TCP Characteristics
TCP Characteristics
TCP Characteristics
The functionality of the TCP IP model is divided into four layers, and each includes
specific protocols.
• Application Layer
• Transport Layer
• Internet Layer
• Network Interface
Application Layer
Application layer interacts with an application program, which is the highest level
of OSI model. The application layer is the OSI layer, which is closest to the end-
user. It means the OSI application layer allows users to interact with other software
application.
It determines how much data should be sent where and at what rate. This layer
builds on the message which are received from the application layer. It helps
ensure that data units are delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control,
error control, and segmentation or de-segmentation.
Internet Layer
An internet layer is a second layer of TCP/IP layes of the TCP/IP model. It is also
known as a network layer. The main work of this layer is to send the packets from
any network, and any computer still they reach the destination irrespective of the
route they take.
The Internet layer offers the functional and procedural method for transferring
variable length data sequences from one node to another with the help of various
networks.
Message delivery at the network layer does not give any guaranteed to be reliable
network layer protocol.
1. Routing protocols
2. Multicast group management
3. Network-layer address assignment.
It also includes how bits should optically be signaled by hardware devices which
directly interfaces with a network medium, like coaxial, optical, coaxial, fiber, or
twisted-pair cables.
A network layer is a combination of the data line and defined in the article of OSI
reference model. This layer defines how the data should be sent physically through
the network. This layer is responsible for the transmission of the data between two
devices on the same network.
Differences between OSI and TCP/IP models
Here, are some important differences between the OSI and TCP/IP model:
OSI model provides a clear distinction between TCP/IP doesn't have any clear disting
interfaces, services, and protocols. between services, interfaces, and pro
OSI refers to Open Systems Interconnection. TCP refers to Transmission Control P
OSI uses the network layer to define routing standards TCP/IP uses only the Internet layer.
and protocols.
OSI model use two separate layers physical and data TCP/IP uses only one layer (link).
link to define the functionality of the bottom layers.
OSI model, the transport layer is only connection- A layer of the TCP/IP model is both co
oriented. and connectionless.
In the OSI model, the data link layer and physical are In TCP, physical and data link are bo
separate layers. single host-to-network layer.
Session and presentation layers are not a part of the TCP There is no session and presentation
model.
It is defined after the advent of the Internet. It is defined before the advent of the
The minimum size of the OSI header is 5 bytes. Minimum header size is 20 bytes.
TCP:
Transmission Control Protocol is an internet protocol suite which breaks up the
message into TCP Segments and reassembling them at the receiving side.
IP:
An Internet Protocol address that is also known as an IP address is a numerical
label. It is assigned to each device that is connected to a computer network which
uses the IP for communication. Its routing function allows internetworking and
essentially establishes the Internet. Combination of IP with a TCP allows
developing a virtual connection between a destination and a source.
HTTP:
The Hypertext Transfer Protocol is a foundation of the World Wide Web. It is used
for transferring webpages and other such resources from the HTTP server or web
server to the web client or the HTTP client. Whenever you use a web browser like
Google Chrome or Firefox, you are using a web client. It helps HTTP to transfer web
pages that you request from the remote servers.
SMTP:
SMTP stands for Simple mail transfer protocol. This protocol supports the e-mail is
known as a simple mail transfer protocol. This protocol helps you to send the data
to another e-mail address.
SNMP:
SNMP stands for Simple Network Management Protocol. It is a framework which is
used for managing the devices on the internet by using the TCP/IP protocol.
DNS:
DNS stands for Domain Name System. An IP address that is used to identify the
connection of a host to the internet uniquely. However, users prefer to use names
instead of addresses for that DNS.
TELNET:
TELNET stands for Terminal Network. It establishes the connection between the
local and remote computer. It established connection in such a manner that you
can simulate your local system at the remote system.
FTP:
FTP stands for File Transfer Protocol. It is a mostly used standard protocol for
transmitting the files from one machine to another.
Summary:
• The full form or TCP/IP model explained as Transmission Control Protocol/
Internet Protocol.
• TCP supports flexible architecture
• Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3)
Internet Layer 4) Network Interface
• Application layer interacts with an application program, which is the highest
level of OSI model.
• Internet layer is a second layer of the TCP/IP model. It is also known as a
network layer.
• Transport layer builds on the network layer in order to provide data
transport from a process on a source system machine to a process on a
destination system.
• Network Interface Layer is this layer of the four-layer TCP/IP model. This
layer is also called a network access layer.
• OSI model is developed by ISO (International Standard Organization)
whereas TCP/IP model is developed by ARPANET (Advanced Research
Project Agency Network).
• An Internet Protocol address that is also known as an IP address is a
numerical label.
• HTTP is a foundation of the World Wide Web.
• SMTP stands for Simple mail transfer protocol which supports the e-mail is
known as a simple mail transfer
• SNMP stands for Simple Network Management Protocol.
• DNS stands for Domain Name System.
• TELNET stands for Terminal Network. It establishes the connection between
the local and remote computer
• FTP stands for File Transfer Protocol. It is a mostly used standard protocol
for transmitting the files from one machine to another.
• The biggest benefit of TCP/IP model is that it helps you to establish/set up a
connection between different types of computers.
• TCP/IP is a complicated model to set up and manage.
What is IP Subnetting?
Subnetting provides a better way to deal with this situation. Subnetting allows us to create
smaller networks from a single large network which not only fulfill our hosts’ requirement
but also offer several other networking benefits.
I have already explained the advantages of Subnetting along with why Subnetting is
necessary in previous parts of this tutorial. In this part, I will mainly focus on Subnetting
components and terminology.
This tutorial is the third part of the article “IP Subnetting in Computer Network Step
by Step Explained with Examples”. Other parts of this article are following.
Identifying network portion and host portion in an IP address is the first step of
Subnetting. Subnetting can only be done in host portion. Subnet mask is used to
distinguish the network portion from host portion in an IP address.
Both addresses are 32 bits in length. These bits are divided in four parts. Each part is
known as octet and contains 8 bits. Octets are separated by periods and written in a
sequence.
Subnet mask assigns an individual bit for each bit of IP address. If IP bit belongs to
network portion, assigned subnet mask bit will be turned on. If IP bit belongs to host
portion, assigned subnet mask bit will be turned off.
There are two popular notations to write the IP address and Subnet mask; Decimal
notation and Binary notation.
In decimal notation, a value range 1 to 255 represents a turned on bit while a value 0
(zero) represents a turned off bit.
In binary notation, 1 (one) represents a turned on bit while 0 (zero) represents a turned
off bit.
Examples of IP address with subnet mask in binary format
00001010.00001010.00001010.00001010
11111111.00000000.00000000.00000000
10101100.10101000.00000001.00000001
11111111.11111111.00000000.00000000
11000000.10101000.00000001.00000001
11111111.11111111.11111111.00000000
Examples of IP address with subnet mask in decimal format
10.10.10.10
255.0.0.0
172.168.1.1
255.255.0.0
192.168.1.1
255.255.255.0
In above examples network portion is formatted in bold text.
Each IP address belongs to a predefined IP class. There are five predefined IP classes; A,
B, C, D and E. From these classes, class D and E are reserved and cannot be used in
Subnetting.
To learn more about IP address and its classes, you can see this tutorial.
IP Address Classes and Definition Explained
It explains IP address, IP classes, Types of IP address, Private IP address, Public IP address and much more in detail.
In class A, B and C: -
IP Class First IP Address of class Last IP Address of class Default Subnet Mask De
A 0.0.0.0 127.255.255.255 255.0.0.0 Fir
B 128.0.0.0 191.255.255.255 255.255.0.0 Fir
C 192.0.0.0 223.255.255.255 255.255.255.0 Fir
Subnetting eligible host bits
After excluding reserved network bits and host bits, remaining bits are considered as
Subnetting eligible host bits.
Subnetting can be done only in Subnetting eligible bits.
Subnet
A subnet is a single small network created from a large network. In Subnetting we break
a single large network in multiple small networks. These networks are known as subnets.
In each network there are two special addresses; network address and broadcast address.
Network address represents the network itself while broadcast address represents all the
hosts which belong to it. These two addresses can’t be assigned to any individual host in
network. Since each subnet represents an individual network, it also uses these two
addresses.
In simple language, in a single network only two IP addresses will be used for these
addresses. But if we breaks this network in two small networks then four IP addressed will
be used for these addresses.
Network address and broadcast address are also known as Network ID and broadcast ID
respectively.
All addresses between Network address and Broadcast address are known as valid host
addresses. Only valid host addresses can be assigned to the devices in a network. These
devices include end user devices such as computes, laptops, tablets, smartphones, IP
phones, servers, printers, terminals, IP camera and networking devices such switches,
routers, firewalls and proxy servers. In short, any device that uses IP protocol for data
transferring needs a valid host address.
Block Size
Block size is the sum of network address, valid host addresses and broadcast address. For
example, if in a network there are 6 valid hosts than block size of that network is 8 (1
network address + 6 valid hosts + 1 broadcast address).
Power of 2
An IP address is built from the various combinations of IP bits. Understanding how many
combinations the number of bits provides or to get the number of combinations how
many bits we need is the second essential step of Subnetting.
• A combination of all 32 represents a unique IP address.
• A combination of network bits in IP address represents the number of networks or
subnets.
• A combination of host bits in IP address represents the number of total hosts.
To know how many combinations the number of bits provides or to get the number of
combinations how many bits are required, we use the power of 2.
For example, to break a single large network in 4 subnets, we need 2 (22 = 4) Subnetting
bits. This way if we have 3 Subnetting bits, we can make 8 (23 = 8) additional networks.
Subnetting Direction
Subnetting always flows in single direction (left to right) without skipping any bit. This
simple rule gives us the exact location of Subnetting bits in an address space. Let’s take
an example.
A class C network is subnetted in 4 subnets. Find the number of host bits used in
Subnetting and their location in address space.
Since in class C network space Subnetting eligible bits starts from 25 and Subnetting
always goes from left to right without skipping any bit, the bits used in this network are
25 and 26.
Slash Notation
It’s a compact representation of Subnet mask. In this notation a slash (/) sign and total
number of the on bits in subnet mask are written with IP address instead of full Subnet
mask.
Following table lists some examples of IP addresses with Subnet mask in all three
notations.
There are two types of Subnetting FLSM and VLSM. In FLSM, all subnets have equal
number of host addresses and use same Subnet mask. In VLSM, subnets have flexible
number of host addresses and use different subnet mask.
FLSM is easy in implementation and simple in operation but wastes a lot of IP addresses.
VLSM is hard in implementation and complex in operation but utilizes maximum IP
addresses.
Several steps involve in both types of Subnetting. Due to length of this tutorial, I will
explain both types of Subnetting individually in next parts of this article.
That’s all for this part. In next part, we will learn how to perform a FLSM Subnetting step
by step in detail with practical examples. If you have any suggestion or feedback regarding
this tutorial, please let me know. If you like this tutorial, please share it with friends.
Subnetting Worked Examples and Exercises
The best way of learning subnetting is to do it. Here are a selection of worked examples
to help you get started.
At the end are some links to online quizes so you can do it yourself.
1- You have been allocated a class A network address of 29.0.0.0. You need to create at least
20 networks and each network will support a maximum of 160 hosts. Would the following two
subnet masks Work?
Mask 255.255.0.0 has 8 bits for the subnet and 16 bits for the host
Mask 255.255.255.0 has 16 bits for the subnet and 8 bits of the host.
2. – You have been allocated a class B network address of 135.1.0.0 and and need to create 4
subnets each with around 200 hosts what is the easiest mask to use to satisfy the criteria?
Easiest is to sub net on a byte boundary which would mean a subnet mask
of 255.255.255.0
This would allocate 8 bits for the subnet and 8 bits for the host.
We need to accommodate around 200 hosts which requires 8 bits which we have.
We need 4 subnets which require 4 bits and we have 8 bits. So we have more than
enough.
222.1.1.20/26
Decimal 248 =11111000 binary which means that 5 bits of this octet are used for the
subnet. Now add the 16 bits 255.255. and we have 21 bits. So we write:
135..1.1.25/21
5 – You have been allocated a class C network address of 211.1.1.0 and are using the default
subnet mask of 255.255.255.0 how may hosts can you have?
A class C address has 8 bits of the host which will give 28 -2 =254 hosts
6 .Subnet the Class C IP Address 195.1.1.0 So that you have 10 subnets each with a maximum
12 hosts on each subnet. List the Address on host 1 on subnet 0,1,2,3,10
8. Subnet the Class C IP Address 195.1.1.0 So that you have at least 2 subnets each subnet
must have room for 48 hosts .
What are the two possible subnet masks?
Total of 7 bits needed so therefore we can use either 1 bit or 2 bits for the subnet. So
we could have
masks are 10000000 and 11000000 =128 decimal and 192 decimal.
9 .Given the subnet Mask 255.255.255.192 What is the host address and subnet of the
following IP address 197.1.2.67.
192 in binary =11000000 gives 4 possible subnets of (showing 2 most significant bits):
00,01,10,11
67 in binary =01000011
So Applying Mask:
Super netting Tutorial: - Super netting Explained with
Examples
This tutorial explains Super netting, route summarization and route aggregation in detail
with examples. Learn how Super netting is done step by step along with the fundamental
and the basic concepts of Super netting such as what is Super netting, why Super netting
is done and what are the advantages of Super netting.
Super netting is mainly done for optimizing the routing tables. A routing table is the
summary of all known networks. Routers share routing tables to find the new path and
locate the best path for destination.
Without Super netting, router will share all routes from routing tables as they are. With
Super netting, it will summarize them before sharing. Route summarization reduces the
size of routing updates dramatically.
• Network ID and broadcast ID are used to check the alignment of routes. Super netting can be
performed only if routes are sequential.
• Block size is used to calculate the summarized route from given routes.
• Subnet mask and CIDR value is the same thing in different notations. Both are used to find the
ON network bits in IP address. In exam, question may use any notation. While preparing for
Cisco exam, you should practice with both.
Since an advertise route is the combination of network ID and CIDR value, we only need
to figure out the broadcast ID, subnet mask and block size.
32 -25 = 7
27 = 128
Broadcast ID is the last address of network. Once you know the block size, to calculate the
broadcast ID, simply count the addresses starting from network ID till the last address of
the block.
For example if network ID is 192.168.1.0/25 and block size is 128 and then broadcast ID
will be 192.168.1.127/25.
In counting, the 0 is used as a number. For example, [0, 1 and 2] are 3 numbers.
Following table lists all CIDR values along with subnet mask and block size.
/8 255.0.0.0
/9 255.128.0.0
/10 255.192.0.0
/11 255.224.0.0
/12 255.240.0.0
/13 255.248.0.0
/14 255.252.0.0
/15 255.254.0.0
/16 255.255.0.0
/17 255.255.128.0
/18 255.255.192.0
/19 255.255.224.0
/20 255.255.240.0
/21 255.255.248.0
/22 255.255.252.0
/23 255.255.254.0
/24 255.255.255.0
/25 255.255.255.128
/26 255.255.255.192
/27 255.255.255.224
/28 255.255.255.240
/29 255.255.255.248
/30 255.255.255.252
Super netting can be done only in same address space. If address space is completely
different between two or more routes, they cannot be summarized in a single route. For
example, we can’t summarize the route 192.168.1.0/25 with the route 193.168.1.128/25.
A route can be summarized only in a route which is bigger than it in block size. For
example we can’t summarize a route of block size 64 in a route of block size 32 but we
can summarize two routes of block size 32 in a single route of block size 64.
The easiest way of calculating the summarized route is adding the block size of all
sequential routes and using the Subnetting which provides the block size that is equal to
the result of addition. For example if we have two sequential routes of block size 16, we
can summarize them in a single route of block size 32.
Summarization can be done only in available bock sizes. For example if we have 5 routes
of block size 8, we cannot summarize them in single route of block size 40 (8x5). 40 is not
a valid block size. For valid block sizes see the Supernetting chart give above. In this case,
the best choice is summarizing first four routes is single summarized route of block size
32 and keeping the fifth route as it is.
Just like block size, network ID of summarized route must be matched with the network
ID of first sequential route. To calculate the valid network in summarized block size, simply
count in block size starting from 0.
For example, if summarized block size is 32 then valid network IDs are 0, 32, 64, 96, 128,
160, 192 and 224. If the first sequential route of routes which we are summarizing doesn’t
start with any one of these network IDs, they can’t be summarized in a single route of
block size 32, even they satisfy the block size requirement.
For instance the route 192.168.1.16/28 and the route 192.168.1.32/28 can’t be
summarized in a single route of block size 32 even they are sequential and their collective
block size (16+16) is equal to the 32.
Any sequential routes which start with any one of these network IDs can be summarized
with this block size. For instance route 192.168.1.0/28 and the route 192.168.1.16/28 can
be summarized in a single route 192.168.1.0/27 of block size 32
Never select a block size which does not cover all addresses unless it is clearly mentioned
in question that remaining addresses will be used behind the router where summarization
will be performed.
For example, if we have two routes with block size of 16 and 8, we can’t summarize them
in a single route of block size 32. If we do that, router will advertise a summarized route
that says this router have network path for 32 addresses while in reality it have network
path only for 24 (16+8) addresses.
Let’s take another example. If we have three routes with block size of 16, instead of
summarizing all of them in single route of block size 64 (16+16+16 = 48), we should
summarize only first two routes in a single route of block size 32 (16+16 =32). In this case,
router will advertise two routes; one summarized route of block size 32 and other original
route. Advertising two correct routes is better than advertising a single incorrect route.
Supernetting Examples Explained Step by Step
Above we took the two examples of Supernetting. Let’s understand how Supernetting was
performed in them step by step.
Arrange all the routes in ascending order based on their after slash value (also known
CIDR value). If CIDR value is same in two or more routes, use their IP addresses for
ordering.
192.168.1.0/25 25 10.0.0.0/23
192.168.1.128/26 26 10.0.2.0/24
192.168.1.192/27 27 10.0.3.0/25
192.168.1.224/28 28 10.0.3.128/26
192.168.1.240/30 30 10.0.3.192/27
192.168.1.244/30 30 10.0.3.224/28
192.168.1.248/30 30 10.0.3.240/30
192.168.1.252/30 30 10.0.3.244/30
10.0.3.248/30
10.0.3.252/30
Write the CIDR value, Subnet Mask, Network ID, Broadcast ID and block size of each route.
Supernetting Example 1
Route CIDR value Subnet Mask Network ID
Supernetting Example 2
Route CIDR value Subnet Mask Network ID
Group the routes based on sequence. If a route’s network ID starts from where previous
route’s broadcast ID ends, it is a sequential route. But if it does not start from where
previous route ends, it is not a sequential route.
Add the block size of all sequential routes.
In first example, sum of block sizes is 256 and in second example it is 1024.
Check the nearest valid block size which provides equal or less number of addresses. The
block size 256 and 1024 exactly match with our requirement. The Subnetting of /24 and
/22 give us the block size of 256 and 1024 respectively.
To write the summarize route, use the network ID of first route with the CIDR value or the
subnet mask of the summarized route.
In first example, network ID of the first route is 192.168.1.0 and the CIDR value of
summarized route is /24. Thus, the summarized route for first example will be
192.168.1.0/24.
Same way in second example, network ID of first route is 10.0.0.0 and the CIDR value of
summarized route is /22. So, the summarize route for second example will be 10.0.0.0/22.
If you are preparing for Cisco exam, you should practice with unplanned IP addressing.
To test candidates’ caliber, Cisco usually puts complex and unplanned networks in
Supernetting related questions.
To get an overview of how Supernetting questions could be difficult in Cisco exam, let’s
have two examples of complex Supernetting. These examples are based on Supernetting
questions asked in CCNA Routing and Switching exam.
Supernetting Example 3
Supernetting Example 4
Step 2: - Write the network ID, broadcast ID, CIDR value, subnet mask and block size of
each route.
Step 3: - Based on network ID and Broadcast ID make the group of sequential routes.
In first group, there are two sequential routes; 32 and 48. Both routes have a block size of
16. The sum of block sizes is 32 (16+16). 32 is a valid block size. The network ID of first
sequential route is 32 which is a valid network ID in block size 32 (0, 32, 64,…). Block size
32 is associated with CIDR value /27. Let’s use this block size for summarization.
Summarize the routes 172.168.1.32/28 and the route 172.168.1.48/28 in a single route
172.168.1.32/27 of block size 32.
In second group, there are 4 sequential routes 128, 144, 160 and 176 of block size 16. The
sum of all block sizes is 64. 64 is a valid block size. Network ID of first sequential route
(128) is also in the range of block size 64 (0, 64, 128, 192 ……). Thus, we can use the block
size 64 to summarize these routes. CIDR value of block size 64 is /26. Let’s use it to
summarize these routes.
The sum of block sizes is 64 (16+16+16+16) in first group and 32 (16+16) in second group.
Both 64 and 32 are valid block sizes and the network ID of first sequential route in both
groups is also a valid network ID in both block sizes.
Summarize the routes 172.168.1.192/28 and the route 172.168.1.208/28 in a single route
172.168.1.192/27 of block size 32.
Supernetting example 4 (Router A)
There are total 5 routes behind this router. Since first two routes 0 and 48 have no
sequential routes, we have to advertise them individually. We can’t summarize a route
which has no sequential route.
Remaining 3 routes 64, 72 and 80 are sequential with the block size 8. The sum of block
sizes (8+8+8) is 24. Since 24 is not a valid block size, we have to exclude the routes from
summarization until the sum of block sizes becomes equal to a valid block size. If we
exclude one route from summarization, the sum of block sizes reduces to 16 which is a
valid block size.
In block size 16, 64 (the network ID of first sequential route) is a valid network ID (0, 16,
32, 48, 64, 80……).
Summarize first two routes in a summarize route 122.128.58.64/28 of block size 16 and
advertise the remaining third route 122.128.58.80/29 independently.
Remaining five routes 8, 16, 24, 32 and 40 are sequential. Total numbers of address in
these routes are 40 (8+8+8+8+8). 40 is not a valid block size. The nearest valid block size
is 32. So if we exclude one route (8+8+8+8-8 = 32), can we use the block size 32 for
remaining routes?
No, even 32 is a valid block size, still it can’t be used. In order to use it, network ID of first
route must be any one ID form 0, 32, 64, 96, 128, 160, 192 and 224. While in this case,
network ID of first route is 8. Thus the block size 32 can’t be used for summarization.
Our next valid block size is 16. If we use this block size, we have to create two summarized
routes and skip one sequential route from the summarization. Each summarized route of
block size 16 will summarize the 2 sequential routes of the block size 8.
Since in order to use the block size 16, we have to skip one route from the five sequential
routes and due to the same reason explained above in block size 32 we can’t summarize
the first route 8, exclude the first route from summarization.
Summarize remaining 4 routes (16, 24, 32, and 40) of block size 8 in two separate
summarized routes 122.128.58.16/28 and 122.128.58.32/28 of block size 16.
Following table lists the summarized routes for all four routers.
122.128.58.64/28
122.128.58.80/29