RD3912A10
RD3912A10
RD3912A10
Department of CA
HOMEWORK-4
Declaration:
Student’s Sign:
Baninder kaur
Evaluator’sComments: ___________________________________________________
PART A
1. 197.18.10.201
2. 170.78.90.121
3. 248.172.16.109
4. 11001100.00001111.10101010.00000011
A:-
197.18.10.201 :- Class C
170.78.90.121 :- Class B
248.172.16.109 :- Class D
1. RIP V1
2. IGRP
Classless is also called IP subnetting. It divides classful network addresses into smaller
networks (subnet).
In classful addressing scheme, a 32 bit address is divided into Network ID and Host ID
in 8-bIt boundary:
- Classless IP allows more left bits for network ID (and fewer bits for host ID). The
number of bits used by network ID is called network mask. For example, a.b.c.d/m says
"network ID is the leftmost m bit."
Consider this example: A network has 100 computers to be connected to Internet. They
are using a class C network 200.1.2.0/24. Then the network grows to 500 computers.
CLASSFULL ADDRESSING
o Class A block addresses always start with a leftmost bit of 0 and and addresses in
the range 0.0.0.0 to 127.255.255.255.
o Class B addresses start with the bits 01 and are in the range 128.0.0.0 -
191.255.255.255
o Class C addresses start with the three bits 110 and are within the range 192.0.0.0 -
255.255.255.223
o Class D, with starting bits 1110 and within 224.0.0.0 and 239.255.255.255 is
reserved for multicast address.
o Class E (the remainder) start with bits 11110 and range from 240.0.0.0 to
255.255.255.255 and are reserved.
CLASSLESS VS CLASSFULL
For example, the IP address 35.2.3.1 is classified as class A because the first octet of 35
falls in the range of class A addresses. Class A addresses generally have the first octet as
the network part and the next three octets as the host part giving us a default network
mask of 255.0.0.0 or /8
If this is the case the IP address is classful and originally all IP addresses were
classful only. The shortage of IP addresses made way for classless addressing.
In reality, Class addresses are converted to Classless for routing through the Internet,
since BGP4 is used across the Internet backbone.
For example, a router may have an interface attached to the 10.1.5.0/24 network. It
may also have routes from a routing protocol, also for the 10.x.x.x network.
Additionally, the router itself can operate either “classfully” or “classlessly” when
actually routing data. When a “classful” router has an interface connected to a major
network, it believes it knows all routes connected to that major network.
Since many people are used to looking at IP address blocks in terms of their “classful”
sizes, it is common to express CIDR address blocks in terms of their “classful”
equivalents. First of all, it should be simple at this point to see that a CIDR “/8” network
is equal in size to a Class A network; a “/16” is equivalent to a Class B; a “/24” is
equivalent to a Class C. This is of course because Class A networks use 8 bits for the
network ID, Class Bs use 16, and Class Cs use 24.
“Today routers route both classful and classless protocols. For example, RIP is
classful, and both BGP4 and IS-IS is classless but classless is much better than
classfull”
Alice transmits the ciphertext to Bob. Bob uses the same key to transform the
ciphertext back into the plaintext.
Symmetric algorithms can also be used to authenticate the integrity and origin of
data.
Alice uses her key to generate ciphertext for the entire plaintext, as above.
She sends the plaintext and a portion of the ciphertext to Bob. This portion of the
ciphertext is known as a message authentication code, or MAC.
Bob uses his copy of the key to generate the ciphertext, selects the same portion
of the ciphertext and compares it to the MAC he received.
If they match, Bob knows that Alice sent him the message.
This does not provide non-repudiation, though. Alice can deny sending the
message, since Bob could have generated it himself.
Alice and Bob need to share a symmetric key before Alice encrypts or generates a MAC
for a message. Establishing that shared key is called key management, and it is a
difficult problem.
To use symmetric cryptography, Alice and Bob need to share a secret. Once
Alice and Bob share a symmetric encryption key, the algorithm can be used to
establish additional shared secrets.
PART B
A:- In order to calculate the no of secret keys for person in a group of 10 people who
needs to communicate with every other person in another group of 10 people we use
the following:-
n * (n-1)/2
n * (n-1)/2
10*(10-1)/2 =>45
A:- The Internet Assigned Numbers Authority (IANA) has reserved the
following three blocks of the IP address space for private internets:
An Organisation that decides to use IP addresses out of the address space defined in this
document can do so without any coordination with IANA or an Internet registry. The
address space can thus be used by many enterprises. Addresses within this private
address space will only be unique within the enterprise, or the set of enterprises which
choose to cooperate over this space so they may communicate with each other in their
own private internet.
The organization network is connected to the Internet via a router. The router has two
addresses. One belongs to the granted block. The other belongs to the network that is at
the other side of the router.
The IP address given to this organisation was 146.162.0.0 (which is a Class B address),
and the decision was made to use the whole of octet 3 for the subnet addresses leaving
octet 4 for the host addresses.
This made assigning IP addresses more easy to carry out and gave a
maximum of 254 hosts per subnet and there could be a maximum of 254
subnets, thus satisfying the customer's requirements.
The subnet mask for each subnet (Whether LAN or WAN) was
consequently 255.255.255.0, it is important to design the addressing
scheme such that the subnet mask is common to all LAN's/WAN's
throughout the network unless a routing protocol such as OSPF is to be
used. OSPF allows variable subnet masking.
d) First address is 1024 subnet will be 130.56.255.193 and last address in 1024 subnet
will be 130.56.255.254
202----> 128+64+0+0+8+0+2+0
128+64+0+0+8
3. Some people argue that we can consider the whole address space
as one single block in which each range of addresses is a subblock
to this single block. Elaborate on this idea .What happens to
subnetting if we accept this concept?
A:- We can consider the whole address space as one single block, but there exists
some problems as:-
Suppose a company receives an address block within the internet from an ISP. The
ISP designates it by communicating two values to the company:
1) 141.14.0.0
2) 255.255.0.0
The network consists of 65536 addresses. That's because its netmask consists of sixteen 1
bits followed by sixteen 0 bits. The number of 0 bits, specifically how many you can
count with them, determines the size of the block.
And sixteen bits gives countability from 0 to 65535. This precisely defines the network
that the company bought.
Most companies want to subdivide the addresses they get from an ISP, to parallel
their existing organizational subdivisions and to permit routing patterns by internal
routers among such subdivisions and sublocations.
Suppose the company would prefer to split up their large pool into some smaller
ones.
There are many possible ways to slice it. Maybe 2 subnets of 32768 each. Or
8192 subnets of 8 apiece. Or 1 subnet of 32768 plus another 128 subnets of 256.
As an example let the company define 3 subnets, each 256 in size.
Subnetting allows you to create multiple logical networks that exist within a single
Class A, B, or C network. If you do not subnet, you are only able to use one network
from your Class A, B, or C network, which is unrealistic.
The company would now apply its addresses differently, by using them together with the
new netmask value 255.255.255.0. The command form they would use to configure
workstation interfaces would now be, for example:
netmask 255.255.255.0