Balachandran
To introduce the concepts, terminologies and technologies used in modern days data communication and computer networking.
To understand the concepts of data communications. To study the functions of different layers. To introduce IEEE standards employed in computer networking. To make the students to get familiarized with different protocols and network components.
Text book:
Behrouz A. Forouzan, Data communication and
Reference books
Networking: A Top-Down Approach Featuring the Internet, Pearson Education, 2003. Larry L.Peterson and Peter S. Davie, Computer Networks, Harcourt Asia Pvt. Ltd., Second Edition. Andrew S. Tanenbaum, Computer Networks, PHI, Fourth Edition, 2003. William Stallings, Data and Computer Communication, Sixth Edition, Pearson Education, 2000.
DATA COMMUNICATIONS DATA LINK LAYER NETWORK LAYER TRANSPORT LAYER APPLICATION LAYER
Components Direction of Data flow networks Components and Categories types of Connections Topologies Protocols and Standards ISO / OSI model Transmission Media Coaxial Cable Fiber Optics Line Coding Modems RS232 Interfacing sequences.
Why study data communications? Data communication exchange of data between two devices via a transmission medium Effectiveness depends on:
Delivery, Accuracy, Timeliness, Jitter
Numbers represented by binary equivalent Images bit patterns representing pixels Audio Video
10
Simplex unidirectional; one transmits, other receives Half-duplex each can transmit/receive; communication must alternate Full-duplex both can transmit/receive simultaneously
11
12
Performance affected by # users, type of medium, HW/SW Reliability measured by freq of failure, recovery time, catastrophe vulnerability Security protection from unauthorized access, viruses/worms
13
Point-to-point dedicated
Multipoint shared
14
Physical or logical arrangement 4 basic types: mesh, star, bus, ring May often see hybrid
15
Protocols:
Syntax: structure and format of the data Semantics: meaning of each section of bits
Timing
OSI (Open Systems Interconnect) Network architecture based on a proposal developed by ISO (International Standards Organization) to standardize the protocols used in various layers
20
Dedicated point-to-point links to central controller (hub) Controller acts as exchange Advantages Disadvantages
21
22
Twisted-pair Cable
23
24
UTP connector
26
Medium is the physical path between transmitter and receiver in a data transmission system Guided Medium: waves are guided along a solid medium path (twisted pair, coaxial cable, and optical fiber). Unguided medium: waves are propagated through the atmosphere and inner/outerspace (satellite, laser, and wireless transmissions).
Physical description:
Each wire with copper conductor Separately insulated wires Twisted together to reduce cross talk
otherwise often for home usage unshielded twisted pair (UTP). Must be shield from voltage lines
Application:
Common in building for digital signaling used at
speed of 10s Mb/s (CAT3) and 100Mb/s (CAT5) over 100s meters. Common for telephone interconnection at home and office buildings Less expensive medium; limited in distance, bandwidth, and data rate.
Category CAT 1
Usual application analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring Mainly used in the IBM Cabling System for token ring networks Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) Used in 16Mbps Token Ring Otherwise not used much 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal)
Widely installed for use in business and corporation Ethernet and other types of LANs. Consists of inter copper insulator covered by cladding material, and then covered by an outer jacket Physical Descriptions
Inner conductor is solid copper metal
Separated by insulating material Outer conductor is braided shielded (ground) Covered by sheath material
Applications:
TV distribution (cable tv); long distance telephone transmission;
Transmission characteristics:
Can transmit analog and digital signals Usable spectrum for analog signaling is about 400 Mhz Amplifier needed for analog signals for less than 1 Km and less
distance for higher frequency Repeater needed for digital signals every Km or less distance for higher data rates Operation of 100s Mb/s over 1 Km.
Physical Description:
Glass or plastic core of optical fiber = 2 to125 m Cladding is an insulating material Jacket is a protective cover Laser or light emitting diode provides transmission light source
Applications:
Long distance telecommunication Greater capacity; 2 Gb/s over 10s of Km Smaller size and lighter weight Lower attenuation (reduction in strength of signal) Electromagnetic isolation not effected by external electromagnetic environment. more privacy Greater repeater spacing fewer repeaters, reduces line regeneration cost
multimode fiber is optical fiber that is designed to carry multiple light rays or modes concurrently, each at a slightly different reflection angle within the optical fiber core. used for relatively short distances because the modes tend to disperse over longer lengths (this is called modal dispersion) . For longer distances, single mode fiber (sometimes called monomode) fiber is used. In single mode fiber a single ray or mode of light act as a carrier
0.85, 1.30, 1.55 bands Bands are 25000 to 30000 GHz wide Dispersion: Spreading out in length as they propagate- Hyperbolic cosine Solitons: pulses which can travel 1000s of KMs without any appreciable shape dispersion
Range 330 KHz 30300 KHz 300 KHz3 MHz 330 MHz 30300 MHz 300 MHz3 GHz 330 GHz 30300 GHz
Propagation Ground Ground Sky Sky Sky and line-of-sight Line-of-sight Line-of-sight Line-of-sight
Figure 7.19
43
44
passage of a dc component; may distort the signal and create output errors DC component is extra energy and is useless
45
Lack of synchronization
46
47
Simplest method; inexpensive Uses only one voltage level Polarity is usually assigned to binary 1; a 0 is represented by zero voltage
48
Potential problems:
DC component Lack of synchronization
49
Uses two voltage levels, one positive and one negative Alleviates DC component Variations
Nonreturn to zero (NRZ) Return to zero (RZ)
Manchester
Differential Manchester
50
NRZ-I (NRZ-Invert)
Uses an inversion at the middle of each bit interval for both synchronization and bit representation Negative-to-positive represents binary 1 Positive-to-negative represents binary 0 Achieves same level of synchronization with only 2 levels of amplitude
52
Inversion at middle of bit interval is used for synchronization Presence or absence of additional transition at beginning of interval identifies the bit Transition means binary 0; no transition means 1 Requires two signal changes to represent binary 0; only one to represent 1
53
RS-232 is the Serial interface on the PC Three major wires for the Serial interface:
Transmit - Pin 2
Receive - Pin 3 Ground - Pin 7 (25 pin connector) - Pin 5 (9 pin connector)
Tx Computer Device Rx Gnd Rx Gnd Tx
TD: transmitted data RD: received data DSR: data set ready
indicate whether DCE is powered on
55
ON when DTE wants to send data Used to turn on and off modems carrier signal in multi-
56
(e.g. terminal speed = 115.2kbps and line speed = 33.6kbps, in order to benefit from modems data compression protocol) without flow control, the buffer within modem will overflow sooner or later the receiving end takes time to process the data and thus cannot be always ready to receive
57
Note: Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.
Types of Error
Note: In a single-bit error, only one bit in the data unit has changed.
Single-bit error
Note: A burst error means that 2 or more bits in the data unit have changed.
Detection Redundancy
Parity Check Cyclic Redundancy Check (CRC) Checksum
Note: Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.
Redundancy
Detection methods
Even-parity concept
Note: In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd-parity).
Example 1
Suppose the sender wants to send the word world. In ASCII the five characters are coded as
1110111 1101111 1110010 1101100 1100100
Example 2
Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission.
11101110 11011110 11100100 11011000 11001001
The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
Example 3
Now suppose the word world in Example 1 is corrupted during transmission.
11111110 11011110 11101100 11011000 11001001
The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
Note: Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.
Two-dimensional parity
Example 4
Suppose the following block is sent:
10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 10100011 10001001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011 10001001 11011101 11100111 10101010
Note: In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block.
A polynomial
Standard polynomials
Name CRC-8 CRC-10 ITU-16 ITU-32 Polynomial x8 + x2 + x + 1 x10 + x9 + x5 + x4 + x 2 + 1 x16 + x12 + x5 + 1 x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1 Application ATM header ATM AAL HDLC LANs
Example 5
It is obvious that we cannot choose x (binary 10) or x2 + x (binary 110) as the polynomial because both are divisible by x. However, we can choose x + 1 (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose x2 + 1 (binary 101) because it is divisible by x + 1 (binary division).
Example 6
The CRC-12
x12 + x11 + x3 + x + 1
which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
Checksum
Note:
The sender follows these steps:
The unit is divided into k sections, each of n bits.
All sections are added using ones complement to get the sum.
The sum is complemented and becomes the checksum. The checksum is sent with the data.
Note:
The receiver follows these steps:
The unit is divided into k sections, each of n bits.
All sections are added using ones complement to get the sum.
The sum is complemented. If the result is zero, the data are accepted: otherwise, rejected.
Example 7
Suppose the following block of 16 bits is to be sent using a checksum of 8 bits.
10101001 00111001 The numbers are added using ones complement 10101001 00111001 -----------11100010 00011101 10101001 00111001 00011101
Sum Checksum
Example 8
Now suppose the receiver receives the pattern sent in Example 7 and there is no error.
10101001 00111001 00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error. 10101001 00111001 00011101 Sum 11111111
Complement
Example 9
Now suppose there is a burst error of length 5 that affects 4 bits.
10101111 11111001 00011101 When the receiver adds the three sections, it gets
10101111
11111001 00011101 Partial Sum Carry Sum Complement 1 11000101 1 11000110 00111001 the pattern is corrupted.
Correction
Retransmission
1 2 3 4
5
6 7
4
4 4
9
10 11
Hamming distance of a complete code: the minimum Hamming distance any of the two codewords in the code.
E.g 010101, 111000, 000111, 111111 Hamming_distance= ?
10.16
Data transmission in one direction only Both Transmitting and receiving host are always ready for operation Processing time can be ignored Infinite buffer size available Communication channels between IMPs never damages or loses frame No sequence Number, No acknowledgements Only event is FrameArrival arrival of undamaged frame
typedef enum {frme_arraival} event_type; #include protocol.h void sender1(void) { frame s; /*buffer for an outbound frame*/ packet buffer; /*buffer for an outbound packet*/ while (true) { from_network_layer(&buffer); s.info = buffer; to_physical_layer(&s); }
void receiver1(void) { frame r; /*buffers for the frames*/ event_type event; while (true) { wait_for_event(&event); from_physical_layer(&r); to_network_layer(&r.info);
Program to send the frame based on worst-case behavior Receiver providing feedback to the sender Sender sends one frame and then waits for an ACK before proceeding protocol works, all frames delivered in correct order requires little buffer space poor line utilization
typedef enum {frme_arraival} event_type; #include protocol.h void sender2(void) { frame s; /*buffer for an outbound frame*/ packet buffer; /*buffer for an outbound packet*/ while (true) { from_network_layer(&buffer); s.info = buffer; to_physical_layer(&s); wait_for_event(&event); }
void receiver1(void) { frame r,s; /*buffers for the frames*/ event_type event; while (true) { wait_for_event(&event); from_physical_layer(&r); to_network_layer(&r.info); to_physical_layer(&s); /*sending dummy frame to awaken sender */ }
Ambiguities with Stop-and-Wait [unnumbered frames] Time-out frame 0 ACK frame 1 frame 1 ACK frame 2
time
Time-out time
frame 1
ACK
frame 1
ACK
frame 2
In parts (a) and (b) transmitting station A acts the same way, but part (b) receiving station B accepts frame 1 twice.
ACKs introduce a new issue how long does receiver wait before sending ONLY an ACK frame.
We need an ACKTimer!!
Each outbound frame must contain a sequence number. With n bits for the sequence number field, the numbers range from 0 to maxseq. Sliding window :: sender has a window of frames and maintains a list of consecutive sequence numbers for frames that it is permitted to send without waiting for ACKs. receiver has a window that is a list of frame sequence numbers it is permitted to accept. Note sending and receiving windows do NOT have to be the same size. Windows can be fixed size or dynamically growing and shrinking.
Host is oblivious, message order at transport level is maintained. senders window :: frames sent but not yet ACKed. new packets from the Host cause the upper edge inside sender window to be incremented. ACKed frames from the receiver cause the lower edge inside window to be incremented. All frames in the senders window must be saved for possible retransmission and we need one timer per frame in the window.
If the maximum sender window size is B, the sender needs B buffers. If the sender window gets full (i.e., reaches its maximum window size, the protocol must shut off the Host (the network layer) until buffers become available. receiver window
Frames received with sequence numbers outside the receiver window are not accepted.
receiver window
Frames received with sequence numbers
outside the receiver window are not accepted. The receiver window size is normally static. The set of acceptable sequence numbers is rotated as acceptable frames arrive.
a receiver window size = 1 the protocol only accepts frames in order. There is referred to as Go Back N.
1. ACK sequence number indicates the last frame successfully received. 2. ACK sequence number indicates the next frame the receiver expects to receive. Both of these can be strictly individual ACKs or represent cumulative ACKing. Cumulative ACKing is the most common technique.
A sliding window of size 1, with a 3-bit sequence number. (a) Initially. (b) After the first frame has been sent. (c) After the first frame has been received. (d) After the first acknowledgement has been received.
(b) Abnormal case. The notation is (seq, ack, packet number). An asterisk indicates where a network layer accepts a packet.
Go Back N
Go-Back-4:
fr 0 fr 1 fr 2 fr 3 fr 4
time
A C K 1
A C K 2
A C K 3
A C K 5
A C K 6
A C K7
A C K 8
A C K 9
Go-Back-7:
fr 0 fr 1 fr 2 fr 3 fr 4 fr 5 fr 1 fr 2 fr 3 fr 4 fr 5 fr 6 fr 7 fr 0
time
B
A C K 1 N A K 1 Out-of-sequence frames A C K 2 A C K 3 A C K 4 A C K 5 A C K 6 A C K 7
error
Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 5.17
fr 0
fr 1
fr 2
fr 3
fr 4
fr 5
fr 6
fr 2
fr 7
fr 8
fr 9
fr 10
fr 11
fr 12
time
A C K 1
A C K 2
error
N A K 2
A C K 2
A C K 2
A C K 2
A C K 7
A C K 8
A C K 9
A C K 1 0
A C K 1 1
A C K 1 2
Figure 5.21
(SDLC) Advanced Data communication Control Procedure [ ANSIs]- (ADCCP) Higher Level Data Link Control Protocol [OSIs](HDLC) Link Access procedure [ X.25] - LAP
HDLC
Configurations and Transfer Modes Frames Frame Format Examples
Data Transparency
HDLC frame
I-frame
UP
UI UA RD DISC DM RIM SIM RSET
Unnumbered poll
Unnumbered information Unnumbered acknowledgment Request disconnect Disconnect Disconnect mode Request information mode Set initialization mode Reset
XID
FRMR
Exchange ID
Frame reject
D SS SA A P P Upperlayer data
Control
Address
Control
FCS
MAC header
MAC payload
FCS
Most popular packet-switched LAN technology Bandwidths: 10Mbps, 100Mbps, 1Gbps Max bus length: 2500m
500m segments with 4 repeaters
CS 640
137
communicate
Network layer packets are transmitted over an Ethernet by encapsulating Frame Format
64 Preamble 48 Dest addr
CS 640
48 Src addr
16 Type Body
32 CRC
138
Physical layer configurations are specified in three parts Data rate (10, 100, 1,000)
10, 100, 1,000Mbps
Cabling (2, 5, T, F, S, L)
5 - Thick coax (original Ethernet cabling) F Optical fiber S Short wave laser over multimode fiber L Long wave laser over single mode fiber
CS 640
139
Developed in late 60s by Norm Abramson at Univ. of Hawaii (!!) for use with packet radio systems
Any station can send data at any time Receiver sends an ACK for data Timeout for ACK signals that there was a collision What happens if timeout is poorly timed? If there is a collision, sender will resend data after a random backoff
Utilization (fraction of transmitted frames avoiding collision for N nodes) was pretty bad
Max utilization = 18%
CS 640
140
In Aloha, decisions to transmit are made without paying attention to what other nodes might be doing Ethernet uses CSMA/CD listens to line before/during sending If line is idle (no carrier sensed)
send packet immediately upper bound message size of 1500 bytes must wait 9.6us between back-to-back frames wait until idle and transmit packet immediately called 1-persistent sending Stop sending and jam signal Try again later
CS 640
141
Send
attempts == 16
CS 640 142
Collisions are caused when two adaptors transmit at the same time (adaptors sense collision based on voltage differences)
Both found line to be idle Both had been waiting to for a busy line to become idle
A starts at time 0
CS 640
143
There must be a mechanism to insure retransmission on collision As message reaches B at time T Bs message reaches A at time 2T So, A must still be transmitting at 2T
Send jamming signal after collision is detected to insure all hosts see collision
48 bit signal
This relates to maximum distance of 2500m between hosts At 10Mbps it takes 0.1us to transmit one bit so 512 bits (64B) take 51.2us to send So, Ethernet frames must be at least 64B long 14B header, 46B data, 4B CRC Padding is used if data is less than 46B
CS 640
144
time = 0
time = T
time = 2T
CS 640
145
If a collision is detected, delay and try again Delay time is selected using binary exponential backoff
1st time: choose K from {0,1} then delay = K * 51.2us 2nd time: choose K from {0,1,2,3} then delay = K * 51.2us nth time: delay = K x 51.2us, for K=0..2n 1 Note max value for k = 1023 give up after several tries (usually 16) Report transmit error to host
If delay were not random, then there is a chance that sources would retransmit in lock step Why not just choose from small set for K
This works fine for a small number of hosts Large number of nodes would result in more collisions
CS 640
146
Senders handle all access control Receivers simply read frames with acceptable address
Address to host
Address to broadcast Address to multicast to which host belongs
CS 640
147
Compatible with lower speeds Uses standard framing and CSMA/CD algorithm Distances are severely limited Typically used for backbones and inter-router connectivity Becoming cost competitive How much of this bandwidth is realizable?
CS 640
148
a carrier-sense, multiple access with collision detection (CSMA/CD) protocol for a bus topology
Token Bus protocol for a token-passing access method on a bus topology The topology of the computer network can include groups of workstations connected by long trunk cables token bus is used in some manufacturing environments, Ethernet and token ring standards have become more prominent in the office environment.
Token Ring protocol which, like Token Bus, is another token-passing access method, but for a ring topology
TOKEN RING NETWORK LIKE IEEE 802.5 TOKEN: A SPECIAL SEQUENCE OF BITS TOKEN CIRCULATES AROUND THE RING A STATION REMOVES THE TOKEN FROM RING BEFORE TRANSMISSION AFTER TRANSMISSION, THE STATION RETURNS THE TOKEN TO THE RING COLLISIONS ARE PREVENTED AS THERE IS ONLY ONE TOKEN IN THE RING
DUAL-COUNTER-ROTATING TOKEN RING ARCHITECTURE ONE RING IS PRIMARY AND THE OTHER SECONDARY UP TO 500 STATIONS WITH A MAXIMUM DISTANCE OF 2 KM BETWEEN ANY PAIR OF STATIONS FOR MULTIMODE FIBER WITH SINGLE-MODE FIBER THE DISTANCE CAN BE UP TO 40 KM MAXIMUM RING LENGTH IS 100 KM (TOTAL FIBER LENGTH IS 200 KM FOR TWO RINGS) USES 4B/5B ENCODING
FEATURES
TRANSMISSION RATE DATA RATE SIGNAL ENCODING MAXIMUM COVERAGE MAXIMUM NODES MAXIMUM DISTANCE BETWEEN NODES
FDDI
125 MBAUD 100 MBPS 4B/5B (80% EFFICIENT) 100 KM 500 2 KM (MULTIMODE FIBER) 40 KM (SINGLEMODE FIBER)
ETHERNET
20 MBAUD 10 MBPS MANCHESTER (50% EFFICIENT) 2.5 KM 1024 2.5 KM
TOKEN RING
8 & 32 MBAUD 4 & 16 MBPS DIFFERENTIAL MANCHESTER (50% EFFICIENT) CONFIGURATION DEPENDENT 250 300 M (RECOMMENDED 100 M)
154
802.11 is primarily concerned with the lower layers of the OSI model. Data Link Layer
Logical Link Control (LLC).
Physical Layer
Physical Layer Convergence
Well-supported, stable, and cost effective, but runs in the 2.4 GHz range that makes it prone to interference from other devices (microwave ovens, cordless phones, etc) and also has security disadvantages. Limits the number of access points in range of each other to three. Has 11 channels, with 3 non-overlapping, and supports rates from 1 to 11 Mbps, but realistically about 4-5 Mbps max. Uses direct-sequence spread-spectrum technology.
Extension of 802.11b, with the same disadvantages (security and interference). Has a shorter range than 802.11b. Is backwards compatible with 802.11b so it allows or a smooth transition from 11b to 11g. Flexible because multiple channels can be combined for faster throughput, but limited to one access point. Runs at 54 Mbps, but realistically about 20-25 Mbps and about 14 Mbps when b associated Uses frequency division multiplexing
Completely different from 11b and 11g. Flexible because multiple channels can be combined for faster throughput and more access points can be co-located. Shorter range than 11b and 11g. Runs in the 5 GHz range, so less interference from other devices. Has 12 channels, 8 non-overlapping, and supports rates from 6 to 54 Mbps, but realistically about 27 Mbps max Uses frequency division multiplexing
Freedom You can work from any location that you can get a signal. Setup Cost No cabling required. Flexibility Quick and easy to setup in temp or permanent space. Scaleable Can be expanded with growth. Mobile Access Can access the network on the move.
Bridge
uses. Trunks and access links organized in DS (digital signal) hierarchy Problem: rates are not multiples of each other.
In the 1980s Bellcore developed the Synchronous Optical Network (SONET) standard. Previous efforts include: ISDN and BISDN.
Networks: SONET
163
SONET:: encodes bit streams into optical signals propagated over optical fiber. SONET defines a technology for carrying many signals of different capacities through a synchronous, flexible, optical hierarchy. A bit-way implementation providing end-to-end transport of bit streams. All clocks in the network are locked to a common master clock so that simple TDM can be used. Multiplexing done by byte interleaving. SONET is backward compatible to DS-1 and E-1 and forward compatible to ATM cells. Demultiplexing is easy.
SONET topology can be a mesh, but most often it is a dual ring. Standard component of SONET ring is an ADM (Add/Drop Multiplexer)
Drop one incoming multiplexed stream and
replace it with another stream. Used to make up bi-directional line switching rings.
Networks: SONET
165
a
ADM
ADM
ADM
ADM
Figure 4.12
Networks: SONET
SONET Ring
Networks: SONET
(a)
STS PTE LTE
SONET Architecture
STS PTE
SONET Terminal
STE
STE
STE
LTE
Mux
reg
Section
reg
STS Line STS-1 Path
reg
Section
Mux
SONET Terminal
(b)
STE: Section Terminating Equipment, e.g. a repeater LTE: Line Terminating Equipment, e.g. a STS-1 to STS-3 multiplexer PTE: Path Terminating Equipment, e.g. an STS-1 multiplexer
path line
section optical line section optical
path
section
optical
section optical
section optical
line
section
optical
Learning bridge
Loop problem
Internetwork
Links in an internetwork
Dotted-decimal notation
Note: The binary, decimal, and hexadecimal number systems are reviewed in Appendix B.
Example 1
Change the following IP addresses from binary notation to dotted-decimal notation. a. 10000001 00001011 00001011 11101111
b.
Solution
We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation: a. 129.11.11.239 b. 249.155.251.15
Example 2
Change the following IP addresses from dotted-decimal notation to binary notation. a. 111.56.45.78
b.
75.45.34.78
Solution
We replace each decimal number with its binary equivalent (see Appendix B):
a. b.
Example 3
Find the class of each address: a. b. 00000001 00001011 00001011 11101111 11110011 10011011 11111011 00001111
Solution
See the procedure in Figure 19.11. a. b. The first bit is 0; this is a class A address. The first 4 bits are 1s; this is a class E address.
Example 4
Find the class of each address: a. b. c. 227.12.14.87 252.5.15.111 134.11.78.56
Solution
a. b. c. The first byte is 227 (between 224 and 239); the class is D. The first byte is 252 (between 240 and 255); the class is E. The first byte is 134 (between 128 and 191); the class is B.
Blocks in class A
Blocks in class B
Blocks in class C
Network address
First Octet
# NETWORK S
256 65,536 16,777,216 N/A N/A
5-4
The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Link State Routing Hierarchical Routing Broadcast Routing Multicast Routing Routing for Mobile Hosts Routing in Ad Hoc Networks
The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working node.
(a) A subnet. (b) Input from A, I, H, K, and the new routing table for J.
Each router must do the following: 1. Discover its neighbors, learn their network address. 2. Measure the delay or cost to each of its neighbors. 3. Construct a packet telling all it has just learned. 4. Send this packet to all other routers. 5. Compute the shortest path to every other router.
A subnet in which the East and West parts are connected by two lines.
(a) A subnet. (b) The link state packets for this subnet.
The packet buffer for router B in the previous slide (Fig. 5-13).