module i ip all
TRANSCRIPT
-
8/13/2019 Module I IP ALL
1/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
2/113
For circuit-switched communication, the network sets up a connection to a UE/MS by
providing a fixed bandwidth allocation on the air interface. Even if only small amounts
of data are transferred, the UE/MS occupies the radio resource for the duration of the
connection. The user must pay for the total connection time.
Due to the constant bandwidth allocation, delays are minimized and the Quality of
Service (QoS) perception for real time services is very good.
Circuit-switched communication is suitable for data traffic when one or more of the
following cases apply:
1. Constant bandwidth data flow
2. Data is sensitive to even small connection delays
For example circuit-switched communication could be chosen for videoconferences
because of its sensitivity to connection delays. The video conferencing in the
implementation of 3G will be done using Circuit switched Data services.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
3/113
For packet-switched communication, the network delivers data packets as the need
arises. On the air interface, radio channels are shared as an access resource, between
severalUEs/MSssimultaneously. For WCDMA Systems, if the data rate for a given
user connection exceeds a certain threshold, the UE may temporarily be assigned a
dedicated resource on the air interface. The UE will drop back to a shared resource
when the source data rate is reduced.
Address information is included with each packet to enable the packet to find its
addressee. Packet-switched communication is suitable for data traffic when one or
more of the following cases apply:
1. Data is sent in bursts
2. Data is sensitive to errors
For example packet-switched communication should be chosen for telemetry
applications and e-mail, the former because of its sensitivity to errors and the latter
because the data is sent in bursts.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
4/113
Module I: IP Bas
Standard Bodies
All computer data networks were proprietary in the early 1970s. That is, the same
manufacturer, for example, IBM, provided the custom computer hardware and
software on each end of a communications link.
Further more, these proprietary networks were host centric. This meant that if your
mainframe host computer was IBM, for example, the networking front end
processors also had to be IBM. It also meant that data transmitted from any one of
your sites was first sent to the mainframe host computer for routing to another site.
The networking protocols and applications programs were proprietary and would not
inter-operate between manufacturers.
LAN technologies Token Ring and Ethernet would not inter-operate. Furthermore,
neither Token Ring nor Ethernet would inter-operate with a non-proprietary WANprotocol. Each manufacturer had their own proprietary communication protocols and
application programs, which had common code to tie them together.
-
8/13/2019 Module I IP ALL
5/113
Module I: IP Bas
The International Standards Organization (ISO) has produced a protocol standard known as the OpenSystems Interconnection (OSI) Reference Model. This consists of 7-layers that describe the hierarchicaloperation of specific functions in the communications process. Although the protocol itself has notgained wide acceptance, it is considered important as a means of identifying the factors andcomparing the performance and capabilities of different protocols.
Each layer performs a well defined function, exchanging messages (relating to user data and controlinformation) with the equivalent layer in another system, and having a well-defined interface to thelayers immediately above and below itself.
OSI Reference Model - Layers
Characteristics of the OSI Layers
The OSI model is a modular design. Each successive layer of the OSI model works with the one aboveand below it.
The first four layers, Physical, Data Link, Network and Transport Layers, provide the end-to-endservices necessary for the transfer of data between two systems. These layers provide the protocolsassociated with the communications network used to link, the two computers together.
The top three layers, the Application, Presentation and Session Layers, provide the application servicesrequired for the exchange of information. That is, they allow two applications, each running on a
different node of the network, to interact with each other through the services provided by theirrespective operating systems.
The upper layers of the OSI model deal with application issues and generally are implemented only insoftware. The highest layer, application, is closest to the end user. Both users and application-layerprocesses interact with software applications that contain a communications component.
Reminders
Several phases are popularly used to help people remember the order of the layers of the OSI model.
From top to bottom the phrase, AllPeople Seem To Need Data Processing,may be remembered,referring to Application, Presentation, Session, Transport, Network, Datalink and Physical.
Alternatively, from bottom to top the phrase, Please Do Not Throw Sausage Pizza Away, may beremembered, referring to Physical, Datalink, Network, Transport, Session, Presentation andApplication.
-
8/13/2019 Module I IP ALL
6/113
Module I: IP Bas
Physical Layer
The functions of the Physical Layer are to specify physical network structures,mechanical and electrical specifications for the transmission medium, and encodingand timing rules for bit transmission.
Specifications
These specifications can be grouped into a number of different areas, which includethe following:
Connection types
Physical topology
Signalling
Bit synchronisation
Bandwidth use
Multiplexing.
Connections
Networks use point-to-point and multipoint connections. The two connection typesdiffer in the manner in which devices connect to a cable or segment of transmissionmedium.
-
8/13/2019 Module I IP ALL
7/113
Module I: IP Bas
Data Link LayerFunctions
The functions of the Data Link Layer are to: organise the physical layersbits into logical groups of information called frames,detect, and sometimes correct errors, control the flow of data and identify computers on the network with the use of mediaaccess control or MAC addresses.
Note: The Data Link Layer functions are usually divided into Media Access Control (MAC) functions and the Logical Link Control(LLC) functions.
MAC Data Link Sub-Layer
The MAC data link layer is concerned with the following:
Logical topology
Media access
MAC addressing.
Logical Topology
The actual signal path that data takes on a network is called the networkslogical topology. In a logical bus topology, every signalis received by all devices. In a logical ring topology, each device only receives signals that have been specifically sent to it.
Sometimes, the physical topology of a network does not reflect its logical topology. For example, in an IBM token ring network,the physical topology is a star, while the logical topology is a ring.
Media Access
Logical topologies control when devices are allowed to transmit. This control process is called media access. A major part of thefunction of media access is reducing collisions on the network. Each of the following media access methods has different rules
for media access control:Contention - Carrier Sense Multiple Access/Collision Detection (CSMA/ CD) is an example of a contention system.
Token passing - FDDI and Token Ring networks use token passing.
MAC Addressing
The data link layer is only concerned with physical device addresses, or MAC addresses. MAC addresses are allocated to vendorsby the IEEE, and the vendors assign a unique address to each Network Interface Card (NIC). The format of addresses depends onthe media access method used, which is why they are called MAC addresses. In most LANs, MAC addresses are used to identifythe destination device of a frame.
LLC Data Link Sub-Layer
The LLC data link layer is concerned with transmission synchronisation and connection services.
While the physical layer synchronises the sending and receiving of bits, the data link layer does the same for groups of bits,called frames.
-
8/13/2019 Module I IP ALL
8/113
-
8/13/2019 Module I IP ALL
9/113
Module I: IP Bas
Transport Layer
The function of the Transport Layer is to accept data from the Session Layer, split it up into smaller
pieces if required, pass these to the Network Layer, and ensure that the pieces all arrive correctly at
the other end.
Under normal conditions, the Transport Layer creates a distinct network connection for each transport
connection required by the Session Layer. However, if the transport connection requires a high
throughput, the Transport Layer might create multiple network connections, dividing the data among
the network connections to improve throughput. On the other hand, if creating or maintaining a
network connection is expensive, the Transport Layer might multiplex several transport connections
onto the same network connection to reduce the cost. In all cases, the Transport Layer is required to
make the multiplexing transparent to the Session Layer.
The Transport Layer is a true source-to-destination or end-to-end layer. In other words, a program on
the source machine carries on a conversation with a similar program on the destination machine, using
the message headers and control messages.
In addition to multiplexing several message streams onto one channel, the Transport Layer musk takecare of establishing and deleting
connections across the network. This requires some kind of naming mechanism, so that process on
one machine has a way of describing with whom it wishes to converse. There must also be a
mechanism to regulate the flow of information, so that a fast host cannot overrun a slow one.
-
8/13/2019 Module I IP ALL
10/113
Module I: IP Bas
Session LayerThe purpose of the Session Layer is to facilitate and control communication sessions between service providers and servicerequesters. The Session Layer has functions to establish, maintain, synchronise, and manage communication sessions. Often, ithelps the upper layers identify and connect to the services available on the network.
The two main session layer tasks are:
Dialogue Control
Session AdministrationDialogue Control
There are three types of dialogue that the session layer uses:
Simplex, which allows data to flow in only one direction, Since the dialogue is only one way information can besent, but not responded too, or even acknowledge.
Half duplex, which allows data to flow in two directions, but only one direction at a time.
Full duplex, which lets data flow in both directions simultaneously.
Session AdministrationSession administration covers connection establishment, data transfer, and connection release.
Connection Establishment
Connection establishment involves the following:
Verifying user login names and passwords. Establishing connection identification numbers.
Agreeing which services are required and for how long.
Determining what entity begins the conversation.
Co-ordinating acknowledgement numbering and retransmission procedures.
Data Transfer
Data transfer involves the following:
Actual data transfer.
Acknowledgement of receipt of data, including negative acknowledgement when data is not received.
Resumption of interrupted communication, when required.
Connection Release
Connection release is the task of ending a communication session. Connection release occurs either by agreement of bothparties, or when the connection is broken off for some reason. Entities recognise a lost connection when they do not receive anacknowledgement of data received.
-
8/13/2019 Module I IP ALL
11/113
Module I: IP Bas
Presentation Layer
The Presentation Layer transforms data into a format comprehensible to both the sending and the receivingapplication. This format is known as transfer syntax. The Presentation Layer can also compress or expand, andencrypt or decrypt, data.
The main functions of the Presentation Layer are:
TranslationEncryption.
Translation
Computer manufacturers and standards organisations have created rules for converting data (1s and 0s) into aformat that humans can understand. However, these rules often conflict with each other, and translationbetween different rule sets can be required. The following are types of translation:
Bit Order Translation
Bit order translation determines issues such as how many bits constitute a discrete piece of data, and in whatorder bits should be counted.
Byte Order Translation
Byte order translation does the same as bit order translation when different systems use different methods ofgrouping and interpreting bytes.
Character Code Translation
Character code translation translates between different character sets, such as the ANSI standard AmericanStandard Code for Information Interchange (ASCII), and Shift-JIS for Japanese characters. Peer presentation layerprocesses can agree, for example, that the sending and the receiving processes will translate their nativecharacter code into a third, mutually comprehensible, code.
File Syntax Translation
File syntax translation translates file formats between the multitude of local and network Operating Systems (OS)in existence. Network OSs are often required to extract the data and file characteristics from one file system andconvert them for another file system.
-
8/13/2019 Module I IP ALL
12/113
Module I: IP Bas
Application LayerThe Application Layer provides the protocols necessary to perform and support network services. These services include the file,print, message, application, and database services. The application layer functions include:
Service advertisement
Service use
Service AdvertisementServers advertise to clients the services they offer. Service advertisement can be either active or passive. With active serviceadvertisement, each server sends out periodic messages to announce availability of its services. Network clients collect theadvertisements and build tables of available services.
Networks which use active service advertisement specify a time interval for the validity of a service. For example, if the timeinterval is five minutes, and a particular service is not advertised in the last five minutes, the client removes that service from itsservice table. Servers perform passive service advertisement by periodically registering their available services with a directory.Clients simply check this directory to find out about the services that are available on each server.
Service Use
Before a network service can be used, it has to be available to the local computersOS. Service use simply means how an OSgains access to a service. The following are service use methods:
OS call interception
Remote operation
Collaborative.
OS Call Interception
With OS call interception, the local OS is completely unaware that the service it is requesting is coming from a network server. Aspecial piece of software intercepts the service request before it reaches the local OS, and sends out a request for the networkservice.
Remote Operation
With remote operation, the local OS is aware of the network and is responsible for submitting service requests. However, theserver is unaware of the client, and treats all requests as if they were of local origin.
Collaborative
With the collaborative method, both service requester and service provider recognise each othersexistence, and collaborate tocoordinate service use.
This method is usually required in peer-to-peer collaborative computing. The collaborative method involves both computerssharing processing capabilities to accomplish a single task.
-
8/13/2019 Module I IP ALL
13/113
Module I: IP Bas
Network DevicesAlthough networks started out small, their potential was soon discovered and they started to grow at an alarming rate. Thisgrowth led to the need for better ways of transmitting data across networks. The repeater was the first in a long line of deviceswhich helped to make networks bigger, faster, and more efficient.
Repeater
A repeater takes incoming signals, amplifies them and sends them back into the network without having modified it. This deviceoperates at the physical layer (layer 1of the OSI Reference Model). It connects LAN cables together, thus extending the length ofthe network.
Repeaters are necessary because of the problem of attenuation. Electromagnetic waves become weaker, or attenuate,as theytravel along a transmission medium. A repeater solves this problem by regenerating a degraded signal, thus allowing data to betransmitted along the extra length of network without loss of quality.
The disadvantage of repeaters is that they have no filtering capabilities; they simply pass on any data they receive to the wholenetwork. This can cause congestion on a busy network.
Hub
A hub is a device where many cables converge can also be called a concentrator or a multiport repeater. A hub can beconsidered as a class of repeater because it passes on signals from one media segment to another.
Network Devices (contd)Switch/Bridge
A switch or bridge operates at Layer 2 (Data Link Layer). It connects two network segments similar functions to that of arepeater, except for additional filtering capabilities, thus helping to reduce the network load.
A switch filters and forwards data based on MAC addresses (Media Access Control), which uniquely identify each computer on anetwork, tolearnover time what computer belongs to what segment of the network. This information is stored in the switchs
switching table. The switch uses this information to filter data it receives. If the switch knows a packetsdestination segment, itforwards the packet to that segment only; if itdoesnt,it forwards the packet to all segments.
Router
A router operates at Layer 3 (network layer). A router uses network addresses to identify the destination network of a packet,and only passes on packets with a destination network address.
Routers uses routing tables (metrics) to determine the optimum path for data to travel between two networks. However,routing tables contain more Information, such as the cost of sending a packet along a
particular path. With this Information, a router can choose the best route for a packet to reach its destination, taking intoaccount cost and availability of paths. A disadvantage of routers is that they can be slower than switches.
As a general comment regarding the OSI model, the higher up you go the more intelligent the device but the slower theprocessing. A switch, which is a layer 2 device, is traditionally faster at processing frames than a router is at processing packets.However, a router enables a network to be logically broken up, and is thus more intelligent than a switch.
-
8/13/2019 Module I IP ALL
14/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
15/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
16/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
17/113
-
8/13/2019 Module I IP ALL
18/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
19/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
20/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
21/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
22/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
23/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
24/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
25/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
26/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
27/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
28/113
The data units flowing from the application layer through the different TCP/IP layers,
is modified, and some headers are added at each layer.
The port number is added at the application layer to identify one of the protocols used,each protocol has a well known port number and other protocols are assigned a
random port numbers.
In the transport layer the transport protocol is chosen, it could be TCP, UDP or others,
and the protocol number is added to identify each of these protocols.
Also, in the internet layer the type code will identify the protocol used by the internet
layer, for example IP
Module I: IP Bas
-
8/13/2019 Module I IP ALL
29/113
The internet protocol, is a network layer protocol, or internet layer (in TCP/IP suite), it
provides the transmission of data blocks, called datagrams, from a source to a
destination, between 2 hosts, where the 2 hosts are identified by a 32 bit address each,
called logical address.
The IP sends the data without establishing a virtual connection first, this is called
connectionless transmission the data is transmitted and routed in the network to reach
the final destination.
IP does not provide reliability, so that the data sent is not acknowledged, other upper
layer are responsible for reliability.
The data to be sent could be long, so that the IP provides fragmentation and
reassembly of long data into different IP packets, the maximum size of an IP packet is
1500 bytes.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
30/113
The IP uses the addresses provided in the IP header to send data to their destination.
The selection of a path is called IP routing.
The packets arrive to a router first and then this router chooses a path to send the datathrough it, it routes the packet.
In case the router does not know a route to the destination, it drops the packet. This
rarely happens as each router have default routes defined.
The router may also drop the packet in case of errors, after analyzing the checksum.
The routers also decrease the TTL ( time to live field), and if this value is equal to
zero, the packet is also dropped.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
31/113
The IP header is divided into many fields which are:
Version, the version, 4 bits, it identifies the version of the protocol, the range is between 0 and 15,value 4 is used for IP4, and 6 is for IP6.
Header length. The header length identifies the number of 4 octets group in the header, it is a pointer tothe beginning of data, it is usually equal to 5, which is for normal header without option, when option is
present, the value of the header length is incremented.
Type of service, this field specifies the priority of the IP datagram, it is newly used.
Total length, 16 bits number that identifies the total length of the IP datagram, which are less than 1500bytes ( the Ethernet frame size), some datagrams could be segmented if they cannot be handled byintermediate routers.
Identification, 16 bits number, assigned by the sender that makes with the sender IP address a uniquenumber used in assembling the fragmented datagrams.
Fragment offset, 13 bits number, used in fragmented datagrams to identify the displacement of thissegment from the beginning of the datagram.
Flags, 3 bits are assigned for flags the low order bit used to identify the last fragment, when set to 0, thehigh order is set to prevent the datagram from being fragmented even it exceeds the size of theintermediate network, it will be discarded but not fragmented.
Time To Live, it is a count, in seconds, set by the sender to specify the time the datagram could stay inthe network before it is discarded.
Protocol, this field is used to identify the higher layer protocol, protocols of the transport layer mainlythe TCP ( value equal to 6) or UDP (value equal to 17), or other protocols used by the transport layer,where each one has a unique number.
Checksum, used to provide assurance that the header has not been corrupted during transmission. Thechecksum is used for the header only (not the data) including the checksum itself.
Addresses, the 32 bits source and destination addresses, that identify the sender and the receiver or the 2communicating hosts.
Options, the presence of the option field is indicated by the value of the length header, the options mayinclude more routing information
Pad, it is added to make the total number of octets divisible by four, as the length of the option couldvaries and it is not necessary equal to 4 bytes, the pad bytes are equal to zeros.
Data, the data field contains the upper layer data unit, which is the transport layer header and data.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
32/113
The IP address is a 32 bit number that identifies a host on the network.
Each host has a unique IP address, which is composed of 4 bytes or octets.
The address is normally represented in dotted decimal notation, by
representing the four octets in decimal form separated by a dot.
for example:11000001. 10100000. 00000001. 00000101 represented as
193.160.1.5
The address is divided into two parts:
The network ID, which identifies all hosts located on the same network,
called inter network and has a unique network ID.
The host ID which identifies a unique host within the inter network
For example, 193.160.1.0 is the network ID, and 193.160.1.5 is a host ID
within this network
The network IDs are assigned and controlled, by the Internet Assigned
Numbers Authority (IANA).
Module I: IP Bas
-
8/13/2019 Module I IP ALL
33/113
The binary values are either assigned to 0 or 1.
The bits start from bit 0 on the right until bit 7 on the left, so bit n is converted
to decimal by multiplying its value, 0 or 1, by 2^n.
For example if bit 2 is equal to 1, then the decimal value is 1*(2^2) = 4, if it is0 then the result would be 0*(2^2)= 0.
So the binary values are converted to their decimal values, and then the
decimal values of the whole octet is simply the sum of the 8 bits decimal
values.
For example : 1001 = (2^3)*1 + (2^2)*0 + (2^1)*0 + (2^0)*1 = 8+0+0+1 = 9.
The maximum decimal value for an octet is when all the bits are set to 1,
where their sum would be equal to 255.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
34/113
The IP address is divided into the network ID, or network prefix, and the host ID.
The IP addresses are distributed into different classes that differ by the number of host they could provide. There aremainly 5 classes.
The class of the IP address is determined by the high order (left-most) bits.
Class A addresses, are assigned to networks with a large number of hosts, the network ID in class A is defined by thefirst byte, the high order bit in class A must be always 0, so the range of network addresses varies from 00000000 = 0to 01111111= 127, so it provides (128-2) possible networks, the 0 is not used and 127 is reserved for diagnosis(loopback test).
Class B addresses are assigned to networks of medium hosts number, the network ID is defined by the first two bytes.In class B the first 2 high order bits must be equal to 10, and so the range of network addresses varies between 128and 191, there are 16 bits for network addresses, the first two bits are assigned 10 so there are 14 bits remaining giving(2^14 = 16384 ) different networks.
Class C addresses are assigned to networks with small number of hosts, the first 3 bytes identify the network address inclass C, the first 3 high order bits are 110, giving a network addresses range from 192 to 223, there are 24 3 first bits= 21 bits resulting in 2^21 or 2097152 networks.
Class D addresses are used for multicast groups.
The multicast group may contain one or more hosts.
The first 4 high order bits are given the value 1110, the remaining bits identify the specific group, in which the hostparticipates.
The addresses are in the range from 224 to 239.
There are no hosts bits in the multicast, packets are passed to a subset of hosts, where hosts, registered in the multicastoperation, receive the packet.
Class E is reserved for future use, the first 5 high order bits are set to 11110.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
35/113
-
8/13/2019 Module I IP ALL
36/113
The IANA, also created Private IP addresses.
These addresses can be used in private networks, but they are not routable
through the internet.
Each address of these reserved addresses, could be used by one or more
enterprise for its inter network, even a network ID will not remain unique, this
will not cause a problem because these addresses are never injected into the
global internet routing system.
When an organization wishes to get global internet access it needs to use a
Network Address Translator (NAT).
Module I: IP Bas
-
8/13/2019 Module I IP ALL
37/113
Some of the global IP addresses are assigned for special use by the Internet
Assigned Number Authority, (IANA).
Module I: IP Bas
-
8/13/2019 Module I IP ALL
38/113
For the subnet address scheme to work, every machine on the network must
know which part of the host address will be used as the subnet address.
This is accomplished by assigning a subnet mask to each machine.
A subnet mask is a 32 bit value that allows the recipient to distinguish the
network ID from the host ID.
The 32 bit subnet mask are composed of 1s and 0s, the 1s represent the portion
that refers to the network address, the 0s represent the portion that refers to the
host address.
For example 172.168.10.54 Class B address, so the subnet mask is
255.255.0.0, when the IP is ANDed, with the subnet mask the result would be
172.168.0.0 which is the network ID.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
39/113
A company with many internal networks, needs a network address to each of
its internal network.
Routing tables were becoming too large to manage.
To overcome this problem subnetting was initially introduced. It provides a
solution by assigning each organization one network number, and then the
organization is free to assign a distinct subnet networks to each of its internal
networks.
For example, consider the Class B address 160.30.0.0, the default subnet is
255.255.0.0, after subnetting, 160.30.0.0/24 indicates that the first 24 bitsidentify the subnet address so this method has provided 8 additional bits to
divide the network, actually 2^8 1 (broadcast) = 255 different subnet are
available.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
40/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
41/113
The customized mask allows to divide the network to more subnetworks, each
with a defined number of hosts.
The 160.30.0.0/24, assigns 8 more bits for subnets, so it generates 2^8 = 256subnets.
For example, 160.30.0.0/24 have the following subnets:
160.30.0.0, 160.30.0.1, 160.30.0.2..160.30.0.254, 160.30.0.255.
And within each subnet there is a specific number of hosts.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
42/113
VLSM, Variable length subnet mask, is used when there is need to have
different subnets in the network, each with a different number of hosts.
For example if the network ID is 160.40.0.0, the default subnet is 255.255.0.0,after subnetting, the network is divided into many subnets, for example
160.40.144.0 subnet 255.255.252.0, this provides 64 subnets with 1024 -2
hosts in each.
When a less number of users is needed, the VLSM provides the solution
without wasting a hole subnet.
For example between the two router, there is need for two addresses for thetwo interfaces connected, so the number of needed hosts is 2. using
160.40.152.0 with subnet 255.255.255.252 provides 2^22 = 2 hosts.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
43/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
44/113
The Network address translation NAT, is used to translate the private inside IP addresses to aglobal outside address.
NAT conserves the internet global address space, and it also increases network security byhiding internal IP addresses from external network.
So by using NAT all the hosts inside the network are translated to one public IP address to theoutside network.
The mapping method could be:
Static NAT, allows one to one mapping, each host in the network is mapped to one internet IPaddress.
Dynamic NAT, designed to map an unregistered IP address to one registered IP address, froma pool of registered IP addresses.
Network Address Port Translation (NAPT) is the most popular type of NAT configuration, itis a form of dynamic NAT that maps multiple unregistered IP addresses to a single registeredIP address by using different ports, it is also known as Network Address Port Translation(NAPT)
For example the private addresses 192.168.02. and 192.168.0.3 both send packets from sourceport 1108, A NAPT router may translate these to single public IP address 200.200.160.1 andtwo different ports 31001 and 31002.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
45/113
The IP V4 was defined at a time where a few number of computer networks existed,
the 32 bit address was sufficient and allowed over a million networks.
Today the global internet is growing exponentially, and all the network addresses willbe assigned. So there is a need for more addresses.
In addition, the new internet applications, which deliver audio and video need to
deliver data at regular intervals, such information should flow in through the internet
without disruption and changing routes.
The security is also interesting, in IP 6 the packet coming from the host indicated in
the source address, and it cannot be coming from a host other than that indicated inthe source as in IP 4 called spoofing.
So IP v6 provides these solutions, it allows a sufficient number of addresses in the
future, by increasing the size of the IP packet from 32 bits to 128 bits, it will provide
6*(10^23) unique addresses per square meter of the surface of the earth.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
46/113
In addition to the increased address size, in IPv6 some Ipv4 header fields have beenmade optional, which reduces the processing cost of packets.
The IP header options in IPv6 are placed in separate optional headers, and most ofthese optional header are not examined and processed by any router on the path. Thissimplifies and speeds up router processing.
IPv6 provides labeling of packets for which the sender requests special handling, suchas real time service for voice or video.
Extension to support authentication, are specified
IPV6 provides address auto configuration, a new version of DHCP has beendeveloped for IPv6, auto configuration does not require a manually configured server,actually a host converts its 48 bits MAC to an EUI 64 bits, and combines it with anetwork prefix that it learns from a neighboring router.
IPv6 provides a new concept, an anycast address, where the packet is delivered to oneof a set of nodes.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
47/113
The IPv6 packet begins with header, 40 bytes, the IPv6 header is longer than IPv4 but it contains fewer
fields which reduces router processing and speed up routing.
The header is composed of the following fields:
Version, 4 bits identifying the IP version number.
Priority or Traffic class, it allows to distinguish between different classes of priorities, similar to the
type of service in the IPv4.
Flow Label, 20 bits field, that may be used by a source to label a sequence of packets, which are of the
same class.
Payload length, 16 bits field that indicates the length of the IPv6 payload.
Next Header, 8 bits field identifying the type of header following the IPv6 header.
Hop Limit, 8 bits field used to count the number of routers visited, it is decremented by 1 by each node
that forwards the packet, if the value gets 0 the packet is discarded.
Source and Destination addresses, the source and destination 128 bits IPv6 address
Module I: IP Bas
-
8/13/2019 Module I IP ALL
48/113
The Next header identifies the type of the header immediately following the IPv6
header.
Additional optional header can be added in IPv6 which are inserted between the IPv6header and the transport layer header.
The next header then could be the TCP data, which indicates that no optional headers
are inserted.
Routing header could be added and inside the routing header there is a next header to
the following data or headers.
Fragment header could be added to identify fragmented packets.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
49/113
Each host in a network will be assigned a unique IPv6 address.
The IPv6 address is composed of a prefix that identify the network and a suffix to
identify a particular host on that network.
Three types of IPv6 addressing , Unicast multicast and anycast.
Unicast, the address corresponds to a single destination, the packet will be routed to
reach that infinity
Multicast, the address corresponds to a set of computers, a copy of the packet is sent
to each of these computers.
Anycast, the address corresponds to a set of computers that have the same address
prefix, the datagram is sent and delivered to one of the computers, the nearest one.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
50/113
The main types of unicast addresses in IPv6 are global unicast, site- local unicast, and
link- local unicast.
Link Local, it is used on a single network. Link local are used for purposes such asauto addresses configuration, neighbor discovery or when no routers are present. The
same Link local address can be present on different networks.
Routers should not forward any packet with link local address to other links.
Site Local, used for addressing inside a site without the need for global prefix. Routers
should not forward packets with Site Local addresses outside the site.
Global Unicast, these addresses are used for global communication.
Module I: IP Bas
-
8/13/2019 Module I IP ALL
51/113
The IPv6 address is 128 bit long, trying to write it in decimal notation will result in a long number of
characters.
To reduce the number of characters, the designers propose to use the hexadecimal notation.
With hexadecimal notation each byte is represented by 2 hexadecimal characters, and each two bytes
are grouped together and separated from another group by a colon.
For example: 105.220.136.100.255.255.25.0.0.18.128.140.10.255.255 is written in hexadecimal as
follows: 69DC:8864:FFFF:FFFF:0:1280:8C0A:FFFF
To further reduce the size, an additional method known as Zero compression is used, replacing
sequences of zeros with two colons, for example
FF0C:0:0:0:0:0:0:B1 is represented as follows FF0C::B1.
The zero compression may be used only once in an address as it replaces an unknown number of 0, theunspecified address 0:0:0:0:0:0:0:0 which cannot be assigned to any node, can be represented as(::).
The address 0:0:0:0:0:0:0:1 or (::1) is used by a node to send an IP datagram to itself, it is the loopback
address
Module I: IP Bas
-
8/13/2019 Module I IP ALL
52/113
-
8/13/2019 Module I IP ALL
53/113
Module I: IP Bas
-
8/13/2019 Module I IP ALL
54/113
All ICMP messages begin with the following three common fields:
Type, 8 bits that identify the message type.
Code field, 8 bits that provide more information about the message type.
Checksum field, 16 bits that is used for error detection.
The identifier and Sequence number, are used to match replies to requests.
Optional Data, contains information to be returned to the sender.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
55/113
-
8/13/2019 Module I IP ALL
56/113
Ping=Packet Internet Groper uses ICMP echo messages to check the physical and
logical connectivity of machines on an internetwork.
The ping is mainly used in discovering and troubleshooting network problems.
The ping uses ICMP message, and it provides a set of commands with specific
options.
The main function of the options used in ping, are as follows:
W, sets the TTL value.
Ther , -s, -j, and k options exercise various form of source routing.
V option that identify the type o service.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
57/113
Hosts on the network must know each others MAC address or hardware address in
order to communicate.
Address resolution is the process of mappinghostsIP address to its hardware address.
The Address resolution protocol is responsible for obtaining MAC addresses for hosts
in a network. It uses a local broadcast of the destination IP address to get the hardware
address of the destination device.
Once the MAC address is obtained the IP and its correspondent MAC address are
stored in ARP cache for a period of time, this is called a dynamic entry.
This ARP cache is checked for an IP address before initiating an ARP request
broadcast.
The IP / MAC addresses mapping could be manually entered to the ARP cache, which
are called static entries
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
58/113
The source device knows the IP address of the destination, but it wants its hardware
address in order to send the packet.
If the ARP cache does not have an entry for the destination IP, the sender generates anARP request.
The ARP request is a broadcast message, all local devices receive it and check it with
their IP addresses.
The host whose IP address matches the destination address in the ARP request,
generates an ARP reply providing its hardware address to the sender.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
59/113
The Transmission Control Protocol (TCP) is one of the core protocols of the
Internet protocol suite, often simply referred to as TCP/IP. Using TCP,
applications on networked hosts can create connections to one another, over
which they can exchange streams of data using Stream Sockets. The protocol
guarantees reliable and in-order delivery of data from sender to receiver. TCP
also distinguishes data for multiple connections by concurrent applications
(e.g., Web server and e-mail server) running on the same host.
In the Internet protocol suite, TCP is the intermediate layer between the
Internet Protocol (IP) below it, and an application above it. Applications often
need reliable pipe-like connections to each other, whereas the Internet
Protocol does not provide such streams, but rather only best effort delivery
(i.e., unreliable packets). TCP does the task of the transport layer in thesimplified OSI model of computer networks. The other main transport-level
Internet protocol is UDP.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
60/113
-
8/13/2019 Module I IP ALL
61/113
Applications send streams of octets (8-bit bytes) to TCP for delivery through the
network, and TCP divides the byte stream into appropriately sized segments
(usually delineated by the maximum transmission unit (MTU) size of the data link
layer of the network to which the computer is attached). TCP then passes the
resulting packets to the Internet Protocol, for delivery through a network to theTCP module of the entity at the other end.
Connection establishment
To establish a connection, TCP uses a three-way handshake. Before a client attempts
to connect with a server, the server must first bind to a port to open it up for
connections: this is called a passive open. Once the passive open is established, a
client may initiate an active open. To establish a connection, the three-way (or 3-
step) handshake occurs:
The active open is performed by sending a SYN to the server.
In response, the server replies with a SYN-ACK.
Finally the client sends an ACK (usually called SYN-ACK-ACK) back to the server.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
62/113
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
63/113
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
64/113
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
65/113
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
66/113
-
8/13/2019 Module I IP ALL
67/113
Depending on implementation, the DHCP server has three methods of
allocating IP-addresses:
manual allocation, where the DHCP server performs the allocation based on a
table with MAC address - IP address pairs manually filled by the serveradministrator. Only requesting clients with a MAC address listed in this table
get the IP address according to the table, the manual allocation method
provides a permanent allocation of an IP address.
automatic allocation, where the DHCP server permanently assigns to a
requesting client a free IP-address from a range given by the administrator.
dynamic allocation, the only method which provides dynamic re-use of IP
addresses. A network administrator assigns a range of IP addresses to DHCP,
and each client computer on the LAN has its TCP/IP software configured to
request an IP address from the DHCP server when that client computer'snetwork interface card starts up. The request-and-grant process uses a lease
concept with a controllable time period. This eases the network installation
procedure on the client computer side considerably.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
68/113
-
8/13/2019 Module I IP ALL
69/113
DHCP requests
Whenever a computer comes on line, it checks to see if it currently has an IP addressleased. If it does not, it requests a lease from a DHCP server. Because the clientcomputer does not know the address of a DHCP server, it uses 0.0.0.0 as its own IP
address and 255.255.255.255 as the destination address. Doing so allows the client tobroadcast a DHCPDISCOVER message across the network. Such a message consistsof the client computer's MAC address.
The client selects a configuration out of the DHCP "Offer" packets it has received andbroadcasts it on the local subnet. Again, this client requests the 160.30.20.150 addressthat the server specified. In case the client has received multiple offers it specifies theserver from which it has accepted the offer.
DHCP acknowledgement
When the DHCP server receives the DHCPREQUEST message from the client, itinitiates the final phase of the configuration process. This acknowledgement phaseinvolves sending a DHCPACK packet to the client. This packet includes the leaseduration and any other configuration information that the client might have requested.At this point, the TCP/IP configuration process is complete.
The server acknowledges the request and sends the acknowledgement to the client.The system as a whole expects the client to configure its network interface with thesupplied options.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
70/113
Routers can be configured to interact to act as relay agent, to allow DHCP servers to
serve configuration requests from remote network.
Even the DHCP packets are broadcast packets, routers that conform RFC 1542 canrelay these packets to a remote network.
The router checks the gateway IP address field it is 0.0.0.0, then the router fills the
field with its own IP address.
After receiving the DHCP discover, the server sends DHCP Offer directly to the
gateway address, which will in turn relay the message to the client.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
71/113
The DHCP message format is composed of the following fields.
OP, 8 bits operation field to identify the type of the message.
HTYPE, 8 bits identifying the hardware type, for e.g. Ethernet.
HLEN, 8 bits providing the length of the hardware address in the header.
HOPS, 8 bits identifying the number of hops or routers the packet has passed through.
TRANSACTION ID, 32 bits generating an integer to match responses with requests.
SECONDS, 16 bits field, it is defined as the number of seconds elapsed since a client began an attempt
to acquire or renew a lease. This may be used by a busy DHCP server to prioritize replies when
multiple client requests are outstanding.
Client IP ADDRESS, 32 bit IP address, used when the client knows its IP address.
YOUR IP ADDRESS, 32 bits IP address, filled by the server to offer an IP address for the client, if the
client IP address is 0s.
ROUTER IP ADDRESS, 32 bits IP address, set to 0s by the client, when the request passes through a
router, the router records its IP address in this field.
CLIENT HARDWARE ADDRESS, providing the client hardware or MAC address.
SERVER HOST NAME, 64 bytes, optional field providing the server name if it is known, or it is set to
0.
BOOT FILE NAME, 128 bytes, could be set to 0, or providing a bootable filename.
OPTIONS, variable length, used to identify a message type, of the following DHCP messages,
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPDECLINE, DHCPACK, DHCPNACK,
DHCPRELEASE.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
72/113
-
8/13/2019 Module I IP ALL
73/113
In a network there could be a server providing the clock reference, with a peer,
another server with the same stratum level and client which is asking a clock
reference.
Client can asks for a clock reference using Direct pooling, where it can asks one or
more server, and uses the most accurate clock. Or by receiving a broadcasts from NTP
servers passively.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
74/113
Hypertext Transfer Protocol (HTTP) is a method used to transfer or convey
information on the World Wide Web.
Its original purpose was to provide a way to publish and retrieve HTML pages, (HyperText Markup Language), the standard language for writing web documents.
Resources to be accessed by HTTP are identified using Uniform Resource Locator (
URLs) using the http: or https URL schemes.
e.g. http://www.ngentelecom.com
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
75/113
The HTTP message format is composed of the following parts:
Command, could be GET to retrieve data, POST to place data on the server.
The URL, containing:
Protocol, identifying the used protocol, could be HTTP or FTP or others.
HTTP server domain name.
Path name.
File name.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
76/113
When client clicks on a link, e.g. www.ngen.com, the following steps occur:
The browser determines the URL.
The browser asks DNS for the IP address for www.ngen.com
DNS replies with the IP address
TCP connection is established with the server
The client then sends a GET http:// www.ngen.com
The server sends the main or default page
The TCP connection is then released
The browser displays all the text in the main page
Then the browser fetches and displays all images in the default page, for each image,icon, or photos, a new TCP connection is established
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
77/113
The SMTP, simple mail transfer protocol, is used to facilitate the exchange of
electronic message between users on a network.
SMTP is an application layer protocol, that uses the port number 25.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
78/113
The message is created and sent by a user.
The agent is the portion of the client that interfaces with the user , it accepts elements
of the message in two parts, the header part and message part.
The header contains the required fieldsTo, Reply To, CC.
The message part is the text.
The client is responsible to establish a TCP connection with each remote SMTP
server, and send the messages.
The SMTP server places each received message in the corresponding queue of the
appropriate mailbox.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
79/113
The SMTP uses the following commands.
HELLO, after sending the welcoming message the client sends the HELLO command
to the server indicating theclientsidentity.
MAIL, mail command is the first command in the process after connection
establishment, the mail command is used to identify the argument.
RCPT, recipient command is used to identify an individual recipient of the mail.
DATA, data command informs the SMTP server that the data will be sent now.
SEND, the same as RCPT command except that the message will be sent to a terminal
instead of a mailbox.
QUIT, is used when the client finishes sending data to inform the server that the
connection will be closed.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
80/113
-
8/13/2019 Module I IP ALL
81/113
TELNET (TELetypeNETwork) is a network protocol used on the Internet or local
area network (LAN) connections. It was developed in 1969.
TELNET is a client-server protocol, based on a reliable connection-oriented transport.
Typically this is TCP port 23.
TELNET, does not encrypt any data sent over the connection (including passwords),
anybody who has access to a router, switch, or gateway located on the network
between the two hosts where TELNET is being used can intercept the packets passing
by and easily obtain login and password information.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
82/113
telnet provides a standardized interface through which, a program on one host ( telnet
client) accesses the resources of another host (telnet server).
As if the client were a local terminal connected to the server.
telnet is also used for logging into bridges, routers and other network devices for
management and configuration.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
83/113
File transfer protocol is the protocol that allows the transfer of files between two
hosts.
FTP is also used by programs, or user applications, that allow humans to easily
interact with remote servers.
FTP requires authentication, so the clients have to send their login ID and passwords
to the server before file transfer.
Module II: Transport & Application Protoco
-
8/13/2019 Module I IP ALL
84/113
VLANs allows to group different computer from different location into
one network, as they are physically connected.
VLANs allow logical network topologies to overlay the physical switched
infrastructure such that any arbitrary collection of LAN ports can be
combined into an autonomous user group or same broadcast domain, it
enables switches to create multiple broadcast domain.
VLANs also improve security by isolating groups. High-security userscan be grouped into a VLAN, possible on the same physical segment, and
no users outside that VLAN can communicate with them.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
85/113
Each VLAN operates in the same manner as a switch without VLAN, it
provides address learning filtering and loop avoidance.
Traffic originating from one VLAN will be flooded only to the ports
belonging to that VLAN.
One VLAN can be distributed into many switches, this need a trunk line
to be used, by configuring one port as a trunk, this trunk can carry traffic
for many VLANs, separated by a tags.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
86/113
Static VLAN are the usual way of creating VLANs, they are the
most secure.
The switch port when assigned to a VLAN will always be a
member of that VLAN until it is manually reassigned to another
VLAN.
Dynamic VLAN, provides the node with automatic assignment
using a management software and a database.
The dynamic assignment could be based on MAC addresses or
Protocols, by providing a database with the MAC addresses or
protocols and their VLAN assignments.
The switch will look up the database and dynamically assigns the
node to the correspondent VLAN.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
87/113
Trunk links: Trunk s can carry multiple VLANs and originally gained
their name after the telephone system trunks that carry multiple telephone
conversations.
A trunk link is a point to point link between two switches, between a
switch and router, or between a switch and server. These carry the traffic
of multiple VLANs.
A user-defined ID is assigned to each frame to identify its VLAN
membership. Sometimes people refer it as a VLAN IDorcolor.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
88/113
There are three major methods of frame tagging,
Cisco proprietary Inter-Switch Link (ISL) This is propriety to Ciscoswitches, anditsused to Fast Ethernet and Gigabit Ethernet links only
IEEE 802.1Q, Created by the IEEE as a standard method of frame
tagging, it actually a field into the frame to identify the VLAN. The
connection between switches of two different brands the 802.1 q should
be used for the trunk to work.
3Com VLT (Virtual LAN Trunk). This is propriety to 3Com switches.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
89/113
-
8/13/2019 Module I IP ALL
90/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
91/113
Redundant links between switches are a good idea because they
prevent complete network failure, if one link stops working.
Even though redundant links are helpful, they may cause a lot of
problems, because frames could be flooded through all the
redundant links creating loops.
If more than one open path were to be active at once then there
would be several problems.First, a broadcast storm caused by broadcast packets looping
between switches would reduce bandwidth
Second, the traditional source-based location system (filtering
database) used by switches would fail to operate correctly
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
92/113
The main task of the Spanning Tree Protocol is to prevent network loops
from occurring on layer 2 networks (switches and bridges).
Spanning-Tree Protocol is a link management protocol that provides path
redundancy while preventing undesirable loops in the network. For an
Ethernet network to function properly, only one active path can exist
between two stations.
STP has been standardized by IEEE 802.1D.
As the name suggests it finds a spanning tree within the mesh network
formed, and disables the links not part of that tree.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
93/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
94/113
All switches that participate in a Spanning Tree protocol gather
information on other switches by sending and receiving messages.
Each switch has a unique identifier (ID) and a configurable priority
number; both of these numbers make up the Bridge Identification or BID.
The BID is used to elect a root bridge based upon the lowest priority
number; if this is a tie then the numerically lowest ID wins
Spanning Tree messages are called BPDUs (bridge protocol data units).
The result of message exchange should:
Elect a root switch for a stable tree network topology
Elect a designated port for every LAN segment
Remove loops in network by placing redundant ports in a backup
state
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
95/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
96/113
Per-VLAN Spanning Tree (PVST)
In Ethernet switched environments where multiple Virtual LANs
exist, spanning tree can be deployed per Virtual LAN. Cisco's name
for this is per VLAN spanning tree. Cisco's name for this is per
VLAN spanning tree (PVST and PVST+ which is the default
protocol used by Cisco switches). Both PVST and PVST+
protocols are Cisco proprietary protocols.
Rapid Spanning Tree Protocol (RSTP)
RSTP is an evolution of the Spanning Tree Protocol it was
introduced in the extension IEEE 802.1w, and provides for faster
spanning tree convergence after a topology change.
The Multiple Spanning Tree Protocol (MSTP), originally defined in
IEEE 802.1s and later merged into IEEE 802.1Q-2003, defines an
extension to the RSTP protocol to further develop the usefulness of
virtual LANs (VLANs). This "Per-VLAN" Multiple Spanning Tree
Protocol configures a separate Spanning Tree for each VLAN group
and blocks the links that are redundant within each Spanning Tree.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
97/113
Routing tables instruct the routers how to route packets.
For each address there is an entry in the routing table, which are calledroutes.
Routers may also have a default route to external destinations that are not
present in the routing table.
There are two types of routing, which are:
Dynamic routing.
Static routing
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
98/113
In static routing routes are added manually in the routersrouting table.
Static routing decreases the routers CPU usage and provides security
because the administrator can choose to allow routing access to certain
networks only.
But this type of routing would be difficult to implement in in large
networks where maintaining it needs a lot of time.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
99/113
The distance vector algorithm operates in a very simple manner. Whena node first starts, it only knows of its immediate neighbors, and thedirect cost involved in reaching them. The list of destinations, the totalcost to each, and the next hop to send data to get there, makes up the
routing table, or distance table.Each node, on a regular basis, sends to each neighbor its own currentidea of the total cost to get to all the destinations it knows of. Theneighboring nodes examine this information, and compare it to whatthey already 'know'; anything which represents an improvement onwhat they already have, they insert in their own routing tables. Overtime, all the nodes in the network will discover the best next hop for alldestinations, and the best total cost.
The Link State algorithm. Each router independently determines thebest route from itself to every other node using Dijkstra's algorithm, bybuilding a tree with the current node itself as the root, and containingevery other node in the network. It starts with a tree containing onlyitself. Then, one at a time, from the set of nodes which it has not yetadded to the tree, it adds the node which has the lowest cost to reach anadjacent node which already appears in the tree. This continues untilevery node appears in the tree.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
100/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
101/113
RIP uses a single routing metric (hop count) to measure the distancebetween the source and a destination network. Each hop in a path fromsource to destination is assigned a hop count value.
When the router receives an update message that containing a route to adestination with a better hop count, the routing table is updated.
Router sends update message to neighbors every 30 sec
A router expects to receive an update message from each of its neighborswithin 180 seconds in the worst case
If router does not receive update message from neighbor X within thislimit, it assumes the link to X has failed and sets the correspondingminimum cost to 16 (infinity)
RIP messages are sent using UDP transmission protocol with port number520, encapsulated over IP packets.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
102/113
Despite RIP's age and the emergence of more sophisticated routing
protocols, it is far from obsolete.
RIP is mature, stable, widely supported, and easy to configure.
Its simplicity is well suited for use in stub networks and in small
autonomous systems that do not have enough redundant paths to warrant
the overheads of a more sophisticated protocol.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
103/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
104/113
Early routing protocols such as RIP v1 were all distance vector protocols.
There are many distance vector routing protocols in use today such as RIPv2, IGRP, and the hybrid routing protocol EIGRP.
As networks have grown larger and more complex, the limitations of
distance vector routing protocols have become apparent.
Routers that use a distance vector routing protocol learn about the
network topology from the routing table updates of neighbor routers.
Bandwidth usage is high because of the periodic exchange of routing
updates, and network convergence is slow which results in poor routing
decisions.
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
105/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
106/113
Module III: Routing Protoco
-
8/13/2019 Module I IP ALL
107/113
Module IV: 3G & 4G Transmission/
-
8/13/2019 Module I IP ALL
108/113
Module IV: 3G & 4G Transmission/
ATM:
# of cell required = 500M/48
= 524288000/48
= 10922667
#byte of header = 10922667 * 5
= 54613333
= 53333 Kbyte
IP:
# of packet required = 500M/1480
= 524288000/1480
= 354249
#byte of header = 354249 * 20
= 7084973
= 6919 Kbyte
-
8/13/2019 Module I IP ALL
109/113
-
8/13/2019 Module I IP ALL
110/113
-
8/13/2019 Module I IP ALL
111/113
Module IV: 3G & 4G Transmission/
-
8/13/2019 Module I IP ALL
112/113
-
8/13/2019 Module I IP ALL
113/113
Module IV: 3G & 4G Transmission/
This is a great opportunity for us on the access side but it creates also a greatopportunity on the infrastructure side both from an IP and Optical perspective
The opportunity for us is to build a best of class IP network that can keep up withthese types of growth and changes and at the same time provides a best of classconverged solution which will save our customers on both CAPEX and OPEX
IP technology is deployed is over 500 customers around the world in both Mobileand Fixed networks.
There are 3 major technological differentiations:
1. IP technology provides our customers with an elegant migration path from legacyt k t IP It l id th ith t fl ibilit th d l