20
Practical Wireless, Ethernet and TCP/IP Networking

Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Practical Wireless, Ethernet and TCP/IP Networking

Page 2: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

WHO ARE WE? IDC Technologies is internationally acknowledged as the premier provider of practical, technical training for engineers and technicians. We specialize in the fields of electrical systems, industrial data communications, telecommunications, automation and control, mechanical engineering, chemical and civil engineering, and are continually adding to our portfolio of over 60 different workshops. Our instructors are highly respected in their fields of expertise and in the last ten years have trained over 200,000 engineers, scientists and technicians. With offices conveniently located worldwide, IDC Technologies has an enthusiastic team of professional engineers, technicians and support staff who are committed to providing the highest level of training and consultancy. TECHNICAL WORKSHOPS TRAINING THAT WORKS We deliver engineering and technology training that will maximize your business goals. In today’s competitive environment, you require training that will help you and your organization to achieve its goals and produce a large return on investment. With our ‘training that works’ objective you and your organization will:

• Get job-related skills that you need to achieve your business goals • Improve the operation and design of your equipment and plant • Improve your troubleshooting abilities • Sharpen your competitive edge • Boost morale and retain valuable staff • Save time and money

EXPERT INSTRUCTORS We search the world for good quality instructors who have three outstanding attributes:

1. Expert knowledge and experience – of the course topic 2. Superb training abilities – to ensure the know-how is transferred effectively and quickly to you in

a practical, hands-on way 3. Listening skills – they listen carefully to the needs of the participants and want to ensure that you

benefit from the experience. Each and every instructor is evaluated by the delegates and we assess the presentation after every class to ensure that the instructor stays on track in presenting outstanding courses. HANDS-ON APPROACH TO TRAINING All IDC Technologies workshops include practical, hands-on sessions where the delegates are given the opportunity to apply in practice the theory they have learnt. REFERENCE MATERIALS A fully illustrated workshop book with hundreds of pages of tables, charts, figures and handy hints, plus considerable reference material is provided FREE of charge to each delegate. ACCREDITATION AND CONTINUING EDUCATION Satisfactory completion of all IDC workshops satisfies the requirements of the International Association for Continuing Education and Training for the award of 1.4 Continuing Education Units. IDC workshops also satisfy criteria for Continuing Professional Development according to the requirements of the Institution of Electrical Engineers and Institution of Measurement and Control in the UK, Institution of Engineers in Australia, Institution of Engineers New Zealand, and others.

THIS BOOK WAS DEVELOPED BY IDC TECHNOLOGIES

Page 3: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

CERTIFICATE OF ATTENDANCE Each delegate receives a Certificate of Attendance documenting their experience. 100% MONEY BACK GUARANTEE IDC Technologies’ engineers have put considerable time and experience into ensuring that you gain maximum value from each workshop. If by lunchtime on the first day you decide that the workshop is not appropriate for your requirements, please let us know so that we can arrange a 100% refund of your fee. ONSITE WORKSHOPS All IDC Technologies Training Workshops are available on an on-site basis, presented at the venue of your choice, saving delegates travel time and expenses, thus providing your company with even greater savings. OFFICE LOCATIONS

AUSTRALIA • CANADA • INDIA • IRELAND • MALAYSIA • NEW ZEALAND • POLAND • SINGAPORE • SOUTH AFRICA • UNITED KINGDOM • UNITED STATES

On-Site Training

All IDC Technologies Training Workshops are available on an on-site basis, presented at the venue of your choice, saving delegates travel time and expenses, thus providing your company with even

greater savings. For more information or a FREE detailed proposal contact Kevin Baker by e-mailing:

[email protected]

[email protected] www.idc-online.com

Visit our website for FREE Pocket Guides IDC Technologies produce a set of 6 Pocket Guides used by

thousands of engineers and technicians worldwide. Vol. 1 – ELECTRONICS Vol. 4 – INSTRUMENTATION Vol. 2 – ELECTRICAL Vol. 5 – FORMULAE & CONVERSIONS Vol. 3 – COMMUNICATIONS Vol. 6 – INDUSTRIAL AUTOMATION

To download a FREE copy of these internationally best selling pocket guides go to:

www.idc-online.com/downloads/

SAVE MORE THAN 50% OFF the per person

cost

CUSTOMISE the training to YOUR WORKPLACE!

Have the training delivered WHEN

AND WHERE you need it!

Page 4: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

IDC TECHNOLOGIES

Worldwide Offices

AUSTRALIA Telephone: 1300 138 522 • Facsimile: 1300 138 533

West Coast Office

1031 Wellington Street, West Perth, WA 6005 PO Box 1093, West Perth, WA 6872

East Coast Office

PO Box 1750, North Sydney, NSW 2059

CANADA Toll Free Telephone: 1800 324 4244 • Toll Free Facsimile: 1800 434 4045

Suite 402, 814 Richards Street, Vancouver, NC V6B 3A7

INDIA Telephone : +91 444 208 9353

35 4th Street, Kumaran Colony, Vadapalani, Chennai 600026

IRELAND Telephone : +353 1 473 3190 • Facsimile: +353 1 473 3191

Caoran, Baile na hAbhann, Co. Galway

MALAYSIA Telephone: +60 3 5192 3800 • Facsimile: +60 3 5192 3801

26 Jalan Kota Raja E27/E, Hicom Town Center Seksyen 27, 40400 Shah Alam, Selangor

NEW ZEALAND

Telephone: +64 9 263 4759 • Facsimile: +64 9 262 2304 Parkview Towers, 28 Davies Avenue, Manukau City

PO Box 76-142, Manukau City

POLAND Telephone: +48 12 6304 746 • Facsimile: +48 12 6304 750

ul. Krakowska 50, 30-083 Balice, Krakow

SINGAPORE Telephone: +65 6224 6298 • Facsimile: + 65 6224 7922

100 Eu Tong Sen Street, #04-11 Pearl’s Centre, Singapore 059812

SOUTH AFRICA Telephone: +27 87 751 4294 or +27 79 629 5706 • Facsimile: +27 11 312 2150

68 Pretorius Street, President Park, Midrand PO Box 389, Halfway House 1685

UNITED KINGDOM

Telephone: +44 20 8335 4014 • Facsimile: +44 20 8335 4120 Suite 18, Fitzroy House, Lynwood Drive, Worcester Park, Surrey KT4 7AT

UNITED STATES

Toll Free Telephone: 1800 324 4244 • Toll Free Facsimile: 1800 434 4045 5715 Will Clayton #6175, Humble, TX 77338, USA

Website: www.idc-online.com

Email: [email protected]

Page 5: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Presents

Practical Wireless, Ethernet and TCP/IP

Networking

Revision 3.1

By

Deon Reynders Pr.Eng, BSc (ElecEng) (Hons), BEng, MBA Edwin Wright MIPENZ, BSc (ElecEng) (Hons), BE

Dave Bailey BE

Website: www.idc-online.com E-mail: [email protected]

Page 6: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

IDC Technologies Pty Ltd PO Box 1093, West Perth, Western Australia 6872 Offices in Australia, New Zealand, Singapore, United Kingdom, Ireland, Malaysia, Poland, United States of America, Canada, South Africa and India Copyright © IDC Technologies 2008. All rights reserved. First published 2008 All rights to this publication, associated software and workshop are reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher. All enquiries should be made to the publisher at the address above. Disclaimer Whilst all reasonable care has been taken to ensure that the descriptions, opinions, programs, listings, software and diagrams are accurate and workable, IDC Technologies do not accept any legal responsibility or liability to any person, organization or other entity for any direct loss, consequential loss or damage, however caused, that may be suffered as a result of the use of this publication or the associated workshop and software.

In case of any uncertainty, we recommend that you contact IDC Technologies for clarification or assistance.

Trademarks All logos and trademarks belong to, and are copyrighted to, their companies respectively. Acknowledgements IDC Technologies expresses its sincere thanks to all those engineers and technicians on our training workshops who freely made available their expertise in preparing this manual.

Page 7: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Contents

1 Introduction 1 1.1 Overview 1 1.2 The OSI model 1

2 IEEE802.3 Ethernet 11 2.1 Introduction 11 2.2 IEEE/ISO standards 12 2.3 Ethernet frames 13 2.4 LLC frames and multiplexing 16 2.5 Media access control for half-duplex LANs (CSMA/CD) 18 2.6 MAC (CSMA-CD) for Gigabit half-duplex networks 20 2.7 Full-duplex transmissions 20 2.8 Auto-negotiation 22 2.9 Deterministic Ethernet 25

3 Internet, Host-to-Host and Application Layer Protocols 27 3.1 Introduction 27 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message protocol 41 3.5 Routing protocols 43 3.6 Transmission control protocol 45 3.7 User datagram protocol 52 3.8 MODBUS TCP/IP 53 3.9 Ethernet/IP (Ethernet/Industrial Protocol) 56 3.10 TCP/IP utilities 57

4 LAN/WLAN Components 71 4.1 Introduction 71 4.2 Repeaters 71 4.3 Bridges 72 4.4 Hubs 73 4.5 Switches 75 4.6 Routers 79 4.7 Gateways 80 4.8 Wireless access points 80

5 Wireless Fundamentals 83 5.1 Introduction 83 5.2 Electromagnetic waves 83

Page 8: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

5.3 Radio/microwave frequency allocation 86 5.4 Single and dual-frequency systems 87 5.5 Gain and loss 88 5.6 Power levels 90 5.7 Attenuation 91 5.8 Modulation/demodulation 92 5.9 Spread spectrum techniques 101 5.10 Orthogonal frequency division multiplexing 105 5.11 Complementary code keying 106

6 Antennas 109 6.1 Introduction 109 6.2 Theory of operation 109 6.3 Types of antennas 112 6.4 Antenna diversity 116 6.5 Coaxial cables 117 6.6 Waveguides 119 6.7 VSWR and return loss 119 6.8 Antenna installation 122

7 Wireless LANS 125 7.1 Introduction 125 7.2 Architecture 127 7.3 Specifications 132 7.4 Medium access control 139 7.5 Frame structure 146

8 Selecting, Installing and Configuring APs 155 8.1 Introduction 155 8.2 The site survey 155 8.3 Determining the number of APs 161 8.4 Configuring APs 162 8.5 AP configuration options 163

9 Network Security 167 9.1 Introduction 167 9.2 Security goal 167 9.3 Threats and underlying causes 169 9.4 Motivation for threats 169 9.5 Vulnerabilities 170 9.6 Network attacks 170 9.7 Common criteria approach for analysis of threats and vulnerabilities 173 9.8 Overview of IP network security 174 9.9 Security policies 175 9.10 Weaknesses in the TCP/IP protocol 176 9.11 Attack mechanisms 176 9.12 Preparing for an attack 176

Page 9: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

9.13 Attack through unauthorized access 177 9.14 Attacking the data (data diddling) 177 9.15 Attack the service through Denial of Service (DoS) 179 9.16 Vulnerabilities of OSI layers 180 9.17 Network security at the transport layer 182 9.18 Network layer security 183 9.19 Data link layer security 184 9.20 Implementation of security measures for industrial WLANs 185 9.21 Some general guidelines 189

10 VPNs 191 10.1 Introduction 191 10.2 The Internet and the new communication paradigm 192 10.3 What is a VPN? 193 10.4 Types of VPN 193 10.5 Requirements for designing a VPN system 193 10.6 Defining of policy 194 10.7 Network infrastructure 194 10.8 Security 196 10.9 VPN protocols 198

11 Firewalls 205 11.1 Introduction 205 11.2 ACLs 206 11.3 Firewalls 207 11.4 Types of firewalls 208 11.5 Packet filter firewalls 208 11.6 Stateful Inspection firewalls 210 11.7 Application-proxy gateway firewalls 210 11.8 Dedicated proxy server 211 11.9 Hybrid firewalls 211 11.10 Security through NAT 211 11.11 Port Address Translation (PAT) 212 11.12 Host-based firewalls 212 11.13 Personal firewall and firewall appliances 213 11.14 Guidelines for establishing firewalls 213

12 Wireless PANs: Bluetooth / IEEE 802.15.1 215 12.1 Introduction 215 12.2 Protocol stack 216 12.3 Piconets and scatternets 217 12.4 Medium access control 218 12.5 Frame formats 219 12.6 Antennas 221 12.7 Security issues 222 12.8 Using Bluetooth 226

Page 10: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Appendix A Setting up a VPN Between Two Computers 229

Appendix B Exercises 237

Appendix C WPA and WPA2 Implementation White Paper 271

Page 11: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

1

Introduction

1.1 Overview Communication networks evolved due to the need to exchange and share information amongst a group of machines. During the last century many kinds of communication networks have been developed, such as telephone networks, computer networks and cable TV networks. With the need for data exchange superseding voice and picture transmission, computer networks have become the most prevalent of all communication networks. Depending on the distances between the computers, computer networks can be further differentiated into:

• LANs (Local Area Networks)—These networks interconnect computers and other networked devices located a small distance apart, for instance computers in an office or building. The most popular LAN technology is Ethernet.

• MANs (Metropolitan Area Networks)—These networks interconnect computers and other networked devices located at medium distances from each other, for instance around the perimeter of a large city. Technologies used here include Ethernet and FDDI.

• WANs (Wide Area Networks)—These are interconnected LANs, located at large distances from each other, for instance in different cities or countries. Interconnection is via a ‘communications cloud’ that encompasses technologies such as SDH, ATM and X.25.

• WLANs (Wireless LANs)—These are usually wireless extensions to an existing Ethernet network, the most popular being IEEE 802.11 (Wi-Fi).

• PANs (Personal Area Networks)—These are networks connecting devices such as mobile phones, PDAs and laptops. They are typically spread over a few square meters or across a room at most, and use wireless technologies such as Bluetooth, Wireless USB or ZigBee.

1.2 The OSI model A communication framework that has had a tremendous impact on the design of LANs/WLANs is the Open Systems Interconnection (OSI) model of the International Organization for Standardization (ISO). The objective of this model is to provide a framework for the co-ordination of standards development, and allows for existing as well as evolving standards activities to be set within that common framework.

Page 12: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

2 Practical Wireless, Ethernet and TCP/IP Networking

The various technologies described in this manual relate to different layers of the OSI model, for example:

• IEEE 802.11(Wi-Fi): Physical layer (OSI layer 1) and MAC sub-layer of Data Link layer (lower half of OSI layer 2)

• IEEE 802.2: LLC sub-layer of Data Link layer (upper half of OSI layer 2) • IEEE 802.3 (Ethernet): Same as Wi-Fi • IP: OSI layer 3 • TCP: OSI layer 4 • MODBUS Messaging Protocol: OSI layer 7

For that reason a quick review of the OSI model basics is a necessity.

1.2.1 Open and closed systems The interconnection of two or more devices with some form of digital communication is the first step towards establishing a network. In addition to the hardware requirements as discussed above, the software problems of communication must also be overcome. Where all the devices on a network are from the same manufacturer, the hardware and software problems are usually easily overcome because all the system components have usually been designed within the same guidelines and specifications. Proprietary networks that comprise hardware and software from only one vendor are called closed systems. In most cases these systems were developed at a time before standardization, or when it was considered unlikely that equipment from other manufacturers would be included in the network. In contrast, ‘open’ systems conform to specifications and guidelines that are ‘open’ to all. This allows equipment from any manufacturer that complies with that standard to be used interchangeably on the network. The benefits of open systems include wider availability of equipment, lower prices and easier integration with other components.

1.2.2 The OSI concept Faced with the proliferation of closed network systems, the ISO defined a ‘Reference Model for Communication between Open Systems’ (ISO 7498) in 1978. This has since become known as the OSI model. The OSI model is essentially a data communications management structure that breaks data communications down into a manageable hierarchy (‘stack’) of seven layers. Each layer has a defined purpose and interfaces with the layers above it and below it. By laying down functions and services for each layer, some flexibility is allowed so that the system designers can develop protocols for each layer independently of each other. By conforming to the OSI standards, a system is able to communicate with any other compliant system, anywhere in the world. The OSI model supports a client/server model and since there must be at least two nodes to communicate, each layer also appears to converse with its peer layer at the other end of the communication channel in a virtual (‘logical’) manner. The concept of isolation of the process of each layer, together with standardized interfaces and peer-to-peer virtual communication, are fundamental to the concepts developed in a layered model such as the OSI model. This concept is shown in Figure 1.1.

Page 13: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Introduction 3

Figure 1.1 OSI layering concept

The actual functions within each layer are provided by entities (abstract devices such as programs, functions, or protocols) that implement the services for a particular layer on a single machine. A layer may have more than one entity; for example a protocol entity and a management entity. Entities in adjacent layers interact through the common upper and lower boundaries by passing physical information through Service Access Points (SAPs). A SAP could be compared to a predefined ‘postbox’ where one layer would collect data from the previous layer. The relationship between layers, entities, functions and SAPs is shown in Figure 1.2.

Figure 1.2 Relationship between layers, entities, functions and SAPs

In the OSI model, the entity in the next higher layer is referred to as the N+1 entity and the entity in the next lower layer as N–1. The services available to the higher layers are the result of the services provided by all the lower layers. The functions and capabilities expected at each layer are specified in the model. However, the model does not prescribe how this functionality should be implemented. The focus in the model is on the ‘interconnection’ and on the information that can be passed over this connection. The OSI model does not concern itself with the internal operations of the systems involved. When the OSI model was being developed, a number of principles were used to determine exactly how many layers this communication model should encompass. These principles are:

• A layer should be created where a different level of abstraction is required • Each layer should perform a well-defined function • The function of each layer should be chosen with thought given to defining

internationally standardized protocols

Page 14: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

4 Practical Wireless, Ethernet and TCP/IP Networking

• The layer boundaries should be chosen to minimize the information flow across the boundaries

• The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity and small enough that the architecture does not become unwieldy

The use of these principles led to seven layers being defined, each of which has been given a name in accordance with its purpose. Figure 1.3 below shows the seven layers.

Figure 1.3 The OSI reference model

The service provided by any layer is expressed in the form of a service primitive with the data to be transferred as a parameter. A service primitive is a fundamental service request made between protocols. For example, layer W may sit on top of layer X. If W wishes to invoke a service from X, it may issue a service primitive in the form of X.Connect.request to X.

Figure 1.4 Service primitive

Typically, each layer in the transmitting stack, with the exception of the lowest, adds header information, or Protocol Control Information (PCI) – a.k.a. ‘header’, to the data before passing it across the interface to the next layer. This interface defines which primitive operations and services the lower layer offers to the upper one. The headers are used for peer-to-peer layer communication between the stacks and some layer implementations use the headers to invoke functions and services at the adjacent (N+1 or N-1) layers. At the transmitting stack, the user application (e.g. the client) invokes the process by passing data, primitive names and control information to the uppermost layer of the protocol stack. The stack then passes the data down through the layers of the stack, adding headers (and

Page 15: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Introduction 5

possibly trailers), and invoking functions in accordance with the rules of the protocol at each layer. At each layer, the ‘data’ received at a certain layer (including headers from the layers above it) is referred to as a Service Data Unit or SDU. This is normally prefixed with the first letter of the name of the layer. For example, the Transport layer receives a TSDU from the Session layer. The Transport layer then processes it, adds a header, and creates a Transport Protocol Data Unit or TPDU. At the receiving site, the opposite occurs with the headers being stripped from the data as it is passed up through the layers of the receiving stack. Generally speaking, layers in the same stack communicate with parameters passed through primitives, and peer layers communicate with the use of the headers across the network. At this stage it should be quite clear that there is no physical connection or direct communication between the peer layers of the communicating applications. Instead, all physical communication is across the lowest (Physical) layer of the stack. Communication takes place downwards through the protocol stack on the transmitting node and upwards through the receiving stack. Figure 1.4 shows the full architecture of the OSI model, whilst Figure 1.5 shows the effects of the addition of headers to the respective SDUs at each layer. The net effect of this extra information is to reduce the overall bandwidth of the communications channel, since some of the available bandwidth is used to pass control information (see also Figure 1.6).

Figure 1.5 Peer layer interaction in the OSI model

Page 16: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

6 Practical Wireless, Ethernet and TCP/IP Networking

Figure 1.6 OSI message passing

1.2.3 OSI layer services The services provided at each layer of the stack are as follows.

Application layer The Application layer is the uppermost layer in the OSI reference model and is responsible for giving applications access to the protocol stack. Examples of Application-layer tasks include file transfer, electronic mail (e-mail) services, and network management. In order to accomplish its tasks, the Application layer passes program requests and data to the Presentation layer, which is responsible for encoding the Application layer’s data in the appropriate form.

Presentation layer The Presentation layer is responsible for presenting information in a manner suitable for the applications or users dealing with the information. Functions such as data conversion from EBCDIC to ASCII (or vice versa), the use of special graphics or character sets, data compression or expansion, and data encryption or decryption are carried out at this layer. The presentation layer provides services for the Application layer above it, and uses the Session layer below it. In practice, the Presentation layer rarely appears in pure form, and it is the least well defined of the OSI layers. Application- or Session-layer programs often encompass some or all of the Presentation layer functions.

Session layer The Session layer is responsible for synchronizing and sequencing the dialog and packets in a network connection. This layer is also responsible for ensuring that the connection is maintained until the transmission is complete, and that the appropriate security measures are taken during a ‘session’. The Session layer is used by the Presentation layer above it, and uses the Transport layer below it.

Transport layer In the OSI reference model, the Transport layer is responsible for providing data transfer at an agreed-upon level of quality, such as at specified transmission speeds and error rates. To ensure delivery, some Transport layer protocols assign sequence numbers to outgoing packets. The Transport layer at the receiving end checks the packet numbers to make sure all have been delivered and to put the packet contents into the proper sequence for the recipient. The Transport layer provides services for the Session layer above it, and uses the Network layer below it to find a route between source and destination. The Transport layer is crucial

Page 17: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Introduction 7

in many ways, because it sits between the upper layers, which are strongly application-dependent, and the lower one, which are network-based. The layers below the Transport layer are collectively known as the ‘subnet’ layers. Depending on how well (or not) they perform their functions; the Transport layer has to interfere less (or more) in order to maintain a reliable connection.

Network layer The Network layer is the third layer from the bottom up, or the uppermost ‘subnet layer’. It is responsible for the following tasks:

• Determining addresses or translating from hardware to network addresses. These addresses may be on a local network or they may refer to networks located elsewhere on an internetwork

• Finding a route between a source and a destination node or between two intermediate devices

• Fragmentation of large packets of data into frames small enough to be transmitted by the underlying Data Link layer (fragmentation). The corresponding Network layer at the receiving node undertakes reassembly of the packet

Data link layer The Data Link layer is responsible for creating, transmitting, and receiving data packets. It provides services for the various protocols at the Network layer, and uses the Physical layer to transmit or receive material. The Data Link layer creates packets appropriate for the network architecture being used. Requests and data from the Network layer are part of the data in these packets (or frames, as they are often called at this layer). These frames are passed down to the Physical layer from where they are transmitted to the Physical layer on the destination host via the medium. Network architectures (such as Ethernet and Wi-Fi) typically encompass the Physical layer and the lower half of the Data Link layer. The IEEE 802 networking working groups have refined the Data Link layer into two sub-layers:

• the Logical Link control (LLC) sub-layer in the upper half, implemented as IEEE 802.2 and shared by several networking technologies such as IEEE 802.3 Ethernet, IEEE 802.5 Token Ring and IEEE 802.11Wi-Fi

• the Media Access Control (MAC) sub-layer in the lower half, included with the Physical layer as part of the networking standards mentioned above

The LLC sub-layer provides an interface for the Network layer protocols, and controls the logical communication with its peer at the receiving side. The MAC sub-layer controls physical access to the medium.

Physical layer The Physical layer is the lowest layer in the OSI. This layer gets data packets from the Data Link layer above it, and converts the contents of these packets into a series of electrical signals that represent ‘0’ and ‘1’ values in a digital transmission. These signals are sent across a transmission medium to the Physical layer at the receiving end. At the destination, the Physical layer converts the electrical signals into a series of bit values. These values are grouped into packets and passed up to the Data Link layer. The required mechanical and electrical properties of the transmission medium are defined at this level. These include:

• The type of cable and connectors used. The cable may be coaxial, twisted-pair, or fiber optic. The types of connectors depend on the type of cable

• The pin assignments for the cable and connectors. Pin assignments depend on the type of cable and also on the network architecture being used

Page 18: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

8 Practical Wireless, Ethernet and TCP/IP Networking

• The format for the electrical signals. The encoding scheme used to signal ‘0’ and ‘1’ values in a digital transmission or particular values in an analog transmission depend on the network architecture being used

The medium itself is, however, not specific here. For example, Fast Ethernet dictates Cat5 cable, but the cable itself is specified in TIA/EIA-568B.

1.2.4 Ethernet Ethernet is, at present, the dominant LAN technology. It provides a set of physical media definitions, a scheme for sharing that physical media (CSMA/CD or full duplex), and a simple frame format and hardware source/destination addressing scheme (MAC addresses) for moving packets of data between devices on a LAN. On its own, however, Ethernet lacks the more complex features required of a fully functional industrial network. For that reason, all installed Ethernet networks support one or more communication protocols that run on top of it, and provide more sophisticated data transfer and network management functionality. It is the higher layer protocols that determine what level of functionality is supported by the network, what types of devices may be connected to the network, and how devices interoperate on the network. For many years users have steered away from the use of Ethernet in industrial applications, mainly because of its perceived lack of determinism. This was due to the CSMA/CD medium access method, which is essentially stochastic in nature. Other issues that affected its industrial application included connectors and cabling, packaging, power supplies, switching requirements, speed, power over the cable requirements and provision for redundancy. Modern Ethernet systems, however, differ radically from the old cable-based legacy systems. Switched Ethernet systems now operate in full duplex mode, which, for all practical purposes, eliminates collisions. Many vendors offer industrial devices, with features such as IP67 environmental rating, rail mounting, redundant DC power supplies, VLAN capability, prioritized switching (IEEE 802.1p/Q) and redundant ring operation. Industry often expects device power to be delivered over the same wires as those used for communicating with the devices. The IEEE 802.3af standard allows a source device (a hub or a switch) to supply a minimum of 300 mA at 48 Volts DC to field devices. Other Ethernet developments include Virtual LANs (IEEE 802.1Q), prioritized switching (IEEE 802.1p) and redundant switched rings.

1.2.5 TCP/IP The TCP/IP protocol suite consists of several protocols that provide routing services, end-to-end verification of transmitted data, and interfacing services to the stack for clients and servers. TCP is a connection-oriented transport (OSI layer 4) protocol and runs on the two end hosts; i.e. the client host and the server host. It is a very reliable protocol, using triple handshakes to establish connections, acknowledgements and timeouts plus retransmissions to ensure correct delivery of data, and sliding windows to prevent data buffer overruns on the receiving side. This comes at a cost, in terms of protocol overheads such as header size. UDP is a much simpler transport protocol. It is connectionless and provides a very simple capability to send ‘datagrams’ between two devices. It does not guarantee that the data will get from one device to another, does not perform retries, and does not even know if the target device has received the data successfully. Application layers that implement their own handshaking or connection management between two devices and, therefore, only need a minimal transport service, will use UDP.

Page 19: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

Introduction 9

UDP is smaller, simpler and faster than TCP due to its minimal capabilities and use of resources. In an industrial automation application, UDP is typically used for network management functions, applications that do not require reliable data transmission, applications that are willing to implement their own reliability scheme, such a flash memory programming of network devices, and for input/output (I/O) operations.

1.2.6 Wireless LANs Traditional networks have been based on physical media, using extensive copper and fiber cabling to provide data, voice, and video transmission. However, the use of physical media is costly, unsuitable for rugged terrain, and limits mobility. In 1971 a group of researchers at the University of Hawaii created the first packet based radio communications network, ALOHANET. It was essentially the very first WLAN and consisted of several computers that communicated via a bi-directional star topology and spanned four of the Hawaiian Islands, with the central computer based on Oahu. In recent years more and more vendors have been developing wireless systems to support LAN, MAN and WAN infrastructures. The result has been the emergence of wireless networks. Current wireless technologies include Wi-Fi (IEEE 802.11b, a, g), IEEE 802.16 (WiMax), small dish satellite (VSAT), mobile wireless and wireless PANs (Bluetooth, wireless USB and ZigBee), with Wi-Fi by far the most popular WLAN technology. There are numerous benefits in using wireless technologies, irrespective of the communication solution to be implemented. These include a high degree of mobility, accessibility and reduced installation costs.

Page 20: Practical Wireless, Ethernet and TCP/IP Networking · 3.2 Internet Protocol 31 3.3 Address resolution protocol and reverse address resolution protocol 39 3.4 Internet control message

10 Practical Wireless, Ethernet and TCP/IP Networking