Unit 1 Wirelwss & Mobile Computing
Unit 1 Wirelwss & Mobile Computing
Review of LAN
Defini on: A LAN is a network confined to a small geographical area, such as a building, office, or
campus.
Characteris cs:
Applica ons: Office environments, schools, and homes for sharing printers, files, and local resources.
Review of MAN
Defini on: A MAN spans a larger geographic area than a LAN, o en covering a city or town.
Characteris cs:
Applica ons: Connec ng mul ple branches of a business in a city or linking university campuses.
Review of WAN
Defini on: A WAN spans a large geographic area, o en na onwide or worldwide, connec ng mul ple
smaller networks like LANs and MANs.
Characteris cs:
Relies on external service providers (e.g., ISPs).
Review of internet
Definition: The internet is a global WAN connecting billions of devices worldwide, allowing
data exchange and communication.
Characteristics:
a) Bridge
Defini on: A bridge is a network device that connects and filters data between two or more LANs.
Characteris cs:
Helps reduce network traffic by filtering and forwarding data to the intended segment.
b) Routers
Defini on: A router connects mul ple networks (LANs, WANs, or the internet) and determines the
best path for data packets.
Characteris cs:
Example: A home router connec ng your local network to the ISP's network for internet access.
1) ARP/RARP
ARP (Address Resolu on Protocol):
Operates at the network layer to ensure devices in the same LAN can communicate.
O en used by diskless systems to retrieve their IP from a central server during boot.
2) IP
Purpose: IP is the primary protocol for rou ng and addressing packets in a network.
Features:
3. Type of Service (TOS): Defines the quality of service (e.g., priority, delay).
5. Iden fica on, Flags, and Fragment Offset: For fragmenta on and reassembly.
Delivery:
Packets are routed from the source to the des na on based on their IP headers using rou ng
tables.
5) ICMP Message
Purpose: ICMP is used for network diagnos cs and error repor ng.
2. Des na on Unreachable: Indicates the packet cannot reach its des na on.
6) Subnetting
Defini on: Subne ng divides a large network into smaller, manageable sub-networks.
Purpose:
7) Superneting
Defini on: Combines smaller networks into a larger one, reducing the number of entries in rou ng
tables.
Purpose:
8) CIDR
Defini on: CIDR is a method of IP address alloca on and rou ng that replaces tradi onal class-based
addressing.
Format: IP address followed by a slash and the prefix length (e.g., 192.168.0.0/16).
Purpose:
9) DNS
Purpose: Translates human-readable domain names (e.g., www.google.com) into IP addresses (e.g.,
142.250.190.78).
Components:
3. DNS Records:
NAT
Network Address Transla on (NAT) is a method used in networking to map private IP addresses within a
local network to a single public IP address or a pool of public IPs. This allows mul ple devices to share
one public IP for internet communica on, enhancing security and conserving IPv4 addresses.
Example:
A device with IP 192.168.1.5 is assigned a public IP 203.0.113.1 by the NAT device when
accessing the internet.
4) SNAT
Defini on: SNAT modifies the source IP address of outgoing packets from private to public, allowing
devices within a private network to communicate externally.
Purpose:
Process:
The private IP of the source device is replaced with a public IP from the NAT router.
Example:
5) DNAT
Defini on: DNAT modifies the des na on IP address of incoming packets, o en used to redirect traffic
to a specific server inside a private network.
Purpose:
Facilitates hos ng of services like web or mail servers behind a NAT device.
Process:
The NAT device replaces the public des na on IP with the private IP of the internal server.
Example:
By hiding internal IP addresses, NAT provides a layer of obscurity, reducing exposure to external
threats.
Key Features:
1. Packet Filtering: Firewalls inspect packets and enforce security policies, ensuring only authorized
traffic is translated by NAT.
2. Port Forwarding: Allows specific traffic (e.g., HTTP, FTP) through NAT to internal servers.
3. Stateful Inspec on: Firewalls track NAT sessions and maintain a state table for returning traffic.
Example:
A NAT-enabled firewall allows outgoing web traffic but blocks unsolicited incoming requests,
protec ng internal devices.
VLAN
VLANs allow the crea on of separate logical networks within a single physical network infrastructure.
They improve network segmenta on, security, and management by logically grouping devices based on
func on, department, or project rather than physical loca on
o All devices connected to the same switch belong to a single broadcast domain.
o This setup leads to broadcast storms and inefficient network traffic as every device
receives broadcast traffic.
o VLANs divide a physical LAN into mul ple logical broadcast domains.
o Devices within the same VLAN communicate directly, even if connected to different
switches, but devices in different VLANs require a router for communica on.
Example:
A company has three departments:
Finance
HR
IT
Using VLANs, each department is assigned a separate VLAN (e.g., VLAN 10 for Finance, VLAN 20
for HR, and VLAN 30 for IT), isola ng their traffic for security and performance while using the
same physical switch infrastructure.
2) Type of VLANS
1 Default VLAN:
a. All ports are part of a single VLAN by default (usually VLAN 1).
b. Used for untagged traffic and management purposes.
2 Data VLAN:
a. Carries user-generated traffic, such as data from computers or printers.
b. Used to logically separate departments or functions.
3 Voice VLAN:
a. Dedicated for VoIP (Voice over IP) traffic.
b. Ensures prioritization of voice traffic over data traffic for better call quality.
4 Management VLAN:
a. Used to manage network devices (e.g., switches, routers).
b. Improves security by isolating management traffic.
5 Native VLAN:
a. Handles untagged traffic on trunk ports (used for backward compatibility).
6 Private VLAN:
a. Allows further segmentation within a VLAN for enhanced isolation.
b. Example: Isolating servers within the same VLAN to restrict access.
3) TAGGING
Tagging refers to the process of adding a VLAN iden fier (VLAN ID) to Ethernet frames to indicate which
VLAN the frame belongs to.
VLAN Tagging:
o Frames traveling between VLAN-aware devices (e.g., switches) on a trunk link are tagged
with a VLAN ID.
Untagged Frames:
o Frames without VLAN tags are assigned to the na ve VLAN on trunk ports.
Example of Tagging:
A switch receiving a frame on a port assigned to VLAN 20 tags the frame with VLAN ID 20 before
forwarding it over a trunk link.
Aspect Details
Concept with Real VLANs segment a network logically, reducing broadcast domains and improving
LANs traffic management.
Types of VLANs Default, Data, Voice, Management, Na ve, and Private VLANs.
Tagging Adds a VLAN ID to Ethernet frames using the 802.1Q standard for inter-VLAN
communica on.
IPV6
IPv6 is the successor to IPv4, designed to address the limita ons of IPv4, such as the exhaus on of
available IP addresses. It introduces a larger addressing space, simplified header structure, and enhanced
features for efficient rou ng and security.
1) Addressing structure
IPv6 addresses are 128-bit iden fiers wri en in hexadecimal format, separated by colons (:). Each
address consists of 8 groups, each containing 16 bits.
Format:
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
Each x represents a hexadecimal digit (0–F), and each group (16 bits) is separated by a colon.
Address Types:
1. Unicast:
2. Mul cast:
Iden fies a group of devices; packets are delivered to all members of the group.
Prefix: FF00::/8.
3. Anycast:
Iden fies mul ple interfaces but delivers packets to the nearest one based on
rou ng.
IPv6 provides 2^128 addresses (approximately 340 undecillion), vastly exceeding the 2^32
addresses of IPv4.
This large space supports billions of devices, subne ng, and efficient address alloca on.
IPv6 Header: IPv6 simplifies the header structure compared to IPv4, enhancing processing efficiency. The
header is fixed at 40 bytes, regardless of addi onal op ons.
2. Traffic Class (8 bits): Specifies the priority of the packet (similar to Type of Service in IPv4).
3. Flow Label (20 bits): Iden fies a flow for special handling, such as real- me traffic.
4. Payload Length (16 bits): Specifies the length of the data following the header.
5. Next Header (8 bits): Iden fies the protocol used in the payload (e.g., TCP, UDP).
Flow Label 20 bits Iden fies packet flows requiring special handling.
Next Header 8 bits Protocol iden fier for payload (e.g., TCP = 6).
IPv6 addresses and headers provide scalability and efficiency, mee ng the growing demands of modern
networking.