Grayhill EZCOMWL24IP Wireless LAN Router User Manual EZCom IP Users Manual A6

Grayhill Inc Wireless LAN Router EZCom IP Users Manual A6

User manual for product

IP Users ManualRevision A6Friday, January 26, 2001
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 2 Of 54Table Of ContentsGetting Started.....................................................................................................................4Initialization ..................................................................................................................... 4EZCom-IP Explorer Introduction ................................................................................. 4Point-to-Point Link Example........................................................................................ 6Windows TCP/IP Set Up ...................................................................................................13Multipoint Store-&-Forward Example ........................................................................ 14Technical Reference..........................................................................................................18Introduction ................................................................................................................... 18Protocols And Protocol Architecture............................................................................. 19A Simple Model ......................................................................................................... 20The TCP/IP Protocol Architecture ............................................................................. 21TCP/IP Communications............................................................................................... 23The TCP/IP Protocol Stack ....................................................................................... 23Application Layer....................................................................................................... 23Transport Layer ......................................................................................................... 23User Datagram Protocol............................................................................................ 25Network Layer ........................................................................................................... 26Overview of TCP/IP Addresses................................................................................. 26Internet Protocol Routing........................................................................................... 28The ROUTE Utility Program...................................................................................... 31Finding Another Machine’s Address ......................................................................... 32Ethernet Physical Layer ................................................................................................ 34MAC Frame............................................................................................................... 34Routing, Putting All of the Pieces Together .............................................................. 34Subnetting..................................................................................................................... 35How Do You Subnet?................................................................................................ 35Determining Your Addressing Needs .................................................................... 35Remembering Binary................................................................................................. 35Defining Your Subnet Mask................................................................................... 36Finding Out How Many Networks, How Many Hosts............................................. 37Subnet IDS............................................................................................................. 37EZCom IP Routing ........................................................................................................ 40Introduction................................................................................................................ 40Indicators and Connectors ........................................................................................ 43Grayhill EZCom-IP Explorer Program ...............................................................................44Introduction................................................................................................................ 44Views ......................................................................................................................... 44Menus & Tool Bar...................................................................................................... 45Control Tabs.............................................................................................................. 46Troubleshooting Guide ......................................................................................................50LED Activity B ............................................................................................................... 50No Ethernet Link indicator............................................................................................. 50Link Test Failed ......................................................................................................... 50Ping Failed to Respond............................................................................................. 51Ethernet (CSMA/CD) .........................................................................................................52Precursors ................................................................................................................. 52Description of CSMA/CD........................................................................................... 53
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 3 Of 54List Of Tables & FiguresTable 1, Factory Default Settings ....................................................................................... 4Table 2, Point-To-Point Setup Parameters ........................................................................ 6Table 3, Example II, EZCom-IP Radio Settings ............................................................... 14Table 4, Example II Device IP Addresses ........................................................................ 15Table 5, Routing Table for 192.168.1.2 (EZCom-IP radio)............................................... 16Table 6, Routing Table for 192.168.1.1 (PC) ................................................................... 16Table 7 Store & Forward Example Routing Summary ..................................................... 16Table 8, Bit Position Values.............................................................................................. 27Table 9, TCP/IP Address Classes—First Octet................................................................ 27Table 10, Address Class Summary.................................................................................. 28Table 11, Active Routes: .................................................................................................. 30Table 12, Extracting a Network ID Using a Standard Subnet Mask................................. 36Table 13, Extracting a Network ID Using a Custom Subnet Mask................................... 36Table 14, Extracting the Target Network ID Using Standard and Custom Masks ........... 36Table 15, Creating a Custom Subnet Mask by Adding Subnetting Bits........................... 37Table 16, Valid Subnet Numbers...................................................................................... 37Table 17 Calculating the Subnet IDs Using Binary .......................................................... 38Table 18, Subnet IDs for a Three-Bit Subnet Mask.......................................................... 38Table 19, Table for Calculating Subnet Mask, IDs, and Number of Subnets................... 38Table 20 Finding the Last Host ID by Subtraction............................................................ 39Table 21 Host IDs for a Subnetted (lP) Address .............................................................. 39Table 22, Finding the Last Host ID by Subtraction........................................................... 39Table 23, Host IDs for a Subnetted Class C Address ...................................................... 39Table 24, Typical EZCom-IP Radio Routing Table .......................................................... 41Figure 1, Local Connection................................................................................................. 4Figure 2, EZCom Explorer Window.................................................................................... 5Figure 3, Point-to-Point Link ............................................................................................... 6Figure 4, EZCom-IP Explorer After Finding a Radio .......................................................... 8Figure 5, IP Address Tab.................................................................................................... 8Figure 6, Radio Settings Tab.............................................................................................. 9Figure 7, EZCom-IP Routing Table .................................................................................... 9Figure 8, Diagnostics Tab................................................................................................. 10Figure 9, Link Test Dialog................................................................................................. 11Figure 10, Ping Utility Program......................................................................................... 11Figure 11, Example II Network layout............................................................................... 14Figure 12, TCP/IP Protocol Stack..................................................................................... 22Figure 13, IP Address Formats......................................................................................... 28Figure 14, IP Routing Logic .............................................................................................. 29Figure 15, ARP Packet..................................................................................................... 32Figure 16, IEEE 802.3 frame format................................................................................. 34Figure 17, More Networks Mean Fewer Hosts Per Network & Vice Versa...................... 36Figure 18, EZCom-IP Routing Mechanism....................................................................... 40Figure 19, EZCom processing done at IP layer ............................................................... 40Figure 20, EZCom-IP Indicators....................................................................................... 43Figure 21, EZCom Explorer Window................................................................................ 44Figure 22, Control Tabs.................................................................................................... 46
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 4 Of 54Section1. Getting StartedInitializationWhen you first remove an EZCom IP radio from it’s carton and apply power to it, the radiowill boot-up and go through a series of self-tests. After completing the boot process theradio will be ready to receive configuration information. Before the radio can be used totransmit or receive application specific information (network traffic) it must first beconfigured for the network that it will be used on. All necessary configurations can bedone using the Grayhill EZCom-IP Explorer program.A listing of all the EZCom-IP parameters along with the factory default settings for eachparameter is given in Table 1, below. In this first section “Getting Started” we will practiceconfiguring some EZCom-IP radios for specific examples. First we will setup a point-to-point link typical of what you may want to institute for a bench test and then we will moveon to a more involved example that will demonstrate some of the more advancedfeatures of you EZCom-IP radio. For readers that are looking for a more detailedexplanation of specific settings please refer to the Technical Reference section of thismanual.Table 1, Factory Default SettingsParameter Factory Default CommentsRadio  IP Address 192.168.1.1Network Subnet mask 255.255.255.0Radio Mac Address ******-****** Factory set unique valueRouting Table NoneCenter Frequency 2.442 GHz Approximately Center of BandConfiguration can be accomplished through a local connection or remotely over the air. Alocal or direct connection is when an EZCom-IP radio is connected to the local areanetwork where you have the Grayhill EZCom-IP Explorer program running as illustratedin Figure 1. Remote configuration can be accomplished over the air provided that theremote EZCom-IP radio is already set to operate at the same center frequency as thelocal radio. Remote configuration is discussed in detail in the Technical Referencesection of this manual.Figure 1, Local ConnectionEZComEZCom-IP Explorer IntroductionBefore we start on the examples in this section let’s take a few minutes to familiarizeourselves with the EZCom-IP Explorer program. If you have not loaded the GH EZCom-IP Explorer program please do so now. The Explorer is a client side program that can berun on any 32 bit Windows based PC. It is designed to communicate configuration anddiagnostic information with the EZCom-IP radios either directly attached or via the localarea network. The program offers the user a verity of configuration and diagnostic tools.Figure 2, below illustrates the initial screen of the Explorer program. The screen isdivided into three main parts;
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 5 Of 541. The Network View, which graphically displays the EZCom-IP, radios in thenetwork.2. The Control Tabs that can be used to change configuration settings and initiatediagnostic functions.3. The Monitor, which can be used to observe specific communication events.When you first start the Grayhill EZCom-IP Explorer your will see a single icon in theNetwork View. This icon represents the computer that is running the GH Explorerprogram. No other icons appear at this time because the Explorer program must beprompted to go out and find any radios in the network first. If you click on the Tools menuand then pick Find Links the Explorer will go out and find any EZCom-IP radios on thelocal network.Figure 2, EZCom Explorer WindowGH Explorer will then add a radio icon to the Network View for each radio it finds on thelocal network (see Figure 4).The information in the Control Tab window is associated with the icon selected in theNetwork View. As you click on different icons in the Network View the information in theControl Tab View is updated with the setup values from the object represented by theicon selected. If you select the GH Explorer icon at the top of the window (which isselected by default when you start the program) only the IP address tab is accessible.This is because the GH Explorer icon points to the PC that the program is running on andnot to a radio. When you select a radio icon in the Network View the information in theControl Tab will be downloaded from the radio and displayed in the appropriate tab. If youchanging any of the information in the Control Tab and click the update button the setupinformation in the radio pointed to by the icon in the Network View will be changedaccordingly.As you can see changing the setup information in a radio is as simple as selecting whichradio you want to modify from the Network View and then entering the appropriateinformation in the Control Tab view.NetworkViewControlTabsMonitor
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 6 Of 54Point-to-Point Link ExampleIn this first example we will set up a point-to-point link between two Ethernet networks.For simplicity we have represented both networks as consisting of one PC and oneEZCom-IP radio (router). In reality a point-to-point configuration could be used to connectanything from a single PC and router to a fully developed enterprise network. After wehave set up the example we will uses some of the built-in EZCom diagnostic tools to testour setup. After we complete our testing we will try a few simple client server applicationsthat are part of the windows operating system to demonstrate the functionality of thenetwork.You will need 2 PCs and 2 EZCom-IP radios to fully implement this first example. Youmay also need to have your operating system CD handy in the event that Windows wantsto copy additional files. If you don’t have 2 PCs you can still set up the example with onlyone PC but you will only be able to run the built in diagnostic functions of the EZCom-IPradio you will not be able to run the applications.Figure 3, Point-to-Point LinkEthernet192.168.1.0Ethernet192.168.2.0192.168.1.2 192.168.2.2192.168.1.1 192.168.2.1There are 3 basic steps involved in setting up this example: setting the IP addresses onthe two PCs, configuring the radios, and setting file share permissions on one of the PCsto allow file access across the network. Table 2 shows each step along with theparameters that need to be setup and the appropriate values.Table 2, Point-To-Point Setup ParametersStep Parameter Value For PC (A) &Radio (A) Value For PC (B) &Radio (B)IP Address 192.168.1.2 192.168.2.2Subnet Mask 255.255.255.0 255.255.255.01. Set PC IPAddressesDefault Gateway 192.168.1.1 192.168.2.1IP Address 192.168.1.1 192.168.2.1Subnet Mask 255.255.255.0 255.255.255.0Default Gateway 192.168.2.1 192.168.1.12. Set RadioParametersRouting Table Default Default3. Set File SharePermissions File and Print sharingfor MicrosoftNetworks installedBoth PCs must have an Ethernet network interface card or equivalent PCMCIA cardinstalled and both PCs must also have the TCP/IP protocol installed. For information oninstalling your network interface card see the card manufactures installation instructions.For help installing the TCP/IP protocol, please see the sidebar Windows TCP/IP Set Upon page 13 of this manual.To get started with this example take a RJ45 Category 5 patch cable and connect oneend of it to the Ethernet port on your EZCom-IP radio and connect the other end to anopen port on your network hub. If you do not have an existing network you can connectdirectly to the PC’s NIC card or PCMCIA card. Now apply power to the EZCom-IP radio
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 7 Of 54and the PC. After the PC and radio have gone through their normal boot process youshould see a green link indicator (see Figure 20, on page 43). If you do not see the greenlink indicator please follow the steps in the troubleshooting guide for “No Ethernet Link”.Now that we have a physical connection between the client PC that will be running theEZCom-IP Explorer and an EZCom-IP radio we can begin to setup our first example.Setting-up The PC’s IP Address1. Click the Start button. Choose Settings, ThenControl Panel.2. Double-click the Network icon. Your Networkwindow should pop up as shown on the right.3. Select the Configuration tab.4. Highlight TCP/IP (for your network adaptor)under the list of components installed.5. Click the Properties Button. You should nowsee the TCP/IP properties window below.6. Select the IP Address tab.7. Make sure the Specify IP Address option isselected.8. Enter the appropriate IP Address and Subnet Mask (from the setup table on page 6)in the spaces provided.9. Now select the Gateway tab10. Enter the Default Gateway (again from the setuptable) and make sure you click the ADD button.11. Click the OK button on the TCP/IP PropertiesWindow.12. Click the OK buttonon the NetworkWindow.After clicking the OKbutton on the TCP/IPproperties tab you willbe prompted to rebootyour computer beforetheses changes will take effect. Click OK. The IP Address, Subnet Mask and Default Gateway arenow set up on your PC. Repeat these steps using theappropriate setup values for the second PC in thenetwork. You may wish to reopen either one of theproperties windows to verify the values match those listed in the example’s setup table.In the next step we will setup the radio parameters for the EZCom-IP radios that will beused in this example.Setting-up The Radio ParametersStart the Grayhill EZCom-IP Explorer by selecting “EZCom-IP Explorer” from your PC’sStart/Programs menu. After the program loads select Find Links from the Tools menu atthe top of the explorer main screen. The Searching for Radios dialog box will appear.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 8 Of 54Once the searching process is complete press OK to return to the EZCom-IP Explorermain window.Figure 4, EZCom-IP Explorer After Finding a RadioThe Explorer should now look like the one shown in Figure 4, above. Don’t worry if the IPaddresses and other data on your screen are not exactly as shown. What is important isthat there is an EZCom-IP radio icon below the GH Explorer icon in the Network View.Click on the radio icon. The data in the Control Tab window will update to reflect thecurrent settings for the radio you just selected. If the radio you are using is new thesettings should look like those listed in Table 1, Factory Default Settings on page 4.The first Control Tab is the IP Address Tab, which is shown in Figure 5. On this tab wewill set the radio’s IP Address, Subnet Mask and Default Gateway. In each of therespective text boxes please enter the appropriate setting from Table 2, Point-To-PointSetup Parameters on page 6. When you are done your IP Address tab should look likethe one shown in Figure 5 below.Figure 5, IP Address TabEZCom-IPRadioExplorerIcon
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 9 Of 54Don’t worry if you do not fully understand each of the settings that you are about to enter,we will cover each of the settings in more detail in the technical reference section latter inthis manual.Now click the Radio Tab. You should not have to change any settings on this tab. All ofthe factory defaults settings should be fine. You may just want to look over the valuesand verify that they match those shown if Figure 6. If any of your values are differentplease change them to match.Figure 6, Radio Settings TabNow click the Routing Tab. The routing table should contain two entries, which werecreated automatically by the Explorer program. For our example all routing is actuallyhandled by the Default Gateway setting that we established on the IP Address Tab. Ifthere is any other entries in your routing table select them by clicking any where on therow and then click the Delete button. Repeat this step for all extra entries. Your routingtable should look like the one shown in Figure 7 below.Figure 7, EZCom-IP Routing Table
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 10 Of 54Setting Up The Second PC & RadioNow that we have completed setting up our first PC and an EZCom-IP radio we will needto repeat the steps we followed with the second PC and radio. For the second PC andradio use the setup information listed in the last column of Table 2 on page 6.Testing The Radio LinkWith both PCs and both radios setup we can now run a few diagnostic test to verify thatwe first have a link between the radios and then a network connection from one PC to theother. First connect the radios and PCs as shown in Figure 3. Make sure that youconnect the radios to the PC with the same subnet ID.The first test that we will conduct will be a link test. This is to verify that the radios cancommunicate. This is strictly a radio communications test and none of the networksettings are used. Select the Diagnostics Tab then click on the Link Test button. The linktest dialog box will appear. Enter the Mac Address of the radio you want to link to andclick on the Run Test button.Figure 8, Diagnostics TabIn the Test Results window you will see an announcement that the test is in progress.During a link test packets are transmitted every 50 milliseconds. If you multiply theNumber of packets by this interval you can get an idea of how long the test will take.Using the default number of packets the test should take 100*0.05 or just over a halfsecond.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 11 Of 54Figure 9, Link Test DialogWhen the Link test is complete you should see the test results in the Link Test dialogsimilar to the results shown in Figure 9. If your Link Test fails, that is you don’t get a largenumber of Successful packets (typically 90% to 100%), please follow the steps listed inthe Troubleshooting guide on page 50.After successfully running a link test we will now verify that we have a logical networkconnection from one PC to the other. To accomplish this we will use one of the Windowsbuilt in network utilities known as “Ping”. Actually ping is a member of the TCP/IP protocolsuite.Ping is a simple but very useful utility program, ping sends a special (ICMP) test packetto a designated IP address and then listens for the packet to be echoed back. Figure 10 shows the output of a ping request. To run the Ping utility program click Startthen select Programs and click on the MS-DOS Prompt. When the DOS Window openstype the word ping along with the IP address of the host that you want to ping and pressenter. Ping will then transmit 4 test packets and output the round trip time it takes foreach packet to traverse the network. If you are unable to successfully ping the remote PCin this example please follow the trouble shooting procedures on page 51 for “Ping Failedto Respond”. Figure 10, Ping Utility ProgramIf you have successfully run the link test and ping test you are ready to setup yourapplication to run across the wireless network.Running our example applicationBefore we can run an application across the wireless link we must first install the File andPint sharing for Microsoft Networks service. This service is built in to the Microsoft
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 12 Of 54Windows operating system and in essence enables the PC it’s running on to act as a fileand/or print server.To enable file and printer sharing on your computer1.  Click on the Start Button and select Settings and Control Panel.2. After the Control Panel dialog box opens double-click the Network icon.3. Click File and Print Sharing.4. Select the check box for the “I want to give others access to my files”, sharingoption. A check mark indicates the feature is activated.5. Click OK.6. Windows will now install the File & Print Sharing service on your PC. You will beprompted that you must restart your computer before these changes will takeeffect. Click OK,After your computer reboots you will need to tell windows which files or folders you wantto share on the network. For this example we are going to simply share the entire C drive.To share The C Drive1. In Windows Explorer or My Computer, click the C drive root folder.2. On the File menu, click Properties.3. Click the Sharing tab, and then click Shared As. Enter the share name “ServerDrive”. Note: The Sharing tab is not visible if you don’t have file and print sharingservices enabled.4. Click the Access Type you want, and, if necessary, enter a password.Running Our Example ApplicationNow that we have File and Print sharing setup on our 192.168.2.2 PC we will access thefiles on this machine from our 192.168.1.2 PC, which is at the other end of our wirelesslink. The first thing we need to do is to make the Windows operating system on192.168.1.2 aware of the network connection to 192.168.2.2. Start by:1. Double clicking the My Computer icon on your windows desktop.2.  After the My Computer dialog opens, in the Address Bar type \\192.168.2.2\.3.  Just below the address bar you will see a dropdown list with the share name“Server Drive”. This is the share name we gave to the c drive on 192.168.1.2.Select the Server Drive share name by clicking on it.4. The My Computer window should now be a listing of the files and folders on the192.168.2.2 c drive.  Now click on the Favorites menu and select Add toFavorites.You can now use the Server Drive just as though it was a hard drive in your 192.168.1.2PC. Try by copying or accessing any of your data files just as you would if there were onyou c drive.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 13 Of 54Windows TCP/IP Set UpFollow these instructions to install the TCP/IP protocol on your PC only after a networkcard has been successfully installed.  These instructions are for Windows 95 andWindows 98. For TCP/IP setup under Windows NT or Windows 2000, please refer toyour operating system manual.1. Click the Start button. Choose Settings, then Control Panel.2. Double-click the Network icon. Your Network window should pop up. Select theConfiguration tab.3. Click the Add button.4. Double-click Protocol.5. Highlight Microsoft under the list of manufactures.6. Find and double-click TCP/IP in the list to the right.7. After a few seconds you should be brought back to the main Network window. TheTCP/IP Protocol should now be listed.8. Click OK. Windows may ask for the original Windows installation files. Supply themas needed (i.e.: D:\win98, D:\win95, C:\windows\options\abs.)9. Windows will ask you to restart the PC. Click Yes.The TCP/IP Installation is complete.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 14 Of 54Multipoint Store-&-Forward ExampleThis second example is designed to demonstrate in detail how to setup and utilize therouting functions available within a TCP/IP network using the EZCom-IP radio. It may notbe practical to setup this example because it requires at least 4 EZCom-IP radios, 4 PCs,and a WAND router. Even if you do not setup the example it is beneficial to follow alongto develop an understanding of how to setup the different routing aspects of the network.In our first example we relied on the default Gateway settings for both the PCs and theEZCom-IP radio to handle all of the routing decisions. No routing table entries weremade. In this example we will endeavor to more fully illustrate the routing capabilities ofthe EZCom-IP radio.Figure 11, Example II Network layoutEthernet192.168. 1.  0Ethernet192.168. 4. 0Ethernet192.168. 3. 0Ethernet192.168. 2. 0RouterInternetThe first step in setting up this example is to program the IP address and other settings inthe EZCom-IP radios. Probably the easiest way to handle this task is to take one PC,which has the EZCom-IP Explorer program installed on it and directly connecting it toeach of the radios one after the other. For information and instructions on how to performthe setup tasks from a single point in the network please refer to EZCom-IP Exploredocumentation on page 44. Table 3, below is a listing of all the settings for both the IPAddress Tab and the Radio Tab that need to be set up. Most of these settings are thefactory default settings and should already be set.Table 3, Example II, EZCom-IP Radio SettingsTab Setting Radio A Radio B Radio C Radio DIP Address 192.168.1.2 192.168.2.2 192.168.3.2 192.168.4.2Default Gateway 192.168.1.3 192.168.1.2 192.168.1.2 192.168.3.2IP AddressSubnet Mask 255.255.255.0 25.255.255.0 255.255.255.0 255.255.255.0* TX & RX Center   Frequency 2.441-GHz 2.441-GHz 2.441-GHz 2.441-GHz* PN Code (Hex) 05B8 05B8 05B8 05B8* Modulation BPSK BPSK BPSK BPSKRadio* Transmit Att. level 0 dB 0 dB 0 dB 0 dB* Indicates Factory Default SettingsOnce we have the radio settings complete we will need to setup the TCP/IP proprietiesfor the remaining devices on the four separate subnets. For this example all four subnets
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 15 Of 54are part of the same network. The IP style network ID is 192.168.0.0 with a subnet maskof 255.255.255.0. Therefore the third byte of the IP address is the subnet ID. Theindividual subnets are simply identified as (.1), (.2), (.3) & (.4). All of the devices on allfour subnets have the same subnet mask 255.255.255.0.The IP addresses for each of the devices in the network are listed in Table 4 below. If youneed help setting the IP addresses on the PCs please refer to Setting-up The PC’s IPAddress in the first example on page 4. If you need help setting up the IP address of yourrouter please refer to the manufactures instructions.Table 4, Example II Device IP AddressesSubnet PC EZCom-IPRadio Router(.1) 192.168.1.1 192.168.1.2 192.168.1.3(.2) 192.168.2.1 192.168.2.2 NA(.3) 192.168.3.1 192.168.3.2 NA(.4) 192.168.4.1 192.168.4.2 NANext we need to establish the routing tables for each of the devices in the network.Before we jump into entering routing table information lets take a moment or two anddiscuss the routing requirements. If you are uncertain as to what we mean when we aretalking about routing tables and default gateways you can refer to EZCom IP Routing onpage 40 of this manual.Subnet (.1) consists of three devices: a PC, a router and an EZCom-IP radio. One port onthe router is connected to our subnet and another is connected to the Internet. Theprimary purpose of the router is to allow Internet access to all of the PCs in our network.Therefore all of the other subnets need to be able to communicate with subnet (.1).Subnet (.4) as shown in Figure 11, is only able to communicate with subnet (.3) thereforewe will need to route subnet (.4) traffic through subnet (.3).Subnet (.2) can only communicate with subnet (.1) therefore we will have to route anytraffic from subnet (.2) to either subnet (.3) or subnet (.4) through subnet (.1).Since subnet (.2) can only communicate with subnet (.1) we can set the default gatewayon subnet (.2)’s EZCom-IP radio to 192.168.1.2. This will cause the radio to forward allpackets that are not specifically targeted for devices on subnet (.2) to subnet (.1). Inaddition to setting the radio’s default gateway we also need to set subnet (2)’s PC defaultgateway to 192.168.2.2. This will direct all datagrams that are not destine for a subnet(.2) device to the radio.The setup for devices on subnet (.4) are similar to what we just described for subnet (.2).First we need to set the default gateway on the PC to 192.168.4.2 this will direct all datatraffic not intended for a device on subnet (.4) to the radio for transmission. Next we needto set the default gateway of the radio to 192.168.3.2. This indicates to the radio that alldatagrams arriving from the network should be transmitted to the radio on subnet (.3).The settings for subnet (.3) are slightly different than subnets (.2) & (.4) because theradio on subnet (.3) can communicate with both subnet (.1) and (.4). First we will set thedefault gateway on the PC to 192.168.3.2 thus all datagrams not intended for subnet (.3)will be forwarded to the radio for transmission. Next we will have to set the defaultgateway on the radio to 192.168.1.2 this will handle the bulk of the traffic assuming thereis a lot of Internet activity. In addition to the default gateway setting we will also need toadd a route to the routing table in the radio to forward subnet (.4) packets to the radio on(.4). Add the following route: (Destination 192.168.4.0, Subnet Mask 255.255.255.0, NextHop 192.168.4.2). Please refer to the Routing Tab section on page 47 of this manual forspecific instructions on how to enter a route in the radios routing table.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 16 Of 54Now for subnet (.1), first we will need to set both the PC’s and radio’s default gateways to192.168.1.3. This will insure that all packets not specifically addressed to one of oursubnets be forwarded to the Internet router. Next we need to add routes to the radio’srouting table for all packets destined for one of our subnets. This will entail entering threeseparate routes as shown in Table 5 below.Table 5, Routing Table for 192.168.1.2 (EZCom-IP radio)Destination Subnet Mask Next Hope Interface Origin192.168.2.0 255.255.255.0 192.168.2.2 Radio EZCom192.168.3.0 255.255.255.0 192.168.3.2 Radio EZCom192.168.4.0 255.255.255.0 192.168.3.2 Radio EZComWe will also need to add the following routes to the subnet (.1) PC’s routing table and tothe Internet routers routing table as well. If you are not familiar with the adding a route toyour PC’s routing table please refer to the sidebar “The ROUTE Utility Program” on page 31 of this manual. For adding routes to your routerplease refer to the manufactures instructions.Table 6, Routing Table for 192.168.1.1 (PC)Destination Subnet Mask Next Hope Interface192.168.2.0 255.255.255.0 192.168.1.2192.168.3.0 255.255.255.0 192.168.1.2192.168.4.0 255.255.255.0 192.168.1.2These PC routes were added to direct any datagrams generated by the PC destine forone of our subnets to the radio for transmission. This is necessary because we havealready set the default gateway at the PC to 192.168.1.3, which is the Internet router. Onall of our other subnets we did not need to make individual route entries because anydatagrams that needed to be routed outside the local subnet where handled by thedefault gateway entry. Subnet (.1) on the other hand has two routers, the Internet routerand the EZCom-IP radio.In summary to setup the network illustrated in Figure 11 on page 14 you would first needto set each device IP address as listed in Table 4 and then you would have to establishthe routing tables which are summarized in Table 7.Table 7 Store & Forward Example Routing SummarySubnet Device Device IPAddress Route Type Target Next HopDefault Gateway 0.0.0.0 192.168.1.3Add Route 192.168.2.0 192.168.1.2Add Route 192.168.3.0 192.168.1.2PC 192.168.1.1Add Route 192.168.4.0 192.168.1.2Default Gateway 0.0.0.0 192.168.1.3Add Route 192.168.2.0 192.168.2.2Add Route 192.168.3.0 192.168.3.2Radio 192.168.1.2Add Route 192.168.4.0 193.168.3.2Add Route 192.168.2.0 192.168.1.2Add Route 192.168.3.0 192.168.1.2(.1)Router 192.168.1.3Add Route 192.168.4.0 192.168.1.2PC 192.168.2.1 Default Gateway 0.0.0.0 192.168.2.2(.2) Radio 192.168.2.2 Default Gateway 0.0.0.0 192.168.1.2PC 192.168.3.1 Default Gateway 0.0.0.0 192.168.1.2Default Gateway 0.0.0.0 192.168.1.2(.3) Radio 192.168.3.2Add Route 192.168.4.0 192.168.4.2PC 192.168.4.1 Default Gateway 0.0.0.0 192.168.4.2(.4) Radio 192.168.4.2 Default Gateway 0.0.0.0 192.168.3.2
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 17 Of 54
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 18 Of 54Section2. Technical ReferenceIntroductionThe technical reference section of this manual is intended to develop a basic overview onthe subject of network technology, sufficient in detail to explain the routing function of theEZCom-IP radio. It is not intended to be an exhaustive coverage of the subject but it doseburrow in to some detail of the lower level protocols. Although much of what is presentedis germane to all forms of network communications, the examples and illustrations arebiased toward Ethernet IP applications because it is the underling technology of theEZCom-IP radio.Many of the subsections that follow are relatively generic in nature and may seemremedial to some readers. The following list describes each section and presentsrecommendations as to who should read those sections and who can feel free to skipthem to focus on the EZCom-IP specific information.1. Protocols And Protocol Architecture starts off with a basic introduction to theconcept of a protocol stack it then moves on to a general description of theInternet Protocol. If you are already familiar with the idea of a protocol stack youcan skip right to the descriptions of the IP protocol. If you are already familiar withthe IP protocol also. please feel free to skip this section entirely.2. TCP/IP Communications presents an overview of the TCP/IP protocol stackwith a detailed description of the IP protocol. The section is divided into foursubsections: The Application Layer, The Transport Layer, The Network Layerand The Physical Layer. Having a through understanding of the TCP/IP protocolis not necessary for the application of the EZCom-IP radio. This section ispresented for the advanced user. If you are in a hurry you may want to just readthe network layer subsection.3. Subnetting. This is a fairly lengthy section that goes into some detail regardingwhy and how to subnet. Subnetting is one of the more important topics dealt within this manual. A good understanding of the subject matter will greatly improveyour ability to establish large distributed wide area networks. Any one not alreadyfamiliar with Subnetting and considering using the EZCom-IP radio in a large-scale distributed network should read this material.4. EZCom IP Routing - This section briefly goes through the EZCom-IP routingmechanism. Its brevity is primarily due to the simplistic nature of the routingscheme. Anybody who wants to gain even an intuitive understanding of theEZCom-IP radio should read this section. It will help you maximize thefunctionality of an EZCom-IP extended network.5. Connectors and Indicators. Briefly introduces you to the indicators on the faceof the radio.6. EZCom-IP Explorer program This section goes through all if the menu picksand program dialogs explaining where specific information is entered and whereappropriate also offers some guidance as to what should be entered.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 19 Of 54Protocols And Protocol ArchitectureWhen computers and/or other data processing devices such as PLC’s exchange data,there must be a data path between the two computers, via a communication network.Although, a data path alone is not sufficient to establish communications, more isneeded. Typically the following tasks also need to be performed:1. The source system must inform the communication network of the identity of thedesired destination system.2. The source system must ascertain that the destination system is prepared toreceive data.3. The application on the source system must ascertain that an application on thedestination system is prepared to accept the data for a particular use.4. If the data formats used on the two systems are incompatible, one or the othersystem must perform a format translation function.It is clear that there must be a high degree of cooperation between the two computersystems. The exchange of information between computers for the purpose of cooperativeaction is generally referred to as data communications. Similarly, when two or morecomputers are interconnected via a communication network, the set of computer stationsare referred to as a computer network.In this discussion of computer networks, two concepts are paramount, Protocols andProtocol Architectures.A protocol is used for communication between entities in different systems. The terms"entity" and "system" are used in a very general sense. Examples of entities are userapplication programs, file transfer packages, database management systems, electronicmail facilities, etc. Examples of systems are computers, PLCs, and remote sensors.In general, an entity is anything capable of sending or receiving information, and asystem is a physically distinct object that contains one or more entities. For two entities tocommunicate successfully, they must "speak the same language." What iscommunicated, how it is communicated, and when it is communicated must conform tosome mutually acceptable conventions between the entities involved. The conventionsare referred to as a protocol, which may be defined as a set of rules governing theexchange of data between two entities. The key elements of a protocol are• Syntax, which includes such things as data format and signal levels.• Semantics, which includes control information for coordination and errorhandling.• Timing, which includes speed matching, and sequencing.Having introduced the concept of a protocol, we can now introduce the concept ofprotocol architecture. It is clear that there must be a high degree of cooperation betweenthe two computers. Instead of implementing the logic for this as a single module, the taskis broken up into subtasks, each of which is implemented separately. Thus, instead of asingle module for performing communications, there is a structured set of modules thatimplements the communications function. That structure is referred to as a protocolarchitecture or protocol stack. In the remainder of this section, we will present a simplifiedprotocol architecture. Followed by an introduction to the more complex TCP/IP protocolstack.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 20 Of 54A Simple ModelIn very general terms, data communications can be said to involve three agents:applications, computers, and networks. The applications execute on computers that canoften support multiple simultaneous applications. The computers are connected to thenetwork, and the data to be exchanged is transferred by the network from one computerto another. Thus, the transfer of data from one application to another involves first gettingthe data to the computer in which the application resides and then getting it to theintended application within the computer.With this concept in mind, it appears natural to organize the communication task intothree relatively independent layers:• Application layer• Transport layer• Network access layerThe network access layer is concerned with the exchange of data between a computerand the network to which it is attached. The sending computer must provide the networkwith the address of the destination computer, so that the network may route the data tothe appropriate destination. Thus, it makes sense to separate those functions having todo with network access into a separate layer.Regardless of the nature of the applications that are exchanging data, there is usually arequirement that data be exchanged reliably. That is, we would like to be assured that allof the data arrive at the destination application and that the data arrive in the same orderin which they were sent. As we shall see, the mechanisms for providing reliability areessentially independent of the nature of the applications. Thus, it makes sense to collectthose mechanisms in a common layer shared by all applications; this is referred to as thetransport layer.Finally, the application layer contains the logic needed to support the variousapplications. For each different type of application, such as file transfer program, aseparate module is needed that is peculiar to that application.To demonstrate this concept let us trace a simple operation. Suppose that an application,on computer A, wishes to send amessage to another application, oncomputer B. The application on Ahands the message over to itstransport layer with instructions to sendit to a specific application on computerB. The transport layer hands themessage over to the network accesslayer, which instructs the network tosend the message to computer B. Notethat the network need not be told theidentity of the destination application.All that it needs to know is that the datais intended for computer B.To control this operation, control information, as well as the original user data, must betransmitted. Let us say that the sending application generates a block of data and passesthis to the transport layer. The transport layer may break this block into two smallerpieces to make it more manageable. To each of these pieces the transport layer appendsa transport header, containing protocol control information. The combination of data andcontrol information is known as a protocol data unit (PDU); in this case, it is referred to asa transport protocol data unit. The header in each transport PDU contains controlApplicationTransportNetworkApplicationTransportNetworkPhyical LayerComputerBComputerA
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 21 Of 54information to be used by the peer transport protocol at computer B. Examples of itemsthat may be stored in this header include• Destination application. When the destination transport layer receives thetransport protocol data unit, it must know to whom the data are to be delivered.• Sequence number. Because the transport protocol is sending a sequence ofprotocol data units, it numbers them sequentially so that if they arrive out oforder, the destination transport entity may reorder them.• Error-detection code. The sending transport entity may include a code that is afunction of the contents of the remainder of the PDU. The receiving transportprotocol performs the same calculation and compares the result with theincoming code. A discrepancy results if there has been some error intransmission. In that case, the receiver can discard the PDU and take correctiveaction.The next step is for the transport layer to hand each protocol data unit over to thenetwork layer, with instructions to transmit it to the destination computer. To satisfy thisrequest, the network access protocol must present the data to the network with a requestfor transmission. Once again, this operation requires the use of control information. In thiscase, the network access protocol appends a network access header to the data itreceives from the transport layer, creating a network access PDU. Examples of the itemsthat may be stored in the header include• Destination computer address. The network must know to whom (whichcomputer on the network) the data are to be delivered.• Facilities requests. The network access protocol might want the network to makeuse of certain facilities, such as priority.With the concept of protocol architecture still fresh in our minds let jump right into theTCP/IP protocol stack because it is this architecture that the EZCom-IP radio supports.The TCP/IP Protocol ArchitectureTCP/IP is the most widely used interoperable network communications architecture inuse today. TCP/IP is a result of protocol research and development conducted on theexperimental packet-switched network, ARPANET, funded by the Defense AdvancedResearch Projects Agency (DARPA), and is generally referred to as the TCP/IP protocolsuite. This protocol suite consists of a large collection of protocols that have been issuedas Internet standards by the Internet Activities Board (IAB).There is no official TCP/IP protocol model, however, based on the protocol standards thathave been developed, we can organize the communication task for TCP/IP into fiverelatively independent layers:1. Application layer2. Host-to-host, or Transport layer3. Internet layer4. Network access layer5. Physical layerThe physical layer covers the physical interface between a data transmission device(e.g., computer or PLC) and a transmission medium or network. This layer is concernedwith specifying the characteristics of the transmission medium, the nature of the signals,the data rate, and related matters.The network access layer is concerned with the exchange of data between an endsystem and the network to which it is attached. The sending computer must provide the
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 22 Of 54network with the address of the destination computer, so that the network may route thedata to the appropriate destination.The network access layer is concerned with access to and routing data across a networkfor two end systems attached to the same network. In those cases where two devices areattached to different networks, procedures are needed to allow data to traverse multipleinterconnected networks. This is the function of the Internet layer. The Internet protocol(IP) is used at this layer to provide the routing function across multiple networks. Thisprotocol is implemented not only in the end systems but also in routers. A router is aprocessor that connects two networks and whose primary function is to relay data fromone network to the other on its route from the source to the destination end system. Thisis essentially what the EZCom IP radio dose.Regardless of the nature of the applications that are exchanging data, there is usually arequirement that data be exchanged reliably. That is, we would like to be assured that allof the data arrive at the destination application and that the data arrive in the same orderin which they were sent. The mechanism for providing this reliability is referred to as thehost-to-host layer, or transport layer. The Transmission Control Protocol (TCP) is themost commonly used protocol to provide this functionality.Finally, the application layer contains the logic needed to support the various userapplications. For each different type of application, such as file transfer program, aseparate module is needed that is peculiar to that application.Figure 12, TCP/IP Protocol StackMac headerLLC headerI P headerApplication DataTCP headerMAC trailerIP DatagramMAC FrameApplication layerTCP LayerIP LayerLLC LayerMAC LayerPhysical LayerFigure 12, shows how the TCP/IP protocols are implemented in end systems. Note thatthe physical and network access layers provide interaction between the end systems andthe network, whereas the transport and application layers are what is known as end-to-end protocols; they support interaction between two end systems. The Internet layer hasthe flavor of both. At this layer, the end system communicates routing information to thenetwork but also must provide some common functions between the two end systems.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 23 Of 54TCP/IP CommunicationsThe TCP/IP Protocol StackIn the previous section we introduced the concept of Protocol Architecture and wedescribed the basic structure of the TCP/IP protocol stack. In this section will take acloser look at some of the individual protocols associated with the TCP/IP protocol stack.Most of our attention will be focused on the Internet Protocol (IP) because it isresponsible for routing of information on a TCP/IP network. Essentially an EZCom-IPradio is an IP router and as such relies on the IP protocol to implement routing function.Application LayerThe top layer of the stack is the Application layer. This is not where you find applicationssuch as Word or Excel, but rather where you find NetBIOS and Winsock (the two mainnetworking APIs in the Microsoft network architecture). These components provideservices to the actual applications that can call on the network by using these networkAPIs. As stated, the APIs provide a standard method for programmers to call on theservices of the underlying network without having to know anything about it.Sitting at this layer, you might also add an NCP (Netware Core Protocol) component toenable you to talk with or provide services to the Novell world, or maybe add an NFScomponent to enable you to work with the Network File System that is popular on theUnix platforms.Transport LayerOverview of TCPTCP is used to provide a connection-oriented delivery service for the higher-levelprotocols. To do this, TCP must first establish a session with the remote communicatinghost. It does this by means of a three-way handshake. First the host initiating thecommunications sends a packet to the other host that contains information about itselfand a SYN (or synchronize flag) telling the other host that a session is requested. Theother host receives this packet and responds with information about itself—the SYN flagand an ACK (acknowledgment) of the information that it received. Finally the first hostACKs the information it received from the other, and a session now exists between thetwo systems.At the end of the communication session, a similar three-way handshake is used to dropthe session with the remote host. This ensures that both of the hosts are throughtransmitting. It closes the session cleanly.Transmission Control Protocol (TCP)TCP provides reliable communication between processes that run on interconnectedhosts. This Transport layer functions independently of the network structure. TCP is notconcerned with routing data through the internetwork; the network infrastructure is theresponsibility of the IP layer. TCP on one host communicates directly with TCP onanother host, regardless of whether the hosts are on the same network or remote fromeach other.In fact, TCP is oblivious to the network. A wide variety of network technologies can beaccommodated, including circuit switching and packet switching on local and wide areanetworks. TCP identifies hosts by using IP addresses and does not concern itself withphysical addresses.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 24 Of 54The main functions of TCP are:• Session establishment• Byte stream communications• Sliding windowsSession EstablishmentApplications using the TCP protocol must be able to open, close, and check the status ofsessions to allow them to communicate. To perform this function, TCP uses a three-wayhandshake. The handshake is important not only to create the session, but also inallowing the hosts to exchange data about their capabilities.The handshake starts when one host is asked by Winsock to open a connection (orsession). A TCP segment is generated to start the session, and the SYN control bit isturned on. This tells the other host that a session is requested. The host also includes inthe TCP header the starting Sequence number for this connection and the currentwindow size.The TCP segment is now sent to the other host, who acknowledges the segment,including its window size. The segment sent to acknowledge the first host also includesthe SYN control bit. Finally, the process ends when the first host acknowledges thereceipt of the other’s segment.After the hosts have completed their communications, the connection is closed in asimilar manner, the difference being that the FIN control bit is set rather than the SYN bit.Byte Stream CommunicationsWhen a connection (session) is established, the upper-layer protocol uses thisconnection to send data to the other host. The upper-layer protocols do not concernthemselves with formatting data to fit the underlying topology, but send the data as acontinuous stream.This process, called byte stream communications, means that TCP must have somemethod for dealing with a large volume of data that has no boundaries. Every byte in astream is assigned a Sequence number, enabling every byte sent, to be acknowledged. IfTCP sent each byte as a single package, this would be unmanageable. TCP thereforebundles the data stream it sends into segments; a segment contains chunks of data.The TCP header specifies the segment Sequence number for the first byte in the datafield, and each segment also incorporates an Acknowledgment number. Because you donot know which byte will be the first in a given segment, you must give each byte aSequence number. When TCP sends a segment, it retains a copy of the segment in aqueue (transmit window), where it remains until an acknowledgment is received.Segments not acknowledged are retransmitted.When TCP acknowledges receipt of a segment, it relieves the sending TCP ofresponsibility for all data in that segment. The receiving TCP then becomes responsiblefor delivering the data in the segment to the appropriate upper-layer process.Sliding WindowsThis is all necessary because of the way the Internet (or your intranet) works. Thesegments that you send could each take a different route. This might happen becauserouters can become busy or links could fail. Data must be buffered on the sending hostuntil the remote host has acknowledged it.The Sliding Window is the buffer that enables byte stream communications, and enablesTCP to guarantee the delivery of segments of data. During the session establishment, thetwo hosts exchange the current size of the receive window. This information is also
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 25 Of 54included in the TCP header of each and every segment sent. A host that iscommunicating sets the size of its send window to match the other host’s receivewindow.If you look at the data being transmitted, you would see a series of bytes. If you overlay awindow at the start of the data, you can see that a portion of the data falls into thewindow. This is the only data with which the TCP layer can work. The window cannotslide (move to cover more data) until all the data currently in the window is sent andacknowledged.As the data in the window is transmitted to the remote host, the retransmit timer is set foreach segment sent. The receiving host acknowledges the segments when its receivewindow fills to a predetermined amount (in Windows 98 & NT this is two consecutivesegments). When the sender receives the acknowledgment, it’s transmit window slidespast the acknowledged data and the next segments are transmitted.In the process of moving the data from point A to point B, many things might happen tothe segments being transmitted. They could be lost due to congestion at the routers, orcould be received out of sequence.If a packet is lost, the retransmit timer expires on the sending host, the segment isretransmitted, and the retransmit timer is set to two times the original value. Thiscontinues until the segment is acknowledged or the maximum number of retries has beenmade (about 16 seconds). If the data cannot be transmitted, TCP reports the conditionand you get an error message.In a case where the segments are received out of order, the receiving host sets thedelayed acknowledgment timer for the segment it did receive, and waits for othersegments to arrive. If the delayed acknowledgment timer (hard-coded to 200 ms) expires,TCP on the receiving host sends an acknowledgment for the segment it did receive.TCP Window SizeYou can adjust the size of the sliding window. Great care should be taken in adjusting thewindow size. If the window size is set too small, only a few packets can be sent at a time.This means that the system transmits the packets and then must wait foracknowledgments. If the size is set too large, network traffic delays the transmission.You can adjust the TCP window size under:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\Paramters.The default is 8760, which is tuned for Ethernet. This setting affects only TCP, becauseUDP does not use a sliding window.User Datagram ProtocolTCP is a connection- or session-oriented protocol that requires hosts to establish asession, which is maintained for the duration of a transfer, after which the session isclosed. The overhead required to maintain connections is justified when reliability isrequired but often proves to be misspent effort.User Datagram Protocol provides an alternative transport for processes that do notrequire reliable delivery. UDP is a datagram protocol that does not guarantee datadelivery or duplicate protection. As a datagram protocol, UDP need not be concernedwith receiving streams of data and developing segments suitable for IP. Consequently,UDP is an uncomplicated protocol that functions with far less over-head than TCP.In the following several situations, UDP might be preferred over TCP as a host-to-hostprotocol:
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 26 Of 54• Messages that require no acknowledgment. Using UDP can reduce networkoverhead. Simple Network Management Protocol (SNMP) alerts fall into thiscategory. On a large network, considerable SNMP alerts are generated becauseevery SNMP device transmits status updates. Seldom, however, is loss of anSNMP message critical. Running SNMP over UDP, therefore, reduces networkoverhead.• Messages between hosts are sporadic. SNMP again serves as a goodexample. SNMP messages are sent at irregular intervals. The overhead requiredto open and close a TCP connection for each message would delay messagesand bog down performance.• Reliability is implemented at the process level. Network File System (NFS) isan example of a process that performs its own reliability function and runs overUDP to enhance network performance.Network LayerBoth TCP and UDP pass information to the IP layer. This layer is responsible for actuallymoving the data from one machine on the network (or internet work) to another. The IPlayer handles a number of different communication tasks. The IP layer, however, doesnot guarantee delivery; this is dealt with by TCP. Some of the functions handled at thislayer include the following:• Routing of datagrams• Resolution of IP addresses to MAC addresses• Fragmentation and re-assembly of datagrams• Error detection and reportingWith respect to the EZCom-IP radio this is the most important part of the TCP/IP stackbecause this is where routing takes place. The EZCom-IP radio processes IP packetsjust like a PC or other device on the network.Before we can have a truly meaningful discussion regarding how the Network layerperforms it’s tasks we need to first develop an understanding of the IP addressingscheme.Overview of TCP/IP AddressesTo make TCP/IP work, each and every device on a TCP/IP network requires a uniqueaddress. An IP address identifies the device to all the other devices on the network. IPaddresses are made up of two parts. The first identifies the network ID. This ID is used toroute the information being sent to the correct network. The other part of the IP addressis the host ID, a unique number that identifies each computer and device on your TCP/IPnetwork.An IP address is very similar to your street address. If your address is 110 Main Street,the address identifies which street you are on, Main Street. It also identifies your houseon that street, number 110. The only difference between a street address and a TCP/IPaddress is that the street addresses are reversed. If this were a TCP/IP address, it wouldlook like this: Main Street, 110.How much of the address describes the network ID depends on the type of address youhave. Three main classes of addresses exist: Class A, B, and C. A TCP/IP address is,simply put, a 32-bit binary number. Looking at an address as 32 zeros or ones is difficultfor humans, so the address is viewed as a dotted decimal address in the following format:198.53.147.153. In this case, you are on network 198.53.147, and you are host number153. Each of the four numbers represents 8 bits of the address and is referred to as an
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 27 Of 54octet or byte. To understand TCP/IP and some of the concepts that make it work, it isimportant to be familiar with the binary form of the address.Understanding binary is relatively easy. Look at the number 238, for example. Inconventional math, this is two hundred and thirty-eight. Automatically, you see the 2 astwo groups of one hundred, the 3 as three groups of ten, and there are eight groups ofone. Each of the digits is multiplied by a positional value to make the total. That value isalways ten times the value to the right because there are ten different numbers: 0 1 2 3 45 6 7 8 9.Normally, you need only to work with binary numbers that are 8 digits long. Table 8,shows the values for those first 8 positions:Table 8, Bit Position Values128 64 32 16 8 4 2 1In binary, there are only two numbers, 1 and 0. Where the decimal system is a base tensystem, the binary system is a base two system. Like the decimal system, the positionalvalues increase. Here, however, they increase by two times the previous value(exponentially). Using Table 8, you should be able to figure out that the binary code110110 does not represent one hundred and ten thousand, one hundred and ten.Instead, it represents one group of thirty-two, one group of sixteen, no groups of eight,one group of four, one group of two, and no groups of one. That is, 110110 representsthe number 54 if you express it in decimal form.If you were to take the 198 from the example address 198.53.147.153, you could expressthis number as 128+64+4+2 (or 11000110). Remember that each of the 4 numbersrepresents 8 bits of the address, making up the total of 32 bits.The most obvious difference between the three main types of addresses is the number ofoctets used to identify the network ID. Class A uses the first octet only; this leaves 24 bits(or three octets) to identify the host. Class B uses the first two octets to identify thenetwork, leaving 16 bits (two octets) for the host. Class C uses three octets for thenetwork ID, leaving 8 bits (one octet) for the host.Table 9, TCP/IP Address Classes—First OctetClass Start(Binary) Finish(Binary) Start(Decimal) Finish(Decimal)A00000001 01111111 1 127B10000000 10111111 128 191C11000000 11011111 192 223A couple of rules determine what you can and cannot use for addresses. Neither thenetwork ID nor the host ID can be represented by all 0’s or by all 1’s, because each ofthese conditions has a special meaning. As well, the network with the first octet 127 isused solely for loop back tests.The classes of networks also differ in how their addresses start in binary. Class Aaddresses start with 0. Class B addresses start with 10. Class C addresses start with110. You can tell which class of address a host has by the first octet of its TCP/IPaddress. Knowing that the first octet represents the first 8 bits of the address, and byknowing the starting bits for the classes of addresses, you can see the first octet rangesfor the respective classes in Table 9
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 28 Of 54Figure 13, IP Address Formats0Network (7 bits)Host (16 bits)Host (24 bits)Network (14 bits)Network (21 bits)Format undefined11111010Host (16 bits)Class AClass BClass CExtendedAddressing ClassBecause the Class A addresses use only the first octet to identify the network ID, thereare a limited number of them (126, to be exact; 127 is reserved). Each of these 126networks, however, can have many hosts on it: 2 24 (the remaining 24 bits) hosts minustwo (the host IDs that are all 0’s and all 1’s) equals 16,777,214 hosts on a single network(albeit impossible).Class B addresses use the first two octets. The first 2 bits, however, are set to binary 10.This leaves 14 bits that can be used to identify the network: 2 14 possible combinations (6bits in the first octet and 8 from the second)—16,384 network IDs (because the first twodigits are 10, you don’t have to worry about an all 0’s or all 1’s host ID.) Each of thosenetwork IDs has 16 bits left to identify the host or 65,534 hosts (2 16 – 2).Class C networks use three octets (or 24 bits) to identify the network. The first three bits,however, are always 110. This means that there are five bits in the first octet and eight inthe other two that can be used to uniquely identify the network ID or 2 21 possiblenetworks (2,097,152)—each of which has 8 bits for hosts or 254 (2 8 –2).Table 10 summarizes all the possible TCP/IP addresses.Table 10, Address Class SummaryAddressClass FirstOctetStartFinish Number ofNetworks HostsEachA1 126 126 16,777,214B128 191 16,384 65,534C192 223 2,097,152 254Internet Protocol RoutingWhen a packet arrives at the IP layer the subnet mask can be used to determine whetherthe destination host is a local or remote host. First the devices own IP address is ANDedwith the subnet mask to extract the network ID for the local network on which the hostresides. Then the IP address that IP receives in the pseudo header is ANDed with thesubnet mask to determine the designation’s network ID. It is important to note that thenetwork ID generated from the ANDing with the local host’s subnet mask might beincorrect. If the local host attempting to send the datagram is a Class C host using255.255.255.0 as the subnet mask, ANDing generates an incorrect address if the remotehost is a Class B. This does not matter, however, because the network IDs will not match(remember the first octet differs, depending on the class of network). As you can see,therefore, the subnet mask enables you to extract the network ID. This information isused to see whether the datagram is for the local network. If it is not, the system needs tolook at the remote IP address and use the routing table to figure out where to send it.After the network IDs are known, they can be compared. The only case where theyshould match is if the two hosts are on the same network. If the host that you are trying toreach is on the same network, the IP layer finds that host and transmits the data to it. If
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 29 Of 54not, it needs to look for a route to the host. This will be done in the routing table. We willtake a closer look at the routing table in just a minute. For now lets look at the logic usedto find a route in the routing table first.Figure 14, IP Routing LogicExtract destination IPaddress D and determinedestination Network NReceive Datagram fromUpper LayerDose Nmatch anattached networkID?Report a routing ErrorDeliver the datagram tothe attached networkSend the datagram tothe default routerSend the datagram tothe next hop specifiedin the routing tableStopDose routingtable have aroute to NDose routingtable specify adefault route?Dose routingtable have aroute to DSend the datagram tothe next hop specifiedin the routing tableAs you can see from Figure 14, the IP layer has a very specific logic it uses indetermining how a datagram should be routed. This is referred to as the routingmechanism and all IP based devices use this same mechanism. The simplicity of therouting mechanism is part of what makes the IP protocol so attractive and also varyrobust. You are probably thinking how can such a simple mechanism be used to routeinformation all over the world as it dose in the Internet. The simplicity comes from the factthat any device on the network only has to know the next hop in the overall routing of anydatagram. The strength and complexity of routing datagrams all over the world isattributed to what is referred to as the routing policy. Routing policy is responsible forwhat is in the individual routing tables. In the case of the EZCom-IP radio the routingpolicy is completely up to you. All entries in the routing table are entered via the EZCom-IP explore program. This type of routing policy is referred to as static routing. There is averity of dynamic routing protocols in use today on routers that are part of the Internet butdynamic routing is not currently an option on the EZCom-IP radio.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 30 Of 54Routing TableAll devices that use the IP protocol have a routing table, which includes the EZCom-IPradio. In some cases a host’s, routing table does not contain much routing information,except for the default gateway (router) address. In this case any packet not on the localnetwork is normally sent to the default gateway. IP on the gateway then looks in itsrouting table for a route to the remote network. In most cases you will need to haveentries in the local host’s routing table. In those cases, the table is consulted to find thefirst hop in the route. The following is an example of a routing table.Table 11, Active Routes:NetworkAddress Subnet mask Gateway Address Interface Metric0.0.0.0 0.0.0.0 206.51.250.69 206.51.250.69 1127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1206.51.250.0 255.255.255.0 206.51.250.69 206.51.250.69 1206.51.250.69 255.255.255.255 127.0.0.1 127.0.0.1 1206.51.250.255 255.255.255.255 206.51.250.69 206.51.250.69 1224.0.0.0 224.0.0.0 206.51.250.69 206.51.250.69 1255.255.255.255 255.255.255.255 206.51.250.69 206.51.250.69 1A routing table contains the following five pieces of information:• Network Address. The actual network ID to which the entry describes a route.This is the real network ID, not the one generated earlier when checking, if thehost is local or remote.• ?Netmask. The subnet mask that can be used to generate the network ID. Thesystem runs through the table and ANDs the IP address you are trying to reachwith each of the netmasks. Then it can compare the result to the NetworkAddress to see whether they match. If they match, a route has been found.• Gateway Address. Where to send the packet if it is a remote network ID towhich the computer is sending.• Interface. Which network interface to send the packet from. Normally you onlyhave one network card, and this is the same for all entries. (The exception hereis the loopback and multicasting addresses.) In the case of the EZCom-IP radiothere are 2 interfaces one that attaches the radio to the local subnet and theother is the radio link to other EZCom-IP radios. You can learn more about this inthe EZCom IP Routing section on page 40.•  Metric. How far away this network is. This is the number of routers (gateways)that the packet must travel through to get to the remote.There will often be an entry for network 0.0.0.0 with a netmask of 0.0.0.0. This is theentry for the default gateway and is checked last. If you work it out in binary, you will seethat all addresses match this one. Figure 14 summarizes the process that IP uses todetermine where it should send the packet.You can add routes or modify the routing table in your EZCom-IP radio using the EZCom-IP Explorer program. If you need to setup a route or modify one on you PC you need touse the ROUTE utility program included with the windows operating system.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 31 Of 54The ROUTE Utility ProgramSyntax for the ROUTE command is as follows:Manipulates network routing tables.ROUTE [-f] [command [destination] [MASK netmask] [gateway] [METRIC metric]]-f  Clears the routing tables of all gateway entries. If this is used in conjunction withone of the commands, the tables are cleared prior to running the command.-p  When used with the ADD command, makes a route persistent across boots ofthe system. By default, routes are not preserved when the system is restarted.When used with the PRINT command, displays the list of registered persistentroutes. Ignored for all other commands, which always affect the appropriatepersistent routes.command  Specifies one of four commandsPRINT Prints a routeADD Adds a routeDELETE Deletes a routeCHANGE Modifies an existing routedestination Specifies the host.MASK If the MASK keyword is present, the next parameter is interpreted as thenetmask parameter.netmask If provided, specifies a sub-net mask value to be associated with thisroute entry. If not specified, it defaults to 255.255.255.255.gateway Specifies gateway.METRIC specifies the metric/cost for the destinationAll symbolic names used for destination are looked up in the network database fileNETWORKS. The symbolic names for gateway are looked up in the host name databasefile HOSTS.If the command is print or delete, wildcards may be used for the destination and gateway,or the gateway argument may be omitted.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 32 Of 54Finding Another Machine’s AddressWhether a packet that you are sending is going to a host on your network or to a host ona remote network, the packet is always sent to a MAC address (the hardware address ofthe network card). The only difference in sending to the local or the remote network isthat the address used for a remote network is the address of the router on the localnetwork. Remember that a router is a simple device that connects two (or more)networks; it has a network interface on each network (with an IP address on each subnet)and the IP layer to enable it to route packets between different networks based on therouting table. In the case of a packet going to a remote system, the system finds the MACaddress of the default gateway’s IP address on the local subnet (see Figure 14).The resolution of hardware addresses, as previously mentioned, is the responsibility ofARP (Address Resolution Protocol). ARP first checks the ARP cache to see whether ithas recently resolved the address. If it has, it can pass that to IP so that the packet canbe sent. Otherwise, ARP creates a broadcast packet that is sent on the network (seeFigure 15). The packet contains the IP address your system wants to resolve. It alsocontains the IP address and MAC address of your machine.Figure 15, ARP PacketHardware type Protocol Type HardwaeAddressLengthProtocolAddressLength Operation CodeTarget's IP AddressSender's MAC AddressTarget's MAC AddressSender's IP AddressThe parts of the ARP packet are as follows:• Hardware type, references which type of hardware is being used to access thenetwork (for example, token ring).• Protocol type. The protocol being used to perform the address resolution.Normally set to 0800 (hex), which is IP.• Hardware address length. Size of the hardware address in bytes. For TokenRing and Ethernet, this is 06 (hex).• Protocol address length. Size in bytes of the address being sought. This is 04(hex) for IP.• Operation code. Determines what this packet is. Operations include Query andReply.• Sender’s addresses. Both the MAC and IP address. This is added to the targetmachine’s ARP cache, and is used to reply.• Target’s addresses. The information being sought. The IP address is known,and the MAC address is returned.When the ARP packet is broadcast on the network, all the systems receive the packetand pass it up to their own IP layer. ARP sees whether the IP address being sought is itsown IP address. If it is, it takes the IP address and MAC address of the other host andadds it to its own table. Then it creates an ARP reply to tell the other system its MACaddress. Both systems now know each other’s IP and MAC addresses. You should,however, remember a couple of things about the ARP cache: Entries in the ARP cacheexpire after a short period of time; if the address is not used again, the entry lasts for twominutes; if it is used, it is kept for ten minutes. An entry could also be removed if thecache is getting full—in this case, ARP removes the oldest entries first. You can also adda static entry in the ARP cache. It remains, however, only until the system is restarted.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 33 Of 54This might seem a little severe. Entries in the ARP cache, however, are the hardwareaddresses of the network cards in other hosts. This could very possibly change for agiven host, and would (if your entries were permanent) require all the hosts to beupdated.ARP Utility ProgramTo work with your ARP cache, you can use the ARP command. You can use ARP todisplays and modify the IP-to-Physical address translation tables used by the addressresolution protocol (ARP).The following is the help text for the ARP command:C:\users\default>arp /? ARP -s inet_addr eth_addr [if_addr] ARP -d inet_addr [if_addr] ARP -a [inet_addr] [-N if_addr]-a  Displays current ARP entries by interrogating the current protocol data. Ifinet_addr is specified, the IP and Physical addresses for only the specifiedcomputer are displayed. If more than one network interface uses ARP, entries foreach ARP table are displayed.-g Same as -a.inet_addr  Specifies an internet address.-N if_addr  Displays the ARP entries for the network interface specified by if_addr.-d  Deletes the host specified by inet_addr.-s  Adds the host and associates the Internet address inet_addr with the Physicaladdress eth_addr. The Physical address is given as 6 hexadecimal bytesseparated by hyphens. The entry is permanent.eth_addr Specifies a physical address.if_addr If present, this specifies the Internet address of theinterface whose address translation table should be modified.If not present, the first applicable interface will be used.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 34 Of 54Ethernet Physical LayerAs we have mentioned before the EZCom-IP radio is essentially an Ethernet IP router. Itis not necessary to fully understand how Ethernet works to utilize the EZCom-IP radiojust as it is not necessary to understand the internal workings of a combustion engine todrive a car. However for those interested there is a description of media accessprocedure for Ethernet in appendix B.  In this section we are will look at the EthernetMAC frame structure because of it’s involvement in the overall routing scheme.  We willfocus on the IEEE 802.3 standard where there is both a medium access control layer anda physical layer specified.MAC FrameWhen an IP datagram is passed down from the network layer to the physical layer it isencapsulated by the physical layer in a MAC frame. Figure 16, depicts the frame formatfor the 802.3 protocol; it consists of the following fields:• Preamble. A 7-octet pattern of alternating 0s and 1s used by the receiver toestablish bit synchronization.• A start frame delimiter. The sequence 10101011, which indicates the actual startof the frame and which enables the receiver to locate the first bit of the rest of theframe.• Destination address (DA). Specifies the station(s) for which the frame isintended. It may be a unique physical address, a group address, or a globaladdress.• Source address (SA). Specifies the station that sent the frame.• Length. Length of the LLC data field.• LLC data. Data unit supplied by LLC.• Pad. Octets added to ensure that the frame is long enough for proper CDoperation.• Frame check sequence (FCS). A 32-bit cyclic redundancy check, based on allfields except the preamble, the SFD, and the FCS.Figure 16, IEEE 802.3 frame format.Preamble SFDLEGENDDA = Destination addressSFD =Start-frame delimiterDA SA LLC Data Pad FCSSA = Source addressFCS = Frame-check sequenceRouting, Putting All of the Pieces TogetherWhen a packet is received by IP from either a higher-level protocol such as TCP or UDPor from the network interface, The destination IP address is compared to the devices IPaddress if they match the packet is delivered to one of the higher level protocols. If the IPaddresses don’t then the routing table is consulted to find a next hop IP address. Afterthe next hop address is identified ARP is used to resolve the MAC address of the devicethe packet is to be sent to. Then the packet is delivered to the MAC address.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 35 Of 54SubnettingSubnetting is the process of dividing a network into smaller sections or segments; witheach segment having it’s own IP subnet address. Subnetting is not necessary in allsituation, but it will greatly reduce the number of routing table entries that you will have tocreate and maintain. It will also improve the overall network performance by reducing thetime it takes for each radio to lookup a route when forwarding packets.If you are planning on connecting your network to the Internet (World Wide Web), youmust subnet. If you work only with computers in your own organization, you can use anyaddressing scheme you feel like using, this is called a Private Network Address Space. Thisis the case as well when you use a firewall or proxy server. Although, once againsubnetting a set of private network addresses will greatly improve the performance ofyour EZCom IP radio and reduce the total number of routing table entries required toimplement a private wireless networkHow Do You Subnet?Subnetting is usually done only once, and falls into the planning stages of the network.Changing the subnetting scheme after a network is in place generally requires visitingeach station and each EZCom IP radio on the network and reconfiguring them.Determining Your Addressing NeedsYou must determine two critical factors when choosing how to subnet your network. Firstyou need to know how many different subnets are needed, and then you need to knowthe maximum number of hosts required on any one subnet. Remembering that yournetwork will probably grow at some time in the future, you should always design yournetwork so that the growth you expect (and more) can be accommodated.Some points that you want to consider in planning the subnetting of your network includewhere your hosts are physically located, and how much network traffic the different typesof hosts are going to generate. General guidelines include the following:• Locate hosts that share time critical data with each other on the same subnet• Place hosts with heavy network usage on less populated subnets• Reserve a network ID (subnet) for each EZCom-IP Radio.• Allow for the most subnets possible-use the desired maximum number of hostsper segment as the limiting factor• Where possible, put client hosts on the same subnet as the servers they will useAll these help to reduce the load on your EZCom IP routers. You should also planredundancy into your router scheme, making alternate routes available in case one fails.Remembering BinaryBecause understanding what happens in Subnetting requires an understanding of theTCP, IP address as a 32-bit binary number. We will start with a recap of the IP address inbinary form. In the section titled “Internet Protocol Routing” on page 28 we covered howthe IP layer uses the subnet mask to determine whether a host is on the local network ora remote network. To do this, the bits in the subnet mask are turned on for the portion ofthe IP address that represents the network ID. In a class B address, for example, thestandard subnet mask is 255.255.0.0, which means all the bits are "on" (1s) for the firsttwo octets. The ANDing process pulls the first 16 bits from the IP address, which is thenetwork ID. Table 12 shows an example of this.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 36 Of 54Table 12, Extracting a Network ID Using a Standard Subnet MaskIP Address 160.16.45.3 10100000 00010000 00101101 00000011Subnet Mask 255.255.255.0 11111111 11111111 00000000 00000000Network ID 160.16.0.0 10100000 00010000 00000000 00000000Throughout this section I have tried to show the dotted decimal form of the IP address inthe second column of most of the tables, and the binary form for each of the octets of theaddress in the remaining columns. This arrangement enables you to see the binaryversions of the IP addresses and subnet mask. You will probably find (as most peopledo) that it is easier to understand the subnet mask if you look at it in it’s binary form.When a network is subnetted, all that happens is that you set two or more extra bits to"on" in the subnet mask. In this way, the IP layer sees more of the hosts with which youare communicating as being on a remote network, including some of the addresseswithin your organization Table 13, shows a network ID extract using a custom subnetmask.Table 13, Extracting a Network ID Using a Custom Subnet MaskIP Address 160.16.45.3 10100000 00010000 00101101 00000011Subnet Mask 255.255.240.0 11111111 11111111 11110000 00000000Network ID 160.16.32.0 10100000 00010000 00100000 00000000Notice that the network ID extract in Table 13, differs from that in Table 12-even thoughthe IP address is the same. This is because extra bits are used to identify the network. Inthis case, four extra bits are used. Assume, for example, that you are trying to contact ahost with an address of 160.16.154.23, as shown in Table 14.Table 14, Extracting the Target Network ID Using Standard and Custom MasksIP Address 160.16.154.23 10100000 00010000 10011010 00010111Subnet Mask 255.255.0.0 11111111 11111111 00000000 00000000Network ID 160.16.0.0 10100000 00010000 00000000 00000000Subnet Mask 255.255.240.0 1111111 11111111 11110000 00000000Network ID 160.16.144.0 10100000 00010000 10010000 00000000As Table 14, shows, if you use the standard subnet mask, the network IDs match, andyour system will know that the host is a local host. If you use the custom subnet mask,however, the network IDs differ, this means that the target host is remote.Remember that the IP address is a 32-bit binary address with the first part as the networkID, and the remainder as the host ID on that network. Obviously if you use more bits forthe network ID (to subnet it), it has fewer for the hosts; you reduce the number of hostsper network (see Figure 17).Figure 17, More Networks Mean Fewer Hosts Per Network & Vice VersaIP AddressAssigned Portion in Class BStandard Subnet Mask Portion Available for SubnettingMore NetworksFewer HostsMore HostsFewer NetworksDefining Your Subnet MaskFor an IP address to be a remote address, the network portion of the address must bedifferent (in binary) from your own. In the case of subnetting, that means the bits in theportion you are using to subnet have to change. The easiest way to figure out how manybits you need is to write the number in binary. Twelve subnets, for example, would be
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 37 Of 541100. It takes 4 bits to write the number 12 in binary. To allow for at least 12 uniquebinary combinations, therefore, you need to use 4 bits for your subnet mask.You can add the bits to the standard subnet mask to generate a custom subnet mask.When the bits are added to the subnet mask, all the required bits are set to 1. In the classB example used earlier, it would look like Table 15.Table 15, Creating a Custom Subnet Mask by Adding Subnetting BitsStandard Mask 11111111 11111111 00000000 00000000Additional Bits 1111Custom Subnet Mask 11111111 11111111 11110000 00000000You might want to move the bits you want to use to the beginning of the octet (as shownin Table 15, for example). Because the network ID is always the first part of the IPaddress, the subnetting bits (which are an extension of the network ID) are always thefirst bits after the standard mask.Finding Out How Many Networks, How Many HostsAs you might have guessed, there are actually more than the 12 subnets required. Infact, four bits generate 16 unique combinations (or 2'). This means that a total of 14subnets are available, because just like host IDs and network IDs, the subnet IDs cannotbe all 0s or all 1s.Calculating what the subnet mask requires is very simple now. In fact, you have alreadydone it. Table 6.4 shows the custom subnet mask, you can just convert it to decimal255.255.240.0. You can also figure out how many hosts each subnet will have.Remember that the subnet mask is used to remove the host ID so that only the networkID remains. All the bits that you are masking out (0s), therefore, are used for the host ID.In this case, the third octet has 4 and the last octet has 8, meaning 12 bits are used forthe host ID. The number 2 put to the power of 12 gives you the number of hosts that aresupported per subnet. Remember, though, to subtract 2 from the product because theaddress with all Os is this subnet's ID, and the address with all is 1s the broadcast for thissubnet. So 22 is 4,096 minus 2 is 4,094 hosts available on each subnet.Because you always include the bits that you want to subnet with immediately after thestandard subnet mask, only certain numbers work for the subnet mask. Obviously 255and 0 are available-they make up the standard subnet mask. As you saw in thepreceding example, you took the 4 bits and put them on the left side of the octet; the restwas padded with 0s. This is the same procedure you follow for all custom subnetting.Table 16 shows all the valid numbers for subnet masks.Table 16, Valid Subnet NumbersBits Used Octet in Binary Decimal Value1Not valid Not valid2 11000000 1923 11100000 2244 11110000 2405 11111000 2486 11111100 2527 11111110 2548 11111111 255Notice that subnetting on one bit is not valid. This makes sense if you remember that thesubnet ID cannot be all 1s or all 0s. Because the only possible subnet IDs with one bitwould be a 1 or a 0, you cannot use this.Subnet IDSNow that the hard work is done, you can figure out the subnet IDs. By figuring these, youcan calculate the valid host IDs for each subnet. Using the same example as earlier, 16
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 38 Of 54possible combinations exist in the subnetted octet. Looking at them as an entire octet,they can be converted to decimal. This gives you the subnet IDs. Table 17 shows thecalculation of subnet IDs using binary.Table 17 Calculating the Subnet IDs Using BinaryOctet in Binary Decimal Equivalent Full Network ID0000 0000 0Not Valid0001 0000 16 160.16.16.00010 0000 32 160.16.32.00011 0000 48 160.16.48.00100 0000 64 160.16.64.00101 0000 80 160.16.80.00110 0000 96 160.16.96.00111 0000 112 160.16.112.01000 0000 128 160.16.128.01001 0000 144 160.16.144.01010 0000 160 160.16.160.01011 0000 176 160.16.176.01100 0000 192 160.16.192.01101 0000 208 1 60.16.208.01110 0000 224 1.60.16.224.01111 0000 240 Not ValidAgain two values are not valid because they consist of all 0s and all 1s. Looking at Table17, you might notice that the subnet ID always increases by 16. If you look at the first halfof the octet (the part being subnetted), this is being increased by 1 each time, and the 4other bits are ignored. Therefore you are counting by 16s.This in fact works for all the possible subnetting scenarios. You always end up countingby the position value of the last bit in the subnet mask. To look at another example,consider what happens if you subnet on 3 bits (see Table 18).Table 18, Subnet IDs for a Three-Bit Subnet MaskOctet in Binary Decimal Equivalent Full Network ID000 00000 0Not Valid001 00000 32 160.16.32.0010 00000 64 160.16.64.0011 00000 96 160.16.96.0100 00000 128 160.16.128.0101 00000 160 160.16.160.0110 00000 192 160.16.192.0111 00000 224 Not ValidIn this case, the last bit in the subnet mask has a position value of 32. To calculate thesubnet IDs, therefore, all you need to do is look at the position value for the last bit in thesubnet mask. This is the first valid subnet ID, and the value by which to increment. Table19 summarizes all the information that you have looked at so far.Table 19, Table for Calculating Subnet Mask, IDs, and Number of SubnetsPosition Value 64 32 16842Subnet Bits 2 3 4 5Subnets 22-2=223 -2AvailableSubnet MaskHost BbitsUsing Table 19, look at a network with the given class B address of 152.42.0.0. In thiscase, you need at least 28 subnets with a maximum of 300 hosts per subnet (segment).In this case, there is more than one right answer.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 39 Of 54Knowing that you need 28 subnets, the obvious answer is to use 5 bits for subnetting-asyou can see, that this gives you up to 30 subnets. You might, therefore, use the255.255.248.0 as the subnet mask. This leaves 3 bits for hosts in the third octet plus the8 in the last for a total of 11 bits. That works out to 2,046 hosts per segment.Finding the end of the valid host IDs is also simple. Take the next subnet ID (in the caseof the last subnet, use the subnet mask-which is the subnet with all 1s) and subtract 1, asshown in Table 20. This gives you a case where all the hosts’ bits are on in the previoussubnet. Because this is the broadcast address, you should back up one more to get thelast host ID.Table 20 Finding the Last Host ID by SubtractionNext Subnet ID 160.16.47.255 10100000 00010000 00110000 00000000Minus l00000000 00000000 00000000 00000001Broadcast for Previous Subnet 160.16.47.255 10100000 00010000 00101111 11111111Minus l 00000000 00000000 00000000 00000001Last Host ID 160.16.47.254 10100000 00010000 00101111 11111110Finding the host IDs becomes very obvious if you look at it this way, notably in the caseof a subnetted class A or B address. You can apply the same math, however, whensubnetting a class C address. In this case, it is not so obvious because the numbers arenot familiar.Take 198.53.202.0, for example, as a network address. You want two subnets. You endup with 198.53.202.64 and 198.53.202.128 as the two subnet IDs (subnet mask255.255.255.192). Following the logic set out previously, the valid hosts are as follows inTable 21:Table 21 Host IDs for a Subnetted (lP) AddressSubnet ID Starting Host ID Last Host ID198.53.202.65 198.53.202.126198.53.202.129 198.53.202.190Finding the end of the valid host IDs is also simple. Take the next subnet ID (in the caseof the last subnet, use the subnet mask-which is the subnet with all Is) and subtract 1, asshown in Table 22. This gives you a case where all the host bits are on in the previoussubnet. Because this is the broadcast address, you should back up one more to get thelast host ID.Table 22, Finding the Last Host ID by SubtractionNext Subnet ID 160.16.47.255 10100000 00010000 00110000 00000000Minus 1 00000000 00000000 00000000 00000001Broadcast for Previous Subnet 160.16.47.255 10100000 00010000 00101111 1111111Minus 1 00000000 00000000 00000000 00000001Last Host ID 160.16.47.254 10100000 00010000 00101111 11111110Finding the host IDs becomes very obvious if you look at it this way, notably in the caseof a subnetted class A or B address. You can apply the same math, however, whensubnetting a class C address. In this case, it is not so obvious because the numbers arenot familiar.Take 198.53.202.0, for example, as a network address. You want two subnets. You endup with 198.53.202.64 and 198.53.202.128 as the two subnet IDs (subnet mask255.255.255.192). Following the logic set out previously, the valid hosts are as follows inTable 23:Table 23, Host IDs for a Subnetted Class C AddressSubnet ID Starting Host ID Last Host ID198.53.202.64 198.53.202.65 198.53.202.126198.53.202.128 198.53.202.129 198.53.202.190
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 40 Of 54EZCom IP Routing IntroductionRouting is the primary function of an EZCom IP radio.  The routing scheme implementedin the EZCom IP radio is modeled after the same routing mechanism used on theInternet. In fact the EZCom-IP radio can be used to route private network or Internetinformation.Figure 18 below shows a simplified view of the processing an EZCom-IP radio performswhen it receives network traffic. Packetized data or as we will refer to it throughout thisdiscussion, datagrams can arrive at the EZCom IP layer through either the networkinterface (meaning from the attached Ethernet) or the RF interface (over the air).  Thereis also one other source for datagrams those generated internally by the EZCom kernel,but we will not discussion them in this section.Figure 18, EZCom-IP Routing MechanismICMP UICommandIP input queueIP Send():calculate nexthoproutingtableIP = EZCom IPRFInterfaceNetwork InterfacekernelYesNoRIPFigure 19, EZCom processing done at IP layerConceptually, EZCom IP routing is very simple, an EZCom-IP radio can only receivedatagrams from one of two places, the network interface or the RF interface.  When adatagram is first received it is placed on the input queue and the destination IP address iscompared to the radio’s IP address and the standard IP broadcast address.  If either ofthese match the datagram is forwarded to the radio’s kernel for further processing.  If theIP addresses don’t match, the datagram is moved to the IP, send routine.The send routine then searches the routing table to determine where the datagramshould be sent. We will take a closer look at this process in just a minute. First lets goover the contents of the routing table.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 41 Of 54Table 24, Typical EZCom-IP Radio Routing TableTarget Subnet Mask Next Hop Interface Origin192.168.1.0 255.255.255.0 192.168.1.2 Radio Local192.168.4.12 255.255.255.255 192.168.4.1 RadioEach EZCom-IP radio has a routing table in memory that it searches each time itreceives a datagram to send.  Each entry in the routing table contains the followinginformation:• Destination IP Address.  This can be either a complete host address or a networkaddress. A host address has a nonzero host ID and identifies one particular host,while a network address has a host ID of 0 and identifies all the hosts on thatnetwork.• Subnet Mask. This is the subnet mask implemented on the destination network.This is used to ascertain the net ID and the host ID. If the Destination address isa host address the subnet mask will always be 255.255.255.255.• Next Hop. This is the IP address of a router, or directly connected network.  Anext hop router is either on the attached network or is another EZCom-IP radio,which we can send datagrams to for delivery. The next hop router is typically notthe final destination, but it takes the datagrams we send it and forwards them tothe final destination.• Specification of interface (Ethernet or Radio) the datagram should be passed tofor transmission.• Origin. “The routing table shown in Table 24 is accessed frequently on a busy radio, this couldmean hundreds of times a second but it is updated by the EZCom-IP Explorer programmuch less frequently.  In most systems this will be done once initially when the network isdeployed and may never be updated again unless new hardware is added to the network.On other systems where dynamic routing is implemented this could be as frequent asonce every 30 seconds.When a datagram is sent to the send routine the routing table is searched in the followingorder:• Search the routing table for an entry that matches the complete destination IPaddress (matching network ID and host ID). If found, send the packet to theindicated next-hop router or final destination if it is directly connected.• Search the routing table for an entry that matches just the destination networkID. If found, send the packet to the indicated next-hop router or to the directlyconnected network interface. All of the hosts on a local Ethernet are handledwith a single routing table entry of this type.  This check for a network matchmust take into account the subnet mask.• Search the routing table for an entry labeled “default.”  If found, send thepacket to the indicated next-hop router. This is the Default Gateway entry onthe IP Address Tab. This entry dose not show up on the Routing Tab
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 42 Of 54EZCom IP routing is done on a hop-by-hop basis. As we can see from the informationstored in the routing table, EZCom IP dose not know the complete route to anydestination (except, of course, those destinations that are directly connected via thenetwork or the RF port).  All IP routing provides is the IP address of the next-hop router towhich the datagram is sent. It is assumed that the next-hop router is really “closer” to thedestination.  The process of comparing the destination IP address to EZCom’s own IPaddress and forwarding datagrams in accordance with the information in the routing tableis referred to as the routing mechanism. For more information on IP routing please referto the section titled “Internet Protocol Routing” on page 28 of this manual
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 43 Of 54Indicators and ConnectorsThe following indicators are provided on the face of the EZCom-IP radio.Figure 20, EZCom-IP IndicatorsSignalMin MaxTXRXPowerLinkMode Status• Signal is a series of 10 indicators that represent receive signal strength. Whenilluminated red indicates uncorrelated signal. Green is correlated.• Mode indicates 1 meg/sec or when green 2 meg/sec.• Power when illuminated indicates power is on.• Status TBD• RX when illuminated indicates data is being received via the radio.• Link when illuminated indicates that an active Ethernet connection exists.• TX when illuminated indicates that data is being transmitted via the radio.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 44 Of 54Section3. Grayhill EZCom-IP Explorer ProgramIntroductionThe Grayhill EZCom-IP Explorer is a client side program that can be run on any 32 bitWindows based PC. It is designed to communicate configuration and diagnosticinformation to and from a group of EZCom-IP radios either directly to the local areanetwork or logically attached via the wireless network. The program offers the user averity of configuration and diagnostic tools.ViewsThe programs main window is divided into three main parts;1. The Network View graphically displays all of the EZCom-IP, radios in a network.By selecting a radio icon in this view you are choosing which radio’s settings aredisplayed and which radio you are linked to for editing setup information anddiagnostics.2. The Control View contains a series of tabs that are used to display differentcategories of setup and diagnostic information. By editing the fields on thedifferent tabs you can change many of the radios characteristics. Some of thefields are used to only display specific information. These display only fields canbe identified by their grayed background color.3. The Monitor, which can be used to observe specific communication events.When you first start the Grayhill EZCom-IP Explorer your will see a single icon in theNetwork View. This icon represents the computer that is running the GH Explorerprogram. No radio icons initially appear until you instruct the Explorer program to go outand find links. If you click on the Tools menu and then pick Find Links the Explorer will goout and find any EZCom-IP radios on the local network.Figure 21, EZCom Explorer Window
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 45 Of 54GH Explorer will then add a radio icon to the Network View for each radio it finds on thelocal network.The information in the Control Tab window is associated with the icon selected in theNetwork View. As you click on different icons in the Network View the information in theControl Tab View is updated with the setup values from the object represented by theselected icon. If you select the GH Explorer icon at the top of the window (which isselected by default when you start the program) only the IP address tab is accessible.This is because the GH Explorer icon points to the PC that the program is running on andnot to a radio. When you select a radio icon in the Network View the information in theControl Tab will be downloaded from the radio and displayed in the appropriate tab. Anyinformation that is changed on the Control Tab will cause the setup information in theradio pointed to by the icon in the Network View.As you can see changing setup information in a radio is as simple as selecting whichradio you want to modify from the Network View and then entering the appropriateinformation in the Control Tab view.Menus & Tool BarThere are 5 menu selections across the top of the EZCom Explorer ProgramThe File menu currently only supports the Exit command. Click exit only when you aredone using the Explorer program. Any setup information that has not been uploaded tothe radio by clicking the Update button will be lost when you exit the programThe Edit menu is reserved for future use and is not enabled in this version of theEZCom-IP Explorer.The View menu has to selection choices: a Toolbar and a Status bar item. These areused to turn on and off the Toolbar and the Status respectively. A check mark to the leftof either choice indicates that the option to view that item is enabled. To change the viewoption just select the menu item and it will toggle from off-to-on or on-to-off.The Tools menu has 4 choices: Options, Find Links, Remote Connect, and Disconnect.The Option menu when selected will cause the option dialog box to bedisplayed. Here you can adjust how certain features of the Explorer programoperate.The Find Links menu is used to initiate the search routine for the deviceselected in the Network View. If the Explorer icon is selected in the NetworkView, then the search routine will look for any EZCom radios attached to the localEthernet. If a radio icon is selected the search routine will look for other radiosthat can communicate with the selected radio. If a radio is found withincommunications range an icon for that radio will be added to the Network Viewunder the selected item at the time you clicked the find links menu item. Thesearch routine will also add routes to the routing tables to maintain ongoingcommunications with any radio it finds.The Direct Connect menu item is used to manually connect to a specific radio.To use Direct connect you will need to have prior knowledge of a radios IPaddress. After selecting the Direct Connect menu item you will be prompted toenter the IP address of the radio you would like to connect to. This option isprovide to establish a connection without having to use the Find Links command.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 46 Of 54The Disconnect menu item is used to delete a radio from the Network View.When you select Disconnect you are telling the Explorer program that you nolonger want to communicate with the radio selected in the Network View.Disconnect only effects the radio selected in the Network view and any otherradios that are listed below it. When there are mutable instances of the sameradio in the network view you can use Disconnect to delete the unwantedduplicates.The Help menu has two submenu items EZCom Explorer Help and About EZComExplorer. Neither of which are implemented in this version of the Explorer program.Control TabsThere are six control tabs as shown in Figure 22. Each of these tabs is used to access aspecific type of information or to control a specific type of action associated with aparticular radio. The information on each tab is associated with the object selected in theNetwork View.Figure 22, Control TabsIP Address TabThe IP Address field is used to view or edit a radio’s IP Address. The address ispresented in dotted-decimal notation with each of the four numbers displayedrepresenting one byte of the 32-bit address. With each of the numbersrepresenting a single byte the legal range for each number is between 0 and 255.If you have a private network (not connected to the Internet) then you can setupany addressing scheme you want. On the other hand if you are connected to theInternet without a proxy server or other DHCS then you must conform to theInternet addressing requirements.The Sub Net Mask field is used to distinguish the network ID and host ID fromthe radio’s IP Address. In short the subnet mask is anded with the IP address toyield the network ID. For a detailed explanation of the subnet mask and helpchoosing a subnet mask please see the section titled “Subnetting” on page 35.The Default Gateway field delineates the next hope IP address that is used bythe radio when no route can be found in the routing table for a particular IPaddress. In other words if the radio receives a packet and there is no routinginformation in the routing table for that IP address the radio will send it to thedevice with the IP address from the Default Gateway.The UDP Port field defines the port ID used to communicate with the radiosoperating system. It is a read only field and it can’t be changed directly on the IPAddress tab. The only time you will need to change this field is if other devices onyour network are using the same port number. To change the UDP Port setting,click on the Tools menu and select Options.The Mac Address field is a read only field that displays the hardware address ofthe currently selected radio. This address is factory set and can’t be changed.Each radio has a unique hardware address. You will not typically have to use thisaddress except when you are conduction a link test.The Firmware Revision field displays the revision level of the currently selectedradio. It is important to know the Firmware revisions of your radios whencontacting Grayhill for technical support.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 47 Of 54The Update Button is used to upload any changes you have made on the IPAddress tab to the currently selected radio. Any change that you make on thistab will not take effect until you click on the Update button.Radio TabThe Radio Tab is used to set the operating characteristics for the currently selected radio.There are only three settings that you should ever have to change: the Transmit &Receive Center Frequency, the Modulation type and the Transmit Output Power level.The Transmit & Receive Center Frequency setting controls the radio carrierfrequency. This is analogous with changing the station on your car’s FM radio.There are 85 station settings ranging from 2418 MHz to 2443 MHz in 1MHzincrements. Please note that if you change the carrier frequency you will need tochange it on all of the radios in your network. Radios set on different carrierfrequencies cannot communicate with each other.If you are planning to operate more than one network in the same geographicarea and want them to operate independently you will need to set the carrierfrequencies at least 17 MHz apart from each other this is due to the broadbandnature of the EZCom spread spectrum radio.The Modulation setting controls the type of modulation used to encode yourdata onto the carrier frequency. There are two different choices BPSK, whichstand for Binary Phase Shift Keying and QPSK, which stands for QuadraturePhase Shift keying. There are two factors associated with the difference betweenthe two modulation types. The primary factor is the rate at which data istransferred across the radio link. If you select BPSK the basic data rate will be 1mbps and QPSK is 2 mbps. The other factor is the minimum receive threshold.With QPSK you need 3 dB more receive signal strength to achieve the same linkquality as BPSK.The Transmit Output Power level control is provided so that you can turn downthe radio’s transmitting power. You may want to reduce the output when you areoperating in an indoor environment or when you are operating collocatedindependent networks. You will also have to reduce the output power 1 dB foreach 3 dB of antenna gain you have above 6 dB to remain compliant with theFCC ISM band regulationsRouting TabThe Routing Tab is used to view and/or edit a particular radios routing table. Theinformation in the routing table controls how datagrams are routed throughout thenetwork. The routing table looks like a miniature spreadsheet with each row representingan individual route. The columns of the spreadsheet represent the separate fields thatneed to be filled out for each route. There are five columns: Target, Subnet Mask, NextHop, Interface and Origin.You can’t edit the fields directly inthe spreadsheet. To enter a newroute you will need to click theInsert Button. This will open theAdd Route dialog as shown on theright.To add a new route, enter theDestination IP address first. Thiscan be either a Host address or a Network address. A Host address is the destinationaddress for a specific device. A Network address represents all the devices on a networkor subnet. After you enter a Destination address you will need to enter the Subnet Mask.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 48 Of 54The form of the Subnet Mask is dependent on the type of destination address entered inthe previous step. If the destination address is a host address then the subnet mask willalways be 255.255.255.255. On the other hand if the destination address is a networkaddress the subnet mask will be the mask implemented on the destination network. It isimportant that you use the subnet mask from the destination network and not from thesource network unless of course they are the same.Next enter the Next Hop IP address. This will always be a Host address that identifies arouter that will forward the datagram onto or at least towards it’s final destination. Pleasekeep in mind that routers come in all shapes and sizes, a PC can also act as a router if itforwards datagrams, an EZCom-IP radio is a router as well. The last entry necessary toadd a new route is the selection of an Interface. This is the interface that the datagrambeing routed will be sent out of to the next hop. The EZCom-IP radio only has twointerfaces, the Ethernet port and the radio antenna port. If the next hop router is anotherEZCom-IP radio then the interface will be “Radio” and if the next hop router is anotherrouter on the wired network then the interface will be “Ethernet”. Please note that if youhave two EZCom-IP radios on the same subnet and you want to forward between themyou should use “Ethernet” as the interface. This will reduce the local radio traffic andimprove overall network performance.As the final step click on the OK button and your new route will be displayed in therouting table.If you wish to edit an existing route you will need to first select the route that you want toedit by placing the mouse pointer over any part of the row containing the specific routeand clicking it once. After the row is selected click the delete button. This will remove theroute from the routing table; them click the insert button and proceed as described foradding a new route.Clicking the Delete Button will delete the highlighted route from the routing table of thecurrently selected radio. Please be careful because this operation is immediate you willnot be asked if you really want to delete this item.Statistics TabWhen you select the statistics tab you will initially see both the Session and theCumulative IP statistics for the currently selected radio. Each radio in an EZCom-IPnetwork maintains a set of statistics that can be reviewed to determine the operatingcondition of the radio. The statistics are divided into two categories IP statistics and Linkstatistics. The IP statistics are used to keep track of packet errors and packet throughputinformation. The Link statistics are used to keep track of transmission errors and radiothroughput information. You can switch between the two by clicking on the appropriateoption button on the Statistics Tab.For both types of statistics both session and cumulative information is maintained.Session information is presented in the second column and cumulative information is inthe third column. You can reset either the set if statistics by clicking the Session Rest orCumulative Rest buttons.Diagnostics TabThere are three diagnostic functionsaccessible from the Diagnostics Tab: LinkTest, Continuous Transmit and ReceivedSignal Strength. You can initiate any one ofthese functions by simply clicking on theappropriate button.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 49 Of 54The Link Test can be used to verify the quality of communications between two radios.To use the link test function first select the radio that you want to initiate the link test, fromthe Network view. Then Click on the Link Test button, this will bring up the Link Testdialog as shown below.Now enter the Mac Address of the radio you want to link to and click on the Run Testbutton. You can find the MAC address for any radio in the IP Address tab of EZComExplorer program. Please remember the information in the IP Address Tab is for thecurrently selected radio in the Network View. After clicking the run test button, in the TestResults window you will see an announcement that the test is in progress. During a linktest packets are transmitted every 50 milliseconds. If you multiply the Number of packetsby this interval you can get an idea of howlong the test will take. Using the defaultnumber of packets the test should take100*0.05 or just over a half second.When the Link test is complete you shouldsee the test results in the Test Results dialog.similar to the results shown in Figure 9. If yourLink Test fails, that is you don’t get a largenumber of Successful packets (typically 90%to 100%), please follow the steps listed in the Troubleshooting guide on page 50. Click onthe DONE button to dismiss the Link Quality Test dialog.The Receive Signal Strength monitorThe Continuous Transmit function is used to tell the currently selected radio to begintransmitting a test carrier. This is an advanced testfeature typically only used by trained RF techniciansduring the instillation of a wide area network to makepath loss measurements and other FCC requiredmeasurements. You can select between a narrow bandcarrier or a wideband pseudo noise carrier. You canalso set the transmit duration from 1 second to 24hours.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 50 Of 54Section4Troubleshooting GuideLED Activity BIf you encounter difficulty using and/or installing your EZCom-IP product, the error maybe related to various causes:• Out-of range situation, which prevents the EZCom-IP radio from establishing awireless connection with the network.• Configuration mismatch, which prevents the EZCom-IP radio from establishing awireless connection with the (correct) network.The starting point to troubleshoot problems with your EZCom-IP radio is looking at theLED activity on the radio.Description/Action Color IndicatesPower LED Continuous Green Radio is powered on.TransmitReceive LEDSignalStrengthEthernetLink Continuous Green Radio and Ethernet arecommunicatingNo Ethernet Link indicator.Some possible causes for this problem are:1. One of the devices is not turned on. Make sure both devices are “ON” andappear to be powered up.2. The patch cable is defective; try using a different patch cable.3. One of the devices has a bad Ethernet port: if you have a spare device trysubstituting it.Link Test FailedThe link test is designed to test the radio communications between two radios. If a linktest fails there are many possible reasons. The following steps may help to isolate theproblem.1. On the Radio Tab of the EZCom-IP Explorer program verify that both radios areset on the same carrier frequency, Modulation type and that both are using thesame PN code. If any of these settings are different the two radios will not beable to communicate with each other.2. View the TX LED on the face of the radio that is initiating the link test and verifythat it is periodically flashing. This will confirm the right radio is selected and thatit is indeed trying to link with the remote (or other) radio.3. If you are using an external antenna check that the antenna cable is connectedat both ends and that the connections are at tight. If you have a VSWR metercheck the match of the complete cable and antenna assembly. You should get areflection ratio measurement of less than 2:1 or an efficiency match of better than90%. If your VSWR is greater than 2/1 or efficiency is less than 90% you will
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 51 Of 54need to isolate and correct the mismatch. Typically poor VSWR readings arecaused by poorly installed cable connectors. Some times if there is a Polyphaserused for lightning suppression they can go bad and cause a poor VSWR.4. If the 2 radios are separated by a large distance say a few miles or more tryrunning a link test to a closer in radio or possibly a spare radio if one is available.If the link test works after reducing the separation between the radios look forone of the following.a. If directional antennas are used verify they are aimed correctly. Thehigher the antennas gain the more critical is the alignment.b. Look for obstructions in the line of sight path between the antennas.Obstructions such as trees and buildings can greatly reduce the rang ofyou EZCom-IP radio. If obstructions are noted try raising the antennaheight to get over the obstructions.Ping Failed to RespondWhen Ping fails it indicates that there is no logical connection between two IP Addresses.There are a few things that can be done to isolate the cause of the problem. Due to thevariety of different network configurations it is hard to present a step-by-steptroubleshooting procedure that will work for every instance. Therefore what is presentedbelow is a list of different techniques that can be used to isolate the problem.• First try to Ping the EZCom-IP radios on the local subnet, then try to Ping theradio across the wireless link. This should help to localize the problem.• If you can’t Ping the local radio check to make sure both the host and the radiolink LEDs are illuminated if necessary check to see that both IP addresses arecorrect.• If you can’t Ping the radio across the wireless link you may consider running alink test to verify the radio communications.• It may be necessary to Ping in the opposite direction to localize the problem.• You can also Ping other devices on the network to verify the local host isoperating properly.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 52 Of 54AppendixA. Ethernet (CSMA/CD)The most commonly used medium access control technique for bus/tree and startopologies are carrier-sense multiple access with collision detection (CSMA/CD). Theoriginal baseband version of this technique was developed by Xerox as part of theEthernet LAN. The original broadband version was developed by MITRE as part of itsMITREnet LAN. All of this work formed the basis for the IEEE 802.3 standard.It is easier to understand the operation of CSMA/CD if we look first at some earlierschemes from which CSMA/CD evolved.PrecursorsCSMA/CD and its precursors can be termed random access, or contention, techniques.They are random access in the sense that there is no predictable or scheduled time forany station to transmit; station transmissions are ordered randomly. They exhibitcontention in the sense that stations contend for time on the medium. This is true for bothwired and wireless side of an Ethernet LAN.The earliest of these techniques, known as ALOHA, was developed for packet radionetworks. However, it is applicable to any shared transmission medium. ALOHA, or pureALOHA as it is sometimes called, is a true free-for-all. Whenever a station has a frame tosend, it does so. The station then listens for an amount of time equal to the maximumpossible round-trip propagation delay on the network (twice the time it takes to send aframe between the two most widely separated stations) plus a small fixed time increment.If the station hears an acknowledgment during that time, fine; otherwise, it resends theframe. If the station fails to receive an acknowledgment after repeated transmissions, itgives up. A receiving station determines the correctness of an incoming frame byexamining a framecheck-sequence field. If the frame is valid and if the destinationaddress in the frame header matches the receiver's address, the station immediatelysends an acknowledgment.A frame may be invalid due to noise on the channel or because another stationtransmitted a frame at about the same time. In the latter case, the two frames mayinterfere with each other at the receiver so that neither gets through; this is known as acollision. If a received frame is determined to be invalid, the receiving station simplyignores the frame.ALOHA is as simple as can be, and pays a penalty for it. Because the number ofcollisions rises rapidly with increased load, the maximum utilization of the channel is onlyabout 18%.To improve efficiency, a modification of ALOHA, known as slotted ALOHA, wasdeveloped. In this scheme, time on the channel is organized into uniform slots whosesize equals the frame transmission time. Some central clock or other technique is neededto synchronize all stations. Transmission is permitted to begin only at a slot boundary.Thus, frames that do overlap will do so totally. This increases the maximum utilization ofthe system to about 37%.As you can see both ALOHA and slotted ALOHA exhibit poor utilization. Both fail to takeadvantage of one of the key properties of both radios and wired LANs, which is thatpropagation delay between stations is usually very small compared to frame transmissiontime. Consider the following observations. If the station-to-station propagation time islarge compared to the frame transmission time, then, after a station launches a frame, itwill be a long time before other stations know about it. During that time, one of the otherstations may transmit a frame; the two frames may interfere with each other and neithergets through. Indeed, if the distances are great enough, many stations may begin
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 53 Of 54transmitting, one after the other, and none of their frames get through unscathed.Suppose, however, that the propagation time is small compared to frame transmissiontime. In that case, when a station launches a frame, all the other stations know it almostimmediately. So, if they had any sense, they would not try transmitting until the firststation was done. Collisions would be rare because they would occur only when twostations began to transmit almost simultaneously. Another way to look at it is that a shortdelay time provides the stations with better feedback about the state of the network; thisinformation can be used to improve efficiency.The foregoing observations led to the development of carrier-sense multiple access(CSMA). With CSMA, a station wishing to transmit first listens to the medium todetermine if another transmission is in progress (carrier sense). If the medium is in use,the station must wait. If the medium is idle, the station may transmit. It may happen thattwo or more stations attempt to transmit at about the same time. If this happens, there willbe a collision; the data from both transmissions will be garbled and not receivedsuccessfully. To account for this, a station waits a reasonable amount of time, aftertransmitting, for an acknowledgment, taking into account the maximum round-trippropagation delay, and the fact that the acknowledging station must also contend for thechannel in order to respond. If there is no acknowledgment, the station assumes that acollision has occurred and retransmits.One can see how this strategy would be effective for networks in which the averageframe transmission time is much longer than the propagation time. Collisions can occuronly when more than one user begins transmitting within a short time (the period of thepropagation delay). If a station begins to transmit a frame, and there are no collisionsduring the time it takes for the leading edge of the packet to propagate to the fartheststation, then there will be no collision for this frame because all other stations are nowaware of the transmission.The maximum utilization achievable using CSMA can far exceed that of ALOHA orslotted ALOHA. The maximum utilization depends on the length of the frame and on thepropagation time; the longer the frames or the shorter the propagation time, the higherthe utilization.With CSMA, an algorithm is needed to specify what a station should do if the medium isfound busy. The most common approach, and the one used in IEEE 802.3, is the1- persistent technique. A station wishing to transmit listens to the medium and obeys thefollowing rules:1. If the medium is idle, transmit; otherwise, go to step 2.2. If the medium is busy, continue to listen until the channel is sensed idle; thentransmit immediately.If two or more stations are waiting to transmit, a collision is guaranteed. Things get sortedout only after the collision.Description of CSMA/CDCSMA, although more efficient than ALOHA or slotted ALOHA, still has one glaringinefficiency: When two frames collide, the medium remains unusable for the duration oftransmission of both damaged frames. For long frames, compared to propagation time,the amount of wasted time can be considerable. This waste can be reduced if a stationcontinues to listen to the medium while transmitting. This leads to the following rules forCSMA/CD:1. If the medium is idle, transmit; otherwise, go to step 2.2. If the medium is busy, continue to listen until the channel is idle, and thentransmit immediately.
Grayhill EZCom IP Users Manual Rev A6 1/26/2001Page 54 Of 543. If a collision is detected during transmission, transmit a brief jamming signal toassure that all stations know that there has been a collision and then ceasetransmission.4. After transmitting the jamming signal, wait a random amount of time, and thenattempt to transmit again. (Repeat from step 1.)An important rule followed in most CSMA/CD systems, including the IEEE standard, isthat frames should be long enough to allow collision detection prior to the end oftransmission. If shorter frames are used, then collision detection does not occur, andCSMA/CD exhibits the same performance as the less efficient CSMA protocol.

Navigation menu