each 8-bit octet is represented by a whole number between 0 and 255. Each IP address consists of two fields: a net ID field that is the logical network address of the device a host ID field, which is the logical device’s address that uniquely identifies each device on the network. Together, the net ID and the host ID provide each device on a network with a unique IP address. 12 Readings: Design an IP address scheme according to organisational requirements 2005 Classes of IP addresses There are five classes of IP addresses, however only three classes are commonly used. Table 1 below shows the commonly used TCP/IP classes. Table 1: Commonly used TCP/IP classes if IP addresses Class First Octet Number of Networks Number of addresses per network A 1 – 126 126 16, 777, 214 B 128 – 191 16, 384 65, 534 C 192 – 223 2, 097, 154 254 Note: Class D and E are not available for standard network addressing. You can identify the class of an IP address by examining the first octet. All nodes in a Class A network share the first octet of their IP address. Class A addresses range between 1 and 126. An example of a Class A address is 125.10.15.1. The net ID portion of the IP address is 125 and the host ID portion of the IP address is 10.15.1. All nodes in a Class B network share the first two octets of their IP address. Class B addresses range between 128 and 191. An example of a Class B address is 158.10.15.1. The net ID portion of the IP address is 158.10 and the host ID portion of the IP address is 15.1. All nodes in a Class C network share the first three octets of their IP address. Class C addresses range between 192 and 223. An example of a Class C address is 200.10.15.1. The net ID portion of the IP address is 200.10.15 and the host ID portion of the IP address is 1. Class A networks have a binary address starting with 00 000000 as the first octet: Class B networks have a binary address starting with 10 000000 as the first octet; Binary Decimal Binary Decimal 00 000000 0 10 000000 128 00 000001 1 10 000001 129 00 000010 2 10 000010 130 ~~ ~~ ~~ ~~ 00 111110 126 10 111110 190 00 111111 127 10 111111 191 Readings: Design an IP address scheme according to organisational requirements 2005 13 Class C networks have a binary address starting with 11 000000 as the first octet. Binary Decimal 11 000000 192 11 000001 193 11 000010 194 ~~ ~~ 11111110 222 11 111111 223 As there are only 126 Class A networks available on the Internet, most Class A networks have been reserved by large corporations or governments. Some IP addresses have been reserved for network functions such as broadcasts and cannot be assigned to devices. As you know, all rules have exceptions and this also applies to IP addressing. The following section discusses special IP addresses. Special IP addresses Here are some of the restrictions you should keep in mind — you will need to remember them! First octet value of 127 Any address with a first octet value of 127 is a loopback address, which is used for diagnostics and testing. A message sent to an IP address with the first octet of 127 is returned to the sender. The IP address 127.0.0.1 is known as the loopback address and is used for this purpose. Therefore, 127 cannot be used as a net ID, although it is technically a Class A address. 255 in an octet 255 in an octet is designated as a broadcast. A message sent to 255.255.255.255 is broadcast to every host on the local network. For example, a message sent to 158.8.255.255 is broadcasted to every host on network 158.8. Addresses for private Local Area Networks (LANs) There are three groups of IP addresses to choose from if you wish to create a private LAN (for example, an Intranet for a company, for use at home and not on the Internet): 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 The first octet cannot have a value above 223. Those addresses are reserved for multicast and experimental purposes. 14 Readings: Design an IP address scheme according to organisational requirements 2005 Subnet masks Besides an IP address, every computer on a network must be configured with a subnet mask. The subnet mask allows routing devices to separate the IP address into its net ID and host ID portions. Network management is made easier if a network is broken into smaller segments. However, a business is allocated a single IP address that covers its net ID address and a range of host ID addresses. By using some of the host ID bits as segment addresses, segmentation can occur and network management made easier. The subnet mask identifies whether a computer is on the same local network or on another network that needs to be contacted through a router. Subnet masks make it easier and faster to identify the net ID portion of the IP address. It allows TCP/IP to determine if network traffic destined for a given IP address should be transmitted on the local network, or whether it should be routed to a remote network. A subnet mask should be the same for all computers and other network devices on the same network segment. The subnet mask is a 32-bit binary number, broken into four 8-bit octets. A common subnet mask is 255.255.255.0. This particular subnet mask specifies that TCP/IP will use the first three octets of an IP address as the network id and the last octet as the host ID. The subnet mask is dependent on the class of IP addresses in use on the network. The following subnet masks are used for the following Classes of IP addresses: Class A: 255.0.0.0 Class B: 255.255.0.0 Class C 255.255.255.0 Note: If subnet masks are incorrectly configured, routing errors will occur. How do you obtain an IP address? IP addresses can be requested from the Internet Corporation for Assigned Names and Numbers (ICANN) — a non-profit organisation set up to maintain and assign IP addresses. Here in Australia, various agents such as Readings: Design an IP address scheme according to organisational requirements 2005 15 Internet Service Providers (ISPs) can apply to the ICANN for IP addresses on your behalf or lease some of their ‘reserved’ IP addresses to you. An organisation does not normally obtain an IP address for each staff member. The range of IP addresses a company will lease will depend on the number of servers in the organisation that will require Internet access such as a web or remote access servers. Most organisations usually lease a small number of IP addresses. Internally, organisations use addresses from the private address range to allocate to staff members. Real IP addresses are allocated to the web and proxy servers, as well as other devices such as routers that communicate with other devices on the Internet. These devices have a legitimate IP address, however, the workstations and other devices on the company’s network use addresses from the private ranges. A NAT (Network Address Translation) server can be used to hide the IP addresses assigned to devices on the network from any public network, such as the Internet. When a node’s transmission reaches the IP gateway, the gateway assigns the client’s transmission with a valid IP address. In this way, the company’s internal IP addresses are protected and network administrators have more flexibility in assigning addresses. 16 Readings: Design an IP address scheme according to organisational requirements 2005 Binary and decimal conversion Computers store information in binary form, that is, in 0s or 1s. Binary uses the Base2 counting system. To create subnets and work out the decimal equivalents of the binary bit pattens, it’s useful to learn how to convert decimal numbers into binary and vice versa (without a calculator!) To convert a number into binary or decimal it is best to use this table. 0/1 0/1 0/1 0/1 0/1 0/1 0/1 0/1 First row: the 0/1 refers to the value of a bit, that is, zero or one 27 26 25 24 23 22 21 20 Second row: represents the binary system; increases in value to the power of 2 (as opposed to the decimal system, which increases to the power of 10) 128 64 32 16 8 4 2 1 Third row: the decimal values of the second row. Rules for converting Using the table above, you will need to apply the following rules: multiply the bit by its positional decimal equivalent add the value of the decimal equivalents of all the bits to determine the total decimal value of the binary number. For example 1 1 0 0 1 0 1 1 X X X X X X X X 128 64 32 16 8 4 2 1 128 64 0 0 8 0 2 1 Decimal value = 203 0 0 1 1 1 1 0 0 0 0 0 0 0 1 0 0 0 0 1 0 Decimal value = 60 0 0 Decimal value = 1 0 0 Decimal value = 2 Readings: Design an IP address scheme according to organisational requirements 2005 17 So, the IP address 203.60.1.2 has the corresponding binary values: 203 60 1 2 11001011 00111100 00000001 00000010 In binary within a computer, this would be stored as: 11001011001111000000000100000010 18 Readings: Design an IP address scheme according to organisational requirements 2005 Subnetting A large network can be divided into smaller or multiple networks by subdividing a single class of IP addresses. Network Administrators can use one class of addresses for several network segments. A subnetted address includes the network, subnet, and host information. Say your organisation is assigned a Class B network ID of 152.77.0.0. The standard subnet mask would be 255.255.0.0. The number of valid IP addresses would range from 152.77.0.1 to 152.77.255.254. To divide this range of IP addresses into 6 networks you would need to apply the formula: 2n –2 where n = to the number of bits. In the above example, the standard subnet mask is 255.255.0.0.which when converted to binary is: 11111111.11111111.00000000.00000000. By borrowing 3 bits, the new subnet mask becomes: 1111111.11111111.11100000.00000000 — which converts to the decimal format: 255.255.224.0. In this example, a 3-bit subnet mask is used. There are 6 (23 –2) subnets available with this subnet mask. Remember that subnets with all 0s and all 1s are not allowed — these are reserved for specifying the local network. The valid range of IP addresses for the five subnets is shown in Table 2. Table 2: Valid range of IP addresses for five subnets Subnet bits Network number Node Addresses 001 152.77.32.0 152.77.32.1 to 152.77.63.254 010 152.77.64.0 152.77.64.1 to 152.77.95.254 011 152.77.96.0 152.77.96.1 to 152.77.127.254 100 152.77.128.0 152.77.128.1 to 152.77.159.254 101 152.77.160.0 152.77.160.1 to 152.77.192.254 110 152.77.192.0 152.77.192.1 to 152.77.223.254 The combination of an address’s network and subnet information becomes an extended network prefix. The extended network prefix, enables a device to determine the subnet to which the address belongs. Subnet masks allow you to sub-allocate network addresses. Subnetting, is a complex procedure, which you can learn more about with further reading and after completing this unit. Websites providing further exercises and examples of subnetting can be found in the Research section of this Learning Pack. Readings: Design an IP address scheme according to organisational requirements 2005 19 Routing A router is a device that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. Routers create and maintain a table of the available routes and their conditions and use this information along with the distance to determine the best route for a given packet. Typically, a packet may travel through a number of network points with routers, before arriving at its destination. Routing is a function associated with the network layer (layer 3) in the standard model of network programming, the OSI model. In most cases, a router is located at any gateway (where one network meets another). In Figure 5 below two networks are connected by a router with IP address 192.168.1.1 and 203.60.1.4, subnet mask 255.255.255.0. The router acts as a gateway and will handle all the incoming and outgoing network traffic, and as can be seen in Figure 5, the router will handle the traffic between these two networks, which will also apply to the way the router connects to the Internet. 203.60.1.1 203.60.1.2 203.60.1.3 203.60.1.4 192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.4 Figure 5: Two networks connected by a router 20 Readings: Design an IP address scheme according to organisational requirements 2005 Routing tables TCP/IP hosts use a routing table to maintain knowledge about other IP networks and IP hosts. As you now know, using an IP address and a subnet mask identifies networks and hosts. In addition, routing tables are important because they give needed information to each local host regarding how to communicate with remote networks and hosts. For each computer on an IP network, you can maintain a routing table with an entry for every other computer or network that communicates with the local computer. In general, this is not practical, and a default gateway (IP router) is used instead. When a computer prepares to send an IP datagram, it inserts its own source IP address and the destination IP address of the recipient into the IP header. The computer then examines the destination IP address, compares it to a locally maintained IP routing table, and takes appropriate action based on what it finds. The computer does one of three things, it: passes the datagram up to a protocol layer above IP on the local host. forwards the datagram through one of its attached network interfaces. discards the datagram. IP searches the routing table for the route that is the closest match to the destination IP address. The most specific to the least specific route is searched for in the following order: a route that matches the destination IP address (host route) a route that matches the network ID of the destination IP address (network route) the default route. Figure 6 shows a default routing table that can be accessed through the command prompt ‘route print’. It shows the current IP address and subnet mask of the local interface card and where it should forward its network traffic, in this case 0.0.0.0 of network destination will have to forward to 192.168.0.1. This means that all traffic will be handled by the 192.168.0.1 (which is default gateway/router), and the router will decide where to forward the traffic. Readings: Design an IP address scheme according to organisational requirements 2005 21 Figure 6: A default routing table 22 Readings: Design an IP address scheme according to organisational requirements 2005 IP Version 6 (IPv6) For over 20 years now, the IT industry has been using IPv4. As you have read, with IPv4, IP addresses are unique — each computer or device on the network is allocated an IP address and a subnet mask. By the late 1980s it was realised that the world would run out of IP addresses and work began on the IP Next Generation (IPng) project: IPv6. IPv4 uses a 32-bit address space, which permits an absolute maximum of 232 (4,294,967,296) hosts to connect to the Internet at any given time. Today, not only do businesses, government departments and schools have Internet access, but also most homes have at least one computer that accesses the Internet. IPv6 addresses are four times as long as IPv4 addresses and at 128 bits provide an absolute maximum of 2128 individual hosts. This is roughly 340 billion billion billion different hosts! (Would you like to check this calculation!) IPv6 is now included as part of IP support in many products, from 3Com and Hitachi, and including the major computer operating systems. There are no plans (at this stage anyway) for a cutover date when IPv6 would be turned on and IPv4 turned off. One of the strategies chosen for the upgrade is to deploy the IPv6 protocol stack in parallel with IPv4. This means that hosts that upgrade to IPv6 will continue to exist as IPv4 hosts at the same time. An experimental IPv6 backbone or 6bone, has been set up to handle IPv6 Internet traffic in parallel with the regular Internet. These devices will continue to have 32-bit IPv4 addresses but will add 128 bit IPv6 addresses. We suggest you do some follow up reading on IPv6 at: http://www.ipv6.org/ Readings: Design an IP address scheme according to organisational requirements 2005 23 Summary In this topic the term protocol and its definition were introduced with respect to information technology. A protocol is a standard or rule that dictates how two or more computers communicate with each other and share information. There are many network protocols in use today, such as IPX/SPX, AppleTalk, NetBEUI and TCP/IP. However, TCP/IP has become the de-facto standard of the Internet. It is the protocol of choice for most networks, whether they are connected to the Internet or not. It enables different computers running different operating systems on different networks to communicate with each other and share information. The TCP/IP protocol is a suite of protocols or protocol stack, made up of core protocols such as TCP, IP and sub-protocols such as UDP, ARP, ICMP to name a few. Every device on a network is logically configured with a unique IP address and subnet mask which determines the network the device is located on. Each IP address and subnet mask is a 32-bit binary number normally represented in dotted decimal format. IP addressing and subnet masks provide useful information to network devices such as servers, other workstations and routers. This information enables data to be routed from one network to another. Transition strategies have been in place since 1999 to migrate from IPv4 to IPv6 in the near future. Check your progress Now you should try and do the Practice activities in this topic. If you’ve already tried them, have another go and see if you can improve your responses. When you feel ready, try the ‘Check your understanding’ activity in the Preview section of this topic. This will help you decide if you’re ready for assessment. 24 Readings: Design an IP address scheme according to organisational requirements 2005