Sie sind auf Seite 1von 20

IINTERNET PROTOCOL (IIP) NTERNET PROTOCOL ( P)

IINTRODUCTIION TO NETWORKS:: A network is a group of NTRODUCT ON TO NETWORKS connected, communicating devices such as computers and printers. The basic idea of having a network is for sharing resources and data, having access to remote information, person-to-person communication and interactive entertainment. The connection between the computers need not be just copper wire; fiber optics, microwaves, and communication satellites can also be used. Data transfer over the network is in the form of units called as Packets, which is a collection of bits. CLASSIIFIICATIION OF NETWORKS BASED ON SIIZE//SCALE:: CLASS F CAT ON OF NETWORKS BASED ON S ZE SCALE LAN: LAN is an acronym for Local Area Networks. Generally, LANs are privately owned networks of a company or a factory and are restricted to a single building or campus. The distance of a LAN ranges from 10 meters to 1 km. MAN: MAN is an acronym for Metropolitan Area Networks. It might cover a group of nearby corporate offices or a city and might be either private or public. MANs cover a distance of up to 10 km. WAN: WAN is an acronym for Wide Area Networks. A WAN spans a large geographical area, often a country or continent. A WAN across a country would go up to 100 km and in a Continent would go up to 1,000 km. INTERNETWORK: An internetwork is formed when incompatible, distinct networks are connected together. Connecting a LAN and a WAN or connecting two LANs forms an internetwork. An internetwork stretches across the Planet and covers a distance of up to 10,000 km. The Internet is an example of Internetworks.

CLASSIFICATION OF NETWORKS BASED ON TRANSMISSION CLASSIFICATION OF NETWORKS BASED ON TRANSMISSION TECHNOLOGY:: TECHNOLOGY A) Broadcast Networks: These networks have a single communication channel that is shared by all machines in the network. Short messages, called packets sent by any machine on the network are received by all others. Upon receiving a packet, a machine checks the address field. If a packet is intended for itself, it processes the packet; if the packet is intended for some other machine, it is just ignored. This type of one-to-one addressing is called as Unicasting. For example consider someone standing at the end of the corridor with many rooms off it shouting, Julia, come here . Although the voice (packet) may actually be heard (received) by many people only Julia will respond. Broadcasts systems also allow a single message to be processed by every machine on the network. . This type of oneto-all addressing is called as Broadcasting. A singer singing in front of an audience is an example of Broadcasting. A specific type of broadcasting is called as Multicasting. In multicasting a set of machines can subscribe to a group. Whenever a message is sent to a group it is delivered to all machines, which have subscribed to a group. An example would be, an airport announcement asking all flight 644 passengers to report to gate 10.Only passengers meant for flight 644 will respond. This is one-to-many type of addressing. B)) Poiintt tto--Poiintt Nettworks:: They consist of many connections B Po n o Po n Ne works between individual pairs of machines. To go from source to destination, a packet on this type of network may have to first visit one or more intermediate machines. Often multiple routes of different lengths are possible. As a general rule, smaller, geographically localized networks tend to use broadcasting, whereas larger networks usually are point-to-point. ETHERNET : It is the most widely used local area network protocol. ETHERNET The data transmission speed of the Ethernet can go upto 10 Mbps and follows bus topology. Generally LANs in a company will be ETHERNET based.

There is another kind of ETHERNET network called as GigaBit Ethernet, which is used when data transfer rates in the range of 1000 Mbps (1 gigabit per second) is required. The ETHERNET complies with the IEEE 802.3 standards. NETWORK IINTERFACE CARD : On an Ethernet network each NETWORK NTERFACE CARD station such as a Server, workstation, or printer has its own Network Interface Card (NIC). The NIC fits inside the station and provides the station with a 6-byte physical address. The Ethernet address is 6 bytes (48 bits) that are normally written in hexadecimal notation with a hyphen to separate bytes as shown here: 07-01-02-01-2C-4B. Physical addresses are also called as MAC (Media Access as Control) addresses. MAC addresses are sometimes called as burned-in-addresses (BIAs) because they are burned into read-only memory (ROM) and are copied into random-access-memory (RAM) when the interface card initializes. CONNECTIION--ORIIENTED AND CONNECTIIONLESS NETWORK CONNECT ON OR ENTED AND CONNECT ONLESS NETWORK SERVIICES:: SERV CES Connection-oriented service is modeled after the telephone system. To talk to someone, you pick up the phone, dial the number, talk, and then hang up. Similarly, to use a connection- oriented network service, the service user first establishes a connection, uses the connection, and then releases the connection. In contrast, Connectionless service is modeled after the postal system. Each message (letter) carries the full destination address, and each one is routed through the system independent of all others. Normally, when two messages are sent to the same destination, the first one will be the first one to arrive. However, it is possible that the first one sent can be delayed so that the second one arrives first. With a connection-oriented service this is impossible.

TCP//IIP PROTOCOL SUIITE : The TCP/IP protocol suite allows TCP P PROTOCOL SU TE computers of all types, from many different computer vendors, running totally different operating systems, to communicate with each other. It forms the basis for what is Internet. TCP stands for Transmission Control Protocol. IP TCP stands for Internetworking Protocol. LAYERS IIN THE TCP//IIP MODEL : LAYERS N THE TCP P MODEL

TCP is applied to the Transport Layer. It is a connection-oriented protocol. IP is applied to the Network layer. It is a connectionless datagram (data in packets) protocol.

IIP ADDRESSES:: An IP address is a 32 bit binary address that P ADDRESSES uniquely and universally defines the connection of a PC or a hardware device in any network. . However 2 devices on entirely different networks can have the same IP address. This is possible by a concept called as NAT Network Address Translation in networks. A protocol like IP that defines addresses has an address space. An address space is the total number of

addresses used by the protocol. If a protocol uses N bits to define an address, the address space is 2 32. IPV4 uses 32 bit addresses. Binary Notation of IP Addresses: Here the IP address is displayed as 32 bits. For e.g. 10000000 00001011 00000011 00011111

Dotted Decimal Notation: To make the IP addresses more compact and easier to read, Internet addresses are usually written in decimal form with a decimal point (dot) separating the bytes. 10000000 00001011 00000011 00011111

128.11.3.31 Quiz 1: Change the following IP addresses from binary notation to dotteddecimal notation. a. 10000001 b. 11000001 00001011 10000011 00001011 00011011 11101111 11111111

Find answers at the end of the Newsletter. Quiz 2: Change the following IP addresses from dotted-decimal notation to binary notation a. 111.56.45.78 b. 221.34.7.82 Find answers at the end of the Newsletter.

Quiz 3: Find the error, if any, in the following IP addresses: a. 111.56.045.78 b. 221.34.7.8.20 c. 75.45.301.14 d. 11100010.23.14.67 Find answers at the end of the Newsletter CLASSFUL ADDRESSIING : The IP address space is divided into five CLASSFUL ADDRESS NG classes. : A, B, C, D and E. If the address is given in binary notation, the first few bits can immediately tell us the class of the address.

Finding the class in Binary Notation :

Finding the Class in Decimal Notation:

Quiz 4: Find the class of each address: a. 227.13.15.88 b. 193.15.59.24 c. 14.23.120.8 d. 252.6.16.112 e. 134.12.79.57 Find answers at the end of the Newsletter.

Netid and Hostid: In classful addressing, an IP address in classes A, B, and C is divided into netid and hostid. The netid or network address is used to identify the organization to the rest of the Internet.The Hostid is the id of the Computer or hardware device.

Netid in CLASS A: In the case of CLASS A, Byte 1 represents the Network Address. Note that the first byte is same (75) for all the PCs in the following diagram.

75.0.0.1

75.255.255.254

75..8..17..2 75 8 17 2

Netid in CLASS B: In the case of CLASS B, Byte 1 and 2 represent the Network Address. Note that the first 2 bytes (180.8) are the same for all the PCs. 180.8.0.1 180.8.255.254

180..8..17..2 180 8 17 2

Netid in CLASS C: In the case of CLASS C, Bytes 1, 2 and 3 represent the Network Address. Note that the first 3-byte (200.11.8) is same for all the PCs

200.11.8.0

200.11.8.45

200..11..8..254 200 11 8 254

Quiz 5 : Which of the following addresses does not belong to the same network ( no subnetting) ? Explain why . 123.4.6.2 123.4.78.9 132.14.56.12 123.4.0.0

Find answer at end of Newsletter. SUBNETTIING ::IP addresses are designed with 2 levels of heirarchy SUBNETT NG i.e the netid and hostid. But in this case , there cannot be more than one physical network , as shown in the diagram below.

However, in many cases , these 2 levels of hierarchy are not enough. In subnetting , a network is divided into several smaller subnetworks (or subnet) having its own subnetwork address. The diagram below shows Addreses in a network with and without subnetting.

The figure below has 4 subnetworks. It has three levels of hierarchy namely , Network, Subnet and Host. R1,R2 and R3 are routers.

In the above network , the rest of the Internet is not aware that the network is divided into physical subnetworks.The subnetworks still appear as a single network to the rest of the Internet. MASKIING : This is the process used to find out the Network address MASK NG from a given IP address. Mask is a 32 bit number which is applied to a IP address to obtain the Network Address.

ROUTERS:: Routers connects an independent LAN or WAN to ROUTERS create an Internetwork. Routers are used to implement Gateways and hence the terms are used interchangeably.

TELNET:: It is an abbreviation of TERminaL NETwork.The telnet TELNET protocol is used to establish an on-line connection to a remote machine. We can use this connection for configuring some parameters of the remote machine. ECHO REQUEST and REPLY MESSAGES:: These messages are ECHO REQUEST and REPLY MESSAGES designed for diagnostic purposes. This message can be used by a host to see if another host is reachable. The PING command is an example of echo request and echo reply messages. The following output is displayed when we type the command ping 192.192.192 .23 -t at the dos prompt.The output shows that the PC with the IP address 192.192.192.23 is reachable from the PC where the ping command was given . Press Ctrl+C to come out of this process.

Address Resolluttiion Prottocoll ((ARP)):: ARP is used to find the Address Reso u on Pro oco ARP physical address of the node when its IP address is known. ARP request is multicast. ARP reply is Unicast. Reverse address Resolluttiion Prottocoll ((RARP)):: This allows a Reverse address Reso u on Pro oco RARP host/PC to discover its Internet Address when it knows only its Physical address. It is used when a computer or any hardware/station is connected to the network for the first time.

IIP iin VeriinetLiite based M5E1 Access Controll SYSTEM: P n Ver netL te based M5E1 Access Contro SYSTEM:
The VerinetLite software has a component called as Polling Station. The Polling Station is the module that connects to the Door Control Units (M5E1). It scans all the DCUs for any events/alarms and downloads any settings configured by the Operator. Each Polling Station must be given a Unique IP address when we use VerinetLite software.

An ordinary PC has 3 NIC (Ethernet Cards). So 3 polling stations can run on 1 PC. In case of a server 4 NICs can be added and hence 4 Polling stations can run on 1 PC. Each Polling station can be connected to 120 M5E1s on a LAN. Each M5E1 connected to the polling station on the LAN must have a Unique IP address.

In the diagram shown above assume 1 Polling station is running on the PC. Each of the M5E1 connected to the LAN is monitored by this Polling station. Each of these M5E1 will have a unique IP address. There can be an RS485 network behind each of these M5E1, which in turn can support upto 8 M5E1. So every M5E1 with an IP on the LAN can support 1 network. Each of the M5E1 directly connected to LAN will be fitted with a Lantronix Port, which is connected to the Jumper 7 of the M5E1 board. The picture below is that of Lantronix Port.

Each of the Lantronix Port has a MAC (Media Access Control) address on it. The Lantronix Port (Cobox-Micro or Device Server) is connected to the LAN by using a RJ45 network interface available on it. We have to get a set of available /free IP addresses from the company where we will be installing the VerinetLite System. Then we use ARP for linking the MAC address of a Cobox Micro on an M5E1 to a free IP. We give the command arp s Internet Address Mac Address at the DOS prompt. For e.g. we use arp s 192.192.192.216 00-204A-63-6A-5E. The next step would be telnet 192.192.192.216 1. The IP address set now will vanish when the power goes off. In order to make the IP address permanent for the Lantronix port we have to configure the Device Server using a web Browser We have to type the temporary IP address of the Lantronix port (e.g. 192.192.192.216) in a web browser. In the screens, which follow, we have to re-enter the IP address, The Subnet Mask and Gateway. After a few more settings the Cobox-Micro would have been configured to communicate with an IP address. There are other components of VerinetLite software like server and database. Each of them must be given an IP, which is available on the PC, where they have been installed. In the Client Part of the software we have to specify the IP address of the Server.

IIP CAMERAS:: IP cameras can be installed anywhere on the LAN. P CAMERAS Each camera will have its own unique IP address. We do not require a separate PC for installing the software for the camera. The camera comes with an inbuilt Web server and also an Operating System e.g. Linux.Hence we can view the contents of the camera on any PC, by logging into any standard browser like Netscape Navigator or Internet Explorer.

Advantages of IP cameras: Feature Flexibility Network (IP) Camera Place it anywhere. You can connect the network camera to the network, modem, cell phone, or wireless adapter. Everything needed to view Live images over the network is available in the camera itself You set the IP address and youre up and running

Functionality Installation

Ease of use Stability Price Quality

You can administer and view the images using a standard web browser on any PC. It works without any additional components and hence has greater stability The cost of the Network Camera only High Picture quality using motion JPEG

SOLUTIIONS TO QUIIZ:: SOLUT ONS TO QU Z Quiiz 1--key:: Qu z 1 key We have to replace each group of 8 bits with its equivalent decimal number and add dots for separation. a) 129.11.11.239 b)) 193.131.27.255 b Quiiz 2--key:: Qu z 2 key We replace each decimal number with its binary equivalent a) 01101111 b) 11011101 Quiiz 3--key:: Qu z 3 key a. There are no leading zeroes in dotted decimal notation(045) b. We may not have more than 4 numbers in an IP address. c. In dotted-decimal notation , each number is less than or equal to 255; 301 is outside this range d. A mixture of binary notation and dotted decimal notation is not allowed. 00111000 00100010 00101101 00000111 01001110 01010010

Quiiz 4--key:: Qu z 4 key a. b. c. d. e. The first byte is 227 (between 224 and 239); the class is D The first byte is 193 (between 192 and 223); the class is C The first byte is 14 ( between 0 and 127); the class is A The first byte is 252( between 240 and 255) ; the class is E The first byte is 134(between 128 and 191) ; the class is B.

Quiiz 5--key:: Qu z 5 key The first byte for 123.4.6.2, 123.4.78.9 and 123.4.0.0 is 123. Hence it belongs to CLASS A address space. But the first byte for 132.14.56.12 is 132. Hence it belongs to CLASS B.So the IP address 132.14.56.12 is the odd id.

************************* *************************

Das könnte Ihnen auch gefallen