SodaPDF Converted CNE Report Microproject
SodaPDF Converted CNE Report Microproject
Title of Micro project: “Prepare a report on IPv4 Classes and Subnet Mask”.
Academic Year: 2021-2022 Program Code: IF
Course: Computer Network Course Code: 22417
Submitted by:
CERTIFICATE
Certified that this micro project report titled “Prepare a report on IPv4 Classes and Subnet Mask.”
is the bonafide work of Pratik Nichit Roll no: 1426 of year Diploma in Information Technology
for the Course: Computer Network Course code: 22417 during the Academic Year 2021-2022 ,
who carried out the micro project work under my supervision.
CERTIFICATE
Certified that this micro project report titled “ Prepare a report on IPv4 Classes and Subnet Mask.”
is the bonafide work of, Pawan Pagare Roll no: 1427of year Diploma in Information
Technology__ for the Course: Computer Network _ Course code: 22417 during the Academic
Year 2021-2022 , who carried out the micro project work under my supervision.
CERTIFICATE
Certified that this micro project report titled “ Prepare a report on IPv4 Classes and Subnet Mask.”
is the bonafide work of, Ayuti Pardeshi Roll no: 1428 of year Diploma in Information
Technology__ for the Course: ___Computer Network _ Course code: 22417 during the
Academic Year 2021-2022 , who carried out the micro project work under my supervision.
CERTIFICATE
Certified that this micro project report titled “ Prepare a report on IPv4 Classes and Subnet Mask.”
is the bonafide work of Saloni Pavaskar Roll no: 1429 of year Diploma in Information
Technology__ for the Course: Computer Network _ Course code: 22417 during the Academic
Year 2021-2022 , who carried out the micro project work under my supervision.
CERTIFICATE
Certified that this micro project report titled “ Prepare a report on IPv4 Classes and Subnet Mask.”
is the bonafide work of Aparna Pawar Roll no: 1430 of year Diploma in Information
Technology__ for the Course: Computer Network Course code: 22417 during the Academic
Year 2021-2022 , who carried out the micro project work under my supervision.
We would like to express our special thanks of gratitude to our friends our group members as
well as our teachers, who gave us opportunity to do this wonderful micro project on the topic “
Prepare a report on IPv4 Classes and Subnet Mask.” which also helped us in doing a lot of
Research and we came to know about so many new things we all really thankful to all who help us
doing this micro project.
Secondly we would also like to thank our parents and friends who helped us a lot in finalizing
this project within the limited time frame.
VISION:
Achieve excellence in quality technical education by imparting knowledge, skills and abilities to build
a better technocrat.
MISSION:
M1: Empower the students by inculcating various technical and soft skills.
Vision
To enrich intellectual potential by imparting technical knowledge and skills to become
an IT professional
Mission
M1: To confer the technical education and skills required for IT field
PO1 Basic and Discipline specific knowledge: Apply knowledge of basic mathematics,
science and engineering fundamentals and engineering specialization to solve the
engineering problems.
PO2 Problem analysis: Identify and analyze well-defined engineering problems using
codified standard methods.
PO7 Life-long learning: Ability to Analize individual needs and engage in updating in
the context of technological changes.
1. Title
2. Certificate
3. Acknowledgement
4. Annexure I
5. Annexure II
6. Annexure III
7. Annexure IV
8. Log Book
Micro-Project Proposal
Title of the Project: “Prepare a report on IPv4 Classes and Subnet Mask”
Benefits:-
1. Learned to connect devices to the Web
2. Reduced network congestion
1. Arrangement of groups and representatives for groups that are not usually represented as
partners in main projects.
2. Capacity building and networking in relation to the role as partners in micro projects.
3. Collected materials related to project.
4. Support development of more need and user driven projects.
5. Contribute to the maximum requirements of project.
6. An eligible project idea addressing one of the four Priority Axes and a work plan for a micro
project including a description of how the capacity building and networking should take place.
7. The project involves maximum five partners. From five partners, the contributions of micro
project are distributed.
8. An eligible Lead member who will guide the group members and analyzed the data.
9. Eligible match finding the proper information.
10. Softcopy corrections by respective teachers.
11. Completion of the micro project properly.
12. Final copy and submission.
4.0 Action Plan
https://www.javatpoint.com/ipv4-vs-ipv6
https://www.computernetworkingnotes.com/ccna-
study-guide/subnetting-tutorial-subnetting-
explained-with-examples.html
Micro-Project Report
Title of the Project: “Prepare a report on IPv4 Classes and Subnet Mask.”
Benefits:
1) Learned to connect devices to the Web.
2) Reduce network congestion.
In this project we learned about IP4 Classes and Subnet Mask, its features and use, its
applications and addressing of IP Networks. We learned how network congestion is
reduce using subnetting. We came to know about main functions of both. The subnet
mask is very useful to divide IP address into two parts. This project helped us to study
deeply about subnetting and IP classes.
In the IPv4 IP address space, there are five classes: A, B, C, D and E. Each class has a specific
range of IP addresses and ultimately dictates the number of devices you can have on your network.
IPv4
Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet
Protocol (IP) and the first version of the protocol to be widely deployed.
It is one of the core protocols of standards-based internetworking methods of the Internet,
and routes most traffic in the Internet.
IPv4 is a datagram protocol primarily responsible for addressing and routing packets
between hosts.
IPv4 is connectionless, which means that it does not establish a connection before
exchanging data, and unreliable, which means that it does not guarantee packet delivery.
IPv4 does not attempt to recover from these types of errors. A higher-layer protocol, such as
TCP or an application protocol, must acknowledge delivered packets and recover lost
packets if needed.
IPv4is defined in RFC 791 An IPv4 packet consists of an IPv4 header and an IPv4 payload.
An IPv4 payload, in turn. consists of an upper layer protocol data unit,
such as a TCP segment or a UDF message.
Version: The first IP header field is a 4-bit version indicator. In IPv4, the value of its four
bits is set to 0100, which indicates 4 in binary. However, if the router does not support the
specified version, this packet will be dropped.
Internet Header Length: Internet header length, shortly known as IHL, is 4 bits in size. It
is also called HELEN (Header Length). This IP component is used to show how many 32-
bit words are present in the header.
Type of Service: Type of Service is also called Differentiated Services Code Point or
DSCP. This field is provided features related to the quality of service for data streaming or
VoIP calls. The first 3 bits are the priority bits. It is also used for specifying how you can
handle Datagram.
Total length: The total length is measured in bytes. The minimum size of an IP datagram is
20 bytes and the maximum, it can be 65535 bytes . HELEN and Total length can be used to
calculate the dimension of the payload. All hosts are required to be able to read 576-byte
datagrams. However, if a datagram is too large for the hosts in the network, the
fragmentation method is widely used.
Identification: Identification is a packet that is used to identify fragments of an IP datagram
uniquely. Some have recommended using this field for other things like adding information
for packet tracing, etc.
IP Flags: Flag is a three-bit field that helps you to control and identify fragments. The
following can be their possible configuration:
o Bit 0: is reserved and has to be set to zero
o Bit 1: means do not fragment
o Bit 2: means more fragments.
Fragment Offset: Fragment Offset represents the number of Data Bytes ahead of the
particular fragment in the specific Datagram. It is specified in terms of the number of 8
bytes, which has a maximum value of 65,528 bytes.
Time to live: It is an 8-bit field that indicates the maximum time the Datagram will be live
in the internet system. The time duration is measured in seconds, and when the value of
TTL is zero, the Datagram will be erased. Every time a datagram is processed its TTL value
is decreased by one second. TTL are used so that datagrams are not delivered and discarded
automatically. The value of TTL can be 0 to 255.
Protocol: This IPv4 header is reserved to denote that internet protocol is used in the latter
portion of the Datagram. For Example, 6 number digit is mostly used to indicate TCP, and
17 is used to denote the UDP protocol.
Header Checksum: The next component is a 16 bits header checksum field, which is used
to check the header for any errors. The IP header is compared to the value of its checksum.
When the header checksum is not matching, then the packet will be discarded.
Source Address: The source address is a 32-bit address of the source used for the IPv4
packet.
Destination address: The destination address is also 32 bit in size stores the address of the
receiver.
IP Options: It is an optional field of IPv4 header used when the value of IHL (Internet
Header Length) is set to greater than 5. It contains values and settings related with security,
record route and time stamp, etc. You can see that list of options component ends with an
End of Options or EOL in most cases.
Data: This field stores the data from the protocol layer, which has handed over the data to
the IP layer.
In Class A, the first bit in higher order bits of the first octet is always set to 0 and the remaining 7
bits determine the network ID. The 24 bits determine the host ID in any network.
Class B
In Class B, an IP address is assigned to those networks that range from small-sized to large-
sized networks.
In Class B, the higher order bits of the first octet is always set to 10, and the remaining14
bits determine the network ID. The other 16 bits determine the Host ID.
Class C
In Class C, an IP address is assigned to only small-sized networks.
In Class C, the higher order bits of the first octet is always set to 110, and the remaining 21
bits determine the network ID. The 8 bits of the host ID determine the host in a network.
Class D
In Class D, an IP address is reserved for multicast addresses. It does not possess subnetting.
The higher order bits of the first octet is always set to 1110, and the remaining bits
determines the host ID in any network.
Class E
In Class E, an IP address is used for the future use or for the research and development
purposes. It does not possess any subnetting. The higher order bits of the first octet is always
set to 1111, and the remaining bits determines the host ID in any network.
The “255” address is always assigned to a broadcast address, and the “0” address is always
assigned to a network address. Neither can be assigned to hosts, as they are reserved for these
special purposes.
The IP address, subnet mask and gateway or router comprise an underlying structure—the Internet
Protocol—that most networks use to facilitate inter-device communication.
When organizations need additional subnetworking, subnetting divides the host element of the IP
address further into a subnet. The goal of subnet masks are simply to enable the subnetting process.
The phrase “mask” is applied because the subnet mask essentially uses its own 32-bit number to
mask the IP address.
Subnetting:
IP networks can be divided into smaller networks called subnetworks (or subnets).
Subnetting is the process of breaking down a main class A, B, or C network into subnets for
routing purposes.
A subnet mask is the same basic thing as a netmask with the only breaking a larger
organizational network into smaller parts, and each smaller section will use a different set of
address numbers.
This will allow network packets to be routed between subnetworks. When doing subnetting,
the number of bits in the subnet mask determine the number of available subnets.
Two to the power of the number of bits minus two is the number of available subnets. When
setting up subnets the following must be determined
Number of segments, and
Hosts per segment.
Subnetting provides the following advantages:
Network Traffic Isolation: There is less network traffic on each subnet.
Simplified Administration: Networks may be managed independently.
Improved Security: Subnets can isolate internal networks so they are not visible
from external networks.
A 14 bit subnet mask on a class B network only allows 2 node addresses for WAN links. A
routing algorithm like OSPF (Open Shortest Path First) must be used for this approach.
These protocols allow the Variable Length Subnet Masks (VLSM). RIP (Routing
Information Protocol) and IGRP (Interior Gateway Routing Protocol) don't support this.
Subnet mask information must be transmitted on the update packets for dynamic routing
protocols for this to work.
The router subnet mask is different than the WAN interface subnet mask.
The router subnet mask is
One network ID is required by each of:
Subnet,
WAN connection.
One host ID is required by each of:
Each NIC on each host.
Each router interface .
Types of subnet masks:
Default: Fits into a Class A, B, or C network category.
Custom: Used to break a default network such as a Class A, B, or C network into
subnets.
A subnet is defined by applying a bitmask, the subnet mask, to the IP address. If a bit is on the
mask, the equivalent bit in the address is interpreted as a network bit. If the bit in the mask is off,
the bit belongs to the host part of the address. The subnet is only known
locally. To the rest of the Internet, the address is still interpreted as a standard IP address.
Advantages:
1. Subnetting allows us to break a single large network in smaller networks. Small networks are
easy to manage.
2. Subnetting reduces network traffic by allowing only the broadcast traffic which is relevant to the
subnet.
3. By reducing unnecessary traffic, Subnetting improves overall performance of the network.
4. By blocking a subnet’ traffic in subnet, Subnetting increases security of the network.
5. Subnetting reduces the requirement of IP range.
Disadvantages:
1. Different subnets need an intermediate device known as router to communicate with each other.
2. Since each subnet uses its own network address and broadcast address, more subnets mean more
wastage of IP addresses.
Subnetting ads complexity in network. An experienced network administrator is required to manage
the sub netted network.
8.0 Skill Developed/Learning outcome of this Micro-Project
1. Learned about IP4 Classes.
2. Learned advantages of Subnetting.
3. Learned functions of IP4 classes.
4. Learned the use of subnetting and IP class.
(The marks may be allotted to the characteristics of the Micro-Project by considering the
suggested rubrics)
6. Report Preparation Very short, poor Nearly sufficient Detailed, correct Very detailed,
quality sketches, and correct details and clear
Details about about methods, description of correct, clear
methods, materials, methods, description of
materials, precautions and materials, methods,
Precautions and conclusion. But precautions and materials,
Conclusions clarity is not there conclusion. precautions and
omitted, some in presentation. Sufficient conclusion.
details are But not enough graphic Enough tables,
wrong. graphic description description charts and
sketches
Title of the Micro-project: “Prepare a report on IPv4 Classes and Subnet Mask.”
Title of the Micro-project: “Prepare a report on IPv4 Classes and Subnet Mask.”
Title of the Micro-project: “Prepare a report on IPv4 Classes and Subnet Mask.”
Title of the Micro-project: “Prepare a report on IPv4 Classes and Subnet Mask.”
Title of the Micro-project: : “Prepare a report on IPv4 Classes and Subnet Mask.”
Title of the Project: “Prepare a report on IPv4 Classes and Subnet Mask.”
1 Relevance to course
2 Literature review/information collection
3 Completion of target as per project proposal
4 Analysis of data and representation
5 Quality of prototype/model
6 Report Preparation
Total Out of (60)
Process and Product Assessment (A) :Total Out of (06)
A) Individual Presentation/Viva(B)
Rubric Rubric Individual
Individual
7 8 Presentati
Presentation
on/Viva
/Viva
Individ (Convert Total
Individ (Addition of
ual out of 08 (A+B)
Roll Enrollment ual marks in
Name of Student Present marks into
No. No. Viva Rubric 7 to
ation out of 4)
8)
(B)
Marks Marks Mark
Marks out Marks out
out of out of s out
of 20 of 04
10 10 of 10
1426 2001410095 Pratik Nichit
1427 2001410096 Pawan Pagare
1428 2001410097 Ayuti Pardeshi
1429 2001410098 Saloni Pavaskar
1430 2001410099 Aparna Pawar
Semester: 4th
Title of the Project: “Prepare a report on IPv4 Classes and Subnet Mask.”
(b)Practical outcomes :-
Roll No. Student Name Marks out of (6) Marks out of (4) for Total out of
for performance performance in (10)
in group activity oral / presentation
1426 Pratik Nichit
1427 Pawan Pagare
1428 Ayuti Pardeshi
1429 Saloni Pavaskar
1430 Aparna Pawar