Petikan terjemahan Fi-Zilalil Quran karangan Syed Qutb ayat 14, Surah Az Zaariyat: Dengan nama Allah yang Maha Penyayang dan Maha Pengasih.
Demi kekuatan penabur-penabur yang menabur dengan
sebaik-baik taburan. (Az Zaariyat)
Dan demi kekuatan pembawa-pembawa muatan. (Al-Haamilat)
Dan demi kekuatan yang berlari dengan selesa. (Al-Jaariyat)
Dan demi kekuatan pembahagi-pembahagi urusan. (AlMuqassimat)
Contents
Introduction
IP Addressing : IPv4
IP Addressing : IPv6
Routing
Introduction
Network layer is responsible for the
source-to-destination delivery of
packet.
Network layer need the addressing
system to distinguish the source and
destination.
Provide routing mechanism.
Logical Addressing
At the network layer, a global addressing system
that uniquely identifies every host and router is
necessary for delivery of a packet from network
to network.
The Internet address (or IP address) is 32 bits
(for IPv4) that uniquely and universally defines a
host or router on the internet.
The portion of the IP address that identifies the
network is called the netid.
The portion that identifies the host or router on
the network is called the hostid.
Maximum
class.
Class A
(224 2)
Class B
2)
Class C
Subnet mask
A subnet is a logical grouping of
connected network devices. Nodes
on a subnet tend to be located in
close physical proximity to each
other on a LAN.
Clue to which network Id it belongs.
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
Public vs Private IP
Public- considered public if the IP
number is valid and falls outside any
of the IP address ranges reserved for
private uses by Internet standards
groups.
Private - IP address ranges reserved
for private uses by Internet
standards groups.
private networks
Static VS Dynamic IP
Static = constant IP address
Dynamic = Computer is assigned a
new IP address each time the
customer logs on, they are cost
effective and there is automatic
network configuration (the less
human intervention with network
configuration the better).
NAT
Network Address Translation.
The process where a network device,
usually a firewall, assigns a public
address to a computer (or group of
computers) inside a private network.
The main use of NAT is to limit the
number of public IP addresses an
organization or company must use, for
both economy and security purposes.
A NAT implementation
Subnet
Subnetting divides one large network into
several smaller ones.
Subnetting adds an intermediate level of
hierarchy in IP addressing.
Default masking is a process that extracts the
network address from an IP address.
Subnet masking is a process that extracts the
subnetwork address from an IP address
IPv6
The working standard for the IPv6 protocol
was published by the Internet Engineering
Task Force (IETF) in 1998.
The IETF specification for IPv6 is RFC 2460.
The explosive growth in mobile devices
including
mobile
phones,
notebook
computers, and wireless handheld devices
has created a need for additional blocks of IP
addresses.
IPv4 currently supports a maximum of
approximately
4.3
billion
unique
IP
addresses.
IPv6
IPv6 addresses are 16 bytes (128
bits) long rather than four bytes (32
bits).
IPv6 supports a theoretical maximum
of 2128 addresses
(340,282,366,920,938,463,463,374,6
07,431,768,211,456 to be exact!).
IPv6
IPv6 and IPv4 share a similar architecture.
The majority of transport layer protocols that function
with IPv4 will also function with the IPv6 protocol.
Most application layer protocols are expected to be
interoperable with IPv6 as well, with the notable
exception of File Transfer Protocol (FTP). FTP uses
embedded network layer addresses to facilitate data
transmission.
An IPv6 address consists of eight groups of four
hexadecimal digits. If a group consists of four zeros,
the notation can be shortened using a colon to
replace the zeros.
IPv6
For example, the IPv4 address
"192.168.100.32" may appear in IPv6
notation as
"0000:0000:0000:0000:0000:0000:C
0A8:6420" or "::C0A8:6420".
Layer 3 Devices
Routers
Interconnect network segments or entire
networks.
Make logical decisions based on IP
addresses.
Determines best path for data on an
internetwork.
Routing
Static or dynamic
Distance-vector and link-state protocols
Interior and exterior
Routing Algorithms
Static routing
Calculated beforehand, offline
Default routing
If I dont recognize the destination, just send the
packet to Router X
e0
Host A
172.16.10.2
s0
172.16.20.2
172.16.40.1
Router B
s0
s1
172.16.40.2
s0
Router C
e0
e0
172.16.30.1
172.16.50.1
Host B
Host C
172.16.30.2
172.16.50.2
28
Router A
e0
s0
172.16.20.2
172.16.40.1
Router B
s0
s1
e0
172.16.30.1
Host A
172.16.10.2
172.16.40.2
s0
Router C
e0
172.16.50.1
Host B
Host C
172.16.30.2
172.16.50.2
Distance-Vector Routing
Router maintains a routing table that
lists known networks, direction
(vector) to each network, and the
distance to each network
Router
periodically
(every
30
seconds, for example) transmits the
routing table via a broadcast packet
that reaches all other routers on the
local segments
Router updates the routing table, if
necessary,
based
on
received
Link-State Routing
Routers send updates only when
theres a change
Router that detects change creates a
link-state advertisement (LSA) and
sends it to neighbors
Neighbors propagate the change to
their neighbors
Routers update their topological
database if necessary
Dynamic IP Routing
Protocols
Distance-Vector
Routing Information Protocol (RIP) Version
1 and 2
Interior Gateway Routing Protocol (IGRP)
Enhanced IGRP
Border Gateway Protocol (BGP)
Link-State
Open Shortest Path First (OSPF)
Intermediate System-to-Intermediate
System (IS-IS)
Conclusion
Network layer use connectionless
protocol called IP with the classes
and classless addressing schema.
There is IPv4 and IPv6.
It also do routing to the best path in
network by using routers.
Routing Protocols are used by routers
to learn how to reach other networks
Conclusion
Available routing Protocol include
Distance Vector
RIP Routing Information Protocol - IP
IGRP Interior Gateway Routing protocol
EIGRP Enhanced Interior Gateway Routing Protocol
Link State
OSPF Open Shortest Path First
IS-IS Intermediate System to Intermediate System
Path Vector
BGP Border Gateway Protocol