IST 220 Exam 3 Notes Prepared by Dan Veltri
|
|
|
- Johnathan Hampton
- 10 years ago
- Views:
Transcription
1 Concepts to know: IST 220 Exam 3 Notes Prepared by Dan Veltri The Final Exam is scheduled for Wednesday, December 15 th from 4:40PM 6:30 PM in 112 Chambers. Chapters covered: 12, 13, 15, 16, 17, 18, 20, 21 Long Distance Digital Connection Central office Phone switch Analog long-distance circuits (using amplifiers) Digital long-distance circuits (using repeaters) Leased line DSU/CSU T1, T2, T3 circuits OC1, OC2, OC3 WAN technologies WAN WAN switches Why MAC address based forwarding tables are not good for a WAN Hierarchical addressing scheme Why hierarchical addresses can make routing tables much smaller? Packet forwarding in WAN (step-by-step) Routing, routing table Routers Shortest path routing How to building routing tables? Protocols and layering Layering Routing layer headers and payloads NIC layer headers and payloads Nested headers How a message is transmitted across a WAN How routing layer headers are used to do routing OSI reference model: physical layer, data link layer (NIC layer), network layer (routing layer), transport layer, session layer, presentation layer, application layer TCP/IP reference model: physical layer, network interface layer (data link layer), IP layer (network layer), TCP layer (transport layer), application layer What does a WAN do in each layer?
2 Internetworking Internetworks ISP; backbone Physical networks The Internet IP addresses Two parts of an IP address: prefix and suffix Five Classes of IP addresses Network Addresses and Broadcast Addresses Maximum numbers of computers or networks within each class How to compute the class of an IP address Dotted Decimal Notation IP Addresses for routers IP datagram forwarding Assigning IP addresses to an internetwork How a message is transmitted across an internetwork where IP is used IP layer (i.e., routing layer) headers and payloads Network interface layer (i.e., NIC layer) headers and payloads Routing tables, the mask field
3 Chapter 12: LAN Extended LAN WAN Internet So far, we learned how to build a large LAN. However, many companies have several divisions from east to west coast. Therefore, they need a WAN. In the simplest case, We need a higher speed. Two solutions: (1) Leased lines AT&T (2) Via Internet VPN technology A leased line 1.5 Mbps - $900 per month However, this setting does not work! Why? Reason 1: This is because LANs are digital, but AT&T is analog. WRONG Because today, AT&T switches are digital Correct Answer: Because LAN and phone switches handle digital signals using different standards.
4 We need a digital to digital translator: DSU/CSU Data Service Unit / Channel Service Unit It works as follows: How quick can it be? Copper wires T Mbps T Mbps T Mbps Fiber Optic OC Mbps OC Mbps OC Mbps OC24 1 Gbps OC48 2 Gbps Last notes: You can use leased lines based on your budget. If you cannot afford a T1 ($900), you can use a fractional T1 whose bandwidth is split among companies. Signals from each LAN are multiplexed at the Central Office and later demultiplexed at the destination Central Office. It works perfectly.
5 If T1 is too slow, but T2 is too expensive, you get multiple T1s. At the central office, the LAN signal is split to the multiple T1s by an inverse multiplexer, which is later recombined by an inverse demultiplexor. Chapter 13: WANs use a WAN interface (a special NIC) Details of a WAN Switch:
6 Note: This WAN has 3 LANs, 6 LAN segments, 11 computers Note: NIC 1-1 is a WAN NIC (cost about $150) NIC 1-3 is a LAN NIC (cost about $10) Q1. What if we also connect S1 and S3? Pros: LAN is more robust Cons: LAN is more expensive Q2. How to make this WAN work? Answer: use LAN switch technology. This is, we just need to make the forwarding table larger Then, the WAN should run! Idea: S2 uses a single forwarding table to forward all possible messages in the WAN correctly. Since a message may be sent to any computer in this WAN, the MAC address of every computer should be in the forwarding table. Q3. For this WAN, how many entries should be in the forwarding table? Answer: All three forwarding tables have the same size, 11 entries, size of FT = the number of computers in the WAN. So, if a WAN has 10,000 computers, each forwarding table will have 10,000 entries. Problem: it uses a lot of RAM and is slow. This solution is NOT GOOD, FORGET MAC addresses for forwarding Hence, we need (1) much smaller forwarding table (2) much quicker forwarding. How to do this? Answer: We need to use hierarchical addresses! Hierarchical addresses are composed of 3 numbers (Switch #, Segment #, Computer #) Example: Because segment 4 is the first segment connected to switch 2, the h-address of computer F should be 2,1,1. Destination Address NIC A 1,1,1 2,1 B 1,1,2 2,1 C 1,2,1 2,1 D 1,2,2 2,1 E 1,3,1 2,1 F 2,1,1 2,3 G 2,1,2 2,3 Computers that use the same NIC (example: computers A-E) are merged in the forwarding table (example: 1,*,* 2,1)
7 Today, we will begin using new names (a.) when the forwarding table uses hierarchical addresses like 1,1,2, it is called a routing table (b.) When a WAN switch uses a routing table, it is called a router Assume computer A is sending I like you to computer D Step 1: P-A composes the packet Step 2: NIC-A adds a preamble, CRC, and uses CSMA/CD to send out the packet Step 3: NIC 1-1 in R1 will: (a.) Demodulate cache (b.) length checking (c.) CRC checking (d.) Strip off preamble and CRC (e.) queue Step 4: P-R1 will use the routing table and the header of the packet to forward the packet Routing Table: Destination Address NIC 1,*,* 1,1 2,*,* 1,2 3,*,* 1,2 - tricky 4,*,* 1,2 - tricky Now the routing table is a tricky issue because there are multiple routes from R1 to R4. Example: R1 R2 R4 700 miles best route (uses NIC 1,2 on R1) R1 R3 R4 900 miles
8 R1 R2 R3 R4 800 miles R1 R3 R2 R miles In this class, we use route with lowest total distance to determine best route. *We assume the best routing criteria is the shortest distance, but this not the only option. Other good criteria include shortest transmission time or lowest amount of congestion. Here we assume that static routing is being done, that is, each routing table is prepared by the network administrator. Only he can change the table. Nowadays, the internet does dynamic routing, where the routing table is dynamically changed by software when the network situation is changed. Step 4B: P-R1 matches the destination address of the packet. Namely 4,1,2 with the routing table. Since the record is matched, P-R1 forwards the packet to NIC 1,2. Step 5: NIC 1-2 will add the preamble, CRC modulate send out (no CSMA/CD) Step 6: NIC 2-1 will demodulate cache length check CRC strip off queue Step 7: P-R2 will do shortest path routing, based on its routing table Destination Address NIC 1,*,* 2,1 2,*,* 2,4 3,*,* 2,2 4,*,* 2,3 This process continues until the packet reaches computer D for a total of 13 steps. The DEADLY problem: In the last lecture, the packet will never be able to reach P-D, because, if the packet could reach NIC-D, it would be using hierarchical addresses. However, this packet will be discarded by NIC-D during address filtering because address filtering is only based on the physical (MAC) address. (NIC cards are built this way. Even worse problem: Actually, NIC 1-1, NIC 3-1, and NIC 4-2 will also do address filtering; So, the packet can t even reach NIC-D. The fundamental reason is: (a) we need hierarchical addresses to do routing (b) but we need physical (MAC) addresses to do address filtering So, we need to use BOTH addresses! The idea of layering is to break down a complicated solution into small pieces or steps, then solve the problem step-by-step.
9 Assume computer A is to send ER to computer B: The packet will follow this path: P-A NIC-A NIC 1-1 Queue in R1 P-R1 NIC 1-3 NIC 3-1 Queue in R3 P-R3 NIC 3-3 NIC 4-2 Queue in R4 P-R4 NIC 4-3 NIC-D P-D Step 1: (At P-A) According to layering, P-A will go thorough two steps to compose the packet. (a.) P-A adds the router layer header. (b.) P-A adds the NIC layer header. Nested header means that the routing layer header is nested inside the NIC layer payload. Step 2: NIC-A will add preamble and CRC CSMA/CD Q1: CRC is based on which part of the packet? a. NIC layer header b. Router layer header c. NIC layer payload d. Router layer payload Step 3: NIC 1-1 demodulate cache address filtering length checking CRC checking strip off preamble and CRC queue Q2: In this NIC layer header, what should be the destination? a. NIC-D s MAC b. NIC-A s MAC c. NIC1-1 s MAC Step 4: P-R1 will also go through several steps (a.) strip off the NIC layer header (b.) use the routing table to determine where to forward based on shortest path routing. The answer is: NIC 1-3 (c.) P-R1 will add a new NIC layer header
10 Step 5: NIC 1-3 will add the preamble and CRC modulate send out Step 6: NIC 3-1 will do exactly the same thing as NIC 1-1 Step 7: P-R3 will do exactly the same thing as P-R1, except that (a.) use his routing table (b.) add a different NIC layer header Step 8: NIC 3-3 will exactly the same thing as NIC 1-3 Step 9: NIC 4-2 will do exactly the same thing as NIC 3,1 Step 10: P-R4 will do exactly the same thing as P-R3, except it will change the NIC layer header with destination address of NIC-D and sender address of NIC 4-3. Step 11: NIC 4,3 will add will add the preamble and CRC CSMA/CD Step 12: NIC-D will do exactly the same thing as NIC 4-2 Step 13: P-D will (a.) strip off the NIC layer header (b.) after knowing the sender, strip off the routing layer header (c.) display the message on the computer! ER add routing header add NIC header add CRC, preamble Cable address filtering, length, CRC Strip off NIC layer do routing add a new NIC header add preamble, CRC Cable to R3 Idea: different devices will do the same type of things on the same layer. OSI 7 layer model: app layer presentation session transport network data link physical IST 4 layer model: app layer routing NIC physical Chapter 17: Internetworking When there are several WAN, wanting to connect with each other, we will get an internetwork. The largest internetwork is the Internet.
11 Challenge: How to interconnect the three WANs Solution 1: connect their routers directly Problems: (a.) not very open (b.) a lot of hassles to add a new WAN (c.) not friendly to individual users and small businesses Solution 2: ask a third party to be the ISP. Each WAN uses an ISP to connect to a backbone of the internet How to make it work? Idea 1: we can directly apply our WAN technology to do this job Problem: (a.) there are several R1 confuse senders and receivers (b.) there are several 1,1,1 more confusing Solution: we need a unique identifier for every router and computer on the internet IP addresses proposed by International Organization agreed upon by all the people Technical details: 1. IP addresses are hierarchical addresses so IP routing is efficient 2. Every IP address has two parts a. Prefix indicates which physical network b. Suffix indicates which computer in the physical network For example: consider a situation where we have 3 physical networks; we can use the following IP address. 10 bit IP address:
12 Rule 1: All the computers in the same physical network will have the same prefix. Ex. IBM WAN prefix: 0,1 Microsoft WAN prefix: 1,0 Sun WAN prefix: 1,1 Note: based on the prefix, we easily see the computer is on IBM, MS, or Sun. Mini-IP (1): Q1. At most, how many physical networks can be addressed by this mini-ip? Answer: 4 (prefix possibilities: 0,0 0,1 1,0 1,1) Q2. Can the mini-ip of computer 1 be 0101? Answer: No, because all computers in Toy A physical network must have the same prefix, which is 00. Q3. At most, how many computers in Toy C physical network can get a mini-ip? Answer: 4 (suffix possibilities: 0,0 0,1 1,0 1,1) Mini-IP (2): Q4. At most, how many physical networks can be addressed by this mini-ip? Answer: 2 Q5. At most, how many computers in Toy C physical network can get a mini-ip? Answer: 8 (2^3 = 8) # of network/computer possibilities = 2 ^ length of prefix/suffix respectively In summary, if the total address length is fixed, putting more bits in the prefix part gives us more physical networks, but each physical network must have fewer computers. As a result: For a big company prefer longer suffix For a smaller company prefer longer prefix Answer to problem: Have 5 classes of IP addresses.
13 We break down the set of all IP addresses into 5 groups (classes A,B,C,D,E,F); each class has a collection of IP addresses. No two classes will share any IP addresses Class A is for big companies Class C is for small companies Every IP has 32 bits Different classes have different formats The properties of each class are as follows: Q1. Which physical network is the largest? Answer: Class A Class Prefix Suffix A 7 bits 24 bits B 14 bits 16 bits C 21 bits 8 bits Q2. Which class does this address belong to?
14 Answer: Class B (look at the class identifier in the beginning) Q3. What is the decimal notation of IP address? Step 1: Split it into 4 parts; each part has 8 bits Step 2: translate every part into a decimal number Q belongs to what class? Answer: Translate 192 into class C identifier Assume both R1 and R2 are owned by an ISP. Then, there are 3 physical networks. Now we can assign IP addresses: (a.) every computer has a unique IP NIC-A: NIC-B: NIC-D: As a result, each NIC is associated with 2 addresses (1.) IP address (2.) MAC address
15 Q1. How to assign IP address to R1? Answer: both NIC 1,1 and NIC 1,2 should have an IP address because NIC 1,1 is part of physical network 1. The prefix of his IP address must be the same as the prefix of computer A s IP address. Q2. What s the prefix of A s IP? Answer: IP = , (class B identifier). Computer A is a Class B address. So the first 16 bits (2 digits) is the prefix (including the class identifier). So the answer = Hence, NIC 1,1 s IP = Similarly, NIC 1,2 s IP = Moreover, in each physical network, we have 2 special IP addresses which are reserved. Network address: ( is prefix, 0.0 is the suffix) Broadcast address: ( is prefix, is suffix) A quick way to identify IP class: 1 st Digits Class A B C D E Q3. IP address is What s the prefix? Answer: prefix = 100 (class A) Network address = Computer A I like you Computer D Step1a: P-A will add the routing layer header Step 1b: P-A will add the NIC layer header. Step 2: At NIC-A add CRC, preamble use CSMA/CD Step 3: NIC 1,1 demodulate cache add filtering length CRC strip off CRC, preamble Queue Step 4a: P-R1 will strip off the NIC header. Step 4b: P-R1 will do routing based on the routing table. Destination Next Hop NIC 1, NIC 1, NIC 1,2 *(1) we use the Net Address (2) We still do shortest path routing
16 Step 5: Now we match computer D s IP address against the routing table and find it matches to row 3. Mask Field in routing tables (IP mask) Q1. Why do we need Mask? Answer: Humans can easily see that matches because they have the same prefix, BUT it is very hard for computers to do this smart matching! To enable a computer to do this matching we need to use mask. Ultimate Routing Table (no more lies) Destination Mask Next Hop NIC 1, NIC 1, NIC 1,2 Computer A is sending message I like you to computer D Step 1: P-A adds two headers Step 2: NIC-A Step 3: NIC 1,1 Step 4: (at P-R1) a. strip off NIC header b. do routing: match the destination IP address, namely , with the routing table: Destination Mask Next Hop NIC 1, NIC 1, NIC 1,2 c. P-R1 needs to add a new NIC layer header. Step 5: NIC1,2 preamble, CRC CSMA/CD
17 Step 6: NIC 2,1, the same as NIC 1,1 Step 7: P-R2 the same as P-R1 except that when P-R2 adds the new NIC header Step 8: NIC 2,2 adds the preamble, CRC CSMA/CD Step 9: NIC-L will not do address filtering Step 10: P-Bridge finds that the packet should go to NIC-R. Note: P-B does not strip off the NIC layer header Step 11: NIC-R will add the preamble, CRC CSMA/CD Step 12: NIC-D demodulate cache add filtering length checking CRC Strip off Step 13: P-D will strip off the 2 headers and get the message. The mask of record 1 (routing rule 1) is defined as follows: Step 1: Determine the class of the physical network. Here the net address is class B Step 2: Determine the prefix part. ( ) Step 3: Mask = Q1. What is the Mask for ? Answer: Q2. Why do we need the Mask? Answer: Without Mask, it is hard for P-R1 to know that matches because they are not identical! With Mask, it s so quick and so easy. When is matched against , Step 1: P-R1 will calculate AND = (the result will always be a network address.) Step 2: P-R1 will do an exact match.
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Internet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Data Communication Networks
Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching
Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
CMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, [email protected] School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
IP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
DATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Expert Reference Series of White Papers. Basics of IP Address Subnetting
Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska
WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Computer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
Lecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
Overview of WAN Connections Module 1
Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Introduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Computer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF
High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
Long Distance Connection and WAN
Lecture 6 Long Distance Connection and WAN Digital Telephone, PCM and Nyquist Sampling Theorem DSU/CSU, T Line Series and OC line Series Local Loop DSL Technologies - ADSL, HDSL, SDSL, VDSL Cable Modem
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Module 2: Assigning IP Addresses in a Multiple Subnet Network
Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
ICS 153 Introduction to Computer Networks. Inst: Chris Davison [email protected]
ICS 153 Introduction to Computer Networks Inst: Chris Davison [email protected] 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
Architecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
College 5, Routing, Internet. Host A. Host B. The Network Layer: functions
CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
What is Network Latency and Why Does It Matter?
What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known
Networks. The two main network types are: Peer networks
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
TCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
