Data Comm Part 2.ppt New
Data Comm Part 2.ppt New
4
Internet Protocol Versions(IPv4 & IPv6)
Internet Protocol (IP) Version (IPv4) is currently the most
widely-used version of IP.
It is the only IP protocol that is used to carry user data over
the Internet.
IP version 6(IPv6) is developed and being
implemented in some areas.
IPv6 will operate alongside IPv4 and may replace it in the
future.
IPv4 basic characteristics:
Connectionless -No connection is established before
sending data packets. 5
6
Internet address designers (IPV4) decided to divide the IP
address space into five classes varying in their size.
These are:
Class A
Class B
Class C
Class D
Class E
Each class fixes the boundary between the network prefix and
the host number at a different point within the 32 bit
address.
7
Contd
Finding the class in binary notation
Finding the address class
Finding the class in decimal notation
Netid and Hostid
Class A networks ( /8 )
Have 8 bit network prefix starting with 0 and 7 bit network
number, followed by 24 bit host number.
A maximum of 126 (2^7-2) /8 networks can be defined.
All zeros (00000000) is reserved for default route, & 127 is
reserved for the “loopback” (01111111).
Each network supports a maximum of 16,777,214(2^24-2)
hosts.
All zeros “for this network” and all ones for broadcast number in
each network.
13
Class B networks ( /16 )
Has 16 bit network prefix starting with 10.
14 bit network number & 16 bit host number.
A maximum of 2^14= 16,384 networks can be
defined.
2^16-2= 65,534 hosts per network.
14
Class C networks ( /24 )
15
Dotted decimal notation
Was devised to make Internet addresses easier for
people to read and write.
Shorthand for IP addresses.
Allows humans to avoid binary.
Represents each byte in decimal separating by dots.
Four decimal values per 32 bit addresses.
16
Dotted decimal notation
17
Reserved IPv4 Address Ranges
The IPv4 address range is 0.0.0.0 to 255.255.255.255= 2^32
Not all of these addresses can be used as host addresses.
Experimental Addresses
Ranges from 240.0.0.0 to 255.255.255.254. Reserved for
special purposes (research or experimentation).
Host Addresses
an address range of 0.0.0.0 to 223.255.255.255 is used for
IPv4 hosts. However, within this range are many addresses
that are already reserved for special purposes.
18
Special IPv4 Addresses
Loopback
is a special address that hosts use to direct
traffic to themselves.
Although only the single 127.0.0.1 address is used,
addresses 127.0.0.0 to 127.255.255.255 are
reserved.
Link-Local Addresses
21
Sub netting
Sub netting is the process of creating new networks (or
subnets) by stealing/borrowing bits from the host portion of a
subnet mask. stealing bits from hosts creates more networks
but fewer hosts per network.
22
Subnet mask
The subnet mask is created by placing a binary 1 in each bit
position that represents the network portion and placing a
binary 0 in each bit position that represents the host portion.
Identifies how much of the address spaces are used for the
network and for the host.
Identifies Prefix / suffix boundary.
1 bits cover prefix and 0 bits cover suffix
• 10000010.00000101.00000101.00011001= 130.5.5.25/24
• 11111111.11111111.11111111.00000000 = 255.255.255.0
Default subnet mask for class A = 255.0.0.0
Default subnet mask for class B = 255.255.0.0
Default subnet mask for class C = 255.255.255.0
23
Comparison of a default mask and
a subnet mask
26
Slash notation
29
Classless Inter domain Routing (CIDR)
Example:
A middle size ISP has assigned an address 71.94.0.0/15,
means 15 bits network ID and 17 bits host address.
It was assigned from a large size ISP
71.94.0.0/15 has 131,070 possible host addresses (2^17-2).
It is possible to create 2 subnets using 1 bite from the host
part = 71.94.0.0/16 and 71.95.0.0/16, each with 2^16-2
(65534) host addresses.
30
Data Link Layer
It is the responsible of node to node delivery of messages.
Functions of DLL
Framing: The layer which divides the stream of packets
received from the network layer into manageable data units
called frames.
Physical Addressing it adds physical address of sender and
receiver in the head of each frame.
Error control and Flow control
33
Multiple-Bit Error:
34
Error detection
Error Detection techniques allow to the destination to detect
errors.
Sometimes undetected errors will still remain but the goal is to
minimize these errors.
Error Detection mechanisms
Parity Check
CRC
Check sum
35
Parity check- method
A parity bit is added to every data unit so that the total number of
36
Example
the CRC.
We assume that:
39
Error correction
Flow control
Flow Control: refers to a set of procedures used to restrict
the amount of data that the sender can send before waiting for
acknowledgment.
Is the process of rate of data transmission between two nodes to
acknowledgment.
44
Explanation- GB4
...
3 2 1 0 Sender Receiver
0
0 1 2 3 0 1 2 3
1
Sender Receiver
Data-0
Data-1
Data-2
.
. Data-3
47
Physical Layer
Physical layer coordinates the functions required to carry
a bit stream over a physical medium. It deals with the
mechanical and electrical specifications of the interface
and transmission medium.
Functions of Physical layer
Representation of bits
Physical topology
Transmission mode