Data Communication and Computer Networking
Data Communication and Computer Networking
A metropolitan area network (MAN) is a 3) Technologies :- LANs and WANs can use a
computer network that covers a larger variety of wired and wireless technologies to
geographical area than a local area network connect devices , including Ethernet , WiFi , and
(LAN) but smaller than a wide area network fiber – optic cables. WANs typically use
(WAN). A MAN typically spans a city or a region specialized technologies such as leased lines ,
and connects multiple LANs with in that area. A satellite links and VPNs to connect and remote
MAN is typically owned by a single organization locations.
or service provider , such as a government
agency or tele-communicatios company , and is 4) performance :- LANS and MANs typically offer
used to connect multiple sites or buildings in a higher performance and lower latency (latency
metropolitan area. refers to the delay that occurs when data is
transmitted between devices over a network) than
MANs can be set up using a variety of WANs due to their smaller geographic area and
technologies including Ethernet , fiber-optic more direct connections. WANs may experience
cables , microwave links , and wireless greater latency and slower speeds due to the
technologies such as Wifi. They are typically longer distances and more complex routing
faster and more reliable than WANs , which involved in connecting remote locations.
cover larger geographic areas and may require
leased lines or other technologies to connect NETWORK CONFIGURATION :-
remote locations.
All networks have certain components , functions
MANS are commonly used by business and and features In common , these include :-
organizations that have multiple sites or branches
in a metropolitan area , such as universities , Servers – computers that provide shared resources
hospitals , government agencies and large for network users
corporations. They allow these organizations to
share resources and data across multiple locations Clients – computers that access shared resources
, improving collaboration and productivity. provided by servers
The main difference between LANs , MANs , and ➔ peer to peer networks
WANs are their size , scope and the technologies ➔ server based networks
used to connect devices. Here are some of the
key differences and similarities. Factors that must be evaluated to configure a
network as peer to peer or server based
1) Size :- LANs are the smallest of the three
networks , typically covering a single building or The type of network you choose to implement
campus. MANs cover a larger geographic area will depend on factors such as the
such as a city or region , and WANs can span
countries or even the world. ➔ Size of the organization
➔ Level of security required
➔ Types of business A network may have separate servers for file
➔ Level of administrative support available storage , printing , email and for storing and
➔ Amount of network traffic running application software.
➔ Needs of the network users
➔ Network budget 1) File and Print servers
2) Application servers
Peer – to – Peer Networks 3) Mail servers
4) Fax servers
In a peer to peer network , there is no dedicated 5) Communication servers
servers , and there is no hierarchy among the 6) Directory services
computers. All the computers are equal and
therefore are known as peers. Each computer Although it is more complex to install , configure
functions as both a client and a server , and ,and manage , a server - based network has
there is no administrator responsible for the many advantages over a simple peer to peer
entire network. The user at each computer network.
determines what data on that computer is shared
on the network. Number of users :- It supports large number of
users
Peer to peer networks are relatively simple ,
because each computer functions as a client and Server–based data sharing can be centrally
as a server , there is no need for a powerful administered and controlled :-, because these
central server or for other components required shared resources are centrally located , they are
for a high capacity network. Peer to peer easier to find and support than resources on
networks can be less expensive than server-based individual computers.
networks.
Security :- is often the primary reason for
Peer to peer networks are good choices for choosing a server – based approach to
environments where :- networking. In server-based environment , one
administrator who sets the policy and applies it
➢ There are 10 users or fewer to every user on the network can manage
➢ Users share resources , such as printers security.
but no specialized servers exist
➢ Security is not an issue Backups can be scheduled several times a day or
once a week depending on the importance and
value of the data. Server back ups can be
Server Based Networks :- scheduled to occur automatically , according to a
predetermined schedule , even if the servers are
In an environment with more than 10 users , a located on different parts of the network.
peer-to-peer network – with computers acting as
both servers and clients will probably not be A server – based network can support thousands
adequate. Therefore , most networks have a of users. This type of network would be
dedicated servers. A dedicated server is one that impossible to manage as a peer to peer network.
functions only as a server and is not used as a
client.
In the star topology , cable segments from each The ring topology connects computers on a single
computer are connected to a centralized circle of cable. Unlike the bus topology , there
component called a hub. Figure 2 shows four are no terminated ends. The signals travel around
computers and a hub connected in a star the loop in one directions and pass through each
topology. Signals are transmitted from sending computer , which can act as a repeater to boost
computer through the hub to all computers on the signal and send it on the next computer.
the network. Figure 3 shows a typical ring topology with one
server and four work stations. The failure of one
computer can have an impact on the entire
network.
Hybrid Topology :- Many working topologies are 4. Text: Text data represents characters and
hybrid combinations of the bus , star , ring and symbols using a standardized encoding
mesh topologies. Two of the common are system, such as ASCII (American Standard
described below. Code for Information Interchange) or
Unicode. Each character is assigned a
Start bus topology :- The star bus is a
unique numeric value, allowing computers
combination of the bus and star topologies ,
several start topology networks are linked to store, process, and display text-based
together with linear bus trunks. information. Text data can include letters,
numbers, punctuation marks, and special
characters. For example, the uppercase
DATA REPRESENTATION TECHNIQUES letter 'A' is assigned the code 65, the
lowercase letter 'a' is assigned the code
Data representation refers to the methods used to
97, and so on.
represent different types of information in a
computer system. Computers store and process 5. Graphics: Graphics data represents visual
data in various formats, including numeric data, images, such as drawings, photographs,
text, executable files, images, audio, video, and icons, and animations. Graphics are
more. However, these different types of data typically stored in formats like JPEG,
appear distinct to us as humans. PNG, GIF, or BMP. These formats use
various techniques to encode and
Here are some common methods of data
compress visual information, allowing it
representation in data communication:
to be stored and displayed on computer
1. Decimal Numbers: Decimal numbers are screens.
the numbers we are most familiar with in
Each method of data representation has its own
our everyday lives. They use a base-10
advantages and use cases. The appropriate
system, meaning they consist of ten digits
representation depends on the type of data being
(0-9). Decimal numbers represent
handled and the specific requirements of the
quantities in terms of units, tens,
application or system. Effective data
hundreds, and so on.
representation is essential for accurate
2. Binary Numbers: Binary numbers use a communication and efficient processing of
base-2 system and consist of only two information in computer systems.
digits, 0 and 1. Computers internally
represent and process data in binary
format. Each digit in a binary number is
called a bit, and a sequence of bits forms
bytes, which are the basic units of storage
in computers.
TRANSMISSION IMPAIRMENTS
When we transmit signals over a communication
link, there can be some problems that affect the
quality of the signal. These problems are known
as transmission impairments and can occur in
both analog and digital signals. There are three
main types of transmission impairments:
Digital data transmission involves sending attenuation, delay distortion, and noise.
and receiving digital data, which is represented 1. Attenuation: Attenuation happens when
by discrete signals or digital bit streams. The the strength of the signal decreases as it
data originates from a source device and is travels over a distance. This can make the
transmitted over a communication medium, such signal weaker and harder to understand.
as copper wires, wireless carriers, or optical fiber,
to reach the destination device. The digital data • We need the received signal to be
is composed of binary digits (bits), which can be strong enough for the receiver to
either 0 or 1. These bits are combined to understand it. We can use
represent different types of information, such as amplifiers or repeaters to boost
text, images, audio, or video. the signal strength.
Analog transmission, on the other hand, 2. Delay Distortion: Delay distortion occurs
involves conveying voice, data, images, signals, because different frequencies in a signal
or video information using continuous signals that can travel at slightly different speeds
vary in amplitude, phase, or another property. through a transmission medium. This can
An analog signal is characterized by its cause the signal to become distorted or
continuous variation along amplitude and arrive at different times. To fix this, we
frequency. For example, in telephony, when you can use equalization techniques to smooth
speak into a handset, the changes in air pressure out the distortion.
are converted into electrical signals that represent
3. Noise: Noise refers to unwanted signals
the voice pattern. These signals are analog in
that interfere with the transmission and
nature because they continuously vary.
reception of the intended signal. There
are different types of noise:
• Thermal noise: This noise is There are three main data transmission modes
caused by the random motion of based on the direction of information exchange:
electrons due to temperature. It
1. Simplex: In simplex mode, data can only
cannot be eliminated completely
flow in one direction, which means the
and is directly related to the
communication is unidirectional. The
temperature and bandwidth of the
sender can only send data, while the
system.
receiver can only receive it. Two-way
communication is not possible in this
• Crosstalk: Crosstalk occurs when
mode. Simplex mode is commonly used in
signals from one communication
situations where there is no need for a
channel leak into another nearby
corresponding reply. Examples include
channel. This can happen in
radio and TV transmissions, keyboards,
twisted pair cables or microwave
and mice.
antennas and can cause
interference or overlap of signals. Keyboards and mice generally use simplex
communication, which is a type of data
transmission mode where data only travels in one
Impairments can affect the quality and reliability
direction - from the device (keyboard or mouse)
of data transmission. To mitigate their effects,
to the computer.
various techniques and technologies are used,
such as amplifiers, equalizers, and error- In a typical computer setup, the mouse and
correcting codes. By understanding these keyboard don't need to receive data from the
impairments and implementing appropriate computer under normal operation - they only
solutions, we can improve the performance of need to send signals to it. For example, when
communication systems. you press a key on your keyboard, it sends a
signal to your computer indicating which key was
DATA TRANSMISSION MODES pressed. The computer then interprets this signal
and carries out the appropriate action (well it
Data transmission mode refers to the direction in will do some operation but it does not reply back
which information flows between two to the keyboard). The same thing happens when
communication devices. It determines how data is you move your mouse or click one of its buttons.
exchanged and synchronized in a computer
network. However, in some more advanced or specialized
situations, a keyboard or mouse might also
receive data from the computer, such as for
configuration purposes or to control lighting on
RGB keyboards and mice. In these cases, the
communication would be duplex, not simplex.
Still, for the majority of usage, keyboards and
mice operate using simplex communication.
Synchronization and Asynchronous Transmission Serial transmission: In this mode, data is sent one
bit at a time over a single transmission line. It's
like sending a series of letters, one after the
other, through a narrow tunnel. The sender and
receiver need to be synchronized to ensure the
data is received correctly. This mode is used for
long-distance communication or when the amount
of data being sent is small.
When selecting a data transmission mode, several Set of Rules (Protocol): In order for communication
factors need to be considered: to take place successfully, a set of rules and
procedures called a protocol needs to be
• Transmission rate: How quickly data can
established. Protocols define how the sender and
be sent and received.
receiver should communicate, including the
format of the message, error handling, data flow
• Distance: The maximum distance over
control, and other aspects of the communication
which data can be reliably transmitted.
process. Without a protocol, devices may not be
able to understand each other and communication
• Cost and ease of installation: The expense
would not be possible.
and difficulty involved in setting up the
transmission system. The elements mentioned above work together to
enable effective data communication between
• Resistance to environmental conditions: devices. For example, when sending an email, the
The ability of the transmission system to sender acts as the source, the message is the
withstand and perform well in different content of the email, the receiver is the intended
environments. recipient, the internet connection serves as the
transmission medium, and protocols like SMTP
By considering these factors, the most appropriate
(Simple Mail Transfer Protocol) govern the rules
transmission mode can be chosen for a specific
for sending and receiving emails.
network communication requirement.
In computer networks, protocols are essential to
ELEMENTS OF A DATA COMMUNICATION
ensure reliable and standardized communication
Message: The message is the information or data between devices, allowing for seamless data
that needs to be communicated. It can be in exchange and interoperability.
various forms such as text, audio, video, or any
other type of data. TYPES OF STANDARDS
Sender: The sender is the device or entity that De Facto Standard: These are standards that have
initiates the communication by transmitting the not been officially approved by any organization
message. It can be a computer, mobile phone, but are widely adopted due to their widespread
workstation, or any other device capable of use or industry acceptance. They are often
sending data. established by manufacturers or companies as
Receiver: The receiver is the device or entity that their own rules or conventions.
receives the message sent by the sender. It is the
destination where the message is intended to be De Jure Standard: These are standards that have
received. Similar to the sender, the receiver can been officially approved by recognized bodies or
be a computer, mobile phone, workstation, or organizations such as ANSI (American National
any other device capable of receiving data. Standards Institute), ISO (International
Organization for Standardization), IEEE (Institute
Transmission Medium: The transmission medium
of Electrical and Electronics Engineers), etc. They
is the physical path or channel through which the
are important to follow when required or needed,
data or message travels from the sender to the
especially in data communication protocols.
receiver. It can be either guided (using wired
connections like cables) or unguided (using
wireless connections like radio waves or
Circuit Switching and Packet Switching Packet Switching:
Advantages:
Each of the seven layers may differ in terms of :- ➢ Define the voltage used on the cable and
the frequency at which the signals that
Purpose / Function :- Each of these layers carry the data are transitioned from one
performs a specific function that plays an state to another.
important part in the end to end communication
between two devices. ➢ Defines the physical topology of the
network.
Network Device :- Hubs , Switches , Bridges ,
Routers , NICs
Layer 2 :- Data Link Layer
Protocols :- TCP , IP , FTP , UDP , SMTP
The data link layer is the second layer of the OSI
Data handling and encryption process :- Name of model and is responsible for error-free data
the data as data , segment , Datagram , pact , transmission over a physical layer such as
frame , Bit. between network card and a switch. Its main
objective is to provide a reliable and error free
The seven layers of OSI are :- connection between two devices on a network.
✔ 1) Application Layer The data link layer divides data in to frames and
✔ 2) Presentation Layer adds error detection and correction codes to
✔ 3) Session Layer ensure that data is transmitted without errors. It
✔ 4) Transport Layer also manages data flow control between devices
✔ 5) Network Layer to prevent data loss and congestion on the
✔ 6) Data Link Layer network.
✔ 7) Physical Layer
The data link layer is responsible for tasks such
as addressing , framing , error detection and
Layer 1 :- Physical Layer correction , and flow control. It uses physical
addresses , such Media Access Control (MAC)
The physical layer is the first layer of the OSI addresses , to identify devices on a network ,
model and is responsible for transmitting raw and is responsible for directing data frames to
data bits over a physical medium , such as their intended recipients.
copper or fiber optic cables. It defines the
physical characteristics of the network , such as The data link layer is critical for ensuring that
voltage levels , cable specifications , and data data is transmitted reliably and efficiently
transmission rates. between devices on a network. It works closely
with the physical layer to establish and maintain
The physical layer is concerned with the a reliable physical connection between devices ,
mechanical , electrical and physical aspects of the and is essential component of any computer
data transmission , and its main objective is to network.
provide a reliable and efficient means of
transmitting raw data between devices on a The data link layer uses physical addresses such
network. as Media Access Control (MAC) addresses , to
identify devices on a network. A MAC address is
The Physical Layer defines the physical a unique identifier card (NIC) on a device. These
characteristics of the network :- addresses are typically assigned by the
manufacturer and can not be changed.
➢ Physical characteristics can include the
cable and connector type , the format for When data is transmitted between devices on a
pin outs for cables and so on. network , it is divided in to frames at the data
link layer. Each frame includes a source MAC for directing data packets to their intended
address and a destination MAC address, which recipients.
are used to identify the devices that are sending
and receiving the data. The data link layer is The network layer uses a variety of routing
responsible for directing data frames to their protocols , such as Border Gateway and Open
intended recipients based on their destination shortest path first , to select the best path for
MAC addresses. data transmission based on factors such as
network congestion , distance and cost. It also
The data link layer uses a technique called MAC performs fragmentation and reassembly of data
address filtering to ensure that data is only sent packets when the data is too large to be
to the devices that need it. When a device transmitted in a single packet.
receives a data frame , it checks the destination
MAC address to determine if it matches its own In addition , the network layer is responsible for
MAC address. If the destination MAC address QoS management , which involves managing
matches the MAC address of the device , the data network traffic to ensure that critical data is
frame is accepted and processed. If the transmitted with priority over non-critical data.
destination MAC address does not match , the This helps to ensure that important data such as
data frame discarded and not processed. voice and video traffic , is delivered in a timely
and reliable manner.
The use of MAC addresses at the data link layer
is critical for ensuring that data is transmitted Layer 4 :- Transport Layer
efficiently and securely between devices on a
network. By using MAC addresses to identify The transport layer is the fourth layer of the OSI
devices and direct data frames to their intended model and is responsible for providing end to end
recipients , the data link layer helps to prevent data transport services , such as reliable data
unnecessary network recipients , the data link delivery and flow control. Its main objective is to
layer helps to prevent unnecessary network ensure that data is transmitted without errors and
congestion and improves over all network in the correct order between the source and
performance. destination devices.
The session layer also provides services such as The presentation layer is the sixth layer of the
check pointing and recovery. Check pointing OSI model and is responsible for ensuring that
involves saving the state of communication data is presented in a format that can be
session at regular intervals , so that if the session understood by the receiving device. Its main
is interrupted or terminated unexpectedly , it can objective is to manage the syntax and semantics
restarted from the last saved checkpoint. of the information exchanged between
Recovery involves resuming a communication applications.
session from the last saved check point after an
interruption or termination. The presentation layer provides services such as
data compression , data encryption , and data
Check pointing involves saving the state of translation. Data compression involves reducing
communication session at regular intervals , the size of the data to reduce transmission time
usually at predetermined points called check and network band width usage. Data encryption
points. The session layer saves important involves encoding data to protect it from
information about the session , such as the unauthorized access or tampering. Data
current state of the communication , the data translation involves converting data between
transmitted , and the point at which the last different formats such as from ASCII to EBCDIC ,
checkpoint was taken. If the session is interrupted to ensure that data can be understood by the
or terminated unexpectedly , the session layer receiving device.
can use the last saved check point to restart the
session from the point at which the interruption The presentation layer is also responsible for data
occurred. formatting and syntax control. It ensures that
data is presented in a format that can be
Recovery involves resuming a communication understood by the receiving device , such as by
session from the last saved check point after an converting data in to a standard format or using
interruption or termination. When a a common coding scheme.
communication session is interrupted or
terminated , the session layer uses the last saved The presentation layer is critical for ensuring that
check point to resume the session from the point data is presented in a format that can be
at which interruption occurred. This allows the understood by the receiving device . It works
communication session to be resumed with out closely with the application layer to manage the
losing any important data or information. syntax and semantics of the information
Check pointing and recovery are important exchanged between applications , and is essential
services for applications that require reliable and component of any computer network.
continuous communication such as file transfer or
video conferencing applications. By saving the Layer 7 :- Application Layer
state of a communication session at regular
intervals and resuming the session from the last The application layer is the seventh and top most
saved checkpoint , these services ensure that layer of the OSI model and is responsible for
communication sessions can be resumed quickly providing communication services directly to
and efficiently in the event of an interruption or applications running on different devices. Its main
termination. objective is to enable communication between
different types of applications such as web
browsers , email clients and file transfer devices. It includes protocols such as TCP and
programs. UDP , which are used for reliable and connection
less data transport layer respectively.
The application layer provides services such as
email , file transfer , remote login and web Internet Layer :- The internet layer is responsible
browsing. Email services allow users to send and for routing different networks , it includes the
receive emails , file transfer services enable users internet protocol (IP) , which is used to provide
to transfer files between devices , remote login logical addressing and routing of data packets
services allow users to remotely access a device , between devices on different networks.
and a web browsing services enable users to
access and navigate websites on the internet. Network Access Layer: The network access layer
is responsible for providing physical access to the
The application layer is responsible for managing network and transmitting data between devices
application level protocols such as HTTP , SMTP on the same network. It includes protocols such
and FTP , which are used to enable as Ethernet, Wi-Fi, and DSL, which are used for
communication between applications. It also different types of network connections
provides services such as authentication and
authorization to ensure that only authorized users DIFFERENCE BETWEEN OSI AND TCP/IP
can access and use the application.
Imagine you want to send a letter to your friend
The application layer is the layer closest to the who lives far away. There are certain steps you
end user and its services are directly accessed by
need to follow to make sure the letter reaches
the end user. It works closely with the other
your friend correctly. In computer networks, we
layers of the OSI model to ensure that
communication between applications is reliable , use a similar concept called protocols to send
efficient , and secure. information between devices.
TCP/IP is like a special rulebook for Let's compare them to building a tower with
communication between computers and devices different floors:
connected to the internet. It helps them talk to 1. OSI Layer: Think of a tall building with
each other and play nicely together. seven floors. Each floor has a specific job
to do, and each floor depends on the one
It consists of the four layers : the application below it. The lower floors handle more
layer , transport layer , internet layer and basic tasks, while the higher floors handle
network access layer. more complex tasks. These floors are
called layers. Each layer has a particular
Application Layer :- The application layer is
responsibility in the communication
responsible for providing communication services
directly to applications running on different process.
devices. It includes protocols such as HTTP , FTP 2. TCP/IP: Now, imagine another building
, SMTP , which are used for services such as web
with just four floors. The first floor is like
browsing , email and remote login.
the foundation of the building, and the
Transport Layer :- The transport layer Is upper floors build upon it. These floors
responsible for providing reliable data transport are called protocols. Each floor in this
services between applications running on different building has multiple functions and
responsibilities, and they work together to 3. Simple Mail Transfer Protocol (SMTP):
make sure the communication works SMTP is like a postal service for emails.
properly. It's the protocol that helps your email get
sent from your computer or phone to the
So, the main difference between the OSI model
recipient's email server. SMTP ensures
and the TCP/IP model is the number of layers
that your email message is properly
and how they are organized. The OSI model has
addressed, packaged, and delivered to the
more layers, which helps us understand the
right inbox so that the recipient can read
different tasks involved in communication more
it.
precisely. On the other hand, the TCP/IP model
has fewer layers, which simplifies the process but 4. Domain Name System (DNS): When you
still covers all the necessary functions. type a website address in your web
browser, DNS helps translate that address
Both models help us understand how data moves
into the actual numerical address (IP
across a network and ensure that information
address) of the server where the website
reaches its destination accurately, just like
is located. It's like looking up a phone
following steps to send a letter to your friend.
number in a directory. DNS helps your
While both models serve the same purpose of computer find the right server so that you
organizing protocols for network communication, can access the website you want.
they were developed by different organizations at
different times. The OSI model was created by In simpler terms, these protocols enable you to
the International Organization for Standardization transfer files, view websites, send emails, and
(ISO) in the late 1970s, while the TCP/IP model navigate the internet more easily. They provide
was developed by the U.S. Department of Defense the necessary rules and methods for different
in the 1970s.
types of communication and interactions on the
APPLICATION LAYER PROTOCOLS internet.
When you send a letter or any other data over Medium of data transmission :-
the internet, IP makes sure that it's put in the
right "envelope" with the correct IP address of 1) Guided Transmission Media :- Data
the destination device. It's like writing your transmission is through solid medium
friend's address on the envelope so that the 2) Unguided Transmission Media :- Data
transmission is through air (that is wireless
postman knows where to deliver the letter.
system)
Once the letter is ready, IP takes care of sending
it across different networks to reach the GUIDED TRANSMISSION MEDIA :-
destination. It's like the postman finding the best
Transmission capacity of guided media is
route to deliver the letter, using roads and
dependent on :-
intersections.
The job of IP is to make sure that all the letters Bandwidth :- Bandwidth is the context of
computer networking , refers to the amount of
(data packets) are correctly delivered to the right
data that can be transmitted over a network
devices (friends' houses) based on their unique IP connection in a given amount of time. Bandwidth
addresses. It ensures that the data packets are is an important consideration in computer
routed through the internet and reach their networking because it can affect the speed and
intended destinations accurately. efficiency on a network. A network with a higher
bandwidth will generally be able to transfer data
In simpler terms, IP is like a system that gives more quickly and efficiently than a network with
every device connected to the internet its own a lower bandwidth.
special address. It then takes care of putting data
in the right envelopes and delivering them to the
correct devices, just like sending letters to your
friends' houses.
Multi point connection :- A multi point is a type 1. Large installed base and familiarity: UTP
of network connection in which multiple devices has been widely used in networks for
are connected to a single communication channel. many years, so there is a large number of
In a multi point connection , the devices share
existing installations and expertise
the same communication medium , such as a
available.
physical cable or a wireless link.
2. Cost-effective and easy installation: UTP
cables are relatively inexpensive compared
to other types of network cables. They are
also easy to install, making it convenient such as industrial settings or areas with high
for setting up network connections. electrical activity.
2. Outer Shield: The outer shield, which is 4. Reasonable Data Security: Coaxial cable
usually made of metal such as aluminum offers a certain level of data security. Its
or copper, surrounds the inner conductor. design makes it difficult for unauthorized
Its primary function is to provide a layer parties to tap into the cable and access
of protection and minimize interference or the transmitted information.
Disadvantages of Coaxial Cable: The main reason why optical fiber cable is
preferred over other methods like coaxial and
1. Limited Compatibility: There are various
twisted pair cable is because of its superior
types of coaxial cables, and each type is
performance and advantages:
suited for specific types of local area
network (LAN) systems. This means that 1. High Speed and Bandwidth: Optical fiber
not all LAN systems can readily work cable can transmit data at very high
with any type of coaxial cable. It may speeds, allowing for fast and efficient
require careful selection and compatibility communication. It has a much higher
considerations. bandwidth compared to coaxial and
twisted pair cables, meaning it can carry
2. Higher Cost: Coaxial cable tends to be
a larger amount of data simultaneously.
more expensive compared to other cable
types. This is partly due to its higher 2. Long Transmission Distance: Optical fiber
metallic content and the specialized cable can transmit data over very long
manufacturing processes involved in its distances without significant loss of signal
production. quality. It can span hundreds of
kilometers without the need for signal
In simpler terms, coaxial cable has some
boosters or repeaters, making it suitable
advantages over other cables. It is less likely to
for long-distance communication.
be affected by outside interference, can transmit
data over long distances, and supports different 3. Immunity to Electromagnetic Interference:
types of signals. However, there are different Unlike coaxial and twisted pair cables,
types of coaxial cables, and they may not be optical fiber cable is not affected by
compatible with all LAN systems. Additionally, electromagnetic interference. This means it
coaxial cable can be more expensive than other can transmit data without being affected
cables due to its construction and materials. by nearby power lines, electronic devices,
or other sources of electromagnetic
C) Fiber Optics
radiation. It provides a stable and reliable
Optical fiber cable is a type of cable that is used connection.
to transmit information in the form of light
signals. It is made up of a very thin and flexible 4. Security: Optical fiber cable offers a high
strand called an optical fiber. This fiber is usually level of security for data transmission.
made of glass or plastic and is incredibly thin, Since it uses light signals to transmit
even thinner than a single strand of human hair. data, it is very difficult to tap into the
cable and intercept the information being
The light signals that travel through the optical
transmitted. This makes it ideal for
fiber carry information in the form of binary
applications that require secure
code, which is a series of ones and zeros. These
signals can represent various types of data, such communication, such as financial
as voice, video, or internet data. transactions or sensitive data transfer.
Optical fiber cable is preferred over coaxial and 4. Limited Flexibility: Optical fiber cables are
twisted pair cables because it offers higher not as flexible as other types of cables,
speeds, longer transmission distances, immunity such as twisted pair or coaxial cables.
to interference, enhanced security, and is more They are more delicate and can be more
space-efficient. These advantages make it the challenging to bend around tight corners
preferred choice for high-speed internet, or in small spaces. This can make
telecommunication networks, and data installation in certain environments or
transmission in various industries. structures more difficult.
While optical fiber cables offer numerous 5. Compatibility: Optical fiber cables are not
advantages, they also have some disadvantages to directly compatible with existing copper-
consider: based infrastructure. In some cases,
organizations may need to invest in
1. Cost: The initial installation cost of optical
additional equipment, such as media
fiber cables can be higher compared to
converters or optical network interfaces,
copper-based systems. This is primarily
to bridge the gap between fiber optics
due to the higher cost of the fiber optic
and traditional copper-based systems. This
cable itself, as well as the specialized
compatibility issue can add complexity
equipment and electronics required for
and cost to the network setup.
transmitting and receiving light signals.
However, the long-term cost savings of It's important to note that while these
optical fiber cables, such as lower disadvantages exist, the benefits of optical fiber
maintenance and higher data transmission cables often outweigh them in many applications
capacity, can outweigh the initial where high-speed, long-distance, and secure data
investment. transmission is essential. The disadvantages can
be mitigated with proper planning, expertise, and
2. Electronics and Equipment: Optical fiber
consideration of the specific requirements of the
cables require specialized electronics for
network infrastructure.
converting light signals to electrical
signals and vice versa. These components, UNGUIDED TRANSMISSION MEDIUM
such as transmitters and receivers, can be (WIRELESS TRANSMISSION )
more expensive than those used in
copper-based systems. Additionally, the Unguided transmission media, also known as
maintenance and replacement of these wireless or wireless communication, refers to a
electronics can also add to the overall type of transmission medium that does not
require physical cables or wires to transmit
cost.
signals. Instead, it utilizes various methods such
3. Specialized Installation: Installing optical as radio waves, microwaves, or infrared signals
fiber cables requires specialized knowledge to carry information through the air or free
space.
and expertise. The cables need to be
carefully handled and protected from
In the context of unguided transmission media,
directional and omnidirectional refer to the
patterns in which the wireless signals are
transmitted or received.
1. Directional-Transmission/Reception:
Directional transmission or reception
involves focusing the wireless signals in a
specific direction or within a narrow
beam. This means that the signals are
concentrated and intended to travel in a
Here are some simple points about radio waves:
particular path or towards a specific
target. Directional transmission/reception 1. Invisible Waves: Radio waves are like
is achieved using specialized antennas, invisible ripples that travel through the
such as parabolic or dish antennas, which air. We can't see them, but they are all
can concentrate the signal energy in a around us, helping us communicate
specific direction. This approach is useful wirelessly.
for long-range communication, point-to-
2. Sending Messages: Just like how we can
point links, and scenarios where the
talk to someone far away using a
signal needs to be focused in a particular
telephone, radio waves help us send
direction to reach a specific receiver.
messages wirelessly. We can use them to
2. Omnidirectional Transmission/Reception: listen to the radio, watch TV, talk on a
Omnidirectional transmission or reception cell phone, or connect to the internet
involves spreading the wireless signals in using Wi-Fi.
all directions, creating a 360-degree
3. Long Distance Travel: Radio waves are
coverage pattern. With omnidirectional
great at traveling long distances. They can
transmission/reception, the signals radiate
go through the air and even outer space
outwards in all directions from the source
to reach faraway places. That's why we
or antenna. This allows the signals to
can listen to radio stations or make phone
reach multiple devices or receivers located
calls to people who are far from us.
in different directions without the need
for precise alignment. Omnidirectional 4. Antennas: To send and receive radio
antennas, such as dipole or whip waves, we use special antennas. Antennas
antennas, are commonly used to achieve are like magic sticks that can catch and
this coverage pattern. This approach is send out these invisible waves. They are
suitable for scenarios where the signal the reason we can listen to music on the
needs to reach multiple devices in radio or watch TV shows on our antennas
different locations, such as in Wi-Fi at home.
networks or cellular networks where
5. Different Channels: Just like we tune our
devices are spread throughout an area.
radio or TV to different channels, radio
waves have different "channels" too. Each
TYPES OF WIRELESS NETWORKS channel carries different types of signals,
like music, news, or TV shows. That's
Radio Waves :- Imagine radio waves as why we can listen to different stations or
invisible waves in the air that can carry messages watch different channels on TV.
from one place to another without using any
6. Interference: Sometimes, there can be too
wires. They are a special kind of energy called
electromagnetic radiation. many signals in the air, and they can mix
up or interfere with each other. It's like or mountains. That's why you might
trying to hear one person talking in a notice that your Wi-Fi signal gets weaker
crowded room. That's why we might if you move to a different room.
sometimes experience static or poor
reception when listening to the radio or
watching TV.
Micro Waves
5. High Frequencies: Microwaves have higher
Microwaves are a type of invisible waves that are frequencies than radio waves, which
used for wireless communication, just like radio means they vibrate really fast. This high
waves. They are called microwaves because they frequency allows them to carry a lot of
have a very short wavelength, which means they information and data, making them great
are really tiny and close together. for fast internet connections.
Here are some simple points about microwaves: Applications: Radio waves are commonly used for
broadcasting radio and television signals, as well
1. Tiny Waves: Microwaves are like tiny as for communication in AM/FM radio, shortwave
waves that travel through the air. They radio, and satellite communication. Microwaves,
are smaller than radio waves and can fit on the other hand, are utilized in various
many of them in a small space. Just like technologies, such as microwave ovens, Wi-Fi
how you can see lots of little ripples in a networks, cellular communication (e.g., 4G and
5G), radar systems, and satellite communication.
pond, microwaves are tiny ripples in the
air.
Infrared
2. Fast Communication: Microwaves are
really good at carrying messages and Imagine you have a special kind of light that you
information quickly. They are often used can't see with your eyes, but you can feel it as
for things like cell phones, satellite heat. That's what infrared waves are. They are a
communication, and Wi-Fi. They can send type of energy that is just below the red color
signals from one place to another in the that we can see.
blink of an eye!
Infrared waves have shorter wavelengths than
3. Cooking with Microwaves: You may have radio waves and microwaves, but longer
heard of microwaves being used in wavelengths than visible light. This means they
microwave ovens. These special ovens use have less energy than visible light, but more
microwaves to heat up and cook our energy than radio waves and microwaves.
food. Microwaves can make the water
Infrared waves are interesting because they can
molecules in the food vibrate, which
help us in many ways. Here are a few examples:
creates heat and cooks the food.
1. Remote Controls: Have you ever used a
4. Line of Sight: Unlike radio waves,
remote control to change the TV channel
microwaves need a clear path to travel.
or adjust the volume? Well, remote
They like to move in straight lines and
controls use infrared waves to send
can be blocked by obstacles like buildings
signals to the TV. When you press a CHAPTER FOUR
button on the remote, it sends out a
beam of infrared waves that the TV can
understand. Network Layer Addressing and Routing
2. Heat Sensing: Infrared waves can also Network Layer Addressing :- The network layer
help us detect heat. Special cameras addressing is like giving each device in the
called infrared cameras can see things network its own address. Just like you have a
that give off heat, even in the dark. This home address, each device has its own IP
can be useful for firefighters to find address. An IP address is a combination of
people inside a smokey building or for numbers (like 192.168.1.1) that helps in
scientists to study how animals stay identifying a specific device on the network.
warm.
Routing: Now, imagine you want to send a
message to your friend who is in a different
classroom. You need to know how to get the
message to your friend's classroom. In a computer
network, routing is the process of figuring out
the best path or route for your message to reach
its destination.
1. Consists of four octets: An IPv4 address is 4. Leading or trailing dots: An IPv4 address
divided into four parts called octets or should not have leading or trailing dots.
bytes. Each octet is represented by a For example, ".192.168.0.1" or
decimal number ranging from 0 to 255. "192.168.0.1." are invalid representations.
The octets are separated by dots in the
Examples of Invalid IPv4 Addresses:
dotted-decimal notation.
• 192.168.0 (missing the last octet)
2. Numeric values within the valid range:
• 10.256.0.1 (invalid value in octet)
Each octet of an IPv4 address must have
• 192.168.0.01 (leading zero in an octet)
a numeric value between 0 and 255,
• 192.168.0.1.1 (extra octet)
inclusive. This means that each part of
the address can be any number from 0 to Remember, a valid IPv4 address follows the
255. defined format, has numeric values within the
valid range for each octet, and does not contain
3. No leading zeros: Leading zeros (zeros at
any invalid characters. An invalid IPv4 address
the beginning of an octet) are not allowed
fails to meet one or more of these criteria.
in IPv4 addresses. For example,
"192.168.001.001" is not a valid
representation because it has leading CLASS FULL IP ADDRESSING
zeros.
• 192.168.0.1
• 10.0.0.255
• 172.16.254.1
1. Incorrect format: An IPv4 address must Classful IP addressing refers to the original
consist of four octets separated by dots. If method of allocating IP addresses in the early
the address has more or fewer than four days of the internet. In classful addressing, IP
octets or if the octets are not separated addresses were divided into different classes
by dots, it is considered invalid. (Class A, Class B, and Class C) based on the size
of the network they were assigned to. Each class
had a fixed portion of the IP address reserved for
network identification, and the remaining portion • The range of the first octet in Class C
was used for host identification. addresses is from 192 to 223.
• Class C addresses can support a limited
Here is a detailed explanation of classful IP
number of hosts because the host address
addressing :-
portion has 8 bits (one octet).
Class A Addressing :- • Example: 192.168.0.1, where 192.168.0 is
the network address, and 1 is the host
• Class A addresses were assigned to large
address.
networks, such as multinational
corporations or internet service providers 4. Class D and Class E:
(ISPs).
• Class D addresses (starting from 224.0.0.0
• In a Class A address, the first octet (the
to 239.255.255.255) are reserved for
first set of numbers) is used to identify
multicast addressing, which allows a
the network, and the remaining three
single packet to be sent to multiple
octets represent the host address.
destinations simultaneously.
• The range of the first octet in Class A
• Class E addresses (starting from 240.0.0.0
addresses is from 0 to 127.
to 255.255.255.255) are reserved for
• Class A addresses can support a large
experimental or special purposes.
number of hosts because the host address
portion has 24 bits (three octets). It's important to note that classful addressing was
• Example: 10.0.0.1, where 10 is the later replaced by Classless Inter-Domain Routing
network address, and 0.0.1 is the host (CIDR) due to the limitations and inefficiencies of
address. the classful system. CIDR allows for more flexible
allocation of IP addresses by using variable-length
Class B Addressing :-
subnet masks (VLSM) and route aggregation.
• Class B addresses were allocated to
Classful IP addressing involved dividing IP
medium-sized networks, such as
addresses into different classes (Class A, B, C)
universities or large organizations.
based on the size of the network. Each class had
• In a Class B address, the first two octets
a fixed portion for network identification and a
are used for network identification, and
varying portion for host identification. Class ful
the other two octets indicate the host
addressing was eventually replaced by CIDR for
address.
better address allocation and routing efficiency.
• The range of the first octet in Class B
addresses is from 128 to 191.
• Class B addresses can support a moderate WHY DO WE NEED CLASSES FROM THE
number of hosts because the host address FIRST PLACE ?
portion has 16 bits (two octets).
• Example: 172.16.0.1, where 172.16 is the The concept of classes in IP addressing was
network address, and 0.1 is the host introduced in the early days of the internet as a
address. way to allocate IP addresses more efficiently.
Here are some reasons why classes were initially
Class C Addressing:
used:
• Class C addresses were reserved for small
1. Address Space Management: Classful
networks, such as small businesses or
addressing provided a way to divide the
home networks.
available IP address space into distinct
• In a Class C address, the first three octets
blocks or classes. This allowed for easier
identify the network, while the last octet
management and allocation of addresses
specifies the host address.
to different organizations, networks, and divided into smaller subnets, allowing for finer
devices. control over address allocation and improved
routing efficiency.
2. Network Size Differentiation: The classes
(Class A, B, and C) were designed to
cater to networks of different sizes. By
assigning IP addresses based on classes, it What is a Default Mask (Subnet Mask)
was easier to determine the approximate
A default mask, also known as a subnet mask or
number of hosts that could be
network mask, is a fundamental component in IP
accommodated in a particular network.
addressing. It determines how the IP address is
3. Routing Efficiency: Classful addressing divided into network and host portions. The
helped in simplifying the routing process default mask is used to identify which bits in an
by allowing routers to determine the IP address represent the network and which bits
network boundaries based on the class of represent the host.
the IP address. This allowed routers to
In classful IP addressing, each class (Class A, B,
make routing decisions more quickly and
or C) had a predefined default mask associated
efficiently.
with it. Here's a description of the default masks
4. Address Assignment Policies: Each class for each class :-
had specific address assignment policies.
Class A Default Mask:
For example, Class A addresses were
allocated to large organizations, Class B • Class A addresses are designed for large
addresses to medium-sized networks, and networks.
Class C addresses to small networks. • The default mask for Class A addresses is
These policies helped ensure that address 255.0.0.0 or /8 in CIDR notation.
blocks were assigned according to the size • This default mask means that the first
and requirements of the network. octet represents the network portion of
the address, and the remaining three
However, over time, it became evident that
octets represent the host portion.
classful addressing had limitations and
• Example: If an IP address is 10.0.0.1 with
inefficiencies. The main drawback was the rigid
the default mask 255.0.0.0, the network
allocation of address space, resulting in wastage
portion is 10, and the host portion is
of addresses and inefficient use of available
0.0.1.
resources. This led to the introduction of Classless
Inter-Domain Routing (CIDR), which allowed for Class B Default Mask:
more flexible allocation of addresses using
• Class B addresses are meant for medium-
variable-length subnet masks (VLSM).
sized networks.
CIDR replaced the classful system and provided a • The default mask for Class B addresses is
more scalable and efficient approach to IP 255.255.0.0 or /16 in CIDR notation.
addressing. With CIDR, address blocks could be • This default mask means that the first two
octets represent the network portion, and
the remaining two octets represent the
host portion.
• Example :- If an IP address is 172.16.0.1
with the default mask 255.255.0.0, the
network portion is 172.16 , and the host
portion is 0.1.
• The first address represents the network Similarly to Class C, two addresses are reserved:
address.
• The first address represents the network
• The last address represents the broadcast
address.
address.
• The last address represents the broadcast
So, the total number of usable addresses in a address.
class C network is 256 - 2 = 254.
So, the total number of usable addresses in a
Now, let's find the first address and the last class B network is 65,536 - 2 = 65,534.
address :-
Now, let's find the first address and the last Think of it this way: if you want to send a letter
address: to someone in your neighborhood, you only need
to write down the neighborhood name (network
Given IP address: 185.28.17.9
address) and their house number (host address) to
The network address is obtained by setting the ensure the letter reaches the correct house.
host portion to all zeros: Network address:
Broadcast Address: Now, imagine you want to
185.28.0.0
send a message to everyone in your neighborhood
The last address is obtained by setting the host at the same time. You can't individually deliver
portion to all ones: Last address (broadcast the message to each house; instead, you send a
address): 185.28.255.255 broadcast message that reaches every house in
the neighborhood.
Therefore, in the given class B network, there are
65,534 usable addresses in the block (excluding In networking, a broadcast address is like a
the network and broadcast addresses), the first special address that allows you to send a message
address is 185.28.0.0, and the last address is to all devices within a network at once. It
185.28.255.255. ensures that the message is received by every
device within that network.
Example – 3 :-
To do this, the broadcast address uses a special
pattern in the host address part of an IP address.
It sets all the host bits to their maximum value,
which is usually represented as a sequence of 1s.
Imagine you have a big toy box filled with For example, let's say we have the address
different types of toys. You want to keep your 192.168.0.10 and the subnet mask 255.255.255.0.
toys organized, so you decide to divide the box The subnet mask tells us that the first three
into smaller sections. Each section will have a numbers (192.168.0) are for the network, and the
different type of toy. last number (10) is for the individual computer.
Subnetting is similar to dividing your toy box. It's like having a map that shows which parts of
Instead of toys, we are talking about computer the address are important for finding the right
networks. When computers are connected in a network and computer. The subnet mask helps
network, they have special numbers called IP computers understand where to send information
addresses. These IP addresses help computers find and how to talk to each other within the
and talk to each other. network.
Subnetting is a way to divide a big computer So, a subnet mask is like a special mask or map
network into smaller parts, just like dividing your that helps computers know which part of an
toy box. This helps keep things organized and address is for the network and which part is for
makes it easier for computers to communicate the individual computer. It's like having a secret
with each other. code to open the right doors and find the right
place to send information.
Imagine you have a group of friends, and you
want to divide them into smaller teams. Each EXTENDED NETWORK PREFIX
team will have a different team number.
Subnetting works the same way. It divides the
big network into smaller parts called subnets.
Each subnet has its own subnet number.
In simpler terms, the subnet mask is used to
determine which part of an IP address is the
network address and which part is the host
address. The subnet mask is a series of numbers
that has a one-to-one correspondence with the IP
address. Each bit in the subnet mask is either set
to 1 or 0.
The extended network prefix length is a way of When we talk about borrowing bits from the
representing the subnet mask, which tells us host, it means taking some bits that are originally
which part of an IP address belongs to the used for identifying individual hosts and
network. Instead of using the traditional subnet repurposing them to create additional subnets.
mask format, modern routing protocols often use
In computer networks, IP addresses are made up
a shorter and simpler notation called the prefix
of two parts: the network portion and the host
length.
portion. The network portion identifies the
The prefix length is the number of continuous network itself, while the host portion identifies
"one" bits in the subnet mask. It shows us how individual devices within that network.
many bits are important for identifying the
When we need to create more subnets within a
network.
network, we may need to borrow bits from the
For example, let's say we have the network host portion and use them to create additional
address 130.5.5.25 with a subnet mask of subnets. This allows us to divide the network into
255.255.255.0. This means the first 24 bits (the smaller, more manageable parts.
first three numbers) are part of the network, and
By borrowing bits from the host portion, we
the last 8 bits (the last number) are for individual
reduce the number of available host addresses
devices.
because some of those bits are now used for
To make things easier, we can express the same subnetting. This trade-off allows for more
information using the prefix length notation. In flexibility in network design and more efficient
this case, we write the network address followed use of IP address space.
by a slash and the prefix length, which is 24. So,
For example, let's say we have an IP address
130.5.5.25 with a subnet mask of 255.255.255.0
range of 192.168.0.0/24, which means there are
can be written as 130.5.5.25/24.
24 bits reserved for the network and 8 bits for
This notation is more compact and easier to hosts. If we want to create more subnets, we can
understand compared to writing out the long borrow some bits from the host portion, let's say
subnet mask with all the numbers. It helps us 3 bits.
quickly identify the network part of an IP address
By borrowing 3 bits, we increase the number of
and simplifies communication between devices.
subnets we can create, but we decrease the
number of available host addresses within each
subnet. The number of subnets is calculated using
the formula 2^N, where N is the number of
borrowed bits.
NUMBER OF SUBNETS AND NUMBER OF HOSTS 2. To calculate the number of hosts per
PER SUBNET subnet, we use the formula 2^n - 2,
where n is the number of bits left for the
The calculation of subnets and the number of
host address. Since we borrowed 2 bits,
hosts per subnet in an IP network involves a
we have 6 bits left for hosts (as there are
solid understanding of the concepts of subnetting
8 bits in total for the last octet of the
and IP addressing. Here is a basic guide:
address). So, 2^6 - 2 equals 62 hosts.
1. Number of Subnets: The number of
Please note, however, that the method of
subnets is determined by the number of
calculation can differ based on whether you're
bits borrowed from the host portion of
using fixed-length or variable-length subnet
the network for subnetting. If you borrow
masking, and whether you're using private or
n bits, you can have 2^n subnets. For
public IP addresses. The "-2" in the host
example, in a Class C network (default
calculation is also a traditional approach that
subnet mask of 255.255.255.0), if you
excludes the network and broadcast addresses,
borrow 2 bits, you can create 2^2 or 4
but in some modern systems, all addresses can
subnets.
potentially be used.
2. Number of Hosts Per Subnet: The number EXAMPLE :- Suppose our IP address is
of valid hosts per subnet is 2^n - 2 192.168.2.64/26 , figure out the usable address ,
where n is the number of bits remaining the start or network address and the end or
for host addressing after subnetting. The broad cast address , find the number of subnets ,
"-2" accounts for the network address and the number of the host per subnet ?
broadcast address which are not usable
The IP address 192.168.2.64/26 means that the
for hosts. For example, if you have 6 bits
network portion is the first 26 bits of the
remaining for host addressing (after
address, and the remaining 6 bits are for host
borrowing 2 bits for subnetting in a Class
addresses within the subnet.
C network), you can have 2^6 - 2 or 62
hosts per subnet. To calculate the details for this address:
Remember that IP version 4 (IPv4) addresses are 1. Subnet Mask: For a /26 CIDR, the subnet
32-bit addresses. A typical IPv4 address looks like mask is 255.255.255.192. The /26 means
this: 192.168.1.1. The subnet mask (e.g., that the first 26 bits are used for the
255.255.255.0) is used to divide the IP address network address and the remaining 6 bits
into the network and host addresses. (32 - 26) are used for the host addresses.
Here's an example with a Class C IP address: 2. Network Address (Start Address): This is
Let's say we have a Class C network with a base the first IP address in the subnet and is
IP address of 192.168.1.0 and a subnet mask of used to identify the subnet itself. It's
255.255.255.0 (or /24 in CIDR notation, meaning typically the IP address where the host
the first 24 bits are used for network addressing). bits are all set to 0. For 192.168.2.64/26,
If we want to create additional subnets, we can the network address is 192.168.2.64.
borrow bits from the host part of the address. 3. Broadcast Address (End Address): This is
If we borrow 2 bits, our subnet mask becomes the last IP address in the subnet and is
255.255.255.192 (or /26 in CIDR notation). used for sending data to all hosts on the
subnet simultaneously. It's the IP address Looking at powers of 2, we find that 2^5 is 32.
where the host bits are all set to 1. For So, we need 5 bits for hosts because that will
192.168.2.64/26, the broadcast address is give us 32 addresses (close to 30). That leaves us
192.168.2.127. with 3 bits for subnetting (8 total bits in an octet
- 5 bits for hosts = 3 bits for subnetting).
4. Usable Addresses: These are the IP
addresses that can be assigned to the Therefore, the subnet mask should be
hosts within the subnet, which are all the 255.255.255.224 (in binary, this last octet is
addresses between the network address 11100000, which is 3 bits for subnetting and 5
and the broadcast address. For bits for hosts).
192.168.2.64/26, the usable addresses
Calculate the number of subnets:
range from 192.168.2.65 to 192.168.2.126.
We borrowed 3 bits for subnetting, so we can
5. Number of Subnets: Since 192 is a class calculate the number of subnets with the formula
network , we first have a /24 network 2^n (where n is the number of subnet bits). So,
and later changed into /26 subnets, you 2^3 equals 8. Therefore, we have 8 subnets.
are effectively borrowing 2 bits (26 - 24)
for subnetting. Therefore, using the Calculate the network address (start address) and
formula 2^n, where n is the number of the broadcast address (end address) for each
borrowed bits, you get 2^2 = 4 subnets. subnet:
Note that this calculation is based on the The subnets would be broken down like this
assumption that you started with a /24 (only showing the last octet for simplicity):
network, which is typically the case for a
Class C IP address like this one. • Subnet 1: Network 0, Usable 1-30,
Broadcast 31
6. Number of Hosts per Subnet: This is • Subnet 2: Network 32, Usable 33-62,
calculated by the formula 2^n - 2, where Broadcast 63
n is the number of bits left for the host • Subnet 3: Network 64, Usable 65-94,
address. Since we have 6 bits for hosts Broadcast 95
(32 total - 26 for network = 6 for hosts), • Subnet 4: Network 96, Usable 97-126,
you get 2^6 - 2 = 62 hosts per subnet. Broadcast 127
• Subnet 5: Network 128, Usable 129-158,
Broadcast 159
• Subnet 6: Network 160, Usable 161-190,
CLASS SUB-NETTING EXAMPLE :- subnet the IP
Broadcast 191
address 216.21.5.0 in to 30 hosts in each
• Subnet 7: Network 192, Usable 193-222,
subnet ?
Broadcast 223
The IP address given is 216.21.5.0, and we want • Subnet 8: Network 224, Usable 225-254,
each subnet to support around 30 hosts. Broadcast 255
Here are the steps: So for example, in the first subnet, you could
assign host IP addresses from 216.21.5.1 to
Find the appropriate subnet mask:
216.21.5.30. The network address would be
First, we need to determine how many bits are 216.21.5.0, and the broadcast address would be
needed to support around 30 hosts per subnet. 216.21.5.31.
The formula to calculate the number of hosts is
And in the second subnet, you could assign host
2^n - 2 (where n is the number of host bits),
IP addresses from 216.21.5.33 to 216.21.5.62, and
but we'll simplify it to 2^n for an easier
so on for the remaining subnets.
approximation.
Remember that the network and broadcast The subnets would be broken down like this
addresses are traditionally not assigned to hosts. (only showing the last octet for simplicity):
However, in some modern systems, all addresses
• Subnet 1: Network 0, Usable 1-62,
can potentially be used.
Broadcast 63
Also note that the exact ranges may depend on • Subnet 2: Network 64, Usable 65-126,
the specifics of your network architecture and the Broadcast 127
equipment you're using. Always refer to the • Subnet 3: Network 128, Usable 129-190,
documentation and specifications of your specific Broadcast 191
networking equipment when configuring subnets. • Subnet 4: Network 192, Usable 193-254,
Broadcast 255
CLASS C SUB-NETTING EXAMPLE :- subnet the
IP address 196.10.20.0 in to 52 hosts in each So for example, in the first subnet, you could
subnet ? assign host IP addresses from 196.10.20.1 to
196.10.20.62. The network address would be
let's subnet the IP address 196.10.20.0 so that
196.10.20.0, and the broadcast address would be
there are approximately 52 hosts in each subnet.
196.10.20.63.
We'll do this in a simple way:
And in the second subnet, you could assign host
Find the appropriate subnet mask:
IP addresses from 196.10.20.65 to 196.10.20.126,
First, we need to determine how many bits are and so on for the remaining subnets.
needed to support approximately 52 hosts per
Remember that the network and broadcast
subnet. The formula to calculate the number of
addresses are traditionally not assigned to hosts.
hosts is 2^n - 2, where n is the number of host
However, in some modern systems, all addresses
bits, but to keep it simple, we'll use 2^n for a
can potentially be used.
rough approximation.
Also note that the exact ranges may depend on
Looking at powers of 2, we find that 2^6 is 64,
the specifics of your network architecture and the
which is the next number that can accommodate
equipment you're using. Always refer to the
at least 52 hosts. So, we need 6 bits for hosts,
documentation and specifications of your specific
because that will give us 64 addresses, which is
networking equipment when configuring subnets.
more than enough for our needs. That leaves us
with 2 bits for subnetting (8 total bits in an octet
- 6 bits for hosts = 2 bits for subnetting).
CLASS B SUB-NETTING EXAMPLE :-
Therefore, the subnet mask should be
255.255.255.192 (in binary, this last octet is let's subnet the IP address 150.15.0.0 to
11000000, which is 2 bits for subnetting and 6 accommodate approximately 500 hosts in each
bits for hosts). subnet, and we'll do this in a simple way:
We borrowed 2 bits for subnetting, so we can We first need to figure out how many bits are
calculate the number of subnets with the formula needed to support approximately 500 hosts per
2^n (where n is the number of subnet bits). So, subnet. We could use the formula 2^n - 2
2^2 equals 4. Therefore, we have 4 subnets. (where n is the number of host bits), but let's
keep it simple and use 2^n for an easy
Calculate the network address (start address) and
approximation.
the broadcast address (end address) for each
subnet: Looking at powers of 2, we find that 2^9 is 512.
This is the smallest power of 2 that's greater than
500. So, we need 9 bits for hosts because that
will give us 512 addresses which is more than CLASS A SUB-NETTING EXAMPLE
our requirement of 500. That leaves us with 7
bits for subnetting (16 total bits in the last two Let's use a Class A network of 10.0.0.0 and
octets - 9 bits for hosts = 7 bits for subnetting). subnet it to accommodate around 2000 hosts in
each subnet.
Therefore, the subnet mask should be
255.255.254.0 (in binary, the last two octets are Default Subnet Mask:
11111110 00000000, which is 7 bits for For a Class A network, the default subnet mask is
subnetting and 9 bits for hosts). 255.0.0.0. This means that by default, the first 8
Calculate the number of subnets: bits (1 octet) are used for the network portion of
the address, and the remaining 24 bits (3 octets)
We borrowed 7 bits for subnetting, so we can
are available for host addresses.
calculate the number of subnets with the formula
2^n (where n is the number of subnet bits). So, Find the appropriate subnet mask:
2^7 equals 128. Therefore, we have 128 subnets. If we want to support approximately 2000 hosts
Calculate the network address (start address) and per subnet, we need to determine how many host
the broadcast address (end address) for each bits are required. Looking at powers of 2, we
subnet: find that 2^11 is 2048, which is the smallest
power of 2 that's greater than 2000. So, we need
The subnets would be broken down like this
11 bits for hosts because that will give us 2048
(only showing the last two octets for simplicity):
addresses, which is more than our requirement of
• Subnet 1: Network 0.0, Usable 0.1-1.254, 2000. That leaves us with 13 bits for subnetting
Broadcast 1.255 (24 total bits in the last three octets - 11 bits for
• Subnet 2: Network 2.0, Usable 2.1-3.254, hosts = 13 bits for subnetting).
Broadcast 3.255
Therefore, the subnet mask should be 255.248.0.0
• Subnet 3: Network 4.0, Usable 4.1-5.254,
(in binary, the last three octets are 11111000
Broadcast 5.255
00000000 00000000, which is 13 bits for
• And so on until Subnet 128.
subnetting and 11 bits for hosts).
So for example, in the first subnet, you could
Calculate the number of subnets:
assign host IP addresses from 150.15.0.1 to
150.15.1.254. The network address would be We borrowed 13 bits for subnetting, so we can
150.15.0.0, and the broadcast address would be calculate the number of subnets with the formula
150.15.1.255. 2^n (where n is the number of subnet bits). So,
2^13 equals 8192. Therefore, we have 8192
And in the second subnet, you could assign host
subnets.
IP addresses from 150.15.2.1 to 150.15.3.254, and
so on for the remaining subnets. Calculate the network address (start address) and
the broadcast address (end address) for each
Remember that the network and broadcast
subnet:
addresses are traditionally not assigned to hosts.
However, in some modern systems, all addresses Each subnet has 2^11 or 2048 addresses. Out of
can potentially be used. these, one is used as the network address and
another one is used as the broadcast address. The
Also note that the exact ranges may depend on
rest (2046 addresses) are available for hosts.
the specifics of your network architecture and the
equipment you're using. Always refer to the The network addresses of the first few subnets
documentation and specifications of your specific would look something like this:
networking equipment when configuring subnets.
• Subnet 1: Network 10.0.0.0, Usable
10.0.0.1 to 10.0.7.254, Broadcast
10.0.7.255
• Subnet 2: Network 10.0.8.0, Usable
10.0.8.1 to 10.0.15.254, Broadcast
10.0.15.255
• Subnet 3: Network 10.0.16.0, Usable
10.0.16.1 to 10.0.23.254, Broadcast
10.0.23.255
• And so on until Subnet 8192.