Training Course on Network Administration
|
|
- Kory Stokes
- 8 years ago
- Views:
Transcription
1 Training Course on Network Administration 03-07, March 2014 National Centre for Physics Presentation_ID 1
2 Course Outline Day-1 Exploring Networking world. Network Communication Models. OSI and TCP/IP Architecture. Application Layer Transport Layer Day-2 Network Layer IP addressing and Planning Data Link Layer Day-3 Switched Networks VLANs Routing Inter-VLAN Routing Day-4 Dynamic Routing RIP OSPF Day-5 Access Control Lists Network Address Translation Network Monitoring Presentation_ID 2
3 About Course Theoretical portion of this course is customized version of Cisco curriculum, where many different topics are added. First two days will cover the Fundamental concepts of Networking, which will be mostly theoretical. Remaining Three days will include lectures along with hand on labs to give practical experience. Keep it interactive to get maximum out of it. Presentation_ID 3
4 Exploring the Network Network Basics Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
5 Interconnecting our Lives Networks in Our Past and Daily Lives Presentation_ID 5
6 Interconnecting our Lives Networking impacts in our daily lives Learn Communicate Work Play Presentation_ID 6
7 Converged Networks Traditional Service Networks Presentation_ID 7
8 Converged Networks Current Service Networks Presentation_ID 8
9 Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security Presentation_ID 9
10 Reliable Network Fault Tolerance in Circuit Switched Network Presentation_ID 10
11 Reliable Network Fault Tolerance in Packet Switched Network Presentation_ID 11
12 Reliable Network Scalability Presentation_ID 12
13 Reliable Network Quality of Service (QoS) Presentation_ID 13
14 Reliable Network Network Security Presentation_ID 14
15 LANs, WANs, and Internets Components of a Network There are three categories of network components: End devices Intermediary devices Network media Presentation_ID 15
16 Network Representations The symbols used to represent the different devices and connections that make up a network. Presentation_ID 16
17 Components of a Network Network Topology Diagrams Presentation_ID 17
18 LANs and WANs Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) Presentation_ID 18
19 LANs and WANs Presentation_ID 19
20 LANs, WANs, and Internets The Internet Presentation_ID 20
21 Connecting to the Internet Connecting Businesses to the Internet Presentation_ID 21
22 Network Trends New trends Some of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video Cloud computing Presentation_ID 22
23 Network Trends Bring Your Own Device (BYOD) BYOD is about end users having the freedom to use personal tools to access information and communicate across a business or campus network. Presentation_ID 23
24 Network Trends Online Collaboration and Considerations Presentation_ID 24
25 Network Trends Video Communications - Video is becoming a key requirement for effective collaboration as organizations extend across geographic and cultural boundaries. Video users now demand the ability to view any content, on any device, anywhere. Presentation_ID 25
26 Network Trends Cloud Computing. Cloud Computing - Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. A company uses the hardware and software in the cloud and a service fee is charged. Presentation_ID 26
27 Network Trends Data Centers - Cloud computing is possible because of data centers. A data center is a facility used to house computer systems and associated components including: Redundant data communications connections Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices Presentation_ID 27
28 Network Protocols and Communications Network Basics Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
29 Protocols Network Communications Presentation_ID 29
30 Rules of Communications Establishing Rules Protocols in human communications account for the following requirements: An identified sender and receiver Common language and grammar Speed and timing of delivery Confirmation or acknowledgement requirements Common computer protocols include: Message encoding Message formatting and encapsulation Message size Message timing Message delivery options Presentation_ID 30
31 How network are designed and built? Networks are complex with many pieces of Hosts, routers, links, applications, protocols, hardware, software. Can we organize it, somehow? Let s consider a Web page request: Browser requests Web page from server Server should determine if access is privileged Reliable transfer page from server to client Physical transfer of bits from server to client Presentation_ID 31
32 Organization of air travel a series of steps ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing Presentation_ID 32
33 Layering of airline functionality ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below Presentation_ID 33
34 Reference Models Network Layered Model Presentation_ID 34
35 OSI Model Initially the OSI model was designed by the ISO to provide a framework on which to build a suite of open systems protocols. Ultimately, the speed at which the TCP/IP-based Internet was adopted, and the rate at which it expanded, caused the development and acceptance of the OSI protocol suite to lag behind. Often referred to by the number of the layer. Presentation_ID 35
36 TCP/IP Model Alternative model. The architecture of the TCP/IP protocol suite follows the structure of this model. Similar to OSI Model Presentation_ID 36
37 Peer-to-Peer Communications Hosts (all layers) Hosts (all layers) Routers Switches/NICs Repeaters, Hubs, Cables, etc. Routers Switches/NICs Repeaters, Hubs, Cables, etc. Presentation_ID 37
38 Communicating the Messages Segmentation Better approach segmentation. Multiplexing: Different conversations can be interleaved. Presentation_ID 38
39 Disadvantage of Segmentation Disadvantage added level of complexity. Analogy: 100 page letter one page at a time Separate envelopes Sequencing Presentation_ID 39
40 Data Encapsulation Application Upper-Layer Data Presentation Session PDU TCP Header Upper-Layer Data Transport Segmen IP Header Data Network Packet LLC Header MAC Header Data Data FCS FCS Data-Link Frame Physical Bits Presentation_ID 40
41 The Communication Process - Encapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Server HTTP Data Encapsulation Process of adding control information as it passes down through the layered model. Presentation_ID 41
42 The Communication Process - Decapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Client HTTP Data Decapsulation Process of removing control information as it passes upwards through the layered model. Presentation_ID 42
43 Devices and their layers Transceiver Hosts and servers operate at Layers 2-7; they perform the encapsulation process. Routers: Layers 1 through 3, make decisions at layer 3 Switches and NICs: Layers 1 and 2, make decisions at layer 2 Hubs and transceivers: Layer 1, no decisions to make Presentation_ID 43
44 Data Flow Through a Network Presentation_ID 44
45 Accessing Local Resources Network Address Contains information required to deliver the IP packet from the source device to the destination device. Has two parts, the network prefix and the host part. An IP packet contains two IP addresses: Source IP address - The IP address of the sending device. Destination IP address - The IP address of the receiving device. The destination IP address is used by routers to forward a packet to its destination. Presentation_ID 45
46 Accessing Local Resources Data Link Address Different role. The purpose of the data link address is to deliver the data link frame from one network interface to another network interface on the same network. IP packet encapsulated in a data link frame so it can be transmitted over the physical medium, the actual network. Ethernet LANs and wireless LANs are two examples of networks Presentation_ID 46
47 Accessing Local Resources Data Link Address The source and destination data link addresses are added: Source data link address - The physical address of the device that is sending the packet. Initially this is the NIC that is the source of the IP packet. Destination data link address - The physical address of the network interface of either: Next hop router or Network interface of the destination device Presentation_ID 47
48 Communicating on same Network Presentation_ID 48
49 Learning the MAC Address Presentation_ID 49 49
50 Accessing Remote Devices Presentation_ID 50
51 Accessing Remote Devices Presentation_ID 51 51
52 Accessing Remote Resources Using Wireshark to View Network Traffic Presentation_ID 52
53 Application Layer Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
54 The TCP/IP Application Layer There are many TCP/IP application layer protocols and new protocols are always being developed. HTTP Hypertext Transfer Protocol DNS - Domain Name System SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol IMAP - Internet Message Access Protocol FTP - File Transfer Protocol TFTP - Trivial File Transfer Protocol DHCP - Dynamic Host Configuration Protocol Presentation_ID 54
55 Two Networking Models Networked computers take on different roles or functions in relation to each other. Peer-to-Peer (P2P) network. Variations: P2P networks and P2P applications. Client / Server network: Requires central servers responding to client requests. Presentation_ID 55
56 Application Layer Protocols HTTP (WWW) We will examine HTTP in detail. DHCP (IP address resolution) FTP (file transfer) DNS (domain name resolution) SMTP ( ) SMB (file sharing) P2P (file sharing) Telnet (remote login) Presentation_ID 56
57 Reminder of encapsulation/decapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Presentation_ID 57
58 Focus on Application Header and/or Data HTTP HTTP We will examine how the application (header) and/or data communication with each other between the client and the server. Later we will look at what roles the other layers, protocols (TCP, IP, etc.) play. Presentation_ID 58
59 HTTP (Hypertext Transfer Protocol) NCP HTTP Server HTTP Client HTTP REQUEST HTTP RESPONSE HTTP The Web s application layer protocol. Implemented in Client/ Server Model Client-Request Web objects (Browser) Server-Send objects in response to request (Web Server) RFC HTTP 1.0 RFC HTTP 1.1 Stateless Protocol Presentation_ID 59
60 HTTP (Hypertext Transfer Protocol) Web page (also called a html document) Web page consists of objects Objects (examples): HTML file JPEG image GIF image JAVA applet Audio file The base HTML file references other objects in the page. <html> <head> <title>ncp-centre of Excellence, National Centre for Physics,Islamabad,Pakistan</title> </head> <body topmargin="0" leftmargin="0" rightmargin="0" style="text-align: left"> <table border="0" cellpadding="0" style="border-collapse: collapse" bordercolor="#111111" width="99%" id="autonumber1" height="373"> <tr> <td width="79%" height="105" colspan="4"> <img border="0" src="images/banner.jpg" width="100%" height="120"></td> </tr> Presentation_ID 60
61 HTTP Request Message Some data omitted for brevity GET /index.html / HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive HTTP Server HTTP Client Request Message Request line Header lines ASCII Text Request line: Method field GET, POST and HEAD The great majority of Requests are GETs Presentation_ID 61
62 HTTP Request Message GET /index.html/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive Request Line GET - Browser/client is requesting an object /index.html/ - Browser is requesting this object in this directory (default is index.html) HTTP/1.1 - Browser implements the HTTP/1.1 (1.1 is backwards compatible with 1.0) Presentation_ID 62
63 HTTP Request Message GET /~rgraziani/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive Request Line GET: - Used by browser/client to request an object. POST: - Used when user has filled out a form and sending information to the server. (Forms do not have to use POST.) - Example: words in a search engine HEAD: - Similar to a GET, but the server will responds with a HTTP message but leaves out the requested object. PUT: - Used with Web publishing tools, upload objects. DELETE: - Used with Web publishing tools, delete objects. Presentation_ID 63
64 HTTP Request Message GET /~rgraziani/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive Header Lines Accept-Language:- User prefers this language of the object User-Agent: - The browser type making the request Host: - Host on which the object resides Connection: - Client/browser is telling the server to keep this TCP connection Open, known as a persistent connection. - We will talk about this later in TCP (transport layer) Presentation_ID 64 64
65 HTTP Response Message HTTP/ OK Date: Fri, 22 Feb :34:18 GMT Server: Apache/ (Red Hat) Last-Modified: Thu, 15 Nov :33:12 GMT Content-Length: Connection: close Content-Type: text/html Some data omitted for brevity <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" " <html xmlns=" HTTP Server HTTP Client 65 Presentation_ID 65
66 HTTP Response Message HTTP/ OK Date: Fri, 22 Feb :34:18 GMT Server: Apache/ (Red Hat) Last-Modified: Thu, 15 Nov :33:12 GMT Content-Length: Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" " <html xmlns=" Response message: Status line Header lines Entity body Presentation_ID 66
67 Telnet Telnet Telnet Server Telnet provides a standard method of emulating text-based terminal devices over the data network. 67 Presentation_ID 67
68 Telnet Telnet Telnet Server Allows a user to remotely access another device (host, router, switch). A connection using Telnet is called a Virtual Terminal (VTY) session, or connection. Telnet uses software to create a virtual device that provides the same features of a terminal session with access to the server command line interface (CLI). Telnet clients: Putty Teraterm Presentation_ID 68
69 Telnet Telnet supports user authentication, but does not encrypt data. All data exchanged during a Telnet sessions is transported as plain text. Secure Shell (SSH) protocol offers an alternate and secure method for server access. Stronger authentication Encrypts data 69 Presentation_ID 69
70 Common Application Layer Protocols SMTP and POP Presentation_ID 70
71 Everyday Application Layer Protocols SMTP and POP (Continued) Presentation_ID 71
72 DNS Domain Name System DNS allows users (software) to use domain names instead of IP addresses 72 Presentation_ID 72
73 Name Resolution Need the IP address Resolver DNS client programs used to look up DNS name information. Name Resolution The two types of queries that a DNS resolver (either a DNS client or another DNS server) can make to a DNS server are the following: Recursive queries Queries performed by Host to Local DNS Server Iterative queries Queries performed Local DNS server to other servers Presentation_ID 73 73
74 DNS Name Resolution 1 User types Step 1. The DNS resolver on the DNS client sends a recursive query to its configured Local DNS server. Requests IP address for " The DNS server for that client is responsible for resolving the name Cannot refer the DNS client to another DNS server. 74 Presentation_ID 74
75 DNS Name Resolution Step 2. Local DNS Server forwards the query to a Root DNS server. Step 3. Root DNS server Makes note of.com suffix Returns a list of IP addresses for TLD (Top Level Domain Servers) responsible for.com. 75 Presentation_ID 75
76 DNS Name Resolution Root DNS Servers There are 13 Root DNS servers (labeled A through M) TLD Servers Responsible for domains such as.com, edu, org,.net,.uk, jp, fr Network Solutions maintains TLD servers for.com Educause maintains TLD servers for.edu There are redundant servers throughout the world. Presentation_ID 76 76
77 DNS Name Resolution Step 4. The local DNS server sends query for to one of the TLD servers. Step 5. TLD Server Makes note of example.com Returns IP address for authoritative server example.com (such as dns.example.com server) Presentation_ID 77
78 DNS Name Resolution Step 6. Local DNS server sends query for directly to DNS server for example.com Step 7. example.com DNS server responds with its IP address for Presentation_ID 78
79 DNS Name Resolution 8 7 Step 8. Local DNS server sends the IP address of to the DNS client. DNS Caching When a DNS server receives a DNS reply (mapping hostname to an IP address) it can cache the information in its local memory. DNS servers discard cached information after a period of time (usually 2 days) A local DNS server can cache TLD server addresses, bypassing the root DNS servers in the query chain. Presentation_ID 79
80 DNS Name Resolution In the worst cases, you'll get a dialog box that says the domain name doesn't exist - even though you know it does. This happens because the authoritative server is slow replying to the first, and your computer gets tired of waiting so it times-out (drops the connection) or the domain name does not exist. But if you try again, there's a good chance it will work, because the authoritative server has had enough time to reply, and your name server has stored the information in its cache. Presentation_ID 80
81 nslookup nslookup Displays default DNS server for your host Can be used to query a domain name and get the IP address Presentation_ID 81 81
82 DNS Name Resolution ipconfig /displaydns After a certain amount of time, specified in the Time to Live (TTL) associated with the DNS resource record, the resolver discards the record from the cache. ipconfig /flushdns Manually deletes entries The default TTL for positive responses is 86,400 seconds (1 day). The default TTL for negative responses is 300 seconds. Presentation_ID 82 82
83 Providing IP Addressing Services Dynamic Host Configuration Protocol DHCP allows a host to obtain an IP address dynamically DHCP Information can include: IP address Subnet mask Default gateway Domain name DNS Server DHCP servers can be: Server on LAN Router Server at ISP Presentation_ID 83
84 Providing IP Addressing Services DHCP Operation Presentation_ID 84
85 DHCP Dynamic Host Configuration Protocol IP addresses and other information can be obtained: Statically Dynamically (DHCP) Presentation_ID 85
86 Providing File Sharing Services File Transfer Protocol FTP allow data transfers between a client and a server FTP client is an application that runs on a computer that is used to push and pull data from a server running an FTP daemon To successfully transfer data, FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer Presentation_ID 86
87 Providing File Sharing Services Server Message Block Clients establish a long term connection to servers After the connection is established, the user can access the resources on the server as if the resource is local to the client host Presentation_ID 87
88 Providing File Sharing Services Server Message Block Presentation_ID 88
89 Transport Layer Network Fundamentals Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
90 Transport Layer Presentation_ID 90
91 Encapsulation DATA SEGMENT S.P / D.P. / S.N. / Ack # / DATA IPv / HLEN / Flag / S. IP / D. IP / PACKET FRAME DATA (SEGMENT) Frame Header DATA (PACKET) Trailer Presentation_ID 91
92 Reminder of encapsulation/decapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Presentation_ID 92
93 Focus on Transport Layer TCP TCP Presentation_ID 93
94 Transport Layer Responsibility TCP Segment TCP Segment TCP Segment TCP Segment 1. Tracking the individual communication between applications on the source and destination hosts 2. Segmenting data for manageability and reassembling segmented data into streams of application data at the destination 3. Identifying the proper application for each communication stream Presentation_ID 94
95 Transport Layer Protocols TCP/IP uses two transport layer protocols: Transmission Control Protocol (TCP) Provides reliable delivery ensuring that all of the data arrives at the destination. Uses acknowledged delivery and other processes to ensure delivery. Makes larger demands on the network more overhead. User Datagram Protocol (UDP) Provides just the basic functions for delivery no reliability. Less overhead. TCP or UDP Presentation_ID 95
96 Introducing TCP and UDP TCP and UDP TCP UDP bit Source Port Number 16-bit Destination Port Number 32-bit Sequence Number 32 bit Acknowledgement Number 4-bit Header Length 6-bit (Reserved) U R G A C K P S H R S T S Y N F I N 16-bit Window Size 16-bit TCP Checksum 16-bit Urgent Pointer Options (if any) Data (if any) Presentation_ID 96
97 Introducing TCP and UDP Introducing TCP Transmission Control Protocol (TCP) RFC 793 Connection-oriented creating a session between source and destination Reliable delivery retransmitting lost or corrupt data Ordered data reconstruction numbering and sequencing of segments Flow control - regulating the amount of data transmitted Stateful protocol keeping track of the session Presentation_ID 97
98 Introducing TCP and UDP Introducing UDP User Datagram Protocol (UDP) RFC 768 Connectionless Unreliable delivery No ordered data reconstruction No flow control Stateless protocol Applications that use UDP: Domain Name System (DNS) Video Streaming Voice over IP (VoIP) Presentation_ID 98
99 Introducing TCP and UDP Separating Multiple Communications Port Numbers are used by TCP and UDP to differentiate between applications.. Presentation_ID 99
100 Introducing TCP and UDP TCP and UDP Port Addressing Presentation_ID 100
101 Introducing TCP and UDP TCP and UDP Port Addressing Netstat Used to examine TCP connections that are open and running on a networked host Presentation_ID 101
102 TCP Communication TCP Server Processes Presentation_ID 102
103 TCP Communication TCP Connection, Establishment and Termination Three-Way Handshake Establishes that the destination device is present on the network Verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session Informs the destination device that the source client intends to establish a communication session on that port number Presentation_ID 103
104 TCP Communication TCP Three-Way Handshake Step 1 Step 1: The initiating client requests a client-toserver communication session with the server. Presentation_ID 104
105 TCP Communication TCP Three-Way Handshake Step 2 Step 2: The server acknowledges the client-toserver communication session and requests a server-to-client communication session. Presentation_ID 105
106 TCP Communication TCP Three-Way Handshake Step 3 Step 3: The initiating client acknowledges the server-to-client communication session. Presentation_ID 106
107 Protocol Data Units??? Is this correct title?? TCP Reliability Ordered Delivery Sequence numbers used to reassemble segments into original order Presentation_ID 107
108 TCP Reliability Acknowledgement and Window Size The sequence number and acknowledgement number are used together to confirm receipt. Window Size - The amount of data that a source can transmit before an acknowledgement must be received. Presentation_ID 108
109 Protocol Data Units TCP Reliability and Flow Control Data Loss and Retransmission When TCP at the source host has not received an acknowledgement after a predetermined amount of time, it will go back to the last acknowledgement number that it received and retransmit data from that point forward Flow Control Uses the window size field in the TCP header to specify the amount of data that can be transmitted before an acknowledgement must be received. Adjusts the effective rate of data transmission to the maximum flow that the network and destination device can support without loss. Manages the rate of transmission so that all data will be received and retransmissions will be minimized. Presentation_ID 109
110 Protocol Data Units TCP Flow Control Congestion Avoidance Using Dynamic Window Sizes Presentation_ID 110
111 TCP and UDP TCP Reliability - Acknowledgements TCP uses a combination of sequence numbers and acknowledgements to ensure all requested data has been received. Can be inefficient when there is loss of one or more segments Selective Acknowledgements (SACK) implementation of TCP that overcomes the inefficiency of TCP acknowledgements Presentation_ID 111
112 UDP Communication UDP Low Overhead vs. Reliability UDP Simple protocol that provides the basic transport layer function Used by applications that can tolerate small loss of data Used by applications that cannot tolerate delay Used by Domain Name System (DNS) Simple Network Management Protocol (SNMP) Dynamic Host Configuration Protocol (DHCP) Trivial File Transfer Protocol (TFTP) IP telephony or Voice over IP (VoIP) Online games Presentation_ID 112
113 UDP Communication Datagram Reassembly Presentation_ID 113
114 UDP Communication UDP Server and Client Processes UDP-based server applications are assigned wellknown or registered port numbers. UDP client process randomly selects port number from range of dynamic port numbers as the source port. Presentation_ID 114
115 TCP or UDP Applications that use TCP Presentation_ID 115
116 TCP or UDP Applications that use UDP Presentation_ID 116
117 Day 1 End Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 117
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationComputer Networks CCNA Module 1
Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The
More informationHow To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More informationTCP/IP Networking An Example
TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationUnderstanding Layer 2, 3, and 4 Protocols
2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationTCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
More informationConnecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationChapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationChakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
More informationNetwork Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More informationBasic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
More informationLayered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
More informationEssential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationUsing MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationNETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER.
NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER. BY SAKIL AHMED ID: 102 33 205 This Report Presented
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationInterconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationINTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informations@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationTCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
More informationThe TCP/IP Protocol Suite
The TCP/IP Protocol Suite Tutorial December 20, 2006 Trademarks and Copyrights Microsoft, Windows, Outlook, and Internet Explorer are registered trademarks or trademarks of Microsoft Corporation in the
More informationRaritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
More informationCS101 Lecture 19: Internetworking. What You ll Learn Today
CS101 Lecture 19: Internetworking Internet Protocol IP Addresses Routing Domain Name Services Aaron Stevens (azs@bu.edu) 6 March 2013 What You ll Learn Today What is the Internet? What does Internet Protocol
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationInterconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
More informationCisco Data Centre: Introducing Cisco Data Center Networking
coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â
More informationVirtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationData Communication I
Data Communication I Urban Bilstrup (E327) 090901 Urban.Bilstrup@ide.hh.se www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationGary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
More informationLab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
More informationNetwork Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationInternetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More information1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
More informationBroadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
More informationThe TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
More informationCape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.
Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationHow To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationComputer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More information