You are on page 1of 11

Lahore College for Women University

Assignment Topics:
 Internetworking
 Internet addressing
 Subnetting
 CIDR

Submitted to:
Ma’am Bisma Islam
Class:
BS Software Engineering (5th semester)
Submitted by:
Group 6
Members:
1. Ayesha (10)
2. Khadija Ijaz (28)
3. Fatima Munawar (21)
4. Ayesha Barlas (12)
Internetworking

Define Internetworking:
To enable communication, every individual network node or phase is designed with a similar
protocol or communication logic, that is Transfer Control Protocol (TCP) or Internet Protocol
(IP). Once a network communicates with another network having constant communication
procedures, it’s called Internetworking.

Why we use Internetworking:


Internetworking was designed to resolve the matter of delivering a packet of information through
many links. There is a minute difference between extending the network and Internetworking.
Merely exploitation of either a switch or a hub to attach 2 local area networks is an extension of
LAN whereas connecting them via the router is an associate degree example of Internetworking.
Internetworking is enforced in Layer three (Network Layer) of the OSI-ISO model.

Types of Internetworking:
There are chiefly 3 units of Internetworking:

 Extranet
 Intranet
 Internet

Extranet: It’s a network of the internetwork that’s restricted in scope to one organization
or entity however that additionally has restricted connections to the networks of one or a lot
of different sometimes, however not essential. It’s the very lowest level of Internetworking,
usually enforced in an exceedingly personal area. Associate degree extranet may additionally
be classified as a Man, WAN, or different form of network however it cannot encompass one
local area network i.e. it should have a minimum of one reference to associate degree
external network.

Intranet: This associate degree computer network could be a set of interconnected networks,
which exploits the Internet Protocol and uses IP-based tools akin to web browsers and FTP tools,
that are underneath the management of one body entity. That body entity closes the computer
network to the remainder of the planet and permits solely specific users. Most typically, this
network is the internal network of a corporation or different enterprise. An outsized computer
network can usually have its own internet server to supply users with browsable data.
Internet: A selected Internetworking, consisting of a worldwide interconnection of
governmental, academic, public, and personal networks based mostly upon the Advanced
analysis comes Agency Network (ARPANET) developed by ARPA of the U.S. Department of
Defense additionally home to the World Wide Web (WWW) and cited as the ‘Internet’ to
differentiate from all different generic Internetworks. Participants within the web, or their service
suppliers, use IP Addresses obtained from address registries that manage assignments.

Advantages:

1. Increased connectivity: Internetworking enables devices on different networks to


communicate with each other, which increases connectivity and enables new applications
and services.
2. Resource sharing: Internetworking allows devices to share resources across
networks, such as printers, servers, and storage devices. This can reduce costs and
improve efficiency by allowing multiple devices to share resources.
3. Improved scalability: Internetworking allows networks to be expanded and scaled
as needed to accommodate growing numbers of devices and users.
4. Improved collaboration: Internetworking enables teams and individuals to
collaborate and work together more effectively, regardless of their physical location.
5. Access to remote resources: Internetworking allows users to access resources and
services that are physically located on remote networks, improving accessibility and
flexibility.

Disadvantages:

 Security risks: Internetworking can create security vulnerabilities and increase the
risk of cyberattacks and data breaches. Connecting multiple networks together increases
the number of entry points for attackers, making it more difficult to secure the entire
system.
 Complexity: Internetworking can be complex and requires specialized knowledge and
expertise to set up and maintain. This can increase costs and create additional
maintenance overhead.
 Performance Issues: Internetworking can lead to performance issues, particularly if
networks are not properly optimized and configured. This can result in slow response
times and poor network performance.

IP Address
What is an IP Address?
An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of
four numbers — an example address might be 192.158.1.38. Each number in the set can range
from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet
Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned
Names and Numbers (ICANN).

How do IP addresses work?


If you want to understand why a particular device is not connecting in the way you would expect
or want to troubleshoot why your network may not be working, it helps understand how IP
addresses work.

Internet Protocol works the same way as any other language, by communicating using set
guidelines to pass information. All devices find, send, and exchange information with other
connected devices using this protocol. By speaking the same language, any computer in any
location can talk to one another.

Uses of IP address:
1. Identifying network devices: IP addresses are used to identify network devices such as
computers, servers, and routers.

2. Network communication: IP addresses enable network communication between devices


over the internet.

3. Routing: IP addresses are used to route network traffic between different network devices.

4. Security: IP addresses can be used to monitor and identify potential security threats on a
network.

5. Geolocation: IP addresses can help determine the physical location of a device, which can
be used for various purposes such as advertising and security.

6. Network management: IP addresses are used for network management purposes such as
configuration, monitoring, and troubleshooting.

7 . VPN connectivity: IP addresses are used to connect to virtual private networks (VPNs),
allowing remote access to internal company networks.
Types of IP addresses:

Classful IP addressing:
Classful IP addressing is a method of dividing the available IP address space into five different
classes, known as A, B, C, D, and E. Each class has a fixed range of IP addresses that can be
assigned to a network or host.
Class A addresses start with the binary value of 0 and have the first 8 bits designated for the
network ID, leaving the remaining 24 bits for the host ID. This allows for a maximum of 126
networks and 16,777,214 hosts per network.

Class B addresses start with the binary value of 10 and have the first 16 bits designated for the
network ID, leaving the remaining 16 bits for the host ID. This allows for a maximum of 16,384
networks and 65,534 hosts per network.

Class C addresses start with the binary value of 110 and have the first 24 bits designated for the
network ID, leaving the remaining 8 bits for the host ID. This allows for a maximum of
2,097,152 networks and 254 hosts per network.

Advantages of Internet Addressing:


1. Efficient communication: IP addresses enable devices to communicate efficiently over
the internet.

2. Global connectivity: The use of IP addressing enables devices to connect globally,


regardless of their location.

3. Unique identification: IP addresses provide a unique identifier for each device, ensuring
that data is correctly routed.

4. Scalability: The internet can accommodate billions of devices, thanks to the scalability of
IP addresses.

Disadvantages of Internet Addressing:


Despite its many advantages, internet addressing also has some drawbacks, including:

1. Dependency on technology: The use of IP addresses is entirely reliant on technology,


and any failure or disruption can cause significant connectivity issues.

2. Security risks: As with any internet technology, IP addressing presents security risks,
including cybercrime and hacking.
3. Limited IP addresses: The increasing number of internet-connected devices has led to a
shortage of unique IPv4 addresses. This has led to the adoption of IPv6, which provides a
virtually unlimited number of unique IP addresses.

Subnetting

Introduction To Subnetting:
When a bigger network is divided into smaller networks, to maintain security, then that is known
as Subnetting. So, maintenance is easier for smaller networks. For example, if we consider
a class A address, the possible number of hosts is 224 for each network, it is obvious that it is
difficult to maintain such a huge number of hosts, but it would be quite easier to maintain if we
divide the network into small parts.

Uses of Subnetting:
1. Subnetting helps in organizing the network in an efficient way which helps in
expanding the technology for large firms and companies.

2. Subnetting is used for specific staffing structures to reduce traffic and maintain order
and efficiency.

3. Subnetting divides domains of the broadcast so that traffic is routed efficiently, which
helps in improving network performance.

4. Subnetting is used in increasing network security.

The network can be divided into two parts: To divide a network into two parts, you
need to choose one bit for each Subnet from the host ID part.

In the above diagram, there are two Subnets.

Note: It is a class C IP so, there are 24 bits in the network id part and 8 bits in the host id part.

How Does Subnetting Work?


The working of subnets starts in such a way that firstly it divides the subnets into smaller
subnets. For communicating between subnets, routers are used. Each subnet allows its linked
devices to communicate with each other. Subnetting for a network should be done in such a way
that it does not affect the network bits
Advantages of Subnetting
The advantages of Subnetting are mentioned below:

1. It provides security to one network from another network. eg) In an Organisation, the
code of the Developer department must not be accessed by another department.

2. It may be possible that a particular subnet might need higher network priority than
others. For example, a Sales department needs to host webcasts or video conferences.

3. In the case of Small networks, maintenance is easy.

Disadvantages of Subnetting
The disadvantages of Subnetting are mentioned below:

1. In the case of a single network, only three steps are required to reach a Process i.e
Source Host to Destination Network, Destination Network to Destination Host, and
then Destination Host to Process.

2. In the case of a Single Network only two IP addresses are wasted to represent Network
Id and Broadcast address but in the case of Subnetting two IP addresses are wasted for
each Subnet.

3. The cost of the overall Network also increases. Subnetting requires internal routers,
Switches, Hubs, Bridges, etc. which are very costly.

CIDR (Class less Inter domain Routing)


What is CIDR?
Classless Inter-Domain Routing (CIDR) is an IP address allocation method that improves data
routing efficiency on the internet. Every machine, server, and end-user device that connects to
the internet has a unique number, called an IP address, associated with it. Devices find and
communicate with one another by using these IP addresses. Organizations use CIDR to allocate
IP addresses flexibly and efficiently in their networks.

What are the benefits of CIDR?


With Classless Inter-Domain Routing (CIDR), your organization has more flexibility in
assigning IP addresses and routing data between devices.

Reduce IP address wastage:


CIDR provides flexibility when you determine the network and host identifier assignments on an
IP address. You can use CIDR to provision the required number of IP addresses for a particular
network and reduce wastage. Besides, CIDR reduces routing table entries and simplifies data
packet routing.

Transmit data quickly:


CIDR allows routers to organize IP addresses into multiple subnets more efficiently. A subnet is
a smaller network that exists within a network. For example, all devices connected to a router are
on the same subnet and have the same IP address prefix.

With CIDR, your organization can create and consolidate multiple subnets. This allows data to
reach the destination address without taking unnecessary paths.

CIDR blocks:
A CIDR block is a collection of IP addresses that share the same network prefix and number of
bits. A large block consists of more IP addresses and a small suffix.

The Internet Assigned Numbers Authority (IANA) assigns large CIDR blocks to regional
internet registries (RIR). Then, the RIR assigns smaller blocks to local internet registries (LIR),
which then assign them to organizations. Meanwhile, private users apply for CIDR blocks from
their internet service providers.

CIDR notation:
CIDR notation represents an IP address and a suffix that indicates network identifier bits in a
specified format. For example, you could express 192.168.1.0 with a 22-bit network identifier as
192.168.1.0/22.
CIDR block sizing

For Private Spaces, the size of this CIDR needs to be a number between 24 (256 IPs) and 16
(65,536 IPs)
Advantages:

1.Efficient use of IP addresses: CIDR allows for more efficient use of IP addresses,
which is important as the pool of available IPv4 addresses continues to shrink.

2.Flexibility: CIDR allows for more flexible allocation of IP addresses, which can be
important for organizations with complex network requirements.

3.Better routing: CIDR allows for more efficient routing of IP traffic, which can lead
to better network performance.
Reduced administrative overhead: CIDR reduces administrative overhead by allowing
for easier management of IP addresses and routing.

Disadvantages:

1. Complexity: CIDR can be more complex to implement and manage than traditional
class-based addressing, which can require additional training and expertise.

2.Compatibility issues: Some older network devices may not be compatible with
CIDR, which can make it difficult to transition to a CIDR-based network.

3.Security concerns: CIDR can make it more difficult to implement security measures
such as firewall rules and access control lists, which can increase security risks.

You might also like