1 / 84

Specific Outcomes Differentiate between open and proprietary protocols

Download Presentation

Specific Outcomes Differentiate between open and proprietary protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Broadband in data can refer to broadband networks or broadband Internet and may have the same meaning as above, so that data transmission over a fiber optic cable would be referred to as broadband as compared to a telephone modem operating at 56,000bits per second. However, a worldwide standard for what level of bandwidth and network speeds actually constitute Broadband have not been determined.[1] However, broadband in data communications is frequently used in a more technical sense to refer to data transmission where multiple pieces of data are sent simultaneously to increase the effective rate of transmission, regardless of data signaling rate. In network engineering this term is used for methods where two or more signals share a medium.[2] Broadband Internet access, often shortened to just broadband, is a high data rate Internet access—typically contrasted with dial-up access using a 56k modem. Dial-up modems are limited to a bitrate of less than 56 kbit/s (kilobits per second) and require the full use of a telephone line—whereas broadband technologies supply more than double this rate and generally without disrupting telephone use.

  2. Protocols focusing on TCP/IP • Specific Outcomes • Differentiate between open and proprietary protocols • Provide and overview of TCP/IP and its various components • Explain how and why the different Classes of IP addresses are allocated / managed • Demonstrate how a Class B IP address may be subnetted and explain why this may be desirable • Explain how an IP packet is routed across several routers • Compare and contrast IP routing to Ethernet switching

  3. Protocol Types • Open Protocols TCP/IP Internet • Vendor-Specific Protocols IPX/SPX

  4. Protocols and Data Transmission Non-Routable NetBEUI Router NetBEUI

  5. Types of Data Transmission Broadcast Unicast Multicast

  6. Common Protocols • Transmission Control Protocol/Internet Protocol (TCP/IP) • Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) • NetBIOS Enhanced User Interface (NetBEUI) • AppleTalk

  7. Routed Protocols (TCP/IP) Router Windows Client Windows Client Segment 1 Segment 2 TCP/IP TCP/IP

  8. Routed Protocols (IPX/SPX) Router Windows 2000 Server NetWare Client Segment 1 Segment 2 IPX/SPX IPX/SPX

  9. NetBeui Routed Network Environment Windows Client Windows Client Segment 1 Segment 2 Router NetBEUI NetBEUI

  10. Appletalk Routed Network Environment Windows 2000 Server Macintosh Client Segment 1 Segment 2 Router AppleTalk AppleTalk

  11. TCP/IP • The Communication Process • TCP/IP Layers • Identifying Applications

  12. Communication Process Post Office Post Office Name Name Address Address

  13. TCP/IP Layers Application Layer Application Layer HTTP FTP Transport Layer Transport Layer TCP UDP Internet Layer Internet Layer IP ICMP IGMP ARP Network Interface Layer Network Interface Layer ATM Ethernet

  14. TCP/IP Protocol Suite • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP) • Internet Protocol (IP) • Internet Control Message Protocol (ICMP) • Internet Group Management Protocol (IGMP) • Address Resolution Protocol (ARP) • TCP/IP Utilities

  15. TCP TCP UDP IP ICMP IGMP ARP

  16. UDP TCP UDP IP ICMP IGMP ARP

  17. IP Router TCP UDP IP ICMP IGMP ARP

  18. ICMP Router TCP UDP IP ICMP IGMP ARP

  19. IGMP TCP UDP IP ICMP IGMP ARP

  20. ARP 1 5 ARP Cache ARP Cache 2 B 3 6 A TCP UDP 4 C 1. ARP cache is checked 2. ARP request is sent 3. ARP entry is added 4. ARP reply is sent 5. ARP entry is added 6. IP packet is sent IP ICMP IGMP ARP

  21. TCP/IP Utilities Ftp Arp Telnet Hostname Tftp Ipconfig Nbstat Netstat Ping Tracert Connectivity Utilities Diagnostic Utilities TCP/IP Printing Service Server-based Software Internet Information Services

  22. Data Flow CRC CRC Data Data Data Data Data Data Data Data Data Data Data HTTP HTTP HTTP FTP FTP FTP HTTP HTTP HTTP FTP FTP FTP Application Application Transport Transport TCP TCP TCP UDP UDP UDP TCP TCP TCP UDP UDP UDP Internet Internet IP IP IP ICMP ICMP ICMP IGMP IGMP IGMP ARP ARP ARP IP IP IP ICMP ICMP ICMP IGMP IGMP IGMP ARP ARP ARP Preamble Preamble ATM ATM ATM Ethernet Ethernet Ethernet ATM ATM ATM Ethernet Ethernet Ethernet

  23. IPRouting Portion of Routing Table 192.168.1.0 255.255.255.0 192.168.1.1 192.168.2.0 255.255.255.0 192.168.2.1 192.168.3.0 255.255.255.0 192.168.3.1 192.168.4.0 255.255.255.0 192.168.4.1 192.168.5.0 255.255.255.0 192.168.5.1 192.168.6.0 255.255.255.0 192.168.6.1 192.168.7.0 255.255.255.0 192.168.7.1 192.168.8.0 255.255.255.0 192.168.8.1 Router

  24. Data Transfer Across Routers Verify packet Verify IP address Send the packet up to the next layer Is destination local? Yes, add the destination MAC address No, add the router’s MAC address Always add the destination’s IP address Is destination local? Yes, add the destination MAC address No, add the Router’s MAC address Always add the destination’s IP address Verify packet Decrease TTL Is destination local? Yes, add the destination MAC address No, add another Router’s MAC address Verify packet Verify IP address Send the packet up to the next layer Verify packet Decrease TTL Is destination local? Yes, add the destination MAC address No, add another router’s MAC address Router 1 A B C D Router 2

  25. Different Classes of Addresses Class A Network ID Host ID Class B Network ID Host ID Class C Network ID Host ID w x y z

  26. Decimal to Binary Representation IP Address in Dotted Decimal Notation w x y z 10.217.123.7 4 Values Network ID Host ID 32 Values IP Address in Binary Notation 00001010 11011001 0111101100000111

  27. Different Class of Address Class ANet.Node.Node.Node Leading bit = 0, Max: 126 Networks and 16777214 Nodes 127 is reserved for loopback test: 127.0.0.1 Class BNet.Net.Node.Node Leading bit = 10 Max 16384 Networks and 65534 Nodes (Note network decimal range from 128 – 191) Class CNet.Net.Net.Node Leading bit = 110 Max 2097152 Networks and 254 Nodes (Note network decimal from 192 – 223)

  28. Different Class of Address

  29. Leading bits of network address Class A Network Class B Network Class C Network Leading bit is always one, one zero (110) Leading bit is always zero (0) Leading bit is always one and zero (10) Router Incoming packet destined for network 01010111 (87), the router only has to read the first bit to know which of its three routes to forward it on

  30. Subnet Masks • Subnets • Subnet Masks • Determining Local and Remote Hosts

  31. Subnetting and Routers Subnet 1 Subnet 2 1 2 Switch Switch Router

  32. Determining Local and Remote Hosts Example 2 Example 1 1 1 2 2 Local Hosts Remote Hosts A A D D 192.168.1.100 192.168.1.100 192.168.2.100 Subnet Mask Subnet Mask 255.255.0.0 255.255.255.0 B B E E 192.168.2.100 Router Router C C F F

  33. Subdividing a Network

  34. Subnetting Process • Step 1: • Determine how many network ID’s are required? • How many subnets will I need? • Unique network ID is required for: • Each subnet • Every wide area network (WAN) connection

  35. Subdividing a Network

  36. Sub-netting Process • Step 2: • What are the maximum number of host ID’s you’ll need on each subnet? • Each TCP/IP computer interface card • Each TCP/IP printer network interface • Each router interface on each subnet. If router connected to two subnets; the router requires two host ID’s – two IP addresses (see next diagram)

  37. Subdividing a Network

  38. Decimal to Binary Quick class exercise: (3 minutes) Take 167.20.16.1 and work out the binary equivalent

  39. Decimal to Binary Answer in progress: 2 2 2 2 2 2 2 2 1 0 1 0 0 1 1 1 __________________________________________________ 128 + 0 + 32 + 0 + 0 + 4 + 2 + 1 = 167 IP Address: 10100111 3 2 1 0 7 6 5 4

  40. Decimal to Binary Answer: 167 20 16 1 IP Address: 10100111 00010100 00010000 00000001

  41. Decimal to Binary Now add Subnet Mask: 255.255.0.0 (or class B) 167 20 16 1 IP Address: 10100111 00010100 00010000 00000001 Subnet Mask: 11111111 11111111 (00000000 00000000) AND the two numbers:10100111 00010100

  42. Decimal to Binary Now add Subnet Mask: 255.255.0.0 (or class B) 167 20 16 1 IP Address: 10100111 00010100 00010000 00000001 Subnet Mask: 11111111 11111111 (00000000 00000000) AND the two numbers: 10100111 00010100 Interested in this part: Network Portion Not concerned with this part

  43. Subnetting Process Step 3: Consider host 167.20.16.1 with subnet mask 255.255.0.0 (class B) such as Rhodes University IP Address: 10100111 00010100 00010000 00000001 Subnet mask: 11111111 11111111 00000000 00000000 Network ID: 10100111 00010100 Remember that subnet mask 1 bits correspond to network ID bit in the IP address.

  44. Subnetting Process Step 3: (contd) We decide to add some bits to the subnet mask, increasing the bits available for the network ID and thus create a few more network combinations Note new subnet mask is: 11111111 1111111111100000 00000000 Note because of the 3 extra bits, we have 8 different network ID’s. Network ID’s 10100111 00010100000 (167.20.0) 10100111 00010100001 (167.20.32) 10100111 00010100010 (167.20.64) 10100111 00010100011 (167.20.96) 10100111 00010100100(167.20.128) 10100111 00010100101 (167.20.160) 10100111 00010100110 (167.20.192)10100111 00010100111 (167.20.224)

  45. To summarize the preceding example using decimal notation: By applying the subnet mask of 255.255.224.0 to network ID 167.20, you create 8 new network Ids: (167.20.0, 167.20.32, 167.20.64, 167.20.96, 167.20.128, 167.20.160, 167.20.192, 167.20.224) Note: If you used only two instead of three additional bits in the subnet mask, We would only have four subnets In the case of two additional bits, the network ID’s would be 10100111 00010100 00 (167.20.0) 10100111 00010100 01 (167.20.64) 10100111 00010100 10 (167.20.128) 10100111 00010100 11 (167.20.192) Therefore we must always use enough additional bits in the subnet mask to create the desired numbers of subnets, though still allow for enough hosts on each subnet.

  46. Let’s look at Rhodes University Rhodes has a scarce Class B Internet Address (privilege) Rhode’s Unique IP address is: 146.231 therefore all IP addresses at Rhodes will have the network component of 146.231 The default Class B subnet mask is: 255.255 or in binary 11111111 . 11111111 Rhodes can have up to 65,534 hosts if they do not divide or ‘steal’ some of these host bits, to divide the network up into subnets. Rhodes definitely does not need to cater for 65,534 hosts therefore the decision to divide up the network into different subnets, for all the previously discussed reasons.

  47. Rhodes continued Rhodes administrators decide to allocate 5 host bits to divide up the University network into subnets. 11111111 . 11111111 .11111000 . 00000000 How many subnets does this give the University? 2 to the power of 5 = 32 therefore Rhodes can have up to 32 subnets. How many hosts can Rhodes have on each subnet? 2 to the power of 11 (-2) = 2,046 What is the Rhodes Subnet Mask 255 . 255 . 248 . 0

  48. Rhodes continued What are the subnets that are created? Calculated manually, list all the combo’s of the additional bits 00000 00100 etc etc 00001 .32 00100 etc etc 00010 .64 00101 etc etc 00011 .96 00101 etc etc 00100 .128 xxxxx etc etc 00101 .160 xxxxx etc etc 00110 .192 xxxxx etc (Very tedious) 00111 etc xxxxx etc

  49. Rhodes continued What are the subnets that are created? A shorter, less tedious method List the additional octet added to the default subnet mask in decimal notation. Convert the rightmost 1 bit of this value to decimal notation, which is the incremental value of each subnet value known as “Delta” Append “Delta” to the original ID to give the first subnet network ID Repeat previous step for each subnet network ID, incrementing each successive value by Delta

More Related