Principle of IP Addressing and Practical Issues in Implementation
Verified
Added on 2023/01/07
|13
|3232
|70
AI Summary
This article explains the principle of IP addressing based on IPv4 and discusses the practical issues that arise during implementation. It covers the uniqueness of IP addresses, how they are assigned, and the challenges faced in implementing IP addressing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Data communication and Network Routing 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents 1) Identifying the important strategies used in data communication with example of CRC and hamming error discovery/ correction...........................................................................................3 2) By using OSI physical layer, determine that how data consists of a stream of bits which encoded into signals.....................................................................................................................5 3) Detailed explanation of TCP/IP model and analyse the function of one protocol within each layer.............................................................................................................................................8 5) Explain the principle of IP addressing, based on IPv4 and also discuss about the practical issue when implementing IP addressing....................................................................................11 2
1) Identifying the important strategies used in data communication with example of CRC and hamming error discovery/ correction. During data transmission, it has been occurred the various external noise sources interfere with signals and transmitted in any other medium. As a result, it has generated the error at the time of transmission. It is the most commonly issue happen so that it would require to improve the error to implement an effective strategies. Therefore, it can resolve the hamming error discovery. There are different type of errors encountered at the time of transmission because of physical defect in the communication medium. Error coding Error coding is based on the method of detecting as well as correcting the errors, it must ensure that there are no errors in the information or data (Abdelkaderand et.al.,2016). Generally, it can be used for error-free communication in both primary as well as secondary memory devices such as DVD, ROM, hard disk and other various digital data communication system. Need for error coding The data transmission errors occur in the data communication because of various reason such as diffractions, scattering cellular wireless communication, multipath fading and other type of low-signalsto noise ration. Thistype of error coding strategywill use the different mathematical formulation to easily encode data bits at source into longer bit words. The code is applicable when easily decoded at destination and afterwards, it can easily retrieve information or data. 3
Figure1 In above diagram, it has identified that there are two different way to deal with errors. One way to consider the redundant information along with transmitted data. It enable for receiver to deduce the data that has been transmitted. Another way to only provide enough redundancy that allows for receiver to identify any error during transmission. These method is also known as hamming error discovery/ correction. For Example- when it consider an appropriate frame that having n data bits and s redundancy bits. In order to calculate the total number of bits in the one frame a (n+s). Moreover. The total number of bits, which may name as “codeword”, also known as hamming distance. It has supposed to d-distance (Gao,Liuand Yang,2020). In this way, it help for generating a specific property to control or detect the errors on the basis of hamming distance. A distance d+1 code has required to identify d errors because it is not completely change the valid code word into another code. In this way, it can easily detect the errors at receiver side. A distance 2d+1 code has required when it can correct the errors because it is closer than another valid code word. Therefore, it can identify the specific errors. Cyclic Redundancy check (CRC) It is one of most powerful mechanism that mainly used for implementing the error detection procedure. Generally, this cycle will be using the checksum and then divide into binary numbers (Kim,Naand Cho,2020). Cyclic redundancy check is handling the data unit which appended at the end through redundant sequence bits, called as cycling check bits. The data units is divisible by another second digital. In order to predetermined the binary number. On the other 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
hand, at receiver end, it will be divided the data units by predetermined binary digit. If it has generated the “zero” remainder that assumed to error-free. For Example- Let supposed to “k” as bit message which may be transmitted. Other transmitterwillbegeneratingr-bitsequencewhichisknownasframechecksequence. Afterwards, r-bits also appended to k bit message, so that it can be generated k+r bits data. Figure2 In above diagram, it has been determined the scheme for cyclic redundancy checking and mainly used for data communication, compression as well as storage. It is to be consider as powerful techniqueforidentifyingerrorsduringtransmission(PasupuletiandBalaswamy,2020). Afterwards, it will support for testing as integrated circuit and also detection of particular logical faults. As per discussion, it has concluded that CRC code often used for error detection over single frame or vector. It can be expressed as polynomial in x as well as vector length L. afterwards, CRC coding will be generalization of other parity check bit and also used for detecting single bit error. 2) By using OSI physical layer, determine that how data consists of a stream of bits which encoded into signals. OSI model stands for open system interconnection model, which is mainly based on the conceptual model to perform the functionality of telecommunication or computing system. It is 5
underlying the internal structure and technology which always support for managing diverse communication process. Physical layer is the one of lowest layer in OSI model which provide the electrical, mechanical and other functional aid available to disable or enable. Generally, this layer will help for maintaining and transmitting bits through physical connection. It may consider the electrical signals and other electromagnetic waves (Qureshi,Bashirand Abdullah,2020). This method is also known as technical transmission process. Moreover, it should be considered the different hardware devices, network components that are directly associated with physical layer. For Example- Antenna, repeater, transceiver and network cable. These are essential components that always support for exchanging information from sender to receiver side. The physical layer should contain the digital bits which may transferred to accomplish on the wireless transmission path. Therefore, it can easily sharing the data from one medium to another. It also carried out the layer through static or dynamic multiplexing. The Physical Layer: Communication Signals The OSI physical layer means which providing the data transmission process across the network system. Thus, it contain the bits that make up with other data link layer frame. Afterwards, it accept the overall complete frame from different data link layer and also encoded in the series of signals (Rasheed,Huand Balasubramanian,2020). Usually, the encoded bits that mainly comprises with frame either received or not through intermediate devices. Physical signalling and encoding All type of communication occurred from the network system which mainly contain binary digit number. They can be transported individually across multiple physical media. Although the bits that make up with the frame and also represented in the form of physical layer. Therefore, it has been occurred the stream of bits sent one at time to another device (Rasheed, Huand Balasubramanian,2020). Moreover, the physical layer is representing the bits in frame as signals. Each and every signals were placed in the media which occupied the specific amount of data or information. It is referred as bit time. Furthermore, signals are being processed by receiving through hardware device and then return to its original representative bits. In physical layer, at receiver side the signals are usually 6
converted back into stream or bits. It can be identified the start of frame and end of its bit pattern to identify the complete single frame. If the signals are representing in the form of “0” and “1”. Afterwards, it can easily synchronized by use of clock. Figure3 In above figure-3, it has been representing the nature of signals in the form of bits on particular media. Sometimes, it depend on the signaling technique when they can use on attribute of signal to represent signal “0”. Another way, it can use another type of attribute of signal to represent as single “1”. For Example- Non-return to zero may be represented through voltage level on particular medial during bit time. “1” also represented other voltage on medial during specific bit time. Encoding: Grouping bits Signaling process or method that can be represented bit on the physical media. Generally, it can be used the encoding for represented as symbolic grouping of bits and represented to the media. By using encoding process, it will improve the overall data transmission speed and efficiency at higher level (Robinsonand et.al.,2019). In additional, as increases the demand for data speed, which may seek way to show more data across the different media. The group of coding which mainly consider as a method for making this data or information representation. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure4 The physical layer of network device require to easily detect the large amount of data signals and also ignoring the random non data signals. These processes are mainly performed in the physical medium which being stream of signals transmitted and then recognize the starting and end of particular frame (Rasheed, Hu and Balasubramanian, 2020). 3) Detailed explanation of TCP/IP model and analyse the function of one protocol within each layer. TCP/IP model is based on the version of OSI model. It is mainly contain the four different layers. This type of model is commonly used as protocol which takes a layered approach. Figure5 8
Application layer:it is one of most commonly used layer in TCP/IP model. Its primary functionality is to perform various functions. It may include interaction between different application, encoding and decoding and control the coordination between systems. In this layer, it may include different types of protocols such as HTTP, SMTP, talent, DHCP and DNS. These are mainly supports for data transmission from one place to another. HTTP is the most commonly used protocol which transfer webpages from HTTP server to client side. When it can use the web browser such as FireFox, internet explorer. On the other hand, HTTP is useful for sending request from remote server. in order to maintain and control the coordination between server and client. Transport layer:it is basically responsible for reliability, correction of information and maintain flow of data which being sent over network system. Generally, transport layer can use the user data and header to transmit signals from destination. It has been established the end to end data transmission and also set up a logical between different hosts. Transport layer is mainly used two protocols such as transmission control and user datagram. TCP is generally connection oriented, reliable that can use the windowing to manage or control the flow of information (Zhang,Zhaoand Wu,2019). In order to provide the better delivery service into multiple segments. Apart from that UDP is simply use for transferring data without any whistles. These are considered as an important protocol to perform the function of data transmission. Internet layer: Once UDP and TCP have been segmented the data but require to the added specifci header. Therefore, they can easily send the segment down to other network layer. The 9
specific destination host may reside in different network as far from host which divided through routers. In this way, Internet layer will be perform the function to ensure that segment is moved across the network system. Internet layer is commonly used IP (internet protocol) that provide the better service in term of datatransmission (Zhang, Zhao and Wu, 2019).This protocol is performing the different task with the help of routers. If in case it has identified the problem or issue when immediately send error message across internet layer. The layer is dominated by IP with supporting its unique purpose. Each and every host in the newtork that mainly consists of logical address called as IP address. Figure6 As received IP from UDP as well as TCP, add a header with appropriate source and destination addresse among another information or data. When network device such as router receive the data in the form of packet. During data transmission, it contain the destination address in the header and forward towards the network system. Network Access layer:it is the lowest layer in TCP/IP model which provide the better way to deliver data from one device to the network system. network access layer of TCP/Ip model 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
corresponds with physical as well as data link layer. It can be defined all essential hardware and protocol to establish the connection with physical network system. furthermore, The particular destination is another host within network system and further forwardingsignals (Qureshi, Bashir and Abdullah, 2020). Internet layer is basically viewed the entire network system but network access layer is defined the boundary of physical layer. This layer is mainly consists of large number of protocols such as ethernet, point to point protocol. Ethernet is the most common protocol that is mainly used to establish connection within network. Network access layer use physical address in order to determine the hosts and deliver data packet. This layer is also known as Frame, which mainly contain IP packet by using protocol header. Afterwards, when router receives a particular frame and then strip of header and trailer. 5) a. Explain the principle of IP addressing, based on IPv4 and also discuss about the practical issue when implementing IP addressing. An IP address is based on the conceptual term which mainly used for identifying the uniqueness in particular device. It is made up 32 bits and also divisible into different network portion. This 32 bit has broken into four different octets. Each one has converted to decimal number and separated by Dot. IPv4 is mainly consists of unique number that can be assigned by either IR, ISP and also completing the registration process. The particular network number must be unique within organization (Qureshi,Bashirand Abdullah,2020). The unique IPv-4 address is directly interfaces with every system on the network. Generally, it contain 32-bit number which uniquely identifiedtheinterfaceonsystem.ForExample:itcanuseprivateIPaddressof 192.168.22.0/24.The registered IPv number which mainly define IP class network. 192.168.22 is a network part which consists of IPv4 network unique addressed and also received from ISP. 0 is a type of host which may assign to interface within system 11
/24 is defined as network prefix which is mainly identified that how many bits comprise with particular network digit number. It also providing the subnet mask for Internet protocol address. Determine the issue when implementing IP addressing Private IP addressing is consider as legitimately used within organization. When user can use to inside network, access the information or data. Typically, it is mainly connected with different network devices such as router, firewall and other network proxy, these are providing the better service when translating the network addressed in the form of port number. The principle of IP addressing is that when it allows every hardware device connect with internet to be given logical address. In order to exchange data from one place to another. When implementing IP address and identify the unpredictable or confusing interactions that could occur due to traffic. In case, the possibly other applications that were launched from network IPv-4 inside address (Qureshi,Bashirand Abdullah,2020). Afterwards, it has been passed over the same address in the public IP. While such type of situation would be likely to happen and difficult to identify the source or destination address. At that time, denial of service attack can make use of IP addresses in attempt to develop obstacles. In context of security, it should be require to concern about the public IP address and maintain the privacy. Asworkingaspre-saleengineerinITorganizationwhichconsistsofdifferent departments. In this way, it will be assigned the specific IP addressing for establish connection between different department. 12
REFERENCES Book and Journals Abdelkader, T. and et.al., 2016. A performance comparison of delay-tolerant network routing protocols.IEEE Network.30(2). pp.46-53. Gao, H., Liu, C. and Yang, X., 2020. V2VR: Reliable Hybrid-Network-Oriented V2V Data TransmissionandRoutingConsideringRSUsandConnectivityProbability.IEEE Transactions on Intelligent Transportation Systems. Kim, N., Na, W. and Cho, S., 2020. Dual-Channel-Based Mobile Ad Hoc Network Routing Technique for Indoor Disaster Environment.IEEE Access. Pasupuleti, V.R. and Balaswamy, C., 2020. Optimised routing and compressive sensing based data communication in wireless sensor network.IET Communications.14(6). pp.982- 993. Qureshi, K.N., Bashir, F. and Abdullah, A.H., 2020. Distance and signal quality aware next hop selectionroutingprotocolforvehicularadhocnetworks.NeuralComputingand Applications.32(7). pp.2351-2364. Rasheed, I., Hu, F. and Balasubramanian, B., 2020. Intelligent vehicle network routing with adaptive3dbeamalignmentformmwave5g-basedv2xcommunications.IEEE Transactions on Intelligent Transportation Systems. Robinson, Y.H. and et.al., 2019. Link-disjoint multipath routing for network traffic overload handling in mobile ad-hoc networks.IEEE Access.7. pp.143312-143323. Zhang, D.G., Zhao, P.Z. and Wu, H., 2019. A new method of mobile ad hoc network routing based on greed forwarding improvement strategy.IEEE Access.7. pp.158514-158524. 13