SlideShare a Scribd company logo
Computer Network
ROUTING, BROADCASTING AND
MULTICASTING
IP addresses
 Every computer has a physical address which is

called as MAC address(LAN Card address/hardware
address) or NIC card address, this address is 48 bit
address.
 Communication in internetworking is not possible
with the MAC address, because computer
manufactured by different companies and they don’t
follow the same format of generating the MAC
address. General MAC address format
1. 00-10-FA-6E-38-4A OR 2. 50-1A-DE-90-42-DC
IP address
 There will be a IANA(Internet Assigned number







authority)(www.iana.org). These are generally assigned a
logical addressing system(called as ip address) and in system
its store in Cache memory.
A system in networking world is identify by ip address.
The designer of internet protocol define as an ip address as a
32 bit number and this system is known as IPV4 (internet
protocol version 4) is still we use today. However due to the
enormous growth of internet and predicted
depletion(decrease) of available addresses a new version IPV6
using 128 bit for the address was developed in 1995.
Ipv4 address are 172.16.254.1
Ipv6 address are 2001:db8:0:1234:0:567:8:1
Classification of computer network by ip address
 Classes are generally divided into two parts:

1. Net Id.
(32 bit)
2. Host Id.
 Classes are divided into five classes:
1. Class A- unicasting.
2. Class B- unicasting.
3. Class C- unicasting.
4. Class D-Multicasting.
5. Class E- Research work.
 Class A:

0

(2^7-2)

(2^24-2)

(8 bits) Net ID
Host ID (24 bits)
As octet value of class A is (0-127). There will be a special
address (0.0.0.0) which is a default address or the DHCP
client(Dynamic Host Configuration protocol).
127.x.y.z it is a Loop back address. Where x,y,z is from (0255).
Number of network= 2^7-2= 128-2=126. So the range of
class A is (1-126) and each network have host id (2^242).
* Network Mask : 255.0.0.0
 Class B: 10 2^14

(2^16-2)

(16 bits) Net ID Host ID (16 bits)
The range of ip address is (128-191). There will be no
special address.
Number of networks = 2^14.
* Network Mask: 255.255.0.0
 Class C: 110 (2^21) (2^8-2)
Net ID(24 bits) Host ID(8 bits)
The range of class C is (192-223). There will be also no
special address.
* Network Mask: 255.255.255.0 (Default Mask)
 Class D: During unicasting we require Net id and

Host Id where as during Multicasting we don’t
require Net id and Host id.
1110

The Range is from(224-239).
 Class E: This is for research area.

1111
The range is from (240-254), 16.257.11.13 is a wrong
ip address because 257 is not a valid address.
Calculating the Net id and Host id with
Network mask
 63.14.19.67 calculate the net id?

63.14.19.67 63: 00111111
255.0.0.0
255:11111111
63.0.0.0 (Net id) :0011111
Net ID
63.0.0.0

Host ID
63.0.0.1

Host ID
63.0.0.2

Net ID
63.14.19.67

Host ID
63.255.255.
254

* 63.255.255.255 is the direct broadcast address.
Characteristic of loop back address
 It is used to test if the ip address packets are coming

from the other system or going out of the system.
 Physical port are used to transfer the data. Loop back
address will always used as a destination address. It
is used for inter process communication with in the
same system.
 In class A 126 network have 2^24-2 host which
approx 80,00,00 host if we use only 15000 then the
large number of ip address are going to be waste. So
this will be use in multinational company use.
 And in class B 2^14 network each network have

(2^16-2) host 65,534 host here also the ip address
are waste.
 Class C have 2^21 network and each network have
(2^8-2)= 254 hosts. So that in institution and small
companies are used this because the ip address are
not to be wasted over this.
Router
 Router is a WAN device(where different LAN

network are connected).

 Connecting to different router with different model

network we use GATEWAY. Suppose we use TCP/IP
model network and X.25 model network. We use
gateway to communicate with these two routers.
Router sending and receiving
Data| 46.0.0.1 (SIP) | 130.12.0.1(DIP). In this the
data is transmit to class A to class B.

Data| 46.0.0.1 (SIP) | 46.1.2.24(DIP). In this the
data is send and receive to same class A this is called
as a unicasting.

Data| 46.0.0.1 (SIP) | 255.255.255.255 (DIP). In
this the DIP is the limited broadcast address. Which
broadcast with in the network of Class A.

Data| 46.0.0.1 (SIP) | 130.1.255.255 (DIP). In this
class A send the data to broadcast to all the network
class B.

Working of Ping?
 When you start window-> goto command prompt

and Run cmd.
 This will be you see:
C:>ping 11.1.2.3 Enter.
Ping (packet internet grapher). Ping is a client
to server utility that is provided by operating system.
C:> ping 11.1.2.3 Enter
TTL=2 MS RTT=4MS
C:> ping 11.1.2.3 Enter
Destination unreachable(DIP is not configure)
 TTL is time to line, Its going to indicate the no. of

hops the packets are traverse before reaching the
destination.
 Distance from one router to another router is called 1
HOP.
 RTT is Round Trip Time; Time taken for the data to
reach the destination and coming back on
acknowledgement to the centre.
How to transmit the data and calculate the time
 Suppose if the size of the message is 1 KB. And







Bandwidth is 1 Mbps then the transmission time;
TT= (1*10^3 ) B / (1*10^6) bits per sec
= 8*10^-3 sec
= 8 millisec.
Propagation time= Distance/ Velocity.
Acknowledgement size<< message size.
TT ack= ack size/bandwidth.
TT ack<< TT msg data.
 PT ack= distance/ velocity.
 Total time= TT data + PT data + TT ack + PT ack.

TT ack is negligible.
Total time= TT data + 2*PT
RTT(Round Trip Time) =2*PT
Link Utilization of sender= TT/ (TT data + 2*PT)
Routing Algorithm
 Static Algorithm: These are the algorithm which

doesn’t take the network load as consideration.
* Flooding is as a static algorithm.
 Dynamic Algorithm: The algorithm that contain
network load as consideration.
 1. If the routing of packets are done with in the
autonomous system, it is known as inter routing
protocol; example : Distance vector routing
algorithm, Link State routing algorithm.
 2. If the routing of packets are done between
autonomous system is known as inter domain routing
algorithm. Example : Path vector routing algorithm.
Flooding

B
p

p
p

flooding

p

A

C
p

p

p

p
EE

D
Distance Vector Routing Algorithm

New
routing
table
Packet
transfer to
router A

Vector
table

A

B
E

D

F
C
Linked State Routing Algorithm
5

2

C

B

A

3

3

G

4

4

1

D

5

E

2

F
Shortest path tree from Router A

A

3

5

2

C

B

G

4

1

D

E

2

F
Conclusion
 Computer network is the very large area. And

generally we want a network which have a high
speed of transmission and very less of error while
communicating. Computer network wants
speed, accuracy, adequacy and security. These are
the all future aspects of computer network which we
will have to consider.
Computer network

More Related Content

PPTX
Unicasting , Broadcasting And Multicasting New
PDF
Basic networking
PPT
Concept of networking
PDF
Computer Network
PPTX
Introduction to computer networks
PPTX
Windows network administration Basic theories
PPT
Data communication and computer networks | Network Topologies
PPTX
System and network administration network services
Unicasting , Broadcasting And Multicasting New
Basic networking
Concept of networking
Computer Network
Introduction to computer networks
Windows network administration Basic theories
Data communication and computer networks | Network Topologies
System and network administration network services

What's hot (19)

PDF
Computer Networks- Introduction and Data Link Layer
PPT
Network administration and Management
PPT
Networking basics PPT
PPTX
Computer Networking
PPT
Computer network
PPTX
Computer Network - Unit 1
PPTX
Unit 1 introduction to computer networks
PPTX
An introduction to networking
PPTX
Networking basic fundamental
PPTX
difference between hub, bridge, switch and router
PPTX
Computer network
PPTX
Computer networking
PPTX
Computer network
PDF
CS6551 COMPUTER NETWORKS
PPT
Computer networks
PPTX
data communication and networks
PPTX
Computer network introduction
PPT
Computer networks-1
DOC
Some important networking questions
Computer Networks- Introduction and Data Link Layer
Network administration and Management
Networking basics PPT
Computer Networking
Computer network
Computer Network - Unit 1
Unit 1 introduction to computer networks
An introduction to networking
Networking basic fundamental
difference between hub, bridge, switch and router
Computer network
Computer networking
Computer network
CS6551 COMPUTER NETWORKS
Computer networks
data communication and networks
Computer network introduction
Computer networks-1
Some important networking questions
Ad

Viewers also liked (20)

PPT
Day 10 loops+ rip+ igrp
PDF
ARF foq2 Day Router Presentation
PPTX
Ccna PPT2
PPT
Switch and Router Security Testing
PPTX
Computer network
PDF
BGP Dynamic Routing and Neutron
PPT
11 routing
PPT
Network Layer
PPT
Junos routing overview from Juniper
PPT
Computer topology
PPT
Wireless routing protocols
PDF
Benchmark ifb mwo with competition
PPT
Media presentation
PPT
My last summer holidays
PPTX
Strategies for Dealing with the CRF
PPT
Research & analyses
DOC
Distribution the particular Wings- The software Safety measures Concurrence r...
PPTX
Projek Agropreneur
PDF
Total beginner companion_document
Day 10 loops+ rip+ igrp
ARF foq2 Day Router Presentation
Ccna PPT2
Switch and Router Security Testing
Computer network
BGP Dynamic Routing and Neutron
11 routing
Network Layer
Junos routing overview from Juniper
Computer topology
Wireless routing protocols
Benchmark ifb mwo with competition
Media presentation
My last summer holidays
Strategies for Dealing with the CRF
Research & analyses
Distribution the particular Wings- The software Safety measures Concurrence r...
Projek Agropreneur
Total beginner companion_document
Ad

Similar to Computer network (20)

PDF
Computer network
PPTX
Ccna pres
PPT
tcpip.ppt
PPS
Lesson1: Introduction To Networking Concepts
PDF
Cs8591 Computer Networks
PPTX
Computer Networking: Internet Protcol (IP) and IP Addressing
PPTX
Week9 lec1
PPT
Networking Media Origin of internet (Alur Transfer Data)
PDF
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
PPT
Addressing
PPTX
7-Lect_7 .pptxNetwork LayerNetwork Layer
PPTX
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
PPTX
Cisco networking and protocals ccna.pptx
PPTX
Lecture 3 network layer
PPT
gofortution
PPT
IP adress and routing(networking)
PPTX
2020 2ed tcp
PDF
AN-Unit-1-1-Classful-Internet-Addresses.pdf
PPTX
ffuyu yguyguyg.pptx
PPTX
Unit 1- Network Layer and Protocols-4.pptx
Computer network
Ccna pres
tcpip.ppt
Lesson1: Introduction To Networking Concepts
Cs8591 Computer Networks
Computer Networking: Internet Protcol (IP) and IP Addressing
Week9 lec1
Networking Media Origin of internet (Alur Transfer Data)
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
Addressing
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
Cisco networking and protocals ccna.pptx
Lecture 3 network layer
gofortution
IP adress and routing(networking)
2020 2ed tcp
AN-Unit-1-1-Classful-Internet-Addresses.pdf
ffuyu yguyguyg.pptx
Unit 1- Network Layer and Protocols-4.pptx

More from Gaurav Rawat (9)

PPTX
Criterion 5.pptx for nba and naac presentation
PPTX
Criteria 6.pptx for nba and naac presentaion
PPTX
Criterion 5 for NBA presentation and NAAC
PPTX
Criteria 6 for NBA Presentation and NAAC
PPTX
Six sense technology
PPTX
Ic presentation
PPTX
CCNA Based routing protocols
PDF
Fault tolerance
PDF
Distance vector routing algorithm
Criterion 5.pptx for nba and naac presentation
Criteria 6.pptx for nba and naac presentaion
Criterion 5 for NBA presentation and NAAC
Criteria 6 for NBA Presentation and NAAC
Six sense technology
Ic presentation
CCNA Based routing protocols
Fault tolerance
Distance vector routing algorithm

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Modernizing your data center with Dell and AMD
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
A Presentation on Artificial Intelligence
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Modernizing your data center with Dell and AMD
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Computer network

  • 2. IP addresses  Every computer has a physical address which is called as MAC address(LAN Card address/hardware address) or NIC card address, this address is 48 bit address.  Communication in internetworking is not possible with the MAC address, because computer manufactured by different companies and they don’t follow the same format of generating the MAC address. General MAC address format 1. 00-10-FA-6E-38-4A OR 2. 50-1A-DE-90-42-DC
  • 3. IP address  There will be a IANA(Internet Assigned number     authority)(www.iana.org). These are generally assigned a logical addressing system(called as ip address) and in system its store in Cache memory. A system in networking world is identify by ip address. The designer of internet protocol define as an ip address as a 32 bit number and this system is known as IPV4 (internet protocol version 4) is still we use today. However due to the enormous growth of internet and predicted depletion(decrease) of available addresses a new version IPV6 using 128 bit for the address was developed in 1995. Ipv4 address are 172.16.254.1 Ipv6 address are 2001:db8:0:1234:0:567:8:1
  • 4. Classification of computer network by ip address  Classes are generally divided into two parts: 1. Net Id. (32 bit) 2. Host Id.  Classes are divided into five classes: 1. Class A- unicasting. 2. Class B- unicasting. 3. Class C- unicasting. 4. Class D-Multicasting. 5. Class E- Research work.
  • 5.  Class A: 0 (2^7-2) (2^24-2) (8 bits) Net ID Host ID (24 bits) As octet value of class A is (0-127). There will be a special address (0.0.0.0) which is a default address or the DHCP client(Dynamic Host Configuration protocol). 127.x.y.z it is a Loop back address. Where x,y,z is from (0255). Number of network= 2^7-2= 128-2=126. So the range of class A is (1-126) and each network have host id (2^242). * Network Mask : 255.0.0.0
  • 6.  Class B: 10 2^14 (2^16-2) (16 bits) Net ID Host ID (16 bits) The range of ip address is (128-191). There will be no special address. Number of networks = 2^14. * Network Mask: 255.255.0.0  Class C: 110 (2^21) (2^8-2) Net ID(24 bits) Host ID(8 bits) The range of class C is (192-223). There will be also no special address. * Network Mask: 255.255.255.0 (Default Mask)
  • 7.  Class D: During unicasting we require Net id and Host Id where as during Multicasting we don’t require Net id and Host id. 1110 The Range is from(224-239).  Class E: This is for research area. 1111 The range is from (240-254), 16.257.11.13 is a wrong ip address because 257 is not a valid address.
  • 8. Calculating the Net id and Host id with Network mask  63.14.19.67 calculate the net id? 63.14.19.67 63: 00111111 255.0.0.0 255:11111111 63.0.0.0 (Net id) :0011111 Net ID 63.0.0.0 Host ID 63.0.0.1 Host ID 63.0.0.2 Net ID 63.14.19.67 Host ID 63.255.255. 254 * 63.255.255.255 is the direct broadcast address.
  • 9. Characteristic of loop back address  It is used to test if the ip address packets are coming from the other system or going out of the system.  Physical port are used to transfer the data. Loop back address will always used as a destination address. It is used for inter process communication with in the same system.  In class A 126 network have 2^24-2 host which approx 80,00,00 host if we use only 15000 then the large number of ip address are going to be waste. So this will be use in multinational company use.
  • 10.  And in class B 2^14 network each network have (2^16-2) host 65,534 host here also the ip address are waste.  Class C have 2^21 network and each network have (2^8-2)= 254 hosts. So that in institution and small companies are used this because the ip address are not to be wasted over this.
  • 11. Router  Router is a WAN device(where different LAN network are connected).  Connecting to different router with different model network we use GATEWAY. Suppose we use TCP/IP model network and X.25 model network. We use gateway to communicate with these two routers.
  • 12. Router sending and receiving Data| 46.0.0.1 (SIP) | 130.12.0.1(DIP). In this the data is transmit to class A to class B.  Data| 46.0.0.1 (SIP) | 46.1.2.24(DIP). In this the data is send and receive to same class A this is called as a unicasting.  Data| 46.0.0.1 (SIP) | 255.255.255.255 (DIP). In this the DIP is the limited broadcast address. Which broadcast with in the network of Class A.  Data| 46.0.0.1 (SIP) | 130.1.255.255 (DIP). In this class A send the data to broadcast to all the network class B. 
  • 13. Working of Ping?  When you start window-> goto command prompt and Run cmd.  This will be you see: C:>ping 11.1.2.3 Enter. Ping (packet internet grapher). Ping is a client to server utility that is provided by operating system. C:> ping 11.1.2.3 Enter TTL=2 MS RTT=4MS C:> ping 11.1.2.3 Enter Destination unreachable(DIP is not configure)
  • 14.  TTL is time to line, Its going to indicate the no. of hops the packets are traverse before reaching the destination.  Distance from one router to another router is called 1 HOP.  RTT is Round Trip Time; Time taken for the data to reach the destination and coming back on acknowledgement to the centre.
  • 15. How to transmit the data and calculate the time  Suppose if the size of the message is 1 KB. And     Bandwidth is 1 Mbps then the transmission time; TT= (1*10^3 ) B / (1*10^6) bits per sec = 8*10^-3 sec = 8 millisec. Propagation time= Distance/ Velocity. Acknowledgement size<< message size. TT ack= ack size/bandwidth. TT ack<< TT msg data.
  • 16.  PT ack= distance/ velocity.  Total time= TT data + PT data + TT ack + PT ack. TT ack is negligible. Total time= TT data + 2*PT RTT(Round Trip Time) =2*PT Link Utilization of sender= TT/ (TT data + 2*PT)
  • 17. Routing Algorithm  Static Algorithm: These are the algorithm which doesn’t take the network load as consideration. * Flooding is as a static algorithm.  Dynamic Algorithm: The algorithm that contain network load as consideration.  1. If the routing of packets are done with in the autonomous system, it is known as inter routing protocol; example : Distance vector routing algorithm, Link State routing algorithm.  2. If the routing of packets are done between autonomous system is known as inter domain routing algorithm. Example : Path vector routing algorithm.
  • 19. Distance Vector Routing Algorithm New routing table Packet transfer to router A Vector table A B E D F C
  • 20. Linked State Routing Algorithm 5 2 C B A 3 3 G 4 4 1 D 5 E 2 F
  • 21. Shortest path tree from Router A A 3 5 2 C B G 4 1 D E 2 F
  • 22. Conclusion  Computer network is the very large area. And generally we want a network which have a high speed of transmission and very less of error while communicating. Computer network wants speed, accuracy, adequacy and security. These are the all future aspects of computer network which we will have to consider.

Editor's Notes

  • #4: A Cpu cache is a cache used by the central processing unit of computer to reduce the average time to access memory. Cache is a smaller faster memory which store copies of data from the most frequently used main memory location.
  • #5: Generally group mailing are used in multicasting.
  • #6: 127.1.1.1 is the loop back address which is connect to the port. If the port are connect properly to the host then the packet are transferred.