Chn-Unit-5 Material
Chn-Unit-5 Material
UNIT-5
Network Addressing & Management
Example:
The 32-bit binary address
11000110.10101100.10101000.00001010
Represents the IP address 198.172.168.10
5.2.1 COMPONENTS OF IP ADDRESS:
IP address is divided into the following components:
1. Host address: This is the address of the device within the network.
2. Network address: This is the address of the network itself, and is used by other networks to
identify this network.
There may be several computers in a particular network. The IP address of all these computers begin
with the same network address.
Ex:
198.172.168.11 Example:
198.172.168.12 Network address is: 128.143.0.0
Host number is: 137.144
Host Address
1
Computer Hardware & Computer Networking UNIT-5
TCP/IP allows network administrators the flexibility to decide the number of octets for the network and
host address with the help of IP address classes.
5.2.2 IP ADDRESS CLASSES:
✓ IP address classes provide network administrators with the flexibility to select an IP address format
depending on the needs of the network.
✓ Ex:-On a network with 50 computers it is sufficient that only last octet used to represent the host
address. If a network has 2000 computers, then the last two octets should be used to represent the
host address.
✓ The process of determining the number of octets that represent the network and host addresses is
standardized with the use of IP address classes.
Classes –
There are currently 5 different classes of address.
a)Class A b)Class B c)Class C d)Class D e)Class E
✓ Class A: Network prefix is 8 bits long
✓ Class B: Network prefix is 16 bits long
✓ Class C: Network prefix is 24 bits long
✓ Each IP address contained a key which identifies the class:
• Class A: IP address starts with “0”
• Class B: IP address starts with “10”
• Class C: IP address starts with “110”
• Class D: IP address starts with “1110”
• Class E: IP address starts with “1111”
✓ The first octet of a Class D address can range from 224 through 239.
✓ Remaining octets however can range from 0 through 255.
✓ Range of Class D is from 224.0.0.0 to 239.255.255.255
✓ Example--225.38.254.254 is an example of Class D address.
Class Full IP Addresses - Class E:
✓ Like class D addresses, Class E addresses are also not available for network addressing.
✓ In fact, Class E addresses are reserved for experimental purposes. These addresses made
available for normal use in the future.
3
Computer Hardware & Computer Networking UNIT-5
Range of classes:
IP address Class IP address range
Class A 1.0.0.0 to 127.255.255.255
Class B 128.0.0.0 to 191.255.255.255
Class C 192.0.0.0 to 223.255.255.255
Limitations of IP address classes
The performance of the network goes down if all the computers are connected in a single network.
Ex: Imagine an Ethernet LAN with 3,000 Computers. Ethernet broadcast the data to all hosts, and
therefore, the traffic in this LAN would be extremely high resulting in poor network performance.
If we connect huge number of hosts per network that increases the difficulty of managing a network.
Problem 1: Inflexible. Assume a company requires 10,000 addresses
Class A and B addresses are overkill (>64,000 addresses)
Class C address is insufficient
Problem 2: Flat address space. Routing on the backbone Internet needs to have an entry for each
network address. In 1993, the size of the routing tables started to outgrow the capacity of routers.
Problem 3: Too few network addresses for large networks.
5.2.3 IP SUBNETTING:
✓ “Subnetting is a process of dividing large network into the smaller networks. Each of these smaller
networks are called subnets.”
✓ The process of creating subnets is called subnetting which improves the network performance.
✓ The host part of an IP address is divided into a subnet number and a host number.
4
Computer Hardware & Computer Networking UNIT-5
✓ Subnet masks are also written in dotted decimal notation, with the addition of a slash followed by
the number of bits in the network and subnet part.
✓ Example: The subnet 200.1.2.0 can also be represented as 200.1.2.0/26, 200.1.2.64/26, 200.1.2.128/26
26 in last part=Network ID + subnet
=24 Network ID bits+2 SubnetID bits
5
Computer Hardware & Computer Networking UNIT-5
SUBNET MASKING:
“ Subnet mask is a mask used to determine what subnet an IP address belongs to.”
1. In binary notation:
all bits in Network ID
Subnet ID is represented by – 1’s
Host ID is represented by - 0’s
2. In decimal notation:
subnet mask value 1 to 255 - network address
value 0 [Zero] - host address.
If we have not subnetted the network, masking extracts the network address from an IP address.
If we have subnetted, masking extracts the subnetwork address from an IP address.
a) Masking without subnetting:
To be compatible, routers use a mask even if there is no subnetting.
Class Default SubnetMask Address(Example) Network Address (Example)
A 255.0.0.0 15.32.56.7 15.0.0.0
B 255.255.0.0 135.67.13.9 135.67.0.0
C 255.255.255.0 201.34.12.72 201.34.12.0
6
Computer Hardware & Computer Networking UNIT-5
Advantages of Subnetting:
1) Subnetting breaks large network into smaller network because smaller networks are easier to manage.
2) Subnetting reduces network traffic by removing collision and broadcast traffic, that overall improve
performance.
3) Subnetting allows you to save money by reducing requirement for IP range.
Subnet considerations:
The following factors are to be for dividing a network into subnets:
1) Number of subnets required(defined by exponent of 2, i.e; 2 subnetIdbits)
2) Number of subnets required in future
3) Number of hosts in the largest network.(2 hostIDbits)
Subnet limitations:
1) Limitation on the number of hosts that can be accommodated in a single subnet.
2) Wastage of host address in subnets.
5.2.4 Classify the Two Types Of Internet Protocol Addressing Ipv4 & Ipv6:
IPv4 IPv6
IPv4 addresses are 32 bit length. IPv6 addresses are 128 bit length.
IPv4 addresses are binary IPv6 addresses are binary numbers represented
numbers represented in decimals. in hexadecimals.
IPSec support is only optional. Inbuilt IPSec support.
Fragmentation is done by sender and
Fragmentation is done only by sender.
forwarding routers.
Packet flow identification is available within the IPv6
No packet flow identification.
header using the Flow Label field.
Checksum field is available in IPv4 header No checksum field in IPv6 header.
No option fields, but IPv6 Extension headers are
Options fields are available in IPv4 header.
available.
Address Resolution Protocol (ARP) is available Address Resolution Protocol (ARP) is replaced with a
to map IPv4 addresses to MAC addresses. function of Neighbor Discovery Protocol (NDP).
Internet Group Management Protocol (IGMP)
IGMP is replaced with Multicast Listener Discovery
is used to manage multicast group
(MLD) messages.
membership.
Broadcast messages are not available. Instead a link-
Broadcast messages are available. local scope "All nodes" multicast IPv6 address (FF02::1)
is used for broadcast similar functionality.
Manual configuration (Static) of IPv4
addresses or DHCP (Dynamic configuration) is Auto-configuration of addresses is available.
required to configure IPv4 addresses.
Need For Ipv6/ Features of IPv6:
1) Scarcity of IPv4 Addresses:
• The IPv4 addressing system uses 32-bit address space. 32-bit address space allows for
4,294,967,296 IPv4 addresses, but Many addresses which are allocated to many companies
were not used and this created scarcity of IPv4 addresses.
• Because of scarcity, many organizations implemented NAT (Network Address Translation) to
map multiple private IPv4 addresses to a single public IPv4 address. But NAT also have many
limitations. NAT do not support network layer security standards
2) Larger address space: An IPV6 address is 128 bit long.
3) New options: IPV6 has new options to allow for additional functionalities.
7
Computer Hardware & Computer Networking UNIT-5
4) Allowance for extension: IPV6 is designed to allow the extension of the protocol if required by new
technologies or applications.
5) Security: It offers built-in support to IPSec (Internet Protocol Security). The encryption and
decryption authentication option in IPV6 provide confidentiality of packet.
6) Supports mobile users: A user can use the same IP address to connect from different locations.
7) Supports Anycasting: Anycasting is used to regulate traffic as well as to increase the speed of
accessing web sites.
8) Built-in support for auto configuration: IPv6 compatible devices with IPv6 installed on them can
create their own IP Address using the MAC address & obtaining the n/w address.
9) Quality of service (QoS): Quality of Service (QoS) is available in IPv6 and it relies on the 8 bits of the IPv4 Type
of Service (TOS) field and the identification of the payload. IPv4 Type of Service (TOS) field has limited
functionality and payload identification is not possible when the IPv4 datagram packet payload is encrypted.
8
Computer Hardware & Computer Networking UNIT-5
0010 0000 0000 0001:1100 1101 1011 1010:0000 0000 0000 0000:0000 0000 0000 0000:0000 0000 0000 0000: 0000 0000 0000 0000: 0011 0010 0101 0111
: 9652
2. Multicast addresses:
• Multicast is a type of communication where multicast traffic addressed for a group of devices on the
network.
• IPv6 multicast traffic are sent to a group and only members of that group receive the Multicast traffic.
• IPv6 Multicast Groups are identified by IPv6 Multicast Addresses.
3. Anycast addresses:
• Anycast is a type of IPv6 network communication in which IPv6 datagrams from a source are routed
to the nearest device (in terms of routing distance) from a group servers which provide the same
service. Every nodes which provide the same service are configured with same Anycast destination
address.
4. Loopback:
• Used by a node to send an IPv6 packet to itself. An IPv6 loopback address functions the same as
an IPv4 loopback address. The IPv6 loopback address is
0000:0000:0000:0000:0000:0000:0000:0001/128, which can be also represented as ::1.
9
Computer Hardware & Computer Networking UNIT-5
Unicast addressing:
1. An IPv6 unicast address is used to identify a single interface in a node. Also called Global unicast address.
2. An IPv6 Unicast address identifies only one node in networks. Global Unicast Addresses are similar
to IPv4 public addresses.
3. Global Unicast Addresses are globally routable addresses on IPv6 Internet.
4. RFC 3587 states that out of the 128 bits in IPv6 addresses, left most three bits are must be fixed as 001.
5. Remaining 45 bits are reserved for global routing prefix (n/w address). 16 bits after that can be used for
subnetting and the 64 remaining bits are the host bits.
6. The first fixed three bits (001) and the 45-bit global routing prefix (45+3 = 48 bits) together can be
assigned to an organization as their IPv6 prefix.
7. Since the leftmost three bits are reserved as "001" for Global unicast IPv6 addresses, the range of
Global Unicast Addresses available now are from 2000 to 3FFF, as shown below.
128-bits
64-bits 64-bits
48-bits
➢ The prefix is the part of the IPv6 address that indicates the network.
➢ Which means that, currently first 48 bits of an IPv6 address are used to identify the network
globally.
➢ The next 16 bits are used for subnetting (which makes 48+16=64 bits, network part) and the
remaining 64 bits are used for identifying the hosts (host part).
Multicast Addressing:
➢ A IPv6 multicast address identifies multiple interfaces.
➢ A multicast transmission sends packets to all interfaces that are part of a multicast group.
FF02::1 All nodes on the local network segment
Anycast Addressing:
➢ Anycast type of IPv6 addresses can be used only as destination addresses.
➢ Anycast type of IPv6 addresses are typically assigned only to IPv6 routers. Anycast addresses are
from IPv6 unicast address range.
10
Computer Hardware & Computer Networking UNIT-5
11
Computer Hardware & Computer Networking UNIT-5
12
Computer Hardware & Computer Networking UNIT-5
HTTP commands: HTTP protocol uses these commands when a client requests a server for a web page.
HTTP command DESCRIPTION
GET sends a request for a webpage.
HEAD requests the server to read the header of a web page.
PUT requests the server to store a web page.
POST similar to PUT, but is used for updating a web page.
DELETE deletes a web page.
LINK connects two pages by hyperlinks.
UNLINK disconnects two pages by hyperlinks.
2. Type FTP, and press enter. The command prompt changes to FTP, indicating that the default FTP
client software is private.
3. Type open demo.wftpserver.com and press enter.
4. Now you are connected to the FTP server of the web site. You will be asked to enter the user
name: demo-user and password: demo-user.
5. Once authenticated, you can access the files on the web site using “get filename”
Note: - “open” is an FTP command to connect to an FTP server.
.
5.4.3 SMTP (Simple Mail Transfer Protocol):
✓ SMTP is a protocol is used for sending and receiving email messages between two computers on
a network. It uses TCP/IP protocol.
✓ SMTP transfers the email messages from the SMTP server of the sender to the SMTP server of
the receiver. SMTP is a push protocol.
✓ Address used by SMTP consists of 2 parts:
a)Mailbox name. b)Mail server name(Domain name)
Ex: poly@gmail.com in this email address, poly-mailbox name, and gmail.com-mail server name.
✓ A network on which SMTP is installed is called an SMTP server.
13
Computer Hardware & Computer Networking UNIT-5
• When a user sends an e-mail it reaches the SMTP server. The SMTP server breaks the
destination email address into the mailbox name and the domain name, and delivers
these messages to the SMTP server and stores them separately depending on the
mailbox name.
• To transfer mails from the mail server to a different computer, a protocol such as
POP/IMAP is used. POP3/IMAP4 are pull protocols.
POP3(Post Office Protocol):
▪ POP3 is used for fetching emails from a mail server to a user’s computer.
▪ Advantages:
✓ The ability to read and modify mails without remaining connected to the internet is the
main advantage.
✓ Mailboxes present on the server usually have limited storage space, leaving all the e-
mails on the server may take up a significant portion of the disk space on the server.
These problem can be prevented by continuously retrieving mails from the server.
▪ Disadvantages: -
✓ All e-mail messages are downloaded on to a single computer and therefore, a user can
access the mail from the same computer.
✓ As e-mails stored in a single computer, a virus attack may arise all data.
IMAP4(Internet Message Access Protocol):
▪ Allows users to download email messages from a mail server to a local computer.
▪ IMAP always maintain a copy of the email messages on the mail server, unless the user explicitly
deletes them.
▪ Advantages:
-Allows users to access multiple mailboxes simultaneously.
-Allows users to create customized mailboxes on mail server.
-Allows users to access e-mails from multiple locations.
▪ Disadvantages:
-Message storage is limited.
-Reading messages while offline requires use of your e-mail programs in Offline mode.
14
Computer Hardware & Computer Networking UNIT-5
✓ The characters are sent to the TELNET client, which transforms the characters to a universal
character set called Network Virtual Terminal(NVT) Characters and delivers them to the local
TCP/IP stack.
✓ The commands or text in NVT form travel through the Internet and arrive at the TCP/IP stack at
the remote machine.
✓ The characters are passed to the TELNET server which changes the characters understandable by
remote machine; the characters are then passed to the pseudoterminal driver which pretends
that the characters are coming from a terminal.
✓ The operating system then passes the characters to the appropriate application program
5.5 Overview of Network Management:
Network Management:
“Network management means managing computer networks involves monitoring and controlling
various network devices, such as computers, hubs, routers, switches and cables.”
To ensure smooth functioning of a network, you need to prevent problems that may affect the
performance of a network. By preventing such problems, you can operate the network at peak
performance. The administrator should be in a position to detect such problems and troubleshoot them.
The common problems encountered in a network are non-optimum or over utilization of bandwidth,
network intrusion by unauthorized sources, and device or link (cable) failures.
The reliable and timely transfer of data over a network is an area of concern for any organization
that uses a computer network. Any loss or delay of critical data may affect the activities of the
organization. For example, imagine an organization with offices in Miami, Chicago, and New York City.
Fault Management
Performance Management
Security Management
Accounting Management
16
Computer Hardware & Computer Networking UNIT-5
1. Configuration management:
Configuration management is concerned with the process of collecting information related to
the configuration of different devices when the network is designed. It helps in identifying the effects of
various versions of hardware and software that are running on the network. For example, imagine that ten
computers, such as the operating system or the protocol supported by the NIC, to select an appropriate
protocol for the network.
This configuration information helps the administrator plan in case of changes in network
requirements in the future.
2. Fault Management:
Fault Management is concerned with the monitoring of network devices. The administrator must
be aware of any device or link failures in the network. In addition, the data transferred between devices
may be corrupt due to a virus or a corruption of protocols used on the network.
Methods:
To track and manage network operation, a Network Management System (NMS), which is a
combination of hardware and software, is used.
To monitor network devices, protocols such as SNMP and RMON are used.
To monitor network traffic, a protocol analyzer, which is a combination of hardware and
software, is used.
To identify cable faults in the network, a hardware device such as a cable tester is used.
3. Performance Management
Performance Management is concerned with the process of collecting and analyzing data from
the network components. After analyzing the data, the administrator matches the data against the
thresholds or benchmarks that are set for the network. a benchmark is a condition against which the
performance of the network is measured.
4. Security Management
Security Management is concerned with the steps involved in assuring the security of data and devices on
the network. With the help of security management, the administrator can control unauthorized access of
network resources by granting access permissions.
Example: the administrator can permit a certain user to only read a file, while permitting other users to
read/modify the file.
5. Accounting Management
Accounting Management is concerned with the cost required to operate a network so that individual or
group uses on the network can be regulates appropriately.
Example: imagine two networks connected to each other through routers. When data is from one network
to another, the administrator should decide how the data travels after reaching the router on the other
network. The administrator or the router decides the number of hops it takes to send the data. The path
with the least number of hops is the lowest cost path and reduces the operational cost of the network.
These protocols are used in managing a network. The network management protocols covered are SNMP
and RMON.
17
Computer Hardware & Computer Networking UNIT-5
➢ SNMP is a network management protocol that facilitates the exchange of management information
between network devices.
➢ SNMP enables the administrator to detect, manage, and troubleshoot network problems and helps
in planning network growth.
➢ Initially this protocol was developed to monitor and troubleshoot network devices, such as routers
and bridges from a computer, usually the network server.
➢ However, SNMP can monitor and provide status information between computers running windows
2000, routers and gateways, mainframe computers, terminal servers, and writing hubs,.
SNMP components:
• SNMP manager
• SNMP agent
➢ this figure shows The information is retrieved with the help of messages.
➢ The information provided by the SNMP agents can include: free disk space, software version
running on the SNMP agents, and the IP addresses of the SNMP agent.
1. SNMP Manager:
✓ The computer on which the SNMP management software is installed is called the SNMP manager.
✓ It is also called the SNMP management System or server component.
✓ The SNMP server queries the SNMP agent on the device for the required information.
✓ The SNMP agent sends critical alarms of events to the SNMP server.
✓ The time interval at which the information is sent to the events to the SNMP manager is defined
at the time of configuring SNMP.
✓ SNMP uses different messages that help the SNMP manager to communicate with SNMP agents.
✓ The messages are Get, Get – Next, Set, and Trap.
✓ The Get and Get – Next messages: enable the administrator to retrieve information about the
managed devices, such as computers, routers, bridges, and hubs, on the SNMP based network.
✓ The Set message: enables the administrator to change the values, such as free disk space and
utilization in the Management Information Base (MIB).
✓ A MIB is used to store the properties of managed devices.
18
Computer Hardware & Computer Networking UNIT-5
✓ The Trap message: alerts the administrator about events in the remote computer, such as
password violation, fan failure, power restart, low memory, disk full, over utilization, or invalid
access.
2. SNMP Agent:
✓ The SNMP agent is software installed and configured on a managed device that runs on the
SNMP based network.
✓ The SNMP agent contains a database called MIB.
✓ The information about the managed device is stored in the MIB.
✓ The managed device collects the network management information from MIB database and
makes it available to the server using the SNMP agent.
Figure shows the Get, Get – Next, and Set messages. These messages help the administrator to retrieve
information about the managed devices, such as computers, routers, bridges, and hubs, on the SNMP
based network. Similarly, the Trap message alerts the administrator about any violation that occurs on
the SNMP agent.
19
Computer Hardware & Computer Networking UNIT-5
4. The SNMP manager sends a message to the SNMP agent to get certain information about the
managed device running on the SNMP based network.
5. The information could be about the type of protocols, about the version of the managed device,
or about the available hard disk space.
6. This information is stored in a MIB, which helps the administrator to manage the network
7. The message sent from the server to the SNMP agents contains community name, defined as a
group of SNMP agents. The grouping of SNMP agents helps in the process of administration.
8. On receiving the SNMP message, the SNMP agent validates the community name.
9. if the community name is valid, the SNMP agent sends the requested information to the SNMP
server in the form of messages.
10. if the community name is not valid, the SNMP agent discards the message and sends an error
message to the SNMP server.
20
Computer Hardware & Computer Networking UNIT-5
Network security:
Network security is accomplished through hardware and software. The software must be constantly
updated and managed to protect you from emerging threats. A network security system usually consists of
many components.
Network security components often include:
• Anti-virus and anti-spyware
• Firewall, to block unauthorized access to your network
• Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-
hour attacks
• Virtual Private Networks (VPNs), to provide secure remote access
Need for Network Security:
• The easiest way to protect a network from an outside attack is to close it off completely from
the outside world. A closed network provides connectivity only to trusted known parties and
sites; a closed network does not allow a connection to public networks.
• Because they have no Internet connectivity, networks designed in this way can be considered
safe from Internet attacks.
Routing Table
✓ A routing table typically contains the path information for data packets to reach a particular
internetwork. The routing table also contains a default path, which is used when no path
information is available to reach a particular internetwork.
The nodes use any of the following methods to build a routing table:
Static routing table: The network administrator manually provides the nodes with a list of available
routers, and information regarding the routers to be selected to reach a particular network.
Dynamic routing table: Network layer protocols allow routers to periodically update the routing
table of the nodes or routers with new routing information present in the routing table of the router.
Default gateway: This is the address to which data packets are forwarded by the nodes or routers
when no specific route is found by the node or router in its routing table
On the other hand, routers build the routing table by a process known as advertising.
Every time a new router is added to a network, the router sends information on its address, and the
networks connected to it, to all the routers in the network. this is called advertising. Routers continue to
advertise information at periodic intervals.
21