Example Data Link Protocols
|
|
- Thomas Johns
- 7 years ago
- Views:
Transcription
1 Example Data Link Protocols Savera Tanwir Bit-Oriented & Character-Oriented Protocols Bit Oriented Protocol Basic unit: Bit Frame length is not a multiple of character size Example: HDLC (High-level Data Link Control) Character Oriented Protocol Basic unit: character Frame length is a multiple of character size Example: PPP
2 HDLC High Level Data-link Control ISO Bit-oriented data link layer protocol Provides both connectionless and connection-oriented services to Network Layer Can be used for point-point as well as point-multipoint (usually for wireless) connections Framing HDLC can operate on both synchronous & asynchronous links Each frame begins and ends with a frame delimiter bitpattern When no frames are being transmitted on a synchronous link, the frame delimiter is continuously transmitted It generates a continuous bit pattern used by modems to train and synchronize their clocks Bit-stuffing is used to avoid the flag pattern from occurring in the data
3 Primary terminal Types of Stations Responsible for operation control over the link It issues the frames which are called commands Secondary terminal operates under the control of the primary Frames issues, are responses only Primary is linked with secondaries by multiple logical links Combined terminal Has the features of both primary and secondary terminals It issues both commands and responses High-Level Data Link Control Address Field Contains address of the Slave/Secondary station Control Field Used for Seq #, ACKs and other control features etc. Data Field Variable length, but has an upper limit depending on the network Checksum Field CRC-16 of Address, Control and Data fields (x 16 + x 12 + x 5 + 1) Minimum frame contains three fields and total 32 bits, excluding the flags on either side
4 Frame Types Three kinds of frames in HDLC Information Frames To transport user data (both normal data & piggybacked control data) Supervisory Frames To transport control data only used whenever piggybacking is impossible or inappropriate Unnumbered Frames To transport link management and control information High-Level Data Link Control (2) Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame.
5 I-Frame Format Seq Field Three bits to denote the seq # of the frame Poll/Final Flag It is used to signal which side is talking When a primary station has finished transmitting a series of frames, it sets the Poll bit to obtain a response from a secondary station, thus giving control to the secondary station At this time the secondary station may reply to the primary station When the secondary station finishes transmitting its frames, it sets the Final bit and control returns to the primary station Next Field Three bits to denote the seq # of the piggybacked +ve ACK S-Frame Format Type Field Used to distinguish the 4 types of S-Frames Receive Ready (RR) 00 +ve ACK and cancels a previous RNR Receive Not Ready (RNR) 10 +ve ACK plus receiver cannot receive more I-frames Reject (REJ) 01 Signals NAK for Go-Back-N protocol Selective Reject (SREJ) 11 Signals NAK for Selective Repeat protocol Next Field Three bits to denote the Seq # of the ACK or NAK
6 U-Frame Format First 2 bits are for identification The 5 bits of Type and Modifier fields are used in combination to indicate the U-Frame type Command/response SNRM SNRME SABM SABME UI UA DISC FRMR Meaning Set normal response mode Set normal response mode (extended) Set asynchronous balanced mode Set asynchronous balanced mode (extended) Unnumbered information Unnumbered acknowledgment Disconnect Frame reject HDLC Modes of Operation Three modes of operation according to the strength of Primary/Slave relationship 1. Normal Response Mode (NRM) Primary station initiates the session and full polling is used for all frame transmissions The P/F Flag is used in this mode only Signified by the SNRM(E) frame 2. Asynchronous Response Mode (ARM) Slave terminals may transmit without permission from the Primary terminal However, the primary terminal still retains responsibility for line initialization, error recovery, and logical disconnect 3. Asynchronous Balanced Mode (ABM) Either station may initiate the transmission and send frames at any time Signified by the SABM(E) frame
7 The Data Link Layer in the Internet A home personal computer acting as an internet host. PPP Point to Point Protocol RFCs 1661, 1662, 1663 More of a protocol suite than a particular protocol PPP is a connection-oriented protocol Character-oriented with byte-stuffing Can operate in half-duplex or full-duplex mode Designed to carry IP traffic but is general enough to allow any type of network layer datagram to be sent over a PPP connection Frames are sent and received in the same order Doesn t provide reliable data transfer using sequence numbers and acknowledgments as the default Reliable data transfer can be requested as an option One of the most popular Layer 2 WAN technologies in the networking world, esp. for dial-up access An encapsulated form of PPP, called PPP over Ethernet (PPPoE), is commonly used with DSL Internet service
8 PPP Advantages and Benefits 1. Specification of the encapsulated protocol, to allow multiple Layer 3 protocols to be multiplexed on a single link 2. Error detection for each transmitted frame through the use of a CRC code in each frame header 3. A robust mechanism for negotiating link parameters, including the maximum frame size permitted PPP Advantages and Benefits 4. A method for testing links before datagram transmission takes place, and monitoring link quality 5. Support for authentication of the connection using multiple authentication protocols 6. Support for additional optional features, including compression, encryption and link aggregation (allowing two devices to use multiple physical links as if they were a single, higher-performance link)
9 PPP Components The PPP standard itself describes three main components of PPP: 1. PPP Encapsulation Method 2. Link Control Protocol (LCP) 3. Network Control Protocols (NCPs) PPP Encapsulation The primary job of PPP is to take higher-layer messages such as IP datagrams and encapsulate them for transmission over the underlying physical layer link PPP defines a special frame format for encapsulating data for transmission, based on the framing used in the HDLC protocol PPP frame has been specially designed to be small in size and contain only simple fields, to maximize bandwidth efficiency and speed in processing
10 Link Control Protocol (LCP) LCP is responsible for setting up, maintaining, testing, negotiating and terminating the data-link connection between devices Optional support protocols Authentication Protocols PAP, CHAP etc. PPP Compression Control Protocol (CCP) allows compression of PPP data PPP Encryption Control Protocol (ECP) enables datagrams to be encrypted for security PPP Multilink Protocol (PPP MP) allows a single PPP link to be operated over multiple physical links Network Control Protocols (NCPs) PPP supports the encapsulation of many different Layer 3 protocol packets After the general link setup is completed with LCP, control is passed to the Network Control Protocol (NCP) specific to the Layer 3 protocol being carried on the PPP link For example, when IP is carried over PPP the NCP used is the PPP IP Control Protocol (IPCP) Other NCPs are defined for supporting the IPX protocol, the NetBIOS Frames (NBF) protocol, and so forth
11 Connection Establishment A host machine (PC) calling ISP for internet connectivity 1. PC calls ISP s Access Server/Router via modem 2. AS s modem answers the phone and a physical connection is established 3. PC sends a series of LCP packets in one or more PPP frame payload 4. Responses to establish PPP parameters Time Connection Establishment & Data Transfer Once PPP parameters have been agreed upon 5. A series of NCP packets sent to configure network layer (e.g., IP address request in TCP/IP suite) 6. ISP dynamically assigns IP address 7. PC is now a proper host on the Internet and can send and receive IP packets Time 8. Transmission and reception of IP packets (encapsulated in PPP frame) takes place
12 Connection Release When data transfer is over 1. NCP tears down internet connectivity and frees IP address 2. LCP shuts down data link layer connection 3. Modem hangs up the phone to release physical line Time Line Up & Down phases
13 Frame Format of PPP Control field Controls services offered to the network layer Protocol field Kind of packet in the payload e.g. LCP, NCP, IP, IPX, AppleTalk etc. 0 Refers to Network layer protocols like IP, IPX etc. 1 Refers to negotiation protocols e.g., LCP, NCP Payload field Variable length, up to some max. size negotiated by LCP at setup time Default is 1500 bytes CRC Checksum
14 LCP Overview LCP is used to negotiate data link protocol options during ESTABLISH phase Deals with the way for the initialization process to make a proposal and for the responding process to accept or reject it Allows testing of line quality Network Layer protocol configuration negotiation (NCP comes in here) Handles connection termination Encapsulated LCP frame For LCP, value of Protocol field is or 0xC021 Code Defines type of LCP frame ID To match a request with a corresponding reply Length Defines the length of entire frame Information Extra information needed for some frames
15 LCP frame types 11 types defined in RFC 1661 LCP Information field Contains options that are to be negotiated 1. Maximum-Receive-Unit (MRU) The maximum size datagram it wants the link to be able to carry 2. Authentication-Protocol Indicate the type of authentication protocol it wishes to use (if any) 3. Quality-Protocol To enable quality monitoring on the link and what protocol to use (if any) 4. Magic-Number Used to detect looped back links or other anomalies in the connection 5. Protocol-Field-Compression To specify use of compressed (8 bit) Protocol fields in PPP data frames instead of the normal 16 bit Protocol field 6. Address-and-Control-Field-Compression (ACFC) Used to compress the Address and Control fields, again for bandwidth savings
16 Authentication Protocols Password Authentication Protocol (PAP) A simple authentication protocol with a two-step process
17 Challenge Handshake Authentication Protocol (CHAP) It is a three-way hand-shaking authentication protocol that provides more security than PAP Password is kept secret and never sent online Network Control Protocol (NCP) Is a set of control protocols for negotiation at the network layer Each is specific to some network layer protocol and allows protocol-specific configuration requests to be made For example dynamic address assignment of IP address Each of the common network layer technologies has a PPP NCP defined for it in a separate RFC The most common ones are:- The PPP Internet Protocol Control Protocol (IPCP) The PPP Internetworking Packet Exchange Control Protocol (IPXCP) The PPP NetBIOS Frames Control Protocol (NBFCP) Te PPP IP Version 6 Control Protocol (IPv6CP)
18 Acknowledgements Ali Sajjad s lecture slides
Data Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationSLIP and PPP. Gursharan Singh Tatla. mailme@gursharansingh.in www.eazynotes.com. 1 www.eazynotes.com
SLIP and PPP Gursharan Singh Tatla mailme@gursharansingh.in 1 Data Link Layer in Internet We know that Internet consists of individual systems that are connected to each other. Basically, it is wide are
More informationPPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for
PPP Concept 1 What is PPP? Recall that HDLC is the default serial encapsulation method when you connect two Cisco routers. With an added protocol type field, the Cisco version of HDLC is proprietary. Thus,
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationPPP (Point-to-Point Protocol)
PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationQuectel Cellular Engine
Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General
More informationChapter 14 Point-to-Point Protocol (PPP)
Chapter 14 Point-to-Point Protocol (PPP) Introduction... 14-3 The Point-to-Point Protocol... 14-3 Encapsulation... 14-3 Control Protocols... 14-5 LCP Options... 14-6 Configuring PPP... 14-7 Link Quality
More informationChapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
More informationApplication Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
More informationLLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes
Sicherungsebene Layer 2: Division into two Parts Logical Link Control (LLC) (Layer 2b) Organization of the data to be sent into frames Guarantee (if possible) an error free transmission between neighboring
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationOSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture
OSI Model 7 6 5 4 3 2 1 Application Presentation Session Transport Network Data Link Physical Protocols Define a set of rules for communication. Specify the meaning and format of messages Define exchange
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationApplied Data Communication Lecture 14
Applied Data Communication Lecture 14 Character oriented Data Link Character-oriented data link control Asynchronous Synchronous Kristjan Sillmann reaalajasüsteemide õppetool TTÜ automaatikainstituut character-oriented
More informationAX.25 Link Access Protocol for Amateur Packet Radio
AX.25 Link Access Protocol for Amateur Packet Radio Version 2.2 Revision: July 1998 T A P R AX.25 Link Access Protocol for Amateur Packet Radio i Copyright (c) 1997 by Tucson Amateur Packet Radio Corporation
More informationPoint-to-Point Connections
CHAPTER 3 Point-to-Point Connections Objectives Upon completion of this chapter What are the fundamentals of point-to-point serial communications across a WAN? How do you configure HDLC encapsulation on
More informationOther VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
More informationConfiguring Asynchronous SLIP and PPP
Configuring Asynchronous SLIP and PPP This chapter describes how to configure asynchronous Serial Line Internet Protocol (SLIP) and PPP. It includes the following main sections: Asynchronous SLIP and PPP
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationNetwork Security. Chapter 10 Security Protocols of the Data Link Layer
Network Security Chapter 10 Security Protocols of the Data Link Layer! IEEE 802.1x! Point-to-Point Protocol (PPP)! Point-to-Point Tunneling Protocol (PPTP)! Layer 2 Tunneling Protocol (L2TP)! Virtual Private
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationDSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
More informationCS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks
CS 393/682 Network Security Nasir Memon Polytechnic University Module 7 Virtual Private Networks Course Logistics Midterm next week. Old exams posted Brief review at end of this module HW 4 assigned, due
More informationOverview of Dial Interfaces, Controllers, and Lines
Overview of Dial Interfaces, Controllers, and Lines This chapter describes the different types of software constructs, interfaces, controllers, channels, and lines that are used for dial-up remote access.
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationDSL Forum Technical Report TR-045. PPP Static Interoperability Testing
DSL Forum Technical Report TR-045 (Formerly WT-052v8) PPP Static Interoperability Testing March 2002 Abstract: This document addresses static interoperability testing for the higher protocol layers running
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationERserver. iseries. Remote Access Services: PPP connections
ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.
More informationConfiguring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
More informationIntroduction to WAN Protocols
2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to WAN Protocols Session: 2 1 Technology Assumptions Basic Understanding of the OSI Reference Model Basic understanding of routing and switching.
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationThe BANDIT Device in the Network
encor! enetworks TM Version A.1, March 2010 2013 Encore Networks, Inc. All rights reserved. The BANDIT Device in the Network The BANDIT II and the BANDIT III, ROHS-compliant routers in the family of BANDIT
More informationModel 2120 Single Port RS-232 Terminal Server Frequently Asked Questions
Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationQuectel Cellular Engine
Cellular Engine GPRS Startup User Guide GPRS_Startup_UGD_V1.01 Document Title GPRS Startup User Guide Version 1.01 Date 2009-11-16 Status Document Control ID Release GPRS_Startup_UGD_V1.01 General Notes
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationDSL Forum Technical Report TR-044
DSL Forum Technical Report TR-044 Auto-Configuration for Basic Internet (IP-based) Services December 2001 Abstract: This document describes the procedures recommended to automatically configure connections
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationETSI TS 127 010 V4.2.0 (2002-03)
TS 127 010 V4.2.0 (2002-03) Technical Specification Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); Terminal Equipment to Mobile Station
More informationCCNP2 - Implementing Secure Converged Wide-area Networks v5.0
2.6.11 - Configuring a DSL ATM Interface Figures and show the steps you use to configure a DSL ATM interface. Use the dsl operating-mode auto interface configuration command to specify that the router
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationInternet Access Setup
Internet Access Setup Introduction In the Quick Setup group, you can configure the router to access the Internet with differnet modes (e.g. PPPoE, PPTP or Dynamic/Static IP). For most users, Internet access
More informationWANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.
WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationTransport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationWAN Technologies and Components
C H A P T E R 1 WAN Technologies and Components Over the last several years, web-based applications, wireless devices, and virtual private networking (VPN) have changed our expectations about computer
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationThis chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections:
encor! enetworks TM Version A, September 2010 2010 Encore Networks, Inc. All rights reserved. SDLC Protocol Configuration This chapter discusses Synchronous Data Link Control (SDLC) protocols that you
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationConfiguring T1 and E1 WAN Interfaces
Configuration Guide 5991-3823 December 2005 Configuring T1 and E1 WAN Interfaces This configuration guide explains the processes for configuring your Secure Router Operating System (SROS) T1/E1 product
More informationPost-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationSRX 210 Services Gateway T1 Interface Configuration
SRX 210 Services Gateway T1 Interface Configuration To configure a T1 interface: 1. Select Configuration > Quick Configuration > Interfaces if the Interfaces Quick Configuration page is not displayed.
More informationPrestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
More informationESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION
PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION 2.1 CHARACTER STRUCTURE 2.2 THE CHARACTER SET 2.3 CONTROL CHARACTERS 2.3.1 Transmission control
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationVirtual Private Network and Remote Access Setup
CHAPTER 10 Virtual Private Network and Remote Access Setup 10.1 Introduction A Virtual Private Network (VPN) is the extension of a private network that encompasses links across shared or public networks
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationRaj Jain. The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at:
IP Over SONET The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at: http://www.cis.ohio-state.edu/~jain/cis788-99/h_bipsn.htm 1 Overview IP over SONET:
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationNotes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
More informationDesigning SDLC, SDLLC, and QLLC Internetworks
CHAPTER 5 Designing SDLC, SDLLC, and QLLC Internetworks This chapter addresses some of the special requirements for implementing routing technology within IBM System Network Architecture (SNA) environments.
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationModule 10: Supporting Remote Users
Module 10: Supporting Remote Users Contents Overview 1 Establishing Remote Access Connections 2 Connecting to Virtual Private Networks 13 Configuring Inbound Connections 17 Configuring Authentication Protocols
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationConnecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP)
Order this document by AN2120/D AN2120 Connecting an M68HC08 Family Microcontroller to an Internet Service Provider (ISP) Using the Point-to-Point Protocol (PPP) By Rene Trenado SPS Latin America Tijuana,
More informationInternet Access Setup
CHAPTER 3 Internet Access Setup 3.1 Introduction In the Quick Setup group, you can configure the router to access the Internet with different modes (e.g. PPPoE, PPTP or Dynamic/Static IP). For most users,
More informationWireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationLeased Line PPP Connections Between IOS and HP Routers
Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected
More informationLinksys Gateway SPA2100-SU Manual
Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your
More informationADSL MODEM. User Manual V1.0
ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...
More informationBroadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1
Technical Report TR-012 Broadband Service Architecture for Access to Legacy Data s over ADSL Issue 1 June 1998 Abstract: This Technical Report specifies an interoperable end-to-end architecture to support
More informationConfiguring Demand Routing for Primary ISDN Modules
8 Configuring Demand Routing for Primary ISDN Modules Contents Overview of ISDN Connections................................... 8-4 Elements of an ISDN Connection.............................. 8-5 The Local
More informationIP Tunneling and VPNs
IP Tunneling and VPNs Overview Objectives The purpose of this module is to explain Virtual Private Network (VPN) concepts and to overview various L2 and L3 tunneling techniques that allow for implementation
More informationIntroduction to WAN Technologies
CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various
More information920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationSetup The Setup screen is the first screen you will see when accessing the Gateway. Most users will be able to configure the Gateway and get it working properly using only the settings on this screen.
More information