Training Report NHPC
Training Report NHPC
NHPC LIMITED
Report Submitted by: ANIRUDH SANGWAN 7105 Report for 6 Weeks Summer Training after 6th Semester.
ACKNOWLEDGEMENT
I take great privilege in conveying my heartiest gratitude to Mr.Girish Sharma for giving me the opportunity to undertake this project work in their company. The successful completion of the project work rendered was made possible by the valuable guidance of the supervision. I am grateful to him for his active and warm interest, which encouraged me to overcome difficulties encountered in preparation of this project.
Last but not the least, I would like to thank the staff members of the NHPC Limited who cooperated with me during the entire project.
ANIRUDH
7105(ECE 6th SEM.)
Network
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.
Area Networks
Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. Local area networks (LANs), for example, typically reach across a single home, whereas wide area networks (WANs), reach across cities, states, or even across the world. The Internet is the world's largest public WAN.
Network Design
Computer networks also differ in their design. The two types of high-level network design are called clientserver and peer-to-peer. Client-server networks feature centralized server computers that store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same functions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes. A network topology represents its layout or structure from the point of view of data flow. In so-called bus networks, for example, all of the computers share and communicate across one common conduit, whereas in a star network, all data flows through one centralized device. Common types of network topologies include bus, star, ring and mesh.
Network Protocols
In networking, the communication language used by computer devices is called the protocol. Yet another way to classify computer networks is by the set of protocols they support. Networks often implement multiple protocols to support specific applications. Popular protocols include TCP/IP, the most common protocol found on the Internet and in home networks.
OSI Model
Definition: The OSI model defines internetworking in terms of a vertical stack of seven layers. The
upper layers of the OSI model represent software that implements network services like encryption and
connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control. In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI model stack to the bottom layer, then traveses the network connection to the bottom layer on the receiving side, and up its OSI model stack. The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI model remains a practical framework for today's key network technologies like Ethernet and protocols like IP.
Network topology is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes.[1] [2] [3] A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN will have one or more links to one or more other nodes in the network and the mapping of these links and nodes onto a graph results in a geometrical shape that determines the physical topology of the network. Likewise, the mapping of the flow of data between the nodes in the network determines the logical topology of the network. It is important to note that the physical and logical topologies might be identical in any particular network but they also may be different. Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. LAN Network Topology is, therefore, technically a part of graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical [2].
Bus (Linear, Linear Bus) Star Ring Mesh o partially connected mesh (or simply 'mesh') o fully connected mesh Tree Hybrid Point to Point
Point-to-point
The simplest topology is a permanent link between two endpoints. Switched point-to-point topologies are the basic model of conventional telephony. The value of a permanent point-to-point network is the value of guaranteed, or nearly so, communications between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of potential pairs of subscribers, and has been expressed as Metcalfe's Law. Permanent (dedicated) Easiest to understand, of the variations of point-to-point topology, is a point-to-point communications channel that appears, to the user, to be permanently associated with the two endpoints. Children's "tin-can telephone" is one example, with a microphone to a single public address speaker is another. These are examples of physical dedicated channels. Within many switched telecommunications systems, it is possible to establish a permanent circuit. One example might be a telephone in the lobby of a public building, which is programmed to ring only the number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a physical circuit between the two points. The resources in such a connection can be released when no longer needed, as, for example, a television circuit from a parade route back to the studio. Switched: Using circuit-switching or packet-switching technologies, a point-to-point circuit can be set up dynamically, and dropped when no longer needed. This is the basic mode of conventional telephony.
Bus
Linear bus
The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously (disregarding propagation delays)[1][3]. Note: The two endpoints of the common transmission medium are normally terminated with a device called a terminator that exhibits the characteristic impedance of the transmission medium and which dissipates or absorbs the energy that remains in the signal to prevent the signal from being reflected or propagated back onto the transmission medium in the opposite direction, which would cause interference with and degradation of the signals on the transmission medium (See Electrical termination). Distributed bus The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium the physical distributed bus topology functions in exactly the same fashion as the physical linear bus topology (i.e., all nodes share a common transmission medium). Notes: 1.) All of the endpoints of the common transmission medium are normally terminated with a device called a 'terminator' (see the note under linear bus). 2.) The physical linear bus topology is sometimes considered to be a special case of the physical distributed bus topology i.e., a distributed bus with no branching segments. 3.) The physical distributed bus topology is sometimes incorrectly referred to as a physical tree topology however, although the physical distributed bus topology resembles the physical tree topology, it differs from the physical tree topology in that there is no central node to which any other nodes are connected, since this hierarchical functionality is replaced by the common bus.
Star
The type of network topology in which each of the nodes of the network is connected to a central node with a point-to-point link in a 'hub' and 'spoke' fashion, the central node being the 'hub' and the nodes that are attached to the central node being the 'spokes' (e.g., a collection of point-to-point links from the peripheral nodes that converge at a central node) all data that is transmitted between nodes in the network is transmitted to this central node, which is usually some type of device that then retransmits the data to some or all of the other nodes in the network, although the
central node may also be a simple common connection point (such as a 'punch-down' block) without any active device to repeat the signals. Notes: 1.) A point-to-point link (described above) is sometimes categorized as a special instance of the physical star topology therefore, the simplest type of network that is based upon the physical star topology would consist of one node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which node is the 'spoke' being arbitrary [1]. 2.) After the special case of the point-to-point link, as in note 1.) above, the next simplest type of network that is based upon the physical star topology would consist of one central node the 'hub' with two separate point-topoint links to two peripheral nodes the 'spokes'. 3.) Although most networks that are based upon the physical star topology are commonly implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to implement a network that is based upon the physical star topology using a computer or even a simple common connection point as the 'hub' or central node however, since many illustrations of the physical star network topology depict the central node as one of these special devices, some confusion is possible, since this practice may lead to the misconception that a physical star network requires the central node to be one of these special devices, which is not true because a simple network consisting of three computers connected as in note 2.) above also has the topology of the physical star. 4.) Star networks may also be described as either broadcast multi-access or nonbroadcast multi-access (NBMA), depending on whether the technology of the network either automatically propagates a signal at the hub to all spokes, or only addresses individual spokes with each communication. Extended star A type of network topology in which a network that is based upon the physical star topology has one or more repeaters between the central node (the 'hub' of the star) and the peripheral or 'spoke' nodes, the repeaters being used to extend the maximum transmission distance of the point-to-point links between the central node and the peripheral nodes beyond that which is supported by the transmitter power of the central node or beyond that which is supported by the standard upon which the physical layer of the physical star network is based. Note: If the repeaters in a network that is based upon the physical extended star topology are replaced with hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies. Distributed Star A type of network topology that is composed of individual networks that are based upon the physical star topology connected together in a linear
fashion i.e., 'daisy-chained' with no central or top level connection point (e.g., two or more 'stacked' hubs, along with their associated star connected nodes or 'spokes').
Ring
The type of network topology in which each of the nodes of the network is connected to two other nodes in the network and with the first and last nodes being connected to each other, forming a ring all data that is transmitted between nodes in the network travels from one node to the next node in a circular manner and the data generally flows in a single direction only. Dual-ring The type of network topology in which each of the nodes of the network is connected to two other nodes in the network, with two connections to each of these nodes, and with the first and last nodes being connected to each other with two connections, forming a double ring the data flows in opposite directions around the two rings, although, generally, only one of the rings carries data during normal operation, and the two rings are independent unless there is a failure or break in one of the rings, at which time the two rings are joined (by the stations on either side of the fault) to enable the flow of data to continue using a segment of the second ring to bypass the fault in the primary ring.
Mesh
The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law. Full Fully connected The type of network topology in which each of the nodes of the network is connected to each of the other nodes in the network with a point-to-point link this makes it possible for data to be simultaneously transmitted from any single node to all of the other nodes. Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected [3]. Partial Partially connected The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-topoint link this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.
Note: In most practical networks that are based upon the physical partially connected mesh topology, all of the data that is transmitted between nodes in the network takes the shortest path (or an approximation of the shortest path) between nodes, except in the case of a failure or break in one of the links, in which case the data takes an alternate path to the destination. This requires that the nodes of the network possess some type of logical 'routing' algorithm to determine the correct path to use at any particular time.
operations on behalf of other nodes than the nodes that are lower in the hierarchy.
as there is no common linear bus within the topology, although the top level 'hub' which is the beginning of the physical hierarchical star topology may be connected to the backbone of another network, such as a common carrier, which is, topologically, not considered to be a part of the local network if the top level central node is connected to a backbone that is considered to be a part of the local network, then the resulting network topology would be considered to be a hybrid topology that is a mixture of the topology of the backbone network and the physical hierarchical star topology. 2.) The physical hierarchical star topology is also sometimes incorrectly referred to as a physical tree topology, since its physical topology is hierarchical, however, the physical hierarchical star topology does not have a structure that is determined by a branching factor, as is the case with the physical tree topology and, therefore, nodes may be added to, or removed from, any node that is the 'hub' of one of the individual physical star topology networks within a network that is based upon the physical hierarchical star topology. 3.) The physical hierarchical star topology is commonly used in 'outside plant' (OSP) cabling to connect various buildings to a central connection facility, which may also house the 'demarcation point' for the connection to the data transmission facilities of a common carrier, and in 'inside plant' (ISP) cabling to connect multiple wiring closets within a building to a common wiring closet within the same building, which is also generally where the main backbone or trunk that connects to a larger network, if any, enters the building. Star-wired ring A type of hybrid physical network topology that is a combination of the physical star topology and the physical ring topology, the physical star portion of the topology consisting of a network in which each of the nodes of which the network is composed are connected to a central node with a point-to-point link in a 'hub' and 'spoke' fashion, the central node being the 'hub' and the nodes that are attached to the central node being the 'spokes' (e.g., a collection of point-to-point links from the peripheral nodes that converge at a central node) in a fashion that is identical to the physical star topology, while the physical ring portion of the topology consists of circuitry within the central node which routes the signals on the network to each of the connected nodes sequentially, in a circular fashion. Note: In an 802.5 Token Ring network the central node is called a Multistation Access Unit (MAU). Hybrid mesh A type of hybrid physical network topology that is a combination of the physical partially connected topology and one or more other physical topologies the mesh portion of the topology consisting of redundant or alternate connections between some of the nodes in the network the physical hybrid mesh topology is commonly used in networks which require a high degree of availability..
Unshielded Twisted Pair (UTP) Cable Shielded Twisted Pair (STP) Cable Coaxial Cable Fiber Optic Cable Wireless LANs Cable Installation Guides
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated five categories of wire.
Use Voice Only (Telephone Wire) Data to 4 Mbps (LocalTalk) Data to 10 Mbps (Ethernet) Data to 20 Mbps (16 Mbps Token Ring) Data to 100 Mbps (Fast Ethernet)
Buy the best cable you can afford; most schools purchase Category 3 or Category 5. If you are designing a 10 Mbps Ethernet network and are considering the cost savings of buying Category 3 wire instead of Category 5, remember that the Category 5 cable will provide more "room to grow" as transmission technologies increase. Both Category 3 and Category 5 UTP have a maximum segment length of 100 meters. In Florida, Category 5 cable is required for retrofit grants. 10BaseT refers to the specifications for unshielded twisted pair cable (Category 3, 4, or 5) carrying Ethernet signals. Category 6 is relatively new and is used for gigabit connections.
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial. Thin coaxial cable is also referred to as thin net. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable is popular in school networks, especially linear bus networks. Thick coaxial cable is also referred to as thick net. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install.
Outer insulating jacket is made of Teflon or PVC. Kevlar fiber helps to strengthen the cable and prevent breakage. A plastic coating is used to cushion the fiber center. Center (core) is made of glass or plastic fibers.
Cable Type Unshielded Twisted Pair Thin Coaxial Thick Coaxial Fiber Optic Unshielded Twisted Pair Unshielded Twisted Pair
Maximum length 100 meters 185 meters 500 meters 2000 meters 100 meters 220 meters
10Mbps Networking
Standard Cable Type Segment Length 185 meters 100 meters 2000 meters Connector Topology BNC RJ-45 SC/ST Physical bus Physical star Physical star IEEE Standard 803.2a
10BaseFL Fiber-optic
Notes on 10Base2
10Base2 networks follow the 5-4-3 rule whereby there is a maximun of 5 network segments allowed, using a maximum of 4 repeaters. Only 3 of the 5 permitted segments may be populated. Each populated 10Base2 segment is limited to a maximum of 30 attached nodes.
Notes on 10BaseT
10BaseT networks follow the 5-4-5 rule whereby there is a maximum of 5 network segments allowed, using a maximum of 4 repeaters. All 5 segments may be populated with nodes.
100BaseTX Category 5 UTP 100 meters 100BaseT4 Category 3, 4, 5 100 meters UTP 412 meters / Multimode fiber 10000 meters / Single-mode fiber 2000 meters
Multimode 100BaseFX Single-mode fiber-optic FDDI Fiber Optic / Twisted Pair (CDDI)
SC, ST
802.3u
SC, ST
Fiber connectors 802.3z Fiber connectors 802.3z 9-pin shielded connector 8-pin fiber channel type 2 connector 75 meters
802.3z
1000BaseT
UTP Category 5
75 meters
802.3ab
10 Gigabit Ethernet
Standard Transmission Type Distance 33m / 300m 10000 meters Cable type Connector IEEE Standard 802.3ae 802.3ae 50 micron / 62.5 Fiber micron multimode connectors Single-mode fiber Fiber connectors
10GBBaseER Baseband
40000 meters
Single-mode fiber
Fiber connectors
802.3ae
System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.
Model
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The
Application (Layer 7)
Presentation (Layer 6)
Session (Layer 5)
Transport (Layer 4)
Network (Layer 3)
LLC layer controls frame synchronization, flow control and error checking. This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
Physical (Layer 1)
The five-layer TCP/IP model 5. Application layer DHCP DNS FTP Gopher HTTP IMAP4 IRC NNTP XMPP POP3 RTP SIP SMTP SNMP SSH TELNET RPC RTCP RTSP TLS (and SSL) SDP SOAP GTP STUN NTP (more) 4. Transport layer TCP UDP DCCP SCTP RSVP ECN (more) 3. Network/internet layer IP (IPv4 IPv6) OSPF IS-IS BGP IPsec ARP RARP RIP ICMP ICMPv6 IGMP (more) 2. Data link layer
802.11 (WLAN) 802.16 Wi-Fi WiMAX ATM DTM Token ring Ethernet FDDI Frame Relay GPRS EVDO HSPA HDLC PPP PPTP L2TP ISDN ARCnet LLTD (more) 1. Physical layer Ethernet physical layer RS-232 SONET/SDH G.709 Optical fiber Coaxial cable Twisted pair
INTERNET
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANET. The original aim was to create a network that would allow users of a research computer at one university to be able to "talk to" research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster. Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of the total resources of the currently existing public telecommunication networks. Technically, what distinguishes the Internet is its use of a set of protocols called TCP/IP (for Transmission Control Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and the extranet, also make use of the TCP/IP protocol. For many Internet users, electronic mail (e-mail) has practically replaced the Postal Service for short written transactions. Electronic mail is the most widely used application on the Net. You can also carry on live "conversations" with other computer users, using Internet Relay Chat (IRC). More recently, Internet telephony hardware and software allows real-time voice conversations. The most widely used part of the Internet is the World Wide Web (often abbreviated "WWW" or called "the Web"). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web sites, certain words or phrases appear in text of a different color than the rest; often this text is also underlined. When you select one of these words or phrases, you will be transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that are "clickable." If you move the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that you can click and be transferred to another site. Using the Web, you have access to millions of pages of information. Web browsing is done with a Web browser, the most popular of which are Microsoft Internet Explorer and Netscape Navigator. The appearance of a particular Web site may vary slightly depending on the browser you use. Also, later versions of a particular browser are able to
render more "bells and whistles" such as animation, virtual reality, sound, and music files, than earlier versions.
INTRANET
- An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another. Typically, larger enterprises allow users within their intranet to access the public Internet through firewall servers that have the ability to screen messages in both directions so that company security is maintained. When part of an intranet is made accessible to customers, partners, suppliers, or others outside the company, that part becomes part of an extranet.
Bandwidth
Bandwidth can mean different things in the related fields of computer networks,
communication theory, signal processing, and linear algebra. (The first two meanings are related by the ShannonHartley theorem.)
Bandwidth (signal processing) a measure of the width of a range of frequencies, measured in hertz Bandwidth (computing) a rate of data transfer, measured in bits per second Bandwidth of a sparse matrix the distribution of nonzero terms around the diagonal of a matrix
IP address
The five-layer TCP/IP model
5. Application layer DHCP DNS FTP Gopher HTTP IMAP4 IRC NNTP XMPP POP3 RTP SIP SMTP SNMP SSH TELNET RPC RTCP RTSP TLS (and SSL) SDP SOAP GTP STUN NTP (more) 4. Transport layer TCP UDP DCCP SCTP RSVP ECN (more) 3. Network/internet layer IP (IPv4 IPv6) OSPF IS-IS BGP IPsec ARP RARP RIP ICMP ICMPv6 IGMP (more) 2. Data link layer 802.11 (WLAN) 802.16 Wi-Fi WiMAX ATM DTM Token ring Ethernet FDDI Frame Relay GPRS EVDO HSPA HDLC PPP PPTP L2TP ISDN ARCnet LLTD (more) 1. Physical layer Ethernet physical layer RS-232 SONET/SDH G.709 Optical fiber Coaxial cable Twisted pair (more)
This box: view talk edit
An IP address (or Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)in simpler terms, a computer address. Any participating network deviceincluding routers, switches, computers, infrastructure servers (e.g., NTP, DNS, DHCP, SNMP, etc.), printers, Internet fax machines, and some telephonescan have its own address that is unique within the scope of the specific network. Some IP addresses are intended to be unique within the scope of the global Internet, while others need to be unique only within the scope of an enterprise. The IP address acts as a locator for one IP device to find another and interact with it. It is not intended, however, to act as an identifier that always uniquely identifies a particular device. In current practice, an IP address is not always a unique identifier, due to technologies such as dynamic assignment and network address translation. IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises.
IP versions
The Internet Protocol (IP) has two versions currently in use (see IP version history for details). Each version has its own definition of an IP address. Because of its prevalence, "IP address" typically refers to those defined by IPv4.
IP version 4 addresses
IPv4 only uses 32-bit (4-byte) addresses, which limits the address space to 4,294,967,296 (232) possible unique addresses. However, many are reserved for special purposes, such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). This reduces the number of addresses that can be allocated as public Internet addresses, and as the number of addresses available is consumed, an IPv4 address shortage appears to be inevitable in the long run. This limitation has helped stimulate the push towards IPv6, which is currently in the early stages of deployment and is currently the only contender to replace IPv4. IPv4 addresses are usually represented in dotted-decimal notation (four numbers, each ranging from 0 to 255, separated by dots, e.g. 147.132.42.18). Each range from 0 to 255 can be represented by 8 bits, and is therefore called an octet. It is possible, although less common, to write IPv4 addresses in binary or hexadecimal. When converting, each octet is treated as a separate number. (So 255.255.0.0 in dot-decimal would be FF.FF.00.00 in hexadecimal.)
Class A networks (the largest) are identified by the first octet, which ranges from 1 to 126.(127 is reserved for loopback) Class B networks are identified by the first two octets, the first of which ranges from 128 to 191. Class C networks (the smallest) are identified by the first three octets, the first of which ranges from 192 to 223. Network Host Possible number of Possible number
ID
ID
networks
b.c.d
126 = (27 - 2)
128 - 191
a.b
c.d
16,382 = (214 - 2)
192 - 223
a.b.c
First octet 127 represents the local computer, regardless of what network it is really in. This is useful when testing internal operations. First octet 224 and above are reserved for special purposes such as multicasting.
Octets 0 and 255 are not acceptable values in some situations, but 0 can be used as the second and/or third octet (e.g. 10.2.0.100). A class A network does not necessarily consist of 16 million machines on a single network, which would excessively burden most network technologies and their administrators. Instead, a large company is assigned a class A network, and segregates it further into smaller sub-nets using Classless Inter-Domain Routing. However, the class labels are still commonly used as broad descriptors.
10.0.0.0
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
Each block is not necessarily one single network, although it is possible. Typically the network administrator will divide a block into subnets; for example, many home routers automatically use a default address range of 192.168.0.0 - 192.168.0.255 (192.168.0.0/24).
IP version 6 addresses
IPv6 is a new standard protocol intended to replace IPv4 for the Internet. Addresses are 128 bits (16 bytes) wide, which, even with a generous assignment of netblocks, will more than suffice for the foreseeable future. In theory, there would be exactly 2128, or about 3.403 1038 unique host interface addresses. Further, this large address space will be sparsely populated, which makes it possible to again encode more routing information into the addresses themselves. Example: 2001:0db8:85a3:08d3:1319:8a2e:0370:7334 Writing for Technology Review in 2004, Simson Garfinkel wrote notes that there will exist "roughly 5,000 addresses for every square micrometer of the Earth's surface".[1] This enormous magnitude of available IP addresses will be sufficiently large for the indefinite future, even though mobile phones, cars and all types of personal devices are coming to rely on the Internet for everyday purposes. The above source, however, involves a common misperception about the IPv6 architecture. Its large address space is not intended to provide unique addresses for every possible point. Rather, the addressing architecture is such that it allows large blocks to be assigned for specific purposes and, where appropriate, aggregated for providing routing.
With a large address space, there is not the need to have complex address conservation methods as used in classless inter-domain routing (CIDR). Windows Vista, Apple Computer's Mac OS X, and an increasing range of Linux distributions include native support for the protocol, but it is not yet widely deployed elsewhere.
IP address subnetting
Both IPv4 and IPv6 addresses utilize subnetting, or dividing the IP address into two parts: the network address and the host address. By using a subnet mask, the computer can determine where to split the IP address.
Classful network
Classful networking is the name given to the first round of changes to the structure of the IP address in IPv4. Classful networking is obsolete on the modern Internet. There is no longer any such thing as a class A/B/C network. The correct modern representation for what would have been referred to as a "Class B" prior to 1993 would be "a set of /16 addresses", under the Classless Inter-Domain Routing (CIDR) system.
Before Classes
The prototype Internet in 1982; note that all the networks (the ovals) have addresses which are single integers; the rectangles are switches. Originally, the 32-bit IPv4 address consisted simply of an 8-bit network number field (which specified the particular network a host was attached to), and a rest field, which gave the address of the host within that network. This format was picked before the advent of local area networks (LANs), when there were only a few, large, networks such as the ARPANET. This resulted in a very low count (256) of network numbers being available, and very early on, as LANs started to appear, it became obvious that that would not be enough.
Classes
As a kludge, the definition of IP addresses was changed in 1981 by RFC 791 to allow three different sizes of the network number field (and the associated rest field), as specified in the table below: Size of Network Size of Rest Number Bit field Bit field
Class
Class A
24
Class B
10
16
16
Class C
110
24
Class D (multicast)
1110
not defined
not defined
Class E (reserved)
1111
not defined
not defined
This allowed the following population of network numbers (excluding addresses consisting of all zeros or all ones, which are not allowed): Class Leading Bit String Number of Networks Addresses Per Network
Class A
127
16,777,214
Class B
10
16,384
65,534
Class C
110
2,097,152
254
The number of valid networks and hosts available is always 2N - 2 (where N is the number of bits used, and the subtraction of 2 adjusts for the invalidity of the first and last addresses). Thus, for a class C address with 8 bits available for hosts, the number of hosts is 254. The larger network number field allowed a larger number of networks, thereby accommodating the continued growth of the Internet. The IP address netmask (which is so commonly associated with an IP address today) was not required because the mask length was part of the IP address itself. Any network device could inspect the first few bits of a 32-bit IP address to see which class the address belonged to. The method of comparing two IP address's physical networks did not change, however (see subnet). For each address, the network number field size and its subsequent value were determined (the rest field was ignored). The network numbers were then compared. If they matched, then the two addresses were on the same network.
Class ranges
The address ranges used for each class are given in the following table, in the standard dotted decimal notation.
Class
Leading bits
Start
End
CIDR equivalent
Class A
0.0.0.0 127.255.255.255 /8
255.0.0.0
Class B
10
255.255.0.0
Class C
110
255.255.255.0
Class D (multicast)
1110
224.0.0.0 239.255.255.255 /4
not defined
Class E (reserved)
1111
240.0.0.0 255.255.255.255 /4
not defined
Special ranges
Some addresses are reserved for special uses (RFC 3330). CIDR Equivalent Total # of addresses
Addresses
Purpose
RFC
Class
0.0.0.0 0.255.255.255
0.0.0.0/8
Zero Addresses
RFC 1700 A
16,777,216
10.0.0.0 10.255.255.255
10.0.0.0/8
Private IP addresses
RFC 1918 A
16,777,216
127.0.0.0 127.255.255.255
127.0.0.0/8
RFC 1700 A
16,777,216
169.254.0.0 169.254.255.255
169.254.0.0/16 Zeroconf /
RFC 3330 B
65,536
APIPA
172.16.0.0 172.31.255.255
172.16.0.0/12 *
Private IP addresses
RFC 1918 B
1,048,576
192.0.2.0 192.0.2.255
192.0.2.0/24
RFC 3330 C
256
192.88.99.0 192.88.99.255
192.88.99.0/24
RFC 3068 C
256
192.168.0.0 192.168.255.255
RFC 1918 C
65,536
198.18.0.0 198.19.255.255
198.18.0.0/15 *
131,072
224.0.0.0 239.255.255.255
224.0.0.0/4
Multicast
RFC 3171 D
268,435,456
240.0.0.0 255.255.255.255
240.0.0.0/4
Reserved
268,435,456
Note that these ranges listed were originally defined as consecutive network blocks and their "CIDR Equivalent" notation makes them appear to be in the wrong "Class". While nowadays CIDR allows to use this range as a Class B subnet, some network hard- and software still has hard-coded limitations which still prevent use of subnets other than Class C size.
HUB
A network hub or concentrator is a device for connecting multiple twisted pair or
fiber optic Ethernet devices together, making them act as a single network segment. Hubs
work at the physical layer (layer 1) of the OSI model, and the term layer 1 switch is often used interchangeably with hub. The device is thus a form of multiport repeater. Network hubs are also responsible for forwarding a jam signal to all ports if it detects a collision. Hubs also often come with a BNC and/or AUI connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced network switches has largely rendered hubs obsolete but they are still seen in older installations and more specialized applications.
A hubbed Ethernet network behaves like a shared-medium, that is, only one device can successfully transmit at a time and each host remains responsible for collision detection and retransmission. With 10BASE-T and 100BASE-T links (which generally account for most or all of the ports on a hub) there are separate pairs for transmit and receive but they are used in half duplex mode in which they still effectively behave like shared medium links (See 10BASE-T for the pins specifications) A network hub or repeater, is a fairly unsophisticated broadcast device. Hubs do not manage any of the traffic that comes through them, and any packet entering any port is broadcast out on every other port (other than the port of entry). Since every packet is being sent out through every other port, packet collisions result--which greatly impedes the smooth flow of traffic. The need for hosts to be able to detect collisions limits the number of hubs and the total size of the network. For 10 Mbit/s networks, up to 5 segments (4 hubs) are allowed between any two end stations. For 100 Mbit/s networks, the limit is reduced to 3 segments (2 hubs) between any two end stations, and even that is only allowed if the hubs are of the low delay variety. Some hubs have special (and generally manufacturer specific) stack ports allowing them to be combined in a way that allows more hubs than simple chaining through Ethernet cables, but even so a large Fast Ethernet network is likely to require switches to avoid the chaining limits of hubs. Most hubs detect typical problems, such as excessive collisions on individual ports, and partition the port, disconnecting it from the shared medium. Thus, hub-based Ethernet is generally more robust than coaxial cable-based Ethernet, where a misbehaving device can disable the entire segment. Even if not partitioned automatically, a hub makes troubleshooting easier because status lights can indicate the possible problem source or, as a last resort, devices can be disconnected from a hub one at a time much more easily than a coaxial cable. They also remove the need to troubleshoot faults on a huge cable with multiple taps.
Uses
Historically, the main reason for purchasing hubs rather than switches was its price. This has largely been eliminated by reductions in the price of switches, but hubs can still be useful in special circumstances:
A protocol analyser connected to a switch does not always receive all the desired packets since the switch separates the ports into different segments. Connecting the protocol analyzer to a hub allows it to see all the traffic on the segment. (Expensive switches can be configured to allow one port to listen in on traffic on another port. This is called port mirroring. However, these cost much more than a hub.) Some computer clusters require each member computer to receive all of the traffic going to the cluster. A hub will do this naturally; using a switch requires implementing special tricks. When a switch is accessible for end users to make connections, for example, in a conference room, an inexperienced or careless user (or saboteur) can bring down the network by connecting two ports together, causing a loop. This can be prevented by using a hub, where a loop will break other users on the hub, but not the rest of the network. (It can also be prevented by buying switches that can detect and deal with loops, for example by implementing the Spanning Tree Protocol.) A cheap hub with a 10BASE2 port is probably the cheapest and easiest way to connect devices that only support 10BASE2 to a modern network (cheap switches don't tend to come with 10BASE2 ports). The same goes for linking in an old thicknet network segment using an AUI port on a hub (individual devices that were intended for thicknet can be linked to modern Ethernet by using an AUI10BASE-T transceiver).
Network switch
A network switch is a computer networking device that connects network segments. In the past, it was faster to use Layer 2 techniques to switch, when only MAC addresses could be looked up in content addressable memory (CAM). With the advent of ternary CAM (TCAM), it was equally fast to look up an IP address or a MAC address. TCAM is expensive, but very appropriate for enterprise switches that use default routes plus a moderate number of other routes. For routers that need a full Internet routing table, TCAM may not be cost-effective. The first Ethernet switch was introduced by Kalpana in 1989. [1]
Function
As with hubs, Ethernet implementations of network switches support either 10/100 Mbit/s or 10/100/1000 Mbit/s ports Ethernet standards. Large switches may have 10 Gbit/s ports. Switches differ from hubs in that they can have ports of different speed. The network switch, packet switch (or just switch) plays an integral part in most Ethernet local area networks or LANs. Mid-to-large sized LANs contain a number of linked managed switches. Small office, home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as gateway access to small office/home office broadband services such as DSL router or cable, WiFi router. In most of these cases, the end user device contains a router and components that interface to the particular physical broadband technology, as in the Linksys 8-port and 48-port devices. User devices may also include a telephone interface to VoIP.
Router
A router (pronounced /'rautr/ in the USA and Australia, and pronounced /'ru:tr/ in the UK) is a computer whose software and hardware are usually tailored to the tasks of routing and forwarding information. Routers generally contain a specialized operating system (e.g. Cisco's IOS or Juniper Networks JUNOS and JUNOSe or Extreme Networks XOS), RAM, NVRAM, flash memory, and one or more processors. High-end routers contain many processors and specialized Application-specific integrated circuits (ASIC) and do a great deal of parallel processing. Chassis based systems like the Nortel MERS8600 or ERS-8600 routing switch, (pictured right) have multiple ASICs on every module and allow for a wide variety of LAN, MAN, METRO, and WAN port technologies or other connections that are customizable. Much simpler routers are used where cost is important and the demand is low, for example in providing a home internet service. With appropriate software (such as SmoothWall, XORP or Quagga), a standard PC can act as a router. Routers connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router.[1] The term layer 3 switch often is used interchangeably with router, but switch is really a general term without a rigorous technical definition. In marketing usage, it is generally optimized for Ethernet LAN interfaces and may not have other physical interface types. Routers operate in two different planes [2]:
Control Plane, in which the router learns the outgoing interface that is most appropriate for forwarding specific packets to specific destinations,
Forwarding Plane, which is responsible for the actual process of sending a packet received on a logical interface to an outbound logical interface.
Modem
Modem (from modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from driven diodes to radio. The most familiar example is a voiceband modem that turns the digital 1s and 0s of a personal computer into sounds that can be transmitted over the telephone lines of Plain Old Telephone Systems (POTS), and once received on the other side, converts those 1s and 0s back into a form used by a USB, Serial, or Network connection. Modems are generally classified by the amount of data they can send in a given time, normally measured in bits per second, or "bps". They can also be classified by Baud, the number of times the modem changes its signal state per second. Baud is NOT the modem's speed. The baud rate varies, depending on the modulation technique used. Original Bell 103 modems used a modulation technique that saw a change in state 300 times per second. They transmitted 1 bit for every baud, and so a 300 bit/s modem was also a 300-baud modem. However, casual computerists confused the two. A 300 bit/s modem is the only modem whose bit rate matches the baud rate. A 2400 bit/s modem changes state 600 times per second, but due to the fact that it transmits 4 bits for each baud, 2400 bits are transmitted by 600 baud, or changes in states. Faster modems are used by Internet users every day, notably cable modems and ADSL modems. In telecommunications, "radio modems" transmit repeating frames of data at very high data rates over microwave radio links. Some microwave modems transmit more than a hundred million bits per second. Optical modems transmit data over optical fibers. Most intercontinental data links now use optical modems transmitting over undersea optical fibers. Optical modems routinely have data rates in excess of a billion (1x109) bits per second. One kilobit per second (kbit/s or kb/s or kbps) as used in this article means 1000 bits per second and not 1024 bits per second. For example, a 56k modem can transfer data at up to 56,000 bits per second over the phone line.
Specifically, you can use it to connect a host to a hub or switch. Crossover cable In a crossover cable, the standard RJ-45 cable between the source and destination computers is cross-connected. A crossover cable can be used to connect: * Two computers * Two hubs * A hub to a switch * A cable modem to a router * Two router interfaces Rollover cable These Cisco proprietary cables used to connect to a router or switch console port. In a rollover cable (8 pins), RJ-45 connectors are usually present at each ends and are used to connect router and computer ports. Pin 1 on one end of cable connects to Pin 8 at the other end of the cable, similarly, Pin 2 connects Pin 7, and so on.
Cost effective for heavy Internet users High speed data throughput Private point-to-point connection, with no contention ratios Fixed charges regardless of usage, allowing accurate budgeting A guaranteed high level of service with vastly reduced latency and jitter
ISDN
ISDN [I*SD'N] n. 1. Integrated Services Digital Network. 2. A digital telephone service that provides fast, accurate data transmission over existing copper telephone wiring. 3. The way fast way to go online. The Basics ISDN is based on a number of fundamental building blocks. First, there are two types of ISDN "channels" or communication paths:
B-channel The Bearer ("B") channel is a 64 kbps channel which can be used for voice, video, data, or multimedia calls. B-channels can be aggregated together for even higher bandwidth applications. D-channel The Delta ("D") channel can be either a 16 kbps or 64 kbps channel used primarily for communications (or "signaling") between switching equipment in the ISDN network and the ISDN equipment at your site.
These ISDN channels are delivered to the user in one of two pre-defined configurations:
Basic Rate Interface (BRI) BRI is the ISDN service most people use to connect to the Internet. An ISDN BRI connection supports two 64 kbps B-channels and one 16 kbps D-channel over a standard phone line. BRI is often called "2B+D" referring to its two B-channels and one D-channel. The D-channel on a BRI line can even support low-speed (9.6 kbps) X.25 data, however, this is not a very popular application in the United States. Primary Rate Interface (PRI) ISDN PRI service is used primarily by large organizations with intensive communications needs. An ISDN PRI connection supports 23 64 kbps B-channels and one 64 kbps D-channel (or 23B+D) over a high speed DS1 (or T-1) circuit. The European PRI configuration is slightly different, supporting 30B+D.
BRI is the most common ISDN service for Internet access. A single BRI line can support up to three calls at the same time because it is comprised of three channels (2B+D). Two voice, fax or data "conversations," and one packet switched data "conversation" can take place at the same time. Multiple channels or even multiple BRI lines can be combined into a single faster connection depending on the ISDN equipment you have. Channels can be combined as needed for a specific application (a large multimedia file transfer, for example), then broken down and reassembled into individual channels for different applications (normal voice or data transmissions). What Do I Use It For?
ISDN offers the speed and quality that previously was only available to people who bought expensive, point-to-point digital leased lines. Combined with its flexibility as a dial-up service, ISDN has become the service of choice for many communications applications. Popular ISDN applications include:
Internet access Telecommuting/remote access to corporate computing Video conferencing Small and home office data networking
Why Should I Use ISDN to Access the Internet? More and more people are discovering that ISDN is the right Internet answer. As the Internet becomes more and more information-intensive with graphics, sound, video and multimedia, your ability to take advantage of these new resources depends on the speed of your Internet connection. Can your existing connection handle these large files quickly and cleanly? Does it take forever to download files? Are your downloads frequently aborted because of transmission errors? With ISDN, your Internet access is:
Even faster By combining your two B-channels you have access to up to 128 kbps -- more than four times as fast as a 28.8 kbps modem on a standard phone line. And ISDN's digital technology assures you the cleanest connection to the Internet so you won't be slowed down by re-transmissions because of old analog technology. More efficient and economical ISDN brings increased capabilities, reduced costs and improved productivity to organizations both large and small. When you're looking for something on the Internet, you can get there faster. You can be more productive because you aren't waiting as long to get to that next website or download that large file.