Академический Документы
Профессиональный Документы
Культура Документы
WELCOME
This is a presentation for the E2-E3 Consumer
Fixed Access Module for the Topic: Ethernet
TCP IP,IP Addressing
Eligibility: Those who have got the Upgradation
from E2 to E3.
This presentation is last updated on 15-3-2011.
You can also visit the Digital library of BSNL to
see this topic.
Outline of Presentation
Introduction
Ethernet Features
Description of CSMA/CD
MAC Frame Structure
TCP / IP Architecture
Functions of Layers
Discussion and Conclusion
Introduction
Most commonly used medium access
technique for BUS, Star topologies is Carrier
Sense Multiple Access with Collision Detection
Ethernet is Currently most popular N/W
Architecture
Uses CSMA/ CD to regulate the traffic
Ethernet Media is passive
Power is taken from computer. No failure
unless cable cut or improper termination
For internal circulation of BSNL only
Ethernet Features
Traditional Topology - Linear (BUS)
Type of Architecture - Baseband
Access Method - CSMA / CD
Specs. - IEEE 802.3
Transfer speed - 10 /100 / 1000 Mbps
Description of CSMA/CD
Description of CSMA / CD
CSMA / CD Operation
CSMA / CD functioning
Description
of CSMA/CD
For BASEBAND bus, the technique is illustrated
At time t0STN A starts session to send packet to D
At time t1 both STN B & C are ready to Transmit
STN B senses Signal on media - defers Transmission
STN C starts to transmit because unaware of As
Transmission
For internal circulation of BSNL only
Description of CSMA/CD
CSMA / CD functioning
Broadband
collision detection
timing
Description
of CSMA/CD
Description
of CSMA/CD
Broadband collision
detection timing
Description
of CSMA/CD
Broadband
collision detection
timing
Description
of CSMA/CD
CSMA
/ CD functioning
For BROADBAND BUS, delay is even longer
Figure on previous slide shows Dual Cable System
If Collision occurs, Stations cease Transmission
In Broadband Bus, Maximum Time to detect
collision is four times the end-to-end Propagation
Delay from an end of the cable to the Head-end.
CSMA / CD
Description
offunctioning
CSMA/CD
Important Rule followed
IEEE Standard also includes that
Frame should be long enough to allow collision
detection prior to the end of Transmission
If Shorter frames are used, collision detection
does not occur
CSMA / CD exhibits same performance as the
less efficient CSMA Protocol
Simpler collision detection with UTP/STP Star
Topology approach
In Star, collision detection is based on Logic
rather than sensing voltage magnitudes
For internal circulation of BSNL only
Description of CSMA/CD
CSMA / CD functioning
MAC Frame
Format
MAC Frame
OCTECTS
Preamb
le
Length
SFD
DA
Legend
SFD- Start Frame Delimiter
DA = Destination Address
SA
LLC
Data
Pad
FCS
MAC Frame
Preamble
7-Octet pattern of alternating 0s & 1s
Used by receiver to establish bit synchronization
MAC Frame
LLC (Logical Link Control) Data
Data unit supplied by LLC
Pad
Octets added to ensure that frame is long
enough for proper CD(Collision Detection)
operation
Frame Check Sequence(FCS)
32-bit Cyclic Redundancy Check based on
all fields except the preamble, SFD & FCS
MAC Frame
Destination Address(DA)
Specifies the station of destination
Unique physical address - 48 bit address
Group address
Global address
Source Address(SA)
Specifies station that sent frame
Length
Length of the LLC (Logical Link Control) Data field
Concept of Layering
Function of Layers
Application Layer
Highest layer in the Layer Structure
Used for Communication between Hosts
Protocols
SMTP(Simple Mail Transfer Protocol
FTP ( File Transfer Protocol)
Transport Layer
Encapsulation of Application Layer data
Protocols
Transmission Control Protocol(TCP)
User Datagram Protocol(UDP)
For internal circulation of BSNL only
Function of Layers
Transport Layer Contd .
Group of Methods & Protocols
within Layered Architecture of
Network Components responsible for
encapsulating application data blocks
into Data Units called Datagrams or
Segments
Suitable for transfer to Network
Infrastructure
Addressing Concepts
Outline of Presentation
Internet Protocol- Introduction
Internet Protocol- Header
Header Fields
Header Length ,
Version
Type of Service,
Total Length
Identification,
Fragmentation Offset
Flags,
Time To Live
Protocol,
Checksum
Source AddressDestination Address
Option
Time Stamp option
Padding
For internal circulation of BSNL only
Internet Protocol
UNRELIABLE
CONNECTION LESS
Flags 2 Bits
The flag field contains two flags
Low-order bit (MF) of the flags fields is used to
denote the last fragmented datagram when set
to zero
Intermediate (not-last) datagrams have the bit
set equal to 1 to denote more datagrams are to
follow
High-order bit (DF) is set by an originating host
to prevent fragmentation of the datagram
Flags 2 Bits
Timestamp Option
Outline of Presentation
Introduction
Transport Layer
Transport Layer Protocols
User Datagram Protocol
Transmission Control Protocol
Internet Control Message Protocol
Internet Group Management Protocol
Discussion and Conclusion
Application
Transport
Network
Datalink
Physical
For internal circulation of BSNL only
TRANSPORT LAYER
Two protocols are provided in this layer
TCP
UDP
Reliable
TCP provides
Functions of TCP
Multiplexing data from multiple applications
Testing received data for the integrity
Sequencing packets that may have arrived out of order
Acknowledging successful receipt of packets
Rate adaptive data flow control
Timing
Acknowledgement Numbers
Second Sequence Number(SSN) is called
Expected receive sequence number (AKN) also
called the Acknowledgement number
AKN is a 32 bit field
AKN acknowledges the receipt of m 1 octets
by stating the next expected SSN of m
Options
Option field permits the application program
to negotiate
Maximum TCP segment size able to receive
Flow Control
Flow control is the process of managing the rate
of data transmission between two nodes to
prevent a fast sender from outrunning a slow
receiver
Time-To-Live Exceeded
To prevent routing loops, the IP datagram
contains a time-to-live that is set by the originator
As each gateway processes the datagram, it
decrements Time-To-Live by one
When zero is detected, the gateway sends an
ICMP error message to the originator and
discards the datagram
IP Addressing
AGENDA
Introduction
Binary Form of IP Address
Dotted Decimal Notation
Classes of IP Address
Private Subnets
Subnetting
Subnet Mask
Supernetting
Logical Operations
Discussion & Conclusion
Introduction
Each host on the internet is assigned a 32-bit
integer address called its internet address or IP
address
Clever part of internet addressing is that the
integers are carefully chosen to make routing
efficient
Every host and router on the internet has an IP
address, which encodes its network number and
host number
Combination is unique: no two machines have the
same IP address
For internal circulation of BSNL only
Introduction
Address is coded to allow a variable allocation of bits to
specify network and host
IP address scheme is to break up the binary number into
pieces and represent each piece as a decimal number
10001100.10110011.11011100.1100100
140.179.220.200
Dotted Decimal Notation
Parts of IP Address
Every IP address consists of two parts
Network part
Host part
Class of the address and the subnet mask
determine which part belongs to the network
address and which part belongs to the host address
Dot as a separator and is called as period
Parts of IP Address
Address Classes
Encoding provides flexibility in assigning addresses to host
and allows a mix of network sizes on an internet
In particular, the three network classes are best suited to
the following conditions
Class
Networks
Hosts
A
126
16,777,214
B
16,384
65,534
C
2,097,152
254
Class D: Reserved for IP Multicasting
Class E: Reserved for future use
Class B - NNNNNNNN.NNNNNNNN.hhhhhhhh.hhhhhhhh
Class C- NNNNNNNN.NNNNNNNN.NNNNNNNN. hhhhhhhh
For internal circulation of BSNL only
Private Subnets
There are three IP network addresses reserved
for private networks.
The addresses are :
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
They can be used by anyone setting up internal
IP networks, such as a lab or home
Subnetting
Subnetting an IP Network can be done for a
variety of reasons, including organization, use of
different physical media (such as Ethernet,
FDDI, WAN, etc.),
Preservation of address space and security.
The most common reason is to control network
traffic
Subnet Masking
Applying a subnet mask to an IP address
allows you to identify the network and host
parts of the address
Network bits are represented by the 1s in
the mask
Host bits are represented by the 0s
Performing a bitwise logical AND operation
between the IP address and the subnet
mask results in the Network Address or
Number
For internal circulation of BSNL only
For example
Logical AND operation using our test IP address and
the default Class B subnet mask, we get :
10001100.10110011.11110000.11001000 140.179.240.200
Class B IP
Subnet Mask
Example
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11100000.00000000 255.255.224.0 Subnet Mask
Example
There are 6 (23-2) subnets available with this size
mask (remember that subnets with all 0's and all
1's are not allowed)
Each subnet has 8190 (213-2) hosts
Each subnet can have hosts assigned to any
address between the Subnet address and the
Broadcast address
This gives a total of 49,140 hosts for the entire
class B address subnetted this way
Notice that this is less than the 65,534 hosts an
unsubnetted class B address would have.
For internal circulation of BSNL only
Example
You can calculate the Subnet Address by
performing a bitwise logical AND operation
between the IP address and the subnet mask,
then setting all the host bits to 0s
Similarly, you can calculate the Broadcast Address
for a subnet by performing the same logical AND
between the IP address and the subnet mask,
then setting all the host bits to 1s
That is how these numbers are derived in the
example above
For internal circulation of BSNL only
Another Example
Say you are assigned a Class C network
number of 200.133.175.0
Utilize this network across multiple small groups
within an organization
You can do this by subnetting that network with a
subnet address
Break this network into 16 subnets of 14 hosts
each
16 Possible combinations
Subnet Network
bits
Number
Host
Addresses
Broadcast
Address
0000
200.133.175.0
.1 thru .14
200.133.175.15
0001
200.133.175.16
200.133.175.31
0010
200.133.175.32
200.133.175.47
0011
200.133.175.48
200.133.175.63
0100
200.133.175.64
200.133.175.79
0101
200.133.175.80
200.133.175.95
0110
200.133.175.96
200.133.175.111
0111
200.133.175.112
200.133.175.127
1000
200.133.175.128
200.133.175.143
16 Possible combinations
Subnet Network
bits
Number
Host
Addresses
Broadcast
Address
1001
200.133.175.144
200.133.175.159
1010
200.133.175.160
200.133.175.175
1011
200.133.175.176
200.133.175.191
1100
200.133.175.192
200.133.175.207
1101
200.133.175.208
200.133.175.223
1110
200.133.175.224
200.133.175.239
1111
200.133.175.240
200.133.175.255
Supernetting
Classful" system of allocating IP addresses can
be very wasteful
Anyone who could reasonably show a need for
more that 254 host addresses was given a Class
B address block of 65533 host addresses
Even more wasteful were companies and
organizations that were allocated Class A address
blocks which contain over 16 Million host
addresses
Supernetting
Only a tiny percentage of the allocated Class A
and Class B address space has ever been
actually assigned to a host computer on the
Internet
Under supernetting, the classful subnet masks are
extended so that a network address and subnet
mask could, for example, specify multiple Class C
subnets with one address
For example, If I needed about 1000 addresses, I
could supernet 4 Class C networks together
For internal circulation of BSNL only
Supernetting
Supernetting
Subnet 192.60.128.0 includes all the addresses
from 192.60.128.0 to 192.60.131.255
As you can see in the binary representation of
the subnet mask, the Network portion of the
address is 22 bits long, and the host portion is
10 bits long
Instead of spelling out the bits of the subnet
mask, it is simply listed as the number of 1s bits
that start the mask
Supernetting
Supernetting
If you look at the subnet mask in binary
11111111.11111111.11111100.00000000
you can easily see how this notation works
CIDR
# Subnets #Hosts
Nets * Hosts
255.192.0.0
/10
4194302
8388604
255.224.0.0
/11
2097150
12582900
255.240.0.0
/12
14
1048574
14680036
255.255.248.0
/13
30
524286
15728580
255.255.252.0
/14
62
262142
16252804
255.255.254.0
/15
126
131070
16514820
255.255.255.0
/16
254
65534
16645636
CIDR
# Subnets #Hosts
Nets * Hosts
255.255.128.0
/17
510
32766
16710660
10
255.255.192.0
/18
1022
16382
16742404
11
255.255.224.0
/19
2046
8190
16756740
12
255.255.240.0
/20
4094
4094
16760836
13
255.255.248.0
/21
8190
2046
16756740
14
255.255.252.0
/22
16382
1022
16742404
15
255.255.254.0
/23
32766
510
16710660
16
255.255.255.0
/24
65534
254
16645636
17
255.255.255.128
/25
131070
126
16514820
18
255.255.255.192
/26
262142
62
16252804
19
255.255.255.224
/27
524286
30
15728580
20
255.255.255.240
/28
1048574
14
14680036
21
255.255.255.248
/29
2097150
12582900
22
255.255.255.252
/30
4194302
8388604
Nets * Hosts
CIDR
# Subnets
#Hosts
Nets * Hosts
255.255.192.0
/18
16382
32764
255.255.192.0
/19
8190
49140
255.255.240.0
/20
14
4094
57316
255.255.248.0
/21
30
2046
61380
255.255.252.0
/22
62
1022
63364
255.255.254.0
/23
126
510
64260
255.255.255.0
/24
254
254
64516
CIDR
# Subnets #Hosts
Nets *
Hosts
255.255.192.128
/25
510
126
64260
10
255.255.192.192
/26
1022
62
63264
11
255.255.240.224
/27
2046
30
61380
12
255.255.248.240
/28
4094
14
57316
13
255.255.252.248
/29
8190
49140
14
255.255.254.252
/30
16382
32764
Subnet Mask
CIDR
#Hosts
Nets *
Hosts
/26
#
Subnet
s
2
255.255.255.192
62
124
255.255.255.224
/27
30
180
255.255.255.240
/28
14
14
196
255.255.255.248
/29
30
180
255.255.255.252
/30
62
124
Logical Operations
Brief review and explanation of the common
logical bitwise operations AND, OR, XOR
(Exclusive OR) and NOT
Logical operations are performed between
two data bits (except for NOT)
Bits can be either "1" or 0
These operations are essential to
performing digital math operations
Truth Tables
AND
I/P A
I/P B
O/P
Truth Tables
OR
I/P A
I/P B
O/P
Truth Tables
XOR
I/P A
I/P B
O/P
Truth Tables
NOT
I/P
O/P