Vous êtes sur la page 1sur 6

kungfu

IP Network Fundamental
======================
Data Traffic Components:
a) Sender
b) Receiver
c) Protocol
d) Medium
e) Message
Network Topologies:
a) Bus (most unreliable)
b) Star
c) Ring
d) Mesh/Grid (most reliable in redundancy)
e) Tree
Formula to calculate the number of sites in
a) Mesh (full mesh topology)
[n x (n-1)]/2, n - no of routers/sites
b) Star
n - 1
Local Area Network Charisteristics
===================================
a) Short distance (Campus wide scope)
b) High bandwidth/speed
c) Low delay/latency
d) More reliable/resilient
Equipment used in LAN:
i) Hubs/switches/bridges
ii) Routers
iii) ATM switch
iv) WiFi access point
Wide Area Network Charisteristics
=================================
a) Long distance (cross states, counties even countries)
b) Low bandwidth/speed relative to LAN
c) Higher latency relative to LAN
d) Less resilient
Equipment used on WAN
i) WAN Routers
ii) WAN switches - FR switches,etc
iii) Modems
iv) DCE/DTE terminals
v) Access server
Standardisation of Products, Services, protocols etc divided into two sets
a) de factor - industry preference
b) de jure - industry regulation and rules
Orgisation Standardisation:
a) Institute of Electronic, Electrical Engineers (IEEE)
- provides standardisation for IT, Telecommunication and electrical products
- IEEE 802 projects (Ethernet, WiFi, Vlan trunk, etc)
802.3, 802.11, 802.1q, 802.16.....
802.1q = VLAN // 802.16 = MiMAX

b) Internet Engineering Task Force (IETF)


- provides standardisation for routing protocols
- RIP, OSPF, BGP, TCP/IP Subneting/VLSM, VRRP
- provides technical documentation for a process/technologies over the RFC and
RFC Draft.
c) International Standardisation Organisation (ISO)
- provides standard datacom reference model : OSI 7 Layers
Page 1

OSI 7
Layer
Layer
Layer
Layer
Layer
Layer
Layer

kungfu
Layers of Data Communication Reference Model
1 : Physical
2 : Data Link
3 : Network
4 : Transport
5 : Session
6 : Presentation
7 : Application

IP Core/Backbone Network Characteristics:


---------------------------------------a) High reliability
b) High speed/convergence
c) Scalable/Flexible for growth
d) QoS requirements for differentiated services required by customers
e) Manageable and Operational by EMS/NMS
f) Flat network architecture
OSI 7 Layer Reference Model : Benefits
-------------------------------------i) Engineering support can be scoped and escalated by means of layers
ii) Facilitate the learning and teaching of data communication by means layers
iii) Silicon providers/vendors can modulate the process of creating and marketing
the datacom products based on the modular functionality. Eg, routers perform
Layer 3 jobs, all vendor-based routers will have the same functions based on the
Layer 3 specs. (Vendor interoperability support guaranteed)
OSI 7 Layers
-----------1) Physical or Layer 1
- dealing with interfaces, ports, cabling, medium in connectivity
- examples: cables (coaxial, copper/twisted pair, fiber), wired and microwave
frequency, V.35/RS232, hubs/repeaters, transceivers, etc
- data named as bit flows
2) Data Link or Layer 2
- dealing with data encapsulation/de-encapsulation, link management
- examples: data encapsulation/de-encapsulation with PPP/HDLC, ,Ethernet,ATM,FR,
MAC, LLC (compression, authentication), etc
- hardware used in Layer 2: switches, bridges, WiFi Access points/Controllers
- MAC address (aka physical address) is a 48-bit hexadecimal values; eg.
f04b.7b3a.9056 OR f0-4b-7b-3a-90-56 OR f0:4b:7b:3a:90:56
- first 24-bit of the MAC address represents unique vendor ID while the balance
24-bit represents the unique object ID (adapter ID)
- data named as frames
3) Network or Layer 3
- dealing with IP addressing and IP path forwarding (routing)
- examples: IP routing with RIP,OSPF,IS-IS,BGP (routing protocols); IP addressing
with VLSM/FLSM, routed protocols as TCP/IP, IPX/SPX, Appletalk;
- hardware used in Layer 3: routers, multilayer/L3 switches
- data named as packets
- A typical ip address contains two parts: Network ID and Host ID
- IP address is a 32-bit decimal values
- Network layer protocols include: ARP, Proxy ARP, Reverse ARP, DHCP
i) Address Resolution Protocol (ARP)
- used to resolve MAC address based on IP address map
- uses broadcast communication
- ARP works only in the same broadcast domain (network/vlan)
ii) Proxy ARP
- used to resolve MAC address based on IP address map but it needs the
gateway/router to forward the ARP request to different broadcast domain
- ARP can work in different subnets as long as gateway is enabled for proxy ARP
iii) Gratuitous ARP
- happens when conflict of IP addresses in the network detected by both owners of
the address
- generating network error messages to inform about the conflict
Page 2

kungfu
iv) Reverse ARP (RARP)
- used to resolve IP address based on mapped MAC address
- uses unicast communication
- used commonly in the network with BOOTP server (RARP server) providing ip
addresses for diskless workstations upon power-up
Dynamic Host Configuration Protocol (DHCP)
- used to provide dynamic ip address allocation to clients/hosts
- DHCP server uses a scope of address range to assign addresses
Routing
- routers work on Layer 3
- functions of a router:
i) provide ip forwarding path to the network
ii) isolate networks with subnets; reducing the broadcast size
iii) provide security isolation with access control list (a kind of simple
firewalling service)
iv) interconnect heterogenous networks (networks with different platforms)
4) Transport or Layer 4
- dealing with data transportation and delivery
- two transport protocols : a) TCP, b) UDP
- data named as segment
a) Transport Control Protocol (TCP)
- characteristics:
i) Connection-oriented transport protocol
ii) Reliable transmission with acknowledgement
iii) support both fixed and sliding windowing (flow control)
iv) retransmission for error correction
v) High overhead
vi) Used for bulky data streams
b) User Datagram Protocol (UDP)
- characteristics:
i) Connectionless transport protocol
ii) Unreliable transmission without acknowledgement
iii) No retransmission nor error correction (best effort)
iv) Low overhead (smaller data streams) with faster transmission (transmission
efficiency)
v) Used for smaller data streams like voice and video traffic (based on RTP)
Examples of TCP and UDP
----------------------Application
----------HttP
HTTPs
SNMP
Telnet
SSH
FTP
TFTP
DNS
SMTP
RIP
...

Transport Protocol
-----------------TCP 80
TCP 443
UDP 161/162
TCP 23
TCP 22
TCP 20/21
UDP 69
TCP/UDP 53
TCP 25
UDP 520

FTP:20/21
SSH:22
Telnet:23
SMTP:25
DNS:53udp
Http:80
HTTPs:443
TFTP 69
SNMP 161/162
RIP 520

5) Session or Layer 5
- dealing session establishment, maintenance and management
- examples: RPC, Remote RPC, SQL, etc
- data named as Session PDU (protocol data unit)
6) Presentation or Layer 6
- dealing with data formatting
- examples: encryption/de-encription with MD5, SHA-1, ASCII, JPEG/MPEG, etc
- - data named as Presentation PDU (protocol data unit)
Page 3

kungfu
7) Application or Layer 7
- dealing with final end user applications
- examples: HTTP,HTTPs, FTP/TFTP,SNMP, DNS, Telnet, SSH, SNMP, SMTP etc
- hardware used including firewall, proxy firewall, etc
- data named as Application PDU (protocol data unit)
ICMP (Internet Control Message Protocol)
- includes application like ping, tracert
a) Ping
- used to test and verify network connectivity (end-to-end)
example:
C:\>ping google.com
Pinging google.com [61.6.41.209]
Reply from 61.6.41.209: bytes=32
Reply from 61.6.41.209: bytes=32
Reply from 61.6.41.209: bytes=32
Reply from 61.6.41.209: bytes=32

with 32 bytes of data:


time=8ms TTL=54
time=7ms TTL=54
time=7ms TTL=54
time=10ms TTL=54

b) tracert
- used to test and verify each junction of the network connection point (hop to
hop connectivity)
example:
C:\>tracert google.com
Tracing route to googl.com [173.194.117.48]
over a maximum of 30 hops:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

1
1
1
1
1
1
2
6
9
11
12
9
33
17
15
16

ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms

1
1
<1
<1
1
2
2
5
9
9
12
8
96
22
17
16

ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms

1
1
<1
<1
1
1
2
3
8
9
9
8
49
15
15
16

ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms

160.0.59.254
172.16.255.41
172.16.254.14
172.16.254.4
160.0.234.51
202.185.21.1
161.142.32.153
ge0-3-1-0.iph95.jaring.my [61.6.54.129]
pos0-3-0-0.bkj95.jaring.my [61.6.13.129]
te0-0-0-0.bkj96.jaring.my [61.6.10.2]
te-0-2-0-0.drc95.jaring.my [61.6.51.14]
61.6.3.150
209.85.242.246
209.85.242.242
209.85.244.115
sin01s15-in-f16.1e100.net [173.194.117.48]

Data Encapsulation and De-encapsulation


a) Traffic sent by sender
- data will be encapsulated by ADDING a layer of header information
b) Traffic received by receiver
- data traffic will be de-encapsulated by REMOVING/POPPING a layer of header
information
IP Addressing
=============
IP Address consists of two portions: Network ID and Host ID
Format: dotted decimal value (32-bits)
1
Classes of IP Address
128
1) Class A
192
2) Class B
224
3) Class C
240
4) Class D
5) Class E
Classes of Address depends on the value of the first octet of an IP address
Format of IP Address: x1.X2.X3.X4
Class A => x1 = 1 - 126 (127 - reserved for loopback)
Class B => x1 = 128 - 191
Class C => x1 = 192 - 223
Page 4

126
191
223
239
255

kungfu
Class D => x1 = 224 - 239
Class E => x1 = 240 - 255
Examples:
10.1.0.0 255.255.0.0 is a Class A network address
10.1.1.0 255.255.255.0 is a Class A network address
172.16.10.0 255.255.255.0 is a Class B network address
Subnet Mask or Net Mask value defines the SIZE of the networks.
The size of the Class of Network depends on the subnet mask value.
Example:
By default, Class A has the largest size network compared to Class B and C.
Private Addresses
- IP addresses used in the local internal networks (which cannot be accessing
Internet or outside networks without NAT).
Examples of Private IP Addresses:
Class A: 10.0.0.0 - 10.255.255.255
Class B: 172.16.0.0 - 172.31.255.255
Class C: 192.168.0.0 - 192.168.255.255
Reserved loopback address: 127.0.0.0 - 127.255.255.255
Public Addresses
- IP addresses used in Internet or public networks which are accessible in
Internet and recognised by all providers' networks.
Formulas
a) n + h
b) 2^h c) 2^h =
d) 2^n =

for Subnetting:
= 32; n - network bit, h - host bit
2 = total number of hosts (valid hosts - usable IP Addresses)
size of the subnetwork
the total number of subnetworks after being subnetted

Example of Subnet Calculation


1) Given 10.0.0.0/8 full Class A, requires 6 subnets with 62 hosts each. Find all
the 6 subnetworks.
Answer:
2^h - 2 =
2^h
=
2^h
=
Hence, h=

62
62 + 2
64
6

n + h = 32
n + 6 = 32
n
= 26 (255.255.255.192)
Size of the network = 2^h
= 2^6
= 64
Jadi, 6 subnets will be as follows:
10.0.0.0/26
10.0.0.64/26
10.0.0.128/26
10.0.0.192/26
jumlah host 2^h-2
10.0.1.0/26
10.0.1.64/26
jumlah subnet 2^n

Broadcast ID :
jumlah host+network id +1

Nework ID :
liat /xx ; cocokan biner 1
Subnet mask : x:x:x:x

range subnet/ size network : 2^h

Exercises:
----------1) Find out the broadcast ID for the network 172.16.30.48/29.
2) Find out the network ID for the host 192.168.10.98/26.
3) Find out the subnet mask for the network 172.30.17.0 with 510 valid hosts.
4) Find out the valid host address range for the network 10.0.10.0 with subnet
Page 5

kungfu
mask 255.255.254.0
5) Based on the Class B address, how many subnets and hosts for each they can be
created given the subnet mask 255.255.255.224?
Questions:
1) Give me some examples of Application layer?
Answer: Http,Https, FTP,SNMP,NNTP,SMTP,TFTP,Telnet,SSH,DNS, etc
2) Give me some examples of Transport layer?
Answer: TCP and UDP
3) Give me some examples of Network layer?
Answer: ICMP (ping/tracert), IP addressing, RIP,OSPF,IS-IS,BGP, DHCP [Software]
routers, multilayer switches [hardware]
4) Give me some examples of Data Link layer?
Answer: VLAN,STP,PPP,HDLC,Frame-relay,ATM,MAC addressing [software]
switches, bridges, access points [hardware]
5) Give me some examples of Physical layer?
Answer: cables (UTP/STP/coaxial/fiber optical), hubs, repeaters, V.35 serial
port, etc
6) Give me some examples of Presentation layer?
Answer: JPEG,MPEG,GIF,ASCII,MIDI,MD5,SHA-1,AES,etc

Page 6

Vous aimerez peut-être aussi