CS-702 (C) WMC-Unit 1
CS-702 (C) WMC-Unit 1
UNIT- 1
Review of traditional networks: Review of LAN, MAN, WAN, Intranet, Internet, and
interconnectivity devices: bridges, Routers etc. Review of TCP/IP Protocol Architecture:
ARP/RARP, IP addressing, IP Datagram format and its Delivery, Routing table format, ICMP
Messages, Subnetting, Supernetting and CIDR, DNS. NAT: Private addressing and NAT, SNAT,
DNAT, NAT and firewalls, VLANS: Concepts, Comparison with Real LANS, Type of VLAN,
Tagging, IPV6: address structure, address space and header.
Limited automation: Traditional networks have limited automation capabilities and require
significant manual intervention.
Rigid architecture: Traditional networks have a rigid, hierarchical architecture that is difficult
to modify or adapt to changing business needs.
The below figure illustrates the architecture of Traditional Network:
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 2
CS-702(C) Wireless &Mobile Computing AIST SAGAR
handled. The application layer consists of software applications that run on top of the SDN
infrastructure.
Benefits of SDN:
SDN offers several key benefits over traditional networking approaches. For example, SDN
allows for more efficient network management, as network administrators can automate many
tasks that would otherwise be done manually. SDN also allows for more flexible and
customizable network configurations, as network infrastructure can be reconfigured on the fly.
Applications of SDN:
SDN has a wide range of applications, from data center networking to wide area networks
(WANs) and even the Internet of Things (IoT).
SDN is particularly useful in situations where network infrastructure needs to be highly flexible
and scalable.
The below figure illustrates architecture Software Defined Network :
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 3
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Both types of networks use standard networking protocols, such as TCP/IP and Ethernet, for
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 4
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Network. Network.
12. In SDN it is easy to troubleshooting and In Traditional network it is difficult to
reporting as it is centralized controlled. troubleshoot and report as it is distributed
controlled.
13. Its maintenance cost is lower than Traditional network maintenance cost is
traditional network. higher than SDN.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 5
CS-702(C) Wireless &Mobile Computing AIST SAGAR
a better speed and higher-quality connectivity opt for MAN. They are very hard to maintain
and design, and their speeds range in terms of Megabytes Per Second (Mbps).
MAN shows lesser fault tolerance and more congestion in the network. It also exhibits a
moderate rate of data transfer and propagation delay. A single organization may or may not
own a MAN, as it is very costly. It makes use of devices like Cable/Wire and Modem for data
transmission. A significant example of a MAN is those telephone company networks that are
capable of providing high-speed lines (DSL) to a cable TV network or customers in any given
city.
WAN It stands for Wide Area Network. It basically extends over large areas, but it might
stay confined within a state or a country’s boundaries. A connection of various LANs may also
constitute a WAN. They may connect to each other using radio waves and telephone lines. A
WAN typically may stay limited to any enterprise (an organization or a corporation) or may
even be accessible to the general public. It comes with a technology that is very expensive and
relatively high-speed.
WANs are basically of two types: Point-to-Point WAN and Switched WAN. It is also very
difficult to maintain as well as design a WAN. The fault tolerance is also very less, just like
MAN, and it brings more congestion in a network. The communication medium deployed for
WAN is the Satellite Link or Public Switched Telephone Network (PSTN). The usual long-
distance transmission leads to a higher error and voice in a WAN.
The data rate concerning a WAN is comparatively slower than LAN- about a tenth of its speed.
It is because of the higher distance that it covers and more number of terminals, servers, etc.
The speed of transmission may range in a WAN from a few Kbps (Kilobits per second) to
Mbps (Megabits per second). One of the biggest issues that WAN faces is the propagation
delay. A few devices that help in data transmission via WAN are: Satellites, Microwaves, and
Optic wires. One example of a Point-to-Point WAN is the dial-up line connecting any home
computer to the Internet. One example of a Switched WAN is the ATM (Asynchronous
Transfer Mode) Network.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 6
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 7
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 8
CS-702(C) Wireless &Mobile Computing AIST SAGAR
INTERCONNECTIVITY DEVICES
Network devices, also known as networking hardware, are physical devices that allow hardware
on a computer network to communicate and interact with one another. For example Repeater,
Hub, Bridge, Switch, Routers, Gateway, Brouter, and NIC, etc.
1. REPEATER – A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted to extend the length to
which the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they not only amplify the signal but also regenerate it. When the signal becomes
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 9
CS-702(C) Wireless &Mobile Computing AIST SAGAR
weak, they copy it bit by bit and regenerate it at its star topology connectors connecting
following the original strength. It is a 2-port device.
2. HUB – A hub is a basically multi-port repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices. In other words,
the collision domain of all hosts connected through Hub remains one. Also, they do not have the
intelligence to find out the best path for data packets which leads to inefficiencies and wastage.
Types of Hub:
Active Hub:- These are the hubs that have their power supply and can clean, boost, and relay
the signal along with the network. It serves both as a repeater as well as a wiring center.
These are used to extend the maximum distance between nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and power supply from the
active hub. These hubs relay signals onto the network without cleaning and boosting them
and can’t be used to extend the distance between nodes.
Intelligent Hub:- It works like an active hub and includes remote management capabilities.
They also provide flexible data rates to network devices. It also enables an administrator to
monitor the traffic passing through the hub and to configure each port in the hub.
3. BRIDGE – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source and destination. It
is also used for interconnecting two LANs working on the same protocol. It has a single input
and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely unaware of
the bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e.
bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the source
station and the frame specifies which route to follow. The host can discover the frame by
sending a special frame called the discovery frame, which spreads through the entire network
using all possible paths to the destination.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 10
CS-702(C) Wireless &Mobile Computing AIST SAGAR
4. SWITCH – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a data link
layer device. The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets selectively to
the correct port only. In other words, the switch divides the collision domain of hosts, but
the broadcast domain remains the same.
Types of Switches:
1. Unmanaged switches: These switches have a simple plug-and-play design and do not
offer advanced configuration options. They are suitable for small networks or for use as
an expansion to a larger network.
2. Managed switches: These switches offer advanced configuration options such as
VLANs, QoS, and link aggregation. They are suitable for larger, more complex networks
and allow for centralized management.
3. Smart switches: These switches have features similar to managed switches but are
typically easier to set up and manage.
They are suitable for small- to medium-sized networks.
4. Layer 2 switches: These switches operate at the Data Link layer of the OSI model and
are responsible for forwarding data between devices on the same network segment.
5. Layer 3 switches: These switches operate at the Network layer of the OSI model and can
route data between different network segments. They are more advanced than Layer 2
switches and are often used in larger, more complex networks.
6. PoE switches: These switches have Power over Ethernet capabilities, which allows them
to supply power to network devices over the same cable that carries data.
7. Gigabit switches: These switches support Gigabit Ethernet speeds, which are faster than
traditional Ethernet speeds.
8. Rack-mounted switches: These switches are designed to be mounted in a server rack
and are suitable for use in data centers or other large networks.
9. Desktop switches: These switches are designed for use on a desktop or in a small office
environment and are typically smaller in size than rack-mounted switches.
10. Modular switches: These switches have modular design, which allows for easy
expansion or customization. They are suitable for large networks and data centers.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 11
CS-702(C) Wireless &Mobile Computing AIST SAGAR
5. ROUTERS – A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally connect LANs and
WANs and have a dynamically updating routing table based on which they make decisions on
routing the data packets. The router divides the broadcast domains of hosts connected through it.
Figure 4 ROUTERS
6. GATEWAY – A gateway, as the name suggests, is a passage to connect two networks that
may work upon different networking models. They work as messenger agents that take data from
one system, interpret it, and transfer it to another system. Gateways are also called protocol
converters and can operate at any network layer. Gateways are generally more complex than
switches or routers. A gateway is also called a protocol converter.
7. BROUTER – It is also known as the bridging router is a device that combines features of
both bridge and router. It can work either at the data link layer or a network layer. Working as a
router, it is capable of routing packets across networks and working as the bridge, it is capable of
filtering local area network traffic.
8. NIC – NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It has a unique id
that is written on the chip, aSnd it has a connector to connect the cable to it. The cable acts as an
interface between the computer and the router or modem. NIC card is a layer 2 device which
means that it works on both the physical and data link layers of the network model.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 12
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 13
CS-702(C) Wireless &Mobile Computing AIST SAGAR
ICMP: ICMP stands for Internet Control Message Protocol. It is encapsulated within IP
datagrams and is responsible for providing hosts with information about network problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to find the hardware address of
a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP, and Inverse ARP.
The Internet Layer is a layer in the Internet Protocol (IP) suite, which is the set of protocols that
define the Internet. The Internet Layer is responsible for routing packets of data from one device
to another across a network. It does this by assigning each device a unique IP address, which is
used to identify the device and determine the route that packets should take to reach it.
4. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and retransmit
missing packets to ensure that packets arrive in order and without error. End-to-end
communication is referred to as such. Transmission Control Protocol (TCP) and User Datagram
Protocol are transport layer protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as though they were physically
Connections between receiving and sending hosts are not verified by UDP. Applications that
transport little amounts of data use UDP rather than TCP because it eliminates the processes
of establishing and validating connections.
5. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end
communication and error-free delivery of data. It shields the upper-layer applications from the
complexities of data. The three main protocols present in this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by the World
Wide Web to manage communications between web browsers and servers. HTTPS stands for
HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 14
CS-702(C) Wireless &Mobile Computing AIST SAGAR
cases where the browser needs to fill out forms, sign in, authenticate, and carry out bank
transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet. The
reason SSH is preferred is because of its ability to maintain the encrypted connection. It sets
up a secure session over a TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank transactions.
Assume the following situation without the presence of NTP. Suppose you carry out a
transaction, where your computer reads the time at 2:30 PM while the server records it at
2:28 PM. The server can crash very badly if it’s out of sync.
Difference between TCP/IP and OSI Model
TCP/IP OSI
TCP refers to Transmission Control Protocol. OSI refers to Open Systems
Interconnection.
TCP/IP uses both the session and presentation OSI uses different session and presentation
layer in the application layer itself. layers.
TCP/IP follows connectionless a horizontal OSI follows a vertical approach.
approach.
The Transport layer in TCP/IP does not provide In the OSI model, the transport layer
assurance delivery of packets. provides assurance delivery of packets.
Protocols cannot be replaced easily in TCP/IP While in the OSI model, Protocols are better
model. covered and are easy to replace with the
technology change.
TCP/IP model network layer only provides Connectionless and connection-oriented
connectionless (IP) services. The transport layer services are provided by the network layer
(TCP) provides connections. in the OSI model.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 15
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 16
CS-702(C) Wireless &Mobile Computing AIST SAGAR
IPAddress
An Internet Protocol (IP) address is a unique numerical identifier for every device or network
that connects to the internet. Typically assigned by an internet service provider (ISP), an IP
address is an online device address used for communicating across the internet.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 17
CS-702(C) Wireless &Mobile Computing AIST SAGAR
IPv4
IPv4 address consists of two things that are the network address and the host address. It stands
for Internet Protocol version four. It was introduced in 1981 by DARPA and was the first
deployed version in 1982 for production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation. It is
represented by 4 numbers separated by dots in the range of 0-255, which have to be converted to
0 and 1, to be understood by Computers. For Example, An IPv4 Address can be written
as 189.123.123.90.IPv4 Address
Format is a 32-bit Address that comprises binary digits separated by a dot (.).
IPv6
IPv6 is based on IPv4 and stands for Internet Protocol version 6. It was first introduced in
December 1995 by Internet Engineering Task Force. IP version 6 is the new version of Internet
Protocol, which is way better than IP version 4 in terms of complexity and efficiency. IPv6 is
written as a group of 8 hexadecimal numbers separated by colon (:). It can be written as 128 bits
of 0s and 1s.
Benefits of
IPv6 : The recent Version of IP (IPv6 has a greater advantage over IPv4).
Larger Address Space: IPv6 has a greater address space than IPv4, which is required for
expanding the IP Connected Devices. IPv6 has 128 bit IP Address rather and IPv4 has a 32-
bit Address.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 18
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Improved Security: IPv6 has some improved security which is built in with it. IPv6 offers
security like Data Authentication, Data Encryption, etc. Here, an Internet Connection is more
Secure.
Simplified Header Format: As compared to IPv4, IPv6 has a simpler and more effective
header Structure, which is more cost-effective and also increases the speed of Internet
Connection.
Prioritize: IPv6 contains stronger and more reliable support for QoS features, which helps in
increasing traffic over websites and increases audio and video quality on pages.
Improved Support for Mobile Devices: IPv6 has increased and better support for Mobile
Devices. It helps in making quick connections over other Mobile Devices and in a safer way
than IPv4.
Difference Between IPv4 and IPv6
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration
In IPv4 end to end, connection integrity is In IPv6 end-to-end, connection integrity is
Unachievable Achievable
It can generate 4.29×109 address space The address space of IPv6 is quite large it can
produce 3.4×1038 address space
The Security feature is dependent on the IPSEC is an inbuilt security feature in the IPv6
application protocol
Address representation of IPv4 is in decimal Address Representation of IPv6 is in
hexadecimal
Fragmentation performed by Sender and In IPv6 fragmentation is performed only by the
forwarding routers sender
In IPv4 Packet flow identification is not In IPv6 packet flow identification are Available
available and uses the flow label field in the header
In IPv4 checksum field is available In IPv6 checksum field is not available
It has a broadcast Message Transmission In IPv6 multicast and anycast message
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 19
CS-702(C) Wireless &Mobile Computing AIST SAGAR
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are separated IPv6 consists of 8 fields, which are separated by
by addresses dot (.) a colon (:)
IPv4’s IP addresses are divided into five IPv6 does not have any classes of the IP
different classes. Class A , Class B, Class C, address.
Class Da , Class E.
IPv4 supports VLSM(Variable Length subnet IPv6 does not support VLSM.
mask).
Example of IPv4: 66.94.29.13 2001:0000:3238:DFE1:0063:0000:0000:FEFB
Routing Table:
A routing table is a set of rules, often viewed in table format, that is used to determine where
data packets traveling over an Internet Protocol (IP) network will be directed. All IP-enabled
devices, including routers and switches, use routing tables.
Entries of an IP Routing Table:
A routing table contains the information necessary to forward a packet along the best path
toward its destination. Each packet contains information about its origin and destination. Routing
Table provides the device with instructions for sending the packet to the next hop on its route
across the network.
Each entry in the routing table consists of the following entries:
1. Network ID: The network ID or destination corresponding to the route.
2. Subnet Mask: The mask that is used to match a destination IP address to the network ID.
3. Next Hop: The IP address to which the packet is forwarded
4. Outgoing Interface: Outgoing interface the packet should go out to reach the destination
network.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 20
CS-702(C) Wireless &Mobile Computing AIST SAGAR
5. Metric: A common use of the metric is to indicate the minimum number of hops (routers
crossed) to the network ID.
Routing table entries can be used to store the following types of routes:
Directly Attached Network IDs
Remote Network IDs
Host Routes
Default Route
Destination
There are ways to maintain Routing Table:
Directly connected networks are added automatically.
Using Static Routing.
Using Dynamic Routing.
These Routing tables can be maintained manually or dynamically. In dynamic routing, devices
build and maintain their routing tables automatically by using routing protocols to exchange
information about the surrounding network topology. Dynamic routing tables allow devices to
“listen” to the network and respond to occurrences like device failures and network congestion.
Tables for static network devices do not change unless a network administrator manually
changes them.
ICMP Messages
Internet Control Message Protocol (ICMP) is a network layer protocol used to diagnose
communication errors by performing an error control mechanism. Since IP does not have an
inbuilt mechanism for sending error and control messages. It depends on Internet Control
Message Protocol(ICMP) to provide error control.
ICMP is used for reporting errors and management queries. It is a supporting protocol and is
used by network devices like routers for sending error messages and operations information.
* ICMP packets are transmitted in the form of datagrams that contain an IP header with ICMP
data. ICMP datagram is similar to a packet, which is an independent data entity.
ICMP Packet Format: ICMP header comes after IPv4 and IPv6 packet header.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 21
CS-702(C) Wireless &Mobile Computing AIST SAGAR
In the ICMP packet format, the first 32 bits of the packet contain three fields:
Type (8-bit): The initial 8-bit of the packet is for message type, it provides a brief description of
the message so that receiving network would know what kind of message it is receiving and how
to respond to it. Some common message types are as follows:
Type 0 – Echo reply Type 8 – Echo Request
Type 3 – Destination unreachable Type 11 – Time Exceeded
Type 5 – Redirect Message Type 12 – Parameter problem
Code (8-bit): Code is the next 8 bits of the ICMP packet format, this field carries some
additional information about the error message and type.
Checksum (16-bit): Last 16 bits are for the checksum field in the ICMP packet header.
The checksum is used to check the number of bits of the complete message and enable the ICMP
tool to ensure that complete data is delivered.
The next 32 bits of the ICMP Header are Extended Header which has the work of pointing out
the problem in IP Message. Byte locations are identified by the pointer which causes the problem
message and receiving device looks here for pointing to the problem.
The last part of the ICMP packet is Data or Payload of variable length. The bytes included in
IPv4 are 576 bytes and in IPv6, 1280 bytes.
SUBNETTING & SUPERNETTING
Subnetting is the procedure to divide the network into sub-networks or small networks, these
smaller networks are known as subnets. The subnet is also defined as an internal address made
up of a combination of a small network and host segments. In a subnet, a few bits from the host
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 22
CS-702(C) Wireless &Mobile Computing AIST SAGAR
portion are used to design small-sized subnetworks from the original network. In subnetting,
network bits are converted into host bits.
Supernetting is the procedure to combine small networks into larger spaces. In subnetting,
Network addresses’ bits are increased. on the other hand, in supernetting, Host addresses’ bits
are increased. Subnetting is implemented via Variable-length subnet masking, While super
netting is implemented via Classless inter domain routing.
Difference between Subnetting and Supernetting
Subnetting Supernetting
Subnetting is the procedure to divide the While supernetting is the procedure of combining
network into sub-networks. small networks.
In subnetting, Network addresses’ bits are While in supernetting, Host addresses’ bits are
increased. increased.
In subnetting, The mask bits are moved While In supernetting, The mask bits are moved
towards the right. towards the left.
Subnetting is implemented via Variable- While supernetting is implemented via Classless
length subnet masking. interdomain routing.
In subnetting, Address depletion is reduced While It is used for simplifying the routing
or removed. process.
Advantages of subnetting
1. Effective IP address use: Subnetting enables the division of a large network into smaller
subnets, which aids in the efficient use of IP address allocation. It lessens IP address wastage
and enables organizations to allocate IP addresses in accordance with their unique
requirements.
2. Subnetting can help reduce network congestion and enhance overall network performance by
breaking up a large network into smaller subnets. Smaller subnets improve the efficiency of
routing and switching operations and allow for better network traffic control.
3. Increased network security: Subnetting makes it possible to implement security measures
more precisely. Organizations can improve security by controlling access between subnets
and implementing firewall rules by isolating various subnets from one another.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 23
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Disadvantages of subnetting
1. Complexity: Subnetting can make network configuration and design more complicated. It
can be difficult, especially for large networks, to choose the right subnet sizes, plan IP
address ranges, and manage routing between subnets.
2. Subnetting requires more administrative work, especially when adding new subnets or
changing the configuration of existing ones. In addition to maintaining routing tables and
ensuring proper connectivity between subnets, it entails managing IP address ranges.
Advantages of supernetting
1. Supernetting enables the consolidation of several smaller networks into a single, larger
network block, which reduces the size of the routing table and maximizes the use of IP
address space.
2. Routing can be made easier by combining several smaller networks into a supernet because
fewer routing updates and table entries are required. This may result in increased routing
effectiveness and decreased router overhead.
3. A reduced number of routing lookups needed for packet forwarding thanks to supernetting
can help improve network performance. As a result, packet processing may be accelerated
and latency may be decreased.
Disadvantages of supernetting
1. Loss of network granularity: Supernetting involves aggregating multiple networks into larger
network blocks. This can result in a loss of granularity, making it more challenging to
implement fine-grained network management, security policies, and traffic control.
2. Increased risk of network failures: If a single supernet experiences a network failure, it can
affect multiple smaller networks within that supernet. This makes troubleshooting and
isolating network issues more complex.
3. Limited flexibility: Supernetting requires careful planning and coordination to ensure that the
aggregated networks have compatible address ranges. It may limit the ability to make
independent changes to individual subnets within a supernet without affecting the entire
supernet.
CIDR
Classless Inter-Domain Routing (CIDR) is a method of IP address allocation and IP routing that
allows for more efficient use of IP addresses. CIDR is based on the idea that IP addresses can be
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 24
CS-702(C) Wireless &Mobile Computing AIST SAGAR
allocated and routed based on their network prefix rather than their class, which was the
traditional way of IP address allocation.
CIDR addresses are represented using a slash notation, which specifies the number of bits in the
network prefix.
CIDR addresses are made up of two sets of numbers:
1. Prefix. The prefix is the binary representation of the network address -- similar to what
would be seen in a normal IP address.
2. Suffix. The suffix declares the total number of bits in the entire address.
For example, CIDR notation might look like: 192.168.129.23/17 -- with 17 being the number of
bits in the address. IPv4 addresses support a maximum of 32 bits.
The same CIDR notation can be applied to IPv6 addresses. The only difference is IPv6 addresses
can contain up to 128 bits.
Advantages:
1. Efficient use of IP addresses: CIDR allows for more efficient use of IP addresses, which
is important as the pool of available IPv4 addresses continues to shrink.
2. Flexibility: CIDR allows for more flexible allocation of IP addresses, which can be
important for organizations with complex network requirements.
3. Better routing: CIDR allows for more efficient routing of IP traffic, which can lead to
better network performance. Reduced administrative overhead: CIDR reduces
administrative overhead by allowing for easier management of IP addresses and routing.
Disadvantages:
1. Complexity: CIDR can be more complex to implement and manage than traditional class-
based addressing, which can require additional training and expertise.
2. Compatibility issues: Some older network devices may not be compatible with CIDR,
which can make it difficult to transition to a CIDR-based network.
3. Security concerns: CIDR can make it more difficult to implement security measures such
as firewall rules and access control lists, which can increase security risks.
4. Overall, CIDR is a useful and efficient method of IP address allocation and routing, but it
may not be suitable for all organizations or networks. It is important to weigh the
advantages and disadvantages of CIDR and consider the specific needs and requirements
of your network before implementing CIDR.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 25
CS-702(C) Wireless &Mobile Computing AIST SAGAR
DNS
The Domain Name System (DNS) is a hierarchical and distributed naming system
for computers, services, and other resources in the Internet or other Internet Protocol (IP)
networks. It associates various information with domain names (identification strings) assigned
to each of the associated entities. Most prominently, it translates readily memorized domain
names to the numerical IP addresses needed for locating and identifying computer services and
devices with the underlying network protocols. The Domain Name System has been an essential
component of the functionality of the Internet since 1985.
The Domain Name System delegates the responsibility of assigning domain names and mapping
those names to Internet resources by designating authoritative name servers for each domain.
Network administrators may delegate authority over sub-domains of their allocated name space
to other name servers. This mechanism provides distributed and fault-tolerant service and was
designed to avoid a single large central database.
Network Address Translation (NAT)
To access the Internet, one public IP address is needed, but we can use a private IP address in our
private network. The idea of NAT is to allow multiple devices to access the Internet through a
single public address. To achieve this, the translation of a private IP address to a public IP
address is required. Network Address Translation (NAT) is a process in which one or more local
IP address is translated into one or more Global IP address and vice versa in order to provide
Internet access to the local hosts. Also, it does the translation of port numbers i.e. masks the port
number of the host with another port number, in the packet that will be routed to the destination.
It then makes the corresponding entries of IP address and port number in the NAT table. NAT
generally operates on a router or firewall.
Advantages of NAT –
o NAT conserves legally registered IP addresses.
o It provides privacy as the device’s IP address, sending and receiving the traffic, will be
hidden.
o Eliminates address renumbering when a network evolves.
Disadvantage of NAT –
o Translation results in switching path delays.
o Certain applications will not function while NAT is enabled.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 26
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 27
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 28
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Figure 12 FIREWALL
Virtual LAN (VLAN): Is a concept in which we can divide the devices logically on layer 2
(data link layer). Generally, layer 3 devices divide the broadcast domain but the broadcast
domain can be divided by switches using the concept of VLAN.
A broadcast domain is a network segment in which if a device broadcast a packet then all the
devices in the same broadcast domain will receive it. The devices in the same broadcast domain
will receive all the broadcast packets but it is limited to switches only as routers don’t forward
out the broadcast packet. To forward out the packets to different VLAN (from one VLAN to
another) or broadcast domains, inter Vlan routing is needed. Through VLAN, different small-
size sub-networks are created which are comparatively easy to handle.
VLANs offer several features and benefits
Improved network security
Better network performance
Simplified network management
Flexibility & Scalability
Cost savings
Types Of VLANs Depending On The Type Of Network They Carry:
Default VLAN – When the switch initially starts up, all switch ports become a member of the
default VLAN (generally all switches have default VLAN named as VLAN 1), which makes
them all part of the same broadcast domain. Using default VLAN allows any network device
connected to any of the switch port to connect with other devices on other switch ports. One
unique feature of Default VLAN is that it can’t be renamed or delete.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 29
CS-702(C) Wireless &Mobile Computing AIST SAGAR
Data VLAN – Data VLAN is used to divide the whole network into 2 groups. One group of
users and other group of devices. This VLAN also known as a user VLAN, the data VLAN is
used only for user-generated data. This VLAN carrying data only. It is not used for carrying
management traffic or voice.
Voice VLAN – Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly
given high transmission priority over other types of network traffic. To ensure voice over IP
(VoIP) quality (delay of less than 150 milliseconds (ms) across the network), we must have
separate voice VLAN as this will preserve bandwidth for other applications.
Management VLAN – A management VLAN is configured to access the management
capabilities of a switch (traffic like system logging, monitoring). VLAN 1 is the management
VLAN by default (VLAN 1 would be a bad choice for the management VLAN). Any of a switch
VLAN could be define as the management VLAN if admin has not configured a unique VLAN
to serve as the management VLAN. This VLAN ensures that bandwidth for management will be
available even when user traffic is high.
Native VLAN – This VLAN identifies traffic coming from each end of a trunk link. A native
VLAN is allocated only to an 802.1Q trunk port. The 802.1Q trunk port places untagged traffic
(traffic that does not come from any VLAN) on the native VLAN. It is best to configure the
native VLAN as an unused VLAN.
Port-based VLAN- In a port-based VLAN, each port on an organization switch is relegated
to a particular VLAN. All traffic on that port is then naturally appointed to the VLAN related
with that port.
Tagged VLAN- A Tagged VLAN is utilized to help different VLANs on a solitary actual
port. In this kind of VLAN, every parcel is labeled with a VLAN ID, which recognizes the
VLAN to which it has a place. This permits different VLANs to be persisted in a solitary actual
port.
Protocol-based VLAN- A protocol-based VLAN utilizes Layer 3 convention data to dole out
bundles to a VLAN. For instance, all traffic for a particular convention, like IPX, could be
relegated to a particular VLAN. This kind of VLAN is less ordinarily utilized contrasted with
port-based and labeled VLANs.
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 30
CS-702(C) Wireless &Mobile Computing AIST SAGAR
TAGGING
VLAN tagging is a method through which more than one VLAN is handled on a port.
VLAN tagging is used to tell which packet belongs to which VLAN on the other
side. To make recognition easier, a packet is tagged with a VLAN tag in the Ethernet
frame. Independent logical systems can be formed accurately with the help of
the VLAN tagging inside a physical network itself. Individual domains can be
created with the help of this VLAN tagging system.
___________________________*****___________________________
Mr. Vaibhav Jain, Asst. Professor, Department of Computer Science & Engineering Page 31