term paper of wireless networking

Upload: imran6385

Post on 08-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Term paper of wireless networking

    1/20

    TERM PAPEROF

    WIRELESS NETWORKING

    COURSE CODE: CSE-518

    SUBMITTED BY: SUBMITTEDTO:IMRAN ANSARI ABHISEKH SIRSECTION: RS1906ROLL NO.: RS1906B50REG. NO.: 10906851

    PROGRAM ID: 433::MBA (IT)

    TERM 1ST

    FACULTY OF BUSINESS AND ARTSLOVELY SCHOOL OF MANAGEMENT

  • 8/7/2019 Term paper of wireless networking

    2/20

    INDEX

    (i) INTRODUCTION

    (ii) MASKING

    (iii) SUPERNETING

    (iv) NETWORKS AND HOSTS

    (v) CLASS ADDRESSING

    (vi) RESERVED ADDRESSING

    (vii) SUBNET MASKING

    (viii) ADVANTAGES OF SUBNETTING

    (ix) DISADVANTAGES OF SUBNETTING

    (x) REFERENCESS

    SUBNETTING

  • 8/7/2019 Term paper of wireless networking

    3/20

    INTODUCTION

    Subnetting creates additional network IDs at the expense of host IDs and can be

    used with either A, B or C class addresses. If you look at Table 1, you will noticethat a class B address uses 14 bits for network addressing and 16 bits for hostaddressing. By simply reassigning one of the host bits to a network bit, youwould double the number of available network addresses but halve the numberof host addresses. Carrying the argument further move eight of the host bits(actually the complete third byte) to the network side. The result is 22 bits fornetwork addressing and eight bits for host addressing which is quite similar to aclass C address. These additional network addresses are called subnets and notnetworks because to the Internet, the original address is still a class B networkaddress but locally the class B network address can be broken down tomanageable subnets that function as actual network addresses. Why usesubnets? Subnets are interconnected using routers, and routers improve network

    performance by reducing traffic and minimizing disruption due to broadcastmessages. Large networks become more manageable when subnets aredeployed.

    A subnet (short for "subnetwork") is an identifiably separate part of anorganization's network. Typically, a subnet may represent all the machines atone geographic location, in one building, or on the same local area network(LAN). Having an organization's network divided into subnets allows it to beconnected to the Internet with a single shared network address. Without subnets,an organization could get multiple connections to the Internet, one for each of its

    physically separate subnetworks, but this would require an unnecessary use ofthe limited number of network numbers the Internet has to assign. It would alsorequire that Internet routing tables on gateways outside the organization wouldneed to know about and have to manage routing that could and should behandled within an organization.

    The Internet is a collection of networks whose users communicate with eachother. Each communication carries the address of the source and destinationnetworks and the particular machine within the network associated with the useror host computer at each end. This address is called the IP address (InternetProtocol address). This 32-bit IP address has two parts: one part identifies thenetwork (with the network number) and the other part identifies the specificmachine or host within the network (with the host number). An organization canuse some of the bits in the machine or host part of the address to identify aspecific subnet. Effectively, the IP address then contains three parts: the networknumber, the subnet number, and the machine number.

    The standard procedure for creating and identifying subnets is provided inInternet Request for Comments 950.

  • 8/7/2019 Term paper of wireless networking

    4/20

    The 32-bit IP address is often depicted as a dot address (also called dotted quadnotation) - that is, four groups (or quads) of decimal numbers separated by

    periods. Here's an example:

    130.5.5.25

    Each of the decimal numbers represents a string of eight binary digits. Thus, theabove IP address really is this string of 0s and 1s:

    10000010.00000101.00000101.00011001

    As you can see, we inserted periods between each eight-digit sequence just aswe did for the decimal version of the IP address. Obviously, the decimal versionof the IP address is easier to read and that's the form most commonly used.

    Some portion of the IP address represents the network number or address and

    some portion represents the local machine address (also known as the hostnumber or address). IP addresses can be one of several classes, eachdetermining how many bits represent the network number and how manyrepresent the host number. The most common class used by large organizations(Class B) allows 16 bits for the network number and 16 for the host number.Using the above example, here's how the IP address is divided:

    130.5 . 5.25

    If you wanted to add sub netting to this address, then some portion (in this

    example, eight bits) of the host address could be used for a subnet address.Thus:

    130.5 . 5 . 25

    To simplify this explanation, we've divided the subnet into a neat eight bits but anorganization could choose some other scheme using only part of the third quador even part of the fourth quad.

    Once a packet has arrived at an organization's gateway or connection point with

    its unique network number, it can be routed within the organization's internalgateways using the subnet number. The router knows which bits to look at (andwhich not to look at) by looking at a subnet mask, which is a screen of numbersthat tells you which

  • 8/7/2019 Term paper of wireless networking

    5/20

  • 8/7/2019 Term paper of wireless networking

    6/20

    MASKING

    To create subnets you need a subnet mask that defines which bits will be usedto create the new network address out of the 32-bit IP addresses. By ANDingthe 32-bit IP address with a 32-bit mask, we create a 32-IP address that

    represents becoming our new network address. What do thesemasks look like? If we start with a basic class A address and do not define anysubnets, the mask would look like 255.0.0.0 which is called a natural or defaultmask. Only those bits that are set as a 1 will be considered when defining anetwork address. In this case, all the bits in the first byte of the IP address will beconsidered. The natural mask for a class B address is 255.255.0.0 and for aclass C address it is 255.255.255.0. In order to create more network addresses(subnets) we need to move the mask bits to the right (changing 0 bits into 1s) inorder to convert host bits into network bits. The best way to understand theconcept is to use an example.

    Assume we begin with IP address 165.10.0.0. From Figure 1 we know that this isa class B address with a network address of 165.10 with the capability ofassigning up to 65,534 hosts. We do not want 65,534 hosts on one network butwould like to have up to 500 hosts on each subnet. In order to have 500 hosts onone subnet, we need to have 9 bits of host addressing. Currently, we have 16bits of host addressing since we possess a class B address. That means that wecan reassign 7 of those bits to signify subnet bits. Therefore, the subnet maskwould be 255.255.254.0. In binary it would be:

    11111111.11111111.11111110.00000000

    The natural mask for a class B address is 255.255.0.0 so in order to createsubnets we moved mask bits to the right in order to convert more host bits tonetwork bits. It must be remembered that these mask bits must be contiguousfrom the left. For example, the above mask allows up to 510 host assignments.Remember that we cannot use either an all 0s or all 1s host address. The next

    jump would be to allow up to 1022 host addresses. What would be the subnetmask? It would be 255.255.252.0. The 1s are still contiguous from the left. Thisapproach creates many subnets, but it is recommended that neither an all 0s norall 1s subnet be used. This could cause a problem on some networks. Howmany mask bits can you have? You need to have some hosts on a network andtwo host addresses are unusable so the maximum number of mask bits is 30,

    leaving two valid host addresses.

  • 8/7/2019 Term paper of wireless networking

    7/20

    The word subnet is short for sub network--a smaller network within a larger one.The smallest subnet that has no more subdivisions within it is considered asingle "broadcast domain," which directly correlates to a single LAN (local area

    network) segment on an Ethernet switch. The broadcast domain serves animportant function because this is where devices on a network communicatedirectly with each other's MAC addresses, which don't route across multiplesubnets, let alone the entire Internet. MAC address communications are limitedto a smaller network because they rely on ARP broadcasting to find their wayaround, and broadcasting can be scaled only so much before the amount ofbroadcast traffic brings down the entire network with sheer broadcast noise. Forthis reason, the most common smallest subnet is 8 bits, or precisely a singleoctet, although it can be smaller or slightly larger.

    Subnets have a beginning and an ending, and the beginning number is always

    even and the ending number is always odd. The beginning number is the"Network ID" and the ending number is the "Broadcast ID." You're not allowed touse these numbers because they both have special meaning with special

    purposes. The Network ID is the official designation for a particular subnet, andthe ending number is the broadcast address that every device on a subnetlistens to. Anytime you want to refer to a subnet, you point to its Network ID andits subnet mask, which defines its size. Anytime you want to send data toeveryone on the subnet (such as a multicast), you send it to the Broadcast ID.Later in this article, I'll show you an easy mathematical and graphical way todetermine the Network and Broadcast IDs.

    SUPERNETTING

    The inverse of subnetting is supernetting. Instead of moving mask bits to theright of the natural mask for subnetting, we move mask bits to the left forsupernetting. With subnetting we create more network addresses at the expenseof host addresses. With supernetting we create more host addresses at theexpense of network addresses. Supernetting is not for users since it would bedifficult for users to be granted a range of contiguous network addresses.Supernetting is for Internet Service Providers (ISPs) who are attempting to obtain

    the most efficient allocation of IP addresses using the A, B, C class scheme.

  • 8/7/2019 Term paper of wireless networking

    8/20

    Subnetting a Class C Address

    Subnet Mask CIDR #

    Subnets# Host

    11111111.11111111.11111111.00000000 /24 0 25411111111.11111111.11111111.11000000 /26 2 62

    11111111.11111111.11111111.11100000 /27 6 30

    11111111.11111111.11111111.11110000 /28 14 14

    11111111.11111111.11111111.11111000 /29 30 6

    11111111.11111111.11111111.11111100 /30 62 2

    The natural mask for a Class C address is 255.255.255.000 which provides forup to 254 host addresses. By moving the mask bits to the right (replacing 0s for1s), subnets are created at the expense of host bits. Not shown are masks /25

    and /31 since they are not allowed. Similar charts can be made for Class A andClass B addressing. Class A subnetting begins at /10 and class B at /18. Bothend at /30.

    Networks and Hosts

    When we talk about a network we usually envision a cluster of workstations withone or more servers connected to a local area network. Each server and

    workstation would have a unique address to distinguish it from the othercomputers. With IP addressing, servers and workstations are all termed hostsbut each address not only identifies a host but the address of the network onwhich the host resides. This is because IP is an internetworking protocol that notonly allows communication between hosts on the same network, butcommunication between hosts on different networks as well. The 32-bit IPaddress identifies a particular host along with the network on which the hostresides. The structure of IP addressing is defined so that any host on the publicInternet can be found by any other host.

    The format of the 32-bit address is and it is usually shown as four

    bytes of data. Although each byte could be represented as a binary, decimal orhexadecimal number, the decimal-dot-decimal notation is the most popular.Therefore, the range of IP addresses can span 0.0.0.0 to 255.255.255.255. Forexample, 193.5.8.254 is a valid IP address but it is difficult to determine which

    part of the address is the network ID and which part is the host ID. Tounderstand the two you need to know about class addressing.

  • 8/7/2019 Term paper of wireless networking

    9/20

    Class Addressing

    IPv4 is called a classful system under RFC 761 with IP addresses being definedas belonging to one of five Classes A, B, C, D or E. Classes A, B and C definedifferent possible combinations of network and host addresses. Class D is

    reserved for multicasting. Multicasting is the ability of one host to communicatewith many other hosts with one transmission and is beyond the scope of thislesson. Class E is reserved for future use. The classes of interest to subnettingare A, B and C.

    With Class A addresses, the first byte of the address identifies the networkaddress while the three remaining bytes identify the host. With Class Baddresses, the first two bytes identify the network address while the remainingtwo identify the host address. With Class C addresses, the first three bytesidentify the network address while the last byte identifies the host. That seemssimple enough but how do you know you are looking at either an A, B, C, D or E

    address?

    The four-byte IP address is viewed from left to right with the first byte on the left.This is the most significant byte. The first few bits (most significant) of that byteidentify the class of address. For a Class A address, the left most bit must be azero. For a Class B address, the first two bits must be a 10. For a Class Caddress, the first three bits must be a 110. For a Class D address, the first fourbits must be a 1110. For a Class E address, the first four bits must be a 1111.Therefore, it is only necessary to observe the first byte of the IP address todetermine its class. Figure 1 shows the decimal value of the first byte for each

    class.

    Class A: 001126

    Class B: 128191

    Class C: 192223

    Class D: 224239

    Class E: 240254

    Figure 1 The class of an IP address can bequickly identified by observing only the first byte.

  • 8/7/2019 Term paper of wireless networking

    10/20

    Reserved Addresses

    There are some reserved IP address besides those identified as Classes D andE. For example, the Class A network address 0.X.X.X cannot be used since it isused to indicate this network. Class A address 127.X.X.X is reserved for loop

    back testing. With the host portion of the address, you cannot have an all 0shost, which refers to the network address where the hosts reside. Likewise, youcannot use the all 1s host address because that indicates a broadcast which is amessage to all hosts on the network. Therefore, with any host addressing oneither a Class A, B or C network, you lose 2 host addresses. Still with 4 billion

    possible addresses from a 32-bit address space, you would think there areplenty of addresses even with reserved addresses. The problem is that therewas much waste when addresses were originally assigned. For example, aClass A address can handle 16 million hosts per one network ID. That is anenormous amount of hosts for just one network. Even a Class B address canhandle 65 thousand hosts per network ID. A Class C address can handle only

    254 hosts per network ID which may be too little for some networks. A schemewas needed to obtain a better balance between network and host assignmentsand that is called subnetting.

    Subnetting an IP Network can be done for a variety of reasons, includingorganization, use of different physical media (such as Ethernet, FDDI, WAN,etc.), preservation of address space, and security. The most common reason isto control network traffic. In an Ethernet network, all nodes on a segment see allthe packets transmitted by all the other nodes on that segment. Performance canbe adversely affected under heavy traffic loads, due to collisions and theresulting retransmissions. A router is used to connect IP networks to minimize

    the amount of traffic each segment must receive.

    Subnet Masking

    Applying a subnet mask to an IP address allows you to identify the network andnode parts of the address. The network bits are represented by the 1s in themask, and the node bits are represented by the 0s. Performing a bitwise logical

    AND operation between the IP address and the subnet mask results in the

    Network Address or Number.For example, using our test IP address and the default Class B subnet mask, weget:

    10001100.10110011.11110000.11001000 140.179.240.200 Class B IPAddress11111111.11111111.00000000.00000000 255.255.000.000 Default ClassB Subnet Mask

  • 8/7/2019 Term paper of wireless networking

    11/20

    --------------------------------------------------------10001100.10110011.00000000.00000000 140.179.000.000 Network

    Address

    Default subnet masks:

    Class A -255.0.0.0-11111111.00000000.00000000.00000000 Class B -255.255.0.0-11111111.11111111.00000000.00000000 Class C -255.255.255.0-11111111.11111111.11111111.00000000

    Additional bits can be added to the default subnet mask for a given Class tofurther subnet, or break down, a network. When a bitwise logical AND operationis performed between the subnet mask and IP address, the result defines the

    Subnet Address (also called the Network Address or Network Number). Thereare some restrictions on the subnet address. Node addresses of all "0"s and all"1"s are reserved for specifying the local network (when a host does not know itsnetwork address) and all hosts on the network (broadcast address), respectively.This also applies to subnets. A subnet address cannot be all "0"s or all "1"s. Thisalso implies that a 1 bit subnet mask is not allowed. This restriction is requiredbecause older standards enforced this restriction. Recent standards that allowuse of these subnets have superseded these standards, but many "legacy"devices do not support the newer standards. If you are operating in a controlledenvironment, such as a lab, you can safely use these restricted subnets.

    To calculate the number of subnets or nodes, use the formula (2

    n

    -2) where n =number of bits in either field, and 2n represents 2 raised to the nth power.Multiplying the number of subnets by the number of nodes available per subnetgives you the total number of nodes available for your class and subnet mask.

    Also, note that although subnet masks with non-contiguous mask bits areallowed, they are not recommended.

    Example:

    10001100.10110011.11011100.11001000 140.179.220.200 IP Address11111111.11111111.11100000.00000000 255.255.224.000 Subnet Mask

    --------------------------------------------------------10001100.10110011.11000000.00000000 140.179.192.000 SubnetAddress10001100.10110011.11011111.11111111 140.179.223.255 Broadcast

    Address

  • 8/7/2019 Term paper of wireless networking

    12/20

    In this example a 3 bit subnet maskwas used. There are 6 (23-2) subnetsavailable with this size mask (remember that subnets with all 0's and all 1's arenot allowed). Each subnet has 8190 (213-2) nodes. Each subnet can have nodes

    assigned to any address between the Subnet address and the Broadcastaddress. This gives a total of 49,140 nodes for the entire class B addresssubnetted this way. Notice that this is less than the 65,534 nodes anunsubnetted class B address would have.

    You can calculate the Subnet Address by performing a bitwise logical ANDoperation between the IP address and the subnet mask, then setting all the hostbits to 0s. Similarly, you can calculate the Broadcast Address for a subnet by

    performing the same logical AND between the IP address and the subnet mask,then setting all the host bits to 1s. That is how these numbers are derived in theexample above.

    Subnetting always reduces the number of possible nodes for a given network.There are complete subnet tables available here for Class A, Class B and ClassC. These tables list all the possible subnet masks for each class, along withcalculations of the number of networks, nodes and total hosts for each subnet.

    Here is another, more detailed, example. Say you are assigned a Class Cnetwork number of 200.133.175.0 (apologies to anyone who may actually ownthis domain address). You want to utilize this network across multiple smallgroups within an organization. You can do this by subnetting that network with asubnet address.

    We will break this network into 14 subnets of 14 nodes each. This will limit us to196 nodes on the network instead of the 254 we would have without subnetting,but gives us the advantages of traffic isolation and security. To accomplish this,we need to use a subnet mask 4 bits long.

    Recall that the default Class C subnet mask is

    255.255.255.0(11111111.11111111.11111111.00000000binary)Extending this by 4 bits yields a mask of

    255.255.255.240(11111111.11111111.11111111.11110000binary)

  • 8/7/2019 Term paper of wireless networking

    13/20

    This gives us 16 possible network numbers, 2 of whichcannot be used:

    Subnet

    bits

    Network

    Number

    Node

    Addresses

    Broadcast Address

    0000 200.133.175.0 Reserved None

    0001 200.133.175.16 .17 thru .30 200.133.175.31

    0010 200.133.175.32 .33 thru .46 200.133.175.47

    0011 200.133.175.48 .49 thru .62 200.133.175.63

    0100 200.133.175.64 .65 thru .78 200.133.175.79

    0101 200.133.175.80 .81 thru .94 200.133.175.95

    0110 200.133.175.96 .97 thru .110 200.133.175.111

    0111 200.133.175.112 .113 thru .126

    200.133.175.127

    1000 200.133.175.128.129 thru .142

    200.133.175.143

    1001 200.133.175.144.145 thru .158

    200.133.175.159

    1010 200.133.175.160.161 thru .174

    200.133.175.175

    1011 200.133.175.176.177 thru .190

    200.133.175.191

    1100 200.133.175.192.193 thru .206

    200.133.175.207

    1101 200.133.175.208.209 thru .222

    200.133.175.223

    1110 200.133.175.224.225 thru .238

    200.133.175.239

    1111 200.133.175.240 Reserved None

    Now that you understand "classful" IP Subnetting principals, you can forget them.

    The reason is CIDR-- Classless InterDomain Routing. CIDR was inventedseveral years ago to keep the internet from running out of IP addresses. The"classful" system of allocating IP addresses can be very wasteful; anyone whocould reasonably show a need for more that 254 host addresses was given aClass B address block of 65533 host addresses.

    Even more wasteful were companies and organizations that wereallocated Class A address blocks, which contain over 16 Million host addresses!

  • 8/7/2019 Term paper of wireless networking

    14/20

    Only a tiny percentage of the allocated Class A and Class B address space hasever been actually assigned to a host computer on the Internet.

    People realized that addresses could be conserved if the class system waseliminated. By accurately allocating only the amount of address space that was

    actually needed, the address space crisis could be avoided for many years. Thiswas first proposed in 1992 as a scheme calledSupernetting. Undersupernetting, the classful subnet masks are extended so that a network addressand subnet mask could, for example, specify multiple Class C subnets with oneaddress. For example, If I needed about 1000 addresses, I could supernet 4Class C networks together:

    192.60.128.0 (11000000.00111100.10000000.00000000) Class C subnetaddress192.60.129.0 (11000000.00111100.10000001.00000000) Class C subnet

    address192.60.130.0 (11000000.00111100.10000010.00000000) Class C subnetaddress192.60.131.0 (11000000.00111100.10000011.00000000) Class C subnetaddress--------------------------------------------------------192.60.128.0 (11000000.00111100.10000000.00000000) SupernettedSubnet address255.255.252.0 (11111111.11111111.11111100.00000000 ) Subnet Mask192.60.131.255 (11000000.00111100.10000011.11111111) Broadcastaddress

    In this example, the subnet 192.60.128.0 includes all the addresses from192.60.128.0 to 192.60.131.255. As you can see in the binary representation ofthe subnet mask, the Network portion of the address is 22 bits long, and the host

    portion is 10 bits long.

    Under CIDR, the subnet mask notation is reduced to a simplified shorthand.Instead of spelling out the bits of the subnet mask, it is simply listed as thenumber of 1s bits that start the mask. In the above example, instead of writingthe address and subnet mask as

    192.60.128.0, Subnet Mask 255.255.252.0

  • 8/7/2019 Term paper of wireless networking

    15/20

    the network address would be written simply as:

    192.60.128.0/22

    which indicates starting address of the network, and number of 1s bits (22) in the

    network portion of the address. If you look at the subnet mask in binary(11111111.11111111.11111100.00000000), you can easily see how this notationworks.

    The use of a CIDR notated address is the same as for a Classful address.Classful addresses can easily be written in CIDR notation (Class A = /8, Class B= /16, and Class C = /24)

    It is currently almost impossible for an individual or company to be allocated theirown IP address blocks. You will simply be told to get them from your ISP. Thereason for this is the ever-growing size of the internet routing table. Just 10 years

    ago, there were less than 5000 network routes in the entire Internet. Today,there are over 100,000. Using CIDR, the biggest ISPs are allocated large chunksof address space (usually with a subnet mask of /19 or even smaller); the ISP'scustomers (often other, smaller ISPs) are then allocated networks from the bigISP's pool. That way, all the big ISP's customers (and their customers, and soon) are accessible via 1 network route on the Internet. But I digress.

    It is expected that CIDR will keep the Internet happily in IP addresses for thenext few years at least. After that, IPv6, with 128 bit addresses, will be needed.Under IPv6, even sloppy address allocation would comfortably allow a billionunique IP addresses for every person on earth! The complete and gory details of

    CIDR are documented in RFC1519, which was released in September of 1993.

  • 8/7/2019 Term paper of wireless networking

    16/20

  • 8/7/2019 Term paper of wireless networking

    17/20

  • 8/7/2019 Term paper of wireless networking

    18/20

    Subnetting Advantages

    There are many advantages of Subnetting in a network. The routing processbecomes much simplified by using subnets. Because the routers do not have tofully identify each individual address from a network and route them. It can

    simply identify a given network using the Subnet address and route. Also theSubnet hides the internal; networks numbers by just giving out the main numberto the routers. The routing tables become much shorter by using the Subnetaddresses and this means that the data flow also becomes faster.

    By using Subnet addresses the entire IP address system becomes centralized.There are many advantages to this feature from technical point of view. Thenetwork administrators can assign IP numbers to specific departments in anorganization so that when they can easily identify the departments on thenetwork using the same numbers. Also the specific department can now handleall the computers in their own network without depending on the network

    administrator.

    Subnet also divides the bigger network into smaller individual networks and itbecomes easy to handle the smaller networks than handle one huge network.

    Also it removes physical barriers and since the networks now are individuallyidentified all the networks can be connected through routers.

    Disadvantages of Subnetting

    The only disadvantage of the subnetting with the rule of the 2n-2 is that there isnevertheless wasting of IP addresses but much less than by using IP addressesof normal classes.

    Calculates masks and IP addresses can also be a hard task, but currentlythere are software to form this part of the subnetting. With that the administrationof under networks is added, because for the configuration of the material forunder precise network, one should not be mistaken during the seizure ofinformation (if there are several under networks) if not you are likely to affect theconfigurations bad to under network.

    Added layer of complexity Difficult to change once hierarchy is established Higher overhead to manage network addresses Larger routing tables IP addresses might one day be exhausted

    Unfortunately, this invisibility also represents a keydisadvantage of subnettedclassful addressing: it cannot correct the fundamental inefficiencies associated

  • 8/7/2019 Term paper of wireless networking

    19/20

    with that type of addressing, because organizations are still assigned addressblocks based on classes.

    The Main Problem With "Classful" Addressing

    A key weakness of regular subnetting is low granularity. A Class B addressblock contains a very large number of addresses (65,534) but a Class C blockhas only a relatively small number (254). There are many thousands of medium-sized organizations who need more than 254 IP addresses, but a small

    percentage of these need 65,534 or anything even close to it. When setting uptheir networks, these companies and groups would tend to request Class Baddress blocks and not Class C blocks because they need more than 254,without considering how many of the 65,000-odd addresses they really woulduse.

  • 8/7/2019 Term paper of wireless networking

    20/20

    References

    Illustrated TCP/IP, Matthew Naugle, 1998, Wiley Computer Publishing

    Practical Networking with Ethernet, Charles E. Spurgeon, 1997, InternationalThomson Computer Press

    International Standard ISO/IEC 8802-3 ANSI/IEEE Std 802.3, 1996, The Instituteof Electrical and Electronic Engineers, Inc.

    TCP/IP Clearly Explained, Pete Loshin, 1997, Academic Press

    TCP/IP Illustrated Volume I, The Protocols, W. Richard Stevens, 1994, Addison-

    Wesley Publishing Company