Unit-3 CN
Unit-3 CN
in
NETWORKS Faculty ID: EMP333
UNIT-3
2023
Differences between IPv4 and IPv6
IPv4
IPv4 address consists of two things that are the network address and the host address. It stands
for Internet Protocol version four. It was introduced in 1981 by DARPA and was the first
deployed version in 1982 for production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation. It is
represented by 4 numbers separated by dots in the range of 0-255, which have to be converted
to 0 and 1, to be understood by Computers. For Example, An IPv4 Address can be written
as 189.123.123.90.
IPv4 Address Format
IPv4 Address Format is a 32-bit Address that comprises binary digits separated by a dot (.).
IPv6
IPv6 is based on IPv4 and stands for Internet Protocol version 6. It was first introduced in
December 1995 by Internet Engineering Task Force. IP version 6 is the new version of Internet
Protocol, which is way better than IP version 4 in terms of complexity and efficiency. IPv6 is
written as a group of 8 hexadecimal numbers separated by colon (:). It can be written as 128 bits
of 0s and 1s.
IPv6 Address Format
IPv6 Address Format is a 128-bit IP Address, which is written in a group of 8 hexadecimal
numbers separated by colon (:).
Difference Between IPv4 and IPv6
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration
Now, let us know the definition of Subnetting. But before going into the Subnetting concept let us
know the overview of the concept named Subnetting in Computer Networks.
Subnetting is a part of Network Layer. The duty of the network layer is to divide the received
message into separate components and activities. The Network layer can be called as the heart of
Computer Networks.
Basic idea of the Concept
Finding a network and delivering data to it was simpler when the IP (Internet Protocol) system was
initially implemented since there were fewer individuals online. Sending a data packet to the
desired machine in a network is getting more and more challenging these days due to the rise in
internet users. Network performance becomes a major issue once a network is large enough to
serve an enterprise.
In order to divide larger networks logically (firewalls, etc.) or physically (for example), an
organization can employ IP subnets (smaller broadcast domains, etc.). To put it another way,
routers base their routing choices on subnets. We shall learn more about these ideas in this post.
Introduction to Subnetting
Subnetting is a combination of two words i.e. Sub and Netting. Here Sub word means Substitute and
netting word means Network. The Substitute Network created for a function to happen is known as
Subnetting.
Here, Substitute Network does not mean a new network is created. A full piece of network is broken
into small pieces and each piece a different is assigned.
By removing the need for extra routers, subnetting makes network traffic simpler. This makes sure
the data being transmitted can get to its destination as fast as possible, eliminating or avoiding any
potential diversions that may slow it down.
By isolating or removing vulnerable network regions and making it harder for intruders to move
through a company's network, subnetting helps the network managers in reducing network-wide
risks.
Each class has a finite amount of possible host allocations; for instance, networks with more than
254 devices require a Class B allocation. Assume that you are a network administrator. Now, you
have a task of allocating 150 hosts among three physical networks in three distinct cities for a Class
B or C network. If so, we must either ask for additional address blocks for each network or split the
single big network into small parts named subnets so that we could utilize a single address block
across a number of physical networks.
We will learn about this concept deeper in the upcoming topics.
Placing all of the computers on the same subnet can assist minimize network traffic if a significant
amount of an organization's traffic is intended to be shared routinely among a number of devices.
Without a subnet, all computers and servers on the network would be able to see data packets from
every other machine.
The main network is divided into smaller subnets through the process of subnetting, and the goal of
these smaller, linked networks is to split the large network into a collection of smaller, less-busy
networks. Subnets reduce the need for traffic to use unnecessary routes, which speeds up the
network.
o Division of IP Addresses
An IP address is split into its network address and host address via subnetting.
The split address may then be further divided into units using the subnet mask approach, and those
units can be assigned to different network devices.
Here, X refers to the Host ID. This is the only thing which gets changed in the Internet Protocol
Address
Now, we are going to learn how these subnets provide the different addresses to different devices
and also the process of subnetting in computer networks. So, by this example we would easily
understand the working of the Subnet.
We are going to learn how Subnets are formed for Internet Protocol version 4 (IPv4) Addressing.
o Class A Network
o Class B Network
o Class C Network
o Class D Network
o Class E Network
The total number of Internet Protocol Addresses (IP Address) gives the total number of Subnets that
can be formed by using a network.
Class Total Number of Hosts that can Total Number of IP Addresses Total Number of IP Total Number
Network be accommodated Formula Substitution Addresses of IP
Addresses in
Words
Subnetting
We have arrived at the subject at hand, Subnetting, thanks to the problem of IP address waste. By
taking bits from the Host ID section of the address, subnetting enables the creation of smaller
networks (sub networks; subnets) within of a larger network. With the help of those borrowed bits,
we can build more networks with a reduced overall size.
A Subnet is created from the bits taken from the Host ID.
To understand about this concept let take an example of a network this belongs to class C.
Our goal is to create to build a network. The capacity of each network must be Thirty (30) Devices.
We have three networks of type Class C Network based on IPv4 Addressing.
Each Class C Network can provide Two Hundred and Fifty Four (254) Internet Protocol Addresses.
The Capacity of each device which we require is very less than the Capacity which we require.
So, now we divide the four networks based on the requirement. Let us see how this division
happens.
We have four Class C Networks of imaginary Internet Protocol (IP) Addresses like:
1. Network 1 : 255.147.1.0
2. Network 2 : 255.147.2.0
3. Network 3 : 255.147.3.0
4. Network 4 : 255.147.4.0
We know that each network can produce 254 IP Addresses alone. This means four networks can
produce 254 * 4 = 1016 (Thousand and Sixteen ) Internet Protocol Addresses can be formed. But
what we require is only thirty Internet Protocol Addresses from each Network. This means we only
need hundred and Twenty (120) IP Addresses only.
Eight Hundred and Ninety-Six Addresses created are wasted. So, we need to use the Host ID bits
wisely.
So, by some calculation we will get to know that if we take 5 bits from each network we will be able
to get 30 IP Addresses from each Network.
The total number of IP Addresses creatable = 2 The total number of Host ID Bits - 2.
So, by considering we can create 30 Usable IP Addresses from each Class C Network.
So, now we have 3 more Host ID Bits left over unused. We also have different ways in
using these remaining bits.
First method is usually chosen because creation of two different subnets causes wastage of IP
Addresses. Let me explain this problem with the help of the above example.
Example:
o For the construction of the subnets, we usually check the MSB (Most Significant Bit) bits of
the host ID and if found wrong we make it right. In order to create two network subnets, we
fix one of the host's MSB (Most Significant Bit) bits in the table below. We are unable to alter
network bits since doing so would alter the entire network.
A part of an address should be used as the Subnet ID is also specified by the subnet mask. In order
to apply the subnet mask to the whole network address, a binary AND operation is utilized. When
performing an AND operation, it is assumed that the result will be "true" if both inputs are. If not,
"false" is presented. This is only possible when both bits are 1.
The Subnet ID results from this. The Subnet ID is used by routers to choose the best route among
the sub - networks.
o The two components that make up an IP address are the Network Prefix
(sometimes called the Network ID) and the Host ID. Depending on whether the
address is Class A, B, or C, either the Network Prefix or the Host ID must be
separated. A Class B IPv4 address, 172.16.37.5, is seen in the image below. The
Network Prefix is 172.16.0.0, and the Host ID is 37.5.
o We use permutations to the amount of bits set aside to form subnets if we wish
to produce subnets of varied length. Variable Length Subnet Masking is the
name of this subnetting (VLSM).
o After setting aside some bits to indicate the subnet, the broadcast address of a
subnet is computed by setting all the remaining bits of the host id to 1.The
message is sent to all network hosts using the broadcast address.
Advantages of Subnetting
o Subnetting is used to decrease the presence of Internet Protocol (IP) range.
o Subnets helps in stopping the devices or gadgets from occupying the whole
network, only allowing the hosts to control which kind of user can have access to
the important information. Simply, we can tell that network is safe just because
of the subnetting concept.
o Subnetting concept increases the performance of the total network by deleting
the repeated traffic causing errors.
o We can convert the whole big network into smaller networks by using the
concept of subnetting as discussed earlier.
Disadvantages of Subnetting
o If the number of subnets increases, then the number of routers must also
increase along with the subnet increase number. This happens because each
subnet has its own subnet mask, broadcast address and network address.
o As told earlier, if we create many subnets many IP Addresses are wasted because
of the wastage of Host ID Bits
o The cost of the entire network is increased by subnetting, which calls for the
acquisition of pricey internal routers, switches, hubs, and bridges, among other
things.
o The complexity of the network is increased through subnetting. The subnet
network must be managed by a skilled network administrator.
Instead of using Layer-3 address (IP address) to find MAC address, Inverse
ARP uses MAC address to find IP address. As the name suggests, InARP is
just inverse of ARP. Reverse ARP has been replaced by BOOTP and later
DHCP but Inverse ARP is solely used for device configuration. Inverse ARP is
enabled by default in ATM(Asynchronous Transfer Mode) networks. InARP is
used to find Layer-3 address from Layer-2 address (DLCI in frame relay).
Inverse ARP dynamically maps local DLCIs to remote IP addresses when you
configure Frame Relay. When using inverse ARP, we know the DLCI of remote
router but don’t know its IP address. InARP sends a request to obtain that IP
address and map it to the Layer-2 frame-relay DLCI.
4. Proxy ARP –
Proxy ARP was implemented to enable devices which are separated into
network segments connected by a router in the same IP network or sub-
network to resolve IP address to MAC addresses. When devices are not in
same data link layer network but are in the same IP network, they try to
transmit data to each other as if they were on the local network.
5. Gratuitous ARP –
ARP spoofing is a type of network attack in which the attacker sends the
falsified ARP request over the LAN (say to the default gateway), which results
connecting attacker’s MAC address to the legitimate server on that victim
network. Now, the attacker will start receiving the data which was intended for
that IP address. With the help of ARP Poisoning (or ARP Spoofing) attacker is
able to intercept data frames, modify traffic or even stop data in-transit.
ARP poisoning can act as the opening for other major attacks, such as Man in
the middle, denial of service, or session hijacking attacks. We will discuss
about ARP Spoofing later in depth.
The BOOTP (Bootstrap Protocol) and RARP (Reverse Address Resolution Protocol) are
required because they mainly help us to connect to devices. They also help us to
communicate between two or more devices or workstations. Regardless of differences
in their working the reason why we use Network Protocols are they help us to
communicate with people who may be anywhere in the world. Thus, these protocols
play an important role in modern digital communications.
Important Abbreviations
1. RARP - - - - > Reverse Address Resolution Protocol
2. BOOTP - - - - > Bootstrap Protocol
3. MAC - - - - > Medium Access Control
4. IP - - - - > Internet Protocol
5. DHCP - - - - > Dynamic Host Configuration Protocol
6. NIC - - - - > Network Interface Card
7. UDP - - - - > User Datagram Protocol
8. LAN - - - - > Large Area Network
9. TCP / IP - - - - > Transmission Control Protocol / Internet Protocol
10. IPv4 - - - - > Internet Protocol version 4
11. BIOS - - - - > Basic Input / Output System
This protocol is used to transmit data between two server-side sites. The client does
not necessary need to be aware of the identity of the server before making a request.
Administrators must configure each server individually for Medium Access Control
(MAC) addresses. RARP (Reverse Address Resolution Protocol) is very useful for
providing IP addresses.
The RARP client application requests an IP (Internet Protocol) address from the RARP
(Reverse Address Resolution Protocol) server on the router when a replacement
machine is set up since the machine may or may not have an associated disc that may
permanently retain the IP Address. In the event that a router table entry has been
configured, the RARP (Reverse Address Resolution Protocol) server will send the
machine's IP address.
The device can learn its physical address, which is specific to the area (by reading its
NIC (Network Interface Card , for instance). The RARP (Reverse Address Resolution
Protocol) protocol may then be used to obtain the logical address using the physical
address. On the local network, a RARP request is generated and broadcast.
An additional device on the local network that is aware of every IP address will reply
with a RARP (Reverse Address Resolution Protocol) answer. A RARP (Reverse Address
Resolution Protocol) client software must be running on the requesting system; the
RARP server software must be running on the replying system.
Broadcasting occurs at the data connection layer, which is a severe flaw with RARP.
The Physical broadcast addresses do not cross network borders, as is the case with
Ethernet.
So, the simple diskless workstations are also the platform for the primary workstations
from the company named Sun Microsystems.
The MAC address is then pre-programmed into the hardware once the IP address has
been assigned by software.
The RARP server, which responds to RARP (Reverse Address Resolution Protocol)
requests, can be any standard computer that is connected to the network. However, it
must record all MAC (Media Access Control) addresses and the Internet Protocol (IP)
addresses that correspond to them. The network can only reply to RARP (Reverse
Address Resolution Protocol) queries from these RARP (Reverse Address Resolution
Protocol) servers. It is necessary to send the data packet through relatively low-cost
network tiers. This means that each participant receives the package at the same time.
These are reasons why The RARP (Reverse Address Resolution Protocol) is not widely
used now. The RARP (Reverse Address Resolution Protocol) has been replaced. It is
replaced by Bootstrap Protocol (BOOTP) and Dynamic Host Configuration Protocol
(DHCP).
Now, let us know why RARP (Reverse Address Resolution Protocol) is obsolete
However, RARP has returned to the workplace thanks to server and data center
virtualization. For example, a crucial feature utilized for high-availability in the virtual
machine is the capability to immediately shift a virtual server from one physical host
to another, either inside the same physical data center or in another data center (VM).
The BOOTP (Bootstrap Protocol) requires a server to be executed. This server will be
taken care by an Network Admin. This server is used for allowing the network user to
receive an Internet Protocol (IP) Address. The network user immediately configures the
received Internet Protocol (IP) Address. This lets the Booting of an Operating System
to happen without external involvement or user collusion.
Today, BOOTP (Bootstrap Protocol) is carried out via User Datagram Protocol (UDP),
which forms the basis for Dynamic Host Configuration Protocol (DHCP). Dynamic Host
Configuration Protocol (DHCP) servers handle client requests.
Features of BOOTP (Bootstrap Protocol)
1. BOOTP (Bootstrap Protocol) is a dynamic protocol.
2. BOOTP (Bootstrap Protocol) is also known as a basic protocol
3. BOOTP (Bootstrap Protocol) job is to create an unique Internet Protocol (IP)
address for recognition and corroboration as soon as it is connected to the
network. The BOOTP (Bootstrap Protocol) is very helpful as it speeds up the data
transfer and connection requests.
4. BOOTP (Bootstrap Protocol) is an unique Internet Protocol (IP) algorithm. This
algorithm helps in providing and creating new Internet Protocol (IP) Addresses
and they are completely different and they also have no link between the
previous created Internet Protocol (IP) Addresses. The Internet Protocol (IP)
Addresses are created very fast in a fraction of second.
5. This algorithm also helps to reduce the time required which is required for
connection for source server and the client server.
6. Now, the main and important processes like downloading and changing the
already present values or codes are done. Even the small processes are also
updated so that they would never cause problems in the near future.
7. The BOOTP (Bootstrap Protocol) connection requires Internet Protocol (IP)
Address are required for the client server and the source server and they require
a gateway address for get going of successful connection. In BOOTP (Bootstrap
Protocol) Network the client and the source server use the same Large Area
Network (LAN) , and the routers must support BOOTP (Bootstrap Protocol) So ,
for that routers are always kept under same networks
8. A great example of a TCP / IP (Transmission Control Protocol / Internet Protocol)
based network is the BOOTP (Bootstrap Protocol) network. To quickly respond to
each request a computer on the network makes to the server, BOOTP (Bootstrap
Protocol) utilizes its own IP address.
1. Actually new network participant will not have an Internet Protocol (IP) Address.
Then, the Network Admin who is the administrator of BOOTP (Bootstrap
Protocol) gives access to the new network participant to host server. Now, the
new network participant get a distinct or idiosyncratic Internet Protocol (IP)
Address via IPv4 (Internet Protocol version 4) protocol.
2. The client or the new network participant installs the new BOOTP (Bootstrap
Protocol) using TCP / IP (Transmission Control Protocol / Internet Protocol)
mode. This mode arbitration on the user workstation to ensure affinity with all
the network protocols when connected to the certain network.
3. An appropriate unicast address is then included in a message that is sent by the
BOOTP network administrator. The master server then forwards this unicast
address to the BOOTP client.
1. BOOTP (Bootstrap Protocol) is required for system check purpose. The System is
checked for a network when the computer is turned on
2. The motherboard and network management are able to efficiently organize the
data transfer on the device as soon as it lights up since each computer on the
network maintains track of its BIOS (Basic Input / Output System) cycle.
3. BOOTP (Bootstrap Protocol) is highly used for the support of usage of
motherboards and mangers which work on Network. So, because of this
protocol no other means storage is required other than cloud network.
4. In order to send and receive requests and the networking server's suitable
responses, a client and a server communicate using BOOTP (Bootstrap Protocol).
5. BOOTP is typically used in a diskless environment and requires no media
because all data is kept in the network cloud for effective utilization.
1. They do not have the concept of temporary Internet Protocol (IP) Addressing.
2. BOOTP (Bootstrap Protocol) can also have irresolvable errors because of its
configuration. This is because their configuration is manual.
3. BOOTP (Bootstrap Protocol) does not support DHCP (Dynamic Host
Configuration Protocol)
4. BOOTP (Bootstrap Protocol) cannot function for mobile phones and movable
machines.
1.) RARP full form is Reverse Address Resolution Protocol BOOTP full form is Bootstrap
Protocol
2.) This is used by an employee who is using a computer owned by the client. This protocol works on the basis
They are using it request or get the Internet Protocol (IP) Address from of internet. So, this is the reason
cache or gateway server Address Resolution Protocol Table why it is called as an Internet
Protocol (IP). This is used for
allowing the network user to
receive an Internet Protocol (IP)
Address.
3.) The Reverse Address Resolution Protocol was initialized in the year 1984. The BOOTP (Bootstrap Protocol)
This Reverse Address Resolution Protocol is the protocol which is used to was actually introduced in 1985
give the Internet Protocol (IP) Address to the server or desktop or because of Request for
computer etc Comments 951 (also known as
RFC 951) to replace Reverse
Address Resolution Protocol
(RARP).
4.) It is one of the first version introduced for the purpose of Internet Protocol It is introduced as the anomalies
(IP) in RARP (Reverse Address
Resolution Protocol ) were
causing damage to the works.
6.) They are very risky because they are very unstable in nature. They are very secure because
they are very stable in nature
7.) BOOTP is not obsolete because BOOTP and DHCP replaces RARP as it is RARP is very obsolete
very obsolete.
8. The Reverse Address Resolution Protocol is used to transfer data between A great example of a TCP / IP
two sources or two client servers on the Network Access Layer. The (Transmission Control Protocol /
sources have two different addresses. They are Internet Protocol (IP) Internet Protocol) based network
Address and Media Access Control (MAC) Address. is the BOOTP (Bootstrap
The MAC address is then pre-programmed into the hardware once the IP Protocol) network. To quickly
address has been assigned by software. respond to each request a
computer on the network makes
to the server, BOOTP (Bootstrap
Protocol) utilizes its own IP
address.
9. Today, RARP is not in usage. So, they are replaced by BOOTP , DHCP , IPv4 Today, BOOTP (Bootstrap
Protocols. Protocol) is carried out via User
Datagram Protocol (UDP), which
forms the basis for Dynamic Host
Configuration Protocol (DHCP).
Dynamic Host Configuration
Protocol (DHCP) servers handle
client requests
Routing algorithm works only within Routing algorithm works within and between
1. domains. domains.
It need to know only about other routers It need to know only about other routers
2. within their domain. within and between their domain.
Protocols used in intradomain routing are Protocols used in interdomain routing are
3. known as Interior-gateway protocols. known as Exterior-gateway protocols.
In this Routing, routing takes place within In this Routing, routing takes place between
4. an autonomous network. the autonomous networks.
Intradomain routing protocols ignores the Interdomain routing protocol assumes that the
5. internet outside the AS(autonomous internet contains the collection of
system). interconnected AS(autonomous systems).
Some Popular Protocols of this routing are Popular Protocols of this routing is BGP(Border
RIP(routing information protocol) and Gateway Protocol) used to connect two or
6. OSPF(open shortest path first). more AS(autonomous system).