0% found this document useful (0 votes)
99 views27 pages

3 Ipv4 Addressing, DSL Technologies & DSL Cpe & Wifi Security

This document discusses IPv4 addressing, DSL technologies, and DSL customer premise equipment (CPE). It begins with an introduction to IPv4, including that IPv4 uses 32-bit addresses limiting the address space to 4.3 billion addresses. It then lists the objectives to explain IP addressing schemes like subnetting, variable length subnet masking (VLSM), Classless Inter-Domain Routing (CIDR), and technologies like Asymmetric Digital Subscriber Line (ADSL) and DSL CPE. The document goes on to describe IPv4 addressing in detail including classful addressing schemes, network and broadcast addresses, and address classes A through E. It also covers DSL standards, modulation used, and fundamentals of config

Uploaded by

dhivya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views27 pages

3 Ipv4 Addressing, DSL Technologies & DSL Cpe & Wifi Security

This document discusses IPv4 addressing, DSL technologies, and DSL customer premise equipment (CPE). It begins with an introduction to IPv4, including that IPv4 uses 32-bit addresses limiting the address space to 4.3 billion addresses. It then lists the objectives to explain IP addressing schemes like subnetting, variable length subnet masking (VLSM), Classless Inter-Domain Routing (CIDR), and technologies like Asymmetric Digital Subscriber Line (ADSL) and DSL CPE. The document goes on to describe IPv4 addressing in detail including classful addressing schemes, network and broadcast addresses, and address classes A through E. It also covers DSL standards, modulation used, and fundamentals of config

Uploaded by

dhivya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

3 IPV4 ADDRESSING, DSL TECHNOLOGIES & DSL CPE


& WIFI SECURITY
STRUCTURE
3.1 INTRODUCTION

3.2 OBJECTIVE

3.3 IPV4 ADDRESS

3.4 IPV4 ADDRESSING SCHEME

3.5 SUBNETTING

3.6 VLSM

3.7 CIDR

3.8 PUBLIC & PRIVATE IP ADDRESS

3.9 ADSL

3.10 WHY ADSL?

3.11 HOW ADSL WORKS?

3.12 ADSL MODULATION

3.13 DSL TECHNOLOGIES FOR BROADBAND

3.14 FUNDAMENTALS OF DSL-CPE

3.15 TYPES OF DSL-CPE

3.16 CONNECTIVITY OF DSL-CPE

3.17 SECURING WIFI BROADBAND CONNECTION

3.18 NEED OF SECURITY

3.19 STEPS FOR SECURING WIFI BB CONNECTION

3.20 SUMMARY

3.21 SELF ASSESSMENT QUESTIONS

3.22 REFERENCES AND SUGGESTED FURTHER READINGS

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 1 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

3.1 INTRODUCTION
Internet Protocol version 4 (IPv4) is the fourth revision in the development of the
Internet Protocol (IP) and the first version of the protocol to be widely deployed.
Together with IPv6, it is at the core of standards-based internetworking methods of
the Internet. As of 2012 IPv4 is still the most widely deployed Internet
Layer protocol.IPv4 is described in IETF publication RFC 791 (September 1981).
IPv4 is a connectionless protocol for use on packet-switched Link Layer
networks (e.g., Ethernet). It operates on a best effort delivery model; in that it does not
guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate
delivery. These aspects, including data integrity, are addressed by an upper layer
transport protocol, such as the Transmission Control Protocol (TCP).
IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4.3
billion (232) addresses. Addresses were assigned to users, and the number of unassigned
addresses decreased. IPv4 address exhaustion occurred on February 3, 2011. It had been
significantly delayed by address changes such as classful network design, Classless
Inter-Domain Routing, and network address translation (NAT).

3.2 Objective
After reading this unit, you should be able to understand:

  An IP Address and its usage 


  IPv4 Addressing Scheme 
  Subnetting 
  VLSM – Variable Length Subnet Mask 
  CIDR – Classless Inter Domain Routing 
  What is ADSL? 
  How it works ? 
  What are different ADSL Standards ? 
  Modulation used. 
  What is Digital Subscriber Line 
  Fundamentals of DSL-CPE 
  Types of DSL-CPE 
  Connectivity of DSL-CPE 
 Configuration of DSL-CPE 


3.3 IPv4 Address
Each host on a TCP/IP network is uniquely identified at the IP layer with an
address. This is called an IP address. An Internet Protocol (IP) address specifies the
location of a host or client on the Internet.The IP address is also known as Protocol
address. It’s a logical address.
The IPv4 address is 32 bits long. From the machine’s perspective, an address
may look like 11001010000011100100000000000001. But for human understanding the
32 bits of IP address are divided into 4 bytes of 8 binary digits and each binary byte is

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 2 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

converted into decimal and is separated by a dot hence also known as Dotted Decimal
Notation. As human beings, we see an IP address like 202.14.64.1
In decimal the address range is 0.0.0.0 to 255.255.255.255. An IP address is
having two parts: Network ID or Network Part and Host ID or Host Part. It is of the
form <networkID,hostID>

3.4 IPv4 Addressing Scheme


  Classful 
 Classless 

3.4.1 CLASSFUL ADDRESSING SCHEME:


This was the originaladdressing scheme in which IPv4 address space was
structured into five classes (A, B, C, D and E). The value of first octet of an IP address
determines the class of network to which it belongs in classful addressing scheme.

  A, B & C classes are used to represent host and network address. 


  Class D is a special type of address used for multicasting. 
 Class E is reserved for experimental use. 

Class Identifier: These are the few initial bits which determine the class of an
IP address. This is turn indicates how many bits are defining network and host.
Subnet Mask: This is the mask which helps in determining the number of bits
for network. In other words, it helps in determining network ID of an address.
Network Address: Network Address is an address of the network. In network
address, all host bits are set to 0. It is similar to STD code in BSNL landline numbers.
Host Address: Host address is an address assigned to an interface of a node.
Network address along with host bits determines the host address. Host part is equivalent
to telephone number assigned to landline phone.

3.4.1.1 Number of Networks / Hosts in Class A, B, and C


CLASS NO OF NETWORKS NO OF HOSTS / NETWORK

A 126 16,777,214

B 16,384 65,534

C 2,097,152 254

3.4.1.2 Class D Address

  These are special addresses known as multicast addresses 


 This address is assigned to a group of networks and not to represent a unique address 

 This address is used to send IP datagrams to a group but not to all the hosts on the
network 

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 3 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE
 This address is also used to address router update messages 

3.4.1.3 Class E Address


 These are reserved for future purposes. 

3.4.1.4 IPv4 Address Bit Pattern

EETP/BSNL Gold Certification Course Page 4 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE
3.4.1.5

8 - Bits 8 - Bits 8 - Bits 8-

Class 0 0 0 0 00 0 0 1 1 1 1 1 1 0 - 127

Class 1 00 0 0 0 0 0 1 0 1 1 1 1 1 128 - 191

Class 1 1 0 0 00 0 1 1 0 1 1 1 1 192 - 223

Class 1 1 1 0 00 0 1 1 1 0 1 1 1 224 - 239

Class E 1 1 1 1 00 0 1 1 1 1 1 1 1 240 - 255

3.4.1.6 Characteristics of classes


ATTRIBUTE CLASS A CLASS B CLASS C CLASS D CLASS E
Class
0 10 110 1110 1111
Identifier

Addresses 1 to 126 128 to 191 192 to 223 224 to 239 240 to 254
begins with
/8 or /16 or /24 or
Natural or - -
Default Mask 255.0.0.0 255.255.0.0 255.255.255.0

N H H H N N H H N N N H
Network Part
- -
/ Host Part 8 8 8 8 8 8 8 8 8 8 8 8
bits bits bits bits bits bits bits bits bits bits bits bits

In Class A, Network ID 0 is not used, and 127 is reserved for loopback.

3.4.1.7 Network and Broadcast Address


Network Address: The network address is the first address in a range of IP
addresses and is used to communicate with all network devices on a particular network.
The network address contains zeroes in the host portion of the IP address.
Example Network Address
The network address in a range of IP addresses always contains all zeroes in the
host portion of the address as shown below:
192 . 168 . 1 . 0
11000000 10001010 00000001 00000000

The network address is important to network equipment, to routers and to


routing. Network addresses are used to represent destination networks in routing tables.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 5 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

Broadcast Address:A broadcast address is the last address in a range of IP


addresses and allows information to be sent to all machines on a given subnet rather
than a specific machine.The broadcast address contains ones in the host portion of the IP
address.
Example Broadcast Address
The broadcast address in a range of IP addresses always contains all ones in the
host portion of the address as shown below:
192 . 168 . 1 . 255
11000000 10001010 00000001 11111111

203.251.7.255
Network ID – 203.251.7.00000000 => 203.251.7.0
Broadcast ID – 203.251.7.11111111 =>203.251.7.255

203.251.7.0

3.4.2 CLASSLESS ADDRESSING SCHEME


In classless addressing scheme, classful networks are subnetted or super netted
and their default subnet mask are changed, thereby just by analyzing the class of address
by analyzing initial few bits will not help in determining the network ID and for this
subnet mask is must.

3.5 Subnetting
Chopping up of a network into a number of smaller networks is called
subnetting.Subnetting an IP Network can be done for a variety of reasons, including
organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.),
preservation of address space, and security.
It allows to assign some of the bits, normally used by the host portion of the
address, to the network portion of the address.The format of subnetted IP address would
be <network number, subnet number, host number>. It allows efficient use of full
network address.
Subnet is a real network under a network.Any of the classes can be subnetted.
The most common reason is to control network traffic.
3.5.1 SUBNETTING USING 1 BIT
Depending upon number of subnets to be carved out of given network, no of bits
from host part can be used for creating these subnets. Example, 1 bit can create 2
subnets, 2 bits for 4 subnet and so on.
Example: Subnetting using 1 bit can be performed in order to divide a network
into 2 equal sub-networks.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 6 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

Network N.N.N.H/24 Subnet


-1: N.N.N.0|0000000
Subnet -2: N.N.N.1|0000000
10

Subnet -2: Subnet -1:


N.N.N.128/25 N.N.N.64/25
7 7
Hosts 2 -2 = 126 Hosts 2 -2 = 126

3.5.2 IDENTIFYING NETWORK ADDRESS


Performing a bitwise logical AND operation between the IP address and the
subnet mask results in the Network Address or Number.
For example, using 140.179.240.200 (Class B) IP address and the default Class
B subnet mask, we get:
10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address
11111111.11111111.00000000.00000000 255.255. 0. 0 Default Class B S/N Mask
----------------------------------------------------------------------
10001100.10110011.00000000.00000000 140.179.0.0 Network Address

3.6 VLSM: Variable Length Subnet Mask


Subnetting creates subnets with equal number of hosts, in a network.The number of
bits subnetted i.e. the length of subnet mask will be same for all the subnets.To co-op with
the variable number of hosts in subnets, in a network, number subnetted bits i.e. the length
of subnet mask for the subnets will also vary.The method of achieving subnetting, with
variable length of subnet mask, is known as Variable Length Subnet Mask.

3.7 CIDR: Classless Inter Domain Routing


This is pronounced as – cider. It is also known by the name supernetting. It is
defined in RFC 1519. It helps in reducing number of route table entries.
Example: Following networks can be represented as single network.
i. 192.168.0.0/24
ii. 192.168.1.0/24
192.168.0.0/22
iii. 192.168.2.0/24
iv. 192.168.3.0/24

3.8 Public and Private IP Addresses


On the basis of usage of IP address in networks it can be classified as

  Public IP Addresses 
 These are the address spaces that are used in Public Networks like Internet. 
 Private IP Addresses 
EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 7 of 27
For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE
These are used in Private Networks like LAN.

3.8.1 PRIVATE SUBNETS


There are three IP network addresses reserved for private networks. These can be
used by anyone for setting up their internal IP networks. These are equivalent to
intercom facility which is setup in a colony or in apartment. These address blocks are:
 10.0.0.0/8 
o 24-bit block
o Complete class-A network number
  172.16.0.0/12 
o 172.0001/0000.0.0-172.0001/1111.255.255
o 20-bit block
o Set of 16 contiguous class-B network numbers
  192.168.0.0/16 
o 16-bit block
o Set of 256 contiguous class-C network numbers

3.9 ADSL
Digital Subscriber Line (DSL) is a broadband high-speed Internet technology
that brings high-bandwidth information to home and offices over existingtwisted-pair
telephone lines as the access media.
Following are some of the key features of DSL:
1. Distance-sensitive technology
2. Internet connection is always ON
3. Simultaneous use of the phone line for voice as well as data traffic
4. Internet Connection is highly reliable and secure
5. High Speed (Mbps)
Over a period of time, a number of technologies (xDSL) have been introduced to
provide faster data speeds over this medium. The various xDSL technologies are given
below.
1. ADSL (Asymmetric Digital Subscriber Line)
2. VDSL (Very High-Speed Digital Subscriber Line)
3. RADSL (Rate Adaptive Digital Subscriber Line)
4. HDSL (High Data-Rate Digital Subscriber Line)
5. SDSL (Symmetric Digital Subscriber Line

ADSL (ASYMMETRIC DIGITAL SUBSCRIBER LINE)


Asymmetric DSL (digital subscriber line) is a technology that leverages a
conventional telephone line to provide "always on", high-speed Internet connectivity.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 8 of 27


For Restricted Circulation
Broadband Technology (BB ) IPv4 Addressing, DSL Technologie s& DSL CPE

Because it doesn't require a dedicated phone line, ADSL is able to share a line with an
existing telephone service wi thout impacting that phone service in any way.
The word "asymme tric" means that the capacity to send data upstream and
downstream is not equivalent. "Digital" means that data or voice is con verted into a
binary format where the aud io or video data is represented by a series of " 1"s and "0"s.
The term "subscriber line" s imply refers to the copper pair telephone wires that are used
for conventional phone servi ce.

3.10 WHY ADSL?


ADSL is in place du e to both technical and marketing reasons. On the technical
side, there is likely to be more crosstalk from other circuits at the DS LAM (Digital
Subscriber Line Access Multiplex) end (where the wires from many local l oops are
close together) than at the custom er premises. Thus the upload signal is weak est, while
the download signal is stronges t at the noisiest part of the local loop. It the refore makes
DSLAM transmit at a higher bit rate than does the modem on the customer end. Since
the typical home user in fact does prefer a higher download speed, thus teleco m
companies chose to make a virtue out of necessity, hence ADSL come to place.

3.11 HOW ADSL WO RKS?


To obtain the asymm etrical data transfer to suit requirement of Inte rnet and
LAN access, ADSL works by fir stly splitting the available bandwidth on the t wisted
copper wire (telephone wires) into t hree different channel:
1) A high speed downst ream channel (ranges from 1.5 to 8 Mbps)
2) A medium speed ups tream channel (ranges from 16 kbps to 1 Mbps)
3) POTS (Plain Old Tel ephone Service) channel
ADSL uses two se parate frequency bands. With standard ADSL, the band
from 25.875 kHz to 138 kHz is us ed for upstream communication, while 138 kH z -
1104 kHz is used for downstream com munication.

EETP/BSNL Gold C ertification Course/ Ver.02/Jan’2015 Page 9 of 27


Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

Frequency plan for ADSL

First the POTS channel is splits off from the digital modem by filter, thus
guaranteeing uninterrupted POTS. After the POTS channel are splitted from the digital
data transfer bandwidth, the 26kHz to 1.1mhz data bandwidth could be further separated
by using one of two ways as describe below:
Frequency Division Multiplexing (FDM) :-
FDM assigns one band for upstream data and one band for downstream data.
Time division multiplexing divides the downstream path into one or more high speed
channels and one or more low speed channels. But the upstream path is only
multiplexed into corresponding low speed.
Echo cancellation:-

Echo cancellation can be used so the downstream channel overlaps the upstream
channel, or vice versa, meaning simultaneous upstream and downstream signals are
sent. Echo cancellation is optional and is typically not used.To separate them is by local
echo cancellation. This technique is common in V.32 and V.34 modems(Conventional
Modems).
By using either one of the above techniques, ADSL splits off a 4khz region for
POTS at the DC end of the band.

Upstream Downstream
Basic
Telephon FDM
e

Frequency

Upstream Downstream
Basic
Echo
Telephon
e Cancellation

Frequency

3.12 ADSL MODULATION


ADSL uses two types of Modulation
1. CAP(Carrier less Amplitude Phase Modulation)
2. DMT(Discrete Multi Tone)

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 10 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE
DMT is the most widely used one.

CAP (Carrier less Amplitude Phase Modulation)


It is a variation of QAM (Quadrature Amplitude Modulation).QAM generates a
DSSC (Double Sideband Suppressed Carrier) signal constructed from two multi-level
PAM (Pulse Amplitude Modulated) signals applied in phase quadrature to one another.
CAP modulation produces the same form of signal as QAM without requiring in-phase
and quadrature components of the carrier to the first be generated. The following
diagrams illustrate the CAP modulation.

CAP TRANSMITTER & RECEIVER

In-Phase Filter

Output To

Binary line
Constellation D/A Pass band Line Filter
Encoder

Quadrature Filter

In-Phase
Adaptive filter

Data Out
Line
I Decision Decoder
A/D Device

Quadrature Filter

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 11 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

Discrete Multitone Modulation (DMT)


DMT is basically a multicarrier modulation technique. DMT spread the original
spectrum of the input signal over numerous sub-channels each of which carries a
fraction of the total information. All these sub-channels transmit data in parallel to each
other and are independently modulated with a carrier frequency. By using DSP
techniques, multiple sub-channels could be established using Fast Fourier Transform
(FFT), where the sub-carriers hadto have orthogonality with each other.

As mentioned before, DMT utilizes the spectrum between 26kHz and 1.1Mhz. After
using FDM or echo cancellation technique, this spectrum of bandwidth is split up into
upstream band(26kHz to 138kHz) and downstream band (138kHz to 1.1MHz), which is
then further divided into 256 discrete sub-channels each of which had a bandwidth of
4kHz. One of DMT most significant feature is that it is able to dynamically adapt to the
line condition to obtain the maximum throughput for each unique telephone line. DMT
does this by framing the data bits into chunks and spreads them over the sub-channels.
The allocation of data into each sub-channel is dependent on the characteristics of the
line and on the SNR (Signal to Noise Ratio) of the line. There could be no data at all in
a really noisy channel and there could be as high as 15 bits/Hz in a channel where SNR
is optimum.

By using the average signal to noise ration (SNR) of the sub-channel, the number of bits
to be allocated to that sub-channel can be decided. The number of bits to be assigned to
the nth channel could be calculated from this equation.

The major stages in transmitting and receiving could be seen in the following
block diagram.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 12 of 27


Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

Parallel
Data Out
line DMT To Serial
Filter A/D Symbol
FFT Output
Decoder Data
Buffer

DMT Symbols
Received Serially

N (Complex)
Sub-channel
Symbols

Output To
Data line
Serial to DMT
I Parallel
D/A Line Filter
Input Symbol IFFT
Data
Buffer Encoder

DMT Symbols
Transmitted
Serially
N (Complex)
Sub-channel
Symbols

The chunk of bits that are being assigned to each sub-channel as described above
are encoded as a set of quadrature amplitude modulated sub symbols. These sub
symbols are then pass into an Inverse Fourier Transform(IFFT) which combines the sub
symbols into a set of real-valued time domain samples, the output of the IFFT is then
send a Parallel-to-Serial block with cyclic prefix which is added to remove InterSymbol
Interference (ISI) between the sub-channels. The output is then pass into an digital to
analog converter which is then send through the twisted copper telephone wire. The
receiver would receive the signal from the twisted copper telephone wire and does the
reverse process to obtain the required data. To reduce error in transmission and to
counter those problems of using telephone lines as a data transfer medium, DMT had
uses Reed Solomon forward error correction method
.The size of this Reed Solomon codeword depends on the number of bits assigned to
each sub-channel.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 13 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

Common Elements In ADSL

The common elements of ADSL are

a) CPE(Customer Premises Equipment) containing a Splitter, ADSL Modem & a PC.


b) Central Office Premises Equipment containing DSLAMs(Digital Subscriber Line
Access Multiplexer), MDFs & PSTN.
c) Aggregator and ATM core consists of Tier II,TierI switches, BRAS(Broad Band
Remote access Service) ,Servers and Core routers.

Factors Determining ADSL Connectivity: More the distance from the


DSLAM(Digital Subscriber Line Access Multiplex) to the customer end the data rate
reduces. Signal attenuation and Signal to Noise Ratio are defining characteristics, and can
vary completely independently of distance (e.g., non-copper cabling, cable diameter).The
performance is also dependent to the line impedance, which can change dynamically either
dependent on weather conditions (very common for old overhead lines) or on the number
and quality of joints or junctions in a particular cable length.

Data Rate - Wire Size – Distance

Data Rate Wire Size Distance


1.5-2.0 Mbps 0.5 mm 5.5 Kms
1.5-2.0 Mbps 0.4 mm 4.6 Kms
6.1 Mbps 0.5 mm 3.7 Kms
6.1 Mbps 0.4 mm 2.7 Kms

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 14 of 27


For Restricted Circulation
Broadband Technology (BB ) IPv4 Addressing, DSL Technologie s& DSL CPE

3.13 DSL technologies for broadband


Standard name Common name Downstream rate Upstream ra te
Version

ANSI T1.413-1998 Issue 2 ADSL 8.0 Mbit/s 1.0 Mbit/s


DSL
ITU G.992.1 ADSL (G.DMT) 12.0 Mbit/s 1.3 Mbit/s
DSL
ITU G.992.1 Annex A ADSL over POTS 12.0 Mbit/s 1.3 Mbit/s
DSL
ITU G.992.1 Annex B ADSL over ISDN 12.0 Mbit/s 1.8 Mbit/s
DSL
ITU G.992.2 ADSL Lite (G.Lite) 1.5 Mbit/s 0.5 Mbit/s
DSL
ITU G.992.3 ADSL2 12.0 Mbit/s 1.3 Mbit/s
DSL2
ITU G.992.3 Annex J ADSL2 12.0 Mbit/s 3.5 Mbit/s
DSL2
ITU G.992.3 Annex L RE-ADSL2 5.0 Mbit/s 0.8 Mbit/s
DSL2
ITU G.992.4 splitter less ADSL2 1.5 Mbit/s 0.5 Mbit/s
DSL2
ITU G.992.5 ADSL2+ 24.0 Mbit/s 1.1 Mbit/s
DSL2+
ITU G.992.5 Annex M ADSL2+M 24.0 Mbit/s 3.3 Mbit/s
DSL2+

ADSL2
ITU G.992.3 is an I TU (International Telecommunication Union) standard, also
referred to as ADSL2 or G.DMT.bis. It optionally extends the c apability of

basic ADSL in data rates to 12 Mbit/s downstream and, depending on Anne x version, up to
3.5 Mbit/s upstream ADS L2 uses the same bandwidth as ADSL but achieves higher
throughput via improved modulation techniques. Actual speeds may reduce depending on
line quality,usually the most significant factor in line quality is the d istance from the
DSLAM to the customer's equipment
ADSL2+
ADSL2+ extends the capability of basic ADSL by doubling the number
of downstream bits. The data rates can be as high as 24 Mbit/s downstre am and up to
1.4 Mbit/s upstream depen ding on the distance from the DSLAM to t e customer's
premises.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 15 of 27


Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

ADSL2+ is capable of doubling the frequency band of typical ADSL


connections from 1.1 MHz to 2.2 MHz. This doubles the downstream data rates of the
previous ADSL2 standard (which was up to 12 Mbit/s), and like the previous standards
will degrade from its peak bitrate after a certain distance.
Also ADSL2+ allows port bonding. This is where multiple ports are physically
provisioned to the end user and the total bandwidth is equal to the sum of all
provisioned ports. So if 2 lines capable of 24 Mbit/s were bonded the end result would
be a connection capable of 48 Mbit/s download and twice the original upload speed. Not
all DSLAM vendors have implemented this functionality. ADSL2+ port bonding is also
known as G.998.x or G.Bond.

ITU-T Spec Description


ATM-based multi-pair bonding: A method for bonding of
multiple DSL lines to transport an ATM payload beyond the rate/reach
G.998.1 capability of a single DSL loop. This protocol allows the bonding of 2 to 32 pairs and
supports dynamic removal and restoration of pairs without
human intervention.

Ethernet-based multi-pair bonding: Provides a method for


G.998.2
bonding of multiple DSL lines for Ethernet transport. This
recommendation builds on the IEEE 802.3ah-2004methods and extends
Ethernet transport over other xDSL technologies, including ADSL.
Multi-pair bonding using time-division inverse multiplexing:
Details a method for bonding DSL lines using time-division inverse
G.998.3 multiplexing (TDIM). This recommendation uses IEEE 802.3ah handshake for pair
discovery, parameter negotiation, and setup. It also
allows the hitless addition and removal of pairs and the fast removal of
a pair upon pair failure.

VDSL (Very-High-Speed DSL)


Very-high-speed DSL (VDSL) promises even higher speeds than ADSL,
although over much shorter distances. Originally named VADSL (A –Asymmetric) but
was later extended to support both symmetric &asymmetric.Requires one phone line
and supports voice &data.It works between 0.3-1.37 kms depending on speed. It
supports upstream data rate of 1.6-2.3 mbps & downstream data rate of 13-52 mbps.
The following figure illustrates shows the data rate, wire size & distance.

Downstream Upstream Distance Kms

12.96 Mbps 1.6-2.3 mbps 1.37 Kms


25.82 Mbps 1.6-2.3 mbps 0.91 Kms
51.84 Mbps 1.6-2.3 mbps 0.30 Kms

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 16 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

RADSL(Rate-Adaptive DSL)
As the name implies, rate-adaptive DSL (RADSL) modems adjust the data rate
to match the quality of the twisted-pair connection. Emerging software should make this
an automated process with little human intervention.

HDSL(High-Data-Rate DSL)

HDSL modem is viewed as equivalent of PCM stream(2 MBps) and offers the
same bandwidth both upstream and downstream. It can work up to a distance of 3.66 to
4.57 kms depending upon the speed required. It can deliver 2048 kbps
a) On 2 pairs of wires, each line carrying 1168 kbps
b) On 3 pairs of wires, each line carrying 784 kbps.
SDSL(Symmetric DSL)
Symmetrical digital subscriber line (SDSL) is similar to HDSL but requires only
one pair of wires. Transmission speed ranges from n x 64 kbps to 2.0 Mbps in both
directions. In this the upload and download streams are of equivalent bandwidth.
DMT uses COFDM(Coded Orthogonal Frequency Division Multiplexing) to
create 256 carrier channels using frequencies above voice on the line.
The frequency layout can be summarised as:
0–4 kHz, voice.
4–25 kHz, unused guard band.
25–138 kHz, 25 upstream carrier channels (7-31).
138–1104 kHz, 224 downstream carrier channels (32-255).
Carrier channel N is centered on a frequency of N × 4.3125 kHz.
The bandwidth used by each carrier channel overlaps neighboring carrier
channels.
The number of bits encoded on each carrier channels is between 2 and 15,
depending on the attenuation and signal to noise ratio for that carrier channels .
For each 3 dB of dynamic range above the noise floor within a carrier channels , 1
bit can be encoded reliably. Based on this, and the fact that only a minimum of 2 bits are
encoded per carrier channels , the SNR of any one single carrier channel must not drop
below 6 dB . Too many errors that cannot be corrected by the built in error correction would
lead to the end user modem/router losing sync with the remote exchangeDSLAM.
Echo cancellation can be used on the lower frequency (upstream) carrier channels
to allow all 256 carrier channels to be used for downstream.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 17 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

ADSL statistics
To provide a stable service in practice.
1. Attenuation - How much signal is lost on the line
(should be <56 dB downstream, <37 dB upstream)
2. Noise margin - 12 dB or higher, for both downstream and upstream
3. SNR of any one single carrier channel must not drop below 6 dB

3.14 Fundamentals of DSL-CPE


DSL is a generic abbreviation for the many flavors of DSL or Digital Subscriber
Line technology. DSL refers to the technology used between a customer's premises and
the telephone network. Typically speeds start at about 128Kb/s and go up to 1.5Mb/s for
most home users. The service providers adopt various kinds of DSL technologies.
ADSL and VDSL technologies are most popular for providing the broadband service to
customer. Traditional POTs lines, copper loops, are used as access from DSLAM to
customer premises. Equipments provided at customer premises are termed as DSL-CPE
which posses enabling routing and bridging functions via a single DSL connection for
high-quality and desired throughput data transfer.
These devices are capable of transferring Triple play applications. It provides the
connectivity of Voice and Data Call. An interface for phone line is extended which is
used for the telephone call. Basically DSL-CPE is acting like a splitter, which is able to,
recognized the voice samples and data packets and accordingly divert to phone or
PC/computer.

DIGITAL SUBSCRIBER LINE (DSL)

DSL is technology to provide next generation high bandwidth services to the


home and business using the existing telephone cabling infrastructure. DSL to the home
over existing phone lines promises bandwidths up to 8Mb/s or more, but distance
limitations and line quality conditions can reduce what will actually be achievable. DSL
technologies used a greater range of frequencies over the telephone cable than the
traditional telephone services have used. This in turn allows for greater bandwidth with
which to send and receive information
DSL utilizes more of the bandwidth on copper phone lines than what is currently
used for plain old telephone service (POTS). By utilizing frequencies above the telephone
bandwidth (300Hz to 3,200Hz), DSL can encode more data to achieve higher data rates than
would otherwise be possible in the restricted frequency range of a POTS network.
International Telecommunication Union (ITU) standardized the DSL depends
upon the modulation technology.

  G.992.1 (G.dmt) standards information 


 G.992.2 (G.lite) standards information 
DSL comes in several different varieties, which are known collectively as xDSL.
Following are the various types of DSL: -

  ADS (Asymmetric Digital Subscriber Line) 


 HDSL (High bit-rate Digital Subscriber Line) 

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 18 of 27


For Restricted Circulation
Broadband Technology (BB ) IPv4 Addressing, DSL Technologie s& DSL CPE
 SDSL (Symmetrical Digital Subscriber Line) 

  VDSL (Very high bit-rate Digital SubscriberLine) 
 IDSL (ISDN Digital Subscriber Line) 
CPE stands for 'Customer Premises Equipment' (or more commo nly known as
ADSL modem), which is t he DSL equipment that connects home or bu siness to the
telephone line delivering D SL service. DSL CPE provides two essential functions for
DSL Internet connection. Th e first is converting the digital data from the computer to a
form of digital signaling used for the DSL communications link. The secon d function
of DSL CPE is handing the IP ( Internet Protocol) networking to enable computer or
LAN to connect to the Internet via IS P. DSL CPE comes in two flavors: bridges (a DSL
modem) and router
DSL CPE connects t o the DSL service at one end and to computer or LAN at
the other. DSL CPE can connect to computer using one of three following interfaces:
 Ethernet. 
Ethernet form s the basis of the most popular form of comp uter (PCs and
Macs) networking. You can connect Ethernet DSL CPE to a single computer or a
network. Ethernet is the most commonly used interface for DSL CPE because it
can easily support t he speeds of DSL (up to 100Mbps) and ena bles the DSL
connection to be shared across a network. Ethernet DSL CPE can be used with
PCs and Mac's.
 USB (Universal Seria l Bus) 
USB supports data speeds of up to 12Mbps between your computer and
peripherals. USB also allows you to easily connect comp0ute r peripherals,
including a DSL modem.

Typically the custom er DSL device is implemented as a bridge, r outer or both.


Depending on the DSL provider, it may either be assigned one or more stati c IP addresses
for end hosts or it may be required to use the dynamic host configura tion protocol (DHCP)
to obtain a valid IP address while CPE is connected to the Internet n etwork.

3.15 Types of DSL-CP E


Various types of DS L-CPEs are used for extending the broadband connection.
Most popular DSL-CPEs used are ADSL or VDSL Modem or Routers. BSNL has
implemented the following t ypes of CPEs for broadband connectivity

EETP/BSNL Gold C ertification Course/Ver.02/Jan’2015 Page 19 of 27


Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

  UTStarcom UT-300R 
 MT800 ADSL Modem. 
MT800 has one Ethernet Interface & Telephone Interface. It manages the data
flow in Asymmetrical Transmission rates with maximum downstream of 8 Mbps and
maximum upstream of 896 kbps. It works up to 5.5 km. A typical DSL-CPE MT 800
ADSL Modem front and rear view is shown below along with the indicators: -

Front view

LEDs 3.15.1.1.1.1 Description

ADSL: Blinking indicates that ADSL is in the process of


LINK activation.

Steady Green indicates that ADSL is connected


ADSL: Blinking indicates that there is ADSL traffic
ACT
LAN: Steady Green indicates 10 Mbps Eth connection
LINK
Steady Orange indicates 100 Mbps Eth connection
LAN: Blinking Green indicates an active Ethernet session
ACT
Power Steady Green indicates that the unit is Powered ON.

Rear View

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 20 of 27


Broadband Technology (BB ) IPv4 Addressing, DSL Technologie s& DSL CPE

LED Description
o. s
ADS ADSL Port – to the ADSL wall jack
L
Ethe Ethernet Port – to the Ethernet port on yo ur PC or
rnet HUB
Rese Reset Button ( Pressing this button will reset this unit
t to its default values)
Pow Power Switch
er
9V Power Plug – to power adapter
AC 1A
ADSL 2/2+ Router/ Bridge (UT-300R2)
UTStarcom's UT-300 R2 enables routing and bridging functions via a single
DSL connection for high quality t riple play applications. Designed for residentia l,
small-sized LAN and SOHO application s, it supports higher ADSL/ADSL2+ speeds f
or triple play and high-end video applicati ons.

The UT-300R2 ha s built-in firewall capabilities and it supports remote


management via SNMPv1, v2c, and MIB II. It's bridging functionality suppo rt
transparent bridging and point-to-point p rotocol.
The Model 5515 also supports the use of third party PPPoE clien t software to
provide compatibility with th e widest range of service providers.

3.16 Connectivity of D SL-CPE


DSL-CPE is located at customer premises and connected to Digital Subscriber
Line Access Multiplexer (DSLAM). Various types of DSL-CPEs are avai lable depends
on the DSL technology used. DSL-CPE is connected to DSLAM through the wire line.
It is extended to PSTN via tel ephone exchange and towards data network by the
DSLAM splitter. Following figure describes the connectivity of DSL-CPE.

EETP/BSNL Gold C ertification Course/Ver.02/Jan’2015 Page 21 of 27


Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

TB

Splitter

Telephone Exchange

30V

FC
Telephone

DSLAM MDF

At the customer premises the DSL-CPE available consists of: -

  Splitter 

  ADSL equipment (ADSL Modem or ADSL Router ) 

  PC 
 Telephone 

A typical DSL-CPE connectivity at customer premises is shown below. 

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 22 of 27


Broadband Technology (BB ) IPv4 Addressing, DSL Technologie s& DSL CPE

The DSL-CPE conne ctivity is provided with single user or multiuse rs. In case
of ADSL Router it is possible t o connect the user PCs with the help of hub or s witch.

3.17 SECURING WIF I BROADBAND CONNECTION


Security is a buzz word today. It has gained huge importance in the field of
internet. As security of a c ommunication is always a stringent require ment from an
internet connection, it is very important to secure a broadband connectio n. In case of
wireless, this becomes more critical, as now, signals will be radiated from m odem will
be crossing the walls/boundaries and reaching out others. Hence, securing a Wi-Fi
broadband connection is a vital need.

3.18 Need of Security


In case of wireless broadband connection, , signals radiated from m odem will be
crossing the walls/boundaries and reaching out others. Hence, securing a Wi-Fi
broadband connection is a must. Otherwise, intruders/hackers will be able to use our
internet unauthorized. Also they may misuse our connection for sending threatening
sms/mails to some persons. Such unsecured wi-fi connections have been misused during
EETP/BSNL Gold C ertification Course/Ver.02/Jan’2015 Page 23 of 27
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

attacks in Taj hotel, Mumbai. Hence, securing wi-fi connections is not only in our
favour but it also amounts to national security.

3.19 Steps for securing wifi bb connection


The following steps are to be followed for maintaining your Wi-Fi BB connection
secure: a) Change Default Administrator Passwords (and Usernames) of Modem

At the core of Wi-Fi home networks is an access point or router. To set up these pieces
of equipment, there is a Web page (http://192.168.1.1). These Web tools are protected
with a login screen (username and password) so that only the rightful owner can do this.
However, for any given piece of equipment, the logins provided are simple and very
well-known to hackers on the Internet. Change these settings immediately.

b) Turn on (Compatible) WPA / WEP Encryption

All Wi-Fi equipment supports some form of encryption. Encryption technology scrambles
messages sent over wireless networks so that they cannot be easily read by humans. Several
encryption technologies exist for Wi-Fi today. WEP is not exactly “good” encryption. With
a freely available tool like “aircrack”, you can sniff wireless traffic protected by WEP and
crack security on that network in a matter of minutes. WPA is the current, common
encryption standard you should probably be using — though, of course, you should use
something stronger as soon as it becomes available to you. Technology is advancing every
day, on both sides of the encryption arms race, after all.

c) Change the Default SSID

Access points and routers all use a network name called the SSID. Manufacturers
normally ship their products with the same SSID set. True, knowing the SSID does not
by itself allow your neighbors to break into your network, but it is a start. More
importantly, when someone finds a default SSID, they see it is a poorly configured
network and are much more likely to attack it. Change the default SSID immediately
when configuring wireless security on your network.

d) Enable MAC Address Filtering

Each piece of Wi-Fi gear possesses a unique identifier called the physical address or
MAC address. Access points and routers keep track of the MAC addresses of all devices
that connect to them. Many such products offer the owner an option to key in the MAC
addresses of their home equipment that restricts the network to only allow connections from
those devices. Do this, but also know that the feature is not as powerful as it may seem.
Hackers and their software programs can fake MAC addresses easily.

e) Disable SSID Broadcast

In Wi-Fi networking, the wireless access point or router typically broadcasts the network
name (SSID) over the air at regular intervals. This feature was designed for businesses and
mobile hotspots where Wi-Fi clients may roam in and out of range. In the home, this
roaming feature is unnecessary, and it increases the likelihood someone will try to log in

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 24 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast
feature to be disabled by the network administrator.

f) Do Not Auto-Connect to Open Wi-Fi Networks

Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's
router exposes your computer to security risks. Although not normally enabled, most
computers have a setting available allowing these connections to happen automatically
without notifying you (the user). This setting should not be enabled except in temporary
situations.

g) Assign Static IP Addresses to Devices

Most home networkers gravitate toward using dynamic IP addresses. DHCP technology
is indeed easy to set up. Unfortunately, this convenience also works to the advantage of
network attackers, who can easily obtain valid IP addresses from your network's DHCP
pool. Turn off DHCP on the router or access point, set a fixed IP address range instead,
and then configure each connected device to match. Use a private IP address range (like
10.0.0.x) to prevent computers from being directly reached from the Internet.

h) Enable Firewalls On Each Computer and the Router

Modern network routers contain built-in firewall capability, but the option also exists to
disable them. Ensure that your router's firewall is turned on. For extra protection,
consider installing and running personal firewall software on each computer connected to
the router.

i) Position the Router or Access Point Safely

Wi-Fi signals normally reach to the exterior of a home. A small amount of signal
leakage outdoors is not a problem, but the further this signal reaches, the easier it is for
others to detect and exploit. Wi-Fi signals often reach through neighboring homes and
into streets, for example. When installing a wireless home network, the position of the
access point or router determines its reach. Try to position these devices near the center
of the home rather than near windows to minimize leakage.

j) 10. Turn Off the Network During Extended Periods of Non-Use

The ultimate in wireless security measures, shutting down your network will most
certainly prevent outside hackers from breaking in! While impractical to turn off and on
the devices frequently, at least consider doing so during travel or extended periods
offline. Computer disk drives have been known to suffer from power cycle wear-and-
tear, but this is a secondary concern for broadband modems and routers.

If you own a wireless router but are only using it wired (Ethernet) connections, you can
also sometimes turn off Wi-Fi on a broadband router without powering down the entire
network.

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 25 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

3.20 SUMMARY
IPv4 address is a 32 bit number which is used to identify network devices on the
network. Since, the complete IPv4 address space is finite number i.e. 4.38 billion
addresses out of which few hundred million addresses are usable for Internet; therefore,
it is vital to efficiently manage this resource for proper functioning of network and
Internet. Understanding the addressing concepts helps in building the network and
provisioning of addresses to various network components. This has been done with
Subnetting, VLSM and to aggregate the routes CIDR is used. Securing Wi-Fi broadband
connection not only makes our connection safe from unknown/unauthorized misuse, but
also avoids social security related issues. Securing Wi-Fi broadband connection has a
bearing on national security. Unsecured connection are liable to be misused by
mischievous persons, anti-social elements and militanats. DSL technology is used for
the access of broadband to customer premises. Various types of DSL technologies are
used for this purpose. ADSL and VDSL are more popular being the more throughput
transfer capabilities. Digital Subscriber Line Multiplexer (DSLAM) is providing the
interface to DSL-CPE. Connectivity is extended to Data network as well as PSTN with
the help of DSLAM. DSL-CPE consists of Splitter, ADSL modem or router, telephone
and PC. Various types of DSL-CPEs are available depends upon the access technology

3.21 SELF ASSESSMENT QUESTIONS


a) What is an IP address and what is its importance for the network?
b) What are various classes in classful addressing scheme? How to differentiate
between classes using the initial four bits? How many class B networks are
possible?
c) How many bits are required for subletting a network to cater 8 sub networks?
d) Under what circumstances VLSM is used? How it helps in efficiently usage of
IP address pool?

e) Write down type of modulation techniques used in ADSL technology?


f) 2. What is downstream bit rate of ADSL2+ ?
g) 3. What is frequency band used by ADSL2+?
h) 4. What is main drawback of ADSL technology?
i) Why securing Wi-Fi broadband connection is a must?
j) How we can secure Wi-Fi broadband connection?
k) How can test the security status of security of wifi?
l) What do you mean by DSL?
m) What is the role of DSL-CPE?
n) How DSL-CPE is connected to DSLAM?
o) In general what is the transmission rate of ADSL Modem?

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 26 of 27


For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE

3.22 REFERENCES AND SUGGESTED FURTHER READINGS


  Andrew S. Tanenbaum, D. J. (2010). Computer Networks (5th Edition). 
  Stallings, W. (2010). Data and Computer Communications (9th Edition). 
  RFC - Internet Official Protocol Standards. 
  ADSL & DSL Technologies by Walter J. Goralski 
  Understanding Digital Subscriber Line Technology by Thomas Starr 
  http://en.wikipedia.org/wiki/Adsl 
  4. ADSL/VDSL principles by Dennis J. Rauschm 
  Wi-Fi security by Stewart S Miller 
  WPA & 802.11i by William A Arbaugh 
 Wireless home networking for dummies 

 Fundamentals of DSL Technology by Philip Golden, H. Dedieu&K S
 Jacobsen 
 Broadband Access Technology, Interfaces, and Management by Alex gillespie 

 Broadband Last Mile: Access Technologies for Multimedia Communications
 by NikilJayant 
 Broadband Telecommunications Handbook by Regis B J Bates 

 Advances in Broadband Communication and Networks by J. I. Agbinya,
 OyaSevimli 
 ADSL Standards, implementation, & architecture by Charles K Summers 

EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 27 of 27


For Restricted Circulation

You might also like