Chapter-1 Computer Network
Chapter-1 Computer Network
Chapter-1 Computer Network
Introduction
1. 1.What is Computer Network?
Content
15‐3
14-Apr-19
Uses of the Computer Network
1. Exchange of information between different computers.
(File sharing).
2. Interconnected small computers in place of large
computers.
3. Communication tools (voice, video).
4. Some applications and technologies are examples of
Distributed system. (Railway reservation system, Distributed
databases etc).
15‐4
14-Apr-19
Cont’d
5.Data sharing.
6.Hardware sharing.
7.Software sharing
8.Personal communication.
9.Entertainment.
10.Back-up.
11.User and data management.
12. Better communication
13. Better connectivity
14.Better sharing of Resources
15. Bring people together
5
14-Apr-19
Disadvantages of Computer Network
1.Viruses.
2.Crackers and Unauthorized users.
3.Network hardware and software costs.
4.Networking set up costs.
Network Models:
We have two types of network models. These are :
1. Peer-to-peer networks.
2. Server-based networks.
15‐6
14-Apr-19
Network supporting the way we live
Communication is almost as important to us as our reliance on air, food, water and shelter.
The methods that we used to share the information are constantly changing and evolving. As with every
advance in communication technology, the creation and interconnection of data network is having a profound
effect.
These days computer networks have evolved to carry voice, video streams, text and graphics between many
different types of devices.
The immediate nature of communications over the Internet encourages the formation of global communities.
These communities foster or encourage social interaction that is independent of location or time zone.
Examples of to days popular communication tools.
1.Yahoo messenger
2. Google Talk
3. Face book
4. Twitter
15‐7
14-Apr-19
Network supporting the way we learn
Institutions are continually striving to enhance these processes to maximize the dissemination of
knowledge.
Robust and reliable networks support and enrich student learning experiences.
Multiple Resources: Workers in any location can reach each other and access multiple resources
on the network.
15‐8
14-Apr-19
Internet
Network of Networks.
15‐9
14-Apr-19
Intranet
An Intranet: is a private network that allows employees and staff in an
enterprise to securely share knowledge and information easily within the company
or organization.
are typically unavailable to the general public. The prefix "intra" implies that an
restricted to specific local area networks (LANs) or wide area networks (WANs).
15‐1
0
14-Apr-19
Extranet
An Extranet: is a private network that leverages or control internet technology and public
telecommunication system to share part of a business's information or operations over a secure system with
An extranet is often considered as part of a company's intranet that is extended to authorized users outside of
the organization.
An extranet is regularly referred to as a “state of mind” Internet system, allowing companies to securely do
The nature of information processed through an extranet typically requires security and privacy.
This can come in the form of firewall server management, issuing and using digital certificates (or other
kinds of user authentication), the encryption of messages, and using virtual private networks (VPNs) that can
15‐1
tunnel1through a public network.
14-Apr-19
Types of Computer Networks
Depending on geographical span of coverage there are
three types of network:
Local Area Network (LAN)
:
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
1. Local‐Area Network (LAN): A network that connects a
relatively small number of machines in a relatively close
geographical area.
Is the basic building block of any computer networks.
12
14-Apr-19
2. Metropolitan‐Area Network (MAN): The communication
infrastructures that have been developed in and around large
cities.
*It is a collection of LANs linked together within a town or
city.
14-Apr-19
Network Configuration
All networks have certain components, functions and features in
common. These include:
Servers - Computers that provide shared resources for network users.
Clients - Computers that access shared resources provided by servers.
Media - The wires that make the physical connections.
Shared data - Files provided to clients by servers across the network.
Shared peripherals - Additional hardware resources provided by
servers to the clients and users.
15‐1
4
14-Apr-19
15
14-Apr-19
Network Topologies
The term topology, or network topology, refers to the arrangement
or physical layout of computers, cables, Switches, Hubs, Routers and
other components on the network.
14-Apr-19
3. Ring Topology: The ring topology is actually a logical ring,
meaning that the data travels in circular fashion from one computer to
another on the network. It is not a physical ring topology.
4. Mesh Topology: A mesh topology network offers superior
redundancy and reliability. In a mesh topology, each computer is
connected to every other computer by separate cabling.
This configuration provides redundant paths throughout the network,
so that if one cable fails, another will take over the traffic.
5. Hybrid Topology: Hybrid topology is the composition of the above
four topologies. 17
14-Apr-19
Network Addresses
Hostname: is a unique identification that specifies a particular
computer on the Internet.
For example :
Mulu-PC , johnsmith
Network software translates a hostname into its corresponding IP
address.
For example:
192.168.20.27
18
14-Apr-19
There are Three different ways in which packets can be addressed:
destinations.
network.
19
14-Apr-19
What is an IP Address?
• An IP address is an address used to uniquely identify a device on
network and can be divisible into a network address and host address.
• An IP address:
‐ Is a 32 bit long identifier.
‐ Encodes a network number (network prefix) and a host number.
There are Five different classes of IP address networks are:
1. Class A 1-126
2. Class B 128-191
3. Class C 192-223
4. Class D 224-239
5. Class E 240-255
20
14-Apr-19
Dotted Decimal Notation
IP addresses are written in a so‐called dotted decimal notation.
Each byte is identified by a decimal number in the range [0..255]:
• Example:
130.150.135.142
21
14-Apr-19
Network Addresses
network.
22
14-Apr-19
Example:
• 1.: studyinindia.isn.edu.in
130.150
128.143 135.142
137.144
23
14-Apr-19
IP Address Classes
• Class A:
• N.H.H.H
• Allocate 8 bits to Net Id and 24 bits to Host Id.
• 1‐126
• 0 can not be used as Net ID.
• 126 Different Networks.
• 16,777,214 Hosts per Network.
• Class B
• N.N.H.H
• Allocate 16 bits to the Net Id and 16 bits to the Host Id.
• 128‐191
• 65,534 Hosts per Network.
24
14-Apr-19
Cont’d…
• Class C
• N.N.N.H
• Allocate 24 bits to the Net Id and 8 bits to the Host Id.
• 192‐223
• 254 Hosts per Network.
Class D – Used for multicast broadcasts.
Class E – Used for Experimental and research institute
addresses not available to the public.
25
14-Apr-19
Special IP Addresses
Special IP addresses are those which can not be assigned to a single interface.
• All zeros
• Default IP address. Shows the default route.
• Loopback interfaces
127.0.0.1 to 255.255.255
• Most systems use 127.0.0.1 as loopback address
• loopback interface is associated with name “localhost”
• When a program uses loopback as destination address the protocol in
the computer processes the data without sending it across network.
IP address of a network
Netid All 0s
• Host number is set to all zeros, e.g., 128.143.0.0
26
14-Apr-19
Cont’d…
Broadcast address:
Netid All 1s
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
• Convention :
Default gateway has host number set to ‘1’, e.g., 192.0.1.1
27
14-Apr-19
The Mask
The network portion of the address is separated from the host
portion of the address by a mask.
The mask simply indicates how many bits are used for the
network portion, leaving the remaining bits for the host portion.
A 26‐bit mask indicates that the first 26 bits of the address are
network bits, and the remaining 6 bits are host bits.
A 24‐bit mask indicates that the first 24bits of the address are
network bits, and the remaining 8 bits are host bits.
A 16‐bit mask indicates that the first 16bits of the address are
28
network bits, and the remaining 16 bits are host bits.
14-Apr-19
Determining Number of Hosts in a Network
Given that there are N host bits in an address, the number of hosts for
that network is 2pow(N) ‐ 2.
Two addresses are subtracted for the network address and the
broadcast address. Example:
8 host bits: 2pow(8) ‐ 2 = 254 hosts.
16 host bits: 2pow(16) ‐ 2 = 65,534 hosts.
14-Apr-19
Subnet Addresses
30
14-Apr-19
Subnetting
router
31
14-Apr-19
Subnetting
• In subnetting, a network is divided into several smaller subnetwork with each subnetwork (or
subnet) having its own subnetwork address.
• Subnet masks are used to devide a network into subnets by creating smaller subnets and reducing
the number of host addresses per subnet to what is actually required.
• Subnet masks were first used on class boundaries.
• Example 1:
• Take class A network 10.0.0.0 with network mask 255.0.0.0.
• Add additional 8 subnet bits to network mask.
• New subnet mask is 255.255.0.0.
• New subnets are 10.0.0.0, 10.1.0.0, 10.2.0.0, and so on with 65534 host addresses per
subnet. Still too many hosts per subnet.
• Example 2:
• Take class A network 10.0.0.0 with network mask 255.0.0.0.
• Add additional 16 subnet bits to network mask.
• New subnet mask is 255.255.255.0
• New subnets are 10.0.0.0, 10.0.1.0, 10.0.2.0, …, 10.1.0.0, 10.1.1.0, 10.1.2.0,…, 10.2.0.0,
10.2.1.0, 10.2.2.0, and so on with 254 host addresses per subnet.
14-Apr-19 32
Cont'd…
• Example 3:
• Take class B network 172.16.0.0 with network mask 255.255.0.0.
• Add additional 8 subnet bits to network mask.
• New subnet mask is 255.255.255.0
• New subnets are 172.16.0.0, 172.16.1.0, 172.16.2.0, and so on with 254 host addresses
per subnet.
33
14-Apr-19
VLSM (Variable Length Subnet Mask)
VLSM is a process of dividing an IP space into the subnets of different
sizes without wasting IP addresses.
In FLSM all subnets use same subnet mask, this lead to inefficiencies.
In real life scenario, some subnets may require large number of host
addresses while other may require only few addresses.
34
14-Apr-19
Cont’d…
VLSM is a process of breaking down subnets into the smaller subnets, according
to the need of individual networks.
Improves the efficiency of subnet masks.
VLSM removes the class boundary restriction of traditional subnet masks.
With VLSM a network of any class can be subnetted to almost any size.
• 26 bits are used for Net Id and the remaining 6 bits are used to address hosts in
each subnet.
35
14-Apr-19
Example: Subnetting with 23 bits subnet mask
• A /23 subnet has 510 host addresses, and this is possibly the largest
number of hosts to practically put on a LAN segment.
• The next larger subnet (22‐bit subnet mask) has 1022 host
addresses.
• A thousand or so hosts transmitting frequent broadcasts to all other
hosts on a LAN segment can be very taxing on network and host
devices.
• Therefore putting too many hosts in a single network is difficult to
manage.
36
14-Apr-19
Subnet mask Examples
Net id
Subnet id
255.255.0.0/26
Host id
11111111.11111111.11000000.00000000
255.255.255.192
255.255.0.0/28
11111111.11111111.11110000.00000000
255.255.255.240
37
14-Apr-19
Super netting
Supernetwork or Supernet.
Class C is available, but most organization needs more than 256 hosts in the
addresses.
Advantages of Supernetting :
39
14-Apr-19
Classless Addressing
Treats IP addresses as arbitrary integers rather than as part of a predefined class
structure.
• Allows for:
40
14-Apr-19
Contd…
15‐4
1
14-Apr-19