Professional Documents
Culture Documents
So Server Is A: Local Area Network - A Computer
So Server Is A: Local Area Network - A Computer
48-port Switch
Transparent Bridge: Remote Access Bridge:
These are the advancement over fixed point bridges. They can These are the bridges that are used in multiple connection and
update the lookup table dynamically. At first, the lookup tables they connect two LANs that are geographically distant away.
are empty. So, whenever first data packet comes into the bridge, There is point-to-point link between two bridges rather than a
it stores the source address at the incoming port and forwards LAN connecting them as in case of routing bridges.
the packet to all other ports. Doing so, when the destination
address matches to a host in the network, it will receive the
message and all other hosts will simply discard it. The process
keeps on continuing, and the bridge keeps on updating the
lookup table. So once all the addresses are defined on the table,
the bridge needs only to search for destination address on the
table and soon as it determines the port, the incoming data
packets are forwarded to that port only.
This bridge overcomes the demerits of fixed point bridge. When
the new computer comes online, its address can’t be found on
any lookup table. Then it will forward packets to all the ports.
New address addition process is same as explained above.
Moreover, when a host is down in the network, its address gets
removed from the table, when it doesn’t reply for the echo
packets sent by bridges for a long time.
Router
Routing Bridge:
These bridges are useful for multiple bridge connection. There A Router connects multiple networks, and uses routing to forward
are multiple bridges between source and destination. The routes packets. It is an OSI Layer-3 device and works on the logical address
for packets will be chosen the path that is optimum. There may of a host or a node. Compare this with a Switch which works on the
be different LANs in between source and destination. physical address (such as MAC address) of a host or a node. A
When any bridge goes down between the LANs, still simple DSL router is shown in the figure below.
communication is possible.
Header (20-60 bytes) data
0-65536 bytes
Fig: IP Datagram
Gateways are the most complex devices with respect to the VER: version number-4
functionality. They typically work at the upper most layers of OSI HLEN: header length
model. A gateway is used to connect two different environments, DS: differentiated service
such as a Frame-Relay network and an X.25 network. TTL: time to live
Fragmentation offset: relative positioning of fragments
Repeater - Regenerates signals between similar networks. It works Total length: total size of packet including header length
at the Physical Layer of the OSI model.
Class C:
The class C address space is the most commonly used of the original
address classes. This address space was intended to support small
networks with a maximum of 254 hosts.
Network bits: 21
Total number of networks: 221=2097152
Host bits: 8
Total number of hosts: 28=256
Total number of computers that can be connected:
2097152*256=536870912
Class D:
The class D address was created to enable multicasting in an IP
address. A multicast address is a unique network that directs
packets with that destination address to predefined groups of IP
Class A: addresses. Thus, a single station can simultaneously transmit a
The class A address was designed to support extremely large single stream of data to multiple recipients.
networks.
Network bits: 7 Class E:
Total number of networks: 27=128 Class E address has been defined. However, the IETF has reserved
Host bits: 24 these addresses for its own research. Thus, no class E address has
Total number of hosts: 224=16777216 been released for use in internet.
Total number of computers that can be connected:
128*16777216=2147483648
Netid Hostid b) 192.168.1.0/25:
Specific All 0s Network Address 11111111 11111111 11111111 10000000
Specific All 1s Direct broadcast Address No. of usable IP addresses: 27-2=126
All 1s Limited broadcast address
Loop back Address c) 192.168.1.0/31:
127.anything
11111111 11111111 11111111 11111110
No. of usable IP addresses: 21-2=0 (No hosts possible)
Subnetting: Subnet mask:
A subnetwork, or subnet, is a logically visible subdivision of an IP A subnet mask is a 32-bit number that masks an IP address, and
Network. The practice of dividing a network into two or more divides the IP address into network address and host address.
networks is called subnetting. Subnet mask is made by setting network bits to all 1’s and setting
All computers that belong to a subnet are addresses with a host bit to all 0’s. Within a given network, two host addresses are
common, identical, most significant bit group in their IP address. reserved for special purpose. The ‘0’ address is assigned a network
This results in the logical division of an IP address into two fields, address, and ‘255’ is assigned to a broadcast address, and they
a network or routing prefix and the rest field or host identifier. cannot be assigned to hosts.
The rest field is an identifier for specific host or network
interface. CIDR (Classless Inter Domain Routing):
CIDR was introduced in 1993 replacing the previous generation of IP
Address Bits for subnet mask n/w prefix address syntax- classful networks. CIDR allowed for more efficient
Class use of IPV4 address space and prefix aggregation, known as route
A 11111111 00000000 00000000 00000000 /8 summarization or supernetting.
B 11111111 11111111 00000000 00000000 /16 CIDR allows routers to group routes together to reduce the bulk of
C 11111111 11111111 11111111 00000000 /24 routing information carried by core routers. With CIDR, IP addresses
Benefits of subnetting: and their subnet mask are written as four octets, separated by
Reduced network traffic periods, followed by a forward slash and a two-digit number that
Simplified management represents the network mask.
Smaller broadcast domains Example:
10.1.1.0/30
Q. Calculate subnet mask and number of usable IP addresses. 172.16.1.16/28
a) 192.168.1.0/24: 192.168.1.32/27
11111111 11111111 11111111 00000000
No. of usable IP addresses: 28-2=254
NAT (Network Address Translation): The routing decisions change to reflect changes in the topology, and
NAT is the process where a network device, usually a firewall, usually the traffic as well. Adaptive algorithms differ in where they
assigns a public address to a computer (or group of computers) get their information (e.g. locally, from adjacent routers, or from all
inside a private network. The main use of NAT is to limit the number routers).
of public IP address and organization or company must use, for both
economy and security purpose. Routing Algorithms:
The Optimality Principle
Shortest Path Algorithm
Flooding
Distance Vector Routing
Link State Routing
Hierarchical Routing
Broadcast Routing
Multicast Routing
Routing for Mobile Hosts
Routing in Ad Hoc Networks
Fig: The first 5 steps used in computing the shortest path from A to
D. The arrows indicate the working node.
Flooding:
A static algorithm.
A subnet A sink tree for router B Every incoming packet is sent out on every outgoing line except
the one it arrived on.
Generates vast numbers of duplicate packets, in fact, an infinite
number unless some measures are taken to damp the process.
One such measure is to have a hop counter contained in the
Shortest Path Routing: header of each packet, which is decremented at each hop, with
the packet being discarded when the counter reaches zero.
Used in peer to peer system (file sharing).
Routing Protocols:
1. ARP (Address Resolution Protocol):
Error reporting
called ARP tables. These tables are stored in RAM, where cached
information is maintained automatically on each of the devices. Time exceeded: to announce timeouts
Each device on a network maintains its own ARP table. When a Parameter problems: missing part of datagram
network device wants to send data across the network, it uses Source quench: to announce n/w congestion
information provided by the ARP table. Redirect
ECHO and ECHO REPLY: to assist troubleshooting
When a source determines the IP address for a destination, it Timestamp request and reply
then consults the ARP table in order to locate the MAC address Address mask request and reply
for the destination. If the source locates the entry in its table,
destination IP address to destination MAC address, it will
associate the IP address to the MAC address and then uses it to
encapsulate the data. The data packet is then sent out over the
networking media to be picked up by the destination device.