0% found this document useful (0 votes)
63 views

Advanced Networking - BOOK

Uploaded by

hetimes859
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Advanced Networking - BOOK

Uploaded by

hetimes859
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 199

UNIT 1 IP ADDRESSING AND ROUTING - I

Structure:
1.0 Learning Objectives

1.1 Introduction

1.2 IP Addresses

1.3 Network Part and Host Part

1.4 Network Masks

1.5 Network Addresses and Broadcast Addresses

1.6 Address Classes

1.7 Loopback Address

1.8 IP Routing Concepts

1.9 Routing Tables

1.10 Stream and Packets

1.11 Summary

1.12 Keywords/Abbreviations

1.13 Learning Activity

1.14 Unit End Questions (MCQs and Descriptive)

1.15 References

CU IDOL SELF LEARNING MATERIAL (SLM)


2 Advanced Computer Networks

1.0 Learning Objectives


After studying this unit, you will be able to:

Explain IP addresses.

Describe address classes.


Elaborate IP routing concepts.
Define routing tables, stream and packets.

1.1 Introduction
The Internet community originally defined address classes to accommodate different
types of addresses and networks of varying sizes. IP address is an address having
information about how to reach a specific host, especially outside the LAN. An IP
address is a 32 bit unique address having an address space of 232. IP routing is the
process of moving data packets between different networks. By default, two different IP
networks cannot communicate with each other. They need a mediator device that can
switch packet between them. Router takes this responsibility. Routers interfaces are
associated with different networks. This association is kept in routing table. Routers use
it to take switching decision.
A Router is a networking device that forwards data packets between computer networks.
This device is usually connected to two or more different networks. When a data packet
comes to a router port, the router reads address information in packet to determine out
which port the packet will be sent. A packet normally represents the smallest amount of
data that can traverse over a network at a single time. A TCP/IP network packet contains
several pieces of information, including the data it is carrying, source and destination IP
addresses, and other constraints required for quality of service and packet handling.

1.2 IP Addresses
Internet Address Classes
The Internet community originally defined address classes to accommodate different
types of addresses and networks of varying sizes.
The class of address defined which bits were used for the network ID and which bits
were used for the host ID.

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 3

It also defined the possible number of networks and the number of hosts per network. Of
five address classes, class A, B, and C addresses were defined for IPv4 unicast addresses.
Class D addresses were defined for IPv4 multicast addresses and class E addresses were
defined for experimental uses.
IP address is an address having information about how to reach a specific host, especially
outside the LAN. An IP address is a 32-bit unique address having an address space of
232.
Generally, there are two notations in which IP address is written, dotted-decimal notation
and hexadecimal notation.

Dotted-decimal Notation Hexadecimal Notation


IPv4 address in dotted-decimal notation

10101100.00010000.11111110.00000001 01110101 00011101 11101010


10010101

8 bits 75 95 1D EA

32 bits (4 bytes) 0 × 75951DEA

Fig. 1.1: Dotted-decimal Notation Fig. 1.2: Hexadecimal Notation

1.3 Network Part and Host Part


Each network running TCP/IP must have a unique network number, and every machine on it
must have a unique IP address. It is important to understand how IP addresses are constructed
before you register your network and obtain its network number.

The IP address is a 32-bit number that uniquely identifies a network interface on a machine.
An IP address is typically written in decimal digits, formatted as four 8-bit fields separated by
periods. Each 8-bit field represents a byte of the IP address. This form of representing the bytes of
an IP address is often referred to as the dotted-decimal format.

The bytes of the IP address are further


129.144. 50. 56
classified into two parts: the network part and
the host part. Figure 1.2(a) shows the network part host part
component parts of a typical IP address,
Fig. 1.2(a): Parts of an IP Address
129.144.50.56.

CU IDOL SELF LEARNING MATERIAL (SLM)


4 Advanced Computer Networks

Network Part
This part specifies the unique number assigned to your network. It also identifies the class of
network assigned. In Figure 1.2(a), the network part takes up two bytes of the IP address.

Host Part
This is the part of the IP address that you assign to each host. It uniquely identifies this
machine on your network. Note that for each host on your network, the network part of the
address will be the same, but the host part must be different.

Classful Addressing
The 32-bit IP address is divided into five sub-classes. These are:

Class A
Class B
Class C
Class D
Class E
Each of these classes has a valid range of IP addresses.

Classes D and E are reserved for multicast and experimental purposes respectively.

The order of bits in the first octet determine the classes of IP address.

IPv4 address is divided into two parts:

Network ID
Host ID
Given an IP address, its class can be
determined from the three high-order
Class A NET ID HOST ID
bits. Figure 1.4 shows the significance
Class B NET ID HOST ID
in the three high-order bits and the
Class C NET ID HOST ID
range of addresses that fall into each
Class D MULTICAST ADDRESS
class. For informational purposes,
Class E RESERVED
Class D and Class E addresses are also
shown. Fig. 1.3: Classes of IP Address with
Hostid and Netid

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 5

In a Class A address, the first octet is the network portion. So, the Class A example in
Figure 1.4 has a major network address of 1.0.0.0.127.255.255.255. Octets 2, 3 and 4
(the next 24 bits) are for the network manager to divide into subnets and hosts as he/she
sees fit. Class A addresses are used for networks that have more than 65,536 hosts
(actually, up to 16777214 hosts!).
In a Class B address, the first two octets are the network portion. So, the Class B
example in Figure 1.4 has a major network address of 128.0.0.0.191.255.255.255. Octets
3 and 4 (16 bits) are for local subnets and hosts. Class B addresses are used for networks
that have between 256 and 65534 hosts.
In a Class C address, the first three octets are the network portion. So, the Class C
example in Figure 1.4 has a major network address of 192.0.0.0.233.255.255.255. Octet
4 (8 bits) is for local subnets and hosts – perfect for networks with less than 254 hosts.

0 1 2 3
01 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7

Class A 0 24 bits (Node ID) 1.0.0.0.127.255.255.255

Net ID
0 1 2 3
0 1 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7

Class B 1 0 16 bits (Node ID) 128.0.0.0.191.255.255.255

Net ID

1 2 3
0
1 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0

Class C 110 21 bits 8 bits (Node ID) 192.0.0.0.233.055.255.255

Net ID

0 1 2 3
0 1 2 3 4 5 6 7 01 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

Class D 1110 Multicast bits Group ID (28 bits) 224.0.0.0.239.255.255.255

Multicast
0 1 2 3
01 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7 01 2 3 4 5 6 7

Class E 11110 Reserved for future use (27 bits) 240.0.0.0.254.255.255.255

Experimental

Fig. 1.4: Classes of IP Address with Range

CU IDOL SELF LEARNING MATERIAL (SLM)


6 Advanced Computer Networks

1.4 Network Masks


A netmask is a 32-bit binary mask used to divide an IP address into subnets and specify the
network’s available hosts.

In a netmask, two of the possible addresses, represented as the final byte, are always pre-
assigned and unavailable for custom assignment. For example, in 255.255.225.0, “0” is the
assigned network address. In 255.255.255.255, the final “255” is the assigned broadcast address.
These two values cannot be used for IP address assignment.

Example of a netmask and an example of its binary conversion is as given below.

Table 1.1: Netmask Binary Conversion

Netmask 255. 255. 255. 255


Binary 11111111 11111111 11111111 11111111
Netmask length 8 16 24 32

Counting out the bits in the binary conversion allows you to determine the netmask length.
Above is an example of a 32-bit address. However, this address is a broadcast address and does
not allow any hosts (computers or other network devices) to be connected to it.

A commonly used netmask is a 24-bit netmask, as seen below.

Table 1.2: 24 bit Netmask Binary Conversion

Netmask 255. 255. 255. 0


Binary 11111111 11111111 11111111 00000000
Netmask length 8 16 24 –
Using a 24-bit netmask, the network would be capable of 2,097,150 networks or 254
different hosts with an IP range of 192.0.1.x to 223.255.254.x, which is usually more than enough
addresses for one network.

A simple formula can be used to determine the capable amount of networks a netmask can
support.

2^(netmask length - # of used segments) - 2

For example, if we used a netmask length of 24, having a netmask of 255.255.255.0 with
three used segments, subtract three from the netmask length, e.g., 24 – 3 = 21. With this number

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 7

determined, plug it into the above formula to get 2^21 – 2 = 2,097,150 total number of networks.
You are subtracting two from this number because of the broadcast and network addresses that
are already being used.

Another example is a netmask length of 16, having a netmask of 255.255.0.0 with two used
segments. Using the above formula, you would get 2^14 – 2 = 16,382 total number of networks.

To determine the number of hosts a netmask is capable of supporting, use the following
formula.

2^(# of zeroes) - 2

For example, with a netmask length of 24, as shown in the above chart, there are eight zeroes.
Therefore, using the formula above, this would be 2^8 – 2 = 254 total number of hosts. Again, two
is subtracted from this number to account for the broadcast and network addresses.

Again, another example of a netmask length of 16, there would be 16 zeroes. The formula, in
this case, would be 2^16 – 2 = 65,534 total number of hosts.

Below is a breakdown of each of the commonly used network classes.

Table 1.3: Network Classes of IP Addresses

Class Netmask length # of networks # of hosts Netmask


Class A 8 126 16,777,214 255.0.0.0
Class B 16 16,382 65,534 255.255.0.0
Class C 24 2,097,150 254 255.255.255.0

1.5 Network Addresses and Broadcast Addresses


Understanding Network Classes
First byte Second byte Third byte Fourth byte

Fig. 1.5: Types of Classes of IP Addresses

CU IDOL SELF LEARNING MATERIAL (SLM)


8 Advanced Computer Networks

Table 1.4: Classes of IP Addresses with details

Network/ Hosts per


1st Octet 1st Octet
Host ID Default Subnet Number of Network
Class Decimal High-order
(N=Network, Mask Networks (Usable
Range Bits
H=Host) Addresses)

16,777,214
A 1 – 126* 0 N.H.H.H 255.0.0.0 126 (27 – 2)
(224 – 2)

65,534
B 128 – 191 10 N.N.H.H 255.255.0.0 16,382 (214 – 2)
(216 – 2)

254
C 192 – 223 110 N.N.N.H 255.255.255.0 2,097,150 (221 – 2)
(28 – 2)
D 224 – 239 1110 Reserved for Multicasting
E 240 – 254 1111 Experimental; used for research

Broadcast Address
A broadcast is a multipoint connection in a computer network. A data packet is transmitted
from one point to all users of a messaging network in this way. This occurs with the use of the
broadcast address.

Each network or subnet has a dedicated broadcast address, through which all users of the
network can broadcast.

In a broadcast address, all the host bits are set to the binary value 1. So, if all host bits are set
to the value 0, this is the subnet address.

Example: IPv4 address 192.128.64.7/24

192.128.64.7 is the IP address and 24 is the subnet mask. The /24 corresponds to the subnet
mask 255.255.255.0. The IP address consists of 4 decimals – called octets – which are separated
by points. One octet contains 8 bits, which is why IPv4 is a 32-bit address. Each octet can
represent a number between 0 and 255. In this case, the whole of the last octet consists of host
bits. Therefore, in this example, the broadcast address would be 192.128.64.255 – so, all host bits
at 1.

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 9

IP address/ Subnet mask

128 64 32 16 8 4 2 1 . 128 64 32 16 8 4 2 1. 128 64 32 16 8 4 2 1 . 128 64 32 16 8 4 2 1 Decimal number

Network IP

1-255

Network share Host

Fig. 1.5(a): Broadcast Addresses


In the example of the IPv4 address 192.128.64.7/24, the host portion as well as the network
portion of an address can be read. This way, you also find out the broadcast address.

This can be read from this chart:

192.128.64.1 = first host address

192.128.64.254 = last host address

192.128.64.255 = broadcast address

Where can you find the broadcast address? The IP address is a 4-digit series of numbers with
values from 0 to 255. A broadcast IP address is only assigned once in each network. It is always
the last IP address of the subnet.

1.6 Address Classes


IP Address
32 bits

w.x.y.z

Fig. 1.6: IP Address Format

CU IDOL SELF LEARNING MATERIAL (SLM)


10 Advanced Computer Networks

Class A
Class A network IDs were assigned to networks with a very large number of hosts.
The high-order bit in a class A address is always set to zero, which makes the address
prefix for all class A networks and addresses 0.0.0.0/1 or 128.0.0.0.
The next seven bits (completing the first octet) are used to enumerate class A network
IDs.
Therefore, address prefixes for class A network IDs have an 8-bit prefix length (/8 or
255.0.0.0).
The remaining 24 bits (the last three octets) are used for the host ID. The address prefix
0.0.0.0/0 or 0.0.0.0, 0.0.0.03 is a reserved network ID and 127.0.0.0/8 or 127.0.0.0 or
255.0.0.03 is reserved for loopback addresses.
Out of a total of 128 possible class A networks, there are 126 networks and 16,777,214
hosts per network.

Class A
Network ID Host ID

Fig. 1.7: IP Address format with Netid and Host ID

Class B
Class B network IDs were assigned to medium- to large-sized networks.
The two high-order bits in a class B address are always set to 10, which makes the
address prefix for all class B networks and addresses 128.0.0.0/2 or 128.0.0.0 or
192.0.0.0.
The next 14 bits (completing the first two octets) are used to enumerate class B network
IDs.
Therefore, address prefixes for class B network IDs have a 16-bit prefix length (/16 or
255.255.0.0).

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 11

The remaining 16 bits (last two octets) are used for the host ID. With 14 bits to express
class B network IDs and 16 bits to express host IDs, this allows for 16,384 networks and
65,534 hosts per network.

Class B

Network ID Host ID

Fig. 1.8: Class B with Netid and Host ID

Class C
This addresses were assigned to small networks.
The three high-order bits in a class C address are always set to 110, which makes the
address prefix for all class C networks and addresses 192.0.0.0/3 or 192.0.0.0 or
224.0.0.0.
The next 21 bits (completing the first three octets) are used to enumerate class C network
IDs.
Therefore, address prefixes for class C network IDs have a 24-bit prefix length (/24 or
255.255.255.0).
The remaining 8 bits (the last octet) are used for the host ID. With 21 bits to express class
C network IDs and 8 bits to express host IDs, this allows for 2,097,152 networks and 254
hosts per network.

Class C

Network ID Host ID

Fig. 1.9: Class C with Netid and Host ID

CU IDOL SELF LEARNING MATERIAL (SLM)


12 Advanced Computer Networks

Class D
Class D addresses are reserved for IPv4 multicast addresses.
The four high-order bits in a class D address are always set to 1110, which makes the
address prefix for all class D addresses 224.0.0.0/4 or 224.0.0.0.

Class E
Class E addresses are reserved for experimental use.
The high-order bits in a class E address are set to 1111, which makes the address prefix
for all class E addresses 240.0.0.0/4 or 240.0.0.0.

1.7 Loopback Address


Special IPv4 Addresses
1. 0.0.0.0
Known as the unspecified IPv4 address, it is used to indicate the absence of an address.
The unspecified address is used only as a source address when the IPv4 node is not
configured with an IPv4 address configuration and is attempting to obtain an address
through a configuration protocol such as Dynamic Host Configuration Protocol (DHCP).

2. 127.0.0.1
Known as the IPv4 loopback address, it is assigned to an internal loopback interface,
enabling a node to send packets to itself.

1.8 IP Routing Concepts


Routing protocol shares routing update that contains network information. Routers keep this
information in routing tables. Routing tables are used to determine the best path for packet.
Routing protocols uses several concepts to determine the best path.

IP Routing
IP routing is the process of moving data packets between different networks. By default, two
different IP networks cannot communicate with each other. They need a mediator device that can
switch packet between them. Router takes this responsibility. Router interfaces are associated
with different networks. This association is kept in routing table. Routers use it to take switching
decision.

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 13

Static Routing
When routers learn from an administrator, it is called static routing. In static routing, we have
to add all network locations manually. If any change occurs in network, administrator is
responsible to update it by hand in all routers.

Advantages of Static Routing


It is easy to implement.
It is most secure way of routing, since no information is shared with other routers.
It puts no overhead on resources such as CPU or memory.

Disadvantages of Static Routing


It is suitable only for small network.
If a link fails, static route cannot reroute the traffic.

Dynamic Routing
When routers learn from neighboring router through the routing protocols, it is called
dynamic routing. In dynamic routing, routers add network locations automatically from the
routing information. If any change occurs in network, affected routers update others via routing
information.

Advantages of Dynamic Routing


It is suitable for all type of networks.
Automatically build routing tables.
Reroute the traffic from possible network, in link failure condition.

Disadvantages of Dynamic Routing


It is hard to implement.
It is less secure, since it shares routing updates with other routers.
It puts additional overhead on resources such as CPU, memory and link bandwidth.
Depending on network requirement, we can use either static routing or dynamic routing.
Even more, we can use a combination of both dynamic and static routing.

Routing Updates
Routing update is a mechanism of sharing information with neighboring routers. In a
particular time duration, router advertise its routing information through broadcast or multicast.

CU IDOL SELF LEARNING MATERIAL (SLM)


14 Advanced Computer Networks

Different protocols have different time intervals. Some protocols use broadcast for routing
updates while some use multicast. Routing updates contain all necessary information for routing
protocol such as learned network, timers, AS, AD, matrix values, interface details, etc.

1.9 Routing Tables


Routing Tables in Computer Network
Routers:
A Router is a networking device that forwards data packets
between computer network. This device is usually connected to
two or more different networks. When a data packet comes to a
router port, the router reads address information in packet to
determine out which port the packet will be sent. For example, a
router provides you with the internet access by connecting your
LAN with the Internet.
Fig. 1.10: Router
When a packet arrives at a Router, it examines destination IP address of a received packet
and make routing decisions accordingly. Routers use Routing Tables to determine out which
interface the packet will be sent. A routing table lists all networks for which routes are known.
Each router’s routing table is unique and stored in the RAM of the device.

Routing Table
A table is maintained by the internal router called as Routing table. It helps the internal
router to decide on which interface the data packet should be forwarded

A routing table is a set of rules, often viewed in table format, that is used to determine where
data packets traveling over an Internet Protocol (IP) network will be directed. All IP-enabled
devices, including routers and switches, use routing tables.

Routing table consists of the following three fields:

1. IP Address of the destination subnet


2. Subnet mask of the subnet Interface
See below a Routing Table:

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 15

Destination Subnet mask Interface


128.75.43.0 255.255.255.0 Eth0
128.75.43.0 255.255.255.128 Eth1
192.12.17.5 255.255.255.255 Eth3
default Eth2
The entry corresponding to the default gateway configuration is a network destination of
0.0.0.0 with a network mask (netmask) of 0.0.0.0. The Subnet Mask of default route is always
255.255.255.255.

Entries of an IP Routing Table


A routing table contains the information necessary to forward a packet along the best path
toward its destination. Each packet contains information about its origin and destination. Routing
Table provides the device with instructions for sending the packet to the next hop on its route
across the network.

Each entry in the routing table consists of the following entries:

Network ID:
The network ID or destination corresponding to the route.
Subnet Mask:
The mask that is used to match a destination IP address to the network ID.
Next Hop:
The IP address to which the packet is forwarded.
Outgoing Interface:
Outgoing interface the packet should go out to reach the destination network.
Metric:
A common use of the metric is to indicate the minimum number of hops (routers crossed)
to the network ID.
Routing table entries can be used to store the following types of routes:

Directly Attached Network IDs


Remote Network IDs
Host Routes

CU IDOL SELF LEARNING MATERIAL (SLM)


16 Advanced Computer Networks

Default Route
Destination

1.10 Stream and Packets


What Packet Mean?
In computer networks, a packet is a container or box that carries data over a TCP/IP network
and internetworks. A packet is the most fundamental logical arbitration of data that is passed over
a network.

A packet normally represents the smallest amount of data that can traverse over a network at
a single time. A TCP/IP network packet contains several pieces of information, including the data
it is carrying, source and destination IP addresses, and other constraints required for quality of
service and packet handling.

Role of Packets and Streams


1. A packet isn’t information or data itself; as the name suggest, it contains or encloses the
actual information that is traveling to another computer. But its value is in more than
bundling data into a message; packets also have the ability to do the following:
Addressing

Error correction

Using multiple pathways to send the data

Organizing the data according to its data type, such as a frame, segment or block

Of course, the packet that matters the most for us is an Internet packet: when you
send a request for information from a website, for instance.

2. First, your computer creates a packet, organized in a very specific way that the receiving
computer can understand and use. This entire packet or “stream of data” is broken down
to a specific number of “bytes” (eight bits of zeros or ones), which are individual packets
that are part of the big data packet. Each packet holds about 1,000 to 1,500 bytes.
3. The packet has a “header”; to the packet, your computer adds the IP address of the
computer that your data is supposed to get to, and puts your IP address on it to.
4. Your computer adds two identifying numbers to each of the smaller packets. The first
number represents the number of packets that all of the information is divided into. The

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 17

second number represents the number of each individual packet among the total
sequence of packets.
5. Your computer’s internal networking hardware and software follow guidelines for
bundling the data that you are sending out...the “payload.” Those guidelines are spelled
out in the Transmission Control Protocol/Internet Protocol (TCP/IP).
6. Each packet also has a trailer or footer, which contains a few electronic bits that tell the
receiving computer when it reached the end of the packet sequence. It also might include
the results of a Cyclic Redundancy Check (CRC). The CRC contains the sum of all the
“1s” in the packet, added up by your computer. The receiving also does the same math,
and if the math doesn’t add up, it may ask your computer to retransmit the packet.
7. Your computer sends each packet onto the Internet separately, and each packet takes the
best route available at the time when it can go. Why does it happen this way? So that the
network can spread data traffic evenly, and all your data won’t get stuck or slowed down
in one spot. (Keep in mind, a traffic jam might only last a fraction of a second.)

Streams – Data Streams


The cast term here signifies some data (stream of packets) is being transmitted to the
recipient(s) from client(s) side over the communication channel that help them to communicate.

1. Unicast: This type of information transfer is useful when there is a participation of single
sender and single recipient. So, in short, you can term it as a one-to-one transmission.
2. Broadcast: Broadcasting transfer (one-to-all) techniques can be classified into two types:
Limited Broadcasting: Suppose you have to send stream of packets to all the
devices over the network that you reside, this broadcasting comes handy.

Direct Broadcasting: This is useful when a device in one network wants to


transfer packet stream to all the devices over the other network.

3. Multicast: In multicasting, one/more senders and one/more recipients participate in data


transfer traffic. In this method, traffic recline between the boundaries of unicast (one-to-
one) and broadcast (one-to-all).

1.11 Summary
The IP addresses are used to identify systems on a TCP/IP network. The IP address is an
absolute identifier of both the individual machine and the network on which it resides.

CU IDOL SELF LEARNING MATERIAL (SLM)


18 Advanced Computer Networks

Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses
of the source system that generated it and the destination system for which it is intended
in its IP header.
To send a packet across an internet, the sender places the destination’s protocol address
in the packet and passes the packet to protocol software for delivery. To provide uniform
addressing in an internet, protocol software defines an abstract addressing scheme that
assigns each host a unique protocol address. Users, application programs and higher
layers of protocol software use the abstract protocol addresses to communicate.
IP addressing is specified by the Internet Protocol (IP). The IP standard specifies that
each host is assigned a unique 32-bit number known as the host ’ s Internet Protocol
address, which is often abbreviated IP address, or Internet address. Each packet sent
across an internet contains the 32-bit IP address of the sender (source) as well as the
intended recipient (destination). Thus, to transmit information across a TCP/IP internet, a
computer must know the IP address of the remote computer to which the information is
being sent. IPv4 and IPV6 both can be configured either manually or through DHCP. It
does not require manual configuration or DHCP. It uses host address (A) resource
records in the Domain Name System (DNS) to map host names to IPv4 addresses.

1.12 Keywords/Abbreviations
Subnet Mask: A number that defines a range of IP addresses available within a network.
IP (Internet Protocol): The fundamental protocol for communications on the Internet.
Static Routing: The process in which the system network administrator would manually
configure network routers with all the information necessary for successful packet
forwarding.
Dynamic Routing: A process where a router can forward data via a different route or
given destination based on the current conditions of the communication circuits within a
system.
Router: A networking device that forwards data packets between computer network.
Routing Table: A set of rules, often viewed in table format, that is used to determine
where data packets traveling over an Internet Protocol (IP) network will be directed.
Packet: The smallest amount of data that can traverse over a network at a single time.

CU IDOL SELF LEARNING MATERIAL (SLM)


IP Addressing and Routing - I 19

Abbreviations
IP: Internet Protocol
IPv4: Internet Protocol version 4
TCP/IP: Transmission Control Protocol/Internet Protocol

1.13 Learning Activity


1. How many bits Version 4 of IP address has?
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
2. What is the format of IP address?
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
3. What is Virtual Routing and Forwarding (VRF)?
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
4. What is the difference between Static Routing and Dynamic Routing?
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------

1.14 Unit End Questions (MCQs and Descriptive)


A. Descriptive Type Questions
1. Explain IP addresses and classes of IP Address.
2. Explain Network Part and Host Part of IP Address.
3. Explain Network Mask and Subnet Mask.
4. Explain Network addresses and Broadcast addresses.
5. Explain Classes of Addresses.
6. Explain Loopback address in detail.
7. Explain IP routing concepts.

CU IDOL SELF LEARNING MATERIAL (SLM)


20 Advanced Computer Networks

8. Explain different Routing Tables.


9. Explain Packets and Streams.

B. Multiple Choice/Objective Type Questions


1. First address in a block is used as network address that represents the __________.
(a) Class Network (b) Entity
(c) Organization (d) Codes
2. Network addresses are a very important concept of __________.
(a) Routing (b) IP Addressing
(c) Mask (d) Classless Addressing
3. In IPv4 Addresses, classful addressing is replaced with __________.
(a) Classless Addressing (b) Classful Addressing
(c) Classful Advertising (d) Classless Advertising
4. Several techniques can make size of routing table manageable and also handle issues
such as __________.
(a) Maturity (b) Error reporting
(c) Tunneling (d) Security
5. RPF stands for__________.
(a) Reverse Path Forwarding (b) Reverse Path Failure
(c) Reverse Packet Forwarding (d) Reverse Protocol Failure

Answers
1. (c), 2. (b), 3. (a), 4. (d), 5. (a)

1.15 References
1. https://www.redbooks.ibm.com/redbooks/pdfs/gg243376.pdf
2. https://resources.saylor.org/wwwresources/archived/site/wp-content/uploads/2012/02/
Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf
3. Computer Network (Third Edition) by Andrew S. Tanenbaum.
4. Computer Network Top-down Approach by James F. Kurose and Keith W. Ross.

CU IDOL SELF LEARNING MATERIAL (SLM)

You might also like