3 Ipv4 Addressing, DSL Technologies & DSL Cpe & Wifi Security
3 Ipv4 Addressing, DSL Technologies & DSL Cpe & Wifi Security
3.2 OBJECTIVE
3.5 SUBNETTING
3.6 VLSM
3.7 CIDR
3.9 ADSL
3.20 SUMMARY
3.1 INTRODUCTION
Internet Protocol version 4 (IPv4) is the fourth revision in the development of the
Internet Protocol (IP) and the first version of the protocol to be widely deployed.
Together with IPv6, it is at the core of standards-based internetworking methods of
the Internet. As of 2012 IPv4 is still the most widely deployed Internet
Layer protocol.IPv4 is described in IETF publication RFC 791 (September 1981).
IPv4 is a connectionless protocol for use on packet-switched Link Layer
networks (e.g., Ethernet). It operates on a best effort delivery model; in that it does not
guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate
delivery. These aspects, including data integrity, are addressed by an upper layer
transport protocol, such as the Transmission Control Protocol (TCP).
IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4.3
billion (232) addresses. Addresses were assigned to users, and the number of unassigned
addresses decreased. IPv4 address exhaustion occurred on February 3, 2011. It had been
significantly delayed by address changes such as classful network design, Classless
Inter-Domain Routing, and network address translation (NAT).
3.2 Objective
After reading this unit, you should be able to understand:
converted into decimal and is separated by a dot hence also known as Dotted Decimal
Notation. As human beings, we see an IP address like 202.14.64.1
In decimal the address range is 0.0.0.0 to 255.255.255.255. An IP address is
having two parts: Network ID or Network Part and Host ID or Host Part. It is of the
form <networkID,hostID>
Class Identifier: These are the few initial bits which determine the class of an
IP address. This is turn indicates how many bits are defining network and host.
Subnet Mask: This is the mask which helps in determining the number of bits
for network. In other words, it helps in determining network ID of an address.
Network Address: Network Address is an address of the network. In network
address, all host bits are set to 0. It is similar to STD code in BSNL landline numbers.
Host Address: Host address is an address assigned to an interface of a node.
Network address along with host bits determines the host address. Host part is equivalent
to telephone number assigned to landline phone.
A 126 16,777,214
B 16,384 65,534
C 2,097,152 254
Class 0 0 0 0 00 0 0 1 1 1 1 1 1 0 - 127
Addresses 1 to 126 128 to 191 192 to 223 224 to 239 240 to 254
begins with
/8 or /16 or /24 or
Natural or - -
Default Mask 255.0.0.0 255.255.0.0 255.255.255.0
N H H H N N H H N N N H
Network Part
- -
/ Host Part 8 8 8 8 8 8 8 8 8 8 8 8
bits bits bits bits bits bits bits bits bits bits bits bits
203.251.7.255
Network ID – 203.251.7.00000000 => 203.251.7.0
Broadcast ID – 203.251.7.11111111 =>203.251.7.255
203.251.7.0
3.5 Subnetting
Chopping up of a network into a number of smaller networks is called
subnetting.Subnetting an IP Network can be done for a variety of reasons, including
organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.),
preservation of address space, and security.
It allows to assign some of the bits, normally used by the host portion of the
address, to the network portion of the address.The format of subnetted IP address would
be <network number, subnet number, host number>. It allows efficient use of full
network address.
Subnet is a real network under a network.Any of the classes can be subnetted.
The most common reason is to control network traffic.
3.5.1 SUBNETTING USING 1 BIT
Depending upon number of subnets to be carved out of given network, no of bits
from host part can be used for creating these subnets. Example, 1 bit can create 2
subnets, 2 bits for 4 subnet and so on.
Example: Subnetting using 1 bit can be performed in order to divide a network
into 2 equal sub-networks.
Public IP Addresses
These are the address spaces that are used in Public Networks like Internet.
Private IP Addresses
EETP/BSNL Gold Certification Course/Ver.02/Jan’2015 Page 7 of 27
For Restricted Circulation
Broadband Technology (BB) IPv4 Addressing, DSL Technologies& DSL CPE
These are used in Private Networks like LAN.
3.9 ADSL
Digital Subscriber Line (DSL) is a broadband high-speed Internet technology
that brings high-bandwidth information to home and offices over existingtwisted-pair
telephone lines as the access media.
Following are some of the key features of DSL:
1. Distance-sensitive technology
2. Internet connection is always ON
3. Simultaneous use of the phone line for voice as well as data traffic
4. Internet Connection is highly reliable and secure
5. High Speed (Mbps)
Over a period of time, a number of technologies (xDSL) have been introduced to
provide faster data speeds over this medium. The various xDSL technologies are given
below.
1. ADSL (Asymmetric Digital Subscriber Line)
2. VDSL (Very High-Speed Digital Subscriber Line)
3. RADSL (Rate Adaptive Digital Subscriber Line)
4. HDSL (High Data-Rate Digital Subscriber Line)
5. SDSL (Symmetric Digital Subscriber Line
Because it doesn't require a dedicated phone line, ADSL is able to share a line with an
existing telephone service wi thout impacting that phone service in any way.
The word "asymme tric" means that the capacity to send data upstream and
downstream is not equivalent. "Digital" means that data or voice is con verted into a
binary format where the aud io or video data is represented by a series of " 1"s and "0"s.
The term "subscriber line" s imply refers to the copper pair telephone wires that are used
for conventional phone servi ce.
First the POTS channel is splits off from the digital modem by filter, thus
guaranteeing uninterrupted POTS. After the POTS channel are splitted from the digital
data transfer bandwidth, the 26kHz to 1.1mhz data bandwidth could be further separated
by using one of two ways as describe below:
Frequency Division Multiplexing (FDM) :-
FDM assigns one band for upstream data and one band for downstream data.
Time division multiplexing divides the downstream path into one or more high speed
channels and one or more low speed channels. But the upstream path is only
multiplexed into corresponding low speed.
Echo cancellation:-
Echo cancellation can be used so the downstream channel overlaps the upstream
channel, or vice versa, meaning simultaneous upstream and downstream signals are
sent. Echo cancellation is optional and is typically not used.To separate them is by local
echo cancellation. This technique is common in V.32 and V.34 modems(Conventional
Modems).
By using either one of the above techniques, ADSL splits off a 4khz region for
POTS at the DC end of the band.
Upstream Downstream
Basic
Telephon FDM
e
Frequency
Upstream Downstream
Basic
Echo
Telephon
e Cancellation
Frequency
In-Phase Filter
Output To
Binary line
Constellation D/A Pass band Line Filter
Encoder
Quadrature Filter
In-Phase
Adaptive filter
Data Out
Line
I Decision Decoder
A/D Device
Quadrature Filter
As mentioned before, DMT utilizes the spectrum between 26kHz and 1.1Mhz. After
using FDM or echo cancellation technique, this spectrum of bandwidth is split up into
upstream band(26kHz to 138kHz) and downstream band (138kHz to 1.1MHz), which is
then further divided into 256 discrete sub-channels each of which had a bandwidth of
4kHz. One of DMT most significant feature is that it is able to dynamically adapt to the
line condition to obtain the maximum throughput for each unique telephone line. DMT
does this by framing the data bits into chunks and spreads them over the sub-channels.
The allocation of data into each sub-channel is dependent on the characteristics of the
line and on the SNR (Signal to Noise Ratio) of the line. There could be no data at all in
a really noisy channel and there could be as high as 15 bits/Hz in a channel where SNR
is optimum.
By using the average signal to noise ration (SNR) of the sub-channel, the number of bits
to be allocated to that sub-channel can be decided. The number of bits to be assigned to
the nth channel could be calculated from this equation.
The major stages in transmitting and receiving could be seen in the following
block diagram.
Parallel
Data Out
line DMT To Serial
Filter A/D Symbol
FFT Output
Decoder Data
Buffer
DMT Symbols
Received Serially
N (Complex)
Sub-channel
Symbols
Output To
Data line
Serial to DMT
I Parallel
D/A Line Filter
Input Symbol IFFT
Data
Buffer Encoder
DMT Symbols
Transmitted
Serially
N (Complex)
Sub-channel
Symbols
The chunk of bits that are being assigned to each sub-channel as described above
are encoded as a set of quadrature amplitude modulated sub symbols. These sub
symbols are then pass into an Inverse Fourier Transform(IFFT) which combines the sub
symbols into a set of real-valued time domain samples, the output of the IFFT is then
send a Parallel-to-Serial block with cyclic prefix which is added to remove InterSymbol
Interference (ISI) between the sub-channels. The output is then pass into an digital to
analog converter which is then send through the twisted copper telephone wire. The
receiver would receive the signal from the twisted copper telephone wire and does the
reverse process to obtain the required data. To reduce error in transmission and to
counter those problems of using telephone lines as a data transfer medium, DMT had
uses Reed Solomon forward error correction method
.The size of this Reed Solomon codeword depends on the number of bits assigned to
each sub-channel.
ADSL2
ITU G.992.3 is an I TU (International Telecommunication Union) standard, also
referred to as ADSL2 or G.DMT.bis. It optionally extends the c apability of
basic ADSL in data rates to 12 Mbit/s downstream and, depending on Anne x version, up to
3.5 Mbit/s upstream ADS L2 uses the same bandwidth as ADSL but achieves higher
throughput via improved modulation techniques. Actual speeds may reduce depending on
line quality,usually the most significant factor in line quality is the d istance from the
DSLAM to the customer's equipment
ADSL2+
ADSL2+ extends the capability of basic ADSL by doubling the number
of downstream bits. The data rates can be as high as 24 Mbit/s downstre am and up to
1.4 Mbit/s upstream depen ding on the distance from the DSLAM to t e customer's
premises.
RADSL(Rate-Adaptive DSL)
As the name implies, rate-adaptive DSL (RADSL) modems adjust the data rate
to match the quality of the twisted-pair connection. Emerging software should make this
an automated process with little human intervention.
HDSL(High-Data-Rate DSL)
HDSL modem is viewed as equivalent of PCM stream(2 MBps) and offers the
same bandwidth both upstream and downstream. It can work up to a distance of 3.66 to
4.57 kms depending upon the speed required. It can deliver 2048 kbps
a) On 2 pairs of wires, each line carrying 1168 kbps
b) On 3 pairs of wires, each line carrying 784 kbps.
SDSL(Symmetric DSL)
Symmetrical digital subscriber line (SDSL) is similar to HDSL but requires only
one pair of wires. Transmission speed ranges from n x 64 kbps to 2.0 Mbps in both
directions. In this the upload and download streams are of equivalent bandwidth.
DMT uses COFDM(Coded Orthogonal Frequency Division Multiplexing) to
create 256 carrier channels using frequencies above voice on the line.
The frequency layout can be summarised as:
0–4 kHz, voice.
4–25 kHz, unused guard band.
25–138 kHz, 25 upstream carrier channels (7-31).
138–1104 kHz, 224 downstream carrier channels (32-255).
Carrier channel N is centered on a frequency of N × 4.3125 kHz.
The bandwidth used by each carrier channel overlaps neighboring carrier
channels.
The number of bits encoded on each carrier channels is between 2 and 15,
depending on the attenuation and signal to noise ratio for that carrier channels .
For each 3 dB of dynamic range above the noise floor within a carrier channels , 1
bit can be encoded reliably. Based on this, and the fact that only a minimum of 2 bits are
encoded per carrier channels , the SNR of any one single carrier channel must not drop
below 6 dB . Too many errors that cannot be corrected by the built in error correction would
lead to the end user modem/router losing sync with the remote exchangeDSLAM.
Echo cancellation can be used on the lower frequency (upstream) carrier channels
to allow all 256 carrier channels to be used for downstream.
ADSL statistics
To provide a stable service in practice.
1. Attenuation - How much signal is lost on the line
(should be <56 dB downstream, <37 dB upstream)
2. Noise margin - 12 dB or higher, for both downstream and upstream
3. SNR of any one single carrier channel must not drop below 6 dB
UTStarcom UT-300R
MT800 ADSL Modem.
MT800 has one Ethernet Interface & Telephone Interface. It manages the data
flow in Asymmetrical Transmission rates with maximum downstream of 8 Mbps and
maximum upstream of 896 kbps. It works up to 5.5 km. A typical DSL-CPE MT 800
ADSL Modem front and rear view is shown below along with the indicators: -
Front view
Rear View
LED Description
o. s
ADS ADSL Port – to the ADSL wall jack
L
Ethe Ethernet Port – to the Ethernet port on yo ur PC or
rnet HUB
Rese Reset Button ( Pressing this button will reset this unit
t to its default values)
Pow Power Switch
er
9V Power Plug – to power adapter
AC 1A
ADSL 2/2+ Router/ Bridge (UT-300R2)
UTStarcom's UT-300 R2 enables routing and bridging functions via a single
DSL connection for high quality t riple play applications. Designed for residentia l,
small-sized LAN and SOHO application s, it supports higher ADSL/ADSL2+ speeds f
or triple play and high-end video applicati ons.
TB
Splitter
Telephone Exchange
30V
FC
Telephone
DSLAM MDF
Splitter
PC
Telephone
A typical DSL-CPE connectivity at customer premises is shown below.
The DSL-CPE conne ctivity is provided with single user or multiuse rs. In case
of ADSL Router it is possible t o connect the user PCs with the help of hub or s witch.
attacks in Taj hotel, Mumbai. Hence, securing wi-fi connections is not only in our
favour but it also amounts to national security.
At the core of Wi-Fi home networks is an access point or router. To set up these pieces
of equipment, there is a Web page (http://192.168.1.1). These Web tools are protected
with a login screen (username and password) so that only the rightful owner can do this.
However, for any given piece of equipment, the logins provided are simple and very
well-known to hackers on the Internet. Change these settings immediately.
All Wi-Fi equipment supports some form of encryption. Encryption technology scrambles
messages sent over wireless networks so that they cannot be easily read by humans. Several
encryption technologies exist for Wi-Fi today. WEP is not exactly “good” encryption. With
a freely available tool like “aircrack”, you can sniff wireless traffic protected by WEP and
crack security on that network in a matter of minutes. WPA is the current, common
encryption standard you should probably be using — though, of course, you should use
something stronger as soon as it becomes available to you. Technology is advancing every
day, on both sides of the encryption arms race, after all.
Access points and routers all use a network name called the SSID. Manufacturers
normally ship their products with the same SSID set. True, knowing the SSID does not
by itself allow your neighbors to break into your network, but it is a start. More
importantly, when someone finds a default SSID, they see it is a poorly configured
network and are much more likely to attack it. Change the default SSID immediately
when configuring wireless security on your network.
Each piece of Wi-Fi gear possesses a unique identifier called the physical address or
MAC address. Access points and routers keep track of the MAC addresses of all devices
that connect to them. Many such products offer the owner an option to key in the MAC
addresses of their home equipment that restricts the network to only allow connections from
those devices. Do this, but also know that the feature is not as powerful as it may seem.
Hackers and their software programs can fake MAC addresses easily.
In Wi-Fi networking, the wireless access point or router typically broadcasts the network
name (SSID) over the air at regular intervals. This feature was designed for businesses and
mobile hotspots where Wi-Fi clients may roam in and out of range. In the home, this
roaming feature is unnecessary, and it increases the likelihood someone will try to log in
to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast
feature to be disabled by the network administrator.
Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's
router exposes your computer to security risks. Although not normally enabled, most
computers have a setting available allowing these connections to happen automatically
without notifying you (the user). This setting should not be enabled except in temporary
situations.
Most home networkers gravitate toward using dynamic IP addresses. DHCP technology
is indeed easy to set up. Unfortunately, this convenience also works to the advantage of
network attackers, who can easily obtain valid IP addresses from your network's DHCP
pool. Turn off DHCP on the router or access point, set a fixed IP address range instead,
and then configure each connected device to match. Use a private IP address range (like
10.0.0.x) to prevent computers from being directly reached from the Internet.
Modern network routers contain built-in firewall capability, but the option also exists to
disable them. Ensure that your router's firewall is turned on. For extra protection,
consider installing and running personal firewall software on each computer connected to
the router.
Wi-Fi signals normally reach to the exterior of a home. A small amount of signal
leakage outdoors is not a problem, but the further this signal reaches, the easier it is for
others to detect and exploit. Wi-Fi signals often reach through neighboring homes and
into streets, for example. When installing a wireless home network, the position of the
access point or router determines its reach. Try to position these devices near the center
of the home rather than near windows to minimize leakage.
The ultimate in wireless security measures, shutting down your network will most
certainly prevent outside hackers from breaking in! While impractical to turn off and on
the devices frequently, at least consider doing so during travel or extended periods
offline. Computer disk drives have been known to suffer from power cycle wear-and-
tear, but this is a secondary concern for broadband modems and routers.
If you own a wireless router but are only using it wired (Ethernet) connections, you can
also sometimes turn off Wi-Fi on a broadband router without powering down the entire
network.
3.20 SUMMARY
IPv4 address is a 32 bit number which is used to identify network devices on the
network. Since, the complete IPv4 address space is finite number i.e. 4.38 billion
addresses out of which few hundred million addresses are usable for Internet; therefore,
it is vital to efficiently manage this resource for proper functioning of network and
Internet. Understanding the addressing concepts helps in building the network and
provisioning of addresses to various network components. This has been done with
Subnetting, VLSM and to aggregate the routes CIDR is used. Securing Wi-Fi broadband
connection not only makes our connection safe from unknown/unauthorized misuse, but
also avoids social security related issues. Securing Wi-Fi broadband connection has a
bearing on national security. Unsecured connection are liable to be misused by
mischievous persons, anti-social elements and militanats. DSL technology is used for
the access of broadband to customer premises. Various types of DSL technologies are
used for this purpose. ADSL and VDSL are more popular being the more throughput
transfer capabilities. Digital Subscriber Line Multiplexer (DSLAM) is providing the
interface to DSL-CPE. Connectivity is extended to Data network as well as PSTN with
the help of DSLAM. DSL-CPE consists of Splitter, ADSL modem or router, telephone
and PC. Various types of DSL-CPEs are available depends upon the access technology