Previous Page
Next Page

Network Fundamentals

Before you start managing a Solaris network, you need to know the definitions of some terms used in networking. There are numerous acronyms related to networking, and many of them are explained in the following sections. You'll first learn about the networking model that is deployed by Solaris 10, and then you'll learn about the types of networks that are available, including the various network protocols. Finally, you'll learn about the physical components of the network hardware, including the network interfaces and cables.

Network Topologies

The term network topology refers to the overall picture of the network and the arrangement in which the nodes on a network are connected to each other. The topology describes small and large networks, including local area networks (LANs) and wide area networks (WANs).

LANs

A LAN is a set of hosts, usually in the same building and on the same floor, connected by a high-speed medium such as Ethernet. A LAN might be a single Internet Protocol (IP) network or a collection of networks or subnets that are connected through high-speed switches and/or routers.

The network interface, and cable or wire, used for computer networks is referred to as network media. Normally a type of twisted-pair wire or fiber-optic cable connects nodes on a LAN. Twisted-pair cable has less bandwidth than optical fiber, but it is less costly and easier to install. With twisted-pair cable, the two individual wires are twisted around each other to minimize interference from the other twisted pairs in the cable. Twisted pair cable is available in two different categories:

  • Unshielded twisted pair (UTP) UTP is used in the majority of network environments where electromagnetic interference is not a problem.

  • Shielded twisted pair (STP) STP is used in noisy environments; the metal shield around the wires protects against excessive electromagnetic interference.

In addition, twisted-pair cable is available in stranded or solid wire (22 to 26 gauge). Stranded wire is used most commonly because it is very flexible and can be bent around corners. Solid wire cable suffers less attenuation (that is, signal loss) and can span longer distances, but it is less flexible than stranded wire and can break if it is repeatedly bent.

Furthermore, cable is grouped into seven categories, according to the Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) standard EIA/TIA-568, based on its transmission capacity. The categories are listed in Table 8.1.

Table 8.1. Cable Categories

Category

Cable Type

Application

1

UTP

Analog voice

2

UTP

Digital voice and 1Mbps data

3

UTP, STP

16Mbps data

4

UTP, STP

20Mbps data

5

UTP, STP

10Mbps and 100Mbps data

5e

UTP, STP

1000Mbps (1Gbps) data

6

UTP, STP

155Mbps (ATM) and 1000Mbps (1Gbps) data


You can see from Table 8.1 that there are several variants of twisted-pair cable, each with different capacities. For example, Category 5 (Cat 5) UTP cable can support sustained data throughput of 100Mbps.

WANs

A wide area network (WAN) is a network that covers a potentially vast geographic area. An example of a WAN is the Internet. Another example is an enterprise network that links the separate offices of a single corporation into one network spanning an entire country or perhaps an entire continent. A WAN, unlike a LAN, usually makes use of third-party service providers for interconnection. It is a common misconception among newcomers to the world of networking that a WAN is simply a LAN but on a larger scale. This is not true because different technologies, equipment, and protocols are used in LANs and WANs. For example, Ethernet is a LAN technology that is not usually used in WANs (but this is changing with wider availability and lower cost of high-speed long-distance fiber connections).

Network Protocols and Network Models

A network protocol is the part of the network that you configure but cannot see. It's the "language" of the network, which controls data transmission between systems across the network. To understand protocols, you need to first understand network models.

A network model is an abstract common structure used to describe communication between systems. The two network models that provide the framework for network communication and that are the standards used in Solaris network environments are the International Standards Organization (ISO)/Open Systems Interconnection (OSI) reference model and the Transmission Control Protocol/Internet Protocol (TCP/IP) model. These models are discussed in the following sections.

The network models consist of different layers. You can think of the layers as steps that must be completed before the next step can be tackled, and before communication can occur between systems.

The ISO/OSI Model

The seven-layered ISO/OSI model was devised in the early 1980s. Although this model represents an ideal world and is somewhat meaningless in today's networking environment, it's quite helpful in identifying the distinct functions that are necessary for network communication to occur.

In the ISO/OSI model, individual services that are required for communication are arranged in seven layers that build on one another. Each layer describes a specific network function, as shown in Figure 8.1.

Figure 8.1. The seven-layer ISO/OSI model.


Table 8.2 describes the function of each individual layer.

Table 8.2. The Seven Layers of the ISO/OSI Model

Layer Number

Layer Name

Function

1

Physical

Describes the network hardware, including electrical and mechanical connections to the network.

2

Data link

Splits data into frames for sending on the physical layer and receives acknowledgement frames. The data link layer performs error checking and retransmits frames that are not received correctly.

3

Network

Manages the delivery of data via the data link layer and is used by the transport layer. The most common network-layer protocol is IP.

4

Transport

Determines how to use the network layer to provide a virtually error-free, point-to-point connection so that Host A can send messages to Host B that arrive uncorrupted and in the correct order. TCP operates at this layer.

5

Session

Uses the transport layer to establish a connection between processes on different hosts. The session layer handles security and creation of the session.

6

Presentation

Performs functions such as text compression, code, or format conversion to try to smooth out differences between hosts. It allows incompatible processes in the application layer to communicate via the session layer.

7

Application

Is concerned with the user's view of the network (for example, formatting email messages). The presentation layer provides the application layer with a familiar, local representation of data that is independent of the format used on the network. Utilities such as Telnet and File Transfer Protocol (FTP) operate at this layer.


The TCP/IP Model

In order for a network to function properly, information must be delivered to the intended destination in an intelligible form. Because different types of networking software and hardware need to interact to perform the network function, designers developed the TCP/IP communications protocol suite (a collection of protocols), which is now recognized as a standard and is used throughout the world. Because it is a set of standards, TCP/IP runs on many different types of computers, making it easy for you to set up a heterogeneous network running any operating system that supports TCP/IP. The Solaris operating system includes the networking software to implement the TCP/IP communications protocol suite.

The TCP/IP model is a network communications protocol suite that consists of a set of formal rules that describe how software and hardware should interact within a network. The TCP/IP model has five layers:

  • Hardware layer

  • Network interface layer

  • Internet layer

  • Transport layer

  • Application layer

Exam Alert

Four or Five LayersBe careful on the exam because Sun has used both a four-layer and five-layer description of this model since Solaris 8. If a question describes a four-layer model then the hardware layer should be thought of as being integrated with the network interface layer.


Each of these is discussed in the following sections.

The Hardware Layer

The TCP/IP model hardware layer corresponds to the ISO/OSI model physical layer and describes the network hardware, including electrical and mechanical connections to the network. This layer regulates the transmission of unstructured bit streams over a transmission medium, which might be one of the following:

  • Ethernet (described in Institute of Electrical and Electronics Engineers [IEEE] Standard 802.3)

  • Token-passing bus (described in IEEE 802.4)

  • Token Ring (described in IEEE 802.5)

  • Metropolitan area networks (described in IEEE 802.6)

  • Wireless LANs (described in IEEE 802.11)

Note

Support for Token Ring has been removed in Solaris 10, as it is now considered an obsolete technology.


For each medium, the IEEE has created an associated standard under project 802, which was named for the month (February) and year (1980) of its inception. Each medium has its own standard, which is named based on the 802 project. For example, Ethernet has its own standard: 802.3.

The Network Interface Layer

The TCP/IP model network interface layer corresponds to the ISO/OSI data link layer; it manages the delivery of data across the physical network. This layer provides error detection and packet framing. Framing is a process of assembling bits into manageable units of data. A frame is a series of bits with a well-defined beginning and end.

The network interface layer protocols include the following:

  • Ethernet

  • Fiber Distributed Data Interface (FDDI)

  • Point-to-Point Protocol (PPP)

  • Token Ring

These protocols are described later in this chapter.

The Internet Layer

The TCP/IP model Internet layer corresponds to the ISO/OSI network layer and manages data addressing and delivery between networks, as well as fragmenting data for the data link layer. The Internet layer uses the following protocols:

  • IP IP is the set of techniques for transferring data across a network. The majority of traffic across the Internet uses IP in conjunction with other protocols, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). IP determines the path a packet must take based on the destination host's IP address. Solaris 10 supports IP version 4 (IPv4) and IP version 6 (IPv6), which are discussed later in this chapter.

  • Internet Control Message Protocol (ICMP) ICMP allows for the generation of error messages, test packets, and informational messages related to IP.

  • Address Resolution Protocol (ARP) ARP defines the method that maps a 32-bit IP address to a 48-bit Ethernet address.

  • Reverse Address Resolution Protocol (RARP) RARP is the reverse of ARP. It maps a 48-bit Ethernet address to a 32-bit IP address.

The Transport Layer

The TCP/IP model transport layer corresponds to the ISO/OSI model transport layer and ensures that messages reach the correct application process by using Transmission Control Program (TCP) and User Datagram Protocol (UDP).

TCP uses a reliable, connection-oriented circuit for connecting to application processes. A connection-oriented virtual circuit allows a host to send data in a continuous stream to another host. It guarantees that all data is delivered to the other end in the same order as it was sent and without duplication. Communication proceeds through three well-defined phases: connection establishment, data transfer, and connection release.

UDP is a connectionless protocol. It has traditionally been faster than TCP because it does not have to establish a connection or handle acknowledgements. As a result, UDP does not guarantee delivery. UDP is lightweight and efficient, but the application program must take care of all error processing and retransmission. Considerable improvements in network technology, however, have virtually eliminated the performance gap between TCP and UDP, making TCP the protocol of choice.

The Application Layer

The TCP/IP model application layer corresponds to the session layer, presentation layer, and application layer of the ISO/OSI model. The TCP/IP model application layer manages user-accessed application programs and network services. This layer is responsible for defining the way in which cooperating networks represent data. The application layer protocols include the following:

  • Network File System (NFS) This client/server protocol and application is described in Chapter 9, "Virtual File Systems, Swap Space, and Core Dumps."

  • Network Information System (NIS), Network Information System Plus (NIS+), Domain Name System (DNS), and the Lightweight Directory Access Protocol (LDAP) These naming services are described in Chapter 12, "Naming Services."

  • rlogin, Telnet, and FTP These network services are described in the "Network Services" section, later in this chapter.

  • Hypertext Transfer Protocol (HTTP) HTTP is used by the World Wide Web to display text, pictures, and sound via a Web browser.

  • Simple Mail Transport Protocol (SMTP) SMTP provides delivery of email messages.

  • Remote Procedure Call (RPC) RPC is a protocol that one program can use to request services from another system on the network. RPC is described in the "Network Services" section, later in this chapter.

  • Routing Information Protocol (RIP) RIP provides for automated distribution of routing information between systems. Solaris 10 includes RIP version 2 (RIPv2), a significant update to RIP.

  • Simple Network Management Protocol (SNMP) SNMP is used to manage and monitor all types of networking equipment, including computers, hubs, and routers.

Exam Alert

Know Layers and FunctionsFor the exam, ensure that you are familiar with the layers of both the OSI seven-layer model and the TCP/IP model. You should be able to identify functions/protocols that operate at each layer and the order in which the layers are processed.


Encapsulation and Decapsulation

When you think of systems communicating via a network, you can imagine the data progressing through each layer down from the application layer to the hardware layer, across the network, and then flowing back up from the hardware layer to the application layer. A header is added to each segment that is received on the way down the layers (encapsulation), and a header is removed from each segment on the way up through the layers (decapsulation). Each header contains specific address information so that the layers on the remote system know how to forward the communication.

For example, in TCP/IP, a packet would contain a header from the physical layer, followed by a header from the network layer (IP), followed by a header from the transport layer (TCP), followed by the application protocol data.

Packets

A packet is the basic unit of information to be transferred over the network. A packet is organized much like a conventional letter. Each packet has a header that corresponds to an envelope. The header contains the addresses of the recipient and the sender, plus information on how to handle the packet as it travels through each layer of the protocol suite. The message part of the packet corresponds to the contents of the letter itself. A packet can contain only a finite number of bytes of data, depending on the network medium in use. Therefore, typical communications such as email messages are split into packets.

Ethernet

Ethernet is a standard that defines the physical components a machine uses to access the network and the speed at which the network runs. It includes specifications for cable, connectors, and computer interface components. Ethernet is a LAN technology that originally facilitated transmission of information between computers at speeds of up to 10Mbps. A later version of Ethernet, called 100BASE-T, or Fast Ethernet, pushed the speed up to 100Mbps, and Gigabit Ethernet supports data transfer rates of 1Gbps (1,000Mbps). Table 8.3 lists some common media names and their associated cable types.

Table 8.3. Ethernet Media

Ethernet Type

Medium

10BASE2

50-ohm ("thin") coaxial cable

10BASE5

75-ohm ("thick") coaxial cable

10BASE-T

Unshielded or shielded (UTP/STP) multistrand cable

100BASE-TX

Unshielded or shielded (UTP/STP) twisted pair cable

100BASE-FX

Fiber-optic cable

1000BASE-T

Unshielded or shielded (UTP/STP) twisted pair cable

1000BASE-CX

Copper cable used within wiring cabinets over short distances (<25 Meters)

1000BASE-LX

Fiber-optic cable


Note

10BASE2 and 10BASE5 media are now very rarely used; even 10BASE-T networks are becoming increasingly rare.


The 100BASE-T type of Ethernet is the most popular medium, but it is gradually being replaced by newer systems that support 1000BASE-T (gigabit) and a growing number of fiber-optic connected devices.

Ethernet uses a protocol called CSMA/CD, which stands for Carrier Sense Multiple Access with Collision Detection. Multiple Access means that every station can access the single cable to transmit data. Carrier Sense means that before transmitting data, a station checks the cable to determine whether any other station is already sending something. If the LAN appears to be idle, the station can begin to send data. When several computers connected to the same network need to send data, two computers might try to send at the same time, causing a collision of data. The Ethernet protocol senses this collision and notifies the computer to send the data again.

How can two computers send data at the same time? Isn't Ethernet supposed to check the network for other systems that might be transmitting before sending data across the network?

Here's what happens in a 10Mbps network: An Ethernet station sends data at a rate of 10Mbps. It allows 100 nanoseconds per bit of information that is transmitted. The signal travels about 0.3 meters (1 foot) in 1 nanosecond. After the electrical signal for the first bit has traveled about 30 meters (100 feet) down the wire, the station begins sending the second bit. An Ethernet cable can run for hundreds of feet. If two stations are located about 75 meters (250 feet) apart on the same cable and both begin transmitting at the same time, they will be in the middle of the third bit before the signal from each reaches the other station.

This explains the need for the Collision Detection part of CSMA/CD. If two stations begin sending data at the same time, their signals collide nanoseconds later. When such a collision occurs, the two stations stop transmitting and try again later, after a randomly chosen delay period.

This also explains why distances are an important consideration in planning Ethernet networks.

Although an Ethernet network can be built by using one common signal wire, such an arrangement is not flexible enough to wire most buildings. Unlike an ordinary telephone circuit, Ethernet wire cannot be spliced to connect one copper wire to another. Instead, Ethernet requires a repeater, a simple station that is connected to two wires. When the repeater receives data on one wire, it repeats the data bit-for-bit on the other wire. When collisions occur, the repeater repeats the collision as well. In buildings that have two or more types of Ethernet cable, a common practice is to use media converters, switches, or repeaters to convert the Ethernet signal from one type of wire to another. Network hardware is discussed in more detail later in the chapter.

Note

As of Solaris 10, the FDDI interface is no longer supported.


Network Hardware

The network hardware is the physical part of the network that you can actually see. The physical components connect the systems and include the network interface cards (NICs), hosts, cable, connectors, hubs, and routers, some of which are discussed in the following sections.

NICs

The computer hardware that allows you to connect a computer to a network is known as a network interface card (NIC), or network adapter. The network interface can support one or more communication protocols that specify how computers use the physical mediumthe network cable or the radio spectrumto exchange data. Most computer systems come with a preinstalled network interface.

Each LAN media type has its own associated network interface. For example, if you want to use Ethernet as your network medium, you must have an Ethernet interface installed in each host that is to be part of the network. The connectors on the board to which you attach the Ethernet cable are referred to as Ethernet ports.

Hosts

If you are an experienced Unix/Solaris user, you are no doubt familiar with the term host, which is often used as a synonym for computer or machine. From a TCP/IP perspective, only two types of entities exist on a network: routers and hosts. When a host initiates communication, it is called a sending host, or sender. For example, a host initiates communications when the user uses ping or sends an email message to another user. The host that is the target of the communication is called the receiving host, or recipient.

Each host has an Internet address and a hardware address that identify it to its peers on the network, and usually a hostname. These are described in Table 8.4.

Table 8.4. Host Information

Identity

Description

Hostname

Every system on the network usually has a unique hostname. Hostnames let users refer to any computer on the network by using a short, easily remembered name rather than the host's network IP address.

Internet address

Each machine on a TCP/IP network has a 32-bit Internet address (or IP address) that identifies the machine to its peers on the network. This address must be unique on the network.

Hardware address

Each host on a network has a unique Ethernet address, also referred to as the media access control (MAC) address. The manufacturer physically assigns this address to the machine's network interface card(s). This address is unique worldwidenot just for the network to which it is connected.


Hubs and Switches

Ethernet cable is run to each system from a hub or switch. A hub does nothing more than connect all the Ethernet cables so that the computers can connect to one another. It does not boost the signal or route packets from one network to another. When a packet arrives at one port, it is copied to the other ports so that all the computers on the LAN can see all the packets. Hubs can support from two to several hundred systems.

A passive hub serves as a conduit for the data, allowing it to go from one device, or segment, to another. Intelligent hubs include additional features that let you monitor the traffic passing through the hub and configure each port in the hub. Intelligent hubs are also called manageable hubs. A third type of hub, called a packet-switching hub (or switch), is a special type of hub that forwards packets to the appropriate port based on the packet's destination address.

A network that utilizes conventional hubs is a shared network because every node on the network competes for a fraction of the total bandwidth. In a shared network, data packets are broadcast to all stations until they discover their intended destinations; this wastes both time and network bandwidth. A switch remedies this problem by looking at the address for each data packet and delivering the packet directly to the correct destination, and this provides much better performance than the hub system. Most switches also support load balancing so that ports are dynamically reassigned to different LAN segments based on traffic patterns.

Most switches are autosensing, which means they support both Fast Ethernet (100Mbps) and Gigabit Ethernet (1000Mbps) ports. This lets the administrator establish a dedicated Ethernet channel for high-traffic devices such as servers.

In addition, some switches include a feature called full-duplex data transfer. With this feature, all computers on the switch can "talk" to the switch at the same time. Full-duplex data transfer also allows switches to send and receive data simultaneously to all connections, whereas a hub cannot. A hub simply works with one computer at a time and only sends or only receives data because it cannot handle simultaneous two-way communication.

Routers

A router is a machine that forwards packets from one network to another. In other words, whereas a hub connects computers, a router connects networks. To do this, a router must have at least two network interfaces. A machine with only one network interface cannot forward packets; it is considered a host. Most of the machines you set up on a network are likely to be hosts.

Routers use packet headers and a forwarding table, called a routing table, to determine where packets go. Routes can be either static (in which case they are preset by network/system administrator) or dynamic (in which case a route to a destination host is learned or calculated at the time that it is requested).

IPv4 Addressing

In IPv4, each host on a TCP/IP network has a 32-bit network addressreferred to as the IP addressthat must be unique for each host on the network. If the host will participate on the Internet, this address must also be unique to the Internet. For this reason, IP addresses are assigned by special organizations known as regional Internet registries (RIRs). The IPv4 address space is the responsibility of Internet Corporation for Assigned Names and Numbers (ICANN; see www.icann.org). The overall responsibility for IP addresses, including the responsibility for allocation of IP ranges, belongs to the Internet Assigned Numbers Authority (IANA; see www.iana.org).

An IP address is a sequence of 4 bytes and is written in the form of four decimal integers separated by periods (for example, 10.11.12.13). Each integer is 8 bits long and ranges from 0 to 255. An IP address consists of two parts: a network ID, which is assigned by an RIR, and a host ID, which is assigned by the local administrator. The first integer of the address (10.0.0.0) determines the address type and is referred to as its class. Five classes of IP addresses exist: A, B, C, D, and E. The following sections briefly describe each class.

Note

IPv6 Due to limited address space and other considerations of the IPv4 scheme, a revised IP protocol is gradually being made available. The protocol, named IPv6, has been designed to overcome the major limitations of the current approach. IPv6 is compatible with IPv4, but IPv6 makes it possible to assign many more unique Internet addresses and offers support for improved security and performance. A brief section on IPv6 appears later in this chapter for background information, even though it is not a specific objective in the Solaris 10 Part II exam.


Class A Addresses

Class A addresses are used for very large networks with millions of hosts, such as the Internet. A Class A network number uses the first 8 bits of the IP address as its network ID. The remaining 24 bits make up the host part of the IP address. The value assigned to the first byte of a Class A network number falls within the range 0 to 127. For example, consider the IP address 75.4.10.4. The value 75 in the first byte indicates that the host is on a Class A network. The remaining bytes, 4.10.4, establish the host address. An RIR assigns only the first byte of a Class A number. Use of the remaining 3 bytes is left to the discretion of the owner of the network number. Only 126 Class A networks can exist because 0 is reserved for the network, and 127 is reserved for the loopback device, leaving 1 to 126 as usable addresses. Each Class A network can accommodate up to 16,777,214 hosts. The 10.x.x.x network is reserved for use by private networks for hosts that are not connected to the Internet. If you want to assign a Class A network and you are not visible on the Internet, you can use one of these network addresses.

Class B Addresses

Class B addresses are used for medium-size networks, such as universities and large businesses with many hosts. A Class B address uses 16 bits for the network number and 16 bits for the host number. The first byte of a Class B network number is in the range 128 to 191. In the number 129.144.50.56, the first 2 bytes, 129.144, are assigned by an RIR and make up the network address. The last 2 bytes, 50.56, make up the host address and are assigned at the discretion of the network's owner. A Class B network can accommodate a maximum of 65,534 hosts. Again, the first and last addresses on the network are reserved. The 0 host address is reserved for the network, and the 255 address is reserved as the IP broadcast address. Therefore, the actual number of hosts that can be assigned on a Class B network is 65,534, not 65,536. The network address ranges 172.16.x.x through 172.31.x.x are reserved for use by private networks that are not connected to the Internet. If you want to assign a Class B network and you are not visible on the Internet, you can use one of these network addresses.

Class C Addresses

Class C addresses are used for small networks with fewer than 254 hosts. A Class C address uses 24 bits for the network number and 8 bits for host number. A Class C network number occupies the first 3 bytes of an IP address; only the fourth byte is assigned at the discretion of the network's owner. The first byte of a Class C network number covers the range 192 to 223. The second and third bytes each cover the range 0 to 255. A typical Class C address might be 192.5.2.5, with the first 3 bytes, 192.5.2, forming the network number. The final byte in this example, 5, is the host number. A Class C network can accommodate a maximum of 254 hosts out of 256 addresses; again, this is because the first and last values are reserved. The 192.168.x.x network ranges are specially reserved for private networks that are not connected to the Internet. If you want to assign a Class C network and you are not visible on the Internet, you can use one of these network addresses.

Class D and E Addresses

Class D addresses cover the range 224 to 239 and are used for IP multicasting, as defined in RFC 988. Class E addresses cover the range 240 to 255 and are reserved for experimental use.

Planning for IP Addressing

The first step in planning for IP addressing on a network is to determine how many IP addresses you need and whether the network is going to be connected to the Internet. If the network is not going to be connected to the Internet, you could choose addresses in the 10.x.x.x, or 172.16.x.x172.31.x.x, or 192.168.x.x range. For networks that are going to be connected to the Internetand hence visible to the rest of the worldyou need to obtain legal IP addresses; this is necessary because each host on a network must have a unique IP address. IP addresses can be obtained either through an Internet service provider (ISP) or an RIR, as mentioned earlier in this section. When you receive your network number, you can plan how you will assign the host parts of the IP address.

Your nearest RIR depends on where, geographically, your network is located. The current list of RIRs is as follows:

  • North and South America American Registry for Internet Numbers (ARIN; www.arin.net)

  • Europe RIPE network coordination center (www.ripe.net)

  • Asia-Pacific region Asia Pacific Network Information Center (APNIC; www.apnic.org)

  • Latin America and Caribbean Latin America and Caribbean Internet Addresses Registry (LACNIC; www.lacnic.net)

  • Africa Africa Network Information Center (AfriNIC; www.afrinic.net)

After you contact the correct RIR, you have to justify why you should be given global IP addresses. Normally, unless yours is a large organization, you would be expected to obtain IP addresses from your ISP.

Note

Being Careful with IP Addresses You should not arbitrarily assign network numbers to a network, even if you do not plan to attach your network to other existing TCP/IP networks. As your network grows, you might decide to connect it to other networks. Changing IP addresses at that time can be a great deal of work and can cause downtime. Instead, you might want to use the specially reserved IP networks 192.168.x.x, or 172.16.x.x172.31.x.x, or 10.x.x.x for networks that are not connected to the Internet.


IPv6

Tip

IPv6 No questions on the exam relate to IPv6. This section is included purely for background information.


As the Internet community continues to grow and use more IPv4 addresses, we have been running out of available IPv4 addresses. IPv6, also called IP Next Generation (IPng), improves Internet capability by using a simplified header format, longer addresses (128 instead of 32 bits), support for authentication and privacy, autoconfiguration of address assignments, and new Quality of Service (QoS) capabilities. Specifically, IPv6 provides these enhancements:

  • Expanded addressing capabilities Because IPv4 is a 32-bit protocol, it can accommodate approximately 4,300,000,000 addresses. It was estimated that IPv4 addresses would be exhausted in about the year 2008, but the implementation of Classless Internet Domain Routing (CIDR) has eased the shortage.

Note

CIDR Classless Internet Domain Routing (CIDR) uses (typically) the first 18 bits of an IPv4 address as the network portion, leaving 14 bits to be used for the host. This implementation has meant that networks can be aggregated by routers for ease of delivery, in the same way as the telephone system uses area codes to route telephone calls. Note that CIDR is not a topic on the exam and is included only as background information.


IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy. Thus, the number of potential addresses is 4 billion x 4 billion x 4 billion times the size of the IPv4 address space.

Here's an example of an IPv6 address:

2001:0DB8:0000:0000:0000:FFFF:ACBC:19A1

The first 48 bits of the address represent the public topology. The next 16 bits represent the site topology.

  • Improved routing When the number of organizations connected to the Internet increases, the amount of memory and route information increases, too. This puts the burden on the router, which forwards the packet; it results in decreased look-up speed, which could be a fatal problem for a router with little capacity. Improvements in IPv6 addressing improve routing over what is available in IPv4.

  • Security The basic IPv6 specification includes security and privacy enhancements. The Internet has a number of security problems and lacks effective privacy and effective authentication mechanisms below the application layer. IPv6 remedies these shortcomings by having two integrated options that provide improved IP Security (IPsec) services:

    • Encapsulated Security Payload (ESP) (provides packet encryption)

    • Authentication Header (AH) (provides source authentication and integrity protection)

  • Real-time traffic support A new capability has been added to IPv6 to enable the labeling of packets that belong to particular traffic flows for which the sender requests special handling. For example, the sender can request nondefault quality of service or real-time service.

    To support real-time traffic such as videoconferencing, IPv6 has a concept of "flow label." Using flow label, a router can know which end-to-end flow a packet belongs to and then can find out what packet belongs to real-time traffic.

    In addition, a 4-bit priority field in the IPv6 header enables a source to identify the desired delivery priority of its packets, relative to other packets from the same source.

  • Header format simplification Some IPv4 header fields have been dropped or made optional in IPv6. This change reduces the common-case processing cost of packet handling. This change also keeps the bandwidth cost of the IPv6 header as low as possible, despite the increased size of the addresses. Even though the IPv6 addresses are four times longer than the IPv4 addresses, the IPv6 header is only twice the size of the IPv4 header.

  • Improved support for options Changes in the way IP header options are encoded allow for more efficient forwarding. Also, the length of options has less stringent limits with IPv6 than with IPv4. The changes also provide greater flexibility for introducing new options in the future.


Previous Page
Next Page