Anda di halaman 1dari 34

Wireless Theory

Petikan terjemahan Fi-Zilalil Quran karangan Syed Qutb ayat 14, Surah Az Zaariyat: Dengan nama Allah yang Maha Penyayang dan Maha Pengasih.

Demi kekuatan penabur-penabur yang menabur dengan
sebaik-baik taburan. (Az Zaariyat)
Dan demi kekuatan pembawa-pembawa muatan. (Al-Haamilat)
Dan demi kekuatan yang berlari dengan selesa. (Al-Jaariyat)
Dan demi kekuatan pembahagi-pembahagi urusan. (AlMuqassimat)

Ten minutes Quiz 1


1. Draw and name 4 physical topologies
use in a computer network ?
8 marks
2. Name two network technologies for
each selected physical topology
above.
2 marks

BIW 10103 Introduction to Web Technology


Firkhan Ali Bin Hamid Ali
FSKTM, UTHM
http://groups.yahoo.com/group/biw10103

Chapter 3: ROUTING (4 HRS)

Contents
Introduction
IP Addressing : IPv4
IP Addressing : IPv6
Routing

Introduction
Network layer is responsible for the
source-to-destination delivery of
packet.
Network layer need the addressing
system to distinguish the source and
destination.
Provide routing mechanism.

Logical Addressing
At the network layer, a global addressing system
that uniquely identifies every host and router is
necessary for delivery of a packet from network
to network.
The Internet address (or IP address) is 32 bits
(for IPv4) that uniquely and universally defines a
host or router on the internet.
The portion of the IP address that identifies the
network is called the netid.
The portion that identifies the host or router on
the network is called the hostid.

Logical Addressing IPv4


The address space of IPv4 is
232 or 4,294,967,296.
Dotted-decimal
notation
and
binary notation for an IPv4
address

Logical Addressing IPv4 2


An IP address defines a devices
connection to a network.
There are five classes of IP
addresses. Classes A, B, and C differ
in the number of hosts allowed per
network. Class D is for multicasting,
and class E is reserved.
The class of a network is easily
determined by examination of the
first byte.

The first address in each network


is reserved for the network
address and the last address is
reserved
for
the
broadcast
address.

Maximum
class.
Class A
(224 2)
Class B
2)
Class C

number of hosts vary for each

has 16,777,214 available hosts


has 65,534 available hosts (216
has 254 available hosts (28 2)

Subnet mask
A subnet is a logical grouping of
connected network devices. Nodes
on a subnet tend to be located in
close physical proximity to each
other on a LAN.
Clue to which network Id it belongs.
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0

Public vs Private IP
Public- considered public if the IP
number is valid and falls outside any
of the IP address ranges reserved for
private uses by Internet standards
groups.
Private - IP address ranges reserved
for private uses by Internet
standards groups.

private networks

Static VS Dynamic IP
Static = constant IP address
Dynamic = Computer is assigned a
new IP address each time the
customer logs on, they are cost
effective and there is automatic
network configuration (the less
human intervention with network
configuration the better).

NAT
Network Address Translation.
The process where a network device,
usually a firewall, assigns a public
address to a computer (or group of
computers) inside a private network.
The main use of NAT is to limit the
number of public IP addresses an
organization or company must use, for
both economy and security purposes.

A NAT implementation

Subnet
Subnetting divides one large network into
several smaller ones.
Subnetting adds an intermediate level of
hierarchy in IP addressing.
Default masking is a process that extracts the
network address from an IP address.
Subnet masking is a process that extracts the
subnetwork address from an IP address

IPv6
The working standard for the IPv6 protocol
was published by the Internet Engineering
Task Force (IETF) in 1998.
The IETF specification for IPv6 is RFC 2460.
The explosive growth in mobile devices
including
mobile
phones,
notebook
computers, and wireless handheld devices
has created a need for additional blocks of IP
addresses.
IPv4 currently supports a maximum of
approximately
4.3
billion
unique
IP
addresses.

IPv6
IPv6 addresses are 16 bytes (128
bits) long rather than four bytes (32
bits).
IPv6 supports a theoretical maximum
of 2128 addresses
(340,282,366,920,938,463,463,374,6
07,431,768,211,456 to be exact!).

IPv6
IPv6 and IPv4 share a similar architecture.
The majority of transport layer protocols that function
with IPv4 will also function with the IPv6 protocol.
Most application layer protocols are expected to be
interoperable with IPv6 as well, with the notable
exception of File Transfer Protocol (FTP). FTP uses
embedded network layer addresses to facilitate data
transmission.
An IPv6 address consists of eight groups of four
hexadecimal digits. If a group consists of four zeros,
the notation can be shortened using a colon to
replace the zeros.

IPv6
For example, the IPv4 address
"192.168.100.32" may appear in IPv6
notation as
"0000:0000:0000:0000:0000:0000:C
0A8:6420" or "::C0A8:6420".

Logical Addressing IPv6


IPv6 128-bit address space, revised
header format, new options, an
allowance for extension, support for
resource allocation and increased
security measured.
Strategies to handle the transition of
IPv4 to IPv6 dual stack, tunneling
and header translation.

Layer 3 Devices
Routers
Interconnect network segments or entire
networks.
Make logical decisions based on IP
addresses.
Determines best path for data on an
internetwork.

A.K.A Layer 3 Switching

Routing
Static or dynamic
Distance-vector and link-state protocols
Interior and exterior

Interior Versus Exterior Routing


Protocols
Interior routing protocols are used
within an autonomous system
Exterior routing protocols are used
between autonomous systems

Routing Algorithms
Static routing
Calculated beforehand, offline

Default routing
If I dont recognize the destination, just send the
packet to Router X

Dynamic routing protocol


Distance-vector algorithms
Link-state algorithms

Static Routing Example


172.16.20.1
Router A

e0

Host A
172.16.10.2

s0

172.16.20.2

172.16.40.1

Router B
s0

s1

172.16.40.2

s0

Router C

e0

e0

172.16.30.1

172.16.50.1

Host B

Host C

172.16.30.2

172.16.50.2

RouterA(config)#ip route 172.16.50.0 255.255.255.0


172.16.20.2
Send packets for subnet 50 to 172.16.20.2 (Router B)

28

Default Routing Example


172.16.20.1

Router A

e0

s0

172.16.20.2

172.16.40.1

Router B
s0

s1
e0

172.16.30.1

Host A
172.16.10.2

172.16.40.2

s0

Router C

e0
172.16.50.1

Host B

Host C

172.16.30.2

172.16.50.2

RouterA(config)#ip route 0.0.0.0 0.0.0.0 172.16.20.2


If its not local, send it to 172.16.20.2 (Router B)

Distance-Vector Routing
Router maintains a routing table that
lists known networks, direction
(vector) to each network, and the
distance to each network
Router
periodically
(every
30
seconds, for example) transmits the
routing table via a broadcast packet
that reaches all other routers on the
local segments
Router updates the routing table, if
necessary,
based
on
received

Link-State Routing
Routers send updates only when
theres a change
Router that detects change creates a
link-state advertisement (LSA) and
sends it to neighbors
Neighbors propagate the change to
their neighbors
Routers update their topological
database if necessary

Dynamic IP Routing
Protocols
Distance-Vector
Routing Information Protocol (RIP) Version
1 and 2
Interior Gateway Routing Protocol (IGRP)
Enhanced IGRP
Border Gateway Protocol (BGP)
Link-State
Open Shortest Path First (OSPF)
Intermediate System-to-Intermediate
System (IS-IS)

Conclusion
Network layer use connectionless
protocol called IP with the classes
and classless addressing schema.
There is IPv4 and IPv6.
It also do routing to the best path in
network by using routers.
Routing Protocols are used by routers
to learn how to reach other networks

Conclusion
Available routing Protocol include
Distance Vector
RIP Routing Information Protocol - IP
IGRP Interior Gateway Routing protocol
EIGRP Enhanced Interior Gateway Routing Protocol

Link State
OSPF Open Shortest Path First
IS-IS Intermediate System to Intermediate System

Path Vector
BGP Border Gateway Protocol

Anda mungkin juga menyukai