Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts
What is IP Subnetting :- 

IP Subnetting is a process of breaking a large network IP range to the small & reliable subnets. Subnets means the subnetwork of a large network. Subnet mask contains network & host portion. We acquire host portion to the network & perform subnetting. We know that one large network is not good thing so, we reduce the network congestion in our organization using subnetting.

Lets see an example of a large network :- 192.168.10.1/24 of class c default network, so the subnet mask is 255.255.255.0, now convert this decimal value into binary.

  255          .  255          .  255         . 0

11111111 . 11111111 . 11111111 . 00000000

            Network Bit                           Host Bit

All ones are on bits & represent network bit & all zeros are off bits represents as host bit. every octate have a maximum number is 255 in decimal, so, as per the above example there are 255 hosts available in the network range. suppose if we required only 25 hosts then our (255-30 = 225) IP will be waste. 
We need subnetting to Organized our network, Reduce congestion & Prevent unused IP addresses.
Yes we will do subnetting but before that lets understand one more terms is CIDR. 
Classless Inter-Domain Routing (CIDR) :-

CIDR is a slash (/) notation. When you receive any block of IP like 192.168.10.1/24 it is telling your subnet mask, slash notation means the on bits or the bits turns into 1's. In the block of 192.168.10.1/24, 24 bits are turned on. 
There are 4 octate in ip address, 8 bits in each so total number of  bits would be 8*4 = 32 . When we sunet any block there are 2 ip addresses are reserved first one for the Network address and Last one for Broadcast address, in the view of above till the /30 we have 4 ip addresses (2 are Network & Broadcast, other 2 are only valid host ip) so, practically to build a network we need 2 or more hosts & IPs. So, practically we can use only till /30 CIDR value.

Find the below subnet mask value for each slash notation CIDR value.


You can find out subnet mask for any slash (/) notation... as for example for /27 we have to find subnet mask so, we have already read IP class in last post What is IP address 
 if not please refer. So, /27 means there are 27 bits are on out of 32 like this:-

11111111.11111111.11111111. 1110 0 0 0 0

here we can see the power of 2 means 2x . in last octate there are 5 bits are off means 0...... we will subtract the value from the 256.

11111111.11111111.11111111. 111 0    0    0    0    0
                                                       🠛    🠛    ðŸ ›    ðŸ ›    ðŸ ›
                                                 25 = 32     24     23         22   21= 2           
We will count the power of two from right to left so the last off  bit  power of 2 is 32 so, minus this value from the 256. It will be 256-32= 224 so the subnet mask will be 255.255.255.240.
             
Now let's do subnetting in very easy steps.....!!! Think about these five points before subnet any IP block.

  1. How many subnets does the chosen subnet mask produce?
  2. How many valid hosts per subnet are available?
  3. What are the valid subnets?
  4. What’s the broadcast address of each subnet?
  5. What are the valid hosts in each subnet?

Now let's  subnet a block e.g 192.168.10.1/28, here /28 denote the total number of on bit out of 32 bits means total 1's. 

11111111 . 11111111 . 11111111 . 11110000

                Network Bit                            Host Bit
We are going to acquire host bit to the network bit since, it is a class C ip address so by default 24 bit allowed for network portion & we are going to acquire 4 more bits from the host portion, you can see in the highlighted text we have to check values from the portion from where we are acquiring bits.So................

    1. How many subnets does the chosen subnet mask produce?
We will use formula 2x here x is the on bits or the masked bit. So, in our example check the highlighted portion there are 4 masked bits or ones so it is simple to find the number of subnets is... 
24 = 2*2*2*2 =16 Subnets.

    2. How many valid hosts per subnet are available?
We will use formula 2y - 2 here y is off bit or all zeros.So, in our example check the highlighted portion there are 4 off bits or zeros so it is simple to find the number of  hosts per subnets is... 
24 – 2 = 14 hosts per subnets

    3. What are the valid subnets?
We can determined valid subnet by using formula 256-subnet mask so, it is 256- 240  (Subnet mask of /28 is 255.255.255.240) = 16 so, block starts with 0 then add 16 until 240.so it will be 0,16,32,48,64,80,96,112,128,144,160,176,192,208,224,240. 
    
    4. What’s the broadcast address of each subnet?
The broadcast address will be the number just before the next subnet number or the last number of current subnet block. lets check in our example we have already find the subnets in point number 3 so ,check the broadcast address of subnet 16 is 31, because the next subnet is 32..... broadcast address of 32 is 47.

    5. What are the valid hosts in each subnet?
Valid hosts are always a group of numbers between the subnet & broadcast address, we have already find the both in point number 3 & 4 so lets find the valid hosts for first block 0 to 15 the valid hosts will be 1-14 means there are valid host range is 14, as it is for the next block 16 to 31 valid hosts will be 17-30............. yes its easy!!!!!

This is how we can subnet easily & find all the required details. For this class c subnet find all the details in below mentioned table:-

Thank you for reading... comment on post for any doubt....... 😊😉



















Devices used in Networking:-

HUB:- Hub is centralized device, which is used to connect multiple workstations.It has no special kind of memory. It simply receives the frame (data) and forwards it to all its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one collision domain and one broadcast domain. The media access method is used CSMA/CD (Carrier Sense Multiple Access/Collision Detection).

There are two types of Hub: -

  • Active Hub
  • Passive Hub
Active Hub:- In Active hub, it receives the frame regenerate and then forward to all its nodes. It increases the distance between devices, and it amplifies the signal and also the noise with it.

Passive Hub:-In Passive hub, it simply receives the frame and forward to all its connected nodes. It reduces the cabling distance by half because it doesn’t boost the signal and in fact absorbs some of the signal.


SWITCH:-  Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes.
Every port has its own buffer memory. A port has two queues one is input queue and second is output queue. When switch receives the frame, the frame is received in input queue and forward from output queue. So in case of switch there is no chance or place for collisions. In case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance). Switches provide more efficiency, more speed and security.

There are two types of switches: -

  •  Manageable switches (can be configured with console cable).
  • Non-manageable switches. 

BRIDGE:- Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. It has same functionality as performed by switch. We can use bridge between two different typologies. It has fewer ports. Each port has a own buffer memory. It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table. In case of bridge there is one broadcast domain.

ROUTER:-Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. Routers learn remote network information from neighboring router.Router then build routing table, which is basically map of interconnected network & it describe how to find remote network.

LAN CARD:- Lan card is media access device. Lan card provide us connectivity in the network. There is a RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is another led which is also called heartbeat of Lan card. When any activity occur it may be receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan card.

What is IP address ?

An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. An IP address is a software address, not a hardware address—the latter is hard-coded on a network interface card (NIC) and used for finding hosts on a local network. IP addressing was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.

Types of IP Address

 IPv4(IP Version 4)
 IPv6(IP Version 6)

IPv4(IP Version 4)
An IP address consists of 32 bits of information.These bits are divided into four sections  referred to as octets or bytes, with each containing 1 byte (8 bits).  You can depict an IP address using one of three methods:
·         Dotted-decimal, as in 172.16.30.66
·         Binary, as in 10101100.00010000.00011110.00111000

The 32-bit IP address is a structured or hierarchical address, as opposed to a flat or non hierarchical address. Although either type of addressing scheme could have been used, hierarchical addressing was chosen for a good reason. The advantage of this scheme is that it can handle a large number of addresses, namely 6.3 billion (a 32-bit address space with two possible values for each position—either 0 or 1—gives you 232, or 6,296,967,296). IPv4 is divided into classes.

classes

Network Address Range: Class A

The designers of the IP address scheme decided that the first bit of the first byte in a Class A
network address must always be off, or 0. This means a Class A address must be between 0 and 127 in the first byte, inclusive.Consider the following network address:
0xxxxxxx If we turn the other 7 bits all off and then turn them all on, we’ll find the Class A range of 

network addresses:
00000000 = 0
01111111 = 127

So, a Class A network is defined in the first octet between 0 and 127, and it can’t be less or more. Understand that 0 and 127 are not valid in a Class A network because they’re reserved addresses, which I’ll explain soon.

Network Address Range: Class B

In a Class B network, the RFCs state that the first bit of the first byte must always be turned
on but the second bit must always be turned off. If you turn the other 6 bits all off and then all on, you will find the range for a Class B network:
10000000 = 128
10111111 = 191
As you can see, a Class B network is defined when the first byte is configured from 128 to 191.

Network Address Range: Class C

For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on,
but the third bit can never be on. Following the same process as the previous classes, convert
from binary to decimal to find the range. Here’s the range for a Class C network:
11000000 = 192
11011111 = 223
So, if you see an IP address that starts at 192 and goes to 223, you’ll know it is a Class C IP address.

Network Address Ranges: Classes D and E

The addresses between 226 to 266 are reserved for Class D and E networks. Class D (226–239) is used for multicast addresses and Class E (260–266) for scientific purposes.



IPv6

Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv6 address exhaustion. IPv6 is intended to replace IPv6.

Every device on the Internet is assigned an IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses than the IPv6 address space has available were necessary to connect new devices in the future. By 1998, the Internet Engineering Task Force (IETF) had formalized the successor protocol. IPv6 uses a 128-bit address, allowing 2128, or approximately 3.6×1038 addresses, or more than 7.9×1028 times as many as IPv6, which uses 32-bit addresses and provides approximately 6.3 billion addresses. The two protocols are not designed to be interoperable, complicating the transition to IPv6. However, several IPv6 transition mechanisms have been devised to permit communication between IPv6 and IPv6 hosts.

IPv6 provides other technical benefits in addition to a larger addressing space. In particular, it permits hierarchical address allocation methods that facilitate route aggregation across the Internet, and thus limit the expansion of routing tables. The use of multicast addressing is expanded and simplified, and provides additional optimization for the delivery of services. Device mobility, security, and configuration aspects have been considered in the design of the protocol.

IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons, for example 2001:0db8:86a3:0062:1000:8a2e:0370:7336, but methods to abbreviate this full notation exist.





                                                                             ipv6 conversion




Open Systems Interconnection



OSI model is the layer approach to design, develop and implement network. OSI provides following advantages: -
  • Designing of network will be standard base.
  •  Development of new technology will be faster.
  •  Devices from multiple vendors can communicate with each other.
  •  Implementation and troubleshooting of network will be easy.

1.  Application Layer: -
 Application layer accepts data and forward into the protocol stack. It creates user  interface between application software and protocol stack.

2.  Presentation Layer: -
This layer decides presentation format of the data. It also able to performs other function like compression/decompression and encryption/decryption.

3.  Session Layer: -
This layer initiate, maintain and terminate sessions between different applications. Due to this layer multiple application software can be executed at the same time.

4.  Transport Layer: -
Transport layer is responsible for connection oriented and connection less communication. Transport layer also performs other functions like
Error checking

  • Flow Control
  • Buffering
  • Windowing
  • Multiplexing
  • Sequencing
  • Positive Acknowledgement
  • Response


5.  Network Layer
This layer performs function like logical addressing and path determination. Each networking device has a physical address that is MAC address. But logical addressing is easier to communicate on large size network.

Logical addressing defines network address and host address. This type of addressing is used to simplify implementation of large network. Some examples of logical addressing are: - IP addresses, IPX addresses etc.

6.  Data Link Layer
The functions of Data Link layer are divided into two sub layers
  • Logical Link Control
  • Media Access Control
Logical Link Control defines the encapsulation that will be used by the NIC to delivered data to destination. Some examples of Logical Link Control are ARPA (Ethernet), 802.11 wi-fi.

Media Access Control defines methods to access the shared media and establish the identity with the help of MAC address. Some examples of Media Access Control are CSMA/CD, Token Passing.

7.  Physical Layer
Physical Layer is responsible to communicate bits over the media this layer deals with the standard defined for media and signals. This layer may also perform modulation and demodulation as required.

              Protocols

When two humans converse, they may have to use the same language but they generally understand each other without having to adhere to rigid rules of grammar or formal language frameworks. Computers, on the other hand, have to have everything explicitly defined and structured. If computers wish to communicate with one another, they have to know in advance exactly how information is to be exchanged and precisely what the format will be. Therefore, standard methods of transmitting and processing various kinds of information are used and these methods are called "protocols". Protocols are established by international agreement and ensure that computers everywhere can talk to one another. There are a variety of protocols for different kinds of information and functions. This article will discuss some of the common protocols that the average PC user is likely to encounter.

Types of protocols

                           HTTP  (hyper text transfer protocol)

                          DNS (Domain Name server)

                         ARP(Address Resolution Protocol)

                         RARP(Reverse Address Resolution Protocol )

                        ICMP(Internal Controal Message Protocol)

                       TELNET(Telecommunication network)

                        DHCP(Dynamic Host Configuration Protocol)

                        FTP(File transfer Protocol)

                       TFTP(Trivial File Transfer Protocol)

                       POP-3(Post office Protocol)

                       IMAP(Internal  Message Address Protocol)

                       SNMP(Simple network management Protocol)

                       SMTP(Simple Mail Transfer Protocol)

                      SSH(Server Shell)



Hypertext Transfer Protocol
Web pages are constructed according to a standard method called Hypertext Markup Language (HTML). An HTML page is transmitted over the Web in a standard way and format known as Hypertext Transfer Protocol (HTTP). This protocol uses TCP/IP to manage the Web transmission.
A related protocol is "Hypertext Transfer Protocol over Secure Socket Layer" (HTTPS), first introduced by Netscape. It provides for the transmission in encrypted form to provide security for sensitive data. A Web page using this protocol will have https: at the front of its URL.

File Transfer Protocol
File Transfer Protocol (FTP) lives up to its name and provides a method for copying files over a network from one computer to another. More generally, it provides for some simple file management on the contents of a remote computer. It is an old protocol and is used less than it was before the World Wide Web came along. Today, Its primary use is uploading files to a Web site. It can also be used for downloading from the Web but, more often than not, downloading is done via HTTP. Sites that have a lot of downloading (software sites, for example) will often have an FTP server to handle the traffic. If FTP is involved, the URL will have ftp: at the front.

Mail Protocols POP3 and SMTP
Email requires its own set of protocols and there are a variety, both for sending and for receiving mail. The most common protocol for sending mail is Simple Mail Transfer Protocol (SMTP). When configuring email clients, an Internet address for an SMTP server must be entered. The most common protocol used by PCs for receiving mail is Post Office Protocol(POP). It is now in version 3 so it is called POP3. Email clients require an address for a POP3 server before they can read mail. The SMTP and POP3 servers may or may not be the same address. Both SMTP and POP3 use TCP for managing the transmission and delivery of mail across the Internet.
A more powerful protocol for reading mail is Interactive Mail Access Protocol (IMAP). This protocol allows for the reading of individual mailboxes at a single account and is more common in business environments. IMAP also uses TCP to manage the actual transmission of mail.

ICMP
A different type of protocol is Internet Control Message Protocol (ICMP) . It defines a small number of messages used for diagnostic and management purposes. It is also used by Ping and Traceroute.

DNS
 Domain Name System - translates network address (such as IP addresses) into terms     understood by humans (such as Domain Names) and vice-versa

DHCP
Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users

FTP
 File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet

HTTP
 HyperText Transfer Protocol - An Internet-based protocol for sending and receiving webpages

IMAP
Internet Message Access Protocol - A protocol for e-mail messages on the Internet

IRC
 Internet Relay Chat - a protocol used for Internet chat and other communications

POP3
Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers

SMTP

Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet.



XXX

     

            Network Topology:-

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. 

    Main Types of Physical Typologies


                
I. Linear Bus
II. Star
III. Tree (Expanded Star)
IV. Ring


Linear Bus:- A linear bus topology consists of a main run of cable with a terminator at each end . All nodes (file server, workstations, and peripherals) are connected to the linear cable.



 linear bus topology

 

            Advantages of a Linear Bus Topology

  • Easy to connect a computer or peripheral to a linear bus.
  • Requires less cable length than a star topology.

            Disadvantages of a Linear Bus Topology

  • Entire network shuts down if there is a break in the main cable.
  • Terminators are required at both ends of the backbone cable.
  • Difficult to identify the problem if the entire network shuts down.
  • Not meant to be used as a stand-alone solution in a large building.

       Star

A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator .
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.


 star topology

           

       Advantages of a Star Topology

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

       Disadvantages of a Star Topology

  • Requires more cable length than a linear topology.
  • If the hub, switch, or concentrator fails, nodes attached are disabled.
  • More expensive than linear bus topologies because of the cost of the hubs, etc.

         

       Tree or Expanded Star

A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable. Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.


Tree topology

       

          Advantages of a Tree Topology

  • Point-to-point wiring for individual segments.
  • Supported by several hardware and software venders.

          Disadvantages of a Tree Topology

  • Overall length of each segment is limited by the type of cabling used.
  • If the backbone line breaks, the entire segment goes down.
  • More difficult to configure and wire than other topologies.

All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.






ring topology


XXX

Followers

Translate

Subscribe Us

Enter your email address:

Delivered by FeedBurner

Cooming Soon

Routing Protocols

Popular Posts

Total Pageviews