CN Notes Unit-2
CN Notes Unit-2
Types of Internetworking
Internetworking primarily consists of three units: Extranet, Internet, and Intranet. Internet
connections may or may not be present on intranets and extranets. The computer network or
the extranet area unit is typically protected from being accessed from the internet if it is not
approved and if there is a link to the internet. Although it should serve as a portal for access
to portions of the associate degree extranet, the internet is not considered to be a part of the
computer network or extranet.
Extranet
It’s a network of the internetwork with a confined scope to one organisation or institution but
with limited links to one or more other networks on occasion; however, this is not always the
case. It is the lowest degree of internet usage and is typically prohibited in extremely private
areas. An extranet may also be referred to as a MAN, WAN, or another type of network, but
it cannot include a single local area network; rather, it must make at least one mention of an
external network.
Internet
Internet is a specific internetworking that connects governmental, academic, public, and
private networks on a global scale. It is based on the ARPANET, which was created by the ARPA
(Advanced Research Projects Agency) of the U.S. Defense Department. It is also the location
of the World Wide Web (WWW) and is referred to as the “Internet” to distinguish it from
other generic internetworking. Internet users and their service providers utilise IP addresses
obtained from address registries that control assignments.
Intranet
This computer network can be a collection of interconnected networks that employ the
Internet Protocol and IP-based software like web browsers as well as FTP tools, all of which
are controlled by a single body entity. This body entity blocks access to the computer network
for the rest of the world and only allows a select few users. This network most frequently
refers to the internal network of a business or other enterprise. To provide users with browse
able data, a large computer network can typically have its own internet server.
Internetwork Addressing
The internetwork addresses set up devices singly or collectively. Depending on the protocol
family and because of the OSI layer, addressing strategies vary. DLL, MAC addresses, and
network-layer addresses are the three types of internetwork address area units that are
typically employed.
DLL Addresses
All the physical network associations of network devices are clearly identified by a data-link
layer address. Area units are frequently used as physical addresses or hardware addresses in
data-link addresses. Data-link addresses can occasionally be found within a flat address space
and are pre-configured with a fixed relationship to a particular device. End systems typically
only have one data-link address since they only have one physical network association. As a
result of having many physical network connections, routers and other internetworking
equipment frequently have various data-link addresses.
MAC Addresses
Data-link layer addresses are included in MAC addresses. MAC addresses create network
entities in LANs that use the data-link layer’s IEEE MAC addresses. For each local area network
interface, a unique MAC address designates a particular area unit. MAC addresses are
expressed as twelve hexadecimal numbers and are forty-eight bits long. The Organisational
Unique Identifier (OUI) is made up of the first 12 hexadecimal digits, which are typically
managed by the IEEE and identify the maker or seller.
The interface serial variety or the other price set by a specific merchant would be represented
by the final half a dozen positional notation digits. When an interface card initialises, MAC
addresses are routinely traced into RAM from ROM, where they are known as burned-in
addresses (abbreviated as BIAs).
Challenges to Internetworking
There is no guarantee that useful internetwork will be implemented. There are many difficult
fields, especially in the ones of dependability, connection, adaptability, and network
management. However, each and every one of these fields is crucial to the creation of an
efficient and cost-effective internetwork. The challenges to internetworking include:
• The first difficulty arises when we attempt to link several systems in order to allow
communication among various technologies. For instance, completely distinct
websites may employ various media or function at various speeds.
• Reliable service that must be maintained in the internetwork is another crucial
consideration. Organisations as a whole and individual users alike rely on regular,
dependable access to network resources.
• Centralised assistance and internet network troubleshooting should be provided via
network management. For the network to operate smoothly, configuration, security,
performance, and other issues need to be addressed properly.
• The most significant factor, flexibility, is crucial for network expansion as well as new
applications and services.
Tunnelling:
Tunnelling is a protocol for transferring data securely from one network to another. Using a
method known as encapsulation, Tunnelling allows private network communications to be
sent across a public network, such as the Internet. Encapsulation enables data packets to
appear general to a public network when they are private data packets, allowing them to pass
unnoticed.
When data is tunnelled, it is split into smaller parts called packets, as it travels through the
tunnel. The packets are encrypted via the tunnel, and another process known
as encapsulation takes place. For transmission, private network data and protocol details are
encased in public network transmission units. The units have the appearance of public data,
allowing them to be sent via the Internet. Encapsulation enables packets to reach their
intended destination. De-capsulation and decryption take place at the final destination.
Tunnelling is possible thanks to a variety of procedures, including −
• Point-to-Point Tunnelling Protocol (PPTP)
• Layer Two Tunnelling Protocol (L2TP)
What is IPv4?
IP stands for Internet Protocol version v4 stands for Version Four (IPv4), is the most widely
used system for identifying devices on a network. It uses a set of four numbers, separated by
periods (like 192.168.0.1), to give each device a unique address. This address helps data find
its way from one device to another over the internet.
Parts of IPv4
IPv4 addresses consist of three parts:
• Network Part: The network part indicates the distinctive variety that’s appointed to
the network. The network part conjointly identifies the category of the network that’s
assigned.
• Host Part: The host part uniquely identifies the machine on your network. This part of
the IPv4 address is assigned to every host.
For each host on the network, the network part is the same, however, the host half
must vary.
• Subnet Number: This is the nonobligatory part of IPv4. Local networks that have
massive numbers of hosts are divided into subnets and subnet numbers are appointed
to that.
Characteristics of IPv4
• IPv4 could be a 32-bit IP Address.
• IPv4 could be a numeric address, and its bits are separated by a dot.
• The number of header fields is twelve and the length of the header field is twenty.
• It has Unicast, broadcast, and multicast-style addresses.
• IPv4 supports VLSM (Virtual Length Subnet Mask).
• IPv4 uses the Post Address Resolution Protocol to map to the MAC address.
• RIP may be a routing protocol supported by the routed daemon.
• Networks ought to be designed either manually or with DHCP.
• Packet fragmentation permits from routers and causes host.
There are two notations in which the IP address is written, dotted decimal and hexadecimal
notation.
Dotted Decimal Notation
Some points to be noted about dotted decimal notation:
• The value of any segment (byte) is between 0 and 255 (both included).
• No zeroes are preceding the value in any segment (054 is wrong, 54 is correct).
Dotted Decimal Notation
Hexadecimal Notation
Classful Addressing
Class A
IP addresses belonging to class A are assigned to the networks that contain a large number of
hosts.
• The network ID is 8 bits long.
• The host ID is 24 bits long.
The higher-order bit of the first octet in class A is always set to 0. The remaining 7 bits in the
first octet are used to determine network ID. The 24 bits of host ID are used to determine the
host in any network. The default subnet mask for Class A is 255.x.x.x. Therefore, class A has a
total of:
• 2^24 – 2 = 16,777,214 host ID
IP addresses belonging to class A ranges from 0.0.0.0 – 127.255.255.255.
Class B
IP address belonging to class B is assigned to networks that range from medium-sized to large-
sized networks.
• The network ID is 16 bits long.
• The host ID is 16 bits long.
The higher-order bits of the first octet of IP addresses of class B are always set to 10. The
remaining 14 bits are used to determine the network ID. The 16 bits of host ID are used to
determine the host in any network. The default subnet mask for class B is 255.255.x.x. Class B
has a total of:
• 2^14 = 16384 network address
• 2^16 – 2 = 65534 host address
IP addresses belonging to class B ranges from 128.0.0.0 – 191.255.255.255.
Class C
IP addresses belonging to class C are assigned to small-sized networks.
• The network ID is 24 bits long.
• The host ID is 8 bits long.
The higher-order bits of the first octet of IP addresses of class C is always set to 110. The
remaining 21 bits are used to determine the network ID. The 8 bits of host ID are used to
determine the host in any network. The default subnet mask for class C is 255.255.255.x. Class
C has a total of:
• 2^21 = 2097152 network address
• 2^8 – 2 = 254 host address
IP addresses belonging to class C range from 192.0.0.0 – 223.255.255.255.
Class D
IP address belonging to class D is reserved for multi-casting. The higher-order bits of the first
octet of IP addresses belonging to class D is always set to 1110. The remaining bits are for the
address that interested hosts recognize.
Class D does not possess any subnet mask. IP addresses belonging to class D range from
224.0.0.0 – 239.255.255.255.
Class E
IP addresses belonging to class E are reserved for experimental and research purposes. IP
addresses of class E range from 240.0.0.0 – 255.255.255.255. This class doesn’t have any
subnet mask. The higher-order bits of the first octet of class E are always set to 1111.
CIDR Notation
In CIDR subnet masks are denoted by /X. For example a subnet of 255.255.255.0
would be denoted by /24. To work a subnet mask in CIDR, we have to first convert
each octet into its respective binary value.
• Network
• Host
Division of Address • Host
• Subnet
• Subnet
Introduction to Subnetting
Subnetting is a combination of two words i.e. Sub and Netting. Here Sub word means
Substitute and netting word means Network. The Substitute Network created for a function
to happen is known as Subnetting.
Subnetting is a technique for creating logical sub-networks from a single physical network
(subnets). A company can grow its network via subnetting without asking for a new network
number from its ISP. Subnetting hides network complexity while assisting in the reduction of
network traffic. Here, a network which is unique has to provide its services to many Local Area
Networks i.e. (LAN). So, for this reason Subnetting is extensively used.
Purpose of Subnetting in Computer Networks
o Efficiency of the Network
By removing the need for extra routers, subnetting makes network traffic simpler. This makes
sure the data being transmitted can get to its destination as fast as possible, eliminating or
avoiding any potential diversions that may slow it down.
o Provides Network Security
By isolating or removing vulnerable network regions and making it harder for intruders to
move through a company's network, subnetting helps the network managers in reducing
network-wide risks.
o Internet Protocol (IP) Addressing Relocation
Each class has a finite amount of possible host allocations; for instance, networks with more
than 254 devices require a Class B allocation. Assume that you are a network administrator.
Now, you have a task of allocating 150 hosts among three physical networks in three distinct
cities for a Class B or C network. If so, we must either ask for additional address blocks for
each network or split the single big network into small parts named subnets so that we could
utilize a single address block across a number of physical networks.
We will learn about this concept deeper in the upcoming topics.
o Reduction of Network Traffic
Placing all of the computers on the same subnet can assist minimize network traffic if a
significant amount of an organization's traffic is intended to be shared routinely among a
number of devices. Without a subnet, all computers and servers on the network would be
able to see data packets from every other machine.
o Network Speed Improvement
The main network is divided into smaller subnets through the process of subnetting, and the
goal of these smaller, linked networks is to split the large network into a collection of smaller,
less-busy networks. Subnets reduce the need for traffic to use unnecessary routes, which
speeds up the network.
o Division of IP Addresses
An IP address is split into its network address and host address via subnetting.
The split address may then be further divided into units using the subnet mask approach, and
those units can be assigned to different network devices.
Here, X refers to the Host ID. This is the only thing which gets changed in the Internet Protocol
Address
SUBNETTING: https://youtu.be/UHRPtNZ_Rz4
IGMP
o IGMP stands for Internet Group Message Protocol.
o The IP protocol supports two types of communication:
o Unicasting: It is a communication between one sender and one receiver.
Therefore, we can say that it is one-to-one communication.
o Multicasting: Sometimes the sender wants to send the same message to a
large number of receivers simultaneously. This process is known as multicasting
which has one-to-many communication.
o The IGMP protocol is used by the hosts and router to support multicasting.
o The IGMP protocol is used by the hosts and router to identify the hosts in a LAN that
are the members of a group.
o IGMP is a part of the IP layer, and IGMP has a fixed-size message.
o The IGMP message is encapsulated within an IP datagram.
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29×10 9 address The address space of IPv6 is quite large it can
space produce 3.4×10 38 address space
The Security feature is dependent IPSEC is an inbuilt security feature in the IPv6
on the application protocol
IPv4 IPv6
In IPv4 Packet flow identification is In IPv6 packet flow identification are Available and
not available uses the flow label field in the header
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are separated by a
separated by addresses dot (.) colon (:)
Example of IPv6:
Example of IPv4: 66.94.29.13
2001:0000:3238:DFE1:0063:0000:0000:FEFB
• When the encapsulated packet arrives at the care-of address, the mobile host unwraps
it and retrieves the packet from the sender.
• The overall route is called triangle routing because it way is circuitous if the remote
location is far from the home location.
• As part of the step, 4 senders learns the current care-of address.
• Subsequent packets can be routed directly to the mobile host by tunneling them to
the care-of address (step 5) bypassing the home location.
• If connectivity lost for any reason as the mobile moves, the home address can always
be used to reach the mobile.
Mobile IP Topology
How Does Mobile IP Work?
The correspondent node sends the data to the mobile node. Data packets contain the
correspondent node’s address (Source) and home address (Destination). Packets reach the
home agent. But now mobile node is not in the home network, it has moved into the foreign
network. The foreign agent sends the care-of-address to the home agent to which all the
packets should be sent. Now, a tunnel will be established between the home agent and the
foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism
called encapsulation.
Now, the home agent encapsulates the data packets into new packets in which the source
address is the home address and the destination is the care-of-address and sends it through
the tunnel to the foreign agent. Foreign agent, on another side of the tunnel, receives the data
packets, decapsulates them, and sends them to the mobile node. The mobile node in response
to the data packets received sends a reply in response to the foreign agent. The foreign agent
directly sends the reply to the correspondent node.