Communication Protocols and Internet Architectures Harvard University. Lecture #7. Instructor: Len Evenchik Lecture Agenda

Size: px
Start display at page:

Download "Communication Protocols and Internet Architectures Harvard University. Lecture #7. Instructor: Len Evenchik Lecture Agenda"

Transcription

1 Communication Protocols and Internet Architectures Harvard University Lecture #7 Instructor: Len Evenchik Lecture Agenda Course Logistics Q&A and Topics from Last Week VLANs and Wireless UDP TCP TCP Congestion Control Connection Management One Minute Wrap-Up (C) L. Evenchik 1

2 Course Logistics Q&A and Some Things from Previous Lectures (C) L. Evenchik 2

3 IPv6 Fundamentals IPv6 Addressing RFC 4291 (Feb. 2006) but we ll check IANA for the Details, Section 2.4 The type of an IPv6 address is identified by the high-order bits of the address, as follows: Address type Binary prefix IPv6 notation Unspecified (128 bits) ::/128 Loopback (128 bits) ::1/128 Multicast FF00::/8 Link-Local unicast FE80::/10 Global Unicast (everything else) Global Unicast Addresses The general format for IPv6 Global Unicast addresses is: n bits m bits 128-n-m bits global routing prefix subnet ID interface ID (C) L. Evenchik 3

4 Example of IPv6 Address fas% ifconfig eth0 Link encap:ethernet HWaddr 00:0b:cd:82:51:ea inet addr: Bcast: Mask: inet6 addr: fe80::20b:cdff:fe82:51ea/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets: err:3025 dropp:0 overruns:0 TX packets: err:0 dropp:0 overruns:0 carrier:0. lo Link encap:local Loopback inet addr: Mask: inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:8708 errors:0 dropped:0 overruns:0 frame:0 TX packets:8708 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes: TX bytes: IPv6 RFC 4291 and RFC3581 RFC 4291, Global Unicast Addresses The general format for IPv6 Global Unicast addresses is: n bits m bits 128-n-m bits global routing prefix subnet ID interface ID IANA Assigned Unicast 3 45 bits 16 bits 64 bits global routing subnet ID interface ID IANA Global Routing 3 13bits 16bits 16 bits 16 bits 64 bits RIR AS Customer Subnet ID interface ID (C) L. Evenchik 4

5 VLANs (part 2) Ethernet Switch and VLAN Topology is for /23 Router is for /23 is for /23 Switch Switch Switch Note that endpoints rarely know if they are on a VLAN (C) L. Evenchik 5

6 Simplistic Router and VLAN Topology Router One router port per subnet. is for /23 is for /23 is for /23 Switch Switch Switch Note that endpoints rarely know if they are on a VLAN Router Support for VLAN Tags is for /23 Router is for /23 is for /23 Switch Switch Switch (C) L. Evenchik 6

7 Wireless LANs and VLANs Distribution System and Network Router Access Point Access Point Infrastructure Network (C) L. Evenchik 7

8 Supporting Wireless Access Points (WAP) with VLANs Router WAP is for /23 is for /23 is for /23 is for /23 for all wireless users WAP WAP WAP Manager Note that endpoints rarely know if they are on a VLAN Transport Layer Protocols (C) L. Evenchik 8

9 Transport Service (Source: unknown, but this comes from the days of the 7-layer model) (Source: unknown) SP3: Service, Purpose, Packet and Procedure A Framework for Understanding and Describing Protocols (C) L. Evenchik 9

10 Service SP3 Framework for Understanding Protocols The Service is a description of what the protocol does, not how it is done. This should be a few sentences long. Purpose The Purpose describes the specific functionality that the protocol provides and how it is accomplished. Examples are flow control, error detection, error correction, etc. Packets The Packet layout determines how the various bits and fields within the packet are defined, assembled and used. Procedures The Procedures describe the various packet exchanges and the reason for each exchange. SP3 - Service What type of Service does the protocol provide? The Service is a short description of what the protocol does, not how it is done. For example, a protocol can provide any of the following services Reliable service, including sequenced delivery. This is commonly known as connection-oriented service. (TCP) Reliable service, but not with sequenced delivery. Unreliable service. This is known as connectionless or datagram service. (IP, UDP) Unreliable service, but with the sequenced delivery of messages. (RTP is an example of this.) Are there more? (C) L. Evenchik 10

11 The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the SP3 Purpose What specific functionality does the protocol provide and how does it do it? Addressing Multiplexing Sequencing Error control (two parts to this) Flow control Option negotiation Encryption Fragmentation and reassembly plus others... SP3 Packet What do the fields in the Packet header do? Vers IHL IP Precedence DSCP Identification D M F F Total length Fragment offset Time to live Protocol Header checksum Source address Destination address Options (C) L. Evenchik 11

12 SP3 Procedures What Procedures does a Protocol Use? Connection Establishment or Initialization Data Transfer Connection Release or Disconnect Error Handling (of many different types) User Datagram Protocol (C) L. Evenchik 12

13 UDP Protocol User Datagram Protocol is a simple transport layer protocol UDP provides a Datagram delivery service UDP checksum provides end-to-end error detection and this is very important, but it is also important to note that it violates the concept of strict protocol layering. Multiplexing feature is provided via abstract destination points known as protocol Ports Port assignment mechanisms include use of well-known ports as well as dynamic binding Where would you look to find the listing of port number assignments? UDP Packet Format 32 bits Source Port number UDP Length Destination Port number UDP Checksum Data (Payload) (C) L. Evenchik 13

14 The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, Combined IP/UDP Packet Layout 32 bits Version IHL DSCP Total length Identification D F M F Fragment offset Time to live Protocol Header checksum IP Source address IP Destination address IP Options (if present) UDP Header - first four bytes UDP Header - second four bytes UDP Payload Transmission Control Protocol (TCP) (C) L. Evenchik 14

15 Description of TCP (from RFC 793) TCP provides a reliable securable logical circuit or connection service between pairs of processes.. To do this using less reliable communication systems requires... Basic Data Transfer Connections Reliability Flow Control Multiplexing Precedence and Security Remember, TCP is a communication protocol, not a specific piece of software Source, RFC 793 RFC 4614 (2006) TCP is Complicated and Implementation Specific RFC 4614 was written to provide a roadmap to TCP. It describes the most important RFCs and just as important, it explains what prior work is no longer relevant. It is important to note that it was written in See RFC This roadmap is divided into four main section: Basic (core) Functionality Recommended Enhancements Experimental Extensions Historic Extensions (C) L. Evenchik 15

16 TCP Packet Header (RFC 793, 1981) 32 bits Source port Destination port Sequence number TCP header length U R G A C K Acknowledgement P S H R S T S Y N F I N Window TCP header Checksum Urgent pointer Options (0 or more 32 bit words) Data (payload) TCP Packet Header (Today, 2011) 32 bits Source port Destination port Sequence number Per RFC 3168 TCP header length C W C E R E U R G A C K Acknowledgement P S H R S T S Y N F I N Window TCP header Checksum Urgent pointer Options (0 or more 32 bit words) Data (payload) (C) L. Evenchik 16

17 The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, Combined IP/TCP Packet Layout 32 bits Version IHL Type of service Total length Identification D F M F Fragment offset Time to live Protocol Header checksum IP Source address IP Destination address IP Options (if present) TCP Header - first four bytes TCP Header - other header bytes and option fields (if present) TCP Payload Meaning of Flag Bits in TCP Header URG - urgent pointer field is valid ACK - acknowledgement field is valid PSH - this segment requests a push RST - reset the connection SYN - synchronize sequence numbers FIN - sender has reached end of its byte stream CWR and ECE - provides info on congestion (C) L. Evenchik 17

18 TCP Connection Establishment Send SYN, seq=x Network Receive SYN segment Send SYN seq=y, ACK x+1 Receive SYN + ACK segment Send ACK y+1 Receive ACK segment Events at site 1 Events at site 2 TCP State Transition Diagram, Client/Server - abridged CLOSED SYN / SYN + ACK Passive Open LISTEN Active Open / SYN SYN RCVD Active Close / FIN FIN WAIT 1 (Active Close State) ACK / nothing ESTAB LISHED (Data Transfer State) FIN / ACK SYN SENT SYN + ACK / ACK CLOSE WAIT (Passive Close State) (C) L. Evenchik 18

19 State Transition Diagram State 1 Event / Action State 2 TCP State Transition Diagram, Client Side - abridged CLOSED Active Open / SYN SYN SENT (C) L. Evenchik 19

20 TCP State Transition Diagram, Client Side - abridged CLOSED LISTEN Active Open / SYN SYN RCVD SYN SENT SYN + ACK / ACK Active Close / FIN FIN WAIT 1 (Active Close State) ESTAB LISHED (Data Transfer State) FIN / ACK CLOSE WAIT (Passive Close State) TCP State Transition Diagram- Server Side (abridged) CLOSED Passive Open LISTEN (C) L. Evenchik 20

21 TCP State Transition Diagram- Server Side (abridged) CLOSED Passive Open SYN / SYN ACK LISTEN SYN RCVD ACK / nothing SYN SENT ESTAB LISHED (Data Transfer State) FIN / ACK CLOSE WAIT TCP State Transition Diagram, Client/Server - abridged CLOSED SYN / SYN + ACK Passive Open LISTEN Active Open / SYN SYN RCVD Active Close / FIN FIN WAIT 1 (Active Close State) ACK / nothing ESTAB LISHED (Data Transfer State) FIN / ACK SYN SENT SYN + ACK / ACK CLOSE WAIT (Passive Close State) (C) L. Evenchik 21

22 TCP Sequencing, Flow Control and Segmentation Some General Characteristics A TCP data stream is a sequence of octets (bytes). This is different than the link layer protocols we have studied. TCP uses a sliding window and this window identifies bytes not packets TCP does not know anything about the bytes it is sending. (As you would expect with transport protocols.) The size of the Flow Control window changes dynamically over time Retransmission timeout also changes dynamically (based on RTT) over time TCP Byte Stream Functionality A TCP data stream is a sequence of octets (bytes.) Data is acknowledged at the byte level, not the segment, packet or frame level. TCP connections are full duplex, point-to-point. Data flows simultaneously but independently in each direction. When data is actually sent on the wire is at the discretion of the sending TCP software. When data is given to the application is at the discretion of the receiving TCP. The intent of the PUSH bit is to modify when TCP sends or processes the received data (as we will see.) The receiving application can be told about important data located in the byte stream via the use of the URGENT bit. Note this is a hint not a command. (C) L. Evenchik 22

23 TCP Segmentation TCP sends data in segments. The default segment size is 536 bytes of data (for IPv4.) TCP maximum segment size (MSS) is negotiated during connection setup. TCP decides how big the segments can be, not the application software. The maximum segment size (MSS) is dependent upon the size of MTU (Maximum Transmission Unit.) What does this violate? TCP segments can arrive out of order. Lets think about this for a minute. TCP Flow Control TCP uses a byte oriented, variable size, sliding window. Window Advertisements and Acknowledgements are independent. Sending an ACK = X means that X-1 has been received correctly. Window size changes dynamically. How is this done? A window advertisement of zero is legitimate (but a 1 byte segment can always be sent.) Remember, TCP is full duplex so flow control must be done in both directions simultaneously. In TCP, congestion control is not the same a flow control. More on this in a minute. (C) L. Evenchik 23

24 Meaning of Flag Bits in TCP Header URG - urgent pointer field is valid ACK - acknowledgement field is valid PSH - this segment requests a push RST - reset the connection SYN - synchronize sequence numbers FIN - sender has reached end of its byte stream CWR and ECE - provides info on congestion An Example of TCP Sequencing, Flow Control and Segmentation seq=x, ack=y, win=a data=z bytes seq=y, ack=x+z win=b, data=zz Parameters of note: Sequence number (seq) Acknowledgement (ack) Number of bytes sent (data) Window Advertisement (win) (C) L. Evenchik 24

25 Wrap Around for 32 bit Sequence Number This table shows for example that the 32-bit sequence number wraps around in 6 minutes for a 100BaseT link A TCP option can extend the sequence number Source and Copyright of table is Computer Networks by Davie and Peterson Keeping the Pipe Full This table assumes a 100 msec RTT time The Delay X Bandwidth product dictates the necessary size for the Advertised Window A TCP option allows TCP to increase the advertised window size Source and Copyright of table is Computer Networks by Davie and Peterson (C) L. Evenchik 25

26 TCP Congestion Contol TCP Congestion Contol Goodput Offered Load (C) L. Evenchik 26

27 TCP Congestion Control (1) The assumption today is that networks are reliable (but of course, not perfect) and therefore packets are dropped due to network congestion. A second assumption is that network congestion occurs at routers (or other network devices) due to bursts of traffic. Congestion control and flow control are very different. (A classic drawing represents this with pipes and overflowing buckets of water.) Congestion control and Slow Start were not part of RFC 793. Van Jacobson designed them in TCP Slow Start addresses congestion control, not flow control. TCP Congestion Control (2) Note that Slow Start is a misnomer. It is actually exponential growth. TCP uses four intertwined Congestion Control algorithms and mechanisms (RFC 5681) slow start congestion avoidance fast retransmit fast recovery. TCP Congestion Avoidance is additive-increase, multiplicative-decrease (AIMD) Finally, the first assumption we make for congestion control is that networks are reliable, and this does not apply to wireless networks. What does this mean for real world implementations? (C) L. Evenchik 27

28 TCP Slow Start (1) Timeout (Packet Lost) CWND Number of TCP Segments Sent at One Time Slow Start SSTHRESH Congestion Avoidance Phase Time Parameters of note: Receiver s Advertised Window Size for Flow Control Initial Window (IW) Congestion Window Size (CWND) Slow Start Threshold (SSTHRESH) TCP Slow Start (2) The Slow Start Threshold is decreased after a loss This graph shows one segment sent at start of Slow Start phase Source and Copyright of graph is Computer Networks by Tanenbaum (C) L. Evenchik 28

29 Packet Flow in Slow Start 1 Segment ACK! 2 Segments 4 Segments 8 Segments 16 Segments would be sent! next 8 ACKS would be! sent back! Additive Increase in Congestion Avoidance 4 Segments 5 Segments 6 Segments would be sent next 5 ACKS would be! sent back! (C) L. Evenchik 29

30 TCP Slow Start (3) Fast Recovery and Fast Retransmit Algorithm Fast Retransmit occurs after three (3) duplicate Acks are received Fast Recovery means that CWND is not reduced to IW Source and Copyright of graph is unknown Fast Retransmit via Duplicate ACK Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 X ACK 2 ACK 2 ACK 2 ACK 2 Resend Packet 2 ACK 6 Packet 6 Note that this is a simplified diagram and that TCP Acks and Sequence numbers are based on the byte, not the segment or packet (C) L. Evenchik 30

31 Additional TCP Features TCP has Selective Acknowledgements (SACK) TCP connections can be aborted immediately by RST bit TCP uses a modified three way handshake to close connections TCP ports identify applications at each end of the connection via Port numbers TCP uses both static and dynamic port binding TCP checksum uses the same pseudo header as UDP Some TCP Implementation Details Implementations are known as Tahoe, Reno, Vegas, etc. RTT Calculation (Jacobson 1988) Karn s Algorithm: don t update RTT on retransmitted segments. Nagle s algorithm (1984): addresses problem of sending one byte at a time Silly Window Syndrome (1982) The congestion control RFCs we have talked about The number of segments that are initially sent during Slow Start continues to change (RFC 3390 and recent ID) (C) L. Evenchik 31

32 Connection Management Application Layer Connection Management Network SERVER SERVER How does a system keep track of all of its application layer connections? Can we see the details of these connections? (C) L. Evenchik 32

33 Application Layer Software Schematic Appl. 1 Appl. 2 Appl. 3 (TCP) Appl. 3 (UDP) Appl. 4 TCP IP Layer UDP Ethernet (Layers 1 and 2) TCP Packet Header 32 bits Source port Destination port Sequence number TCP header length U R G A C K Acknowledgement P S H R S T S Y N F I N Window TCP header Checksum Urgent pointer Options (0 or more 32 bit words) Data (payload) (C) L. Evenchik 33

34 Some Well Known TCP Port Numbers 20,21 FTP File transfer 22 SSH Secure Shell 23 Telnet Remote login, not encrypted 25 SMTP 80 HTTP world wide web 110 POP3 Remote access 443 HTTPS Encrypted web traffic 1720 H.323 Video conferencing 5060 SIP Session Initiation Protocol (C) L. Evenchik 34

35 Connection Management Table Network SERVER SERVER Connection ID # netstat -an tcp ESTABLISHED tcp ESTABLISHED tcp ESTABLISHED tcp FIN_WAIT_2 tcp ESTABLISHED tcp ESTABLISHED tcp TIME_WAIT tcp *.80 *.* LISTEN tcp *.443 *.* LISTEN tcp *.22 *.* LISTEN tcp.. (C) L. Evenchik 35

36 One Minute Wrap-Up Please do this Wrap-Up at the end of each lecture. Tear off this page and hand it in as you leave, or fill out the form on the website. Do not sign your name. The form on the website is also anonymous. Please answer three questions: What is your grand Aha for today s class? What concept did you find most confusing in today s class? What questions should I address next time Thank you! (C) L. Evenchik 36

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Transport Layer. Chapter 3.4. Think about

Transport Layer. Chapter 3.4. Think about Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

TCP Performance Management for Dummies

TCP Performance Management for Dummies TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

TCP/IP and the Internet

TCP/IP and the Internet TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).

More information

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology

TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology TCP/IP Networking for Wireless Systems Integrated Communication Systems Group Ilmenau University of Technology Content Internet Protocol Suite Link Layer: Ethernet, PPP, ARP, MAC Addressing Network Layer:

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Introduction to IP networking

Introduction to IP networking DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user Transport service characterization The Transport Layer End-to-End Protocols: UDP and TCP Connection establishment (if connection-oriented) Data transfer Reliable ( TCP) Unreliable / best effort ( UDP)

More information

Understanding Layer 2, 3, and 4 Protocols

Understanding Layer 2, 3, and 4 Protocols 2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Internet Protocols. Background CHAPTER

Internet Protocols. Background CHAPTER CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP. Advanced TCP/IP Overview There is one primary set of protocols that runs networks and the Internet today. In this lesson, you will work with those protocols: the Transmission Control Protocol (TCP) and

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes: Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013 CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson) Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets

IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

Answer FIVE Questions only. Each carries 20 marks.

Answer FIVE Questions only. Each carries 20 marks. Instructions: Answer FIVE Questions only. Each carries 20 marks. Question 1 Answer FOUR parts only. Each carries 5 marks: i) Outline the structure of computer names used by DNS. DNS uses a hierarchical

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Firewall Implementation

Firewall Implementation CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of

More information

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - alvaro@nsrc.org Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands

More information

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software TCP/IP Programming Joel Snyder, Opus1 Geoff Bryant, Process Software Portions Copyright 1996 TGV Software, Inc., Copyright 1996 Process Software Corp. Copyright 1996 Opus1 Course Roadmap Slide 2 NM055

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Higher Layer Protocols: UDP, TCP, ATM, MPLS

Higher Layer Protocols: UDP, TCP, ATM, MPLS Higher Layer Protocols: UDP, TCP, ATM, MPLS Massachusetts Institute of Technology Slide 1 The TCP/IP Protocol Suite Transmission Control Protocol / Internet Protocol Developed by DARPA to connect Universities

More information

Configuring an efficient QoS Map

Configuring an efficient QoS Map Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview

More information

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003 CS155 - Firewalls Simon Cooper CS155 Firewalls 22 May 2003 1 Why Firewalls? Need for the exchange of information; education, business, recreation, social and political Need to do something

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information