0% found this document useful (0 votes)
23 views49 pages

Presentation1 (Autosaved)

Uploaded by

mahambilal020
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views49 pages

Presentation1 (Autosaved)

Uploaded by

mahambilal020
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 49

IPV4

Saira rubab gill


IPV4
 IP stands for Internet Protocol version
v4 stands for Version Four (IPv4), is
the most widely used system for
identifying devices on a network.
 It uses a set of four numbers,
separated by periods (like
192.168.0.1), to give each device a
unique address.
 This address helps data find its way
from one device to another over the
internet.
 IPv4 was the primary version brought
into action for production within the
ARPANET in 1983.
 IP version four addresses are 32-bit
integers which will be expressed in
decimal notation.
 IPv4 addresses consist of three parts:
 Network Part:
Parts of IPv4
The network part indicates the
distinctive variety that’s appointed to
the network. The network part conjointly
identifies the category of the network
that’s assigned.
 Host Part:
The host part uniquely identifies the
machine on your network. This part of
the IPv4 address is assigned to every
host. For each host on the network, the
network part is the same, however, the
host half must vary.
 Subnet Number:
This is the nonobligatory part of IPv4.
Local networks that have massive
numbers of hosts are divided into
subnets andsubnetnumbers are
appointed to that.
 IPv4 could be a 32-bit IP Address.
 IPv4 could be a numeric address, and
Characteristics of IPv4
its bits are separated by a dot.
 The number of header fields is twelve
and the length of the header field is
twenty.
 It has Unicast , broadcast, and
multicast-style addresses.
 IPv4 supports VLSM (Virtual Length
Subnet Mask).
 IPv4 uses the Post Address Resolution
Protocol to map to the MAC address.
 RIP may be a routing protocol
supported by the routed daemon.
 Networks ought to be designed either
manually or with DHCP. Packet
fragmentation permits from routers
and causes host.
 IPv4 security permits encryption to
keep up privacy and security.
Advantages of IPv4
 IPV4 network allocation is significant
and presently has quite 85000
practical routers . It becomes easy to
attach multiple devices across an
outsized network while not NAT.
 This is a model of communication so
provides quality service also as
economical knowledge transfer.
 IPV4 addresses are redefined and
permit flawless encoding.
 Routing is scalable and economical as
a result of addressing its collective
more effectively.
 Data communication across the
network becomes a lot of specific in
multicast organizations.
 Limits net growth for existing
users and hinders the use of the
Advantages of IPv4
net for brand-new users.
 Internet Routing is inefficient in
IPv4.
 IPv4 has high System
Management prices and it’s labor-
intensive, complex, slow & prone
to errors.
 Security features are
nonobligatory.
 Difficulty to feature support for
future desires as a result of
adding it on is extremely high
overhead since it hinders the
flexibility to attach everything
over IP.
 IP relies onnetwork layeraddresses to
identify end-points on the network,
and each network has a unique IP Limitations of IPv4
address.
 The world’s supply of unique IP
addresses is dwindling, and they
might eventually run out theoretically.
 If there are multiple hosts, we need
the IP addresses of the next class.
 Complex host
androutingconfiguration, non-
hierarchical addressing, difficult to re-
numbering addresses, largerouting
tables, non-trivial implementations in
providing security, QoS (Quality of
Service), mobility, and multi-homing,
multicasting, etc. are the big
limitations of IPv4 so that’s why IPv6
came into the picture.
 IPv4 has a limited number of
addresses, which are running out due
In conclusion, IPv4 is a widely used
Conclusion
system for identifying devices on a
network with unique addresses
made up of four numbers. It plays a
crucial role in enabling devices to
communicate over the internet by
directing data to the correct
destinations. Despite its limitations,
IPv4 has been fundamental to the
growth and operation of the
internet.
IPV6
Zaryab
IPV6:
IPv4 limitation
IPv6 stand for
With 32-bits only IPv6 solves this by
Internet Protocol  IPv6 solves this by
version 6. IPv4 has using 128-bit
It is the latest addresses , which using 128-bit
maximium of about
version of Internet allows for addresses , which
4.3 billion unique IP
protocol (IP) used to approximately 3.4 allows for
identify and locate
devices on network.
addresses.
The rapid growth x 10^38 addresses Introducti
approximately 3.4
(enough to assign x 10^38
Developed by the
Internet Engineering
of Internet, IoT
billion of
onaddresses
devices,
Task Force (IETF) to addresses to every (enough to assign
smartphones, and
replace the older person on earth). billion of
IPv4 system. new services (like
addresses to
streaming) has
every person on
exhausted IPv4
earth).
addresses.
128-bit Address  Enhanced
Space: IPv6 mandates support Multicast and
Provides an almost for IPsec (Internet Anycast Support:
infinite pool of IP
Protocol Security) for
addresses.
 Example of an
end-to-end encryption
and authentication.
Efficiently sends
data to multiple
destinations
Key
IPv6 address:
2001:0db8:85a3:
0000:0000:8a2e:
Ensures a more secure
communication
(multicast) or the
nearest device in a
featur
es
0370:7334Built- channel by default. group (anycast).
in Security
Reduces network
(IPsec) Support:
congestion and
optimizes resource
usage
128-bit Address  Enhanced
Space: IPv6 mandates support Multicast and
Provides an almost for IPsec (Internet Anycast Support:
infinite pool of IP
Protocol Security) for
addresses.
 Example of an
end-to-end encryption
Efficiently sends
data to multiple
IPv6
and authentication.
IPv6 address:
2001:0db8:85a3: Ensures a more secure
destinations
(multicast) or the Address
0000:0000:8a2e:
0370:7334Built-
communication
channel by default.
nearest device in a
group (anycast). Structure
in Security
Reduces network
(IPsec) Support:
congestion and
optimizes resource
usage
Zero
Format: Compression: Address
An IPv6 address is
written in Leading zeros can be Types:
omitted, and contiguous
IPv6
hexadecimal Unicast: For a single
notation, divided zeros can be replaced by a
recipient (e.g., a
into eight groups double colon (::), but only
separated by colons
(:).
once per address.
Example:
specific computer).
Multicast: For a
Address
Each group consists
of 16 bits (4
Full:
2001:0db8:0000:0000:000
group of devices.
Anycast: For the
Structure
hexadecimal digits). 0:ff00:0042:8329 nearest device in a
Compressed: group, often used in
2001:db8::ff00:42:8329 load balancing..
Larger
Address
Space: Enhanced
Security: Elimination of
More addresses, Built-in NAT:
eliminating
address
support for IPsec
ensures end-to-end
Direct Advantages
device-to-device
exhaustion. security. communication of IPv6 Over
More Better Support improves latency
Efficient for Mobile and simplifies IPv4
Routing: network design.
Networks:
Optimized
Simplified headers
for mobile IP and IoT,
reduce processing
with improved handling
time.
of roaming and
mobility.
.
Compatibility Slow Learning
Issues:
Not all hardware
Adoption: Curve: Challenges
and software are
IPv6-ready,
Enterprises are hesitant
due to cost, complexity,
Network
administrators need
and
requiring upgrades
or replacements.
and potential
disruptions.
to gain new skills for
managing IPv6 Limitations
networks
. Conclusion
Global Major
The transition to IPv6
Adoption: Companies is not just an upgrade
but a necessity for the
Adoption rates are Using IPv6: future of the Internet.
increasing,
especially in
Google, Facebook, and Embracing IPv6 IPv6
other tech giants have ensures long-term
regions with a high
made their services connectivity, better Deployment
number of mobile
users and IoT
fully accessible over
IPv6.
performance, and
enhanced security. Status
devices. Organizations should
Many Internet Service
Countries like start planning and
Providers (ISPs) and
Belgium, India, adopting IPv6 to stay
cloud providers have ahead in a rapidly
and the United
started deploying IPv6 evolving digital
States have higher
to meet demand. landscape.
adoption rates.
SUBNETTIN
G
Address
The unique number ID assigned to one host
or interface in a network.
Subnet
A portion of a network that shares a
particular subnet address. A network inside a
network.
Subnet mask
A 32-bit combination used to describe
which portion of an address refers to
the subnet and which part refers to the host.
Interface
A network connection.
IP addresses:
IP addresses is used to identify the device
on IP network. The address is made of 32 binary
bits.
Division of IP address:
Address is divided into host part or
network part with the help of subnet mask.
Network portion
Unique number
Class of network
Host portion
Assigned to host
Uniquely identify
1 represent the network portion and 0 represent
the host portion
192.168.123.132
IP address (192.168.123.132) binary form
(11000000.10101000.01111011.10000100)
Subnet mask (255.255.255.0)
Network address (192.168.123.0)
Host address (000.000.000.132)
Subnetting – 5 steps
Identify the class of the IP
address and note the default
subnet mask.
Convert the default subnet
mask into binary.
Note the number of host
required per subnet and find the
subnet generator and octet
position.
Generate the new subnet mask.
Use the SG and generate the
network range (subnet) in the
appropriate octet position.
subnet the IP address 216.21.5.0
into 30 host in each subnet.

Class c default subnet mask


255.255.255.0
30 (11110)-
 11111111.11111111.11111111.0000
5bits
0000
32
 No of host 4
SG
Octet position
11111111.11111111.11111111.11100000
 255.255.255.224 /27
 216.21.5.0 --------216.21.5.31
216.21.5.32 -------216.21.5.63
216.21.5.64 --------216.21.5.95
And so on
subnet the IP address
196.10.20.0 into 52 host in each
subnet.
Class c default52subnet mask
(110100)-
255.255.255.0 6bits
64
 11111111.11111111.11111111.0000
4
0000
 No of host
SG
Octet position

11111111.11111111.11111111.11000000

 255.255.255.192 /26
 196.10.20.0 --------196.10.20.63
196.10.20.64 -------196.10.20.127
196.10.20.128 --------196.10.20.191
196.10.20.192 --------196.10.20.255
Purpose of Subnetting in Computer
Networks

 Internet Protocol (IP) Addressing Relocation


Each class has a finite amount of possible host
allocations; for instance, networks with more
than 254 devices require a Class B allocation.
Assume that you are a network administrator.
Now, you have a task of allocating 150 hosts
among three physical networks in three distinct
cities for a Class B or C network. If so, we must
either ask for additional address blocks for each
network or split the single big network into small
parts named subnets so that we could utilize a
single address block across a number of physical
networks.
Purpose of Subnetting in Computer
Networks

 Reduction of Network Traffic


Placing all of the computers on the same subnet
can assist minimize network traffic if a significant
amount of an organization's traffic is intended to
be shared routinely among a number of devices.
Without a subnet, all computers and servers on
the network would be able to see data packets
from every other machine.
 Network Speed Improvement
The main network is divided into smaller subnets
through the process of subnetting, and the goal
of these smaller, linked networks is to split the
large network into a collection of smaller, less-
busy networks. Subnets reduce the need for
traffic to use unnecessary routes, which speeds
up the network.
Advantages of Subnetting

 It provides security to one network


from another network. eg) In an
Organisation, the code of the
Developer department must not be
accessed by another department.
 It may be possible that a particular
subnet might need higher network
priority than others. For example, a
Sales department needs to host
webcasts or video conferences.
 In the case of Small networks,
maintenance is easy.
Disadvantages of Subnetting

 In the case of a single network, only three


steps are required to reach a Process i.e
Source Host to Destination Network,
Destination Network to Destination Host, and
then Destination Host to Process.
 In the case of a Single Network only two IP
addresses are wasted to represent Network Id
and Broadcast address but in the case of
Subnetting two IP addresses are wasted for
each Subnet.
 The cost of the overall Network also increases.
Subnetting requires internal routers, Switches,
Hubs, Bridges, etc. which are very costly.
Conclusion

Subnetting is an important part of managing


computer networks. It allows us to break a large
network into smaller, more manageable parts
called subnets. This makes it easier to organize
and use IP addresses efficiently. By using
subnetting, we can reduce unnecessary traffic on
the network and improve its performance.
subnet the IP address 150.15.0.0
into 500 host in each subnet.
Class b default subnet mask
255.255.0.0
 11111111.11111111.00000000.0000
500 (111110100)-9bits
00002
 No of host 3
SG
Octet position

11111111.11111111.11111110.00000000
 255.255.254.0 /23
 150.15.0.0 --------150.15.1.255
150.15.2.0 -------150.15.3.255
150.15.4.0 --------150.15.5.255
150.15.6.0 --------150.15.7.255
And so on

No of host network =2^


number of bits
VLSM
(Variable
Length
Subnet Mask)
FLSM subnetting vs. VLSM subnetting
For subnetting an IP address for a network, one of two
approaches can be used: VLSM or Fixed Length Subnet
. Mask (FLSM). These methods differ in three key ways:
 FLSM creates subnets of the same size and an equal
number of host identifiers, while VLSM creates subnets
with varying sizes with a variable number of hosts.
 FLSM is a better choice for private IP addresses, while
VLSM is more suitable for public IP addresses.
 FLSM tends to use more IP addresses than are necessary,
which leads to wastage. In VLSM, wastage is minimum
because it uses a given IP address range more efficiently.
.  VLSM stand for variable length subnet
mask
 Definition :
To divide the network into subnetworks but
with a flexibility to change the size of the
subnets.
192.168.10.0 into 60,20,20 with router
connection
200.10.20.0 into 128,64,64
192.168.4.0 into 55,22,12 with router
connection
Advantages of VLSM over FLSM –
 In Fixed length subnet mask subnetting (FLSM), all subnets
are of equal size and have equal number of hosts but in
. VLSM the size is variable and it can have variable number
of hosts thus making the IP addressing more efficient by
allowing a routed system of different mask length to suit
requirements.
 In FLSM there is a wastage of IP addresses but in VLSM
there is a minimum wastage of IP addresses.
 FLSM is preferred for private IP addresses while for public
IP addresses VLSM is the best option.
Advantages of VLSM over FLSM –
 More efficient network utilization: VLSM allows for more
efficient use of IP addresses by assigning smaller subnets
. to areas that require fewer hosts, and larger subnets to
areas that require more hosts. This leads to more efficient
network utilization and reduces the overall IP address
space required.
 Greater flexibility: VLSM provides greater flexibility in
designing IP addressing schemes. It allows network
administrators to create subnets of varying sizes based on
the specific requirements of each subnet, which can be
particularly useful in complex networks.
Advantages of VLSM over FLSM –
 Better scalability: VLSM allows for better scalability of the
network as it can accommodate growth and changes in
. network topology without requiring a complete re-design
of the IP addressing scheme.
 Improved network performance: VLSM can help improve
network performance by reducing network congestion
and improving the flow of data between subnets.
 Reduced network management overhead: VLSM can help
reduce network management overhead by simplifying the
allocation and management of IP addresses. This can be
particularly useful in large networks where IP address
management can be a significant challenge.
disadvantages:
1. Complexity: VLSM requires more advanced planning and
configuration compared to traditional subnetting, which
. can increase the complexity of the network design and
administration.
2. Increased management overhead: With VLSM, there may
be more subnets and IP addresses to manage, which can
increase the management overhead and make it more
difficult to troubleshoot network issues.
3. Potential for fragmentation: If subnets are created with
different subnet masks, it can lead to IP address
fragmentation, where IP addresses are allocated
inefficiently and may not be contiguous.
disadvantages:
1. Compatibility issues: VLSM may not be compatible with
older networking equipment or protocols, which can limit
. its usefulness in certain environments.
2. Configuration errors: Because VLSM requires more
advanced planning and configuration, there is an
increased risk of configuration errors. These errors can
cause network connectivity issues, security vulnerabilities,
and other problems.
3. Reduced network performance: While VLSM can improve
network performance by reducing congestion, it can also
have the opposite effect. If subnets are not configured
properly, it can lead to network congestion, which can
slow down the flow of data.
disadvantages:
1. Increased training requirements: VLSM requires more
advanced networking knowledge and skills than
traditional subnetting, which can increase the training
. requirements for network administrators.
2. Security vulnerabilities: VLSM can introduce security
vulnerabilities if subnets are not properly secured. For
example, if a subnet is not properly isolated, it can allow
unauthorized access to sensitive data.
3. Higher cost: VLSM can be more expensive than traditional
subnetting because it requires more advanced networking
equipment and software. This can make it less accessible
for small businesses or organizations with limited budgets.
VLAN(Virtu
al local
area
network)

Zara bilal
- Definition:
A VLAN is a logical
subgroup within a larger
network, allowing devices to
communicate as if they were
in the same physical network,
even if they are not.
- Real-Life Analogy :
Think of VLANs as virtual
rooms in a large building
where people with similar
purposes work together.

INTRODUCTION
 Improved security (isolates
sensitive data)
 Better network
management (logical
grouping of devices)
 Enhanced performance
(reduces broadcast traffic)
 Example: Separating HR, IT,
and Finance teams into
different VLANs.

KEY BENEFITS
 Illustration:
A diagram showing one
physical switch split into
multiple VLANs (e.g., VLAN 10,
20, 30).
 Key Points:
VLAN tags are added to data
packets.
 Switches forward traffic
only within the same VLAN
unless a router is used.
how VLAN work
Default VLAN:
All devices belong to
VLAN 1 by default.-
2. Data VLAN:
For user-generated
traffic (e.g., email, file
sharing).-
3. Voice VLAN:
Dedicated to VoIP devices.
4. Management VLAN:
For managing network
devices (e.g., switches,
routers).-
5. Native VLAN:
TYPES
Used for untagged traffic
on trunk ports.
Access Port:
Connects end devices (PCs,
printers) to a specific VLAN.
Trunk Port:
Carries traffic for multiple
VLANs between switches.-
VLAN Tagging:
Adds a VLAN identifier to the
Ethernet frame using IEEE
802.1Q protocol.

COMPONENT
-Step-by-Step Guide:
1. Assign ports to a VLAN on
a switch.
2. Set up trunk links for inter-
switch VLAN communication.
3. Configure routers for inter-
VLAN routing (Layer 3).

CONFIGURATION
Scenario: A university with
VLANs for:
Students
Teachers
Admin staff
Guest Wi-Fi
Visual Diagram: Network
divided into logical groups
with different levels of access.

REAL LIFE EXAMPLE


 Misconfiguration:
Can lead to network
downtime or security risks.
 Scalability:
Managing VLANs
across large networks requires
careful planning.
 Compatibility:
Older devices may not
support VLAN tagging.

CHALLENGES
 Techniques to enhance
VLAN security:
 Disable unused ports.
 Use private VLANs for
isolated systems.
 Implement VLAN hopping
prevention.

SECURITY

You might also like