chapter 3 : route

34
Wireless Theory Petikan terjemahan Fi-Zilalil Quran karangan Syed Qutb ayat 1- 4, Surah Az Zaariyat:- • Dengan nama Allah yang Maha Penyayang dan Maha Pengasih. • Demi kekuatan penabur-penabur yang menabur dengan sebaik-baik taburan. (Az Zaariyat) • Dan demi kekuatan pembawa-pembawa muatan. (Al-Haamilat) • Dan demi kekuatan yang berlari dengan selesa. (Al- Jaariyat) • Dan demi kekuatan pembahagi-pembahagi urusan. (Al- Muqassimat)

Upload: nurah

Post on 28-Sep-2015

241 views

Category:

Documents


9 download

DESCRIPTION

Web TechnologyChapter 3 : Route

TRANSCRIPT

INTRODUCTION TO THE WEB TECHNOLOGY

Wireless TheoryPetikan terjemahan Fi-Zilalil Quran karangan Syed Qutb ayat 1- 4, Surah Az Zaariyat:-

Dengan nama Allah yang Maha Penyayang dan Maha Pengasih.Demi kekuatan penabur-penabur yang menabur dengan sebaik-baik taburan. (Az Zaariyat)

Dan demi kekuatan pembawa-pembawa muatan. (Al-Haamilat)

Dan demi kekuatan yang berlari dengan selesa. (Al-Jaariyat)Dan demi kekuatan pembahagi-pembahagi urusan. (Al-Muqassimat)

Ten minutes Quiz 1Draw and name 4 physical topologies use in a computer network ? 8 marks

Name two network technologies for each selected physical topology above. 2 marks

BIW 10103 Introduction to Web TechnologyFirkhan Ali Bin Hamid AliFSKTM, UTHMhttp://groups.yahoo.com/group/biw10103Chapter 3: ROUTING (4 HRS)

ContentsIntroductionIP Addressing : IPv4IP Addressing : IPv6RoutingIntroductionNetwork layer is responsible for the source-to-destination delivery of packet.Network layer need the addressing system to distinguish the source and destination.Provide routing mechanism.

Logical AddressingAt the network layer, a global addressing system that uniquely identifies every host and router is necessary for delivery of a packet from network to network. The Internet address (or IP address) is 32 bits (for IPv4) that uniquely and universally defines a host or router on the internet. The portion of the IP address that identifies the network is called the netid. The portion that identifies the host or router on the network is called the hostid.

Logical Addressing IPv4The address space of IPv4 is 232 or 4,294,967,296.Dotted-decimal notation and binary notation for an IPv4 address

Logical Addressing IPv4 2An IP address defines a devices connection to a network.There are five classes of IP addresses. Classes A, B, and C differ in the number of hosts allowed per network. Class D is for multicasting, and class E is reserved. The class of a network is easily determined by examination of the first byte. The first address in each network is reserved for the network address and the last address is reserved for the broadcast address.Maximum number of hosts vary for each class.Class A has 16,777,214 available hosts (224 2)Class B has 65,534 available hosts (216 2)Class C has 254 available hosts (28 2)

Subnet maskA subnet is a logical grouping of connected network devices. Nodes on a subnet tend to be located in close physical proximity to each other on a LAN.Clue to which network Id it belongs.Class A 255.0.0.0Class B 255.255.0.0Class C 255.255.255.0

Public vs Private IPPublic- considered public if the IP number is valid and falls outside any of the IP address ranges reserved for private uses by Internet standards groups.Private - IP address ranges reserved for private uses by Internet standards groups. private networks

Static VS Dynamic IPStatic = constant IP addressDynamic = Computer is assigned a new IP address each time the customer logs on, they are cost effective and there is automatic network configuration (the less human intervention with network configuration the better).NATNetwork Address Translation.The process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes.A NAT implementation

SubnetSubnetting divides one large network into several smaller ones.

Subnetting adds an intermediate level of hierarchy in IP addressing.

Default masking is a process that extracts the network address from an IP address.

Subnet masking is a process that extracts the subnetwork address from an IP address

IPv6The working standard for the IPv6 protocol was published by the Internet Engineering Task Force (IETF) in 1998. The IETF specification for IPv6 is RFC 2460.The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses. IPv4 currently supports a maximum of approximately 4.3 billion unique IP addresses. IPv6IPv6 addresses are 16 bytes (128 bits) long rather than four bytes (32 bits).IPv6 supports a theoretical maximum of 2128 addresses (340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact!).

IPv6IPv6 and IPv4 share a similar architecture. The majority of transport layer protocols that function with IPv4 will also function with the IPv6 protocol. Most application layer protocols are expected to be interoperable with IPv6 as well, with the notable exception of File Transfer Protocol (FTP). FTP uses embedded network layer addresses to facilitate data transmission. An IPv6 address consists of eight groups of four hexadecimal digits. If a group consists of four zeros, the notation can be shortened using a colon to replace the zeros.IPv6For example, the IPv4 address "192.168.100.32" may appear in IPv6 notation as "0000:0000:0000:0000:0000:0000:C0A8:6420" or "::C0A8:6420".

Logical Addressing IPv6IPv6 128-bit address space, revised header format, new options, an allowance for extension, support for resource allocation and increased security measured.Strategies to handle the transition of IPv4 to IPv6 dual stack, tunneling and header translation.

Layer 3 DevicesRoutersInterconnect network segments or entire networks.Make logical decisions based on IP addresses.Determines best path for data on an internetwork.A.K.A Layer 3 SwitchingRoutingStatic or dynamicDistance-vector and link-state protocolsInterior and exterior

Interior Versus Exterior Routing ProtocolsInterior routing protocols are used within an autonomous systemExterior routing protocols are used between autonomous systems

Routing AlgorithmsStatic routingCalculated beforehand, offlineDefault routingIf I dont recognize the destination, just send the packet to Router XDynamic routing protocolDistance-vector algorithmsLink-state algorithms

Static Routing Example28

e0e0e0s0s1s0s0Router ARouter BRouter CHost AHost CHost B172.16.10.2172.16.30.2172.16.50.2172.16.20.1172.16.40.1172.16.30.1172.16.50.1172.16.20.2172.16.40.2RouterA(config)#ip route 172.16.50.0 255.255.255.0 172.16.20.2Send packets for subnet 50 to 172.16.20.2 (Router B)Default Routing Example

e0e0e0s0s1s0s0Router ARouter BRouter CHost AHost CHost B172.16.10.2172.16.30.2172.16.50.2172.16.20.1172.16.40.1172.16.30.1172.16.50.1172.16.20.2172.16.40.2RouterA(config)#ip route 0.0.0.0 0.0.0.0 172.16.20.2If its not local, send it to 172.16.20.2 (Router B)Distance-Vector RoutingRouter maintains a routing table that lists known networks, direction (vector) to each network, and the distance to each networkRouter periodically (every 30 seconds, for example) transmits the routing table via a broadcast packet that reaches all other routers on the local segmentsRouter updates the routing table, if necessary, based on received broadcasts

Link-State RoutingRouters send updates only when theres a changeRouter that detects change creates a link-state advertisement (LSA) and sends it to neighborsNeighbors propagate the change to their neighborsRouters update their topological database if necessary

Dynamic IP Routing ProtocolsDistance-VectorRouting Information Protocol (RIP) Version 1 and 2Interior Gateway Routing Protocol (IGRP)Enhanced IGRPBorder Gateway Protocol (BGP)

Link-StateOpen Shortest Path First (OSPF)Intermediate System-to-Intermediate System (IS-IS)

ConclusionNetwork layer use connectionless protocol called IP with the classes and classless addressing schema.There is IPv4 and IPv6.It also do routing to the best path in network by using routers.Routing Protocols are used by routers to learn how to reach other networks

ConclusionAvailable routing Protocol includeDistance VectorRIP Routing Information Protocol - IPIGRP Interior Gateway Routing protocolEIGRP Enhanced Interior Gateway Routing ProtocolLink StateOSPF Open Shortest Path FirstIS-IS Intermediate System to Intermediate SystemPath VectorBGP Border Gateway Protocol