SlideShare a Scribd company logo
1 of 23
Computer Network
ROUTING, BROADCASTING AND
MULTICASTING
IP addresses
 Every computer has a physical address which is

called as MAC address(LAN Card address/hardware
address) or NIC card address, this address is 48 bit
address.
 Communication in internetworking is not possible
with the MAC address, because computer
manufactured by different companies and they don’t
follow the same format of generating the MAC
address. General MAC address format
1. 00-10-FA-6E-38-4A OR 2. 50-1A-DE-90-42-DC
IP address
 There will be a IANA(Internet Assigned number







authority)(www.iana.org). These are generally assigned a
logical addressing system(called as ip address) and in system
its store in Cache memory.
A system in networking world is identify by ip address.
The designer of internet protocol define as an ip address as a
32 bit number and this system is known as IPV4 (internet
protocol version 4) is still we use today. However due to the
enormous growth of internet and predicted
depletion(decrease) of available addresses a new version IPV6
using 128 bit for the address was developed in 1995.
Ipv4 address are 172.16.254.1
Ipv6 address are 2001:db8:0:1234:0:567:8:1
Classification of computer network by ip address
 Classes are generally divided into two parts:

1. Net Id.
(32 bit)
2. Host Id.
 Classes are divided into five classes:
1. Class A- unicasting.
2. Class B- unicasting.
3. Class C- unicasting.
4. Class D-Multicasting.
5. Class E- Research work.
 Class A:

0

(2^7-2)

(2^24-2)

(8 bits) Net ID
Host ID (24 bits)
As octet value of class A is (0-127). There will be a special
address (0.0.0.0) which is a default address or the DHCP
client(Dynamic Host Configuration protocol).
127.x.y.z it is a Loop back address. Where x,y,z is from (0255).
Number of network= 2^7-2= 128-2=126. So the range of
class A is (1-126) and each network have host id (2^242).
* Network Mask : 255.0.0.0
 Class B: 10 2^14

(2^16-2)

(16 bits) Net ID Host ID (16 bits)
The range of ip address is (128-191). There will be no
special address.
Number of networks = 2^14.
* Network Mask: 255.255.0.0
 Class C: 110 (2^21) (2^8-2)
Net ID(24 bits) Host ID(8 bits)
The range of class C is (192-223). There will be also no
special address.
* Network Mask: 255.255.255.0 (Default Mask)
 Class D: During unicasting we require Net id and

Host Id where as during Multicasting we don’t
require Net id and Host id.
1110

The Range is from(224-239).
 Class E: This is for research area.

1111
The range is from (240-254), 16.257.11.13 is a wrong
ip address because 257 is not a valid address.
Calculating the Net id and Host id with
Network mask
 63.14.19.67 calculate the net id?

63.14.19.67 63: 00111111
255.0.0.0
255:11111111
63.0.0.0 (Net id) :0011111
Net ID
63.0.0.0

Host ID
63.0.0.1

Host ID
63.0.0.2

Net ID
63.14.19.67

Host ID
63.255.255.
254

* 63.255.255.255 is the direct broadcast address.
Characteristic of loop back address
 It is used to test if the ip address packets are coming

from the other system or going out of the system.
 Physical port are used to transfer the data. Loop back
address will always used as a destination address. It
is used for inter process communication with in the
same system.
 In class A 126 network have 2^24-2 host which
approx 80,00,00 host if we use only 15000 then the
large number of ip address are going to be waste. So
this will be use in multinational company use.
 And in class B 2^14 network each network have

(2^16-2) host 65,534 host here also the ip address
are waste.
 Class C have 2^21 network and each network have
(2^8-2)= 254 hosts. So that in institution and small
companies are used this because the ip address are
not to be wasted over this.
Router
 Router is a WAN device(where different LAN

network are connected).

 Connecting to different router with different model

network we use GATEWAY. Suppose we use TCP/IP
model network and X.25 model network. We use
gateway to communicate with these two routers.
Router sending and receiving
Data| 46.0.0.1 (SIP) | 130.12.0.1(DIP). In this the
data is transmit to class A to class B.

Data| 46.0.0.1 (SIP) | 46.1.2.24(DIP). In this the
data is send and receive to same class A this is called
as a unicasting.

Data| 46.0.0.1 (SIP) | 255.255.255.255 (DIP). In
this the DIP is the limited broadcast address. Which
broadcast with in the network of Class A.

Data| 46.0.0.1 (SIP) | 130.1.255.255 (DIP). In this
class A send the data to broadcast to all the network
class B.

Working of Ping?
 When you start window-> goto command prompt

and Run cmd.
 This will be you see:
C:>ping 11.1.2.3 Enter.
Ping (packet internet grapher). Ping is a client
to server utility that is provided by operating system.
C:> ping 11.1.2.3 Enter
TTL=2 MS RTT=4MS
C:> ping 11.1.2.3 Enter
Destination unreachable(DIP is not configure)
 TTL is time to line, Its going to indicate the no. of

hops the packets are traverse before reaching the
destination.
 Distance from one router to another router is called 1
HOP.
 RTT is Round Trip Time; Time taken for the data to
reach the destination and coming back on
acknowledgement to the centre.
How to transmit the data and calculate the time
 Suppose if the size of the message is 1 KB. And







Bandwidth is 1 Mbps then the transmission time;
TT= (1*10^3 ) B / (1*10^6) bits per sec
= 8*10^-3 sec
= 8 millisec.
Propagation time= Distance/ Velocity.
Acknowledgement size<< message size.
TT ack= ack size/bandwidth.
TT ack<< TT msg data.
 PT ack= distance/ velocity.
 Total time= TT data + PT data + TT ack + PT ack.

TT ack is negligible.
Total time= TT data + 2*PT
RTT(Round Trip Time) =2*PT
Link Utilization of sender= TT/ (TT data + 2*PT)
Routing Algorithm
 Static Algorithm: These are the algorithm which

doesn’t take the network load as consideration.
* Flooding is as a static algorithm.
 Dynamic Algorithm: The algorithm that contain
network load as consideration.
 1. If the routing of packets are done with in the
autonomous system, it is known as inter routing
protocol; example : Distance vector routing
algorithm, Link State routing algorithm.
 2. If the routing of packets are done between
autonomous system is known as inter domain routing
algorithm. Example : Path vector routing algorithm.
Flooding

B
p

p
p

flooding

p

A

C
p

p

p

p
EE

D
Distance Vector Routing Algorithm

New
routing
table
Packet
transfer to
router A

Vector
table

A

B
E

D

F
C
Linked State Routing Algorithm
5

2

C

B

A

3

3

G

4

4

1

D

5

E

2

F
Shortest path tree from Router A

A

3

5

2

C

B

G

4

1

D

E

2

F
Conclusion
 Computer network is the very large area. And

generally we want a network which have a high
speed of transmission and very less of error while
communicating. Computer network wants
speed, accuracy, adequacy and security. These are
the all future aspects of computer network which we
will have to consider.
Computer network

More Related Content

What's hot

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking NetworkJGrace Johnny
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamentalSatish Sehrawat
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
data communication and networks
data communication and networksdata communication and networks
data communication and networksHafiz Noman
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 

What's hot (20)

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Computer network
Computer networkComputer network
Computer network
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamental
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Computer network
Computer networkComputer network
Computer network
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Computer network
Computer networkComputer network
Computer network
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Computer networks
Computer networksComputer networks
Computer networks
 
data communication and networks
data communication and networksdata communication and networks
data communication and networks
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Computer networks-1
Computer networks-1Computer networks-1
Computer networks-1
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 

Viewers also liked

ARF foq2 Day Router Presentation
ARF foq2 Day Router Presentation ARF foq2 Day Router Presentation
ARF foq2 Day Router Presentation Federated Sample
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2AIRTEL
 
Switch and Router Security Testing
Switch and Router Security TestingSwitch and Router Security Testing
Switch and Router Security TestingConferencias FIST
 
BGP Dynamic Routing and Neutron
BGP Dynamic Routing and NeutronBGP Dynamic Routing and Neutron
BGP Dynamic Routing and Neutronrktidwell
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Benchmark ifb mwo with competition
Benchmark ifb mwo with competitionBenchmark ifb mwo with competition
Benchmark ifb mwo with competitionshyamsingh22
 
Media presentation
Media presentationMedia presentation
Media presentationJakeMason94
 
My last summer holidays
My last summer holidaysMy last summer holidays
My last summer holidaysenricplanas
 
Strategies for Dealing with the CRF
Strategies for Dealing with the CRFStrategies for Dealing with the CRF
Strategies for Dealing with the CRFMary K.D. D'Rozario
 
Research & analyses
Research & analysesResearch & analyses
Research & analysesJakeMason94
 
Distribution the particular Wings- The software Safety measures Concurrence r...
Distribution the particular Wings- The software Safety measures Concurrence r...Distribution the particular Wings- The software Safety measures Concurrence r...
Distribution the particular Wings- The software Safety measures Concurrence r...may610eila
 
Projek Agropreneur
Projek AgropreneurProjek Agropreneur
Projek Agropreneuragropnet
 
Total beginner companion_document
Total beginner companion_documentTotal beginner companion_document
Total beginner companion_documentfujimiyaaya
 

Viewers also liked (20)

Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
ARF foq2 Day Router Presentation
ARF foq2 Day Router Presentation ARF foq2 Day Router Presentation
ARF foq2 Day Router Presentation
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
 
Switch and Router Security Testing
Switch and Router Security TestingSwitch and Router Security Testing
Switch and Router Security Testing
 
Computer network
Computer networkComputer network
Computer network
 
BGP Dynamic Routing and Neutron
BGP Dynamic Routing and NeutronBGP Dynamic Routing and Neutron
BGP Dynamic Routing and Neutron
 
11 routing
11 routing11 routing
11 routing
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Computer topology
Computer topologyComputer topology
Computer topology
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Prezi
PreziPrezi
Prezi
 
Benchmark ifb mwo with competition
Benchmark ifb mwo with competitionBenchmark ifb mwo with competition
Benchmark ifb mwo with competition
 
Media presentation
Media presentationMedia presentation
Media presentation
 
My last summer holidays
My last summer holidaysMy last summer holidays
My last summer holidays
 
Strategies for Dealing with the CRF
Strategies for Dealing with the CRFStrategies for Dealing with the CRF
Strategies for Dealing with the CRF
 
Research & analyses
Research & analysesResearch & analyses
Research & analyses
 
Distribution the particular Wings- The software Safety measures Concurrence r...
Distribution the particular Wings- The software Safety measures Concurrence r...Distribution the particular Wings- The software Safety measures Concurrence r...
Distribution the particular Wings- The software Safety measures Concurrence r...
 
Projek Agropreneur
Projek AgropreneurProjek Agropreneur
Projek Agropreneur
 
Total beginner companion_document
Total beginner companion_documentTotal beginner companion_document
Total beginner companion_document
 

Similar to Computer network

Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 
Lecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfLecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfbeetlejuice6
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/Rathodpradip1
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptJayaprasanna4
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfPeterOwenje1
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networkingSreenatha Reddy K R
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basicstmavroidis
 

Similar to Computer network (20)

Computer network
Computer networkComputer network
Computer network
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
15 3
15 315 3
15 3
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
Lecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfLecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdf
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
Hardware9
Hardware9Hardware9
Hardware9
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networking
 
Networking
NetworkingNetworking
Networking
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
Week6 final
Week6 finalWeek6 final
Week6 final
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Computer network

  • 2. IP addresses  Every computer has a physical address which is called as MAC address(LAN Card address/hardware address) or NIC card address, this address is 48 bit address.  Communication in internetworking is not possible with the MAC address, because computer manufactured by different companies and they don’t follow the same format of generating the MAC address. General MAC address format 1. 00-10-FA-6E-38-4A OR 2. 50-1A-DE-90-42-DC
  • 3. IP address  There will be a IANA(Internet Assigned number     authority)(www.iana.org). These are generally assigned a logical addressing system(called as ip address) and in system its store in Cache memory. A system in networking world is identify by ip address. The designer of internet protocol define as an ip address as a 32 bit number and this system is known as IPV4 (internet protocol version 4) is still we use today. However due to the enormous growth of internet and predicted depletion(decrease) of available addresses a new version IPV6 using 128 bit for the address was developed in 1995. Ipv4 address are 172.16.254.1 Ipv6 address are 2001:db8:0:1234:0:567:8:1
  • 4. Classification of computer network by ip address  Classes are generally divided into two parts: 1. Net Id. (32 bit) 2. Host Id.  Classes are divided into five classes: 1. Class A- unicasting. 2. Class B- unicasting. 3. Class C- unicasting. 4. Class D-Multicasting. 5. Class E- Research work.
  • 5.  Class A: 0 (2^7-2) (2^24-2) (8 bits) Net ID Host ID (24 bits) As octet value of class A is (0-127). There will be a special address (0.0.0.0) which is a default address or the DHCP client(Dynamic Host Configuration protocol). 127.x.y.z it is a Loop back address. Where x,y,z is from (0255). Number of network= 2^7-2= 128-2=126. So the range of class A is (1-126) and each network have host id (2^242). * Network Mask : 255.0.0.0
  • 6.  Class B: 10 2^14 (2^16-2) (16 bits) Net ID Host ID (16 bits) The range of ip address is (128-191). There will be no special address. Number of networks = 2^14. * Network Mask: 255.255.0.0  Class C: 110 (2^21) (2^8-2) Net ID(24 bits) Host ID(8 bits) The range of class C is (192-223). There will be also no special address. * Network Mask: 255.255.255.0 (Default Mask)
  • 7.  Class D: During unicasting we require Net id and Host Id where as during Multicasting we don’t require Net id and Host id. 1110 The Range is from(224-239).  Class E: This is for research area. 1111 The range is from (240-254), 16.257.11.13 is a wrong ip address because 257 is not a valid address.
  • 8. Calculating the Net id and Host id with Network mask  63.14.19.67 calculate the net id? 63.14.19.67 63: 00111111 255.0.0.0 255:11111111 63.0.0.0 (Net id) :0011111 Net ID 63.0.0.0 Host ID 63.0.0.1 Host ID 63.0.0.2 Net ID 63.14.19.67 Host ID 63.255.255. 254 * 63.255.255.255 is the direct broadcast address.
  • 9. Characteristic of loop back address  It is used to test if the ip address packets are coming from the other system or going out of the system.  Physical port are used to transfer the data. Loop back address will always used as a destination address. It is used for inter process communication with in the same system.  In class A 126 network have 2^24-2 host which approx 80,00,00 host if we use only 15000 then the large number of ip address are going to be waste. So this will be use in multinational company use.
  • 10.  And in class B 2^14 network each network have (2^16-2) host 65,534 host here also the ip address are waste.  Class C have 2^21 network and each network have (2^8-2)= 254 hosts. So that in institution and small companies are used this because the ip address are not to be wasted over this.
  • 11. Router  Router is a WAN device(where different LAN network are connected).  Connecting to different router with different model network we use GATEWAY. Suppose we use TCP/IP model network and X.25 model network. We use gateway to communicate with these two routers.
  • 12. Router sending and receiving Data| 46.0.0.1 (SIP) | 130.12.0.1(DIP). In this the data is transmit to class A to class B.  Data| 46.0.0.1 (SIP) | 46.1.2.24(DIP). In this the data is send and receive to same class A this is called as a unicasting.  Data| 46.0.0.1 (SIP) | 255.255.255.255 (DIP). In this the DIP is the limited broadcast address. Which broadcast with in the network of Class A.  Data| 46.0.0.1 (SIP) | 130.1.255.255 (DIP). In this class A send the data to broadcast to all the network class B. 
  • 13. Working of Ping?  When you start window-> goto command prompt and Run cmd.  This will be you see: C:>ping 11.1.2.3 Enter. Ping (packet internet grapher). Ping is a client to server utility that is provided by operating system. C:> ping 11.1.2.3 Enter TTL=2 MS RTT=4MS C:> ping 11.1.2.3 Enter Destination unreachable(DIP is not configure)
  • 14.  TTL is time to line, Its going to indicate the no. of hops the packets are traverse before reaching the destination.  Distance from one router to another router is called 1 HOP.  RTT is Round Trip Time; Time taken for the data to reach the destination and coming back on acknowledgement to the centre.
  • 15. How to transmit the data and calculate the time  Suppose if the size of the message is 1 KB. And     Bandwidth is 1 Mbps then the transmission time; TT= (1*10^3 ) B / (1*10^6) bits per sec = 8*10^-3 sec = 8 millisec. Propagation time= Distance/ Velocity. Acknowledgement size<< message size. TT ack= ack size/bandwidth. TT ack<< TT msg data.
  • 16.  PT ack= distance/ velocity.  Total time= TT data + PT data + TT ack + PT ack. TT ack is negligible. Total time= TT data + 2*PT RTT(Round Trip Time) =2*PT Link Utilization of sender= TT/ (TT data + 2*PT)
  • 17. Routing Algorithm  Static Algorithm: These are the algorithm which doesn’t take the network load as consideration. * Flooding is as a static algorithm.  Dynamic Algorithm: The algorithm that contain network load as consideration.  1. If the routing of packets are done with in the autonomous system, it is known as inter routing protocol; example : Distance vector routing algorithm, Link State routing algorithm.  2. If the routing of packets are done between autonomous system is known as inter domain routing algorithm. Example : Path vector routing algorithm.
  • 19. Distance Vector Routing Algorithm New routing table Packet transfer to router A Vector table A B E D F C
  • 20. Linked State Routing Algorithm 5 2 C B A 3 3 G 4 4 1 D 5 E 2 F
  • 21. Shortest path tree from Router A A 3 5 2 C B G 4 1 D E 2 F
  • 22. Conclusion  Computer network is the very large area. And generally we want a network which have a high speed of transmission and very less of error while communicating. Computer network wants speed, accuracy, adequacy and security. These are the all future aspects of computer network which we will have to consider.

Editor's Notes

  1. A Cpu cache is a cache used by the central processing unit of computer to reduce the average time to access memory. Cache is a smaller faster memory which store copies of data from the most frequently used main memory location.
  2. Generally group mailing are used in multicasting.
  3. 127.1.1.1 is the loop back address which is connect to the port. If the port are connect properly to the host then the packet are transferred.