IP Protocols

Video Activity

IP Protocol- The principal communication protocol in the TCP/IP protocol suite Defines addressing to lael the datagram with source and destination IP addresses Relaying datagrams (packets) across network boundaries Routing function enables internetworking and essentially establishes the Internet Delivers packets solely based on the IP addresses in ...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 38 minutes
Difficulty
Beginner
CEU/CPE
2
Video Description

IP Protocol- The principal communication protocol in the TCP/IP protocol suite

  • Defines addressing to lael the datagram with source and destination IP addresses
  • Relaying datagrams (packets) across network boundaries
  • Routing function enables internetworking and essentially establishes the Internet
  • Delivers packets solely based on the IP addresses in the packet headers
  • Structures packet that encapsulates the data to be delivered

IP Address- Unique

  • Logical address
  • Bounded to the geographical location
  • Length: 32 Bits (4 bytes/octets) for version 4
  • Each byte ranges from 0 to 255
  • Categorized into classes: A, B, C, D, and E
  • Identifies single machine on the Internet
  • Used for routing from source to destination

IP Layer Devices- Router and Layer 3 Switch work in IP layer

  • Device redirects packets between networks
  • Routers forward packets based upon the destination IP address
  • Router searches the Routing Table for the destination network ID
  • Network ID = IP Address and Subnet masks
  • Routers are protocol dependent
  • Layer 3 switches are super fast routers

Routing Table- Composed of rows that are read sequentially

  • Destination network
  • Subnet mask
  • Interface
  • Gateway
  • Cost/metric
  • Can be built statically or dynamically
  • RIP and OSPF are dynamic routing protocols
Video Transcription
00:00
Now it's time to talk about the Ikey Protocol, the network Clear protocol in the TCP I P Protocol suit.
00:09
The I P Protocol is the principal communication protocol in the TCP I P Protocol suit. It's the protocol responsible for the two functionalities off the network. Clear the addressing and routing. It defines the addressing to label the data graham or the packet with source and destination addresses,
00:29
source and destination logical addresses that are called the I P addresses.
00:34
It relays the data grams or packets across the network boundaries from the source to the destination, depending on the route, which is established according to the source and the destination I p addresses. This routing function enables internetworking
00:52
and essentially establishes the Internet
00:54
without routing. It's hard to imagine that there is Internet here.
01:00
This routing delivers packets solely based on the I P address in the packet headed solely based on the source and destination I P addresses that are added at the network clear
01:12
in the form of heather. Tow the data In this layer, the eye people took old structures packets and encapsulates the data with the source and destination I P addresses. Toby routed and delivered over the network.
01:27
What is the I P address? The I P addresses? The logical address that is depends
01:33
ding on the geographical location off the machine. It's unique. It cannot be repeated over the Internet. Each single machine over the Internet should have only one I p address that is unique. It's logical and not physical, which means that it can be change it according to the geographical location. Off the machine,
01:53
the length of the I P addresses 32 bits or four bites. Orrock ***. If you can call it like this,
02:00
it's ah,
02:00
version four off the I P address that is 32 bits. Version six off the I P address is 128 bits
02:10
each bite or each Oct. It
02:13
ranges from 0 to 255.
02:17
This means that
02:20
each bite
02:22
is representing eight bits, and each bite can take the number from 0 to 255.
02:31
The I P addresses are categorized into classes.
02:36
We can see Class A or Close B or classy or Class D or close E I P address
02:43
each. I P address identifies single machine and each i P address if added as a destination toe. A packet is used for routing from the source of the packet, so the destination by the routers it is red and
02:58
interpreted by the routers, which read Layer three information.
03:04
The class is off the I P address and let's focus on the main three. Closest A, B and C has the rangers,
03:10
according to the number in the first bite. The first doctor. If the number of the first bite ranges from 1 to 1 26 then it is close. A. If you train just from 1 28 1 91 then it is close. B.
03:24
If it ranges from 1 92 22 23 then it is close. C i. P. Address. According to this classifications,
03:34
there are possible numbers off hosts for each class. Class A supports up to 16,000,777 thousands and 214 machines. Each close B
03:49
category can support 2 65,534 machines each Class C can take 254 machines, only
03:59
the public I P addresses that can be given to machines to exist over the Internet in close a. It can be from 1.0 to 9.2555
04:12
and 2.255 point 255
04:16
It is red like this. 1.0 dot $29.255.255 dollars 255.
04:27
Then we skip the number 10 and move to the number 11. Tow the number 1 26
04:33
No tear that from close a too close B. We have skipped the number 1 27 and Ray close be ranges from 1 28 1 72 and range inside 1 72 is also have some numbers skipped. You cannot see 1 72.16 For example 1 72
04:53
not 15. Then 1 70 to 32
04:56
still 191.255 Then we start from 192.2192 dot 167 Then we skipped 192.168 and start again from 192.16922 23
05:15
not to 55 to $55 to 55. And here ends the close. See where starting from 2 24 starts The clothes the and close Theis for the multi casting address addressing
05:31
the private I P addresses that cannot exist over the Internet as rial i p addresses as public I p addresses and can exist only inside local area networks. Are these ranges in close? A Every I P address, starting from starting with the number 10 in close beep.
05:50
It's every I p address having from 1 72 not 16 till 1 72
05:56
not 31 in classy. It's any I p address, starting with 1 92.168 Tow 1 92.16
06:05
eight, not to 55 any I P address, starting with 1 92.168 These are the Rangers off Private I P addresses that can be given to machines inside Ln and then
06:20
connected to the Internet through some technology that is called the network Everest Translation or netting
06:27
tow. Give many machines having such I p addresses such private I P addresses one riel I p. Address Toby contacted through over the Internet. This is to save the I P version for addresses that has become scarce resource over the Internet and allow for more security
06:46
during the communication with the machines. Having private I P addresses over the Internet,
06:53
there are some reserved I p addresses you can.
06:58
No. Now that the iPad address is divided into two ports, the Left port defines the network. The right part defines the host. So if the network address is a specific number and all the host address is zeros, then this is the network address itself.
07:14
And this I P address cannot be given to a single machine. It defines the network itself.
07:18
It's an entry inside the routing table that we are going to talk about lately.
07:25
The Broad Coast addresses is composed off network address that is specific, and
07:32
the host is composed off all ones. This is used for broadcasting and cannot be also given toe a specific machine. It is reserved for broadcasting, So if we see an I P address that has the network address with a specific number and all the host address zeros,
07:54
then it is an utter caters. Or
07:57
if all the host address is once then it is a broadcast address and cannot be given to a single machine
08:07
device is working on their three device is working on the I P layer are the router and layer three. Switch
08:15
the rotor Endler threes, which are the devices that three directs packets between networks.
08:20
The foreword back. It's based on the destination I p address and, according to Oh, the routing table stored inside the router or layer three. Switch
08:31
According to this routing table, the packet is investigated and is searching for the path that it should take based on its destination. I p. Address the outer looks at the destination I p address searches the routing table for the right path, then forwards the packet. According to
08:50
this path found in the routing table,
08:54
Let's have a rule here. The network I d
08:56
equals the I. P address ended with the sub net mosque. If we have a given I p address and given some Net mosque, The Summit mosque is something that mosques the I p toe get the network i d. If we end them together. This is a logical operation that is done
09:13
between one sends ears and cold ending. If we end them together, we can get the network I d off this I p address
09:20
Routers are protocol dependent. They did. They depend on Layer three protocol
09:26
there freeze, which differs from a router that it is super force than the router. It is completely hardware and uses hardware in routing mean one. Routers can use software such as the routing tables to be used in the routing process.
09:43
What is the routing table? It's a table that is stored inside the router or later freeze, which, if inside the router than it is software. If it is inside the layer. Three switch the say that it is. It can be stored in a hardware four
09:58
or a firm where it is composed of rose that are red sequentially.
10:05
Each row is composed off. Several
10:07
columns. A column. The four destination Atwork column for Subject Mosque, a column for the interface that is connected to the router and that is used for forwarding the packet. A column for the Gateway. The gateway is the next drought. It is the next hop for the packet to go through
10:26
a column for the coast or the metric off the party,
10:28
and it is used if there is a certain path
10:35
that is an alternative. Both tow the main path off this packet so they are compared to each other
10:43
in the point of view, off coast or metric. And the less coast, the less metric is chosen for this packet.
10:50
The routing table can be bill ecstatically through the network administrators,
10:54
which store this routing table inside the router or can be built dynamically through some dynamic routing protocols, such as they are I p Routing Information Protocol or the O SPF Open. Short the staff First dynamic routing protocol.
11:11
The destination network can be dedicated
11:16
who are deducted from that destination i p address through ending with the sub Net mosque. According to this,
11:24
we can know the interface that the router is going to choose for forwarding the packet and the gateway. That will be the next hope for such packet. Toh goto.
11:37
If we want to see a routing in action, we can look at this diagram. We can see the host source and the restoration
11:46
host separated by three networks and to routers
11:52
each source connect to its
11:56
specific routed through indirect delivery. Then the router connects to the next router through indirect delivery, and then the last router connects through the host through direct delivery.
12:05
We can see that each to machines connected through the same, not accuses. Direct delivery routers contact each other through indirect delivery because they are not connected
12:18
directly through the same network.
12:22
This is routing in action. We can imagine that this host machine is in a country. And this distillation machine is another in other country
12:31
where an ocean can separate them. But packets can go through these routers from the host to the destination
12:41
according to the routing table. According to the path chosen by the routers Toby delivered from the source toe the destination based on the destination I P address.
12:52
Thank you.
Up Next
Network Fundamentals

In this basic Network Fundamentals course, you will get an introduction to basic networking concepts to expand your knowledge about network security. You will get a complete overview of networks including wired and wireless computer networks, devices, and protocols.

Instructed By