Você está na página 1de 243

Networking Basics

2013 for APAC Training

GTSD Team

Outline

OSI 7 Layer
Networking devices
MAC address and IP address
Network Configuration in Windows
Broadband and ADSL
Basic Terminology
Wi-Fi
802.11 Standard
TCP/IP Protocols
UDP
NAT and UPnP

OSI 7 Layer
1)
2)
3)
4)
5)
6)

Internetworking
OSI 7 Layer Reference Model
Transport Layer
Network Layer
Data Link Layer
Physical layer

Internetworking
A reference model addresses all the process required for effective
communication and divide these process into logical groupings called
layers.

Open Systems Interconnection (OSI) reference model was created to


help vendors create interoperable network devices and software in the
form of protocols so that different vendor networks could work with
each other. Its not a physical model.
Advantages of OSI layered model includes but are not limited to:
Allows multiple-vendor development through standardization of
network components
Allows various types of network hardware and software to
communicate
Prevents changes in one layer from affecting other layers

OSI 7 Layer Reference Model


OSI (Open Systems Interconnection)
Application Layer
File , print, message, database
and application service
Presentation Layer
Data encryption, compression
and translation service
Session Layer
Dialog control
Transport Layer
End-to-end connection
Network Layer
Routing
Data Link Layer
Framing
Physical Layer
Physical topology

Transport Layer
Transport Layer divides message into small fragment (packet)
to fits lower layer protocol
Packets are reassembled at target base upon sequence
number
TCP (Transmission Control Protocol)
Connection-Oriented, Reliable
UDP (User Datagram Protocol)
Connectionless (not connection-oriented), Unreliable
Data Transmission Unit: Datagram

Network Layer

Allow inter-network communication


Mapping network address to physical address (MAC)
u can access it from CMD from windows
IP (Internet Protocol)IPtheconfig
default IP address for Asus router is 192.168.1.1
Routing and Layer 3 Switching
Data Transmission Unit: Packet

Data Link Layer

Provide node-to-node communication on a single local


network
Address mechanism for correct delivery of data to node
ipconfig/r mac address is the physical address in mac
(MAC address: Media Access Control) address
they use ":" (colon) as the saparator
Flow control and error detection
Transfer message from upper layer into bits for physical
layer
Ethernet (IEEE 802.3) , PPP (Point-to-Point Protocol)
Network Interface Card (NIC)
Bridging and Switching
Data Transmission Unit: Frame

Physical layer
Cable(Ethernet)
1) The kind of cable
2) Bps and bps Bps is Byte per sec and bps is bit per sec
3) Ethernet Naming Principle

example: 384 kbps (kilo bit per sec) = 48 Byte Per Sec
how u got the answer is 384/8

The kind of cable UTP, Coaxial & Fiber


Coaxial usually used by Fasnet

Coaxial cable
UTP (Unshielded Twisted Pair)

RJ-45 Cable

UTP is the cable

Fiber optic cable


RJ-45 is the head

RJ-45
Cat 5 cable
UTP Cable is a straight cable

RJ-45

568B and 568A


568B
Most common wiring
scheme

568A
There is also 568A wiring,
which is not as common

Overview of Cat 5

Crossover Cable
Sometimes you will use crossover cable, it's usually used to
connect same type of devices. A crossover cable can be used
to:
1) Connect 2 computers directly.
2) Connect a router's LAN port to a switch/hub's normal port.
(normally used for expanding network)
3) Connect 2 switches/hubs by using normal port in both
switches/hubs.

Crossover Cable
Connect one end 568A and one end 568B and you have a
crossover cable

Crossover Cable
Crossover Cable

Straight through Cable


You usually use straight cable to connect different type of
devices. This type of cable will be used most of the time
and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's
LAN port.
4) Connect a router's LAN port to a switch/hub's uplink
port. (normally used for expanding network)
5) Connect 2 switches/hubs with one of the switch/hub
using an uplink port and the other one using normal port.

Straight Through Cable


When connecting computers together with a hub or switch,
Straight Through Cable are used.

The kind of cable InfiniBand Cable


InfiniBand can transfer up to 120

InfiniBand is a switched fabric communications link used


in high-performance computing and enterprise data centers.

An industry-standard specification.
Used to interconnect servers, communications infrastructure
equipment, storage and embedded systems.
Data transfers up to 120 gigabits per second.

1X Infiniband

4X Infiniband

12X Infiniband

The panel of an InfiniBand


switch for 4X Infiniband

The kind of cable InfiniBand Cable


Effective theoretical throughput in different configurations (the actual
data rate, not the signaling rate)
SDR

DDR

QDR

FDR

EDR

1X

2 Gbit/s

4 Gbit/s

8 Gbit/s

14 Gbit/s

25 Gbit/s

4X

8 Gbit/s

16 Gbit/s

32 Gbit/s

56 Gbit/s

100 Gbit/s

12X

24 Gbit/s

48 Gbit/s

96 Gbit/s

168 Gbit/s

300 Gbit/s

SDR - Single Data Rate ,DDR - Double Data Rate, QDR - Quad Data Rate
FDR - Fourteen Data Rate, EDR - Enhanced Data Rate
Installation notice:

Ethernet Naming Principle


100 Base T
1st = Speed
2nd =
Transmission
3rd = Medium

10 = 10Mbps
100 = 100Mbps
1000= 1000Mbpa
Base = Baseband
Broad = Broadband
T/TX = Twisted Pair
F = Fiber Optic
2 = Thin Coaxial
3 = Thick Coaxial

Note: TX means that uses two pairs (each UTP cable has totally
four pairs of cooper line) but requires CAT-5 cable

Ethernet Cabling Twisted Pair


CAT x is a term used to describe CAT 5, CAT 5E and CAT 6. CAT
x cables have 8 conductors grouped as four twisted pairs
(UTP) to carry high speeds digital signals (100/1000 Mbps)
over a long distance of 100 meters. Some things common to
CAT 5, CAT 5E and CAT 6 cables are - they all have four twisted
pairs and they all use the same color wires.
In 1000Mbps (Gigabit Ethernet) networks, its recommended
to use CAT 6 cable to reach best performance

Overview
Comparison between OSI and TCP/IP layer

Process

TCP UDP
IP
Network Interface
Data Link

802.3

ICMP, ARP & RARP

Overview
TCP/IP is a combination of two individual protocols - TCP and IP.
Usually, they represent the entire protocol suite.
TCP is like u shake hands, UDP u don't shake hands u only say hello

TCP/UDP is at Layer 4

IP is at Layer 3
Use for identification and route decision
Ethernet is at Layer 2

Overview
TCP

UDP

ICMP

IP
ARP

Ethernet

FDDI

Token Ring

RARP

Overview
Application list of
network, transport and
application layer
Network Interface
Data Link

Network Interface
Data Link

Network Interface
Data Link

What is a Protocol?
Protocol is a controlled
sequence of messages that
is exchanged between two
or more systems to
accomplish a given task.
Protocol specifications
define this sequence
together with the format or
layout of the messages that
are exchanged.

Protocol function:
Identifies errors
Applies compression
techniques
Decides on
How to announce sent
data
How to announce
received data
How to address data
How to data is to be sent

Networking devices
1)
2)
3)
4)
5)
6)

Repeater
Hub
Bridge
Layer 2 Switch
Router
Gateway

Networking devices
Go to Internet by using networking devices
(Router, Switch etc.).

Cable

Networking devices
Seven categories of networking devices

Repeater
Operates at Layer 1, the physical layer.
Connects two network segments into one large segment, or to
expand an existing segment.
Enhances data signals and thus can be used to extend
maximum cabling distances.
There is no network intelligence built into a simple repeater; it
is used strictly for signal propagation.

Repeater (note)
Take note that a repeater is not device that can connect two
LANs of different protocols.
A repeater forwards every frame; it has no filtering capability.
A repeater is a regenerator, not an amplifier.

Repeater
Function of a repeater

Repeater
A repeater connecting two segments of a LAN

Main capability
A
Repeater

Hub
Operates at Layer 1, the physical layer.
Simply a multiport repeater.
Can be used to increase overall network size and number of
nodes on a single segment.
Can isolate faults within the subnet.
Allows you to add stations to a segment without disrupting
the entire network.

Hub
A (active) hub is actually a multiport repeater
Normally used to create connections between stations in a
physical star topology.
Refer previous Ethernet implementation 10Base-T
Can also create multiple level of hierarchy

Hub
A hierarchy of hubs

Hub
Clients share bandwidth.
Transmission:
10 Mbps (10BaseT)
10/100 Mbps (100BaseT)
100/1000 Mbps (1000BaseT).

Half-duplex transmission.

Hub
Advantages
Inexpensive
easy to Install
can connect different media
very little delay
Disadvantages
limited distance between devices
limited on the number of repeaters
no protocol or rate conversion
no error detection
does not filter

Bridge
Operates in both the PHY and the data link layer.
As a PHY layer device, it regenerates the signal it receives.
As a data link layer device, the bridge can check the PHY/MAC
addresses (source and destination) contained in the frame.
In telecommunication networks, a bridge is a product that
connects a local area network (LAN) to another local area
network that uses the same protocol (for example, Ethernet
or token ring).

Bridge
Operates in both the PHY and the data link layer.
Application

Application

Presentation

Presentation

Session

Session

Bridge

Transport

Transport

Network

Network

Data Link

Data Link

Data Link

Data Link

Physical

Physical

Physical

Physical

Bridge
Bridge advantages:
Isolates collision domains resulting in higher total max
throughput, and does not limit the number of nodes nor
geographical coverage
Can connect different type Ethernet since it is a store and
forward device
Transparent: no need for any change to hosts LAN adapters

Bridge
The structure of Backbone Bridge

A bridge has a table used in filtering decisions.


A bridge does not change the physical (MAC) addresses in a
frame.

Bridge Filtering
Bridges: frame filtering, forwarding
bridges filter packets
same-LAN -segment frames not forwarded onto other LAN
segments
forwarding:
how to know on which LAN segment to forward frame?
bridges learn which hosts can be reached through which
interfaces: maintain filtering tables
when frame received, bridge learns location of sender:
incoming LAN segment
records sender location in filtering table

Bridge Filtering
An example of Bridge Learning
After C sends frame to D and D replies back with frame to C,
table learns and increases (address, port) = (C,1)

Bridge
Bridges connecting different LANs
Theoretically a bridge should be able to connect LANs using
different protocols at the data link layer, such as an Ethernet
LAN to a wireless LAN or token ring.
However there are many things to be considered such as
Frame format
Maximum data size
Data rate
Bit order
Security
Multimedia support

Bridge
Bridges connect two LAN segments that use the same data
link and network protocol
operated at the data link layer
same or different cable types
forward only those messages that need to go out (filtering)
learn whether to forward packets
internal routing table
combination of black box hardware and software

Bridge
advantage
may be different data rates and different media easy to
Install
no modifications required to the communications software
can learn the ports for data transmission
disadvantage
understand only data link layer protocols and addresses
no protocol conversion
broadcasts when it does not know the address

Switch
Operates at Layer 2, the data link layer.
Dispatches data to its destination, which it determines from
the packets lower-layer media access control (MAC) address.
Can limit traffic, and does not understand network protocols.

Switch
The difference of switchs speed between hubs.
Hub

3.3Mbps

10Mbps
3.3Mbps

Switch

3.3Mbps
10Mbps
10Mbps
10Mbps

Switch
connect more than two LAN segments that use the same data
link and network protocol.
Bridges connect two LAN segments that use the same data
link and network protocol
operate at the data link layer
same or different type cable
ports are usually provided for 4, 8, 16, or 32 LAN segments
ports are used simultaneously
connect lower speed segments to high speed BN

Ethernet switch
layer 2 (frame)
Switching: A-to-B and
forwarding, filtering
A-to-B simultaneously,
using LAN addresses
no collisions
large number of
interfaces
often: individual hosts,
star-connected into
switch
Ethernet, but no
collisions!

Ethernet switch
cut-through switching: frame forwarded from input to output
port without awaiting for assembly of entire frame
slight reduction in latency

combinations of shared/dedicated, 10/100/1000 Mbps


interfaces

Switch
advantage
much more sophisticated than previously
enable all ports to work at the same time
can convert protocols
Configurable
high speed
disadvantage
understand only data link layer protocols and addresses
much more expensive then previous options
higher maintenance

Advantages of Switches
Switches divide a network into several isolated channels (or
collision domains)
Reduce the possibility of collision collision is like hangs yg dpat mengakibatkan tabrakan or hangs
Collision only occurs when two devices try to get access
to one channel
Can be solved by buffering one of them for later access
Each channel has its own network capacity
Suitable for real-time applications, e.g. video
conferencing
Since isolated, hence secure
Data will only go to the destination, but not others

Limitations of Switches
Although contains buffers to accommodate bursts of traffic,
can become overwhelmed by heavy traffic
Device cannot detect collision when buffer full
CSMA/CD scheme will not work since the data channels
are isolated, not the case as in Ethernet
Some higher level protocols do not detect error
E.g. UDP
Those data packets are continuously pumped to the switch
and introduce more problems

Switch
Layer-2 switch operate at PHY and data link layer
Layer-3 switch operates at network layer
Bridge
Bridge is an example of two-layer switch.
Bridge with few port can connect a few LANs
Bridge with many port may be able to allocate a unique
port to each station, with each station on its own
independent entity. This means no competing traffic (no
collision as we saw in Ethernet)

Router
Operates at Layer 3, the network layer.
Connects two networks with different technologies, and
provides an intelligent means of transferring packets from one
network to the other.
Also forwards traffic among multiple hubs and bridges.

Router
connect two or more LANs that use the same or different data
link protocols, but the same network protocol.
same or different cable types
operate at the network layer
forward only messages that need to go out
routers use the internetwork address
internal routing tables
only processes messages addressed to it

Router
Routers connecting independent LANs and WANs

Gateway
complex machines that are interfaces between two or more
dissimilar networks
connect two or more LANs that use the same or different data
link layer, network layer, and cable types
operates at the network layer (3) or higher layers (4-7)
forwards only those messages that need to go out
a combination of both hardware and software

Gateway
translates one network protocol to another
translates data formats
translates open sessions between application programs

translates to mainframes

Gateway
Gateway is a networking device which acts as an entrance (or
a gate) for another network.
In enterprises, the gateway is the computer that routes the
traffic from an internal network to the outside network.
The gateway node often acts as a proxy server and a firewall.
A router can also act as a gateway.
A router uses headers and forwarding tables to determine
where packets are sent Working of Gateway

Summary

Summary
Repeaters are the least expensive way to expand a network,
but they are limited to connecting two segments
Bridges function similar to repeaters, but can understand the
node addresses
Switches can be considered as multiport bridges, can divide a
network into some logical channels
Routers interconnect networks and provide filtering
functions. They can determine the best route

Comparison Charts
Hub vs. Switch

Comparison Charts
Router vs. Bridge

Comparison Charts
Switch vs. Router

MAC address and IP address


1) MAC Address
2) IP Address
Public IP vs. Private IP

What is MAC Address ?


Each device connected to a standard LAN needs a Data Link Layer
address (or called hardware address), providing a means of unique
identification.
Each NIC has its unique, hard-coded MAC (Media Access Control)
address. It is a 48 bits (6 bytes) address written in a hexadecimal
format. The first 3 bytes represents for vendor ID and the remaining
3 bytes are serial number.

MAC: 000C6E 7D3D0F


Vender ID

Serial Number

What is IP Address?
Internet Protocol Address
IP address = Network and Host ID Number
An IP address is a unique software, logical address
assigned to each machine on an IP network.
It was designed to allow a host on one network to
communicate with a host on a different network,
regardless of the type of LANs the hosts are
participating in.

192.168.0. 3

Two major categories of IP address type :


Static (Fixed) IP and Dynamic IP
Public IP and Private IP

Network
Address

192.168.0. 2
Network
Address

Host
Address

Host
Address

Hosts reside in the same


network address can
communicate with each
other

Public IP vs. Private IP


The difference between a private IP address and a public
IP address is that private IP addresses are reserved for
private networks (ex: Local Area Network), and public IP
addresses are reserved for the Internet. A public IP
address makes your equipment accessible and routable
over Internet while a private IP address cannot.
Private network:

Network Configuration in Windows


1) Enable / disable adapter (network interface card)
2) IP address settings
Set IP address to obtain an IP address automatically
Look up obtain an IP address automatically
Set IP address to be fixed

Enable adapter (network interface card)


Go to the path
Start > Control Panel >
Network and Internet >
Network and Sharing center >
Change adapter settings

1. Start
2. Control Panel

Enable adapter (network interface card)


3. Network and Internet > Network and Sharing Center
4. Change adapter settings

Enable adapter (network interface card)


5. select the adapter (NIC)
6. right click and select Enable

Enable adapter (network interface card)


After the adapter has be enabled completely, the adapter
display as following picture.

Using function key (example: asus use Fn+F2) for enable


adapter quickly with some PC or NB.

Disable adapter (network interface card)


Go to the path
Start > Control Panel > Network and Internet > Network
and Sharing center > Change adapter settings
1. Select the adapter (NIC)
2. Right click and select Disable

Disable adapter (network interface card)


After the adapter has be disabled completely, the adapter
display as following picture.

IP address settings
Set IP address as Obtain an IP address automatically
Go to the path
1. Start > Control Panel > Network and Internet > Network and
Sharing center > Change adapter settings
Select the adapter (NIC)
2. Right click and select Properties

IP address settings
Set IP address as Obtain an
IP address automatically
3. At Networking page
Select Internet Protocol
Version 4 (TCP/IPv4) and
click on it
4. Click on Properties

IP address settings
Set IP address as Obtain an
IP address automatically
5. At General page select
Obtain an IP address
automatically when PC get
IP address from DHCP server

IP address settings
Look up obtain an IP
address automatically
The path is the same as Set
IP address to obtain an IP
address automatically

IP address settings
Set IP address to be fixed

Go to the path : Start > Control Panel > Network and


Internet > Network and Sharing center > Change
adapter settings >
1. Select the adapter (NIC)
2. Right click and select Properties
3. At Networking page
Select Internet Protocol Version4 (TCP/IPv4) and
click it
4. Click Properties

IP address settings
Set IP address to be fixed
5. At General page Select
Use the following IP address
6. Type these values as an
example

IP address: 192.168.1.10
Subnet mask 255.255.255.0
Default gateway: 192.168.1.1
DNS server: 168.95.1.1

Broadband and ADSL


1)
2)
3)
4)

5)
6)
7)
8)

Overview
How does ADSL work?
ADSL Standards
ADSL and Broadband Network
ADSL Network Reference Model
ATM Introduction
FTTX
ADSL2 and ADSL2+
Connection Type
Cable Modem
Appendix - Terminology

Evolution of Digital Access

FTTx = Fiber To The X


FTTH = Fiber To The Home

ADSL Overview
ADSL: Asymmetric Digital Subscriber Line
One of the DSL technology of xDSL family
Utilizing frequencies that are normally not used by a
voice telephone call, in particular, frequencies higher
than normal human hearing.
This signal will not travel very far over normal
telephone cables, so ADSL can only be used over short
distances, typically less than 5 km.
Access technologies:
Provide asymmetric high-speed digital link over the
existing telephone line (local loop)
-Downstream: Up to 8Mbps
-Upstream: Up to 800Kbps~1MKbps
Data rate is dependent upon line conditions

Benefits of ADSL
ADSL technology can be deployed over existed copper
twisted-pair (telephone line)
Users can talk on the phone and use the Internet at the
same time on a single phone line
Has its own dedicated connection
Connection to the Internet is always on
Connection is highly reliability and secure

How does ADSL Work?

One phone line delivers


voice and a high-speed
data
Voice/fax calls only use
the frequencies below 4
kHz
Frequencies above 4 kHz
are reserved for data
transmission

ADSL

Voice/Fa
x

ADSL over Phone Line

25

1100

Frequency (kHz)

ADSL Spectrum
Standard ADSL

ADSL over ISDN

FDM
Power Spectrum/dB

POTS Upstream
Channel Channel

25

FDM
Downstream
Channel

200

ISDN
Upstream
Channel Channel

1100

Frequency/KHz

FDM: Frequency Division Multiplexing

25

Downstream
Channel

200

Frequency/KHz

1100

ADSL Standards

ADSL over POTS Standard


Defined by ANSI T1E1.4 Group
1995 Issue 1 ready
DMT line code
Full rate ADSL

Defined by ITU-T
G.DMT (G992.1)
Based on ANSI T1.413 issue 2
Full rate ADSL

Downstream: 8Mbps
Upstream: 800kbps

Downstream: 8Mbps
Upstream: 800kbps
Annex A/B/C available

1998 Issue 2 ready


Rate adaptive

G.Lite (G992.2)
Splitterless
Light rate ADSL

Downstream: 1.5Mbps
Upstream: 640kbps
Annex A/B/C available
POTS: Plain Old Telephone Service

A comparison of ADSL over POTS and ISDN


In most parts of the world, ADSL works over POTS or called
Annex A ADSL. Some EU countries such as Germany, Czech,
Hungary and Slovakia use Annex B standard. Russia and
Poland have both Annex A and Annex B ADSL
Working Over

POTS

ISDN (Digital phone


line)

ISDN (Japan)

Standards

ANSI T1.413 issue 1


ANSI T1.413 issue 22
ITU-T G.DMT Annex A
ITU-T G.Lite Annex A

ETSI TR 328
ITU-T G.DMT Annex B
ITU-T G.Lite Annex B

ITU-T G.DMT Annex C


ITU-T G.Lite Annex C

Max Data Rates


(down/up)

Full Rate: 8M/800kbps


Lite Rate: 1.5k/512bps

Full Rate: 11M/640kbps


Lite Rate: 1.5M/512kbps

FBM: 3M+/>300k+bps
DBM: 8M/1Mbps
Lite Rate: 1.5M/512kbps

ADSL and Broadband


Network

ADSL Forum Reference Model

Digital
Broadcast
Broadband
Network

Splitter

ATU-C

Loop
ATU-R

ATU-C
Narrowband
Network

ATU-C
ATU-C

Phone

Network
Management

PSTN

Access
Node

ISP

T.E.

Premises
Distribution
Network
Your home ADSL network

Local Area Network


An example of local area network at home or office. The splitter
separates phone (for voice, low frequency) and ADSL (for data,
high frequency) signal in incoming direction. Aggregate phone
and ADSL signal to line in outgoing.

CPE Side - Splitter for ADSL


To phone line
(Transmit/Receiv
e voice and data)

To phone set
(Low frequency signal)

To ADSL modem
(High frequency signal)

ADSL Loop Construction


A typical loop (between ISP and ADSL subscriber) construction
in ADSL network

Performance of ADSL Loop


ADSL signal will not travel very far over normal telephone cables, so ADSL
can only be used over short or medium distances, typically less than 5 km.
Below shows the longer distance, the lower signal performance
Distance Capacity
12
10

Mbps

8
6

Bandwidth

4
2
0
4

10

12

14

1Km = 3.3 Kft

16

18

Kft

LAN-ADSL-ATM Connection
PSTN
Content Provider
Internet

Splitter

ATM Switch

DSLAM
Router/Gateway
Local Content Provider
Telephone

ADSL MODEM

PC

Broadband Network
Three major components of broadband network
Transmission network
Backbone Fiber Optic

Switch network
ATM Switch
Access network
xDSL, HFC, FTTC, FTTH

Broadband Network
ATM Network
PSTN

ATM
Switch
ATM
NNI

ISP
Internet
Web Server

Router
VoD Server

CO
DSLAM

ATM
UNI

Router

ADSL Loop

ADSL
Modem

ADSL
Modem

PCI
USB

10/100Base-T
Wireless LAN

PC

Corporation Network
PC

PC

ATM Introduction

Characteristics of ATM
Voice
Data
Video

Cells

Asynchronous Transfer Mode (ATM)


Connection-oriented data link layer protocol
Use short, fixed-length of 53-bytes packets called cells (48
bytes of payload + 5 bytes of headers)
Support multiple service types
53 Bytes
Provides QoS guarantees, such as, bandwidth and delay
requirements of a connection
ATM is widely used over DSL network

ATM Cell
5 Byte
Header

48 Byte
Payload

ATM Reference Model


ATM
Adaptation Layer
(AAL)
Layer 2
ATM Layer

Physical Layer

Layer 1

Virtual Channel Connection


Virtual Channels (VC)

ATM Physical Link


Virtual Channel Connection (VCC)

Virtual Path (VP)

Virtual Path (VP)

Virtual Channels (VC)

Virtual Channel Connection


(VCC)
Contains Multiple VPs

Virtual Path
(VP)
Contains Multiple VCs

Virtual Channel
(VC)
Logical Path
Between ATM End Points

Connection Identifier = VPI/VCI


VPI: 0 ~ 255
VCI: 32 ~ 65535

ATM Network
Public UNI
Public ATM Network
UNI
NNI

NNI

Public ATM Network


NNI
Private ATM Network

UNI = User-to-Network Interface


NNI = Network-to-Network Interface

FTTX

FTTX
Fiber to the X (FTTX) is a generic term for any network
architecture that uses optical fiber to replace all or part of the
usual copper local loop used for telecommunications. The
four technologies, in order of an increasingly longer fiber loop
are:
Fiber to the node/neighborhood (FTTN) or Fiber to the
cabinet (FTTCab)
Fiber to the curb (FTTC)
Fiber to the building (FTTB)
Fiber to the home (FTTH)
In the actual deployments, the difference between FTTN and
FTTC is quite subtle and is mostly that the latter is nearer the
customer than the former.
The broadly-defined term fiber to the premises (FTTP) is
sometimes used to describe FTTH and/or FTTB.

FTTX Architectures
A schematic illustrating how
the FTTX architectures vary
with regard to the distance
between the optical fiber and
the end-user. The building on
the left is the central office;
the building on the right is
one of the buildings served by
the central office.
Note: Metallic Cables here means
traditional cooper or coaxial cables

ADSL2 and ADSL2+


The New ADSL Standard

ADSL Standard Evolution

Benefits of ADSL2

Rate and reach improvement


Diagnostics
Power enhancement
Rate adaptation
Spec.
Bonding for higher
Max Download
data rates
Max Upload

ADSL

ADSL2

ADSL2+

G.992.1(G.dmt)
G.992.2(G.lite)

G.992.3
G.992.4

G992.5

8Mbps

12Mbps

24Mbps

1Mbps

1.5Mbps

1.5Mbps

Distance

Some additional benefits


Improved interoperability
Fast startup
All-Digital mode
Support of packet-based service

Distance Transfer rate

ADSL2 Rate&Reach Improvement

ADSL2 Bonding

ADSL2+ (1)
ADSL2+ reached consent at the ITU in Jan 2003, joining the
ADSL2 family as G.992.5
ADSL2+ doubles the downstream bandwidth, thereby
increasing the downstream rate on telephone lines shorter
than about 5000 feet.

ADSL2+ (2)

Rate&Reach Performance of ADSL

Connection Type

Connection Type Introduction


Connection Type:
PPPoA (PPP over ATM)
PPPoE (PPP over Ethernet)
MER (MAC Encapsulation Routing)
IPoA (IP over ATM)
Bridge
Encapsulation Mode
LLC (used in most of cases)
VCMux
Except Bridging, other connection types are all referred to router mode.

Bridge
Bridge mode is pure ADSL modem
MODEM (MOdulator DEModulator)
Outgoing: Converts binary data from computer (digital)
into telephone compatible signals (analog).
Incoming: Converts telephone signal (analog) into binary
data for the computer (digital).
In Bridge mode which is typically the default mode of a ADSL
modem, the ADSL modem doesnt perform any routing or
NAT function. So clients behind ADSL modem cant share the
public IP provided by ISP.
Internet
ADSL Modem

PC or router with
PPPoE client

DSLAM

PPPoE
Also known as dial-up connection. Typically, PPPoE (Point-to-Point Protocol over
Ethernet) is for connecting multiple computer users on a LAN to a remote site through
modem or similar device. Many Internet service providers use PPPoE to provide
residential Digital Subscriber Link (DSL) broadband Internet access.

ISP: Internet Service Provider


DSLAM: DSL Access Multiplexer
AAA: Authentication, Authorization, Accounting

Why PPPoE
PPPoE has many advantages for DSL service providers:
IP address can be dynamic. Service provider can ensure
that your assigned IP address is changed each time you
connect. Service provider doesnt need to reserve certain
IP for a specific user. This way conserves the number of
public IP address being used.
Because PPPoE creates the concept of a session, service
provider can charge based on connecting time (session
time). This allows them to discourage permanent
connections and over-subscribe their IP address pool.
PPP sessions require authentication. Users need to log in
network with username and password, DSL service
providers can monitor and bill to their clients.

PPPoA
Similar to PPPoE, also offers standard PPP features such as
authentication, but only a single session per CPE can be
established over a PVC while PPPoE can create multiple
sessions per CPE over a PVC.
In general PPPoA must be configured on the CPE itself,
PPPoA client software is not available on PC platforms
since PPPoA works over ATM interface which is not
equipped on PC.
Note: The CPE here is subject to ADSL modem/router

Connection Type Comparison


Bridge

MER

IPoA

PPPoA

PPPoE

Login

V
(from router)

V
(from router)

Router (R )
Bridge (B)

D or S
(at modem)

S
(at modem)

D
(at modem)

D
(at modem)

Static IP (S)
D
Dynamic IP (D) (at PC)

For PPPoE, there are three typical connection methods:


1. (PC with PPPoE client)---(ADSL CPE with bridge mode)---(Internet).
In this case, PPPoE session terminates at the PC.
2. (PC)---(Router with PPPoE client)----(ADSL CPE with bridge mode)--(Internet). In this case, the router runs NAT. PPPoE session
terminates at the router. See the illustration in PPPoE page.

3. (PC)---(ADSL CPE with PPPoE client)---(Internet). In this case, CPE


runs in router mode and NAT is enabled. PPPoE session terminates
at the ADSL CPE.

ADSL Configuration
The ADSL operating mode depends on the service provider's
configuration on the Central Office side and Broadband
Access Server for your ADSL line.
Your ISP should be able to provide the following, if needed:
VPI/VCI values
ADSL standard (Modulation)
Encapsulation mode (LLC or VCMux)
Authentication (PAP or CHAP), username, and password for
PPP connections.

Cable Modem

Cable Modem Broadband


Cable TV network is able to offer bi-directional data transfer bandwidth in
addition to voice and digital TV services. Using a cable modem in the
customer premise and a Cable Modem Termination System at the headend, the standard, DOCSIS, provides for a data transmission service with
speeds of up to 42 Mbps or higher on one channel.
The newer standard, DOCSIS 3.0, is capable of over 100Mbps of bandwidth
per channel.
It is employed by many cable television operators to provide Internet
access over their existing Hybrid Fiber Coaxial (HFC) infrastructure.
However, a cable TV broadband service relies on a shared network
architecture (see next page); this results in the limitation that the amount
of bandwidth delivered to the customer is dependant on how many people
share the connection back to the head-end.

Cable Network
Cable TV, Hybrid Fiber Coaxial (HFC) infrastructure

CPE Side Splitter for Cable Modem

Splitter

Cable Modem

PC
TV

Compare to ADSL
ADSL

Cable

Network

Dedicated lease line

Shared network

Service Provider

Telecom

Cable TV operator

Connection Type

Multiple Types:
PPPoE, PPPoA,
Bridge, ...

Typically,
Cable Modem: Bridge
PC: DHCP client

Data Rate

ADSL2+
Down: 24Mbps
Up: 1.5Mbps

Typically,
Down: 10~35Mbps
Up: 1~10Mbps

Note: Cable modem data rate depends on client number at a time

Appendix - Terminology

ADSL Transmission Unit Central Office (ATU-C)


ADSL Transmission Unit- Remote (ATU-R)
Asymmetrical Digital Subscriber Loop (ADSL)
Asynchronous Transfer Mode (ATM)
Cable Modem Termination System (CMTS)
Central Office (CO)
Customer Premise Equipment (CPE)
DSL Access Multiplexer (DSLAM)
Hybrid Fiber Coaxial (HFC)
Internet Service Provider (ISP)
Plain Old Telephone Service (POTS) =>a term of voice band
telephone service which is used in most parts of the world
Public Switched Telephone Network (PSTN) =>Contrast to
VoIP, it refers to traditional telephone network

Wireless devices
1) Wireless Technology overview
2) Basic RF and Antenna Knowledge

Wireless Technology overview


Wireless?
A wireless LAN or WLAN is a wireless local area network that
uses radio waves as its carrier.
The last link with the users is wireless, to give a network
connection to all users in a building or campus.
The backbone network usually uses cables

Wireless Technology overview


Common Topologies
The wireless LAN
connects to a wired LAN

There is a need of an
access point that bridges
wireless LAN traffic into
the wired LAN.
The access point (AP) can
also act as a repeater for
wireless nodes, effectively
doubling the maximum
possible distance
between nodes.

Wireless Technology overview


Connecting To a Legacy
Network
Access Points connect
the wireless network to
the legacy network.

Act as an access point

Wireless Technology overview


Wireless Network Components
Access Points
NICs Network Interface Cards
PCMCIA
USB
PCI
Compact Flash
Other Wireless Devices
Bridges and Routers
Print Servers
PCs, Laptops, PDAs

Wireless Technology overview


Complete Wireless Networks
The physical size of the network is determined by the
maximum reliable propagation range of the radio signals.
Referred to as ad hoc networks
Are self-organizing networks without any centralized
control
Suited for temporary situations such as meetings and
conferences.

Wireless Technology overview


How do wireless LANs work?
Wireless LANs operate in almost the same way as wired
LANs, using the same networking protocols and supporting
the most of the same applications.
Integration With Existing Networks
Wireless Access Points (APs) - a small device that bridges
wireless traffic to your network.
Most access points bridge wireless LANs into Ethernet
networks, but Token-Ring options are available as well.
Note: the information about protocol and settings of
wireless refer to later chapter.

Basic RF and Antenna Knowledge

Antenna Concept
dB and dBm
Microwave Power
Antenna Gain
Wireless Range

Receiver Sensitivity
Antenna Type
RF Range between
Omni Antenna and
Directional Antenna

Antenna Concept
An antenna is a transducer designed to transmit or receive
electromagnetic waves.

Antennas are used in systems such as radio and television


broadcasting, point-to-point radio communication, wireless
LAN, radar, and space exploration.

Antennas usually work in air or outer space, but can also be


operated under water or even through soil and rock at certain
frequencies for short distances.

dB and dBm
dB
Decibel (dB) is a unit of measurement that looks at the
ratio of one value to the ratio of one value to another.
Gain or loss can be measured in dB. The dB scale is an
exponential scale using the formula 10*log(ratio). This
means that 3 dB is about twice the power, 10 dB is 10
times the power, 13 dB is about 20 times the power
and 20 dB is 100 times the power.

dBm
dBm is dB referenced to a value of 1 miliWatt of power.
Power over or under 1mW would be plus or minus
dBm respectively. See next page for details.

Microwave Power
dBm=10 log

1 Megawatt

90 dBm

1 Kilowatt

60 dBm

1 Watt (W)

30 dBm

Ex: ?dBm=100 mW
10 log
=10 log 100
=20 dBm

1 milliwatt (mW)

0 dBm

1 Microwatt

-30 dBm

1 manowatt

-60 dBm

1 Picowatt

-90 dBm

1 femtowatt

-120 dBm

Antenna Gain
Gain is given in reference to a standard antenna
dBd and dBi are units of antenna gain
dBd:
Decibels over dipole, a relative gain measurement with
respect to a half wave dipole (0 dBd = 2.14 dBi) using a
standard dipole antenna as a reference.
dBi:
Gain in decibels referenced to an isotropic radiator. An
isotropic radiator is a theoretical antenna with equal
gain to all points on isotropic sphere.
2.15 dBi = 0 dBd
dBi = dBd + 2.15

Wireless Range

If 3dBi is added, the wireless range (wireless power) will be


doubled in theory.

Receiver Sensitivity
A receiver's sensitivity is a measure of its ability to discern
low-level signals.
Examples:
-80dBm @ 11Mbps
signal strength above -80dBm can run at ideal data
rate 11Mbps (11b mode)
-68dBm @ 54Mbps
signal strength above -68dBm can run at ideal data
rate 54Mbps (11g mode)
-74dBm+/-2@54Mbps
signal strength above -72dBm or -76dBm can run at
ideal data rate 54Mbps (11g mode)

Receiver Sensitivity
11n: HT20 -64dBm HT40 -61dBm
signal strength above -64dBm can run at 20MHz
bandwidth High Throughput (HT) rate
signal strength above -61dBm can run at 40MHz
bandwidth High Throughput rate
Note that 40MHz throughput is higher than 20MHz. In
theory, can double bandwidth.

Antenna Type
Introduction to Different Type of Antennas
1) 1. Dipole Antenna
2) 2. Monopole Antenna
3) 3. Directional (Patch) Antenna

Dipole Antenna

Popular Antenna. (low cost and easy to make it)


Horizontal Plane. (Radiation Pattern is Omni-directional)
Linear Polarization. (Electromagnetic is linear)
Ex: Most of antenna on WL-5XX Series, WL-700gE is Dipole

Monopole Antenna
Dimension is smaller than Dipole.
Very sensitive to the environment.

Directional (Patch) Antenna


Must in right direction to get gain
Dimension is larger.
Directional (Patch) Antenna

patch
substrate
ground plane

RF Range between Omni Antenna and Directional Antenna

Basic Terminology - Wi-Fi


Wi-Fi is a trademark of the Wi-Fi Alliance.
The technical term "IEEE 802.11" has been used
interchangeably with Wi-Fi.
A Wi-Fi enabled device such as a personal computer, video
game console, smartphone, or digital audio player can
connect to the Internet when within range of a wireless
network connected to the Internet.

Basic Terminology - Wi-Fi

Basic Terminology - AP
Wi-Fi (Wireless Fidelity)
Wi-Fi was originally a brand licensed by the Wi-Fi Alliance to describe
the embedded technology of WLAN based on the IEEE 802.11b
standard.
Nowadays Wi-Fi is meant to be used generically when referring of
any type of 802.11 network, whether 802.11b, 802.11g, 802.11a,
802.11n, etc.
Any products tested and approved as "Wi-Fi Certified" (a registered
trademark) by the Wi-Fi Alliance are certified as interoperable with
each other, even if they are from different manufacturers.
AP (Access Point)
A hardware device or a computers software that connects wireless
communication devices together with wireless network
Also act like a communication hub for users of a wireless device to
connect to a wired LAN
Wireless Router = Wired Router + AP

Basic Terminology - SSID


SSID (Service Set Identifier)
An unique identifier attached to the header of packets
sent over a WLAN that acts as a password when a mobile
device tries to connect to a wireless network device.
SSID differentiates one WLAN from another, so all AP and
all devices attempting to connect to a specific WLAN
must use the same SSID. A device will not be permitted to
join the network unless it can provide the unique SSID.
Because an SSID can be sniffed in plain text from a
packet, it does not supply any security to the network

802.11 Standard 11b/11g/11a/11n


802.11 is a family of specifications for Wireless Local Area
Network (WLAN) developed by a working group of the Institute
of Electrical and Electronics Engineers (IEEE)
Standard

Data Rate

Frequency Band

802.11b

Up to 11Mbps

2.4GHz

802.11g

Up to 54Mbps

2.4GHz

Backward compatible with


802.11b

802.11a

Up to 54Mbps

5GHz

Less RF interference than


802.11b/g

802.11n

Multiple Date
Rates. Many ASUS
11n routers are up
to 300Mbps

2.4GHz/5GHz

Remark

Backward compatible with


802.11b/g/a

Note: ASUS 11n products mainly utilize 2.4Hz band

RF Channels at 2.4GHz (802.11b/g/n)


Regulatory Domain

Allowed Channels

US(FCC)/Canada (IC)/Taiwan

1 to 11 (2.412-2.462 GHz)

Europe, excluding Spain (ETSI)

1 to 13 (2.412-2.472 GHz)

Australia

1 to 13 (2.412-2.472 GHz)

Spain

10 to 11 (2.457-2.462 GHz)

Japan (MKK)

1 to 14 (2.484 GHz)

Note: Channel 14 in Japan is only for 802.11b

RF Channels at 5GHz (802.11a/n)


There are more channels than 2.4GHz
Channel number: 3640444852566064100
104108112116etc.

RF Channels at 5GHz (802.11a/n)


Every channel with a unique frequency(MHz)
EX: channel 36 is 5180 MHz
United States

Europe

Singapore

China

Israel

Korea

Turkey

40/20 MHz

40/20 MHz

40/20 MHz

10 MHz

20 MHz

20 MHz

20 MHz

20 MHz

20 MHz

7, 8, 9, 11, 183, 185,


187, 189

No

No

No

Yes

No

No

No

No

No

184, 188
192, 196
12, 16

No
No
No

No
No
No

Yes
Yes
No

Yes
No
No

No
No
No

No
No
No

No
No
No

No
No
No

No
No
No

34, 38, 42, 46

No

No

No

No

No

No

Yes

Yes

Yes

36, 40, 44

Yes

Yes

Yes

No

Yes

No

Yes

Yes

Yes

48, 52, 56, 60, 64

Yes

Yes

Yes

No

No

No

Yes

Yes

Yes

100, 104, 108, 112,


116

Yes

Yes

Yes

No

No

No

No

Yes

No

120, 124, 128

No

Yes

Yes

No

No

No

No

Yes

No

132
136
140

No
Yes
Yes

Yes
Yes
No

Yes
Yes
Yes

No
No
No

No
No
No

No
No
No

No
No
No

No
No
No

No
No
No

149, 153, 157, 161,


165

Yes

No

No

No

Yes

Yes

No

Yes

Yes

channel

Japan

Technology Comparison

Technology Comparison

Technology Comparison

Wi-Fi

WIMAX

WPAN: Wireless Personal Area Network

WWAN: Wireless Wide Area Network

TCP/IP Protocols
1) IP Addresses
ARP & RARP
ICMP
IPv4 & IPv6
2) TCP
3) UDP

IP Addresses
IP is a network layer - it must be capable of providing
communication between hosts on different kinds of networks
(different data-link implementations).
The address must include information about what network
the receiving host is on. This makes routing feasible.

IP Addresses
IP addresses are logical addresses (not physical)
32 bits.
Includes a network ID and a host ID.
Every host must have a unique IP address.
IP addresses are assigned by a central authority (Internet
Corporation for Assigned Names and Numbers -- ICANN)
IP Addresses are usually shown in dotted decimal notation:
Ex: 128.213.1.1
10000000 11010101 00000001 00000001

IP Addresses
The four formats of IP Addresses
Includes a network ID and a host ID.

Class

0 NetID

10

110

1110

HostID

NetID

8 bits

HostID

HostID

NetID

Multicast Group ID
8 bits

8 bits

8 bits

IP Addresses
Features
Services provided by IP
Connectionless Delivery (each datagram is treated
individually).
Unreliable (delivery is not guaranteed).
Fragmentation / Reassembly (based on hardware MTU).
Routing.
Error detection.
Localhost
127.0.0.0127.255.255.255

IPv4
Header of Internet Protocol version 4 (IPv4)
8 bits
VERS

8 bits
HL

Service

Datagram ID
TTL

8 bits

8 bits

Fragment Length
FLAG

Protocol

Fragment Offset
Header Checksum

Source Address

Destination Address
Options (if any)

Data

IPv4
Protocol number list
Protocol
Number

Protocol Name

Abbreviation

Internet Control Message Protocol

ICMP

Internet Group Management Protocol

IGMP

Transmission Control Protocol

TCP

17

User Datagram Protocol

UDP

41

IPv6 encapsulation

89

Open Shortest Path First

OSPF

132

Stream Control Transmission Protocol

SCTP

IPv6
Header of Internet Protocol version 6 (IPv6)
8 bits
VERS

8 bits

8 bits

PRIO

Flow Label

Payload Length

Next Header

Source Address (128 bits - 16 bytes)

Dest. Address (128 bits - 16 bytes)

8 bits

Hop Limit

IPv6
IPv6 Header Fields
VERS: 6 (IP version number)
Priority: will be used in congestion control
Flow Label: experimental - sender can label a sequence of
packets as being in the same flow.
Payload Length: number of bytes in everything following
the 40 byte header (up to 64Kb), or 0 for a Jumbogram (up
to 4Gb).

IPv6
IPv6 Header Fields
Next Header is similar to the IPv4 protocol field indicates what type of header follows the IPv6 header.
Hop Limit is similar to the IPv4 TTL field (but now it really
means hops, not time).
Extension Headers
Routing Header - source routing
Fragmentation Header - supports fragmentation of IPv6
datagrams.
Authentication Header
Encapsulating Security Payload Header

IPv6
IPv6 Addresses
128 bits - written as eight 16-bit hex numbers.
5f1b : df00 : ce3e : e200 : 0020 : 0800 : 2078 : e3e3
3

13

32

16

64

010

TLA ID

NLA ID

SLA ID

Interface ID

High order bits determine the type of address.


Aggregate Global Unicast Address
TLA: top-level aggregation (provider)
NLA: next-level (subscriber)
SLA: site-level (subnet)
Interface ID is (typically) based on hardware MAC address

IPv4 & IPv6


IPv4-Mapped IPv6 Address
IPv4-Mapped addresses allow a host that support both
IPv4 and IPv6 to communicate with a host that supports
only IPv4.
The IPv6 address is based completely on the IPv4 address.
80 bits of 0s followed by 16 bits of ones, followed by a 32 bit
IPv4 Address:

0000 . . . 0000

FFFF

IPv4 Address

80 bits

16 bits

32 bits

ARP & RARP


Mapping IP Addresses to Hardware Addresses
IP Addresses are not recognized by hardware.

If we know the IP address of a host, how do we find out the


hardware address ?
The process of finding the hardware address of a host given
the IP address is called
Address Resolution

ARP & RARP


Reverse Address Resolution
The process of finding out the IP address of a host given a
hardware address is called
Reverse Address Resolution
Reverse address resolution is needed by diskless workstations
when booting.

ARP
The Address Resolution Protocol is used by a sending host
when it knows the IP address of the destination but needs
the Ethernet address.
ARP is a broadcast protocol - every host on the network
receives the request.
Each host checks the request against its IP address - the right
one responds.

ARP
ARP does not need to be done every time an IP datagram is
sent - hosts remember the hardware addresses of each other.
Part of the ARP protocol specifies that the receiving host
should also remember the IP and hardware addresses of the
sending host.

ARP
ARP conversation
HEY - Everyone please listen!
Will 128.213.1.5 please send me
his/her Ethernet address?

D
not me

Hi A! Im 128.213.1.5, and my
Ethernet address is
87:A2:15:35:02:C3

RARP
RARP conversation
HEY - Everyone please listen!
My Ethernet address is
22:BC:66:17:01:75.
Does anyone know my IP address ?

D
not me

Hi A! Your IP address is
128.213.1.17.

ARP & RARP-Summary


Address Resolution Protocol (ARP) is the means by which
networked computers map Internet Protocol (IP) addresses to
physical hardware (MAC) addresses that are recognized in a
local network.
Machines that do not know their IP addresses use Reverse
Address Resolution Protocol (RARP).
It is used to obtain IP address information based on the
physical or MAC address.

ICMP
Internet Control Message Protocol
ICMP is a protocol used for exchanging control messages.
ICMP uses IP to deliver messages.
ICMP messages are usually generated and processed by
the IP software, not the user process.

ICMP
ICMP Message Types
Echo Request
Echo Response
Destination Unreachable
Redirect
Time Exceeded
Redirect (route change)
there are more ...

ICMP
Ping
Ping works by sending an ICMP echo request to the
destination computer.
The receiving computer then sends back an ICMP echo
reply message
It is also possible to use Ping to find the IP address of a
host when the name is known.

UDP
User Datagram Protocol
Features:
An unreliable, connectionless transport layer protocol
UDP is a transport-layer protocol
UDP uses IP to deliver datagrams to the right host
Ports
UDP/IP uses an abstract destination point called a protocol
port.
Ports are identified by a positive integer.
Operating systems provide some mechanism that
processes use to specify a port.

UDP
The diagram of transmission by using port

Host A

Host B

Process

Process

Process

Process

Process

Process

UDP
Features:
Datagram Delivery
Connectionless
Unreliable
Minimal
Source Port

Destination Port

Length

Checksum

Data

UDP Datagram Format


Source & destination
ports: identifies the
source and destination
processes/applications
Length: length of the
UDP datagram
(including header and
data) in bytes
Checksum: Covers the
UDP header and data;
Optional (with value
set to 0, if not
computed)

TCP
Transmission Control Protocol
TCP is an alternative transport layer protocol supported by
TCP/IP.
TCP provides:
Connection-oriented
Reliable
Byte-Stream
Full-duplex

TCP
Connection-Oriented
Connection oriented means that a virtual connection is
established before any user data is transferred.
If the connection cannot be established - the user program
is notified.
If the connection is ever interrupted - the user program(s)
is notified.

TCP
Reliable
Reliable means that every transmission of data is
acknowledged by the receiver.
If the sender does not receive acknowledgement within a
specified amount of time, the sender retransmits the data.
Byte Stream
Stream means that the connection is treated as a stream
of bytes.
The user application does not need to package data in
individual datagrams (as with UDP).

TCP
Full Duplex
TCP provides transfer in both directions.
To the application program these appear as 2 unrelated
data streams, although TCP can piggyback control and data
communication by providing control information (such as
an ACK) along with user data.

Ports
Interprocess communication via TCP is achieved with the
use of ports (just like UDP).
UDP ports have no relation to TCP ports (different name
spaces).

TCP
Connection Establishment
3-way handshake
Both sides agree on initial sequence numbers
Two data streams (one in each direction) are established

TCP Code bits


URG

ACK

PSH

RST

SYN

ACK: Ack field is valid


SYN: Synchronize the sequence numbers

FIN

Connection Establishment
Client

Server

Send SYN; Seq = x


Receive SYN

Receive SYN + ACK

Send SYN; Seq = y


Ack = x+1

Send Ack = y+1


Receive ACK

Time

Why use 3-Way?


TCP is a reliable service.
IP delivers each TCP segment.
IP is not reliable.
Seq and SN are random number for preventing a malicious
person (who wants to analyze private information)
TCP Code bits
URG

ACK

PSH

RST

FIN: No more data from sender

SYN

FIN

...

TCP Termination
-App1: I have no
more data for you.
App1
-App2: OK, I
FIN
1
SN=X
understand you are
done sending.
ACK=X+1 2
dramatic pause
-App2: OK - Now Im
FIN
also done sending
3
SN=Y
data.
-App1: Over and
ACK=Y+1 4
Out, Goodbye

App2

Connection Release
Each direction is shut down independently
Host A

Host B

Application closes
connection

Receive FIN

Receive FIN + ACK


Send Ack = y+1
Time

...

Send Ack = x+1


Inform application
B can still send data ...

...

...

Send FIN; Seq= x


Receive ACK
Connection half closed ...

App closes connection


Send FIN; Seq = y;
Ack = x+1
Receive ACK
Connection fully closed ...

Connectionless
Connectionless protocols
No connection setup necessary prior to data transfer
Each datagram is routed independently and can take
different paths through the network; therefore datagrams
could arrive at the destination out of sequence
Best-effort delivery (no guaranteed delivery)
No connection release phase after data transfer
Less overhead and therefore fast (less delay)
Better suited for applications needing low delay but can
tolerate some data losses (E.g. voice applications)
Examples: IP and UDP (User Datagram Protocol)

Connection-oriented
Connection-oriented protocols
Three phases:
Connection setup
Data transfer
Connection release
A connection need to be setup between end points prior
to the data transfer
Data delivery, integrity and sequencing are guaranteed
Connection is released after the data transfer
Better suited for applications that require guaranteed
delivery, but can tolerate some delays
E.g. TCP (Transmission Control Protocol)

Port
A port number identifies an application process
An end point is identified by IP Address & Port (called a TCP
socket)
A connection is identified by two end points (two sockets)
App A

App B

Ports

App A

App B

TCP

TCP

IP

IP

TCP connection A

TCP connection B

Port Numbers
Defined in three ranges:
Well-known ports (0 - 1023)
Defined in the Assigned Numbers RFC
Assigned to core services that systems offer
E.g. Telnet - Port 23, FTP Control data - Port 21
Registered ports (1024 - 49151)
Assigned to industry applications and processes
E.g. Microsoft SQL Server process - Port 1433
Dynamic (or, ephemeral) ports (49152 - 65535)
Can use as temporary ports without being assigned

Port Numbers
Common port
6
20, 21
22
23
53
67, 68
80
110

Port Numbers
Common port
443

Port Numbers
Common port
520

Port Numbers
Common port
1701
1723
33434

Summary
TCP vs. UDP
Which protocol is better ?
A: It depends on the application.
TCP provides a connection-oriented, reliable byte stream
service (lots of overhead).
UDP offers minimal datagram delivery service (as little
overhead as possible).

Other protocols
Protocol Wrapper Dependencies and Network layers

Other protocols
Description for Protocol Wrapper Dependencies and Network
layers
Name(layer)

Importance

Hardware(link)

Essential

Package
Essential
management(network)

Inter layer
communication
Service
control(transport)
Application and user
support

Essential

Critical

Important

Names of protocols
ethernet, SLIP, PPP, Token
Ring, ARCnet

What it does
Allows messages to be packaged and sent between
physical locations.

IP, ICMP

Manages movement of messages and reports errors.


It uses message protocols and software to manage
this process. (includes routing)

ARP

Communicates between layers to allow one layer to


get information to support another layer. This
includes broadcasting

TCP, UDP

Controls the management of service between


computers. Based on values in TCP and UDP
messages a server knows what service is being
requested.

DNS, RPC

DNS provides address to name translation for


locations and network cards. RPC allows remote
computer to perform functions on other computers.

Network Management Advanced

RARP, BOOTP, DHCP, IGMP, Enhances network management and increases


SNMP,RIP, OSPF, BGP, CIDR functionality

Utility(Application)

FTP, TFTP, SMTP, Telnet,


NFS, ping, Rlogin

Useful

Provides direct services to the user.

Other protocols
Description for advanced and useful protocol
1. DNS/RARP/BOOTP/DHCP/IGMP/SNMP/RIP
protocol description
Domain Name Service, allows the network to determine IP addresses from names and
DNS
vice versa.
Reverse address resolution protocol (RARP) is used to allow a computer without a local
RARP
permanent data storage media to determine its IP address from its ethernet address.
Bootstrap protocol is used to assign an IP address to diskless computers and tell it what
BOOTP
server and file to load which will provide it with an operating system.
Dynamic host configuration protocol (DHCP) is a method of assigning and controlling the
IP addresses of computers on a given network. It is a server based service that
DHCP
automatically assigns IP numbers when a computer boots. This way the IP address of a
computer does not need to be assigned manually. This makes changing networks easier
to manage. DHCP can perform all the functions of BOOTP.
IGMP
Internet Group Management Protocol used to support multicasting.
Simple Network Management Protocol (SNMP). Used to manage all types of network
SNMP
elements based on various data sent and received.
Routing Information Protocol (RIP), used to dynamically update router tables on WANs or
RIP
the internet.

DNS
DNS Namespace

.org

.
.com

unicef.org

msn.com

.edu

microsoft.com.

mtu.edu

msu.edu

.au
gov.au

com.au

corp.microsoft.com.

corp.
Subdomain

microsoft.

Second-Level Domain

com .
Top-Level Domain

Root

DNS
Dynamic domain name
resolution
Resolving procedure

DNS proxy
A DNS proxy forwards
DNS requests and
replies between DNS
clients and a DNS
server.

DNS
The diagram below illustrates how the DNS system resolves
addresses:

Dynamic DNS (DDNS)


Why use DDNS?
Over the last decade, the exponential increase in the
number of hosts on the Internet eventually uncovered two
drawbacks with the original DNS system.
Traditional full zone transfers are inefficient because they
occur on a scheduled basis instead of occurring as changes
are made.
These full transfers also involve transfer of all the records
in a zone regardless of how many are changed.

Dynamic DNS (DDNS)


Why use DDNS?
A popular application of dynamic DNS is to provide a
residential user's Internet gateway that has a variable,
often changing, IP address with a well known hostname
resolvable through standard DNS queries.
This kind of dynamic DNS is commonly referred to as
'DynDNS', after a popular internet service of that name.
It is accomplished via queries to especially formatted
http/https URLs. Neither the format of these URLs nor the
returned response codes is standardized.
It is almost exclusively used on public networks, i.e. the
internet, and does not require a user to run their own
nameservers.

Dynamic DNS (DDNS)


Although DNS allows you to access nodes in networks using
their domain names, it provides only the static mappings
between domain names and IP addresses.

When you use the domain name to access a node whose IP


address has changed, your access will fail because DNS leads
you to the IP address that is no longer where the node
resides.

Dynamic DNS (DDNS)


Dynamic Domain Name
System (DDNS) can
dynamically update the
mappings between
domain names and IP
addresses for DNS
servers to direct you to
the latest IP address
corresponding to a
domain name.

DDNS works on the


client-server model
comprising the DDNS
client and the DDNS
server.

Dynamic DNS (DDNS)


DDNS client:
Refers to servers such as HTTP and FTP servers.
The Internet users usually access these servers using domain
names.
When its IP address changes, the DDNS client will inform the
DDNS server of its new mapping.
DDNS server:
Informs the DNS server of latest mappings.
When receiving the mapping update request from a DDNS
client, the DDNS server tells the DNS server to re-map
between the domain name and IP address of the DDNS client.
Therefore, the Internet users can use the same domain name
to access the DDNS client even if the IP address of the DDNS
client has changed.

Other protocols
Description for advanced and useful protocol
2. OSPF/BGP/CIDR/FTP/TFTP/SMTP/NFS /Telnet/Ping/Rlogin
protocol Description
Open Shortest Path First (OSPF) dynamic routing protocol.
OSPF

CIDR

Border Gateway Protocol (BGP). A dynamic router protocol to communicate between routers on
different systems.
Classless Inter-domain Routing (CIDR).

FTP

File Transfer Protocol (FTP). Allows file transfer between two computers with login required.

BGP

TFTP
SMTP
NFS

Telnet
Ping
Rlogin

Trivial File Transfer Protocol (TFTP). Allows file transfer between two computers with no login
required. It is limited, and is intended for diskless stations.
Simple Mail Transfer Protocol (SMTP).
Network File System (NFS). A protocol that allows UNIX and Linux systems remotely mount each
other's file systems.
A method of opening a user session on a remote host.
A program that uses ICMP to send diagnostic messages to other computers to tell if they are
reachable over the network.
Remote login between UNIX hosts. This is outdated and is replaced by Telnet.

HTTP
http: hypertext transfer
protocol
Webs application layer
protocol
client/server model
client: browser that
requests, receives,
displays Web objects
server: Web server
sends objects in
response to requests

HTTP
Language of the Web
protocol used for communication between web browsers
and web servers
TCP port 80
Uniform Resource Locator
How to find the resource, a URL that says how to find the
resource
HTTP allows an open-ended set of methods to be used to
indicate the purpose of a request. It builds on the
discipline of reference provided by the Uniform Resource
Identifier (URI), as a location (URL) or name (URN), for
indicating the resource on which a method is to be
applied.

Default Route/Gateway
A default route, also known as the gateway of last resort, is
the network route used by a router when no other known
route exists for a given IP packet's destination address.

The router that is listed as the next hop router for the default
route is called the default gateway or gateway of last resort.

Default Gateway
A default gateway is the node on the computer network that
the network software uses when an IP address does not
match any other routes in the routing table.

Default Route
Static Routing
Static Routing table is loaded with values when the system
starts
the routes do not change unless an error is detected
Dynamic Routing
Can not change routing table (RT) information over time
Dynamic Routing begins exactly like SR (Static Routing) by
loading an initial set of routes into a router when the
system boots and starts operation

NAT and UPnP

NAT
NAT (Network Address Translation)
A method that maps IP address used within one network
to a different IP address known within another network.
Usually, NAT maps its local inside (internal/private)
network addresses to one or more global outside IP
addresses and maps the global IP addresses on incoming
packets back into internal IP addresses.
Corporate uses to extend their IP addresses to support
more addresses
than they own.

NAT
There are various types of NAT:
Static NAT
Dynamic NAT
NAPT (Network Address and Port Translation) or PAT
Reverse Static NAT
Reverse NAPT

NAT
Internet

Valid IP Address Space

Mapping

Mapping

Mapping

Mapping

Private IP Address Space

Static NAT
maps an internal (private) IP
address to a globally valid IP
address (one-to-one).
All packets are directly
translated with the
information contained in
the map.
Similarly, reverse static
NAT maps globally valid
IP address to internal IP
address (one-to-one).

NAT
Dynamic NAT
Maps an internal host by dynamically to a globally valid IP
address (m-to-n).

The map usually contains a pool of internal IP addresses (m)


and a pool of globally valid IP addresses (n) .
m is usually greater than n.
Each internal IP address is mapped to one globally valid IP
address on a first come first serve basis.

NAT
Dynamic NAT

Valid IP Address Pool

Internet
Valid IP Address Pool

Mapping

Mapping

PC A maps to no IP

Private IP Address Space

Mapping

Mapping

Mapping

Mapping

Private IP Address Space

Valid IP Address Space

Valid IP Address Space

Internet

PC A maps to an IP when PC B
release its NAT mapping

NAT
NAPT (Network Address and Port Translation)
Also known as IP sharing.
It maps many internal IP addresses to only one globally valid
IP address.
The map usually contains a pool of network ports to be used
for translation.
Every packet is translated with the globally valid IP address;
the port number is translated with a free pool from the pool
of network ports.

NAT

NAPT (Network Address and Port Translation)


Valid IP Address Space

Internet

Mapping

Mapping

Mapping

Mapping

Private IP Address Space

NAT
Reverse NAPT
Also called inbound mapping, port mapping, and virtual
server. Any packet coming to the router can be relayed to the
internal host based on the protocol, port number or IP
address specified in the rule. This is useful when multiple
services are hosted on different internal machines.

NAT

Reverse NAPT (Network Address and Port Translation)

Valid IP Address Space

Internet

Mapping

Mapping

Mapping

Mapping

Private IP Address Space

Virtual Server
Definition: On the Internet, a virtual server is a server
(computer(s) and various server programs [ex: ftp, mail, www
or telnet server]) at someone else's location that is shared by
multiple Web site owners so that each owner can use and
administer it as though they had complete control of the
server.

Virtual Server
Purpose: Virtual Web servers are a very popular way of
providing low-cost web hosting services. Instead of requiring a
separate computer for each server, dozens of virtual servers
can co-reside on the same computer.
Method: Some Internet service providers (ISPs) offer a virtual
server service instead of, or in addition to, virtual hosting.

Virtual Server

Using a virtual server, a company or


individual with a Web site can not
only have their own domain name
and IP address, but can administer
their own file directories, add e-mail
accounts and address assignments,
assign multiple domain names that
resolve to a basic domain name
without involvement from the ISP,
manage their own logs and statistics
analysis, and maintain passwords.

Users of a virtual server, however, do


not have to manage the hardware
aspects of running a server and
effectively share the cost of
expensive line connections to the
Internet.

UPnP
Universal Plug and Play
UPnP is a set of networking protocols for primarily residential
networks without enterprise class devices that permits
networked devices, such as personal computers, printers,
Internet gateways, Wi-Fi access points and mobile devices to
seamlessly discover each other's presence on the network
and establish functional network services for data sharing,
communications, and entertainment.

UPnP
The concept of UPnP is an extension of plug-and-play, a
technology for dynamically attaching devices directly to a
computer, although UPnP is not directly related to the earlier
plug-and-play technology.
UPnP devices are "plug-and-play" in that when connected to a
network they automatically establish working configurations
with other devices.

UPnP
One solution for NAT traversal, called the Internet Gateway
Device Protocol (IGD Protocol), is implemented via UPnP.
Many routers and firewalls expose themselves as Internet
Gateway Devices, allowing any local UPnP control point to
perform a variety of actions, including retrieving the external
IP address of the device, enumerate existing port mappings,
and add or remove port mappings.
By adding a port mapping, a UPnP controller behind the IGD
can enable traversal of the IGD from an external address to an
internal client.

UPnP
List of UPnP AV media servers and client application includes:
PS3 Media Server
TwonkyMedia Server
Windows Media Connect
Wild Media Server (UPnP, DLNA, HTTP) etc

END

2012.Ver2

Você também pode gostar