Chapter-1 Computer Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

CHAPTER- 1

Introduction
1. 1.What is Computer Network?

Content

1. Introduction to Computer Network


2. IP Address
3. Classes of IP Address
4. Delivery and Routing of IP Address
5. IP Protocol
6.
1
ARP and RARP
14-Apr-19
What is a Network?
It is a collection of different communication devices that are
interconnected with each other. Interconnected devices should
exchange data or share a resource.
What is Networking?
The process involved in designing, implementing, upgrading,
managing and working with networks and networking technologies.
Computer Network?
A type of network that interconnects two or more independent
computers. The computers can be geographically located anywhere.
Computer
14-Apr-19
networks are composed of both software and hardware.
2
What is Computer Network?
• A computer network is a number of computers ( also known as
nodes) connected by some Communication lines.
• Two computers connected to the network can communicate with
each other through the other nodes.
• Some of the nodes in the network may not be computers at all but
they are network devices( Like switches, routers etc.) to facilitate the
communication.

15‐3

14-Apr-19
Uses of the Computer Network
1. Exchange of information between different computers.
(File sharing).
2. Interconnected small computers in place of large
computers.
3. Communication tools (voice, video).
4. Some applications and technologies are examples of
Distributed system. (Railway reservation system, Distributed
databases etc).
15‐4

14-Apr-19
Cont’d
5.Data sharing.
6.Hardware sharing.
7.Software sharing
8.Personal communication.
9.Entertainment.
10.Back-up.
11.User and data management.
12. Better communication
13. Better connectivity
14.Better sharing of Resources
15. Bring people together
5

14-Apr-19
Disadvantages of Computer Network
1.Viruses.
2.Crackers and Unauthorized users.
3.Network hardware and software costs.
4.Networking set up costs.
Network Models:
We have two types of network models. These are :
1. Peer-to-peer networks.
2. Server-based networks.
15‐6

14-Apr-19
Network supporting the way we live

Communication is almost as important to us as our reliance on air, food, water and shelter.
 The methods that we used to share the information are constantly changing and evolving. As with every
advance in communication technology, the creation and interconnection of data network is having a profound
effect.
These days computer networks have evolved to carry voice, video streams, text and graphics between many
different types of devices.
The immediate nature of communications over the Internet encourages the formation of global communities.
These communities foster or encourage social interaction that is independent of location or time zone.
Examples of to days popular communication tools.
1.Yahoo messenger
2. Google Talk
3. Face book
4. Twitter
15‐7

14-Apr-19
Network supporting the way we learn

Communication, collaboration and engagement are fundamental building blocks of education.

Institutions are continually striving to enhance these processes to maximize the dissemination of

knowledge.

Robust and reliable networks support and enrich student learning experiences.

Network supporting the way we work:


Remote Access: Business application can be accessed remotely as if employees were on site.

Multiple Resources: Workers in any location can reach each other and access multiple resources

on the network.
15‐8

14-Apr-19
Internet

The network formed by the co-operative interconnection of a large

number of computer networks.

Network of Networks.

Every person who makes a connection owns a slice of networks.

15‐9

14-Apr-19
Intranet
An Intranet: is a private network that allows employees and staff in an

enterprise to securely share knowledge and information easily within the company

or organization.

Information, tools, directories, and services available on a company’s intranet

are typically unavailable to the general public. The prefix "intra" implies that an

intranet is designed for internal communications only. Intranets are usually

restricted to specific local area networks (LANs) or wide area networks (WANs).
15‐1
0

14-Apr-19
Extranet
An Extranet: is a private network that leverages or control internet technology and public

telecommunication system to share part of a business's information or operations over a secure system with

suppliers, vendors, partners, customers, or other businesses.

An extranet is often considered as part of a company's intranet that is extended to authorized users outside of

the organization.

An extranet is regularly referred to as a “state of mind” Internet system, allowing companies to securely do

business with other companies, or to sell products to customers.

The nature of information processed through an extranet typically requires security and privacy.

This can come in the form of firewall server management, issuing and using digital certificates (or other

kinds of user authentication), the encryption of messages, and using virtual private networks (VPNs) that can
15‐1
tunnel1through a public network.

14-Apr-19
Types of Computer Networks
Depending on geographical span of coverage there are
three types of network:
Local Area Network (LAN)
:
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
1. Local‐Area Network (LAN): A network that connects a
relatively small number of machines in a relatively close
geographical area.
 Is the basic building block of any computer networks.
12

14-Apr-19
2. Metropolitan‐Area Network (MAN): The communication
infrastructures that have been developed in and around large
cities.
*It is a collection of LANs linked together within a town or
city.

3. Wide‐Area Network (WAN): Has no geographical limit.


*It can connect computers and other devices on opposite
sides of the world.
*A WAN is made up of a number of interconnected LANs.
Perhaps the ultimate WAN is the Internet.
*Communication between networks is called Internetworking.
15‐1 8
3

14-Apr-19
 Network Configuration
All networks have certain components, functions and features in
common. These include:
Servers - Computers that provide shared resources for network users.
Clients - Computers that access shared resources provided by servers.
Media - The wires that make the physical connections.
Shared data - Files provided to clients by servers across the network.
Shared peripherals - Additional hardware resources provided by
servers to the clients and users.
15‐1
4

14-Apr-19
15

14-Apr-19
Network Topologies
The term topology, or network topology, refers to the arrangement
or physical layout of computers, cables, Switches, Hubs, Routers and
other components on the network.

There are Five basic types of computer network topology are:

1. Bus Topology: The bus topology is often referred to as a "linear


bus" because the computers are connected in a straight line. It consists
of a single cable called a trunk (also called a backbone or segment) that
connects all of the computers in the network in a single line.

2. Star Topology: In the star topology, all computers and


other network devices connect to a central device called a hub
or switch.
16

14-Apr-19
3. Ring Topology: The ring topology is actually a logical ring,
meaning that the data travels in circular fashion from one computer to
another on the network. It is not a physical ring topology.
4. Mesh Topology: A mesh topology network offers superior
redundancy and reliability. In a mesh topology, each computer is
connected to every other computer by separate cabling.
This configuration provides redundant paths throughout the network,
so that if one cable fails, another will take over the traffic.
5. Hybrid Topology: Hybrid topology is the composition of the above
four topologies. 17

14-Apr-19
Network Addresses
Hostname: is a unique identification that specifies a particular
computer on the Internet.
For example :
Mulu-PC , johnsmith
Network software translates a hostname into its corresponding IP
address.
For example:
192.168.20.27
18

14-Apr-19
There are Three different ways in which packets can be addressed:

1. Unicast: Packet is addressed to a single destination.

2. Multicast: Packet is addressed simultaneously to multiple

destinations.

3. Broadcast: Packet is sent simultaneously to all stations on the

network.

19

14-Apr-19
What is an IP Address?
• An IP address is an address used to uniquely identify a device on
network and can be divisible into a network address and host address.

• An IP address:
‐ Is a 32 bit long identifier.
‐ Encodes a network number (network prefix) and a host number.
There are Five different classes of IP address networks are:
1. Class A 1-126
2. Class B 128-191
3. Class C 192-223
4. Class D 224-239
5. Class E 240-255
20

14-Apr-19
Dotted Decimal Notation
IP addresses are written in a so‐called dotted decimal notation.
Each byte is identified by a decimal number in the range [0..255]:

• Example:

10000010 10010110 10000111 10001110


1st Byte 2nd Byte 3rd Byte 4th Byte
= 130 = 150 = 135 = 142

130.150.135.142

21

14-Apr-19
Network Addresses

• An IP address can be split into:

• Network address: Which specifies a specific network.

• Host address: Which specifies a particular machine in that

network.

22

14-Apr-19
Example:

• 1.: studyinindia.isn.edu.in

130.150
128.143 135.142
137.144

• Network address is: 130.150.0.0 (or 130.150)

• Host address is: 135.142


• Netmask is: 255.255.0.0

• Prefix notation: 130.150.135.142/16


• Network prefix is 16 bits long

23

14-Apr-19
IP Address Classes
• Class A:
• N.H.H.H
• Allocate 8 bits to Net Id and 24 bits to Host Id.
• 1‐126
• 0 can not be used as Net ID.
• 126 Different Networks.
• 16,777,214 Hosts per Network.

• Class B
• N.N.H.H
• Allocate 16 bits to the Net Id and 16 bits to the Host Id.
• 128‐191
• 65,534 Hosts per Network.
24

14-Apr-19
Cont’d…
• Class C
• N.N.N.H
• Allocate 24 bits to the Net Id and 8 bits to the Host Id.
• 192‐223
• 254 Hosts per Network.
Class D – Used for multicast broadcasts.
Class E – Used for Experimental and research institute
addresses not available to the public.
25

14-Apr-19
Special IP Addresses

Special IP addresses are those which can not be assigned to a single interface.
• All zeros
• Default IP address. Shows the default route.
• Loopback interfaces
127.0.0.1 to 255.255.255
• Most systems use 127.0.0.1 as loopback address
• loopback interface is associated with name “localhost”
• When a program uses loopback as destination address the protocol in
the computer processes the data without sending it across network.
IP address of a network
Netid All 0s
• Host number is set to all zeros, e.g., 128.143.0.0

26

14-Apr-19
Cont’d…

Broadcast address:
Netid All 1s

• Host number is all ones, e.g., 130.150.255.255


• Broadcast goes to all hosts on the network
• Often ignored due to security concerns
• Test / Experimental addresses:
Certain address ranges are reserved for “experimental use”. Packets should get dropped
if they contain this destination address:

10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
• Convention :
Default gateway has host number set to ‘1’, e.g., 192.0.1.1
27

14-Apr-19
The Mask
The network portion of the address is separated from the host
portion of the address by a mask.
The mask simply indicates how many bits are used for the
network portion, leaving the remaining bits for the host portion.
A 26‐bit mask indicates that the first 26 bits of the address are
network bits, and the remaining 6 bits are host bits.
A 24‐bit mask indicates that the first 24bits of the address are
network bits, and the remaining 8 bits are host bits.
A 16‐bit mask indicates that the first 16bits of the address are
28
network bits, and the remaining 16 bits are host bits.
14-Apr-19
Determining Number of Hosts in a Network

Given that there are N host bits in an address, the number of hosts for
that network is 2pow(N) ‐ 2.
Two addresses are subtracted for the network address and the
broadcast address. Example:
8 host bits: 2pow(8) ‐ 2 = 254 hosts.
16 host bits: 2pow(16) ‐ 2 = 65,534 hosts.

24 host bits: 2power(24) ‐ 2 = 16,777,214 hosts.


29

14-Apr-19
Subnet Addresses

An organization can be subdivide it’s host address space


into groups called Subnets.

The subnet ID is generally used to group hosts based on the


physical network topology.
10 NetID SubnetID HostID

30

14-Apr-19
Subnetting

router

Subnet 1 Subnet 2 Subnet 3


142.187.1.x 142.187.2.x 142.187.3.x

31

14-Apr-19
Subnetting
• In subnetting, a network is divided into several smaller subnetwork with each subnetwork (or
subnet) having its own subnetwork address.

• Subnet masks are used to devide a network into subnets by creating smaller subnets and reducing
the number of host addresses per subnet to what is actually required.
• Subnet masks were first used on class boundaries.
• Example 1:
• Take class A network 10.0.0.0 with network mask 255.0.0.0.
• Add additional 8 subnet bits to network mask.
• New subnet mask is 255.255.0.0.
• New subnets are 10.0.0.0, 10.1.0.0, 10.2.0.0, and so on with 65534 host addresses per
subnet. Still too many hosts per subnet.
• Example 2:
• Take class A network 10.0.0.0 with network mask 255.0.0.0.
• Add additional 16 subnet bits to network mask.
• New subnet mask is 255.255.255.0
• New subnets are 10.0.0.0, 10.0.1.0, 10.0.2.0, …, 10.1.0.0, 10.1.1.0, 10.1.2.0,…, 10.2.0.0,
10.2.1.0, 10.2.2.0, and so on with 254 host addresses per subnet.

14-Apr-19 32
 Cont'd…
• Example 3:
• Take class B network 172.16.0.0 with network mask 255.255.0.0.
• Add additional 8 subnet bits to network mask.
• New subnet mask is 255.255.255.0

• New subnets are 172.16.0.0, 172.16.1.0, 172.16.2.0, and so on with 254 host addresses
per subnet.

• As shown in these examples…


• A class A network can be subnetted to create 256 (2pow (8) )/16 subnets.
• A class A network can be subnetted to create 65536 (2pow(16)) /24 subnets.
• A class B network can be subnetted to create 256 (2pow(8)) /24 subnets.

33

14-Apr-19
VLSM (Variable Length Subnet Mask)
VLSM is a process of dividing an IP space into the subnets of different
sizes without wasting IP addresses.

When we perform subnetting, all subnets have the same number of


hosts, this is known as FLSM ( Fixed length subnet mask).

In FLSM all subnets use same subnet mask, this lead to inefficiencies.
In real life scenario, some subnets may require large number of host
addresses while other may require only few addresses.
34

14-Apr-19
Cont’d…
VLSM is a process of breaking down subnets into the smaller subnets, according
to the need of individual networks.
Improves the efficiency of subnet masks.
VLSM removes the class boundary restriction of traditional subnet masks.
With VLSM a network of any class can be subnetted to almost any size.

• Example: 26‐bit subnet mask (255.255.255.192)

• 26 bits are used for Net Id and the remaining 6 bits are used to address hosts in
each subnet.

35

14-Apr-19
Example: Subnetting with 23 bits subnet mask

• A /23 subnet has 510 host addresses, and this is possibly the largest
number of hosts to practically put on a LAN segment.
• The next larger subnet (22‐bit subnet mask) has 1022 host
addresses.
• A thousand or so hosts transmitting frequent broadcasts to all other
hosts on a LAN segment can be very taxing on network and host
devices.
• Therefore putting too many hosts in a single network is difficult to
manage.
36

14-Apr-19
Subnet mask Examples
Net id
Subnet id
255.255.0.0/26
Host id
11111111.11111111.11000000.00000000
255.255.255.192

255.255.0.0/28
11111111.11111111.11110000.00000000
255.255.255.240

37
14-Apr-19
Super netting

Supernetting: is the opposite of Subnetting. In subnetting, a single big

network is divided into multiple smaller subnetworks. In Supernetting,

multiple networks are combined into a bigger network termed as a

Supernetwork or Supernet.

Class C is available, but most organization needs more than 256 hosts in the

network. So we can use super netting.

Combine several class C networks to create a super network.

Class A and B addresses are almost depleted.


38
14-Apr-19
Cont’d…

So for this problem we can use Supernetting.

Because this combines several class C blocks to create a larger range of

addresses.

Supernetting applies only on to Class C addresses.

Advantages of Supernetting :

1. Control and reduce network traffic.


2. Helpful to solve the problem of lacking IP addresses.
3. Minimizes the routing table.

39
14-Apr-19
Classless Addressing
 Treats IP addresses as arbitrary integers rather than as part of a predefined class

structure.

 Allows a network administrator to assign addresses in contiguous blocks.

• Allows for:

– Flexibility in assigning blocks of addresses.

– Ease of management of addresses.

40

14-Apr-19
Contd…

15‐4
1

14-Apr-19

You might also like