Introduction To Computer Networks
Introduction To Computer Networks
ON
COMPUTER NETWORKING
6. Understanding Wireless Networking:
1. Understanding Network Fundamentals:
Students should comprehend the principles of wireless networking,
Students should grasp the foundational concepts of computer including different wireless technologies, standards, and security
networks, including the OSI model, TCP/IP protocol suite, and basic considerations, and be able to design, deploy, and secure wireless
networking components like routers, switches, and hubs. networks.
Students should be able to design and implement small to medium- Students should learn about network management protocols and
sized networks, including subnetting, IP addressing, and network tools for monitoring, configuring, and troubleshooting network
segmentation, while considering factors like scalability, devices and services, including SNMP (Simple Network
performance, and security. Management Protocol) and network management systems (NMS).
Students should gain hands-on experience configuring network Students should be prepared to pursue relevant industry
devices such as routers, switches, firewalls, and access points using certifications such as CompTIA Network+, Cisco CCNA (Cisco
command-line interfaces and graphical user interfaces. Certified Network Associate), or equivalent certifications,
demonstrating their proficiency in computer networking concepts
4. Troubleshooting Network Issues: and skills.
Transmitter
The data generated by the source system is not directly transmitted in the form
its generated. The transmitter transforms and encodes the data in such a form
to produce electromagnetic waves or signals.
Transmission System
A transmission system can be a single transmission line or a complex network
connecting source and destination.
Receiver
Receiver accepts the signal from the transmission system and converts it into a
form which is easily managed by the destination device.
Destination
Destination receives the incoming data from the receiver.
Data Communication Had it not been of high importance, nobody would have bothered connecting
The exchange of data between two devices through a transmission medium is computers over a network. Let's start exploring the uses of Computer Networks
called Data Communication. The data is exchanged in the form of 0's and 1's. with some traditional use cases at companies and for individuals and then move
The transmission medium used is wire cable. For data communication to occur, on to the recent developments in the area of mobile users and home networking.
the communication device must be a part of a communication system. Data
Communication has two types - Local and Remote which are discussed Computer Networks: Business Applications
below: Following are some business applications of computer networks:
3. Communication Medium:
Components of Data Communication
A computer network can provide a powerful communication medium among
employees. Virtually every company that has two or more computers now has
1. Message: It is the information to be delivered.
e-mail (electronic mail), which employees generally use for a great deal of
2. Sender: Sender is the person who is sending the message.
daily communication.
3. Receiver: Receiver is the person to whom the message is being sent
to.
4. eCommerce:
4. Medium: It is the medium through which the message is sent. For
A goal that is starting to become more important in businesses is doing business
example: A Modem.
with consumers over the Internet. Airlines, bookstores and music vendors have
5. Protocol: These are some set of rules which govern data
discovered that many customers like the convenience of shopping from home.
communication.
This sector is expected to grow quickly in the future.
The most popular forms are listed in the below figure:
Uses of Computer Networks
Computer Networks: Home Applications
Some of the most important uses of the Internet for home users are as follows:
1. Point-to-Point connection
2. Multipoint connection MultiPoint Connection
It is also called Multidrop configuration. In this connection two or more devices
share a single link.
Point-To-Point Connection
There are two kinds of Multipoint Connections :
It is a protocol which is used as a communication link between two devices. It
is simple to establish. The most common example for Point-to-Point
• If the links are used simultaneously between many devices, then it is
connection (PPP) is a computer connected by telephone line. We can connect
spatially shared line configuration.
the two devices by means of a pair of wires or using a microwave or satellite
• If user takes turns while using the link, then it is time shared (temporal)
link.
line configuration.
Example: Point-to-Point connection between remote control and Television
for changing the channels.
BUS Topology
Bus topology is a network type in which every computer and network device It is called ring topology because it forms a ring as each computer is connected
is connected to single cable. When it has exactly two endpoints, then it is to another computer, with the last one connected to the first. Exactly two
called Linear Bus topology. neighbours for each device.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network
nodes are connected to each other. Mesh has n(n-1)/2 physical channels to
link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
In full duplex system there can be two lines one for sending the data and the
other for receiving data.
Transmission medium is the means through which we send our data from one Twisted Pair Cable
place to another. The first layer (physical layer) of Communication Networks This cable is the most commonly used and is cheaper than others. It is
OSI Seven layer model is dedicated to the transmission media, we will study lightweight, cheap, can be installed easily, and they support many different
the OSI Model later. types of network. Some important points :
A twisted pair consists of two conductors(normally copper), each with its own
plastic insulation, twisted together. One of these wires is used to carry signals
to the receiver, and the other is used only as ground reference. The receiver
uses the difference between the two. In addition to the signal sent by the sender
on one of the wires, interference(noise) and crosstalk may affect both wires and
create unwanted signals. If the two wires are parallel, the effect of these
Factors to be considered while selecting a Transmission Medium unwanted signals is not the same in both wires because they are at different
locations relative to the noise or crosstalk sources. This results in a difference
1. Transmission Rate at the receiver.
2. Cost and Ease of Installation Twisted Pair is of two types:
3. Resistance to Environmental Conditions
4. Distances • Unshielded Twisted Pair (UTP)
• Shielded Twisted Pair (STP)
Bounded or Guided Transmission Media
Unshielded Twisted Pair Cable Shielded Twisted Pair Cable
It is the most common type of telecommunication when compared with This cable has a metal foil or braided-mesh covering which encases each pair
Shielded Twisted Pair Cable which consists of two conductors usually copper, of insulated conductors. Electromagnetic noise penetration is prevented by
each with its own colour plastic insulator. Identification is the reason behind metal casing. Shielding also eliminates crosstalk (explained in KEY TERMS
coloured plastic insulation. Chapter).
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ- It has same attenuation as unshielded twisted pair. It is faster the unshielded
11 connector and 4 pair cable use RJ-45 connector. and coaxial cable. It is more expensive than coaxial and unshielded twisted
pair.
Advantages of Unshielded Twisted Pair Cable Advantages of Shielded Twisted Pair Cable
• In telephone lines to provide voice and data channels. The DSL lines
that are used by the telephone companies to provide high-data-rate
connections also use the high-bandwidth capability of unshielded
twisted-pair cables.
Coaxial Cable Standards
• Local Area Network, such as 10Base-T and 100Base-T, also use
Coaxial cables are categorized by their Radio Government(RG) ratings. Each
twisted-pair cables.
RG number denotes a unique set of physical specifications, including the wire
gauge of the inner conductor, the thickness and the type of the inner insulator,
Coaxial Cable the construction of the shield, and the size and type of the outer casing. Each
Coaxial is called by this name because it contains two conductors that are cable defined by an RG rating is adapted for a specialized function, as shown
parallel to each other. Copper is used in this as centre conductor which can be in the table below:
a solid wire or a standard one. It is surrounded by PVC installation, a sheath
which is encased in an outer conductor of metal foil, barid or both.
Outer metallic wrapping is used as a shield against noise and as the second
conductor which completes the circuit. The outer conductor is also encased in
an insulating sheath. The outermost part is the plastic cover which protects the
whole cable.
Here the most common coaxial standards.
• If the angle of incidence I(the angle the ray makes with the line
perpendicular to the interface between the two substances) is less than
the critical angle, the ray refracts and moves closer to the surface.
• If the angle of incidence is greater than the critical angle, the
ray reflects(makes a turn) and travels again in the denser substance.
• If the angle of incidence is equal to the critical angle, the ray refracts
and moves parallel to the surface as shown.
Note: The critical angle is a property of the substance, and its value differs
from one substance to another.
Optical fibres use reflection to guide light through a channel. A glass or plastic
core is surrounded by a cladding of less dense glass or plastic. The difference
in density of the two materials must be such that a beam of light moving
through the core is reflected off the cladding instead of being refracted into it.
Multimode Propagation Mode
Multimode is so named because multiple beams from a light source move Single Mode
through the core in different paths. How these beams move within the cable Single mode uses step-index fibre and a highly focused source of light that
depends on the structure of the core as shown in the below figure. limits beams to a small range of angles, all close to the horizontal. The single-
mode fibre itself is manufactured with a much smaller diameter than that of
multimode fibre, and with substantially lower density.
The decrease in density results in a critical angle that is close enough to 90
degree to make the propagation of beams almost horizontal.
• Higher bandwidth
• Less signal attenuation
• Immunity to electromagnetic interference
• Resistance to corrosive materials
• Light weight
• Greater immunity to tapping
Disadvantages of Fibre Optic Cable
There are some disadvantages in the use of optical fibre: Unguided signals can travel from the source to the destination in several ways:
▪ Gound propagation
• Installation and maintenance ▪ Sky propagation
• Unidirectional light propagation ▪ Line-of-sight propagation.
• High Cost
antennas do not have to be aligned. A sending antenna send waves that can be
received by any receiving antenna. The omnidirectional property has
disadvantage, too. The radio waves transmitted by one antenna are susceptible
to interference by another antenna that may send signal suing the same
frequency or band.
Radio waves, particularly with those of low and medium frequencies, can
penetrate walls. This characteristic can be both an advantage and a
disadvantage. It is an advantage because, an AM radio can receive signals
inside a building. It is a disadvantage because we cannot isolate a
communication to just inside or outside a building.
Propagation Modes
Omnidirectional Antenna for Radio Waves
• Ground Propagation: In this, radio waves travel through the lowest Radio waves use omnidirectional antennas that send out signals in all
portion of the atmosphere, hugging the Earth. These low-frequency directions.
signals emanate in all directions from the transmitting antenna and
follow the curvature of the planet.
• Sky Propagation: In this, higher-frequency radio waves radiate
upward into the ionosphere where they are reflected back to Earth. This
type of transmission allows for greater distances with lower output
power.
• Line-of-sight Propagation: in this type, very high-frequency signals
are transmitted in straight lines directly from antenna to antenna.
We can divide wireless transmission into three broad groups:
1. Radio waves
2. Micro waves
3. Infrared waves
Applications of Radio Waves
Radio Waves
Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are • The omnidirectional characteristics of radio waves make them useful
normally called radio waves. for multicasting in which there is one sender but many receivers.
Radio waves are omnidirectional. When an antenna transmits radio waves, they • AM and FM radio, television, maritime radio, cordless phones, and
are propagated in all directions. This means that the sending and receiving paging are examples of multicasting.
Micro Waves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
micro waves. Micro waves are unidirectional. When an antenna transmits
microwaves, they can be narrowly focused. This means that the sending and
receiving antennas need to be aligned. The unidirectional property has an
obvious advantage. A pair of antennas can be aligned without interfering with
another pair of aligned antennas.
The following describes some characteristics of microwaves propagation:
1. Terrestrial Microwave
2. Satellite Microwave
Advantages of Microwave Transmission
• It is very costly
Terrestrial Microwave
For increasing the distance served by terrestrial microwave, repeaters can be
installed with each antenna .The signal received by an antenna can be converted 2. Horn Antenna
into transmittable form and relayed to next antenna as shown in below figure. It is a like gigantic scoop. The outgoing transmissions are broadcast up a stem
It is an example of telephone systems all over the world and deflected outward in a series of narrow parallel beams by curved head.
• The infrared band, almost 400 THz, has an excellent potential for data
transmission. Such a wide bandwidth can be used to transmit digital
data with a very high data rate.
• The Infrared Data Association(IrDA), an association for sponsoring
Features of Satellite Microwave the use of infrared waves, has established standards for using these
signals for communication between devices such as keyboards, mouse,
• Bandwidth capacity depends on the frequency used. PCs and printers.
• Satellite microwave deployment for orbiting satellite is difficult. • Infrared signals can be used for short-range communication in a closed
Advantages of Satellite Microwave area using line-of-sight propagation.
Types of Communication Networks
• Transmitting station can receive back its own transmission and check Communication Networks can be of following 5 types:
whether the satellite has transmitted information correctly.
• A single microwave relay station which is visible from any point. 1. Local Area Network (LAN)
Disadvantages of Satellite Microwave 2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
• Satellite manufacturing cost is very high 4. Wireless
• Cost of launching satellite is very expensive 5. Inter Network (Internet)
• Transmission highly depends on whether conditions, it can go down in
bad weather
Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for
short-range communication. Infrared waves, having high frequencies, cannot
penetrate walls. This advantageous characteristic prevents interference
Local Area Network (LAN) Applications of LAN
It is also called LAN and designed for small physical areas such as an office,
group of buildings or a factory. LANs are used widely as it is easy to design • One of the computer in a network can become a server serving all the
and to troubleshoot. Personal computers and workstations are connected to remaining computers called clients. Software can be stored on the
each other through LANs. We can use different types of topologies through server and it can be used by the remaining clients.
LAN, these are Star, Ring, Bus, Tree etc. • Connecting Locally all the workstations in a building to let them
LAN can be a simple network like connecting two computers, to share files and communicate with each other locally without any internet access.
network among each other while it can also be as complex as interconnecting • Sharing common resources like printers etc are some common
an entire building. applications of LAN.
LAN networks are also widely used to share resources like printers, shared
hard-drive etc. Advantages of LAN
Wireless Network
Characteristics of WAN Digital wireless communication is not a new idea. Earlier, Morse code was
used to implement wireless networks. Modern digital wireless systems have
• It generally covers large distances(states, countries, continents). better performance, but the basic idea is the same.
• Communication medium used are satellite, public telephone networks Wireless Networks can be divided into three main categories:
which are connected by routers.
1. System interconnection
Advantages of WAN 2. Wireless LANs
3. Wireless WANs
• Covers a large geographical area so long distance business can connect
on the one network. System Interconnection
• Shares software and resources with connecting workstations. System interconnection is all about interconnecting the components of a
• Messages can be sent very quickly to anyone else on the network. computer using short-range radio. Some companies got together to design a
These messages can have picture, sounds or data included with short-range wireless network called Bluetooth to connect various components
them(called attachments). such as monitor, keyboard, mouse and printer, to the main unit, without wires.
• Expensive things(such as printers or phone lines to the internet) can be Bluetooth also allows digital cameras, headsets, scanners and other devices to
shared by all the computers on the network without having to buy a connect to a computer by merely being brought within range.
different peripheral for each computer. In simplest form, system interconnection networks use the master-slave
• Everyone on the network can use the same data. This avoids problems concept. The system unit is normally the master, talking to the mouse,
where some users may have older information than others. keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio
modem and antenna with which it can communicate with other systems.
Wireless LANs are becoming increasingly common in small offices and
homes, where installing Ethernet is considered too much trouble. There is a
standard for wireless LANs called IEEE 802.11, which most systems
implement and which is becoming very widespread.
Wireless WANs
The radio network used for cellular telephones is an example of a low-
bandwidth wireless WAN. This system has already gone through three
generations.
Inter Network
Inter Network or Internet is a combination of two or more networks. Inter
network can be formed by joining two or more individual networks by means
of various devices such as routers, gateways and bridges.
Connection Oriented and Connectionless Services 1. In connection oriented service authentication is needed, while
These are the two services given by the layers to layers above them. These connectionless service does not need any authentication.
services are: 2. Connection oriented protocol makes a connection and checks whether
message is received or not and sends again if an error occurs, while
1. Connection Oriented Service connectionless service protocol does not guarantees a message
2. Connectionless Services delivery.
3. Connection oriented service is more reliable than connectionless
Connection Oriented Services service.
There is a sequence of operation to be followed by the users of connection 4. Connection oriented service interface is stream based and
oriented service. These are: connectionless is message based.
Connection Less Services 1. LISTEN : When a server is ready to accept an incoming connection it
It is similar to the postal services, as it carries the full address where the executes the LISTEN primitive. It blocks waiting for an incoming
message (letter) is to be carried. Each message is routed independently from connection.
source to destination. The order of message sent can be different from the order 2. CONNECT : It connects the server by establishing a connection.
received. Response is awaited.
In connectionless the data is transferred in one direction from source to 3. RECIEVE: Then the RECIEVE call blocks the server.
destination without checking that destination is still there or not or if it prepared 4. SEND : Then the client executes SEND primitive to transmit its
to accept the message. Authentication is not needed in this. Example of request followed by the execution of RECIEVE to get the reply. Send
Connectionless service is UDP (User Datagram Protocol) protocol. the message.
5. DISCONNECT : This primitive is used for terminating the
connection. After this primitive one can't send any message. When the
Difference: Connection oriented and Connectionless service
client sends DISCONNECT packet then the server also sends the Relationship of Services to Protocol
DISCONNECT packet to acknowledge the client. When the server In this section we will learn about how services and protocols are related and
package is received by client then the process is terminated. why they are so important for each other.
Connection Oriented Service Primitives
There are 5 types of primitives for Connection Oriented Service :
What are Services?
These are the operations that a layer can provide to the layer above it in the OSI
LISTEN Block waiting for an incoming connection
Reference model. It defines the operation and states a layer is ready to perform
but it does not specify anything about the implementation of these operations.
CONNECTION Establish a connection with a waiting peer
So basically with the help of a computer network two or more devices are
connected in order to share a nearly limitless range of information and
services which includes;
• Music
• Databases
• Websites Given below is a list of components of a Computer Network:
• Documents • Network Interface Card(NIC)
• Email and messaging • HUB
• Telephony and conferencing • Switch
• Printers and Faxes • Repeater
• Router
• Modem
• Server
• Bridge
The above image shows how two devices are connected to each other with the
help of the Internet and a laptop is connected to one of them with the help of a
cable.
Let us now learn the main components of Computer Networks;
1. Data Sharing
5. Performance
One of the most important features of a Computer Network is that with their
The performance of a computer network is measured using response time and
help you can easily share the data between different systems that are connected
with the help of the speed of data transmission. For better performance, the
with each other through transmission media.
response time of sending and receiving data from one node to another should
Thus, resources can be easily shared between two or more devices over a
be minimum.
network.
6. Backup
2. Reliability
There must be a central server for the computer network and this server must
With the help of Computer Networks there are fewer chances for the
keep the backup of all the data that is shared over the network. And at the time
occurrence of failure and in case if there is any failure then recovery is fast.
of failure in the network this central server helps in the faster recovery.
3. Security
7. Software and Hardware Compatibility
Security is one of the main characteristics of Computer Networks, Thus a
In the Computer Network, there must not be any limitation for all the computers
computer network should be secure so that the data transmitting over the
in a computer network to use the same software and hardware.
network should be safe from any unauthorized access.
Instead, the computer network should allow better compatibility between
Also, the data sent by the sending node should be received as it is at
different software and hardware configuration.
the receiving node, which simply means there should be no loss of data during
With the help of a Computer network, it becomes very easy for all of us to
the transmission of the data.
share our knowledge and ideas with others for example: via email messaging,
via video conferencing over the internet, everything becomes easy.
4. Scalability
Another feature of a Computer network is scalability. The scalability of a
computer network simply means that we can add new nodes or components to
• ECN − Explicit Congestion Notification; It carries information about
IPv4 - Packet Structure the congestion seen in the route.
• Total Length − Length of entire IP Packet (including IP header and IP
Internet Protocol being a layer-3 protocol (OSI) takes data Segments from Payload).
layer-4 (Transport) and divides it into packets. IP packet encapsulates data unit • Identification − If IP packet is fragmented during the transmission, all
received from above layer and add to its own header information. the fragments contain same identification number. to identify original
IP packet they belong to.
• Flags − As required by the network resources, if IP Packet is too large
to handle, these ‘flags’ tells if they can be fragmented or not. In this 3-
bit flag, the MSB is always set to ‘0’.
• Fragment Offset − This offset tells the exact position of the fragment
in the original IP Packet.
• Time to Live − To avoid looping in the network, every packet is sent
The encapsulated data is referred to as IP Payload. IP header contains all the with some TTL value set, which tells the network how many routers
necessary information to deliver the packet at the other end. (hops) this packet can cross. At each hop, its value is decremented by
one and when the value reaches zero, the packet is discarded.
• Protocol − Tells the Network layer at the destination host, to which
Protocol this packet belongs to, i.e. the next level Protocol. For
example protocol number of ICMP is 1, TCP is 6 and UDP is 17.
• Header Checksum − This field is used to keep checksum value of
entire header which is then used to check if the packet is received error-
free.
• Source Address − 32-bit address of the Sender (or source) of the
packet.
• Destination Address − 32-bit address of the Receiver (or destination)
of the packet.
• Options − This is optional field, which is used if the value of IHL is
greater than 5. These options may contain values for options such as
Security, Record Route, Time Stamp, etc.
IP header includes many relevant information including Version Number,
which, in this context, is 4. Other details are as follows −
• Version − Version no. of Internet Protocol used (e.g. IPv4).
• IHL − Internet Header Length; Length of entire IP header.
• DSCP − Differentiated Services Code Point; this is Type of Service.
Structure and Types of IP Address Decimal Representation
The Internet has become an integral part of our lives, and we rely on it for The decimal representation of an IP address makes it easier for humans to
communication, entertainment, and information. Every device that connects to understand and remember. It uses four numbers separated by dots where each
the internet requires an IP address. number ranges from 0 to 255.
An IP (Internet Protocol) address is a unique numerical identifier assigned to The numbers represent the value of each octet in decimal notation. For instance,
every device connected to a network that uses the Internet Protocol for using the same example as above, the decimal representation would be:
communication. In this article, we will explore the structure and types of IP
addresses used in networks today. 192 . 168 . 5 .1
An IP address is a unique numerical identifier assigned to every device IPv4 vs IPv6IPv4 (Internet Protocol version four) was first introduced in the
connected to a network that uses the Internet Protocol. It consists of four early days of the internet and remains one of the most widely used protocols
numbers separated by periods (dots), such as 192.168.0.1. Each number can today.
range from 0 to 255, giving us over 4 billion possible combinations.
However, with so many devices connected worldwide, IPv4 addresses are
Structure of IP Address becoming scarce due to limitations in its structure, which can only
accommodate around four billion unique addresses. IPv6 (Internet Protocol
The structure of an IP (Internet Protocol) address refers to the way it is version six), on the other hand, uses longer addresses consisting of eight groups
formatted, represented, and read. An IP address is used to identify devices on of hexadecimal digits separated by colons that can accommodate
a network and allow communication between them. Each device on a network approximately three hundred forty undecillion unique addresses.
has a unique IP address that makes it possible for data packets to be sent and
received effectively. Types of IP Addresses
Binary Representation Internet Protocol (IP) addresses are used to identify devices on a network.
There are two types of IP addresses: public and private. In addition, there is
An IP address is made up of 32 bits for IPv4 or 128 bits for IPv6 that are dynamic and static IP addressing.
grouped into octets separated by dots. The binary representation of an IP
address shows how each bit within the address is either '0' or '1.' For example, Public IP Addresses
the binary representation of an IPv4 address might look like this:
A Public IP address is an internet address that is assigned to any device that
11000000 . 10101000 . 00000101 . 00000001 This binary string corresponds directly faces the Internet. It is unique and identifies the device on the internet.
to the decimal representation: 192 . 168 . 5 . 1
It can be accessed from anywhere on the internet, making it useful for hosting Dynamic vs Static IP Addresses
websites or other services. Public IPs can be obtained from ISPs or purchased
from companies that provide them. Definition and Differences between Dynamic and Static IPs
How they are assigned
A dynamical IP address is an address that changes every time you connect to
When you connect your device to the internet through an ISP, they assign you the Internet. This change happens automatically in most cases, making it hard
a public IP address from their pool of available addresses. This assignment to keep track of your device's current IP.
process can be done either dynamically (automatic assignment) or manually
(through a service request). A static IP address, on the other hand, is an address that never changes. It is
Examples permanently assigned to a device.
Advantages and Disadvantages of each type
An example of a public IP address would be 216.58.194.174 which belongs to
Google.com. Static IPs are useful when setting up servers because they allow for a permanent
internet address for remote access purposes. However, they can be more
Private IP Addresses expensive than dynamic IPs and require manual configuration. Dynamic IPs
are cheaper and require little or no configuration at all.
Private IPs, also known as local IPs, are used within private networks and do
not route over the Internet's backbone infrastructure like Public IPs do.
Definition
Private IPs are usually allocated by the router through DHCP protocol
automatically when devices connect to it.
Examples
Subnetting is the process of dividing a large network into smaller, more Next, you need to convert this prefix length to a subnet mask. For example, if
manageable subnetworks. This process has become increasingly important as we have an IP address of 192.168.1.0/24, we know that 24 bits are used for the
the size and complexity of networks have grown over time. By breaking down network portion and 8 bits are used for the host portion.
a large network into smaller subnetworks, network administrators can improve
performance, security, and manageability. To convert this prefix length to a subnet mask, we simply fill in all the network
bits with "1's" and all the host bits with "0's". This gives us a subnet mask of
Subnetting is achieved by borrowing bits from the host portion of an IP address 255.255.255.0.
to create a separate network address. For example, if we have an IP address
192.168.1.0/24 (meaning it has a subnet mask of 255.255.255.0), we can create Once we have our subnet mask, we can then use it to determine what our
two subnets by borrowing one bit from the host portion of the IP address so subnets are by incrementing or decrementing values in the host portion of our
that our new subnet mask becomes 255.255.255.128 or /25. IP addresses depending on how many subnets and hosts per subnet were
required.
CIDR Notation (Classless Inter−Domain Routing)
The number after the slash represents what's known as the "prefix length" or
"subnet mask length." CIDR notation allows for more flexible addressing
schemes because it doesn't rely on fixed classes like A, B or C addresses but
instead allows for variable−length subnet masks.
In this mode, data is sent only to one destined host. The Destination Address
field contains 32- bit IP address of the destination host. Here the client sends
data to the targeted server −
This mode is a mix of the previous two modes, i.e. the packet sent is neither
destined to a single host nor all the hosts on the segment. In this packet, the
Destination Address contains a special address which starts with 224.x.x.x and
can be entertained by more than one host.
In this mode, the packet is addressed to all the hosts in a network segment. The
Destination Address field contains a special broadcast address,
i.e. 255.255.255.255. When a host sees this packet on the network, it is bound
to process it. Here the client sends a packet, which is entertained by all the
Servers −
Here a server sends packets which are entertained by more than one servers.
Every network has one IP address reserved for the Network Number which
represents the network and one IP address reserved for the Broadcast Address,
which represents all the hosts in that network.
Hierarchical Addressing Scheme The positional value method is the simplest form of converting binary from
decimal value. IP address is 32 bit value which is divided into 4 octets. A binary
IPv4 uses hierarchical addressing scheme. An IP address, which is 32-bits in octet contains 8 bits and the value of each bit can be determined by the position
length, is divided into two or three parts as depicted − of bit value '1' in the octet.
A single IP address can contain information about the network and its sub-
network and ultimately the host. This scheme enables the IP Address to be
hierarchical where a network can have many sub-networks which in turn can
Positional value of bits is determined by 2 raised to power (position – 1), that
have many hosts.
is the value of a bit 1 at position 6 is 2^(6-1) that is 2^5 that is 32. The total
value of the octet is determined by adding up the positional value of bits. The
Subnet Mask
value of 11000000 is 128+64 = 192.
The 32-bit IP address contains information about the host and its network. It is
IPv4 - Address Classes
very necessary to distinguish both. For this, routers use Subnet Mask, which is
as long as the size of the network address in the IP address. Subnet Mask is
Internet Protocol hierarchy contains several classes of IP Addresses to be used
also 32 bits long. If the IP address in binary is ANDed with its Subnet Mask,
efficiently in various situations as per the requirement of hosts per network.
the result yields the Network address. For example, say the IP Address is
Broadly, the IPv4 Addressing system is divided into five classes of IP
192.168.1.152 and the Subnet Mask is 255.255.255.0 then −
Addresses. All the five classes are identified by the first octet of IP Address.
Internet Corporation for Assigned Names and Numbers is responsible for
assigning IP addresses.
The first octet referred here is the left most of all. The octets numbered as
follows depicting dotted decimal notation of IP Address −
This way the Subnet Mask helps extract the Network ID and the Host from an
IP Address. It can be identified now that 192.168.1.0 is the Network number
and 192.168.1.152 is the host on that network.
Binary Representation
The number of networks and the number of hosts per class can be derived by
this formula −
When calculating hosts' IP addresses, 2 IP addresses are decreased because Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
they cannot be assigned to hosts, i.e. the first IP of a network is network number
and the last IP is reserved for Broadcast IP. Class B IP address format
is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class A Address
Class C Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges
from 1 – 127, i.e. The first octet of Class C IP address has its first 3 bits set to 110, that is −
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet
IP range 127.x.x.x is reserved for loopback IP addresses.
mask for Class C is 255.255.255.x.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class A addressing can have 126 networks (2 7-2) and 16777214 hosts (224-2).
Class D Address
Class B Address
Very first four bits of the first octet in Class D IP addresses are set to 1110,
An IP address which belongs to class B has the first two bits in the first octet
giving a range of −
set to 10, i.e.
Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is For example, if one MSB (Most Significant Bit) is borrowed from host bits of
reserved for Multicasting. In multicasting data is not destined for a particular second octet and added to Network address, it creates two Subnets (21=2) with
host, that is why there is no need to extract host address from the IP address, (223-2) 8388606 Hosts per Subnet.
and Class D does not have any subnet mask.
The Subnet mask is changed accordingly to reflect subnetting. Given below is
Class E Address a list of all possible combination of Class A subnets −
This IP Class is reserved for experimental purposes only for R&D or Study. IP
addresses in this class ranges from 240.0.0.0 to 255.255.255.254. Like Class
D, this class too is not equipped with any subnet mask.
IPv4 - Subnetting
Each IP class is equipped with its own default subnet mask which bounds that
IP class to have prefixed number of Networks and prefixed number of Hosts
per network. Classful IP addressing does not provide any flexibility of having
less number of Hosts per Network or more Networks per IP Class.
Class A Subnets
In Class A, only the first octet is used as Network identifier and rest of three
octets are used to be assigned to Hosts (i.e. 16777214 Hosts per Network). To
make more subnet in Class A, bits from Host part are borrowed and the subnet
mask is changed accordingly.
In case of subnetting too, the very first and last IP address of every subnet is Class C IP addresses are normally assigned to a very small size network
used for Subnet Number and Subnet Broadcast IP address respectively. because it can only have 254 hosts in a network. Given below is a list of all
Because these two IP addresses cannot be assigned to hosts, sub-netting cannot possible combination of subnetted Class B IP address −
be implemented by using more than 30 bits as Network Bits, which provides
less than two hosts per subnet.
Class B Subnets
There are a few reserved IPv4 address spaces which cannot be used on the
internet. These addresses serve special purpose and cannot be routed outside
the Local Area Network.
Private IP Addresses
Every class of IP, (A, B & C) has some addresses reserved as Private IP
addresses. These IPs can be used within a network, campus, company and are
private to it. These addresses cannot be routed on the Internet, so packets
containing these private addresses are dropped by the Routers.
Class C Subnets
In order to communicate with the outside world, these IP addresses must have
to be translated to some public IP addresses using NAT process, or Web Proxy
server can be used.
The sole purpose to create a separate range of private addresses is to control Assume a network segment where all systems are configured to acquire IP
assignment of already-limited IPv4 address pool. By using a private address addresses from a DHCP server connected to the same network segment. If the
range within LAN, the requirement of IPv4 addresses has globally decreased DHCP server is not available, no host on the segment will be able to
significantly. It has also helped delaying the IPv4 address exhaustion. communicate to any other. Windows (98 or later), and Mac OS (8.0 or later)
supports this functionality of self-configuration of Link-local IP address. In
IP class, while using private address range, can be chosen as per the size and absence of DHCP server, every host machine randomly chooses an IP address
requirement of the organization. Larger organizations may choose class A from the above mentioned range and then checks to ascertain by means of ARP,
private IP address range where smaller organizations may opt for class C. if some other host also has not configured itself with the same IP address. Once
These IP addresses can be further sub-netted and assigned to departments all hosts are using link local addresses of same range, they can communicate
within an organization. with each other.
Loopback IP Addresses These IP addresses cannot help system to communicate when they do not
belong to the same physical or logical segment. These IPs are also not routable.
The IP address range 127.0.0.0 – 127.255.255.255 is reserved for loopback, i.e.
a Host’s self-address, also known as localhost address. This loopback IP RG-45 Termination for Twisted Pair Cables
address is managed entirely by and within the operating system. Loopback A RJ45 connector is a modular 8 position, 8 pin connector used for
addresses, enable the Server and Client processes on a single system to terminating Cat5e or Cat6 twisted pair cable. A pinout is a specific
communicate with each other. When a process creates a packet with destination arrangement of wires that dictate how the connector is terminated. There are
address as loopback address, the operating system loops it back to itself without multiple pinouts for RJ45 connectors including straight through (T568A or
having any interference of NIC. T568B), crossover, rolled, T1, and loopback. Straight through is the most
common type of cable and is used for connecting your computer to your
Data sent on loopback is forwarded by the operating system to a virtual network network. The other pinouts are for specialty cables that are used for unique
interface within operating system. This address is mostly used for testing network applications. Straight-Through Pinout Within the family of straight-
purposes like client-server architecture on a single machine. Other than that, if through color codes, there are two standards recognized by ANSI, TIA and
a host machine can successfully ping 127.0.0.1 or any IP from loopback range, EIA. The first is the T568A wiring standard and the second is T568B. T568B
implies that the TCP/IP software stack on the machine is successfully loaded has surpassed 568A and is seen as the default wiring scheme for twisted pair
and working. structured cabling. If you are unsure of which to use, choose 568B.
In case a host is not able to acquire an IP address from the DHCP server and it
has not been assigned any IP address manually, the host can assign itself an IP
address from a range of reserved Link-local addresses. Link local address
ranges from 169.254.0.0 -- 169.254.255.255.
Cross Over Pinout
A crossover cable utilizes two different RJ45 pinouts for the two ends of the
cable. If you need to connect 568A equipment to 568B you can use a crossover
cable.