NCCS
NCCS
NCCS
In IP network architecture, the variable length subnet mask (VLSM) approach establishes
subnets with distinct subnet masks. By employing bigger subnet masks for subnets with more
hosts and lower subnet masks for subnets with fewer hosts, VLSM enables network managers to
assign IP addresses more effectively and efficiently.
A fixed subnet mask is applied to each subnet in the network under a classical subnetting system,
which may result in an inefficient usage of IP addresses. A typical subnet mask of 255.255.255.0
would be used for both subnets, for instance, if a network had two subnets, one with 10 hosts and
the other with 50 hosts. This would imply that there would be 254 IP addresses available for each
subnet. This would mean that IP addresses would be squandered for the smaller subnet.
To better use IP addresses, network administrators can establish subnets with distinct subnet
masks using VLSM. By using VLSM, the smaller subnet with 10 hosts might be assigned a
subnet mask of 255.255.255.128, yielding 126 IP addresses, while the bigger subnet with 50
hosts could be assigned a subnet mask of 255.255.255.192, yielding 62 IP addresses.
In contemporary networks, VLSM is commonly used to establish subnets of varying sizes and to
maximize IP address utilization.
Variable Length Subnet Mask, or VLSM for short, is a subnet design that employs several masks
inside the same network, i.e., multiple masks are utilized for distinct subnets within a single class
A, B, or C network. Due to their changing size, it is utilized to make subnets more useful.
Another definition of it is the subnetting procedure of a subnet. Process for putting VLSM into
practice: Subnetting is necessary more than once in VLSM because subnets employ block size
dependent on necessity. Assume an administrator is tasked with overseeing four departments.
These include the 120-computer sales and buying department, the 50-computer development
department, the 26-computer accounts department, and the 5-computer management department.
The procedures below can be used to assign department-specific IPs if the administrator
possesses IP 192.168.1.0/24:
VLAN
With the help of the concept of virtual local area networks (VLANs), we can logically segregate
devices on layer 2 (data link layer). The broadcast domain is often divided by layer 3 devices,
although switches can also use the VLAN concept to divide the broadcast domain.
A broadcast domain is a section of a network where any device within it will receive a broadcast
packet sent by any device inside it. All broadcast packets will be received by the devices within
the same broadcast domain, but only by switches—routers do not relay broadcast packets. Inter-
VLAN routing is required to forward packets to different VLANs (from one VLAN to another)
or broadcast domains. Different small-sized sub-networks that are relatively simple to manage
are built with VLAN.
DHCP
Dynamic Host Configuration Protocol is what DHCP stands for. It is the essential component
that allows enterprise network users to connect with one another. Businesses may more easily
handle the assignment of IP addresses to end-user clients' devices—such as laptops,
smartphones, and desktop computers—thanks to DHCP. is a protocol used at the application
layer that offers.
DHCP assists with centrally and automatically managing the entire process. A host utilising the
server can keep track of their unique IP address with the use of DHCP. DHCP servers keep track
of TCP/IP configuration data and give lease offers to clients with DHCP enabled to configure
their addresses.
Routing (RIP)
The optimal path between the source and destination networks is determined using the dynamic
Routing Information Protocol (RIP), which uses hop count as a routing metric. Operating on the
Network layer of the OSI architecture, it is a distance-vector routing protocol with an AD value
of 120. Port 520 is used by RIP.
HopCount
The number of routers between the source and destination networks is known as the "hop count."
The routing table contains the path that has the fewest hops since it is thought to be the best way
to access a network. By restricting the number of hops that can be made between a source and a
destination, RIP avoids routing loops. A hop count of 16 is regarded as network unreachable, and
a maximum hop count of 15 is permitted for RIP.
Features of RIP
1. Updates of the network are exchanged periodically.
2. Updates (routing information) are always broadcast.
3. Full routing tables are sent in updates.
4. Routers always trust routing information received from neighbor routers. This is also known
as Routing on rumors.
Redundancy
Redundancy in computer science refers to maintaining duplicates or backups of components to
ensure that your computer systems continue to function even in the event of a malfunction.
Assume your PC has some crucial files. You will lose everything if you have them all in one
location and your computer crashes or the files are erased. However, redundancy occurs if you
also store copies of that data in the cloud or on an external hard drive.
Types of Redundancies
1. Hardware redundancy
2. Software redundancy
3. Data redundancy
4. Network redundancy.
Network Redundancy
Example:
BGP (Border Gateway Protocol) routing uses multiple network paths to reroute traffic in case of
network failures, ensuring data can still flow.
Network security.
The activity designed to safeguard the integrity of your network and data is known as network
security. Every business or organization that deals with a lot of data has defense against various
online threats.
Network security refers to any measures taken to protect the accuracy and value of your data and
network. This is a broad, all-inclusive term that includes hardware and software solutions, as
well as policies, processes, and configurations for network access, general threat protection, and
network usage.
Password protection, which is selected by network users, is the most fundamental example of
network security. Network security has emerged as the main focus of cyber security in recent
years, and many companies are now seeking applications from individuals with these kinds of
talents. The network security solutions guard against a range of computer system vulnerabilities,
including:
1. Users
2. Locations
3. Data
4. Devices
5. Applications
1. Email security.
2. Firewalls
3. Network segmentation.
4. Access control
5. Sandboxing
6. Cloud network security
7. Web security
Network security.
Software-defined segmentation separates network traffic into multiple groups and makes it easier
to enforce security laws. Ideally, the classifications are based on endpoint identification, not
merely IP addresses. Access rights can be allocated according to role, location, and other criteria
to guarantee that the right amount of access is given to the right people and that suspicious
devices are monitored and handled.
Local Area Network (LAN)
By connecting network devices, a LAN, or local area network, allows workstations and personal
computers to share files, applications, and other resources. A switch, or stack of switches,
connects the collection of devices and computers together using a private addressing scheme that
is specified by the TCP/IP protocol. A private address is distinct from other machines on the
same local network. Routers link LANs to the wider Wide Area Network (WAN) at their
perimeter.
Since there are only a certain number of linked computers, data transfers extremely quickly.
High-speed, reasonably priced hardware—such as hubs, network adapters, and Ethernet cables—
is a prerequisite for the connections. LANs are privately owned and have a smaller geographic
coverage area—just a few miles. It can be used for a house, hospital, school, office building, etc.
LANs are simple to create and manage. Coaxial and twisted-pair cables make up a LAN
communication medium. Because it travels a small distance, there are fewer mistakes and noise.
Data rates for early LANs ranged from 4 to 16 Mbps. These days, typical speeds are 100 or 1000
Mbps. In a LAN, the propagation delay is quite short. While larger LANs can support thousands
of computers, the smallest LAN might only use two. Up to 2 kilometers is the range of LAN.
Although wireless connections can be a part of a LAN, wired connections are usually the main
source of speed and security for a LAN. A local area network (LAN) has higher fault tolerance
and lower network congestion. As an illustration A group of students in the same room playing
Counterstrike (without internet).
Advantages:
Disadvantages:
Wide Area Networks, or WANs, are computer networks that span a wide geographic region,
often even inside the borders of a single state or nation. WAN can cover more than 50
kilometers. A wide area network (WAN) can be a LAN that is connected to other LANs using
radio waves and phone lines. It can be public or restricted to an enterprise (a business or
organization). The technology is reasonably priced and operates at a fast speed.
Switched WAN and Point-to-Point WAN are the two varieties of WAN. WAN design and
maintenance are challenging. Comparable to a MAN, a WAN has lower failure tolerance and
higher network congestion. A WAN communication media is a satellite link or PSTN. Long-
distance communication causes greater noise and errors in WANs.
Because WANs require longer transmission distances, more servers, terminals, etc., their data
rates are slower than that of a tenth of a local area network. A few kilobits per second (Kbps) to
megabits per second (Mbps) are the ranges of WAN speeds. One of the main issues here is
propagation latency. Satellites, microwaves, and optical cables are the devices that are utilised to
transfer data over wide area networks. The asynchronous transfer mode (ATM) network is an
example of a switched WAN, and a dial-up connection connecting a home computer to the
Internet is an example of a point-to-point WAN.
Advantages:
Disadvantages:
Links
https://www.geeksforgeeks.org/introduction-of-variable-length-subnet-mask-vlsm/
https://www.geeksforgeeks.org/dynamic-host-configuration-protocol-dhcp/
https://www.geeksforgeeks.org/virtual-lan-vlan/
https://www.geeksforgeeks.org/routing-information-protocol-rip/
https://www.geeksforgeeks.org/redundancy-system-design/
https://www.geeksforgeeks.org/network-security/
https://www.geeksforgeeks.org/types-of-area-networks-lan-man-and-wan/?ref=header_search