An internetwork is the connection of two or more different and frequently incompatible networks, made possible by using internetworking devices, which include gateways and routers, for exchanging of data resources. NOTE: whereas an internetwork (internet with lowercase i) is a collection of interconnected networks, an Internet(uppercase I) is a specific worldwide internet that is widely used to connect universities, government offices, companies and even private individuals.
Internetwork (internet)
CONNECTING DEVICES 1.1 Networking and internetworking devices are divided into four categories= bridges, repeaters, routers and gateways Each of these devices interact with protocols at different layers of the OSI model
WAN
R R R R LAN LAN LAN LAN LAN R R R R LAN
Connecting devices and the OSI model
1.1.1 REPEATERS A repeaters is an electronic devices that operates on only the physical layer of the OSI model to regenerate weak signals thus providing current to drive long cables when information carrying signals travel over a relatively long distance on a network they usually become alternated. Alternation of the signals endangers the integrity of the data causing the network to deliver computed data. A repeater installed on a link receives the signal before the weak or corrupted, regenerates the original bit pattern, and puts the refreshed copy back onto the link.
CONNECTING DEVICES INTERNETWORKING DEVICES NETWORKING DEVICES BRIDGES REPEATERS ROUTERS GATEWAY S 7. APPLICATION 6. PRESENTATION 5. SESSION 4. TRANSPORT 3. NETWORK 2. DATA LINK 1. PHYSICAL GATEWAY 7. APPLICATION 6. PRESENTAION 5. SESSION 4. TRANSPORT 3. NETWORK 2. DATA LINK 1. PHYSICAL
ROUTER BRIDGE REPEATER A repeater helps to only extend the physical length of a network; it does not change the functionality of the network for example, given a network of four stations (A,B,C&D) and two sections connected by a repeater. If station A sends a frame to station B, all stations on the network will receive the frame, the repeater will not keep stations C and D will receive a truer copy of the frame than would otherwise have been possible. The location of a repeater on a link is vital. A repeater must be placed so that a signal reaches it before any noise changes the meaning of any of its bits
D A
B C
1.1.2 BRIDGES Bridges are data link layer devices but they operate in both the physical and data link layers of the OSI model. Unlike repeaters, which copy 5the bits as they arrive, bridges are store and forward devices. A bridge accepts an entire frame passes it up to data link layer where the checksum is verified. The frame is then sent down to the physical layer for forwarding is a different network. A bridge can divide a large network into smaller segments and also rely frames between two originally separate LANs.
REPEATER Bridge contain logic that allows them keep the traffic foe each segment separate, thus, they filter traffic and so are useful for controlling congestion and bolating problem links. They also provide security through this partohiming of traffic because a bridge operates at the data link layers, it has access to the physical addresses of all stations connected to it. When a frame enters a bridge, it regenerates the signal, checks the address of the destination and forwards the new copy to the segment to which the addresses belongs.
A D
B C
E H
F G
A BRIDGE.
BRIDGE
A D A D
F G F G
TYPES OF BRIDGES There are three types of bridges (i) Simple bridge (ii) Multiport bridges (iii) Transparent bridges
1.1.3 ROUTERS Routers are networks layer devices but operate in the physical, data link and network layers of the OSI model. They relay packets among multiple interconnected networks. They route packets from one network to any of a number of potential destination networks on an internet. In their simplest function, routers receive packets from one connected network and pass them to a second connected network. But if a received packet is addressed to a mode on a network of which the router is not a member, the router is able to determine which of its connected networks is the best relay point for the packet. Once the best route for a packet to travel is identified, the router passes the packet along the appropriate network to another router, which checks the destination address, finds what yet the best route, and passes the Bridge Bridge A-D
packet to the destination network (if it is a neighbor) or across a neighbouring network to the next router on the chosen path.
E 4 BUS 1 A
3 D
2
BUS B C
Example of Routers in an interne are. - A packet sent from a station on one network to a station on a neighboring network go first to the jointly held router. - Router switches the packet to the destination network. - If no router connects to both sending and receiving networks, the sending router transfers packet across one of its connected networks to the next router in the direction of ultimate destination. - Second router forwards the packet to the next router on the path, and so on, until the destination is reached.
1.1.4 GATEWAYS Gateways potentially operates in all seven layers of the OSI model A gateway is a protocol converter. A router by itself transfer, accepts, and relays packets only across networks using similar protocols (i.e. single-protocol routers). On the other hand, a gateway can accept a RING ROUTER ROUTER RING ROUTER ROUTER RING packet formatted for one protocol (e.g. AppleTalk) and convert it to a packet formatted for another.
Generally, a gateway is software installed within a router. It understands the protocols used by each network linked into the router and is therefore able to translate from one to another, sometimes, the only modification necessary are the header and trailers of the packets in other cases, the gateway must adjust the data rate, size, and format as well.
NETWARE
Example: A gateway connecting an SNA network (IBM) to a NetWare network (Novell)
1.1.5 OTHER CONNECTING DEVICES These include:
(a) Multiprotocol Routers At the network layer, a router by default is a single protocol device and the routing table uses one single addressing format. e.g two LANs connected through a router, should we same protocol either IP(the network layer protocol of the Internet) or IPX (the network layer protocol for Novell). Multiprotocol routers are designed to route packets belonging to two or more protocols. A two protocol router (e,g for IP and IPX) can handle packets belonging to either of the two protocols. it can receive, process, and send a packet using the IP protocol or the IPX protocol. Here, the router has two tables one for IP and one for IPX. SNA GATEWAY
(b) BROUTERS A brouter (bridge/router) is a single-protocol or multiprotocol router that sometimes acts as a router and sometimes as a bridge. When a single-protocol brouter receive a packet belonging to the protocols it is designed for, it routes the packet based on the network layer address: otherwise, it acts as a bridge and passes the packet using the data link layer address. Multiprotocol brouter receives a packet belonging to one of the protocols for which it is designed, routes the packet based on the network layer address, otherwise, it acts as bridge and passes it using the data link layer address.
(c) SWITCHES These are devices that provides bridging functionality with greater efficiency. The switch has a buffer for each link (network) to which it connects. It stores received packets in the buffer of the receiving link, checks the address (and sometimes CRC) to find the outgoing link. If there is no chance of collision (i.e the outgoing link is free), the switch sends the frame to that particular link. There are two (2) types of switches (i) Store-and forward switch: which stores the frame in the input buffer until the whole packet has arrived. (ii) Cut-through switch: forwards the packet to the output buffer as soon as the destination address is received.
(d) ROUTING SWITCH They is a combination of a router and a switch. Routing switches use the network layer destination address to fund the output link to which the packet should be forwarded.
ROUTING OVERVIEW (Routing Strategies) The main function of the network layer is routing packets from the source machine to the destination. Routing allows data to get from one point on a network to another . the destinations must be uniquely identified and the data must be at the proper network, then the router ensures that the data is received by the current mode. The role of routes changes as network designs change. Routers are used extensively for connecting sites to each other and to the internet. Functions of routers include: (i) Securing the information that is generated in predefined areas (ii) Choosing the fastest route from one point to another, and (iii) Providing redundant network connections so that a problem in one area will degrade network operations in other areas.
Routing protocols must consider the Hg: (i) Addressing (ii) Address resolution (iii) Message forma and (iv) Error reporting
Most routing protocols are based on an addressing format that uses a network and a mode number to identity each mode. When a network is powered on, each router on it records in a table the addresses of the networks that are directly connected. At specified intervals each router in the internetwork broadcasts a copy of its entire routing table so that, all of the routes eventually know how to get to each of the different destination networks.
Address resolution allows a router to map the original address to a hardware address and store the mapping in a table for future transmission. A variety of message formats are defined by routing protocols. they allows the protocol to perform its functions such as: i) Finding new modes on a network, ii) Testing to determine whether they are working iii) Reporting error conditions, iv) Establishing connections, and v) Transmitting data.
Error conditions may arise during data transmission because of malfunctioning mode or malfunctioning network. In such cases, routers and routing protocols would report the error conditions, but would not attempt to correct the error. Error correction to left to protocols at other levels of the networks architecture.
ROUTING IPROTOCOL One of the most valued and sophisticated functions performed by a router is finding the best path or route for data to take across the network. Best path refers to the most efficient route from one mode to another. In any particular situation, the best path depends on: i) The number of helps between nodes ii) The current network activity iii) The unavailable links, iv) The network transmission speed and v) The topology
To determine the best path, routers communicate with each other through routing protocols. routing protocols are used only by routers to collect data about current network status and contribute to selection of best paths. It is from this data that routers create routing tables for use with future packet forwarding. In addition to it ability to find the best path, a routing protocol can be characterized according to its convergence time and its bandwidth overhead. Convergence time refers to the time it takes for a router to regnise a best path in the event of a change or outage Bandwidth overhead refers to the burden placed on the underlying network to support the routing protocol.
TYPES OF ROUTING PROTOCOLS The most commonly used routing protocols are RIP, OSPF, EIGRP, and BGP 1. Routing Information Protocol (RIP) for IP and IPX- This is the oldest routing protocol that is still used. In RIP, selection of a path to transfer data from one network to another is based on the number of intermediate nodes, or hops is always chosen. This is a distance vector algorithon and to implement, but it may not be the best in modern networking. It limitations include: i) It does not consider factors like bandwidth, data priority, link speed, network type or network congestion. Thus faster or more reliable paths may be selected just because they have more hops. ii) Routers using RIP broadcast their routing tables every 30 seconds to other routers, whether or not changes have occurred. Thus increase internetwork traffic and negatively affects the delivery of messages.
iii) Convergence time for RIP is poor: the routing tables propagate from router to another. Thus, if the routing tables change, it may take several minutes before the new information propagates to routers at the end of the internetwork. iv) RIP does not work well in very large network environment in which data may have to travel through more than 15 routers to reach its destination (e.g on the internet) v) RIP is slower and less secure than other protocols.
ADVANTAGE: one advantage to RIP is its 1. Stability for example, RIP prevents routing loops from continuing indefinitely by limiting the number of hops a packet can take between its source and its destinative to 15.4 it is exceeded, the network destination is considered unreachable (times out). 2. Open shortest path first(OSPF) for IP- This routing protocol makes up for some of the limitations of RIP and can coexist with RIP on a network. OSPF uses a more complex algorithon, which is stated as, find the shortest paths from a given source to all other destinations by proceeding in stages and developing the path in increasing path lengths. In OSPF, selection of a transmission path is made only after the state of a network has been determined so that if an intermediate hop is malfunctioning, it is eliminated immediately from consideration its service have been restored. Using Dijstras algorinthon, router computes all the different paths to get to each destination in the internetwork, creating what is known as a topological database (i.e each router keeps a database of the other router links) thus data structure is maintained by OSPF and is updated whenever failures occurs thus, a router (in the event of a failure) would simply check its topological database to determine whether a path was available, and would then we Dijstra;s algonithon to generate a shortest-path tree to get around the failed link
ADVANTAGES i) Network bandwidth is kept to a minimum because routing update messages are sent only when charges in the routing environment occur, thereby reducing the number of messages in the network and the size of the messages by not sending the entire routing table. ii) Provides a very fast convergence time
DISADVANTAGES i) More memory is required because OSPF keeps track of more information than RIP. ii) Higher CPU usage this offsets the savings in bandwidth consumption. More CPU power is needed for the calculation of the shortest path. 3. Enhanced interior Gateway Routing Protocol (EIGRP) for IP, IPX and AppleTalk by Cisco system. It has a fast convergence time and a low network overhead, and is easier to configure and less- CPU intensive than OSPF. EIGRP also offer the benefits of supporting multiple protocols and limiting unnecessary network traffic between routers. It accommodates very large and heterogeneous networks. Disadvantage: it is only supported by Cisco routers. Border Gateway Protocol (BGP) for IP- is a routing protocol of internet backbones. The demands in routers created by internet growth necessitated the development of BGP, the most complex of the routing protocols. the developers of BGP had to contend with not only the prospect of 100.000 routes, but also the question of how to route traffic efficiently and faulty through the hundreds of internet backbones. Switching (also called packet switching nodes, intermediate system, and data switching exchanges)-are specialized computers used to connect two or more transmission lines TCP/IP model The Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of small, specialized protocol including TCP, IP, UDP, ARP, ICMP, and others (Subprotocols) it was developed for the U.S Department of Defenses ARPANET, TCP/IP is the basis for internet communications and is most widely used network layer protocol in use today. It provides reasonably efficient and error free transmission between different system, (i.e, it has low cost and ability to communicate between a multitude of dissimilar platforms) one of the granted advantages of TCP/IP relate to its status as a routable protocol, in that it carries network addressing information that can be interpreted by routers. It is a flexible protocol, running on any combination of network operating system or network media. It is a file transfer protocol, so it enables large files to be sent across sometimes unreliable networks with a high probability that the data will arrive error free.
COMPONENTS The TCP/IP model organizes a communication system with three main components: process, hods, and networks. Processes execute on hosts, which can often support multiple simultaneous processes that are defined as primary units that need to communicate. The processes communicate across 5the network to which hosts are connected.
TCP/IP versus the OSI model The TCP/IP can be arranged or divided into four layers instead of OSIs seven layers. (i) Application/Process Layer TCP/IPs Process/Application layer provides authentication and compression services, and is roughly equivalent to the Application, Presentation(and session) layers of the OSI model Applications gain access to the network through the layer vis protocols, such as File Transfer Protocols (FTP), Trivial File Transfer Protocol (TFTP), Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and Dynamic Host Configuration Protocol (DHCP)
(ii) Host-Host Layer (TCP/IPs Transport Layer) The TCP/IPs Transport Layer roughly corresponds to the Transport layer OSI model. It supports mechanism to transfer data between two processes on different host computers. It holds the TCP and UDP (Transmission Control Protocol and User Datagram Protocol), therefore the services provided I this layer also include error- checking, flow control, and sequencing and an ability to manipulate connection control signals, unlike the OSIs models Transport layer, the TCP/IP models Transport layer services do not necessarily guarantee reliable data delivery.
(iii) Network Access Layer (Link Layer) TCP/IPs Link Layer, (also called the Network Interface layer or Network Access Layer) is roughly equivalent to the physical and Data link layers (and packet of the Network layers of the OSI model. Protocols at this layer provide access to a communication network and some of the functions here are flow control, error control between hosts, security, and priority implementation, formatting of data and transmission to the network wire.
(iv) Internet Layer (Network Layer) TCP/IPs Internet (or Network) layer is roughly equivalent to the portion of the OSI models Network layer that is not already included in the TCP/IPs Link Layer this layer holds the internet Protocol (IP) Internet Control Message Protocol (ICMP), Internet Group Message Protocol9 (IGMP), and Address Resolution Protocol (ARP), all of which handles routing of messages and host address resolution.
OSI Model TCP/IP Model
Layer 7 Layer 4 . Layer 6
Layer 5 Layer 3
Layer 4 ..
Layer 3 Layer 2 .. Layer 2 Layer 1
Layer 1
Internetwork Protocol (IP) IP is the transmission mechanism used by the TCP/IP protocols. IP is an unreliable and connectionless datagram Protocol- a best-effort delivery service, in that IP provides no error checking or tracking. It assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees. Transmission along physical networks can be destroyed for reasons such as: (i) Noise:- which can cause bit errors during transmission across a mediums; (ii) Congestion:- a congested router may discard a datagram if it is unable to relay it before a time limit runs out, (iii) Looping:- routing trends can end in looping and the ultimate destruction of a datagram; and (iv) Disable links:-that leaves no usable path to the destination. To achieve reliability, IP must be paired with TCP which is a reliable protocol.
Application layer
Presentation
Session
Transport
Network
Data link
Physical Research/Application
Host-host Transport
Internet
Network Access Layer (Link) IP transports data in packets called datagrams and datagram is transported separately. Datagrams may travel along different routes, may arrive but of sequence or duplicated. IP does not keep track of the route and has recording facility on arrival of the datagrams. Because IP is a connectionless service, it does not create virtual circuits for delivery. There is not a call setup to alert the receiver to an incoming transmission. However, IP provides a bare bones transmission function that gives the user freedom to add only that facilities necessary for a given application and thereby allows for maximum efficiency. The Internet Protocol (IP) belongs to the Network layer of the OSI model and to the Internet layer of the TCP/IP models it is the subprotocol that enables TCP/IP to internetwork-i.e, to traverse more than one LAN segment and more the type of network through a router.
IP version 4 (IPv4) IP provides information about how and where data should be delivered. The individual networks joined together in an internetwork are called subnetworks, or subnets. The IP subprotocol as it is used in IP version 4 (IPv4) is the oldest (over 20yrs) and is still being used by most networks. The IP portion of a data frame is called an IP datagram. The IP datagram acts as an envelope for data and contains information necessary for routers to transfer data between subnets.
IP Datagram Packets in the IP layer are called datagram. A datagram is a variable-length packet (up to 65,535 bytes) consisting of two parts; header and data. The header can be from 20 to 60 bytes and contains information essential to routing and delivery. The IP datagram format and a descriptive of each field follows:
IP Datagram Format
Version HLEN service type Total length 4 bits 4 bits 8 bits 16 bits Identification Flags fragmentation offset 16 bits 3 bits 13 bits Time to live Protocol Header Checksum 8 bits 8 bits 16 bits
Source IP address
Destination IP address
Option Padding
Data
Data
Version- The first field defines the version number of the IP, the common (and current) one is version 4 (IP v4), with a binary value of 0100. The receiving nods checks this field to determine whether it can read the incoming data, if it cannot, it rejects the packet.
Header Length (HLEN) defines the length of the header in multiple of four bytes. This field indicate to the receiving node where data will begin (immediately after the header ends)
Service Type- The service type defines how the datagram should be handled or processed. It include information that define the priority of the datagram and those that specify the type of service the sender desires, such as the level of throughput, reliability, and delay.
Total Length- Defines the total length (in bytes) of the IP datagram, including the header and data.
Identification-The field is used in fragmentation. A datagram, when passing through different networks, may be divided into fragments to match the network frame size, each fragment is then identified with a sequence number in the identification field. Thus, the message to which a datagram belongs is identified and the receiving node is enabled to reassemble fragment messages.
Flags= dont fragment (DF) or more fragments (MF) indicates whether a message is fragmented and, if it is fragmented, whether the datagram is the first. Middle, or last fragments etc.
Fragment ( or fragmentation) offset- is a pointer that identifies where the datagram fragment belongs in the incoming set of fragments.
Time to live (TTL) defines the number of router hops a datagram can travel before it is discarded. When the source host creates the datagram, it sets the time to live field to an initial value. Then, as the datagram travels through the Internet, router by router, each router decrements the value by 1. If this value becomes zero before the datagram reaches its destination, the datagram is discarded; to prevent it from roaming back and forth forever between routers.
Protocol-identifies the type of Transport layer protocol that will receive the datagram (for example. TCP, UDP,I CMP, etc).
Header Checksum- is a 16 bit field used to check the integrity of routing information in the header i.e., whether the IP header has been completed.
Source address- identifies the original source of the datagram, i.e, the full IP address of the source node.
Destination address- identifies the final destination of the datagram i.e, indicates the full IP address of the destination node.
Options-The options field gives more functionality to the IP datagram. It can carry fields that control routing, timing, management, and alignment.
Padding- Contains filler information to ensure that the header is a multiple of 32 bits. The size of the padding field may vary. Data- includes the data originally sent by the source node, plus TCP information.
TRANSMISSION CONTROL PROTOCOL (TCP) - TCP belongs to the Transport layer of both the OSI model and the TCP/IP model. - it is a connection oriented subprotocol that provides reliable data delivery services. - it sits on top of the IP subprotocol and compensate for IPs reliability deficiencies by providing checksum, flow control and sequencing information. - the fields of the TCP segment are:- (i) Source Port- indicates the part at the source nodes. A part to the address on a most where an application makes itself available to incoming data, eg port 60, used to accept web page requests. (ii) Destination Port- (iii) Sequence number-identifies the data segments position in the stream of data segments sent. (iv) Acknowledgment number(ACK) - confirms receipt of the data via a return message
(v) TCP header length- (vi) Codes- include flags that signal special conditions, eg, urgent message, connection (vii) request or request for connection termination. (viii) Sliding- window size- indicates how blocks of data the receiving machine can accept (ix) Checksum- allows the receiving node to determine whether the TCP segment become corrupted on transmission. (x) Urgent pointer- can indicate a location in the data where urgent data resides. (xi) Options- specifies special options (xii) Paddy- contains filler information to ensure the TCP header size is a multiple of 32 bits. (xiii) Data- contains data originally sent by the source node.
USER DATAGRAM PROTOCOL (UDP) -sits in the Transport layer of the TCP/IP model -UDP is a connectionless transport service. - it does not guarantee that packets will be received in sequence or even received at all. - it is useful in situations in which data must be transferred quickly, such as live audio or video transmissions over the Internet.
UDP header contains only four fields: - Source port, destination port, length and checksum.
IP ADDRESSING An IP address- identifies the connection of a host to its network. - It consist of four bytes(32) i.e. octets separated by periods - The octets define three fields: I) Class type II) Netid III) Hostid IP addresses are assigned to interfaces such as modems, routers or internet cards and not to the host computer.
CLASSES An address class is a field length pattern designed to organize networks according to sizes in order to meet the needs (for varying network sizes) of different types of organizations There are five classes of IP addresses: A to E class A addresses are numerically the lowest. One byte is used to identify the class type and netid, while three bytes remaining are for hosted numbers. These class A networks can accommodate far more hostid than class B or class C networks, which has two- and one byte hostid fields respectively, classes A and B are currently full. Only class C is reliable for addresses. Class D is reserved for multicast addresses class E addresses are reserved for future use. Multicasting allows copies of a datagram to be passed to a select group of hosts rather than to an individual host. On the other hand, broadcasting requires that a packet be passed to all possible destinations on a network.
Although eight 98) bits have 256 possible combinations, some combinations cannot be used to assign addresses to a network node. e g IP addresses 0.0.0.0 and 255, 255, 255, are reserved for identifying the default network over which a packet should be routed and for broadcasts, respectively.
IDENTIFICATION OF ADDRESSES CLASSES
Network class Beginning octet No of Network Host address per network A 1-126 126 16,777.214 B 128-191 16,000 65,534 C 192-223 2,000,000 254
NOTE: 127 is not a valid first octet for an IP addresses assigned to a network node the range of addresses that begin with 127 is reserved for loopback information the IP addresses 127.0.0.1 is called a loopback addresses contacting the IP number will establish a running with your own machine (useful for troubleshooting problems with a workstations TCP/IP communications.
Example of class addresses
Class IP Addresses
A 01111011 10001111 11111100 11001111 B 10011101 10001111 11111100 11001111 C 11011101 10001111 11111100 11001111 D 11101011 10001111 11111100 11001111 E 11110101 10001111 11111100 11001111
Class A 0 Netid Hostid Class B 10 Netid Hostid Class C 110 Netid Hostid Class D 1110 Multicast Address Class E 1111 Reserved for future use
Dotted Decimal Notation Is used to make the 32 bit addresses from shooter and easier to read. It is the decimal form of the IP addresses, with decimal points separating the bytes
To convert an IP addresses to its dotted decimal rotation, convert each byte (i.e 8 bits) to a decimal number between 0 and 255 e.g 76543210 76543210 76543210 76543210 10011101 10001111 11111100 11001111 157 7 6 5 4 3 2 1 0 128+0+0+16+8+4+0+1=157 (i.e., 2+0+0+2+2+2+0+2) 128+0+0+0+8+4+2+1=143 128+64+32+16+8+4+0+0=252 128+64+0+0+8+4+2+1=207
= 157.143.252.207
SUBNETTING The total number of addresses that are available for use on a network is called the addresses space. Subnetting to the process of splitting a network portion of an IP addresses allowing an administrator for partition or divide a network without having to use a new addresses for each network partition An Ip address is 32 bits long and is divided into two portions a network portion which indicates the network (netid) and a host portion which indicates the host (or router) on the network (hosted). To reach a host on the internet, we must first reach the network using the netid; then use the host by using the hosted. Classes A,B, and C in IP addressing are designed with two levels of hierarchy.
Two level hierarchical addressing implies that one physical network may exist. For example an organization with a class B address is limited to two levels of hierarchy. As such , the host cannot be organized into groups, and all of the host are at the same level. The organization has one network with many host. The solution to this problem is subnetting the further division of a network into smaller networks called subnetworks. When a network is subnetted, the rest of the internet is oblivious of it. The subnetworks appear as a single network to the rest of the internet, but the router connecting the subnets to the internet knows that the network with the netid 141.14 (for example) is physically divided into smaller networks and that the last two octet define the subnetid and hosted (e.g 2.21) where 2 is the subnetid and 21 is the hostid.
Three Levels of Hierarchy Adding subnetworks creates an intermediate level of hierarchy in the IP addressing system. The network now has three levels: netid, subnetid, and hosted the first level the netid, defines the site the second- subnetid, defines the physical subnetwork. The third level- the hosted, defines the connection of the host to the subnetwork.
Example a. Address in a network without subnetting 141.14. 2.21
Netid Hostid
b. . . Address in a network Netid subnetid Hostid with subnetting
Subnetwork Access Host Access
In case (b) , routing of an IP datagram. Involves three steps i.e delivery to the site, delivery to the subnetwork and delivery to the host.
MASKING Is a process that extracts the address of the physical network from an IP address. In a case where there is no subnetting, masking extracts the network address from the IP address. If the network is subnetted, masking extract the subnetwork address from an IP address.
Example of masks without subnetting and with subnetting. (a) Masking without subnetting
141.14.2.21 141.14.0.0
IP address Network Address
(b) Masking with subnetting
141.14.2.21 141.14.2.0
IP Address Subnetwork Address
As seen above, masking applies to both networks- whether subnetworks (subnetted) or a single network (unsubnetted)
141.14 2
2 1 Mask 255.225.0.0
255.255.0 FINDING THE SUBNEWORK ADDRESS There are two types of masking (a) Boundary level masking and (b) Non-boundary level masking Generally, to find the subnetwork address, apply the mask to the IP address. Rules for Boundary-Level Masking If the masking is at boundary level (the mask numbers are either 255 or 0) follow the simple rules below: 1. The bytes in the IP address that correspond to 255 in the mask will be repeated in the subnetwork address 2. The bytes in the IP address that correspond to 0 in the mask will change to 0 in the subnetwork address.
Non-boundary-Level Mask: This is a mask where the mask numbers are not just 255 or 0. Finding the subnetwork address involves using the bit-wise AND operator. Three rules are required and followed. 1. The bytes in IP address that correspond is 255 in the mask will be repeated in the subnetwork address.
2. The bytes in the IP address that correspond to 0 in the network will change to 0 in the subnetwork address. 3. For other bytes, use the bit wise AND operator.
Note In the above example, three bytes are easy to determine (following the rules); but the second byte needs a bit-wise AND operation. The bit-wise AND operation requires that, if two bits are both 1s, the result is 1, otherwise, the result is 0. So, we convert the decimals (i.e. 123 and 192) to binary, then we AND them convert the result back to decimal.
1. Find the class of the IP address below and convert them from binary notation to dotted decimal notation
a) 01111111 11110000 01100111 01111101 b) 10101111 11000000 11110000 00011101 c) 11011111 10110000 00011111 01011101 d) 11101111 11110111 11000111 00011101 e) 11110111 11110011 10000111 11011101
2. Find the netid and the hosted of the IP address below: indicate the class also a) 129 . 14 . 6 . 8
b) 19 .34 .21. 8
c) 190 . 12 . 67 . 9
d) 220 . 34 . 8 . 12
3. Find the subnetwork address for the following
a) IP address: 125.34.12.56. mask: 255.255.0.0 b) IP address: 141.181.14.16 Mask: 255.255.224.0 c) IP address: 200.34.22.156 Mask 255.255.255.240
4. Show the bit pattern of the mask below used in class C network 255.255.192.0, 255.255.255.0
POINT-TO-POINT PROTOCOL (PPP) OVERVIEW
The Point0to0Point Protocol (PPP) was designed for users who need to connect to a computer system through a telephone line PPP helps to control and manage the transfer of data.
Point to-Point physical link
The Point-to-Point overcomes the deficiencies of the Serial line Internet Protocols (SLIP) which was the first protocol devised for point to point link. PPP supports protocols other than Internet Protocol (IP), allows IP address to be assigned dynamically. And also supports authentication of the users.
A PPP connection goes through fire phases: idle, establishing, authenticating, networking, and terminating. A transition state diagram describes the various phases. (i) Idle state- means the link is not being need there is no active carrier and the line is quiet.
Transition state Data Carrier
Drop Carrier
Fail
(ii) Establishing state- The connection goes into establishing state when one of the end points starts to communicate. In the state, options are negotiated between the two parties. If the negotiation is successful, the system goes to the authenticating state( if required) or directly to the networking state.
(iii) Authenticating state- Is optimal, the two end points may during the establishing state, decides not to go through authentication otherwise, they send several authenticating packets, if authentication, is successful the connecting goes to the networking state, else it terminates.
Idle Establishing (link)
Authentication Terminating (Link) Networking (Exchanging user data and control) (iv) Networking state- Is the heart of then transition states,. The exchange of user control and data packets starts and remains in this state until one of the end points signals to terminate the connection.
(v) Terminating state- When the connection is in the terminating state, several packets are exchanged between the two ends for house cleansing and closing the link.
Point-to-Point Layers PPP operates only at the physical and data link layers of the OSI model. At the physical layer, PPP supports any of the protocols recognized by ANSI. The implementer chooses/uses whatever is available. At the data link layer, PPP employs a version of HDLC (High Level Data Control)
i. Flag field- identifies the boundaries of a PPP frame. Its value is 01111110.
ii. Address field- since PPP is used for a point-to-point connection; it uses the broadcast address of HDLC, 11111111, to avoid a data link address in the protocol.
Flag Address Control Protocol Data & Padding FCS Flag 11111111 11100000 iii. Control field- uses the format of the u-frame in HDLC. The value is 11000000 to indicate that the frame does not contain any sequence numbers and that there is no flow and error control.
iv. Protocol field-defines what is being carried in the data field: user data or other information. v. Data field- carries the user data or other information.
vi. Frame check sequence(FCS)-the FCS field, as in HDLC, is simply a two-byte or four byte CRC
LINK CONTROL PROTOCOL (LCP) The link control protocol is responsible for establishing, maintaining configurating and terminating links and also provides negotiation mechanisms to set options between the two ends point. LCP packets are use for this purpose. All LCP packets are carried in the payload field of the PPP frame. The value of the protocol field (which should be set to CO21), defined a frame as carrying an LCP packet. LCP packet encapsulated in a frame. 1byte 1byte 2bytes variable LCP Packet
(and
Code ID Length information for some LCP packets Flag Address Control Protocol Pay load FCS Flag (and padding Co21 16
DISCRIPTION OF THE FIELDS OF THE LCP PACKET CODE Defines the type of LCP packet. ID FIELD - Hold a value used to match a request with the reply. One end point insert a value in this field, which will copied in the reply packet. LENGTH Defines the length of the LCP packet. INFORMATION- Contains extra information needed for some LCP packets.
TYPES OF LCP PACKETS. 1. CONFIGURATION PACKETS- Used to negotiate the options between the two ends. Four different packs are used for this purpose :- (a) CONFIGURE -REQUEST: - A configuration request is sent with a list of zero or more options by the end that wishes to start a connection to the other end point. (b) CONFIGURE - ACK- If all of the option listed in the configure request packet are accepted by receiving end, it will send a configure ACK, which repeat all the requested options. (c) CONFIGURATION NAK: - This packet is sent if the receiver of the configure request, packet recognize all the option but find that some should be omitted revised. The changes are made and totally new, configure request packet is resent. (d) CONFIGURE REJECT Is sent if some options of some configure request are not recognized by the receiving part. Request sender revises the configure request message and send a one. 2. LINK TERMINATION PACKETS:- Are used to disconnect the link between two end points.
(a) TERMINATE REQUEST:- Can be sent by either end. (b) TERMINATE ACK:- response sent by a party that receives the terminate request packet. 3. LINK MONITORING AND DEBAGGING PACKETS. (a) CODE REJECT:- Sent if the end point receives a packet with an unrecognized code. (b) PROTOCOL REJECT:- Sent if the end point receives a packet with an unrecognized protocol in the frame. (c) ECHO REQUEST:- Is sent to monitor the link, to see if the link is functioning . Sender expects an echo- reply packet from the other side. (d) ECHO REPLY: - Response to an echo request. The information field in the echo request is duplicated and send back to the sender as proof that link is functioning. (e) DISCARD REQUEST: - Is a kind of loopback test packet. Used by the sender to check it own loopback condition, Receiver of the packet just discard it. AUTHENTICATION Authentication means the validity of a user who needs to access a set of resources. It is important because PPP is design for use over dial up links where user verification is very necessary. PPP has two protocols for verification:- I) Password Authentication Protocol (PAP) II) Challenge Handshake Authentication Protocol CHAP) PAP Is a simple authentication procedure with a two step process:- (i) Users who want to access a system sends an authentication identification (Usually the user name) and a password.
(ii) System check the validity of the identification and password and either accept or denies connection. PAP packets are encapsulated in a PPP frame. The value of the protocol field of a PPP frame carrying a PAP packet is CO23. There are three PAP packets:- Authentication Request Authentication ACK Authentication NACK CHAP Is a three way handshaking authentication protocol. It provide more security than PAP because the password is kept secret and never sent online. - System sends a challenge packet containing a challenge value, usually a few bytes, to the user. - User applies a pre-defined function that takes the challenge value and the user own password and creates a result. User sends the result in the response packet to the system. - System applies same function to the users password (know to the system) and challenge value to create a result. If result is same as that sent by the user, access is granted, otherwise, it is denied.
User Point-to-Point link
Challenge Packet
Response Packet
Success or failure Packet
CHAP PACKETS: - Are encapsulate in the PPP frame and is distinguished from other packets by the value of the protocol field, C223. There are four CHAP packets:- i) Challenge ii) Response iii) Failure NETWORK CONTROL PROTOCOL (NCP) After successful link establishment and authentication the connection goes to the networking state. PPP uses network control protocol (NCP) in the networking state, NCP is a set of control protocol to allow the encapsulation of data coming from network layer protocol (such as IP, IPX, and Apple talk) in the PPP frame. Internetwork Protocol Control Protocol (IPCP) Challenge value Response and name Accept or reject Is the set of packets that establish and terminate a network layer connection for IP packets. IPCP is encapsulated in a PPP frame with the value of the protocol as 802116 distinguishing it as IPCP packet.
NETWORK TRANSMISSION METHODS a. INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Integrated Service Digital Network (ISDN) is a set of protocols that combines digital telephony and data transport services. It was developed by ITU-T in 1976, and the idea is to digitize the telephone network to permit the transmission of audio, video and text over telephone lines. Thus, the goal of ISDN is to form a wide area network that provides universal end-to-end connectivity over digital media, by integrating all of the separate transmission services into one without adding new links or subscriber lines it is an effort to - Standardize subscriber service. - Provide user/network interfaces, and - Facilitate the internetworking capabilities of existing voice and data networks.
SERVICES There are three categories of services by which ISDN fulfils its purpose of providing fully integrated digital services to users: (i) Bearer Services (ii) Teleservices and (iii) Supplementary services. Bearer Services- provide the means to transfer of information (voice data and video) between users without the network manipulating the content of that information since the network does not need to process the information. Bearer services belong to the first three layers of the OSI model, are well defined in the ISDN and can be provided using circuit-switched, packet switched, frame-switched, or cell-switched networks. Teleservices- rely on the facilities of the bearer services and are designed to accommodate complex user needs while shielding the user from details of the process. These services correspond to layers 4-7 of the OSI model. In teleservicing, the network may change or process the data contacts. Teleservices include telephony, teletex, telefax, videotext, telex, and video conferencing.
Supplementary Services- are services that provide additional functionality to bearer services and teleservices. Example is reverse charging, call waiting, and message handling.
ISDN relies on the Public switched Telephone Network (PSTN), and its connections may be dial-up or dedicated in a dial-up connection, ISDN users dial their telecommunications providers network from an ISDN modem (like dialing an ISPs network from a computers modem),. A dedicated connection is one that is always available to transmit or receive data.
ISDN is distinguished from a simple telephone line by the fact that it exclusively uses digital signaling, and can carry data and voice signals at once. ISDN lines may carry up to two voice calls and one data connection simultaneously. Due to this ability, the need to pay for separate phone lines to support faxes, modem, and voice calls at one location, is eliminated. When used for telephone calls, ISDN offers the advantage of much quicker dialing and call completion.
Subscriber Access to the ISDN ISDN connections are based on two types of channels: bearer channels and Data channels.
B-Channels A bearer (B channel) employs circuit-switching techniques to carry digitized data (e.g video, voice, etc) in full duplex mode over the ISDN connections and at a maximum through put (or transmission rate) of 64kbps. Several transmission can be accommodated at once 4 the signals are first multiplexed and destined for one recipient A B- channel carries transmission end-to-end and cannot demultiplex a stream midway-so as to serve multiple recipients. D Channel A data channel uses packet switching techniques to carry contact signaling for the B channels. Control information carried includes session initiation and termination signals, caller identity, call forwarding, and conferencing calling signals. A single D channel has throughput (maximum) of 16 kbps or 64kbps and each ISDN connection uses only one D channel. Separating the control signals (D channels) from the information signals (B channels) has the advantage of enabling ISDN to transmit voice and data signals more efficiently than a regular telephone line.
User Interfaces There are two types of commonly used ISDN connections: Basic Rate Interface (BRI) and Primary Rate Interface (PRI) BRI (Basic Rate Interface) BRI uses two B channels and one 16kbps D channels as indicated by the notation= 2B+D the two B channels are treated as separate connection by the network and can carry voice and data or two data streams simultaneously and separate from each other. The maximum amount of data traffic a BRI connection can accommodate is 12 kbps. This is achieved through a process called bonding by which two B channels are combined to achieve an effective throughput of 12kbps. BRI is the most economical ISDN connection type so most subscribers use it.
PRI (Primary Rate Interface) Uses 23 B channels and one 64 kbps D channels as represented by the notation: 23 B+D. PRI to more commonly used by business and organizations that need more throughput. PRI and BRI connections may be interconnected on a single on a single network. PRI links use the same kind of equipment as BRI lines, but require the service of an extra network termination device, called a Network Termination 2 (NT2), to handle the multiple ISDN lines. One disadvantage of the ISDN is that it can span a distance of only 18,000 feet before repeater equipment is needed to boost the signal.
b. X.25 (AND FRAME RELAY) X.25 is a set of protocols designed for long-distance data transmission and standardized by the ITU in the mid-1970s. It describes a packet-switched, analog networking technology designed to supply data transmission over the PSTN. The original standard for x.25 specified a maximum throughput of 64 kbps. But by 1992, he standard was updated to include maximum throughput of 2.045Mbps. X.25 ensures data reliability over long distance by verifying the transmission at every node. However, thus verification renders X.25 slow and unsuitable for time-sensitive applications, such as audio or video.
c. FRAME RELAY WAN technologies such as T-lines or X.25 did not respond adequately to the needs of the user. Users were looking for higher data rates, efficient handling of bursty data transmissions, lower cost, and less overhead. Frame relay is an updated digital version of X.25 that relies on packet switching. It supports higher bandwidth than X .25 (because it is digital), offering a maximum of 45 Mbps throughput. Frame Relay provides low-level (physical and data link layer) service in response to the following user demands.
i) Higher Data Rate Lower Cost: most organizations use high speed LANs and want to use WANs to connect these LANs. T-lines provide only point-t-point (not many to many) connection except to create a mesh network out of T-lines which is very expensive. Frame Relay provides the same type of service at lower cost i.e use WANs to connect six LANs, 15 T-lines is needed, but only six T-lines will be enough to connect the same six LANs to a frame relay.
ii) Bursty Data:- some service offered by WAN provides assume that the user has a fixed rate need. Frame Relay accepts bursty data. Bursty data requires bandwidth on demand. The user needs different bandwidth allocations at different times. With frame Relay, a user is granted an average data rate that can be exceeded during bursty periods.
iii) Less Overhead Due to Improved Transmission Media Frame Relay does not provide error checking or requires acknowledgement in the data links layer, as does X.25. Instead all error checking is left to the protocols at the network and transport layers which use the services of Frame Relay and many data link operations are eliminated while others combined. Instead of the extensive traffic ofX.25 and its much overhead that eats up bandwidth due to error checking form station to station and source to receives, and the requirement that each station keep a copy of the frame in its storage while it awaits acknowledgement from the receiving station, Frame Relay has a simplified transmission.
Role of Frame Relay Frame Relay can be used as a low-cost high speed backbone wide area network to connect local area networks that do not need real-time communication but may have bursty data to send. Also presently, Frame Relay provides both permanent and suitable connection pays on a leased basis while a user who needs a switched connection pays on a used basis.
Advantages Frame Relay has some advantages over comparable WANs such as X.25 and T-lines. i) It operates at a higher speed (1.544 Mbps to 45Mbps) and so can be easily used instead of a mesh of T-1 or T-3 lines. ii) It operates in only the physical and data link layers to provide services to protocols that already have a network layer protocol, (avoiding duplication) e.g if TCP/IP wants to use the services of Frame Relay, TCP.IP uses its own network layer and Frame Relay provides services at the physical and data link layers. With X.25 there is a duplication in the network layer functions.
iii) Frame Relay allows bursty data users do not have to adhere to a fixed data rate as in the case of X.25 or T-lines.
iv) It allows a frame size of 9000 bytes, which can accommodate all local area network frames.
v) Frame Relay is less expensive than other traditional WAN.
Disadvantages i) Its speed or date rate is lower than some protocols like Broadband ISDN (B-ISDN) ii) Frame Relay allows variable length frames which may create varying delays for different users. Both large and small frames are stored in the same queue if they are going out the same interface. Where a small frame follows a large one the small frame suffers more delay: thus users of small frames are punished. iii) Because of the varying delays, which are beyond users control, Frame Relay is not suitable for sending delay sensitive data such as real-time voice or video. Example it is unsuitable for teleconferencing