Computer Networks Group 6
Computer Networks Group 6
Computer Networks Group 6
Assignment Topics:
Internetworking
Internet addressing
Subnetting
CIDR
Submitted to:
Ma’am Bisma Islam
Class:
BS Software Engineering (5th semester)
Submitted by:
Group 6
Members:
1. Ayesha (10)
2. Khadija Ijaz (28)
3. Fatima Munawar (21)
4. Ayesha Barlas (12)
Internetworking
Define Internetworking:
To enable communication, every individual network node or phase is designed with a similar
protocol or communication logic, that is Transfer Control Protocol (TCP) or Internet Protocol
(IP). Once a network communicates with another network having constant communication
procedures, it’s called Internetworking.
Types of Internetworking:
There are chiefly 3 units of Internetworking:
Extranet
Intranet
Internet
Extranet: It’s a network of the internetwork that’s restricted in scope to one organization
or entity however that additionally has restricted connections to the networks of one or a lot
of different sometimes, however not essential. It’s the very lowest level of Internetworking,
usually enforced in an exceedingly personal area. Associate degree extranet may additionally
be classified as a Man, WAN, or different form of network however it cannot encompass one
local area network i.e. it should have a minimum of one reference to associate degree
external network.
Intranet: This associate degree computer network could be a set of interconnected networks,
which exploits the Internet Protocol and uses IP-based tools akin to web browsers and FTP tools,
that are underneath the management of one body entity. That body entity closes the computer
network to the remainder of the planet and permits solely specific users. Most typically, this
network is the internal network of a corporation or different enterprise. An outsized computer
network can usually have its own internet server to supply users with browsable data.
Internet: A selected Internetworking, consisting of a worldwide interconnection of
governmental, academic, public, and personal networks based mostly upon the Advanced
analysis comes Agency Network (ARPANET) developed by ARPA of the U.S. Department of
Defense additionally home to the World Wide Web (WWW) and cited as the ‘Internet’ to
differentiate from all different generic Internetworks. Participants within the web, or their service
suppliers, use IP Addresses obtained from address registries that manage assignments.
Advantages:
Disadvantages:
Security risks: Internetworking can create security vulnerabilities and increase the
risk of cyberattacks and data breaches. Connecting multiple networks together increases
the number of entry points for attackers, making it more difficult to secure the entire
system.
Complexity: Internetworking can be complex and requires specialized knowledge and
expertise to set up and maintain. This can increase costs and create additional
maintenance overhead.
Performance Issues: Internetworking can lead to performance issues, particularly if
networks are not properly optimized and configured. This can result in slow response
times and poor network performance.
IP Address
What is an IP Address?
An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of
four numbers — an example address might be 192.158.1.38. Each number in the set can range
from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.
IP addresses are not random. They are mathematically produced and allocated by the Internet
Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned
Names and Numbers (ICANN).
Internet Protocol works the same way as any other language, by communicating using set
guidelines to pass information. All devices find, send, and exchange information with other
connected devices using this protocol. By speaking the same language, any computer in any
location can talk to one another.
Uses of IP address:
1. Identifying network devices: IP addresses are used to identify network devices such as
computers, servers, and routers.
3. Routing: IP addresses are used to route network traffic between different network devices.
4. Security: IP addresses can be used to monitor and identify potential security threats on a
network.
5. Geolocation: IP addresses can help determine the physical location of a device, which can
be used for various purposes such as advertising and security.
6. Network management: IP addresses are used for network management purposes such as
configuration, monitoring, and troubleshooting.
7 . VPN connectivity: IP addresses are used to connect to virtual private networks (VPNs),
allowing remote access to internal company networks.
Types of IP addresses:
Classful IP addressing:
Classful IP addressing is a method of dividing the available IP address space into five different
classes, known as A, B, C, D, and E. Each class has a fixed range of IP addresses that can be
assigned to a network or host.
Class A addresses start with the binary value of 0 and have the first 8 bits designated for the
network ID, leaving the remaining 24 bits for the host ID. This allows for a maximum of 126
networks and 16,777,214 hosts per network.
Class B addresses start with the binary value of 10 and have the first 16 bits designated for the
network ID, leaving the remaining 16 bits for the host ID. This allows for a maximum of 16,384
networks and 65,534 hosts per network.
Class C addresses start with the binary value of 110 and have the first 24 bits designated for the
network ID, leaving the remaining 8 bits for the host ID. This allows for a maximum of
2,097,152 networks and 254 hosts per network.
3. Unique identification: IP addresses provide a unique identifier for each device, ensuring
that data is correctly routed.
4. Scalability: The internet can accommodate billions of devices, thanks to the scalability of
IP addresses.
2. Security risks: As with any internet technology, IP addressing presents security risks,
including cybercrime and hacking.
3. Limited IP addresses: The increasing number of internet-connected devices has led to a
shortage of unique IPv4 addresses. This has led to the adoption of IPv6, which provides a
virtually unlimited number of unique IP addresses.
Subnetting
Introduction To Subnetting:
When a bigger network is divided into smaller networks, to maintain security, then that is known
as Subnetting. So, maintenance is easier for smaller networks. For example, if we consider
a class A address, the possible number of hosts is 224 for each network, it is obvious that it is
difficult to maintain such a huge number of hosts, but it would be quite easier to maintain if we
divide the network into small parts.
Uses of Subnetting:
1. Subnetting helps in organizing the network in an efficient way which helps in
expanding the technology for large firms and companies.
2. Subnetting is used for specific staffing structures to reduce traffic and maintain order
and efficiency.
3. Subnetting divides domains of the broadcast so that traffic is routed efficiently, which
helps in improving network performance.
The network can be divided into two parts: To divide a network into two parts, you
need to choose one bit for each Subnet from the host ID part.
Note: It is a class C IP so, there are 24 bits in the network id part and 8 bits in the host id part.
1. It provides security to one network from another network. eg) In an Organisation, the
code of the Developer department must not be accessed by another department.
2. It may be possible that a particular subnet might need higher network priority than
others. For example, a Sales department needs to host webcasts or video conferences.
Disadvantages of Subnetting
The disadvantages of Subnetting are mentioned below:
1. In the case of a single network, only three steps are required to reach a Process i.e
Source Host to Destination Network, Destination Network to Destination Host, and
then Destination Host to Process.
2. In the case of a Single Network only two IP addresses are wasted to represent Network
Id and Broadcast address but in the case of Subnetting two IP addresses are wasted for
each Subnet.
3. The cost of the overall Network also increases. Subnetting requires internal routers,
Switches, Hubs, Bridges, etc. which are very costly.
With CIDR, your organization can create and consolidate multiple subnets. This allows data to
reach the destination address without taking unnecessary paths.
CIDR blocks:
A CIDR block is a collection of IP addresses that share the same network prefix and number of
bits. A large block consists of more IP addresses and a small suffix.
The Internet Assigned Numbers Authority (IANA) assigns large CIDR blocks to regional
internet registries (RIR). Then, the RIR assigns smaller blocks to local internet registries (LIR),
which then assign them to organizations. Meanwhile, private users apply for CIDR blocks from
their internet service providers.
CIDR notation:
CIDR notation represents an IP address and a suffix that indicates network identifier bits in a
specified format. For example, you could express 192.168.1.0 with a 22-bit network identifier as
192.168.1.0/22.
CIDR block sizing
For Private Spaces, the size of this CIDR needs to be a number between 24 (256 IPs) and 16
(65,536 IPs)
Advantages:
1.Efficient use of IP addresses: CIDR allows for more efficient use of IP addresses,
which is important as the pool of available IPv4 addresses continues to shrink.
2.Flexibility: CIDR allows for more flexible allocation of IP addresses, which can be
important for organizations with complex network requirements.
3.Better routing: CIDR allows for more efficient routing of IP traffic, which can lead
to better network performance.
Reduced administrative overhead: CIDR reduces administrative overhead by allowing
for easier management of IP addresses and routing.
Disadvantages:
1. Complexity: CIDR can be more complex to implement and manage than traditional
class-based addressing, which can require additional training and expertise.
2.Compatibility issues: Some older network devices may not be compatible with
CIDR, which can make it difficult to transition to a CIDR-based network.
3.Security concerns: CIDR can make it more difficult to implement security measures
such as firewall rules and access control lists, which can increase security risks.