3 Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks at direct communication between IP hosts on the same LAN segment. Sections 2 and 3 describe how this is affected if the hosts are separated by a MAC Layer Bridge or LAN Switch. The final section looks at communication between hosts that are separated by an IP Router.
4 Section 1: Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router Initially, let me describe the way that IP software makes the decision to transmit an IP datagram directly between two hosts located on the same segment.
5 Sally Harry Here we see two computer users connected by a cable in a local environment. Let s assume that both computers are running IP communication software. Sally is using some form of IP application to send datagrams to Harry.
6 Here are the IP addresses...
7 Here are the IP addresses....and the subnet masks.
8 The IP software in Sally s PC needs to find out if Harry s machine is in the same Broadcast Domain. A Broadcast Domain is simply the term that describes the extent of spread of a MAC level broadcast. In other words, if two hosts are located in the same Broadcast Domain, they will hear broadcast and multicast traffic transmitted by each other. Transmissions that occur within a Broadcast Domain are called intranetwork. Transmissions between Broadcast Domains are called internetwork.
9 To determine if Harry is in the same Broadcast Domain, Sally s software performs this comparison...
10 Source: ( ) AND () = To determine if Harry is in the same Broadcast Domain, Sally s software performs this comparison... She takes her own IP address, and performs a binary AND with her subnet mask...
11 Source: ( ) AND () = Destination: ( ) AND () = To determine if Harry is in the same Broadcast Domain, Sally s software performs this comparison... She takes her own IP address, and performs a binary AND with her subnet mask......then she takes Harry s IP address and performs a binary AND with her own subnet mask (Sally has no way to find out what Harry s subnet mask is).
12 Source: ( ) AND () = Destination: ( ) AND () = The resulting two numbers are identical. This tells Sally that she s in the same Broadcast Domain as Harry.
13 Source: ( ) AND () = Destination: ( ) AND () = To transmit to a host in the same Broadcast Domain, Sally needs to determine the MAC address (since she only knows the IP address). To do this, she uses the Address Resolution Protocol (ARP), which is described in another tutorial.
14 Communication Between Hosts Section 2: Through a MAC Bridge Through a LAN Switch Through a Router Let s see if the basic, direct transmission process changes if we separate the hosts using a MAC Layer Bridge.
15 Sally Harry Bridge In this modified example, a MAC-Layer Transparent Bridge connects two LAN segments. Harry and Sally are attached to different segments. How does this affect the IP Transmission process?
16 Bridge In fact, Harry and Sally have the same IP addresses and subnet masks as if they were connected to the same LAN segment. The Bridge is essentially transparent to the IP communication.
17 Bridge ARP The side effect of this transparent operation is that broadcast traffic (such as ARP) must be allowed to pass through the bridge. Any attempt to filter ARP traffic results in a loss of communication between hosts.
18 Broadcast Domain Bridge Once again, we can say that these two hosts are within the same Broadcast Domain, even though they are separated by a Transparent Bridge.
19 Communication Between Hosts Through a MAC Bridge Section 3: Through a LAN Switch Through a Router LAN Switches are an interesting new connectivity tool. How do they effect the IP communication process?
20 Switch In this diagram we show Harry and Sally are both connected to the same LAN Switch. Switches are multiport MAC Layer Bridges that offer dedicated LAN bandwidth to each port. Typical workgroup switches offer 8, 12, 16, 24 or 64 connections to a single bridging unit.
21 Switch ARP Hosts that are attached to the same Switch must have the same Network ID and the same subnet mask in order to communicate. A standard ARP transaction is used to transfer traffic from one host to the other.
22 Switch Switch Of course, Harry and Sally are not necessarily connected to the same switch. However, inter-switch connections are usually just extensions of the Broadcast Domain, with a simple transfer of the Learning Bridge address tables.
23 Switch ARP Switch An extended switch network is completely transparent to the IP Transmission process, hosts simply ARP directly for the Destination IP address.
24 To transmit to a host that is in the same Broadcast Domain, IP software will ARP directly for the destination host IP address. This simple rule summarises the basic operation of the IP Transmission algorithm for hosts on the same LAN segment, and for LAN segments connected by bridges or switches.
25 ARP ARP ARP ARP Switch Switch One of the side effects of switch designs is that ARP (and other broadcast traffic) must be flooded throughout the full extent of the switched network. Each of these broadcasts will interrupt the host that it reaches, and will waste valuable network bandwidth. To allow all of these Broadcast Domain networks to scale, we must turn to Router technology.
26 Communication Between Hosts Through a MAC Bridge Through a LAN Switch Section 4: Through a Router
27 Sally Harry Router In this diagram I show Harry and Sally connected via an IP Router.
28 Router The IP addresses we have been using so far will not work correctly when Harry and Sally are connected through a router.
29 Router ARP The first reason for this is that the Router must not forward broadcast traffic. This means that the ARP request sent out by Sally will never be received by Harry.
30 Router The second problem is that the router ports must be configured with IP addresses. As you can see, in this addressing scheme both ports have the same Network ID (highlighted in red). Internally, the Routing Table would not be able to differentiate between these ports.
31 Router This diagram shows a modified IP addressing scheme. As you can see, the Network IDs on the left hand side ( ) are different from those on the right hand side ( ). All the Network IDs are highlighted in red.
32 Router Source: ( ) AND () = Destination: ( ) AND () = When Sally s IP software makes the same comparison that I described earlier, there is now a difference between the resulting numbers. Sally s software has determined that Harry is located in a different Broadcast Domain. To communicate between one Broadcast Domain and another, IP hosts must use an IP Router.
33 Router Broadcast Domain #1 Broadcast Domain #2 Sally s software needs to know the IP address of a router that is located in the same Broadcast Domain. There are several ways the software can find out this address. Let s just assume for the moment that the address is known The router that an IP host uses to transmit IP datagrams out of the Broadcast Domain is called the Default Router. (NOTE: The older term Default Gateway is still used by some IP veterans)
34 ARP Router Broadcast Domain #1 Broadcast Domain #2 Sally s software performs an ARP for the Default Router address. By definition, this address must be in the same Broadcast Domain. While her software is waiting for the ARP response, the IP traffic (shown as the blue rectangle) is queued.
35 Router Broadcast Domain #1 Broadcast Domain #2 Once the ARP request is resolved, Sally sends the traffic destined for Harry to the Default Router.
36 Router ARP Broadcast Domain #1 Broadcast Domain #2 The router examines the datagrams to see if the destination IP address is known. The procedure used by the router is described in another tutorial. In this case, the router knows that Harry s LAN segment is directly attached. The router sends out an ARP request to find out Harry s MAC address. The IP address for Harry is, of course, contained as the Destination Address in the IP datagrams. The router queues the traffic while awaiting an ARP response.
37 Router Broadcast Domain #1 Broadcast Domain #2 Once the ARP is resolved, the router sends the traffic to Harry.
38 To transmit to a host that is in the same Broadcast Domain, IP software will ARP directly for the destination host IP address. To transmit to a host that is in a different Broadcast Domain, IP software will ARP for the default router IP address. So here are the two Golden Rules used by host software.
39 The End This concludes the tutorial. If you aren t viewing this on the FORE Systems Web Site, then you can become a member of the ATM Academy free of charge and have access to many more of these tutorials. You can find details at:
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
Application Description Firewall in front of LAN Different Servers located behind Firewall Firewall to be accessible from Internet Load Balancer to be installed in a TRANSPARENT MODE between Firewall and
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
(Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on
ASIST Administração de Sistemas Aula 1 9 de Outubro de 2006 Alexandre Bragança Bibliografia: IBM Redbook: TCP/IP Tutorial and Technical Overview, Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke
Knowledgebase Solution Goal Enable coexistence of a 3 rd -party VPN / Firewall with an EdgeMarc appliance. Describe characteristics and tradeoffs of different topologies. Provide configuration information
CHAPTER 2 LITERATURE REVIEW 2.1 Routing Process Routers are amongst the most crucial components of the internet, as each bit of information on the internet passes through many routers . Routing is the
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe
coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
ECE 358: Computer Networks Solutions to Homework #4 Chapter 4 - The Network Layer P 4. Consider the network below. a. Suppose that this network is a datagram network. Show the forwarding table in router
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
Lab 7.1.9b Introduction to Fluke Protocol Inspector DCE SanJose1 S0/0 S0/0 SanJose2 #1 #2 Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 188.8.131.52 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and
Appendix A Protocols The LAN environment of the networks application focuses on modeling broadcast network architectures within a single autonomous system (or routing domain), and therefore its protocol
The Benefits of Layer 3 Routing at the Network Edge Peter McNeil Product Marketing Manager L-com Global Connectivity Abstract This white paper covers where and when to employ Layer 3 routing at the edge
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Module 6 Internetworking Lesson 2 Internet Protocol (IP) Specific Instructional Objectives At the end of this lesson, the students will be able to: Explain the relationship between TCP/IP and OSI model
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) Temario This new assoicate level course has been designed to introduce delegates to the three primary technologies that are used in the Cisco Data Center.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
HP Switches Controlling Network Traffic Hewlett-Packard switches offer an array of features designed to provide increased network performance with a minimum of complication and administration. Among features
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (email@example.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (firstname.lastname@example.org) Senior Architect, Limelight
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
LAN interconnection Telecommunication s Group email@example.com http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
VLSM & IP ADDRESSING EXAMPLE QUESTIONS with answers; 1 Given the network address of 184.108.40.206 and the network mask of 255.255.0.0 Would the two stations with addresses 220.127.116.11/16 and 18.104.22.168/16
WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.
TCP/IP Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA September 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks or
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
Networking Semester 1 Final After Study Guide The following have been found to be answered wrong by a majority of the class. The drag & drop questions are not partial credit questions. 1. Where do switches
CS 640: Introduction to Computer Networks Aditya Akella Lecture 7 - IP: Addressing and Forwarding From the previous lecture We will cover spanning tree from the last lecture 2 Spanning Tree Bridges More
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the