Professional Documents
Culture Documents
IP Network Fundamental
======================
Data Traffic Components:
a) Sender
b) Receiver
c) Protocol
d) Medium
e) Message
Network Topologies:
a) Bus (most unreliable)
b) Star
c) Ring
d) Mesh/Grid (most reliable in redundancy)
e) Tree
Formula to calculate the number of sites in
a) Mesh (full mesh topology)
[n x (n-1)]/2, n - no of routers/sites
b) Star
n - 1
Local Area Network Charisteristics
===================================
a) Short distance (Campus wide scope)
b) High bandwidth/speed
c) Low delay/latency
d) More reliable/resilient
Equipment used in LAN:
i) Hubs/switches/bridges
ii) Routers
iii) ATM switch
iv) WiFi access point
Wide Area Network Charisteristics
=================================
a) Long distance (cross states, counties even countries)
b) Low bandwidth/speed relative to LAN
c) Higher latency relative to LAN
d) Less resilient
Equipment used on WAN
i) WAN Routers
ii) WAN switches - FR switches,etc
iii) Modems
iv) DCE/DTE terminals
v) Access server
Standardisation of Products, Services, protocols etc divided into two sets
a) de factor - industry preference
b) de jure - industry regulation and rules
Orgisation Standardisation:
a) Institute of Electronic, Electrical Engineers (IEEE)
- provides standardisation for IT, Telecommunication and electrical products
- IEEE 802 projects (Ethernet, WiFi, Vlan trunk, etc)
802.3, 802.11, 802.1q, 802.16.....
802.1q = VLAN // 802.16 = MiMAX
OSI 7
Layer
Layer
Layer
Layer
Layer
Layer
Layer
kungfu
Layers of Data Communication Reference Model
1 : Physical
2 : Data Link
3 : Network
4 : Transport
5 : Session
6 : Presentation
7 : Application
kungfu
iv) Reverse ARP (RARP)
- used to resolve IP address based on mapped MAC address
- uses unicast communication
- used commonly in the network with BOOTP server (RARP server) providing ip
addresses for diskless workstations upon power-up
Dynamic Host Configuration Protocol (DHCP)
- used to provide dynamic ip address allocation to clients/hosts
- DHCP server uses a scope of address range to assign addresses
Routing
- routers work on Layer 3
- functions of a router:
i) provide ip forwarding path to the network
ii) isolate networks with subnets; reducing the broadcast size
iii) provide security isolation with access control list (a kind of simple
firewalling service)
iv) interconnect heterogenous networks (networks with different platforms)
4) Transport or Layer 4
- dealing with data transportation and delivery
- two transport protocols : a) TCP, b) UDP
- data named as segment
a) Transport Control Protocol (TCP)
- characteristics:
i) Connection-oriented transport protocol
ii) Reliable transmission with acknowledgement
iii) support both fixed and sliding windowing (flow control)
iv) retransmission for error correction
v) High overhead
vi) Used for bulky data streams
b) User Datagram Protocol (UDP)
- characteristics:
i) Connectionless transport protocol
ii) Unreliable transmission without acknowledgement
iii) No retransmission nor error correction (best effort)
iv) Low overhead (smaller data streams) with faster transmission (transmission
efficiency)
v) Used for smaller data streams like voice and video traffic (based on RTP)
Examples of TCP and UDP
----------------------Application
----------HttP
HTTPs
SNMP
Telnet
SSH
FTP
TFTP
DNS
SMTP
RIP
...
Transport Protocol
-----------------TCP 80
TCP 443
UDP 161/162
TCP 23
TCP 22
TCP 20/21
UDP 69
TCP/UDP 53
TCP 25
UDP 520
FTP:20/21
SSH:22
Telnet:23
SMTP:25
DNS:53udp
Http:80
HTTPs:443
TFTP 69
SNMP 161/162
RIP 520
5) Session or Layer 5
- dealing session establishment, maintenance and management
- examples: RPC, Remote RPC, SQL, etc
- data named as Session PDU (protocol data unit)
6) Presentation or Layer 6
- dealing with data formatting
- examples: encryption/de-encription with MD5, SHA-1, ASCII, JPEG/MPEG, etc
- - data named as Presentation PDU (protocol data unit)
Page 3
kungfu
7) Application or Layer 7
- dealing with final end user applications
- examples: HTTP,HTTPs, FTP/TFTP,SNMP, DNS, Telnet, SSH, SNMP, SMTP etc
- hardware used including firewall, proxy firewall, etc
- data named as Application PDU (protocol data unit)
ICMP (Internet Control Message Protocol)
- includes application like ping, tracert
a) Ping
- used to test and verify network connectivity (end-to-end)
example:
C:\>ping google.com
Pinging google.com [61.6.41.209]
Reply from 61.6.41.209: bytes=32
Reply from 61.6.41.209: bytes=32
Reply from 61.6.41.209: bytes=32
Reply from 61.6.41.209: bytes=32
b) tracert
- used to test and verify each junction of the network connection point (hop to
hop connectivity)
example:
C:\>tracert google.com
Tracing route to googl.com [173.194.117.48]
over a maximum of 30 hops:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1
1
1
1
1
1
2
6
9
11
12
9
33
17
15
16
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
1
1
<1
<1
1
2
2
5
9
9
12
8
96
22
17
16
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
1
1
<1
<1
1
1
2
3
8
9
9
8
49
15
15
16
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
160.0.59.254
172.16.255.41
172.16.254.14
172.16.254.4
160.0.234.51
202.185.21.1
161.142.32.153
ge0-3-1-0.iph95.jaring.my [61.6.54.129]
pos0-3-0-0.bkj95.jaring.my [61.6.13.129]
te0-0-0-0.bkj96.jaring.my [61.6.10.2]
te-0-2-0-0.drc95.jaring.my [61.6.51.14]
61.6.3.150
209.85.242.246
209.85.242.242
209.85.244.115
sin01s15-in-f16.1e100.net [173.194.117.48]
126
191
223
239
255
kungfu
Class D => x1 = 224 - 239
Class E => x1 = 240 - 255
Examples:
10.1.0.0 255.255.0.0 is a Class A network address
10.1.1.0 255.255.255.0 is a Class A network address
172.16.10.0 255.255.255.0 is a Class B network address
Subnet Mask or Net Mask value defines the SIZE of the networks.
The size of the Class of Network depends on the subnet mask value.
Example:
By default, Class A has the largest size network compared to Class B and C.
Private Addresses
- IP addresses used in the local internal networks (which cannot be accessing
Internet or outside networks without NAT).
Examples of Private IP Addresses:
Class A: 10.0.0.0 - 10.255.255.255
Class B: 172.16.0.0 - 172.31.255.255
Class C: 192.168.0.0 - 192.168.255.255
Reserved loopback address: 127.0.0.0 - 127.255.255.255
Public Addresses
- IP addresses used in Internet or public networks which are accessible in
Internet and recognised by all providers' networks.
Formulas
a) n + h
b) 2^h c) 2^h =
d) 2^n =
for Subnetting:
= 32; n - network bit, h - host bit
2 = total number of hosts (valid hosts - usable IP Addresses)
size of the subnetwork
the total number of subnetworks after being subnetted
62
62 + 2
64
6
n + h = 32
n + 6 = 32
n
= 26 (255.255.255.192)
Size of the network = 2^h
= 2^6
= 64
Jadi, 6 subnets will be as follows:
10.0.0.0/26
10.0.0.64/26
10.0.0.128/26
10.0.0.192/26
jumlah host 2^h-2
10.0.1.0/26
10.0.1.64/26
jumlah subnet 2^n
Broadcast ID :
jumlah host+network id +1
Nework ID :
liat /xx ; cocokan biner 1
Subnet mask : x:x:x:x
Exercises:
----------1) Find out the broadcast ID for the network 172.16.30.48/29.
2) Find out the network ID for the host 192.168.10.98/26.
3) Find out the subnet mask for the network 172.30.17.0 with 510 valid hosts.
4) Find out the valid host address range for the network 10.0.10.0 with subnet
Page 5
kungfu
mask 255.255.254.0
5) Based on the Class B address, how many subnets and hosts for each they can be
created given the subnet mask 255.255.255.224?
Questions:
1) Give me some examples of Application layer?
Answer: Http,Https, FTP,SNMP,NNTP,SMTP,TFTP,Telnet,SSH,DNS, etc
2) Give me some examples of Transport layer?
Answer: TCP and UDP
3) Give me some examples of Network layer?
Answer: ICMP (ping/tracert), IP addressing, RIP,OSPF,IS-IS,BGP, DHCP [Software]
routers, multilayer switches [hardware]
4) Give me some examples of Data Link layer?
Answer: VLAN,STP,PPP,HDLC,Frame-relay,ATM,MAC addressing [software]
switches, bridges, access points [hardware]
5) Give me some examples of Physical layer?
Answer: cables (UTP/STP/coaxial/fiber optical), hubs, repeaters, V.35 serial
port, etc
6) Give me some examples of Presentation layer?
Answer: JPEG,MPEG,GIF,ASCII,MIDI,MD5,SHA-1,AES,etc
Page 6