SlideShare une entreprise Scribd logo
1  sur  117
Télécharger pour lire hors ligne
Basics of
Networking
Network
• Interconnection of two or more devices is called as a network.
• The communication between two or more interconnected devices is called
networking.
• An internetwork is a connection of two or more networks.
• Internetworking means communication between different networks.
Types of Networks
• LAN
Local Area Networks are used to connect networking devices that are in a
very close geographic area such as a floor of a building, a building itself or
within a campus.
• MAN
Metropolitan Area Network are used to connect networking devices that
may span around the entire city.
• WAN
Wide Area Networks which connects two or more LANs present at different
geographical locations.
LAN
LANHUB
Banjara Hills
MAN
LANLAN
HUB SWITCH
MAN
Banjara Hills Ameerpet
WAN
LANLAN
HUB SWITCH
Hyderabad vijayawada
www.cms.com
WAN
Router Router
Basic requirements to form a network
• NIC (Network interface card) also called as LAN card
• Media
• Networking devices (Hub, Switch, Router, etc.)
• Protocols
• Logical Address (IP address)
NIC(Network Interface Card)
• NIC is the interface between the computer and the network
• It is also known as the Lan card or Ethernet card
• Ethernet cards have a unique 48 bit address called as MAC (Media access
control) address
– MAC address is also called as Physical address or hardware address
– The 48 bit MAC address is represented as 12 Hexa-decimal digits
– Example: 0 0 1 6 . D 3 F C . 6 0 3 F
• Network cards are available in different speeds
– Ethernet (10 Mbps)
– Fast Ethernet (100 Mbps)
– Gigabit Ethernet (1000 Mbps)
Media
• The purpose of the media is to transport bits from one machine to another.
Media
Guided Unguided
Co-axial Twisted pair Fiber
UTP STP
Infrared RF
Media
UTP Cable
Co-axial cable
Fiber optic
Networking devices
The various types of networking devices are:
• Repeater
• Hub
• Bridge
• Switch
• Router
Hub / Repeater
• It is not an Intelligent Device.
• It works with bits.
• Uses broadcast for communication.
• Bandwidth is shared.
• Half-duplex communication.
Functions of HUB
HUB
Data
DataDataDataData
Functions of HUB
HUB
Data
DataDataDataData
Data
Switch
• It is an Intelligent device.
• It maintains MAC address table (hardware address).
• Each port of the switch has fixed bandwidth.
• It works with Flooding and Unicast.
• Supports full duplex communication
Functions of a Switch
• MAC Address Learning
• Forwarding
Functions of Switch
1
2
3
4 5 6
7
8
Functions of Switch
MAC ADDRESS TABLE
PORT MAC-ADDRESS
1
2
3
4
5
6
7
8
001C-C01A-0002
001C-C01A-0004
001C-C01A-0002
1
2
3
4 5 6
7
8
S
D
DataDataDataDataDataData
Data
Source MAC
001C.C01A.0002
Destination MAC
001C.C01A.0004
DATA
Source MAC
001C.C01A.0002
Destination MAC
001C.C01A.0004
DATA
Functions of Switch
MAC ADDRESS TABLE
PORT MAC-ADDRESS
Fa0/1
Fa0/2 001C-C01A-0002
Fa0/3
Fa0/4
Fa0/5
Fa0/6
Fa0/7
Fa0/8
001C-C01A-0004
001C-C01A-0002
001C-C01A-0004
1
2
3
4 5 6
7
8
D
S Data
Difference between Bridge and Switch
Bridge
• Bridges are software based
• Bridges have less number
of ports
• Generally used for
connecting two different
topology (Segment)
Switch
• Switches are hardware
based
• Switches have more ports
• Generally used for
connecting single topology
(Segment)
Router
• It is an Intelligent device
• It works with Logical Addressing (i.e. IP, IPX, AppleTalk)
• It works with Fixed bandwidth
Interconnecting Network Devices
PC HUB Bridge Switch Router
PC Cross Cable Straight Cross Cable Straight Cross Cable
HUB Straight Cross Cable Straight Cross Straight
Bridge Cross Cable Straight Cross Cable Straight Cross Cable
Switch Straight Cross Straight Cross Cable Straight
Router Cross Cable Straight Cross Cable Straight Cross Cable
Topology
Topology is a physical layout of the systems connected in a network.
Different types of topology are:
• Bus
• Ring
• Mesh
• Star
Bus Topology
• In bus topology all devices are connected to a single cable or backbone.
• It supports half duplex communication.
• A break at any point along the backbone will result in total network failure.
Ring Topology
• In ring topology each computer or device is connected to its neighbor
forming a loop.
• Failure of a single device or a break anywhere in the cable causes the full
network to stop communicating
Mesh Topology
• In mesh topology each device is directly connected to all other devices
• The disadvantage is the number of NIC’s required on each device and the
complex cabling.
Star Topology
• The most commonly used topology
• It consist of one centralized device which can be either a switch or a hub.
• The devices connect to the various ports on the centralized devices.
HUB/Switch
Computer networking
IP Address
• IP Address is a Logical Address
• It is a Network Layer address (Layer 3)
• Two Versions of IP:
• IP version 4 is a 32 bit address
• IP version 6 is a 128 bit address
IP version 4
• Bit is represent by 0 or 1 (i.e. Binary)
• IP address in binary form (32 bits):
0 1 0 1 0 1 0 1 0 0 0 0 0 1 0 1 1 0 1 1 1 1 1 1 0 0 0 0 0 0 0 1
• 32 bits are divided into 4 Octets:
0 1 0 1 0 1 0 1 . 0 0 0 0 0 1 0 1 . 1 0 1 1 1 1 1 1 . 0 0 0 0 0 0 0 1
• IP address in decimal form:
85.5.191.1
First Octet Second Octet Third Octet Forth Octet
IPv4 address range
Taking Example for First Octet :
Total 8 bits, Value will be 0’s and 1’s
i.e. 2⁸ = 256 combination
27 26 25 24 23 22 21 20
0 0 0 0 0 0 0 0 = 0
0 0 0 0 0 0 0 1 = 1
0 0 0 0 0 0 1 0 = 2
0 0 0 0 0 0 1 1 = 3
0 0 0 0 0 1 0 0 = 4
1 1 1 1 1 1 1 1 = 255
Total IP Address Range
0 . 0 . 0 . 0
to
255.255.255.255
IP Address Classification
• IP Addresses are divided into 5 Classes
• CLASS A
• CLASS B
• CLASS C
• CLASS D
• CLASS E
Used in LAN & WAN
Reserved for Multicasting
Reserved for Research & Development
Priority Bit
• Priority Bit is used for IP Address classification.
• Most significant bit(s) from the first octet are selected for Priority Bit(s).
• Class A priority bit is 0
• Class B priority bits are 10
• Class C priority bits are 110
• Class D priority bits are 1110
• Class E priority bits are 1111
Class A Range
• In Class A : First bit of the first octet is reserved as priority bit, bit value is
zero.
• 0 x x x x x x x . x x x x x x x x . x x x x x x x x . x x x x x x x x
27 26 25 24 23 22 21 20
0 0 0 0 0 0 0 0 = 0
0 0 0 0 0 0 0 1 = 1
0 0 0 0 0 0 1 0 = 2
0 0 0 0 0 0 1 1 = 3
0 0 0 0 0 1 0 0 = 4
0 1 1 1 1 1 1 1 = 127
Class A Range
0 . 0 . 0 . 0 to
127.255.255.255
Exception
0.X.X.X and 127.X.X.X networks
are reserved
Class B Range
• In Class B : First two bits of the first octet are reserved as priority bits, bit
value as 10.
• 1 0 x x x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x
27 26 25 24 23 22 21 20
1 0 0 0 0 0 0 0 = 128
1 0 0 0 0 0 0 1 = 129
1 0 0 0 0 0 1 0 = 130
1 0 0 0 0 0 1 1 = 131
1 0 0 0 0 1 0 0 = 132
1 0 1 1 1 1 1 1 = 191
Class B Range
128 . 0 . 0 . 0 to
191 . 255 . 255 .255
Class C Range
• In Class C : First three bits of the first octet are reserved as priority bits, bit
value as 110.
• 1 1 0 x x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x
27 26 25 24 23 22 21 20
1 1 0 0 0 0 0 0 = 192
1 1 0 0 0 0 0 1 = 193
1 1 0 0 0 0 1 0 = 194
1 1 0 0 0 0 1 1 = 195
1 1 0 0 0 1 0 0 = 196
1 1 0 1 1 1 1 1 = 223
Class C Range
192 . 0 . 0 . 0 to
223 . 255 . 255 .255
Class D Range
• In Class D : First four bits of the first octet are reserved as priority bits, bit
value as 1110.
• 1 1 1 0 x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x
27 26 25 24 23 22 21 20
1 1 1 0 0 0 0 0 = 224
1 1 1 0 0 0 0 1 = 225
1 1 1 0 0 0 1 0 = 226
1 1 1 0 0 0 1 1 = 227
1 1 1 0 0 1 0 0 = 228
1 1 1 0 1 1 1 1 = 239
Class D Range
224 . 0 . 0 . 0 to
239 . 255 . 255 .255
Class E Range
• In Class E : First four bits of the first octet are reserved as priority bits, bit
value as 1111.
• 1 1 1 1 x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x
27 26 25 24 23 22 21 20
1 1 1 1 0 0 0 0 = 240
1 1 1 1 0 0 0 1 = 241
1 1 1 1 0 0 1 0 = 242
1 1 1 1 0 0 1 1 = 243
1 1 1 1 0 1 0 0 = 244
1 1 1 1 1 1 1 1 = 255
Class E Range
240 . 0 . 0 . 0 to
255 . 255 . 255 .255
Octet Format
• IP address is divided into Network & Host Portion
CLASS A is written as N . H . H . H
CLASS B is written as N . N . H . H
CLASS C is written as N . N . N . H
CLASS A – No. Networks & Hosts
• Class A Octet Format is N. H. H. H
Network bits : 8 Host bits : 24
• No. of Networks
= 2no of network bits– Priority bit
= 28-1 (-1 is Priority Bit for Class A)
= 27
= 128 – 2 (-2 is for 0 & 127 Network)
= 126 Networks
• No. of Host
= 2no of host bits -2
= 224 – 2 (-2 is for Network ID & Broadcast ID)
= 16777216 - 2
= 16777214 Hosts/Network
CLASS B – No. Networks & Hosts
• Class B Octet Format is N. N. H. H
Network bits : 16 Host bits : 16
• No. of Networks
= 2no of network bits– Priority bit
= 216-2 (-2 is Priority Bit for Class B)
= 214
= 16384 Networks
• No. of Host
= 2no of host bits -2
= 216 – 2 (-2 is for Network ID & Broadcast ID)
= 65536 - 2
= 65534 Hosts/Network
CLASS C – No. Networks & Hosts
• Class C Octet Format is N. N. N. H
Network bits : 24 Host bits : 8
• No. of Networks
= 2no of network bits– Priority bit
= 224-3 (-3 is Priority Bit for Class C)
= 221
= 2097152 Networks
• No. of Host
= 2no of host bits -2
= 28 – 2 (-2 is for Network ID & Broadcast ID)
= 256 - 2
= 254 Hosts/Network
Network & Broadcast Address
• Network address: IP address with all bits as ZERO in the host portion.
• Broadcast address: IP address with all bits as ONES in the host portion.
• Valid IP Addresses lie between the Network Address and the Broadcast
Address.
• Only Valid IP Addresses are assigned to hosts/clients
Example - Class A
• Class A : N.H.H.H
Network Address :
0xxxxxxx.00000000.00000000.00000000
Broadcast Address :
0xxxxxxx.11111111.11111111.11111111Class A
10.0.0.0
10.0.0.1
10.0.0.2
10.0.0.3
10.255.255.254
10.255.255.255
Network Address
Broadcast Address
Valid IP Addresses
Example - Class B
• Class B : N.N.H.H
Network Address :
10xxxxxx.xxxxxxxx.00000000.00000000
Broadcast Address :
10xxxxxx.xxxxxxxx.11111111.11111111Class B
172.16.0.0
172.16.0.1
172.16.0.2
172.16.0.3
172.16.255.254
172.16.255.255
Network Address
Broadcast Address
Valid IP Addresses
Example - Class C
• Class C : N.N.N.H
Network Address :
110xxxxx.xxxxxxxx.xxxxxxxx.00000000
Broadcast Address :
110xxxxx.xxxxxxxx.xxxxxxxx.11111111
Class C
192.168.1.0
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.254
192.168.1.255
Network Address
Broadcast Address
Valid IP Addresses
Private IP Address
• There are certain addresses in each class of IP address that are reserved for
Private Networks. These addresses are called private addresses.
• These addresses are not Routable (or) valid on Internet.
Class A
10.0.0.0 to 10.255.255.255
Class B
172.16.0.0 to 172.31.255.255
Class C
192.168.0.0 to 192.168.255.255
Subnet Mask
• Subnet Mask differentiates the Network and Host portions of an IP address
• Represented with all 1’s in the network portion and with all 0’s in the host
portion.
Subnet Mask - Examples
• Class A : N.H.H.H
11111111.00000000.00000000.00000000
Default Subnet Mask for Class A is 255.0.0.0
• Class B : N.N.H.H
11111111.11111111.00000000.00000000
Default Subnet Mask for Class B is 255.255.0.0
• Class C : N.N.N.H
11111111.11111111.11111111.00000000
Default Subnet Mask for Class C is 255.255.255.0
How Subnet Mask Works ?
IP Address : 192.168.1.1
Subnet Mask : 255.255.255.0
ANDING PROCESS :
192.168.1.1 = 11000000.10101000.00000001.00000001
255.255.255.0 = 11111111.11111111.11111111.00000000
==================================================
192.168.1.0 = 11000000.10101000.00000001.00000000
==================================================
The output of an AND table is 1 if both its inputs are 1.
For all other possible inputs the output is 0.
Computer networking
Subnetting
• Creating Multiple independent Networks from a Single Network.
• Converting Host bits into Network Bits
i.e. Converting 0’s into 1’s
• Subnetting can be performed in two ways.
– FLSM (Fixed Length Subnet Mask)
– VLSM (Variable Length subnet mask)
• Subnetting can be done based on requirement .
– Number of Networks required?
– Number of Hosts required?
Scenario for subnetting
• CMS Technologies is having 100 PCs
• Which IP address Class is preferred for the network ?
Answer : Class C.
• In CMS Technologies there are 2 Departments with 50 PCs each
CMS Technologies – 192.168.1.0/24
– MCSE 192.168.1.1 to 192.168.1.50
192.168.1.51 to 192.168.1.100– CISCO
Scenario for subnetting
LAN
HUB
Scenario for subnetting
LAN
192.168.1.20
192.168.1.30
192.168.1.40
192.168.1.50
192.168.1.60
192.168.1.70
192.168.1.80
192.168.1.90
HUB
192.168.1.10
192.168.1.100
Scenario (…continued)
• Administrator’s Requirement :
Inter-department communication should not be possible ?
Solution.
Allocate a different Network to each Department
i.e.
– MCSE 192.168.1.1 to 192.168.1.50
192.168.2.1 to 192.168.2.50– CISCO
Scenario for subnetting
LAN
HUB
Scenario for subnetting
LAN
192.168.1.2
192.168.1.3
192.168.1.4
192.168.1.50
192.168.2.1
192.168.2.2
192.168.2.3
192.168.2.4
HUB
192.168.1.1
192.168.2.50
Main Aim of Subnetting
• Problem with the previous Scenario is :-
• Wastage of IP addresses if it is public(Approximately 400)
Power table
POWER TABLE
21 = 2
22 = 4
23 = 8
24 = 16
25 = 32
26 = 64
27 = 128
28 = 256
29 = 512
210 = 1024
211 = 2048
212 = 4096
213 = 8192
214 = 16384
215 = 32768
216 = 65536
217 = 131072
218 = 262144
219 = 524288
220 = 1048576
221 = 2097152
222 = 4194304
223 = 8388608
224 = 16777216
225 = 33554432
226 = 67108864
227 = 134217728
228 = 268435456
229 = 536870912
230 = 1073741824
231 = 2147483648
232 = 4294967296
Some Important Values
VALUES IN SUBNET MASK
Bit Value Mask
1 128 10000000
2 192 11000000
3 224 11100000
4 240 11110000
5 248 11111000
6 252 11111100
7 254 11111110
8 255 11111111
Requirement of Networks is 2 ?
Example – 1
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
No. of Subnet
= 2n – 2 ≥ Req. of Subnet
= 22 – 2 ≥ 2 (-2 is for First & Last Subnet Range)
= 4 – 2
= 2 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 26 – 2
= 64 – 2
= 62 Hosts/Subnet
Example – 1 (Continued…)
• Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11000000
192
Range of Networks
Network ID Broadcast ID
192.168.1.0
192.168.1.64
192.168.1.128
192.168.1.192
192.168.1.63
192.168.1.127
192.168.1.191
192.168.1.255
Valid Subnets
192.168.1.0 192.168.1.63
192.168.1.192 192.168.1.255
If you convert 2 Host Bits to Network Bits
2 Subnet & 62 Hosts/Subnet
Customized Subnet Mask
255.255.255.192
Subnet Range
192.168.1.64 to 192.168.1.127  MCSE
192.168.1.128 to 192.168.1.191  CISCO
Computer networking
Requirement of subnet is 14?
Example -2
CLASS C: N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
No. of Subnet
= 2n – 2 ≥ Req. of Subnet
= 24 – 2 ≥ 14(-2 is for First & Last Subnet Range)
= 16– 2
= 14 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 24 – 2
= 16 – 2
= 14 Hosts/Subnet
EXAMPLE – 2 (Continued…)
Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11110000
240
Range of Networks
Network ID Broadcast ID
192.168.1.0
192.168.1.16
192.168.1.32
192.168.1.48
192.168.1.224
192.168.1.240
192.168.1.15
192.168.1.31
192.168.1.47
192.168.1.63
192.168.1.239
192.168.1.255
Valid Subnets
192.168.1.0 192.168.1.15
192.168.1.240 192.168.1.255
If you convert 4 Host Bits to Network Bits
14 Subnet & 14 Hosts/Subnet
Customized Subnet Mask
255.255.255.240
Subnet Range
192.168.1.16 to 192.168.1.31
192.168.1.32 to 192.168.1.47
192.168.1.48 to 192.168.1.63
192.168.1.64 to 192.168.1.79
192.168.1.240 to 192.168.1.255
Requirement of Hosts is 40 ?
Example – 3
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
No. of Host
= 2h – 2 ≥ Req. of Host
= 26 – 2 ≥ 40 (-2 is for Network ID & Broadcast ID)
= 64 – 2
= 62 Hosts/Subnet
No. of Subnet
= 2n – 2 (-2 is for First & Last Subnet Range)
= 22 – 2
= 4 – 2
= 2 Subnet
Example – 3 (Continued…)
Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11000000
192
Range of Networks
Network ID Broadcast ID
192.168.1.0
192.168.1.64
192.168.1.128
192.168.1.192
192.168.1.63
192.168.1.127
192.168.1.191
192.168.1.255
Valid Subnets
192.168.1.0 192.168.1.63
192.168.1.192 192.168.1.255
If you convert 2 Host Bits to Network Bits
2 Subnet & 62 Hosts/Subnet
Customized Subnet Mask
255.255.255.192
Subnet Range
192.168.1.64 to 192.168.1.127
192.168.1.128 to 192.168.1.191
Requirement of Hosts is 2 ?
Example – 2
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
No. of Host
= 2h – 2 ≥ Req. of Host
= 22 – 2 ≥ 2 (-2 is for Network ID & Broadcast ID)
= 4 – 2
= 2 Hosts/Subnet
No. of Subnet
= 2n – 2 (-2 is for First & Last Subnet Range)
= 26 – 2
= 64 – 2
= 62 Subnet
Example – 2 (Continued…)
• Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11111100
252
Range of Networks
Network ID Broadcast ID
192.168.1.0
192.168.1.4
192.168.1.8
192.168.1.12
192.168.1.248
192.168.1.252
192.168.1.3
192.168.1.7
192.168.1.11
192.168.1.15
192.168.1.251
192.168.1.255
Valid Subnets
192.168.1.0 192.168.1.3
192.168.1.252 192.168.1.255
Requirement of Networks is 2 ?
Example – 4
Class B : N.N.H.H
10xxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class B : 172.16.0.0
No. of Subnet
= 2n – 2 ≥ Req. of Subnet
= 22 – 2 ≥ 2 (-2 is for First & Last Subnet Range)
= 4 – 2
= 2 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 214 – 2
= 16384 – 2
= 16382 Hosts/Subnet
Example – 4 (Continued…)
• Customized Subnet Mask =
255.
11111111.
255.
11111111.
0
11000000. 00000000
192.
Range of Networks
Network ID Broadcast ID
172.16.0.0
172.16.64.0
172.16.128.0
172.16.192.0
172.16.63.255
172.16.127.255
172.16.191.255
172.16.255.255
Valid Subnets
172.16.0.0 172.16.63.255
172.16.192.0 172.16.255.255
Requirement of Hosts is 126 ?
Example – 5
Class B : N.N.H.H
10xxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class B : 172.16.0.0
No. of Host
= 2h – 2 ≥ Req. of Host
= 27 – 2 ≥ 126 (-2 is for Network ID & Broadcast ID)
= 128 – 2
= 126 Hosts/Subnet
No. of Subnet
= 2n – 2 (-2 is for First & Last Subnet Range)
= 29 – 2
= 512 – 2
= 510 Subnet
Example – 2 (Continued…)
• Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 10000000
128
Range of Networks
Network ID Broadcast ID
172.16.0.0
172.16.0.128
172.16.1.0
172.16.1.128
172.16.255.0
172.16.255.128
172.16.0.127
172.16.0.255
172.16.1.127
172.16.1.255
172.16.255.127
172.16.255.255
Valid Subnets
172.16.0.0 172.16.0.127
172.16.255.128 172.16.255.255
VLSM
• Subnetting a subnet is called as Variable Length Subnet Mask
• VLSMs provide the capability to include more than one subnet mask within
a major network
Scenario
• ZOOM Technologies is having 100 PC
ZOOM Technologies – 192.168.1.0/24
– MCSE
– CISCO
– FIREWALL
– SOLARIS
– TRAINING
Administrator’s requirement : Inter-department communication should not
be possible ?
Best Solution is :
FLSM i.e. Subnetting
Scenario (…continued)
• Now we are also having sub departments ZOOM Technologies
– MCSE
– CISCO
– CCNA
– CCNP
– FIREWALL
– ISA
– Checkpoint
– NetASQ
– Clavister
– Cisco PIX
– SOLARIS
– Linux
– Unix
– Solaris
– TRAINING
Scenario (…continued)
Administrator does not want inter-department communication in the sub
departments ?
Answer : You will use the subnet range to further divide it into smaller ranges,
this time its Subnetting of a Subnet i.e. VLSM.
Calculation of FLSM
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
No. of Subnet
= 2n – 2 ≥ Req. of Subnet
= 23 – 2 ≥ 5 (-2 is for First & Last Subnet Range)
= 8 – 2
= 6 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 25 – 2
= 32 – 2
= 30 Hosts/Subnet
Example – 1 (Continued…)
• Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11100000
224
Range of Networks
Network ID Broadcast ID
192.168.1.0
192.168.1.32
192.168.1.64
192.168.1.96
192.168.1.128
192.168.1.160
192.168.1.192
192.168.1.224
192.168.1.31
192.168.1.63
192.168.1.95
192.168.1.127
192.168.1.159
192.168.1.191
192.168.1.223
192.168.1.255
Valid Subnets
192.168.1.0 192.168.1.31
192.168.1.224 192.168.1.255
Assigning of the Ranges
ZOOM Technologies
– MCSE
– CISCO
– CCNA
– CCNP
– FIREWALL
– ISA
– Checkpoint
– NetASQ
– Clavister
– Cisco PIX
– SOLARIS
– Linux
– Unix
– Solaris
– TRAINING
192.168.1.32 – 1.63/27
192.168.1.64 – 1.95/27
192.168.1.96 – 1.127/27
192.168.1.128 – 1.159/27
192.168.1.160 – 1.191/27
Calculation of VLSM for CISCO Dept.
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.64
No. of Subnet
= 2n ≥ Req. of Subnet
= 21 ≥ 2
= 2
= 2 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 24 – 2
= 16 – 2
= 14 Hosts/Subnet
VLSM (Continued…)
Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11110000
240
Range of Networks
Network ID Broadcast ID
192.168.1.64
192.168.1.80
192.168.1.79
192.168.1.95
Valid Subnets
Assigning of the Ranges
192.168.1.64 – 1.79/28
192.168.1.80 – 1.95/28
ZOOM Technologies
– MCSE
– CISCO
– CCNA
– CCNP
– FIREWALL
– ISA
– Checkpoint
– NetASQ
– Clavister
– Cisco PIX
– SOLARIS
– Linux
– Unix
– Solaris
– TRAINING
192.168.1.32 – 1.63/27
192.168.1.64 – 1.95/27
192.168.1.96 – 1.127/27
192.168.1.128 – 1.159/27
192.168.1.160 – 1.191/27
Calculation of VLSM for Firewall Dept.
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.96
No. of Subnet
= 2n ≥ Req. of Subnet
= 23 ≥ 5
= 8
= 8 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 22 – 2
= 4 – 2
= 2 Hosts/Subnet
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
VLSM (Continued…)
Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11111100
252
Range of Networks
Network ID Broadcast ID
192.168.1.96
192.168.1.100
192.168.1.104
192.168.1.108
192.168.1.112
192.168.1.116
192.168.1.120
192.168.1.124
192.168.1.99
192.168.1.103
192.168.1.107
192.168.1.111
192.168.1.115
192.168.1.119
192.168.1.123
192.168.1.127
Valid Subnets
Assigning of the Ranges
192.168.1.96 – 1.99/30
192.168.1.100 – 1.103/30
192.168.1.104 – 1.107/30
192.168.1.108 – 1.111/30
192.168.1.112 – 1.115/30
ZOOM Technologies
– MCSE
– CISCO
– CCNA
– CCNP
– FIREWALL
– ISA
– Checkpoint
– NetASQ
– Clavister
– Cisco PIX
– SOLARIS
– Linux
– Unix
– Solaris
– TRAINING
192.168.1.32 – 1.63/27
192.168.1.64 – 1.95/27
192.168.1.96 – 1.127/27
192.168.1.128 – 1.159/27
192.168.1.160 – 1.191/27
192.168.1.64 – 1.79/28
192.168.1.80 – 1.95/28
Calculation of VLSM for Solaris Dept.
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.128
No. of Subnet
= 2n ≥ Req. of Subnet
= 22 ≥ 3
= 4
= 4 Subnet
No. of Host
= 2h – 2 (-2 is for Network ID & Broadcast ID)
= 23 – 2
= 8 – 2
= 6 Hosts/Subnet
VLSM (Continued…)
• Customized Subnet Mask =
255.
11111111.
255.
11111111.
255.
11111111. 11111000
248
Range of Networks
Network ID Broadcast ID
192.168.1.128
192.168.1.136
192.168.1.144
192.168.1.152
192.168.1.135
192.168.1.143
192.168.1.151
192.168.1.159
Valid Subnets
Assigning of the Ranges
192.168.1.128 – 1.135/29
192.168.1.136 – 1.143/29
192.168.1.144 – 1.151/29
ZOOM Technologies
– MCSE
– CISCO
– CCNA
– CCNP
– FIREWALL
– ISA
– Checkpoint
– NetASQ
– Clavister
– Cisco PIX
– SOLARIS
– Linux
– Unix
– Solaris
– TRAINING
192.168.1.32 – 1.63/27
192.168.1.64 – 1.95/27
192.168.1.96 – 1.127/27
192.168.1.128 – 1.159/27
192.168.1.160 – 1.191/27
192.168.1.96 – 1.99/30
192.168.1.100 – 1.103/30
192.168.1.104 – 1.107/30
192.168.1.108 – 1.111/30
192.168.1.112 – 1.115/30
192.168.1.64 – 1.79/28
192.168.1.80 – 1.95/28
Computer networking
OSI
• OSI was developed by the International Organization for Standardization
(ISO) and introduced in 1984.
• It is a layered architecture (consists of seven layers).
• Each layer defines a set of functions which takes part in data
communication.
OSI Model Layers
Application
Presentation
Session
Transport
Network
Data Link
Physical
Layer - 7
Layer - 6
Layer - 5
Layer - 4
Layer - 3
Layer - 2
Layer - 1
User support Layers
or
Software Layers
Network support Layers
or
Hardware Layers
Core layer of the
OSI
Application Layer
• Application Layer is responsible for providing
an interface for the users to interact with
application services or Networking Services .
• Ex: Web browser, Telnet etc.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Examples of Networking Services
Service Port No.
HTTP 80
FTP 21
SMTP 25
TELNET 23
TFTP 69
Data flow from Application Layer
Application
2180 25 6753 69
Session
Transport
Network
Data Link
Physical
Presentation
Data
Presentation Layer
Presentation Layer It is responsible for
defining a standard format to the data.
It deals with data presentation.
The major functions described at this layer are..
Encoding – Decoding
Eg: ASCII, EBCDIC (Text)
JPEG,GIF,TIFF (Graphics)
MIDI,WAV (Voice)
MPEG,DAT,AVI (Video)
Encryption – Decryption
Compression – Decompression
Application
Presentation
Session
Transport
Network
Data Link
Physical
Presentation
Data flow from Presentation Layer
Physical
Application
Session
Transport
Network
Data Link
Presentation
Data
Data
Session Layer
Session Layer
It is responsible for establishing, maintaining
and terminating the sessions.
Session ID is used to identify a session or
interaction.
Examples :
RPC Remote Procedural Call
SQL Structured Query Language
ASP AppleTalk Session protocol
Application
Presentation
Session
Transport
Network
Data Link
Physical
Session
Data flow from Session Layer
Physical
Application
Session
Transport
Network
Data Link
Presentation
Data
Data
Data
Transport Layer
Transport Layer
It provides data delivery mechanism between
the applications in the network.
The major functions described at the Transport
Layer are..
•Identifying Service
•Multiplexing & De-multiplexing
•Segmentation
•Sequencing & Reassembling
•Error Correction
•Flow Control
Application
Presentation
Session
Transport
Network
Data Link
Physical
Transport
Identifying a Service
• Identification of Services is done using port Numbers.
• Port is a logical communication Channel
Total No. Ports 0 – 65535
Reserved Ports 1 - 1023
Open Ports 1024 – 65535
Multiplexing & De-multiplexing
TCP - 6 UDP - 17
2180 25 6753 69
Transport
Network
Data Link
Physical
Session
Presentation
Application
Transport Layer Protocols
• The protocols which takes care of Data Transportation at Transport layer
are…TCP,UDP
TCP
• Transmission Control
Protocol
• Connection Oriented
• Supports Ack’s
• Reliable communication
• Slower data Transportation
• Protocol No is 6
• Eg: HTTP, FTP, SMTP
UDP
• User Datagram Protocol
• Connection Less
• No support for Ack’s
• Unreliable communication
• Faster data Transportation
• Protocol No is 17
• Eg: DNS, DHCP, TFTP
Segmentation
HELLO!
HOW
ARE YOU?
HELLO! HOW ARE YOU ?
Data
Sequencing
HELLO!
HOW
ARE YOU?
HELLO! HOW ARE YOU ?
Data
Sequencing
HELLO!HOW ARE YOU?
Sequencing
HELLO!
1/5
HOW
2/5
ARE
3/5
YOU
4/5
?
5/5
Data
Sequencing
HELLO!
1/5
HOW
2/5
ARE
3/5
YOU
4/5
?
5/5
HELLO!
1/5
HOW
2/5
ARE
3/5
YOU
4/5
?
5/5
Data flow from Transport Layer
Physical
Application
Presentation
Session
Transport
Network
Data Link
Data
Data
Data
DataTHSegment
Network Layer
Network Layer
It provides Logical addressing & Path
determination (Routing)
The protocols that work in this layer are:
Routed Protocols:
IP, IPX, AppleTalk.. Etc
Routed protocols used to carry user data
between hosts.
Routing Protocols:
RIP, OSPF.. Etc
Routing protocols performs Path determination
(Routing).
Application
Presentation
Session
Transport
Network
Data Link
Physical
Network
Data flow from Network Layer
Application
Presentation
Session
Transport
Network
Data Link
Physical
Data
Data
Data
DataTHSegment
SegmentNH Packet
Device that works at
Network Layer
is Router
Datalink Layer
Datalink Layer
It has 2 sub layers
• MAC (Media Access Control) It provides
reliable transit of data across a physical link.
It also provides ERROR DETECTION using CRC
(Cyclic Redundancy Check)
Ex: Ethernet, Token ring…etc
• LLC (Logical Link Control)
It provides communication with Network layer.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Data Link
Data flow from Data link Layer
Application
Presentation
Session
Transport
Network
Data Link
Physical
Data
Data
Data
DataTHSegment
SegmentNH Packet
DT Packet DHFrame
Devices that work at
Data link layer are
Switch, Bridge etc..
Physical Layer
Physical Layer
It defines the electrical, Mechanical & functional
specifications for communication between the
Network devices.
The functions described at this layer are..
Encoding/decoding:
It is the process of converting the binary data into
signals based on the type of the media.
Copper media : Electrical signals of different voltages
Fiber media: Light pulses of different wavelengths
Wireless media: Radio frequency waves
Application
Presentation
Session
Transport
Network
Data Link
PhysicalPhysical
Data flow from Physical Layer
Application
Presentation
Session
Transport
Network
Data Link
Physical
Data
Data
Data
DataTHSegment
SegmentNH Packet
DT Packet DHFrame
Bits
Devices that work at
physical layer are ..
Hub, Repeater.. Etc
Comparison between OSI & TCP/IP Model
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Host to Host
Internet
Network Access

Contenu connexe

Tendances (20)

basic networking
basic networkingbasic networking
basic networking
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Subnetting
SubnettingSubnetting
Subnetting
 
What is soho network
What is soho networkWhat is soho network
What is soho network
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 

En vedette

101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For EntrepreneursFit Small Business
 
Website Audit Checklist
Website Audit ChecklistWebsite Audit Checklist
Website Audit ChecklistTim Bourgeois
 
Web site int audit checklist intent
Web site int audit checklist intentWeb site int audit checklist intent
Web site int audit checklist intentmartinbusiness
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesKimberley Mitchell
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanResilient Systems
 
Summer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdSummer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdPuneet Parihar
 
Program management audit checklist
Program management audit checklistProgram management audit checklist
Program management audit checklistBob Prieto
 
security-checklist-database
security-checklist-databasesecurity-checklist-database
security-checklist-databaseMohsen B
 
Technical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionTechnical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionMichael King
 
Ch12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesCh12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesAnkit Kesri
 
Iso 9001 2015 audit checklist
Iso 9001 2015 audit checklistIso 9001 2015 audit checklist
Iso 9001 2015 audit checklistHamid Ali
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banksspandane
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Yaryalitsa
 
Iso Process Audit Training
Iso Process Audit TrainingIso Process Audit Training
Iso Process Audit Trainingsrmortensen
 
Integrated treasury management in banks
Integrated treasury management in banksIntegrated treasury management in banks
Integrated treasury management in banksSahas Patil
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
Entrepreneurship And Business Management
Entrepreneurship And Business ManagementEntrepreneurship And Business Management
Entrepreneurship And Business ManagementProf Parameshwar P Iyer
 

En vedette (20)

101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs
 
Capex audit checklist
Capex audit checklistCapex audit checklist
Capex audit checklist
 
Website Audit Checklist
Website Audit ChecklistWebsite Audit Checklist
Website Audit Checklist
 
Web site int audit checklist intent
Web site int audit checklist intentWeb site int audit checklist intent
Web site int audit checklist intent
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Summer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdSummer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools Ltd
 
Program management audit checklist
Program management audit checklistProgram management audit checklist
Program management audit checklist
 
security-checklist-database
security-checklist-databasesecurity-checklist-database
security-checklist-database
 
Technical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionTechnical Marketing is the Price of Admission
Technical Marketing is the Price of Admission
 
Ch12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesCh12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jones
 
Iso 9001 2015 audit checklist
Iso 9001 2015 audit checklistIso 9001 2015 audit checklist
Iso 9001 2015 audit checklist
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banks
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2
 
Iso Process Audit Training
Iso Process Audit TrainingIso Process Audit Training
Iso Process Audit Training
 
Integrated treasury management in banks
Integrated treasury management in banksIntegrated treasury management in banks
Integrated treasury management in banks
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Entrepreneurship And Business Management
Entrepreneurship And Business ManagementEntrepreneurship And Business Management
Entrepreneurship And Business Management
 

Similaire à Computer networking

Similaire à Computer networking (20)

IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ipaddressing
IpaddressingIpaddressing
Ipaddressing
 
CCNA part 2 ip addressing
CCNA part 2 ip addressingCCNA part 2 ip addressing
CCNA part 2 ip addressing
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
 
Chap3. i pv4
Chap3. i pv4Chap3. i pv4
Chap3. i pv4
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptx
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
6-LEC- 6.pptx Network Layer. Addressing Subnetting Mask (default and subnet) ...
6-LEC- 6.pptx Network Layer. Addressing Subnetting Mask (default and subnet) ...6-LEC- 6.pptx Network Layer. Addressing Subnetting Mask (default and subnet) ...
6-LEC- 6.pptx Network Layer. Addressing Subnetting Mask (default and subnet) ...
 
IP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptIP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.ppt
 
module03-ipaddr.ppt
module03-ipaddr.pptmodule03-ipaddr.ppt
module03-ipaddr.ppt
 
ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT
ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENTACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT
ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS Administrators
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Plus de Chinmoy Jena

Domain naming system
Domain naming systemDomain naming system
Domain naming systemChinmoy Jena
 
Active directory domain and trust
Active directory domain and trustActive directory domain and trust
Active directory domain and trustChinmoy Jena
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
home appliance control using gsm
home appliance control using gsmhome appliance control using gsm
home appliance control using gsmChinmoy Jena
 

Plus de Chinmoy Jena (8)

Failover cluster
Failover clusterFailover cluster
Failover cluster
 
Dhcp
DhcpDhcp
Dhcp
 
Domain naming system
Domain naming systemDomain naming system
Domain naming system
 
Active directory domain and trust
Active directory domain and trustActive directory domain and trust
Active directory domain and trust
 
Fsmo roles
Fsmo rolesFsmo roles
Fsmo roles
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
home appliance control using gsm
home appliance control using gsmhome appliance control using gsm
home appliance control using gsm
 

Dernier

My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxNeo4j
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 

Dernier (20)

My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 

Computer networking

  • 2. Network • Interconnection of two or more devices is called as a network. • The communication between two or more interconnected devices is called networking. • An internetwork is a connection of two or more networks. • Internetworking means communication between different networks.
  • 3. Types of Networks • LAN Local Area Networks are used to connect networking devices that are in a very close geographic area such as a floor of a building, a building itself or within a campus. • MAN Metropolitan Area Network are used to connect networking devices that may span around the entire city. • WAN Wide Area Networks which connects two or more LANs present at different geographical locations.
  • 7. Basic requirements to form a network • NIC (Network interface card) also called as LAN card • Media • Networking devices (Hub, Switch, Router, etc.) • Protocols • Logical Address (IP address)
  • 8. NIC(Network Interface Card) • NIC is the interface between the computer and the network • It is also known as the Lan card or Ethernet card • Ethernet cards have a unique 48 bit address called as MAC (Media access control) address – MAC address is also called as Physical address or hardware address – The 48 bit MAC address is represented as 12 Hexa-decimal digits – Example: 0 0 1 6 . D 3 F C . 6 0 3 F • Network cards are available in different speeds – Ethernet (10 Mbps) – Fast Ethernet (100 Mbps) – Gigabit Ethernet (1000 Mbps)
  • 9. Media • The purpose of the media is to transport bits from one machine to another. Media Guided Unguided Co-axial Twisted pair Fiber UTP STP Infrared RF
  • 11. Networking devices The various types of networking devices are: • Repeater • Hub • Bridge • Switch • Router
  • 12. Hub / Repeater • It is not an Intelligent Device. • It works with bits. • Uses broadcast for communication. • Bandwidth is shared. • Half-duplex communication.
  • 15. Switch • It is an Intelligent device. • It maintains MAC address table (hardware address). • Each port of the switch has fixed bandwidth. • It works with Flooding and Unicast. • Supports full duplex communication
  • 16. Functions of a Switch • MAC Address Learning • Forwarding
  • 18. Functions of Switch MAC ADDRESS TABLE PORT MAC-ADDRESS 1 2 3 4 5 6 7 8 001C-C01A-0002 001C-C01A-0004 001C-C01A-0002 1 2 3 4 5 6 7 8 S D DataDataDataDataDataData Data Source MAC 001C.C01A.0002 Destination MAC 001C.C01A.0004 DATA Source MAC 001C.C01A.0002 Destination MAC 001C.C01A.0004 DATA
  • 19. Functions of Switch MAC ADDRESS TABLE PORT MAC-ADDRESS Fa0/1 Fa0/2 001C-C01A-0002 Fa0/3 Fa0/4 Fa0/5 Fa0/6 Fa0/7 Fa0/8 001C-C01A-0004 001C-C01A-0002 001C-C01A-0004 1 2 3 4 5 6 7 8 D S Data
  • 20. Difference between Bridge and Switch Bridge • Bridges are software based • Bridges have less number of ports • Generally used for connecting two different topology (Segment) Switch • Switches are hardware based • Switches have more ports • Generally used for connecting single topology (Segment)
  • 21. Router • It is an Intelligent device • It works with Logical Addressing (i.e. IP, IPX, AppleTalk) • It works with Fixed bandwidth
  • 22. Interconnecting Network Devices PC HUB Bridge Switch Router PC Cross Cable Straight Cross Cable Straight Cross Cable HUB Straight Cross Cable Straight Cross Straight Bridge Cross Cable Straight Cross Cable Straight Cross Cable Switch Straight Cross Straight Cross Cable Straight Router Cross Cable Straight Cross Cable Straight Cross Cable
  • 23. Topology Topology is a physical layout of the systems connected in a network. Different types of topology are: • Bus • Ring • Mesh • Star
  • 24. Bus Topology • In bus topology all devices are connected to a single cable or backbone. • It supports half duplex communication. • A break at any point along the backbone will result in total network failure.
  • 25. Ring Topology • In ring topology each computer or device is connected to its neighbor forming a loop. • Failure of a single device or a break anywhere in the cable causes the full network to stop communicating
  • 26. Mesh Topology • In mesh topology each device is directly connected to all other devices • The disadvantage is the number of NIC’s required on each device and the complex cabling.
  • 27. Star Topology • The most commonly used topology • It consist of one centralized device which can be either a switch or a hub. • The devices connect to the various ports on the centralized devices. HUB/Switch
  • 29. IP Address • IP Address is a Logical Address • It is a Network Layer address (Layer 3) • Two Versions of IP: • IP version 4 is a 32 bit address • IP version 6 is a 128 bit address
  • 30. IP version 4 • Bit is represent by 0 or 1 (i.e. Binary) • IP address in binary form (32 bits): 0 1 0 1 0 1 0 1 0 0 0 0 0 1 0 1 1 0 1 1 1 1 1 1 0 0 0 0 0 0 0 1 • 32 bits are divided into 4 Octets: 0 1 0 1 0 1 0 1 . 0 0 0 0 0 1 0 1 . 1 0 1 1 1 1 1 1 . 0 0 0 0 0 0 0 1 • IP address in decimal form: 85.5.191.1 First Octet Second Octet Third Octet Forth Octet
  • 31. IPv4 address range Taking Example for First Octet : Total 8 bits, Value will be 0’s and 1’s i.e. 2⁸ = 256 combination 27 26 25 24 23 22 21 20 0 0 0 0 0 0 0 0 = 0 0 0 0 0 0 0 0 1 = 1 0 0 0 0 0 0 1 0 = 2 0 0 0 0 0 0 1 1 = 3 0 0 0 0 0 1 0 0 = 4 1 1 1 1 1 1 1 1 = 255 Total IP Address Range 0 . 0 . 0 . 0 to 255.255.255.255
  • 32. IP Address Classification • IP Addresses are divided into 5 Classes • CLASS A • CLASS B • CLASS C • CLASS D • CLASS E Used in LAN & WAN Reserved for Multicasting Reserved for Research & Development
  • 33. Priority Bit • Priority Bit is used for IP Address classification. • Most significant bit(s) from the first octet are selected for Priority Bit(s). • Class A priority bit is 0 • Class B priority bits are 10 • Class C priority bits are 110 • Class D priority bits are 1110 • Class E priority bits are 1111
  • 34. Class A Range • In Class A : First bit of the first octet is reserved as priority bit, bit value is zero. • 0 x x x x x x x . x x x x x x x x . x x x x x x x x . x x x x x x x x 27 26 25 24 23 22 21 20 0 0 0 0 0 0 0 0 = 0 0 0 0 0 0 0 0 1 = 1 0 0 0 0 0 0 1 0 = 2 0 0 0 0 0 0 1 1 = 3 0 0 0 0 0 1 0 0 = 4 0 1 1 1 1 1 1 1 = 127 Class A Range 0 . 0 . 0 . 0 to 127.255.255.255 Exception 0.X.X.X and 127.X.X.X networks are reserved
  • 35. Class B Range • In Class B : First two bits of the first octet are reserved as priority bits, bit value as 10. • 1 0 x x x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x 27 26 25 24 23 22 21 20 1 0 0 0 0 0 0 0 = 128 1 0 0 0 0 0 0 1 = 129 1 0 0 0 0 0 1 0 = 130 1 0 0 0 0 0 1 1 = 131 1 0 0 0 0 1 0 0 = 132 1 0 1 1 1 1 1 1 = 191 Class B Range 128 . 0 . 0 . 0 to 191 . 255 . 255 .255
  • 36. Class C Range • In Class C : First three bits of the first octet are reserved as priority bits, bit value as 110. • 1 1 0 x x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x 27 26 25 24 23 22 21 20 1 1 0 0 0 0 0 0 = 192 1 1 0 0 0 0 0 1 = 193 1 1 0 0 0 0 1 0 = 194 1 1 0 0 0 0 1 1 = 195 1 1 0 0 0 1 0 0 = 196 1 1 0 1 1 1 1 1 = 223 Class C Range 192 . 0 . 0 . 0 to 223 . 255 . 255 .255
  • 37. Class D Range • In Class D : First four bits of the first octet are reserved as priority bits, bit value as 1110. • 1 1 1 0 x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x 27 26 25 24 23 22 21 20 1 1 1 0 0 0 0 0 = 224 1 1 1 0 0 0 0 1 = 225 1 1 1 0 0 0 1 0 = 226 1 1 1 0 0 0 1 1 = 227 1 1 1 0 0 1 0 0 = 228 1 1 1 0 1 1 1 1 = 239 Class D Range 224 . 0 . 0 . 0 to 239 . 255 . 255 .255
  • 38. Class E Range • In Class E : First four bits of the first octet are reserved as priority bits, bit value as 1111. • 1 1 1 1 x x x x . x x x x x x x x . x x x x x x x x . Xx x x x x x x 27 26 25 24 23 22 21 20 1 1 1 1 0 0 0 0 = 240 1 1 1 1 0 0 0 1 = 241 1 1 1 1 0 0 1 0 = 242 1 1 1 1 0 0 1 1 = 243 1 1 1 1 0 1 0 0 = 244 1 1 1 1 1 1 1 1 = 255 Class E Range 240 . 0 . 0 . 0 to 255 . 255 . 255 .255
  • 39. Octet Format • IP address is divided into Network & Host Portion CLASS A is written as N . H . H . H CLASS B is written as N . N . H . H CLASS C is written as N . N . N . H
  • 40. CLASS A – No. Networks & Hosts • Class A Octet Format is N. H. H. H Network bits : 8 Host bits : 24 • No. of Networks = 2no of network bits– Priority bit = 28-1 (-1 is Priority Bit for Class A) = 27 = 128 – 2 (-2 is for 0 & 127 Network) = 126 Networks • No. of Host = 2no of host bits -2 = 224 – 2 (-2 is for Network ID & Broadcast ID) = 16777216 - 2 = 16777214 Hosts/Network
  • 41. CLASS B – No. Networks & Hosts • Class B Octet Format is N. N. H. H Network bits : 16 Host bits : 16 • No. of Networks = 2no of network bits– Priority bit = 216-2 (-2 is Priority Bit for Class B) = 214 = 16384 Networks • No. of Host = 2no of host bits -2 = 216 – 2 (-2 is for Network ID & Broadcast ID) = 65536 - 2 = 65534 Hosts/Network
  • 42. CLASS C – No. Networks & Hosts • Class C Octet Format is N. N. N. H Network bits : 24 Host bits : 8 • No. of Networks = 2no of network bits– Priority bit = 224-3 (-3 is Priority Bit for Class C) = 221 = 2097152 Networks • No. of Host = 2no of host bits -2 = 28 – 2 (-2 is for Network ID & Broadcast ID) = 256 - 2 = 254 Hosts/Network
  • 43. Network & Broadcast Address • Network address: IP address with all bits as ZERO in the host portion. • Broadcast address: IP address with all bits as ONES in the host portion. • Valid IP Addresses lie between the Network Address and the Broadcast Address. • Only Valid IP Addresses are assigned to hosts/clients
  • 44. Example - Class A • Class A : N.H.H.H Network Address : 0xxxxxxx.00000000.00000000.00000000 Broadcast Address : 0xxxxxxx.11111111.11111111.11111111Class A 10.0.0.0 10.0.0.1 10.0.0.2 10.0.0.3 10.255.255.254 10.255.255.255 Network Address Broadcast Address Valid IP Addresses
  • 45. Example - Class B • Class B : N.N.H.H Network Address : 10xxxxxx.xxxxxxxx.00000000.00000000 Broadcast Address : 10xxxxxx.xxxxxxxx.11111111.11111111Class B 172.16.0.0 172.16.0.1 172.16.0.2 172.16.0.3 172.16.255.254 172.16.255.255 Network Address Broadcast Address Valid IP Addresses
  • 46. Example - Class C • Class C : N.N.N.H Network Address : 110xxxxx.xxxxxxxx.xxxxxxxx.00000000 Broadcast Address : 110xxxxx.xxxxxxxx.xxxxxxxx.11111111 Class C 192.168.1.0 192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.254 192.168.1.255 Network Address Broadcast Address Valid IP Addresses
  • 47. Private IP Address • There are certain addresses in each class of IP address that are reserved for Private Networks. These addresses are called private addresses. • These addresses are not Routable (or) valid on Internet. Class A 10.0.0.0 to 10.255.255.255 Class B 172.16.0.0 to 172.31.255.255 Class C 192.168.0.0 to 192.168.255.255
  • 48. Subnet Mask • Subnet Mask differentiates the Network and Host portions of an IP address • Represented with all 1’s in the network portion and with all 0’s in the host portion.
  • 49. Subnet Mask - Examples • Class A : N.H.H.H 11111111.00000000.00000000.00000000 Default Subnet Mask for Class A is 255.0.0.0 • Class B : N.N.H.H 11111111.11111111.00000000.00000000 Default Subnet Mask for Class B is 255.255.0.0 • Class C : N.N.N.H 11111111.11111111.11111111.00000000 Default Subnet Mask for Class C is 255.255.255.0
  • 50. How Subnet Mask Works ? IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 ANDING PROCESS : 192.168.1.1 = 11000000.10101000.00000001.00000001 255.255.255.0 = 11111111.11111111.11111111.00000000 ================================================== 192.168.1.0 = 11000000.10101000.00000001.00000000 ================================================== The output of an AND table is 1 if both its inputs are 1. For all other possible inputs the output is 0.
  • 52. Subnetting • Creating Multiple independent Networks from a Single Network. • Converting Host bits into Network Bits i.e. Converting 0’s into 1’s • Subnetting can be performed in two ways. – FLSM (Fixed Length Subnet Mask) – VLSM (Variable Length subnet mask) • Subnetting can be done based on requirement . – Number of Networks required? – Number of Hosts required?
  • 53. Scenario for subnetting • CMS Technologies is having 100 PCs • Which IP address Class is preferred for the network ? Answer : Class C. • In CMS Technologies there are 2 Departments with 50 PCs each CMS Technologies – 192.168.1.0/24 – MCSE 192.168.1.1 to 192.168.1.50 192.168.1.51 to 192.168.1.100– CISCO
  • 56. Scenario (…continued) • Administrator’s Requirement : Inter-department communication should not be possible ? Solution. Allocate a different Network to each Department i.e. – MCSE 192.168.1.1 to 192.168.1.50 192.168.2.1 to 192.168.2.50– CISCO
  • 59. Main Aim of Subnetting • Problem with the previous Scenario is :- • Wastage of IP addresses if it is public(Approximately 400)
  • 60. Power table POWER TABLE 21 = 2 22 = 4 23 = 8 24 = 16 25 = 32 26 = 64 27 = 128 28 = 256 29 = 512 210 = 1024 211 = 2048 212 = 4096 213 = 8192 214 = 16384 215 = 32768 216 = 65536 217 = 131072 218 = 262144 219 = 524288 220 = 1048576 221 = 2097152 222 = 4194304 223 = 8388608 224 = 16777216 225 = 33554432 226 = 67108864 227 = 134217728 228 = 268435456 229 = 536870912 230 = 1073741824 231 = 2147483648 232 = 4294967296
  • 61. Some Important Values VALUES IN SUBNET MASK Bit Value Mask 1 128 10000000 2 192 11000000 3 224 11100000 4 240 11110000 5 248 11111000 6 252 11111100 7 254 11111110 8 255 11111111
  • 62. Requirement of Networks is 2 ? Example – 1 Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.0 No. of Subnet = 2n – 2 ≥ Req. of Subnet = 22 – 2 ≥ 2 (-2 is for First & Last Subnet Range) = 4 – 2 = 2 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 26 – 2 = 64 – 2 = 62 Hosts/Subnet
  • 63. Example – 1 (Continued…) • Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11000000 192 Range of Networks Network ID Broadcast ID 192.168.1.0 192.168.1.64 192.168.1.128 192.168.1.192 192.168.1.63 192.168.1.127 192.168.1.191 192.168.1.255 Valid Subnets 192.168.1.0 192.168.1.63 192.168.1.192 192.168.1.255 If you convert 2 Host Bits to Network Bits 2 Subnet & 62 Hosts/Subnet Customized Subnet Mask 255.255.255.192 Subnet Range 192.168.1.64 to 192.168.1.127  MCSE 192.168.1.128 to 192.168.1.191  CISCO
  • 65. Requirement of subnet is 14? Example -2 CLASS C: N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.0 No. of Subnet = 2n – 2 ≥ Req. of Subnet = 24 – 2 ≥ 14(-2 is for First & Last Subnet Range) = 16– 2 = 14 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 24 – 2 = 16 – 2 = 14 Hosts/Subnet
  • 66. EXAMPLE – 2 (Continued…) Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11110000 240 Range of Networks Network ID Broadcast ID 192.168.1.0 192.168.1.16 192.168.1.32 192.168.1.48 192.168.1.224 192.168.1.240 192.168.1.15 192.168.1.31 192.168.1.47 192.168.1.63 192.168.1.239 192.168.1.255 Valid Subnets 192.168.1.0 192.168.1.15 192.168.1.240 192.168.1.255 If you convert 4 Host Bits to Network Bits 14 Subnet & 14 Hosts/Subnet Customized Subnet Mask 255.255.255.240 Subnet Range 192.168.1.16 to 192.168.1.31 192.168.1.32 to 192.168.1.47 192.168.1.48 to 192.168.1.63 192.168.1.64 to 192.168.1.79 192.168.1.240 to 192.168.1.255
  • 67. Requirement of Hosts is 40 ? Example – 3 Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.0 No. of Host = 2h – 2 ≥ Req. of Host = 26 – 2 ≥ 40 (-2 is for Network ID & Broadcast ID) = 64 – 2 = 62 Hosts/Subnet No. of Subnet = 2n – 2 (-2 is for First & Last Subnet Range) = 22 – 2 = 4 – 2 = 2 Subnet
  • 68. Example – 3 (Continued…) Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11000000 192 Range of Networks Network ID Broadcast ID 192.168.1.0 192.168.1.64 192.168.1.128 192.168.1.192 192.168.1.63 192.168.1.127 192.168.1.191 192.168.1.255 Valid Subnets 192.168.1.0 192.168.1.63 192.168.1.192 192.168.1.255 If you convert 2 Host Bits to Network Bits 2 Subnet & 62 Hosts/Subnet Customized Subnet Mask 255.255.255.192 Subnet Range 192.168.1.64 to 192.168.1.127 192.168.1.128 to 192.168.1.191
  • 69. Requirement of Hosts is 2 ? Example – 2 Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.0 No. of Host = 2h – 2 ≥ Req. of Host = 22 – 2 ≥ 2 (-2 is for Network ID & Broadcast ID) = 4 – 2 = 2 Hosts/Subnet No. of Subnet = 2n – 2 (-2 is for First & Last Subnet Range) = 26 – 2 = 64 – 2 = 62 Subnet
  • 70. Example – 2 (Continued…) • Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11111100 252 Range of Networks Network ID Broadcast ID 192.168.1.0 192.168.1.4 192.168.1.8 192.168.1.12 192.168.1.248 192.168.1.252 192.168.1.3 192.168.1.7 192.168.1.11 192.168.1.15 192.168.1.251 192.168.1.255 Valid Subnets 192.168.1.0 192.168.1.3 192.168.1.252 192.168.1.255
  • 71. Requirement of Networks is 2 ? Example – 4 Class B : N.N.H.H 10xxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class B : 172.16.0.0 No. of Subnet = 2n – 2 ≥ Req. of Subnet = 22 – 2 ≥ 2 (-2 is for First & Last Subnet Range) = 4 – 2 = 2 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 214 – 2 = 16384 – 2 = 16382 Hosts/Subnet
  • 72. Example – 4 (Continued…) • Customized Subnet Mask = 255. 11111111. 255. 11111111. 0 11000000. 00000000 192. Range of Networks Network ID Broadcast ID 172.16.0.0 172.16.64.0 172.16.128.0 172.16.192.0 172.16.63.255 172.16.127.255 172.16.191.255 172.16.255.255 Valid Subnets 172.16.0.0 172.16.63.255 172.16.192.0 172.16.255.255
  • 73. Requirement of Hosts is 126 ? Example – 5 Class B : N.N.H.H 10xxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class B : 172.16.0.0 No. of Host = 2h – 2 ≥ Req. of Host = 27 – 2 ≥ 126 (-2 is for Network ID & Broadcast ID) = 128 – 2 = 126 Hosts/Subnet No. of Subnet = 2n – 2 (-2 is for First & Last Subnet Range) = 29 – 2 = 512 – 2 = 510 Subnet
  • 74. Example – 2 (Continued…) • Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 10000000 128 Range of Networks Network ID Broadcast ID 172.16.0.0 172.16.0.128 172.16.1.0 172.16.1.128 172.16.255.0 172.16.255.128 172.16.0.127 172.16.0.255 172.16.1.127 172.16.1.255 172.16.255.127 172.16.255.255 Valid Subnets 172.16.0.0 172.16.0.127 172.16.255.128 172.16.255.255
  • 75. VLSM • Subnetting a subnet is called as Variable Length Subnet Mask • VLSMs provide the capability to include more than one subnet mask within a major network
  • 76. Scenario • ZOOM Technologies is having 100 PC ZOOM Technologies – 192.168.1.0/24 – MCSE – CISCO – FIREWALL – SOLARIS – TRAINING Administrator’s requirement : Inter-department communication should not be possible ? Best Solution is : FLSM i.e. Subnetting
  • 77. Scenario (…continued) • Now we are also having sub departments ZOOM Technologies – MCSE – CISCO – CCNA – CCNP – FIREWALL – ISA – Checkpoint – NetASQ – Clavister – Cisco PIX – SOLARIS – Linux – Unix – Solaris – TRAINING
  • 78. Scenario (…continued) Administrator does not want inter-department communication in the sub departments ? Answer : You will use the subnet range to further divide it into smaller ranges, this time its Subnetting of a Subnet i.e. VLSM.
  • 79. Calculation of FLSM Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.0 No. of Subnet = 2n – 2 ≥ Req. of Subnet = 23 – 2 ≥ 5 (-2 is for First & Last Subnet Range) = 8 – 2 = 6 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 25 – 2 = 32 – 2 = 30 Hosts/Subnet
  • 80. Example – 1 (Continued…) • Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11100000 224 Range of Networks Network ID Broadcast ID 192.168.1.0 192.168.1.32 192.168.1.64 192.168.1.96 192.168.1.128 192.168.1.160 192.168.1.192 192.168.1.224 192.168.1.31 192.168.1.63 192.168.1.95 192.168.1.127 192.168.1.159 192.168.1.191 192.168.1.223 192.168.1.255 Valid Subnets 192.168.1.0 192.168.1.31 192.168.1.224 192.168.1.255
  • 81. Assigning of the Ranges ZOOM Technologies – MCSE – CISCO – CCNA – CCNP – FIREWALL – ISA – Checkpoint – NetASQ – Clavister – Cisco PIX – SOLARIS – Linux – Unix – Solaris – TRAINING 192.168.1.32 – 1.63/27 192.168.1.64 – 1.95/27 192.168.1.96 – 1.127/27 192.168.1.128 – 1.159/27 192.168.1.160 – 1.191/27
  • 82. Calculation of VLSM for CISCO Dept. Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.64 No. of Subnet = 2n ≥ Req. of Subnet = 21 ≥ 2 = 2 = 2 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 24 – 2 = 16 – 2 = 14 Hosts/Subnet
  • 83. VLSM (Continued…) Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11110000 240 Range of Networks Network ID Broadcast ID 192.168.1.64 192.168.1.80 192.168.1.79 192.168.1.95 Valid Subnets
  • 84. Assigning of the Ranges 192.168.1.64 – 1.79/28 192.168.1.80 – 1.95/28 ZOOM Technologies – MCSE – CISCO – CCNA – CCNP – FIREWALL – ISA – Checkpoint – NetASQ – Clavister – Cisco PIX – SOLARIS – Linux – Unix – Solaris – TRAINING 192.168.1.32 – 1.63/27 192.168.1.64 – 1.95/27 192.168.1.96 – 1.127/27 192.168.1.128 – 1.159/27 192.168.1.160 – 1.191/27
  • 85. Calculation of VLSM for Firewall Dept. Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.96 No. of Subnet = 2n ≥ Req. of Subnet = 23 ≥ 5 = 8 = 8 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 22 – 2 = 4 – 2 = 2 Hosts/Subnet 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
  • 86. VLSM (Continued…) Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11111100 252 Range of Networks Network ID Broadcast ID 192.168.1.96 192.168.1.100 192.168.1.104 192.168.1.108 192.168.1.112 192.168.1.116 192.168.1.120 192.168.1.124 192.168.1.99 192.168.1.103 192.168.1.107 192.168.1.111 192.168.1.115 192.168.1.119 192.168.1.123 192.168.1.127 Valid Subnets
  • 87. Assigning of the Ranges 192.168.1.96 – 1.99/30 192.168.1.100 – 1.103/30 192.168.1.104 – 1.107/30 192.168.1.108 – 1.111/30 192.168.1.112 – 1.115/30 ZOOM Technologies – MCSE – CISCO – CCNA – CCNP – FIREWALL – ISA – Checkpoint – NetASQ – Clavister – Cisco PIX – SOLARIS – Linux – Unix – Solaris – TRAINING 192.168.1.32 – 1.63/27 192.168.1.64 – 1.95/27 192.168.1.96 – 1.127/27 192.168.1.128 – 1.159/27 192.168.1.160 – 1.191/27 192.168.1.64 – 1.79/28 192.168.1.80 – 1.95/28
  • 88. Calculation of VLSM for Solaris Dept. Class C : N.N.N.H 110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx Class C : 192.168.1.128 No. of Subnet = 2n ≥ Req. of Subnet = 22 ≥ 3 = 4 = 4 Subnet No. of Host = 2h – 2 (-2 is for Network ID & Broadcast ID) = 23 – 2 = 8 – 2 = 6 Hosts/Subnet
  • 89. VLSM (Continued…) • Customized Subnet Mask = 255. 11111111. 255. 11111111. 255. 11111111. 11111000 248 Range of Networks Network ID Broadcast ID 192.168.1.128 192.168.1.136 192.168.1.144 192.168.1.152 192.168.1.135 192.168.1.143 192.168.1.151 192.168.1.159 Valid Subnets
  • 90. Assigning of the Ranges 192.168.1.128 – 1.135/29 192.168.1.136 – 1.143/29 192.168.1.144 – 1.151/29 ZOOM Technologies – MCSE – CISCO – CCNA – CCNP – FIREWALL – ISA – Checkpoint – NetASQ – Clavister – Cisco PIX – SOLARIS – Linux – Unix – Solaris – TRAINING 192.168.1.32 – 1.63/27 192.168.1.64 – 1.95/27 192.168.1.96 – 1.127/27 192.168.1.128 – 1.159/27 192.168.1.160 – 1.191/27 192.168.1.96 – 1.99/30 192.168.1.100 – 1.103/30 192.168.1.104 – 1.107/30 192.168.1.108 – 1.111/30 192.168.1.112 – 1.115/30 192.168.1.64 – 1.79/28 192.168.1.80 – 1.95/28
  • 92. OSI • OSI was developed by the International Organization for Standardization (ISO) and introduced in 1984. • It is a layered architecture (consists of seven layers). • Each layer defines a set of functions which takes part in data communication.
  • 93. OSI Model Layers Application Presentation Session Transport Network Data Link Physical Layer - 7 Layer - 6 Layer - 5 Layer - 4 Layer - 3 Layer - 2 Layer - 1 User support Layers or Software Layers Network support Layers or Hardware Layers Core layer of the OSI
  • 94. Application Layer • Application Layer is responsible for providing an interface for the users to interact with application services or Networking Services . • Ex: Web browser, Telnet etc. Application Presentation Session Transport Network Data Link Physical Application
  • 95. Examples of Networking Services Service Port No. HTTP 80 FTP 21 SMTP 25 TELNET 23 TFTP 69
  • 96. Data flow from Application Layer Application 2180 25 6753 69 Session Transport Network Data Link Physical Presentation Data
  • 97. Presentation Layer Presentation Layer It is responsible for defining a standard format to the data. It deals with data presentation. The major functions described at this layer are.. Encoding – Decoding Eg: ASCII, EBCDIC (Text) JPEG,GIF,TIFF (Graphics) MIDI,WAV (Voice) MPEG,DAT,AVI (Video) Encryption – Decryption Compression – Decompression Application Presentation Session Transport Network Data Link Physical Presentation
  • 98. Data flow from Presentation Layer Physical Application Session Transport Network Data Link Presentation Data Data
  • 99. Session Layer Session Layer It is responsible for establishing, maintaining and terminating the sessions. Session ID is used to identify a session or interaction. Examples : RPC Remote Procedural Call SQL Structured Query Language ASP AppleTalk Session protocol Application Presentation Session Transport Network Data Link Physical Session
  • 100. Data flow from Session Layer Physical Application Session Transport Network Data Link Presentation Data Data Data
  • 101. Transport Layer Transport Layer It provides data delivery mechanism between the applications in the network. The major functions described at the Transport Layer are.. •Identifying Service •Multiplexing & De-multiplexing •Segmentation •Sequencing & Reassembling •Error Correction •Flow Control Application Presentation Session Transport Network Data Link Physical Transport
  • 102. Identifying a Service • Identification of Services is done using port Numbers. • Port is a logical communication Channel Total No. Ports 0 – 65535 Reserved Ports 1 - 1023 Open Ports 1024 – 65535
  • 103. Multiplexing & De-multiplexing TCP - 6 UDP - 17 2180 25 6753 69 Transport Network Data Link Physical Session Presentation Application
  • 104. Transport Layer Protocols • The protocols which takes care of Data Transportation at Transport layer are…TCP,UDP TCP • Transmission Control Protocol • Connection Oriented • Supports Ack’s • Reliable communication • Slower data Transportation • Protocol No is 6 • Eg: HTTP, FTP, SMTP UDP • User Datagram Protocol • Connection Less • No support for Ack’s • Unreliable communication • Faster data Transportation • Protocol No is 17 • Eg: DNS, DHCP, TFTP
  • 110. Data flow from Transport Layer Physical Application Presentation Session Transport Network Data Link Data Data Data DataTHSegment
  • 111. Network Layer Network Layer It provides Logical addressing & Path determination (Routing) The protocols that work in this layer are: Routed Protocols: IP, IPX, AppleTalk.. Etc Routed protocols used to carry user data between hosts. Routing Protocols: RIP, OSPF.. Etc Routing protocols performs Path determination (Routing). Application Presentation Session Transport Network Data Link Physical Network
  • 112. Data flow from Network Layer Application Presentation Session Transport Network Data Link Physical Data Data Data DataTHSegment SegmentNH Packet Device that works at Network Layer is Router
  • 113. Datalink Layer Datalink Layer It has 2 sub layers • MAC (Media Access Control) It provides reliable transit of data across a physical link. It also provides ERROR DETECTION using CRC (Cyclic Redundancy Check) Ex: Ethernet, Token ring…etc • LLC (Logical Link Control) It provides communication with Network layer. Application Presentation Session Transport Network Data Link Physical Data Link
  • 114. Data flow from Data link Layer Application Presentation Session Transport Network Data Link Physical Data Data Data DataTHSegment SegmentNH Packet DT Packet DHFrame Devices that work at Data link layer are Switch, Bridge etc..
  • 115. Physical Layer Physical Layer It defines the electrical, Mechanical & functional specifications for communication between the Network devices. The functions described at this layer are.. Encoding/decoding: It is the process of converting the binary data into signals based on the type of the media. Copper media : Electrical signals of different voltages Fiber media: Light pulses of different wavelengths Wireless media: Radio frequency waves Application Presentation Session Transport Network Data Link PhysicalPhysical
  • 116. Data flow from Physical Layer Application Presentation Session Transport Network Data Link Physical Data Data Data DataTHSegment SegmentNH Packet DT Packet DHFrame Bits Devices that work at physical layer are .. Hub, Repeater.. Etc
  • 117. Comparison between OSI & TCP/IP Model Application Presentation Session Transport Network Data Link Physical Application Host to Host Internet Network Access