Unit 4. Address Resolution. Overview. Description. Unit Table of Contents

Size: px
Start display at page:

Download "Unit 4. Address Resolution. Overview. Description. Unit Table of Contents"

Transcription

1 Unit 4 Address Resolution Overview Description IP addresses are assigned to hosts and are logically independent of their physical address. The network-layer software must depend on the data link layer to deliver data to a host on the same physical network. Therefore, the IP address must be mapped to the physical (MAC) address of the host. The Address Resolution Protocol (ARP) is used to associate known IP addresses to unknown physical hardware, MAC, addresses. A node uses ARP with another node when it determines that the destination address is on a directly attached network. The node can determine if the host is local by comparing the network portion (including the subnet) of its own address with the destination address. Reverse Address Resolution Protocol (RARP) is used to associate a known MAC address to an unknown IP address. As its name indicates, it is simply the reverse of ARP. Unit Table of Contents This unit contains the following lesson: Lesson Pages Length Lesson 4-1: Address Resolution Protocol hours ST A 161

2 Unit 4: Address Resolution Lesson 4-1: Address Resolution Protocol At a Glance ARP, the Address Resolution Protocol, is a member of the TCP/IP protocol suite that is used to translate between logical IP addresses, and physical MAC addresses. It accomplishes this task by building a correspondence table of IP and MAC addresses, using specialized packets, broadcast on the local network. What You Will Learn After completing this lesson, you will be able to do the following: Diagram how the ARP mechanism is used in address resolution. Describe Gratuitous ARP. Describe Proxy ARP. Interpret an ARP Cache. 162 ST A Routing

3 Lesson 4-1: Address Resolution Protocol Tech Talk ARP Cache Another term for ARP Table. A storage mechanism that associates all the IP addresses of the hosts on a network with their MAC addresses. ARP Cache Timeout The time period during which a proxy must rebind or link its addresses. The proxy s hosts are unavailable until the hosts using it as a proxy re-request their addresses. ARP Reply Contains both the IP and MAC addresses for the destination host. Issued in response to the ARP request. ARP Request Contains the IP address of the host computer attempting to send a packet across the network. ARP Table A table that associates all the IP addresses of the hosts on a network with their MAC Addresses. Gratuitous ARP A method for a host to request its own address. Proxy ARP A method that allows hosts on different LANs to successfully transmit packets across an internetworking environment. Hosts may act as a representative for other hosts on different LANs. ST A 163

4 Unit 4: Address Resolution The ARP Mechanism ARP, the Address Resolution Protocol, is different than other protocols in the TCP/IP suite. Instead of being a peer-to-peer protocol, it is the interface between IP, a Layer 3 protocol, and an underlying Layer 2 protocol, which it depends upon for transport. To understand the need for ARP, consider the network illustrated below. Suppose that host A s IP layer has a packet destined for address It transmits this packet across the network. Host A Transmits a Packet to Host C A b1.7f b1.04 B C b Packet 164 ST A Routing

5 Lesson 4-1: Address Resolution Protocol The Ethernet layer encapsulates the IP packet for transport. The IP Packet is Encapsulated in an Ethernet Frame A b1.7f b1.04 B C b Packet Ethernet IP Header? b1.7f Data Preamble Source MAC Address Destination MAC Address IP Source Address IP Destination Address In order for the host to be able to transport the IP packet, it must be able to determine the destination MAC address corresponding to the destination IP address in a packet it is to transport. To do this, it must refer to an ARP table, also known as an ARP cache, that associates the IP addresses and MAC addresses of all the hosts on a network. The ARP Table or Cache IP Address MAC Address b1.7f b b1.52 ST A 165

6 Unit 4: Address Resolution This table relates IP addresses to the corresponding MAC addresses. If the destination IP address is in this table, the host only needs to look up the destination IP address and insert the corresponding MAC address in the Ethernet frame. It can then transmit the packet to the destination. Building The ARP Table In the previous example, the Host A is attempting to transport a packet addressed to , Host C. To do so, it first looks in the ARP table to see if it can find a corresponding MAC address. If the MAC address is not in the table, it constructs an ARP Request. The ARP request contains the IP address of the host computer attempting to send a packet across the network. Ethernet Header ARP Request Ff.ff.ff.ff.ff.ff b1.7f b1.7f Preamble Source MAC Address Source MAC Address Destination MAC Address Destination MAC Address Source IP Address Destination IP Address The ARP Request Format This packet is sent to the Ethernet broadcast address, so all connected hosts receive it. Since the sending host has put its source MAC and IP addresses into the packet, all receiving hosts add an entry for the source to their own ARP tables. 166 ST A Routing

7 Lesson 4-1: Address Resolution Protocol Only one of the hosts (host C in the example) is using the destination IP address. That host constructs an ARP reply and returns it to the requester. The ARP Reply Format Ethernet Header ARP Reply Ff.ff.ff.ff.ff.ff b1.7f b1.7f b Preamble Source MAC Address Source MAC Address Destination MAC Address Destination MAC Address Source IP Address Destination IP Address This ARP reply contains both the IP and MAC addresses for host C. Host A, when it receives the frame, can make the appropriate entries in its ARP table. Host A can now send its original packet to C. Because C created an ARP entry for A, when A made its ARP request, it can reply. Check Your Understanding Briefly describe how an ARP table is built. ST A 167

8 Unit 4: Address Resolution ARP Packet Format ARP is defined to be a universal mechanism for relating addresses between two protocols. The ARP packet illustrated can be encapsulated in a datalink protocol as a broadcast message. ARP Packet Format for IP Over Ethernet Source Destination Hardware Type Protocol Type H S 1 Z P S 1 Z Hardware Address Protocol Address Hardware Address Protocol Address 2 octets 2 octets HS1Z octets 1 octet 1 octet PS1Z octets HS1Z octets PS1Z octets The fields in an ARP packet are: Hardware type: 2 octets This field identifies the specific data-link protocol being used. For Ethernet, the value of this field is 1. Protocol type: 2 octets As the hardware type identified the data-link protocol, this field identifies the network protocol. For IP, the value of this field is Hardware address size: 1 octet This field specifies the length, in octets, of a MAC address in fields 5 and 7 of the ARP packet. For Ethernet, the value of this field is 6 Protocol address size: 1 octet Analogous to the hardware address size, this field specifies the length, in octets, of the protocol addresses in fields 6 and 8 of the ARP packet. Addresses: varying The next four fields are the source hardware, and protocol addresses, and the destination hardware and protocol addresses, respectively. The two hardware addresses are the length specified in the Hardware address size field, and the protocol addresses are the length specified in the Protocol address field. In the case of IP over Ethernet, this corresponds to two 6-octet fields, and two 4-octet fields, for a total of 20 octets. 168 ST A Routing

9 Lesson 4-1: Address Resolution Protocol Gratuitous ARP Gratuitous ARP is used as a method for a host to request its own address. It is usually done when the host first boots up to inform the other hosts on the network of its address, often a new MAC address, and to verify it does not have a duplicate MAC address. In the previous example, Hosts A and C created entries for each other in their respective ARP tables. Suppose, however, that for some reason Host C s addressing information changes. One way this could happen is when a NIC fails and must be replaced. When the NIC is replaced, the new NIC will have a new MAC hardware address. Because Host A still has Host C s old MAC address in its ARP table, it will continue to attempt to send any packet addressed to C using the old MAC address. It will continue to do this until Host A is no longer connected to the network. In order to correct this problem whenever a host changes either its MAC or its logical address, it performs a gratuitous ARP request for its own logical address. This accomplishes two things: If any other host replies, there is a logical address conflict. This usually generates a system warning. Since all hosts update their ARP tables in response to an ARP request, any old MAC addresses for a new host are eliminated. ST A 169

10 Unit 4: Address Resolution Proxy ARP Proxy ARP is a method that allows hosts on different LANs to successfully transmit packets across an internetworking environment. Suppose that Host A has an IP packet addressed to Host D. According to the normal ARP process, it might send a request to all other hosts physically connected to its network, in an attempt to discover a MAC address for Host D. Since Host D is not physically connected to Host A s network, A will receive no reply. Eventually it will conclude that Host D is unreachable, and report an error. Host A Sends an ARP Request A B ARP Request D s address? D E Router C F 170 ST A Routing

11 Lesson 4-1: Address Resolution Protocol Suppose however, that the router has Proxy ARP enabled and it recognizes ARP requests for Host D, located on the other side. Host D can not reply to the ARP request. However, the router, when it sees the ARP request from Host A to Host D, replies with its own MAC address. The Router Replies A D B ARP Reply with Router address Router E C F ST A 171

12 Unit 4: Address Resolution Host A, assuming that it now has Host D s MAC address, makes the corresponding entry in its ARP table, and sends the packet to the router. It is up to the router to recognize that the packet is intended for Host D, and to arrange its delivery. The router is serving as a proxy for Host D. The Router Becomes Host D s Proxy A Packet D B E Router C F Proxy ARP is occasionally used by routers to forward packets between hosts when a router is inserted to subnet a network. The hosts on the network that have not yet been converted (ARP Table has not been updated) to the new subnet would expect to transmit packets directly to all other hosts, even those newly located behind the inserted router. The router must act as a proxy for those hosts newly subnetted. Check Your Understanding Diagram the differences between gratuitous ARP and proxy ARP. 172 ST A Routing

13 Lesson 4-1: Address Resolution Protocol Proxy ARP Versus Bridging A bridge delivers a packet based on its destination MAC address. The source host puts the destination host s MAC address into the frame. Bridges forward the packet to the destination based on that address. Proxy ARP is based, instead, on the binding between a MAC address, and a logical address. Because the two are separate, an intermediate router can proxy for any host to which it knows a path. The proxy can make distant hosts appear to be on the local network. Like transparent bridging, proxy ARP is invisible to the source host. Unlike bridging, however, the source never needs to know a MAC address for the destination. Instead it discovers, dynamically, a proxy that will forward the packet. Proxy ARP has its shortcomings, too. There is no mechanism through which a proxy can perform gratuitous ARP for all hosts for which it is a proxy. If the proxy must re-bind its addresses, the hosts for which it is a proxy will be unavailable until the hosts using it as a proxy re-request their addresses. Commonly this period, the ARP cache timeout, is approximately 20 minutes. Proxy ARP also means that each source host must have a separate entry for each destination to which it sends. It is not uncommon for a large server for the World Wide Web to interact with hundreds of different hosts per minute. Such a server might have to have thousands of different ARP entries. ST A 173

14 Unit 4: Address Resolution Try It Out Examine Your ARP Cache To do this experiment, you will need to refer to the diagram of your classroom network. This should be located in your portfolio. If not, or if your class network has changed, you should diagram the network before beginning this activity. Materials Needed: Classroom Network Diagram Classroom Network Windows 95 PC Any Word Processor (e.g., MS Word) Pen/Pencil and Paper Student Portfolio Record your experiences, results, specifications, and conclusions in your portfolio. Write summary of the lab. It is quite simple to examine the ARP cache on our workstation. 1. Open the MS-DOS Prompt from the Start/Programs menu. 2. At the prompt, type arp a. 3. When the ARP Table appears, answer the following questions: a. Where are the IP addresses? b. Which column contains MAC addresses? 4. Refer to a diagram of your network and decide whether or not there are entries in the table that surprise you. Are there any that you would expect to be there that are not? If so, speculate as to why? 5. If there is an address that you think is missing from the ARP cache, try pinging it, and then look in the table again. Is it there now? What do you think happened? a. To ping, type in the command prompt ping and the IP address of the station you wish to ping. 174 ST A Routing

15 Lesson 4-1: Address Resolution Protocol 6. Are there some IP addresses that you can ping successfully, but that you cannot get to appear in the ARP cache? Can you explain why? 7. Leave your workstation untouched for 30 minutes, and examine the ARP cache again. Can you explain what has happened, and why? Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Individual Summary (on-time delivery) 25 Analysis and synthesis of information 50 Summary organized and in format suitable for reproduction 25 TOTAL 100 ST A 175

16 Unit 4: Address Resolution Stretch Yourself The ARP Game Materials Needed: Windows 95 PC (optional) Any Word Processor (e.g., MS Word) (optional) Pen/Pencil and Paper Devise a team action game for 6-8 students based on the Address Resolution Protocol. Document a simple set of rules and describe their relationship to ARP. Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Simple, but clear set of rules. 25 Creative and enticing game. 50 Accurate relationship to ARP concepts. 25 TOTAL ST A Routing

17 Lesson 4-1: Address Resolution Protocol Network Wizards Hubs and Switches Materials Needed: 2 BayStack 152 Hubs 2 BayStack 153 Hubs 2 Nortel Networks 350T Switches 2 Straight Through Ethernet Cables (Cat. 5 w/ RJ-45 connectors) 2 Windows 95 PCs Any Word Processor (e.g., MS Word) Pen/Pencil and Paper Student Portfolio For this experiment you will need a network configured as shown below: BayStack Hub WS1 WS2 Be sure to use the BayStack 152 Hub for this first experiment. Work in groups of three. Record your experiences, results, speculations, and conclusions in your portfolio. Write a summary of the lab. ST A 177

18 Unit 4: Address Resolution Part One 1. Open the MS-DOS Prompt from the Start/Programs menu on WS1. 2. Ping WS2 using the command ping -t and WS2 s IP address. 3. The -t flag tells ping to keep pinging WS2 until you explicitly stop it, using a Control-C. 4. Start ping running, and verify that there is connectivity between WS1 and WS2. 5. As you watch the ping responses scroll by, speculate about what you think will happen if you unplug WS1's cable from its socket on the hub, and then quickly plug it back in. 6. Try it. Did it do what you expected? 7. Experiment with disconnecting and reconnecting cables in several other places. Is there any place in which unplugging the cable will cause ping to fail irretrievably? Is there a maximum amount of time, after which ping will not restart? 178 ST A Routing

19 Lesson 4-1: Address Resolution Protocol Part Two Now try another scenario. 1. Start ping and quickly reverse the cables from the two different WS1 WS1 BayStack 152 Hub BayStack 152 Hub WS2 Before WS2 After workstations in their hubs, as shown below. 2. Record your observations. 3. Is this behavior what you expected? Part Three Repeat this entire experiment using the BayStack 153 Hub, and then the 350-T Switch. Are the results the same? Explain. Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Group cooperative participation 25 Analysis and synthesis of information 50 Summary organized and documented for portfolio 25 TOTAL 100 ST A 179

20 Unit 4: Address Resolution Summary In this lesson, you learned the following: How the ARP mechanism is used in address resolution. The description of Gratuitous ARP. Description of Proxy ARP. How to interpret an ARP Cache. Review Questions Name Lesson 4-1: Address Resolution Protocol Part A Diagram how ARP creates an ARP Table. Summarize the steps. Part B Describe Gratuitous ARP and the primary reason this form of ARP is so important. Include an example in your description. Part C Describe Proxy ARP and the primary reason this form of ARP is so important. Include an example in your description. 180 ST A Routing

21 Lesson 4-1: Address Resolution Protocol Scoring Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Part A: Diagram how the ARP mechanism is used in address resolution 50 Part B: Describe Gratuitous ARP 25 Part C: Describe Proxy ARP 25 TOTAL 100 Try It Out: Interpret an ARP Cache 100 Stretch Yourself 100 Network Wizards 100 FINAL TOTAL 400 ST A 181

22 Unit 4: Address Resolution Resources Comer, D. E. (1995). Internetworking With TCP/IP: Principles, Protocols, and Architecture 3rd edition, Prentice Hall, Upper Saddle River, New Jersey. Free Soft. (2000). Connected: An Internet Encyclopedia ARP Protocol Overview. Available Online: Perlman, R. (1992). Interconnections: Bridges and Routers, Addison- Wesley Publishing Co.,Reading, MA. Stevens, W. R.(1994). TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley Publishing Co., Reading, MA. 182 ST A Routing

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Lesson 5-3: Border Gateway Protocol

Lesson 5-3: Border Gateway Protocol Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow

More information

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons: Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Workstation ARP. Objective. Background / Preparation

Workstation ARP. Objective. Background / Preparation Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Teldat Router. ARP Proxy

Teldat Router. ARP Proxy Teldat Router ARP Proxy Doc. DM734-I Rev. 10.00 November, 2002 INDEX Chapter 1 Introduction...1 1. ARP Proxy... 2 Chapter 2 Configuration...4 1. ARP Proxy Configuration... 5 1.1. Enabling ARP Proxy...

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Ethernet Local Area Networks (LANS) Two basic ways to cable an 10 Mb/s Ethernet LAN: Bus-style (large Ethernet cable, or thin Ethernet cable)

Ethernet Local Area Networks (LANS) Two basic ways to cable an 10 Mb/s Ethernet LAN: Bus-style (large Ethernet cable, or thin Ethernet cable) Ethernet Local Area Networks (LANS) Two basic ways to cable an 10 Mb/s Ethernet LAN: Bus-style (large Ethernet cable, or thin Ethernet cable) Large Ethernet cable is bulky, uses cable-taps. Smaller cable

More information

This unit contains the following two lessons: Lessons Pages Length Lesson 3-1: Network Layer Addressing 98-136 5 hours

This unit contains the following two lessons: Lessons Pages Length Lesson 3-1: Network Layer Addressing 98-136 5 hours Unit 3 Let s Route Overview Description This unit contains two lessons: The first lesson introduces the format for addressing data that travels across the Internet. The lesson focuses on the underlying

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Lesson 2-3: Ethernet Basics

Lesson 2-3: Ethernet Basics Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

1 crossover cable. the PCs. network

1 crossover cable. the PCs. network King Abdul-Aziz University Faculty of Computing and Information Technology Department of Information Technology Computer Networks CPIT370 Lab#2: Wired Peer to Peer network and star topology using a switch

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Lab 3.1.2 Creating a Logical Network Diagram

Lab 3.1.2 Creating a Logical Network Diagram Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

Introduction to Network Operating Systems

Introduction to Network Operating Systems As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the

More information

Lab - Using IOS CLI with Switch MAC Address Tables

Lab - Using IOS CLI with Switch MAC Address Tables Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

iseries TCP/IP routing and workload balancing

iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Binding IP Addresses To Physical Hardware Addresses

Binding IP Addresses To Physical Hardware Addresses Binding IP Addresses To Physical Hardware Addresses Must use physical addresses to send and receive packets Therefore, must map IP addresses to physical addresses Particular method depends on underlying

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information

Best Practices: Pass-Through w/bypass (Bridge Mode)

Best Practices: Pass-Through w/bypass (Bridge Mode) Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1 Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate

More information

Setting up VPN Access for Remote Diagnostics Support

Setting up VPN Access for Remote Diagnostics Support Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how

More information

Load Balancing ContentKeeper With RadWare

Load Balancing ContentKeeper With RadWare Load Balancing ContentKeeper With RadWare The RadWare Fireproof may be used with ContentKeeper to provide load balanced and redundant Internet content filtering for your network. The RadWare FireProof

More information

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

ccna question and answers

ccna question and answers ccna question and answers 46 Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31,B & D Subnet addresses in this situation are all in

More information

CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series SUBNETTING CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

More information

Visio Enabled Solution: One-Click Switched Network Vision

Visio Enabled Solution: One-Click Switched Network Vision Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

Part A:Background/Preparation

Part A:Background/Preparation Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

Linksys Gateway SPA2100-SU Manual

Linksys Gateway SPA2100-SU Manual Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

EDGE FX Network configuration

EDGE FX Network configuration Page 1 of 16 TITLE: Category: EDGE FX Network configuration GERBER EDGE Document Number: 4280 Supplied by: Gerber Service Last Modified: April 14, 2011 Summary: In order to connect an EDGE FX to your PC

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

Introduction to LAN/WAN. Network Layer (part II)

Introduction to LAN/WAN. Network Layer (part II) Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the

More information

enervista UR Setup Software Quick Connect Instructions:

enervista UR Setup Software Quick Connect Instructions: enervista UR Setup Software Quick Connect Instructions: The user can connect to the UR relay via front serial port or rear Ethernet port using the Quick Connect feature of enervista UR Setup software.

More information

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging

More information

UPS Network Interface. Quick InstallationGuide

UPS Network Interface. Quick InstallationGuide UPS Network Interface Quick InstallationGuide Version 1.1 March 1999 COPYRIGHT Copyright 1999 RINGDALE UK Limited. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11

Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11 Sharing an Internet Connection with SatDirect Plus Table of Contents Contents Section 1: Section 2: Section 3: Introduction... 1 Physical Setup......2 Enabling Internet Connection Sharing on Windows XP

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

Module 1: Reviewing the Suite of TCP/IP Protocols

Module 1: Reviewing the Suite of TCP/IP Protocols Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Capture and analysis of the network traffic with Wireshark

Capture and analysis of the network traffic with Wireshark Capture and analysis of the network traffic with Wireshark Lab Objectives Understanding the purpose of Wireshark Studying configuration settings and capture options of Wireshark Studying Wireshark filters

More information