QUIZ: Review of Data Link layer (L2)

Size: px
Start display at page:

Download "QUIZ: Review of Data Link layer (L2)"

Transcription

1 QUIZ: Review of Data Link layer (L2) List four main problems that L2 is designed to solve in a network. For each of the four, name at least two algorithms we studied in Chs. 3 or 4.

2 solution Framing (length field, bit stuffing, byte stuffing) Flow control (feedback-based or rate based) Error control (detection: parity bits, checksum, CRC; correction: Hamming, convolutional) If only detection is performed, L2 can also implement retransmission: These also work for flow control! Stop-and-Wait, Go-back-N, Selective Repeat Medium access control = MAC (Aloha pure and slotted, CSMA, CSMA/CD, MACA, CSMA/CA )

3 QUIZ: Ethernet 36. A switch designed for use with Fast Ethernet has a backplane that can move 10 Gbps. How many frames/sec go through the switch during heaviest traffic conditions? Hint: In order to know which port to send the frame to, the switch has to examine its header!

4 QUIZ: Ethernet 36. A switch designed for use with Fast Ethernet has a backplane that can move 10 Gbps. How many frames/sec go through the switch during heaviest traffic conditions? Hint: What is the shortest FE frame?

5 solution 36. A switch designed for use with Fast Ethernet has a backplane that can move 10 Gbps. How many frames/sec go through the switch during heaviest traffic conditions? Solution:

6 QUIZ: Ehernet What is the promiscuous mode for an Ethernet interface? Why is it a security hazard? Is promiscuous mode a problem for stations connected to the same hub? Is promiscuous mode a problem for stations connected to the same switch? Hint: See p.290 of text.

7 Chapter 5 The Network Layer = L3 Segments Packets Frames Bits / Bytes

8 Why is L3 needed? L2 is concerned with moving data from one end of a wire to another, whereas L3 is concerned with moving data between source and destination, over many intermediate hops. The existence of bridges (section 4.7 not covered in this course, except for here) seems to contradict the above! A bridge is a L2 device! (a) (b) Two views of bridges: (a) The overall network topology (b) Role in host-to-host communication

9 Why is L3 needed? Since bridges can already deal with multiple hops in L2 (using forwarding tables, flooding, spanning trees etc.), why not extend the L2 architecture to the entire Internet? This would save a lot of complexity, cost and overhead We would not need L3 addresses (MAC addresses are unique anyway, so why not use only them?!)

10 Why is L3 needed? Short answer: Because the algorithms for L2 switching do not scale. Examples: Think about flooding the entire Internet for every packet. This would generate a huge superfluous load talk about overhead! Unlike L3 (IP) addresses, MAC addresses are hard-wired in the NICs, and there is no correlation between geography and MAC address space. In order to do universal addressing in L2, each routing table would have to contain all L2 addresses in the world (More than 1 billion hosts see Another reason: There are many different technologies in L2 (e.g. Ethernet, Token bus, token ring, wireless Ethernet, ATM, wireless MAN, HDLC, PPP), and they cannot all directly interoperate. We d have to build a different bridge for each pair of L2 protocols - the n 2 problem again!

11 5.1 L3 Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Connectionless? Connection-oriented? Implementation of Connectionless Service Implementation of Connection-Oriented Service Comparison of Virtual-Circuit and Datagram Subnets

12 Store-and-Forward Packet Switching fig 5-1 The environment of the network layer (L3) protocols.

13 Store-and-Forward vs. Cut-Through fig 5-1 Although used in some L2 switches, Cut-Through is never implemented in L3 routers, b/c of the potential of letting corrupted packets go through.

14 Services provided by L3 to L4 These services have been designed according to the following principles: 1. Services should be independent of router technology and implementation 2. L4 should be shielded from the number, type and topology of the routers in the subnet 3. Addresses should be uniform, independent of the underlying LAN or WAN technology

15 Should L3 be connectionless or connection-oriented? a) The Internet community says connectionless Remember: the Internet started as a DoD project, w/explicit goal of survivability! b)the telephone companies say connection-oriented Remember: They installed millions of miles of Tn and OCn lines! They want good QoS for voice traffic.

16 Implementation of Connectionless Service a.k.a. Datagram The L4 segment is split into 4 L3 packets, which are routed independently. Routing algorithm is responsible for managing routing tables and making routing decisions.

17 Implementation of Connection-Oriented Service a.k.a. Virtual Circuit (VC) Label switching Route is chosen once and for all (?!) during connection setup. Individual pkts are routed based on their connection identifier (label).

18 VC vs. Datagram 5-4

19 VC vs. Datagram Tradeoffs Router memory space vs. bandwidth VC numbers are shorter than full Internet addresses, but maintaining per-vc state consumes memory One routing table vs. two There are fewer VCs going through a router than Internet addresses but connection setup pkts need to be routed, too full Internet addresses are needed in either case! Setup time vs. address parsing time

20 5.2 Routing Algorithms SKIP The Optimality Principle Shortest Path Routing (Dijkstra) Flooding Distance Vector Routing Hierarchical Routing Link State Routing Broadcast Routing Multicast Routing Routing for Mobile Hosts Routing in Ad Hoc Networks

21 Routing is the main function of L3. Other functions: congestion ctrl, QoS, fragmentation. Def: Routing algorithm/process = the part of L3 responsible for building and maintaining routing information. creates and updates the routing table Def: Forwarding algorithm/process = the part that actually handles the data pkts, deciding which output line an incoming pkt. is to be transmitted on. creates and updates the fwding table

22 Routing Algorithms wish-list correctness simplicity robustness don t reboot the entire Nw every time a router or a link crashes stability fast convergence to a state of equilibrium after any perturbation fairness all users must have equal access to Nw resources optimality What do we want to optimize? There are many possible optimization goals, many contradictory. E.g. average delay vs. total throughput. Conflict between fairness and optimality.

23 Types of Routing Algorithms Non-adaptive RA = static routing All routes computed off-line in advance, then downloaded in the Nw. Simplest form: manual config. of static routes, used on Hosts (Windows, Unix route add) Routers, if the Nw is small (a handful of routes) or there is only one way in/out Advanced forms: various central optimization algorithms (e.g. AT&T had one in the 70s for optimizing load in their long-distance telephone Nw) Adaptive RA = dynamic routing Routing tables change in real time, reflecting changes in topology and/or traffic. Design questions: How to obtain the information? When to operate changes? What metric to use for optimization?

24 The Optimality Principle If J is on the optimal path from M to B, then the optimal path from J B follows the same route. Sink tree associated with every destination (no loops!) = spanning tree. The goal of any routing algorithm is to discover and use sink trees for all routers in the network.

25 If J is on the optimal path from M to B, then the optimal path from J B follows the same route. How could the Optimality Principle not hold in a network??

26 If J is on the optimal path from M to B, then the optimal path from J B follows the same route. How could the Optimality Principle not hold in a network?? A: Optimality can be measured in many ways, and network policies can be selective Example: Packets originated at M are given high priority at C, but those originated at J are not.

27 handout

28 Shortest Path Routing Dijkstra (static) Computing the shortest path from A to D: The set of processed nodes is denoted by the circle/ellipse. The set of boundary nodes is denoted by a square. The arrow indicates the node that has just been added to the set of processed nodes.

29 Dijkstra s algorithm

30 Dijkstra s algorithm The algorithm stops when the target node D has been included in the set of processed nodes, not in the boundary!

31 Dijkstra s algorithm Finish the algorithm! EoL1

32 QUIZ: L3 a) What is the name of L3? b) What is the main function of L3? c) What is the unit of data that L3 is concerned with? d) What are L3 devices called in a network? e) Do L3 devices use store-and-forward or cutthrough transmission? Why? f) What are static and dynamic routing algorithms?

33 QUIZ: L3 a) State the optimality principle (O.P.). b) Give an example network scenario in which O.P. is not true. c) Name the 3 sets of nodes used in Dijkstra s algorithm. d) Would Dijkstra s algorithm work if O.P. did not hold? Explain why or give a counterexample! e) Do you remember the Big Oh complexity of Dijkstra s algorithm?

34 Shortest Path Routing Dijkstra (static) Computing the shortest path from A to D: The set of processed nodes is denoted by the circle/ellipse. The set of boundary nodes is denoted by a square. The arrow indicates the node that has just been added to the set of processed nodes.

35 Flooding Send the pkt. out on all links, except the one it came on. Problem: If loops are present in the topology (and in general they are!), an infinite # duplicate pkts. will be generated. Improvement 1: Source and destination do not fwd. the pkts. Improvement 2: Hop counter in the header of each pkt. (called TTL in IP): Start at a value larger than the diameter of the network Each node decrements it. Discard pkt. when it reaches zero. Nr. of hops between the two most distant nodes

36 QUIZ: TTL What is the diameter of this network?

37 Answer: 6 What is the diameter of this network?

38 handout After 1 st hop After 2 nd hop After 3 rd hop

39 Flooding Send out copies of pkt. on every outgoing link, except the one the pkt. came in on. Source and destination do not fwd. pkt. Each pkt. carries hop-count information Problem 7 / 475: A sends a pkt. to D with a max. hop count of 3. How many copies does D get? Show the positions of the copies after each hop. Hint: What info. needs to be carried in a pkt.?

40 Problem 7 / 475: A sends a pkt. to D with a max. hop count of 3. How many copies does D get? Show the positions of the copies after each hop. Individual work for next time: Solve the same problem for max hop count of 4.

41 QUIZ Is flooding a static or dynamic algorithm? Explain.

42 Comparison Dijkstra vs. flooding They are two extremes in terms of information needed by the network routers: For Dijkstra alg., each router needs to know all the costs in the network How is this information collected and made available to the nodes? For flooding alg., the router doesn t need to know anything about the network

43 Distance Vector Routing Distance vector is a distributed routing algorithm Shortest path computation is split across nodes How it works: Each node knows only the distances of the links connecting it to its immediate neighbors Each node advertises the vector of lowest known distances to all neighbors Each node uses received vectors to update its own Repeat periodically

44 Distance Vector Routing Network Vectors received at J from Neighbors A, I, H and K

45 Distance Vector Routing What is the Big-Oh complexity of calculation in each router?

46 Distance Vector Routing What is the Big-Oh complexity of calculation in each router? A: O(k N) = O(N) Compare to Dijkstra O(N 2 ) k is the # of neighbors, usually small

47 Distance Vector Routing What is the Big-Oh complexity of calculation in each router? A: O(N) However, the local nature that makes this improvement in complexity possible also incurs a cost: In some cases, the DV algorithm can be fooled.

48 The Count-to-Infinity Problem Failures can cause DV to count to infinity while seeking a path to an unreachable node X Good news of a path to A spreads quickly Bad news of no path to A is learned slowly

49 The Count-to-Infinity Problem Failures can cause DV to count to infinity while seeking a path to an unreachable node X Good news of a path to A spreads quickly Bad news of no path to A is learned slowly

50 The Count-to-Infinity Problem The problem can be mitigated with additional strategies: Split horizon: Do not advertise a destination to the next hop to that destination Poisoned reverse: Send infinity to the next hop to that destination However, these strategies are not fool-proof; they fail in more complex network scenarios (involving loops).

51 Hierarchical Routing Best choice to reach nodes in 5 except for 5C Hierarchical routing reduces the work of route computation but may result in slightly longer paths than flat routing

52 Hierarchical Routing For larger networks, 3 or more levels may be necessary. Optimal # of levels for an N-node network is ln(n). Each router s table has only e ln(n) entries The increase in mean path length is usually negligible

53 QUIZ Hierarchical Routing The Internet had an estimated 1 billion hosts in If optimal h. routing was used, how many levels would be required, and how many entries in each routing table? For larger networks, 3 or more levels may be necessary. Optimal # of levels for an N-node network is ln(n). Each router s table has only e ln(n) entries The increase in mean path length is usually negligible

54 A 2 handout 6 B 3 C D E 7 8

55 QUIZ: Distance-Vector Routing A 2 6 B 3 C D E 7 8 a) At step 0, each router in the network detects the distances to its immediate neighbors (all links are duplex and symmetrical). Show the vectors advertised by each node.

56 solution The vectors first advertised by each node.

57 b) Show: the calculations performed at each node in step 1 (start with A) each node s routing table at the end of step 1 the vectors advertised by each node at the end of step 1.

58 partial solution (node A) A knows its own vector and the ones from its neighbors B and C. A s routing table at the end of step 1. The vector advertised by A at the end of step 1.

59 c) Show the vectors advertised by each node at steps 2, 3, d) When (after how many steps) does the algorithm converge?

60 e) If link CD goes down, do we have the count-to-infinity problem? Explain, either way. f) Same question if link AC goes down instead.

61 SKIP all other routing algorithms in section 5.2: --Link state --Broadcast --Multicast --Anycast --Mobile hosts --Ad hoc networks SKIP sections 5.3, 5.4, 5.5 EOL2

62 5.6 L3 in the Internet SKIP The IP Protocol (IP v.4) IP Addresses IP v.6 Term paper! Internet Control Protocols OSPF The Interior Gateway Routing Protocol BGP The Exterior Gateway Routing Protocol Internet Multicasting Mobile IP

63 Internet = Collection of many (sub)networks A pkt. going from 1 to 2 traverses 6 networks (source and destination networks included).

64 IP (Internet Protocol) was designed to provide a best-effort way (i.e. datagram, i.e. connectionless) to transport pkts. from source to destination, irrespective of how many networks are in between.

65 Architectural Principles for Internet RFC Make sure it works. 2. Keep it simple. (KISS! ) 3. Make clear choices. 4. Exploit modularity. 5. Expect heterogeneity. 6. Avoid static options and parameters. 7. Look for a good design; it need not be perfect (a.k.a. satisficing in A.I.) 8. Be strict when sending and tolerant when receiving. 9. Ensure scalability. 10. Consider performance and cost.

66 9. Scalability Make the core dumb and the edge smart CE = Customer Edge Router, PE = Provider Edge Router, P = Provider Core Router Image source:

67 IP v.4 The header of an IPv.4 pkt. (a.k.a. datagram)

68 In 32-bit words max 60 byte for entire header max 40 byte for Options. In Bytes max for entire datagram. IP v.4 or IP v.6 IP v.5? Don t Fragment Congestion? More Fragments Which datagram a fragment belongs to. Initially 3 bits Precedence + 3DTR (Delay, Throughput, Reliability) Today 6 DSCP (DiffServ Code Points) In multiples of 8 bytes. All fragments except the last must be such multiples.

69 Q: Why not specify the Total length in multiples of 4 Bytes (32 bits)? In Bytes max for entire datagram. A: B/c the pkt. payload that follows this header is not necessarily a multiple of 4 Bytes!

70 Extra-credit

71 Originally designed to count time (sec.) Today counts only hops. Important examples: ICMP=1, IP=4, TCP=6, UDP=17 Go to for the complete list of protocols Must be recomputed at each hop, since at least TTL changes Padded to the next multiple of 4 Bytes

72 The core is dumb, so it shouldn t pay attention to them! IP options (rarely used, most routers ignore them) 5-54 A total of 25 (2 obsolete) are defined at Internet Assigned Numbers Authority More reading here: (link on our webpage)

73 Example IP pkt. (datagram) Source: RFC 791

74 Error control in IP? Source: RFC 791

75 IPv.4 Addresses have 32 bits Dotted-decimal notation: Each Byte is represented in its decimal value, with dots in between, e.g (binary) = = 0x2A 80 C0 07 (hex) = = (dotted-decimal)

76 Your turn! Convert between hex and dotted-decimal: a) 0xAB CD EF 23 = b) = c) =

77 IP Addresses - until 1981 First (most significant) Byte = network field Last 3 bytes = rest field (identifies host inside network) This was possible because

78 IP Addresses 1982 Source:

79 IP Addresses 1982 What are the only two companies that had multiple networks at that time? What is each one s claim to fame (in the field of comp. nws.)? Source:

80 solution BBN: J.C.R.Licklider was the earliest originator of the concept of packet-switched nw., then director at ARPA. BBN was awarded by ARPA the contract to build the first incarnation of ARPANET. SRI: The first ARPANET message ( lo(gin) ) was sent from UCLA to SRI. Image source:

81 IP Addresses RFC 791 Internet Protocol (Sept.1981) Initial IP address formats (classful addressing). Dotted decimal notation

82 QUIZ: How many hosts can there be in a class A, B, and C network? Initial IP address formats (classful addressing).

83 CIDR = Classless Inter-Domain Routing RFC (1993) later updated by RFC 4632 The three bears problem : a class B network should be just right but in reality it is too large for most organizations wasted address space. Fact: Half of all class B networks have < 50 hosts. QUIZ: assuming the other half are all full (!) what percentage of the class B address space is lost?

84 CIDR prefixes This is the new CIDR notation. Read: slash 24 See next slide!

85 Ambiguity: the two meanings of subnet A campus network consisting of subnets (LANs) for various departments. From Ch.1: The subnet is the routing infrastructure of the Internet, a.k.a. the core.

86 QUIZ: CIDR prefixes What is the dotted-decimal notation for a /26 subnet mask?

87 solution What is the dotted-decimal notation for a /26 subnet mask? = =

88 The subnetting idea is extended to the entire Internet, by using masks explicitly in the routing process Each router table entry contains a network address and a subnet mask, e.g /24 The packets themselves do not carry masks, only SA and DA

89 Example: /26 network prefixes Here the subnet mask consists of 26 bits, leaving 6 bits for the host identifier. This allows for 64 combinations (2 6 ), however the all zeros value and all ones value are reserved for the network ID and broadcast address respectively, leaving 62 addresses. In general the number of available hosts on a subnet is 2 n 2. RFC 3021 specifies an exception to this rule when dealing with 31-bit subnet masks (i.e. 1-bit host identifiers). In such networks, usually point-to-point links, only two hosts (the end points) may be connected and a specification of network and broadcast addresses is not necessary. Source: Wikipedia

90 Only used in certain ICMP pkts. Special IP Addresses

91 QUIZ How many hosts can a /17 network have? What is the broadcast address of the network /20? What valid host range is the IP address /30 a part of?

92 QUIZ How many hosts can a /17 network have? A: = 32,766 What is the broadcast address of the network /20? A: What valid host range is the IP address /30 a part of? A: through to

93 Read and understand sections and 5.6.2, and all the examples we gave today IP addressing practice questions (and answers):

94 Homework for Ch.5 1, 2, 6, 7, 16, 24, 26, 27, 28, 30 Due Thu, April 21 EOL3

95 QUIZ What is the last valid host on the subnetwork / 26?

96 QUIZ What is the last valid host on the subnetwork /26? A: What is the last valid host on the subnetwork ?

97 QUIZ What is the last valid host on the subnetwork /26? A: What is the last valid host on the subnetwork ? A:

98 Example: Viewing the routing table in Windows

99 Subnetting Split up the IP prefix of a network into subnet(work)s to help with management: Looks like a single prefix outside the network ISP gives network a single Class B prefix Network divides it into subnets internally

100 QUIZ How many subnets and hosts per subnet can you get from the network ? Hint: What class of network is (A, B, C)?

101 QUIZ How many subnets and hosts per subnet can you get from the network ? A: 128 subnets and 510 hosts How many subnets and hosts per subnet can you get from the network ?

102 QUIZ How many subnets and hosts per subnet can you get from the network ? A: 128 subnets and 510 hosts How many subnets and hosts per subnet can you get from the network ? A: 512 subnets and 126 hosts

103 In a router, the masks in the routing table are AND-ed with the DA of the packet, then matched against the corresponding network address Scaling: a router has in its routing table only its local (i.e. LAN) hosts and all other network prefixes

104 The opposite of subnetting: Aggregation Aggregation joins multiple IP prefixes into a single larger prefix to reduce routing table size ISP advertises a single prefix ISP customers have different prefixes

105 Aggregation example (Destination) Address Mask aggregation point = right-most point to the left of which all addresses are the same

106 Longest Matching Prefix Packets are forwarded to the entry with the longest matching prefix or smallest address block Complicates forwarding but adds flexibility Routing tables often contain a default route, which has the shortest possible prefix match, to fall back on in case matches with all other entries fail. Except for this part! Main prefix goes this way

107 QUIZ: Longest Matching Prefix Send out on interface B Send out on interface A Which interface will the pkt. go to?

108 Special IP Addresses continued: private addresses One Class A Network: Class B Networks: Class C Networks: These are reserved for networks not connected to the Internet (at least not directly connected see NAT later in this section FYI)

109 QUIZ: private addresses One Class A Network: Class B Networks: Class C Networks: What is the total # of private addresses?

110 SKIP NAT (Network Address Translation) 1999 RFC 2663

111 How IP addresses are were allocated The Internet Assigned Numbers Authority (IANA) distributes top-level blocks to the 5 regional Internet registries (RIR), which then assign subblocks to end users and local Internet registries, such as Internet service providers, universities and businesses. Source:

112 Exhaustion of IPv4 address space On 31 January 2011, the last two unreserved IANA /8 address blocks were allocated to APNIC according to RIR request procedures. Asia-Pacific Network Information Centre This left five reserved but unallocated /8 blocks. In accord with ICANN policies, IANA proceeded to allocate one of those five /8s to each RIR, exhausting the IANA pool, at a ceremony and press conference on 3 February APNIC was the first regional Internet Registry to run out of freely allocated IPv4 addresses, on 15 April Source:

113 Exhaustion of IPv4 address space What countermeasures have been tried: Classes (1981) CIDR (1993) NAT (1999) and

114 IP Version 6 Dec.1998, RFC 2460 Major upgrade due mainly to the impending address exhaustion, but also w/various other goals: Support billions of hosts Reduce routing table size Simplify protocol Better security Attention to type of service Aid multicasting Roaming host without changing address Allow future protocol evolution Permit coexistence of old and new protocols

115 IPv6 The header and is simpler, and it can use optional extension headers (EH): main header 40 Bytes Zero or more extension headers follow the main header All EHs are a multiple of 8 octets in size (may have to use padding!) EHs should appear at most once, except for the Destination Options header, which may appear twice. There are 8 EHs currently defined.

116 QUIZ Compare the Minimum size Maximum size of the IPv4 and IPv6 headers

117 IPv6 Implements Virtual Circuits (see p.358) QoS Header excluded, but extension headers included! 256 possible extension headers (in the last header it means L4 protocol like in IPv4) Identical to TTL from IPv4 CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011 No header checksum!

118 QUIZ Compare the Minimum size Maximum size of the IPv4 and IPv6 packets.

119 IPv6 The header has much longer addresses (128 vs. 32 bits) 40 Bytes Compare the number of possible IPv6 addresses with the number of bacteria living on earth, which is estimated to be 5,000,000,000,000,000,000,000,000,000,000. = Source:

120 IPv6 and the Internet of things The catch: Individual bulbs run in the $20 to $30 range!

121 IPv6 Extension Headers All routers along the path must examine it! E.g.: hop-by-hop header has an option for jumbogram # of Bytes is specified on 32 bits. Excludes main hdr., but includes all extension hdrs.

122 QUIZ What is the maximum size of an IPv6 packet if the jumbogram header is used?

123 Conclusion IPv6 improvements over IPv4 Longer addresses (128 bits vs. 32) Simpler header (7 fields vs. 13) Better support for options (extension headers) Native support for security: Authentication Privacy QOS (Quality of Service) The Diff.Serv. field defines traffic class. The Flow Label field supports VCs.

124 IPv6 vs. IPv4 IPv6 does not specify interoperability features with IPv4, but essentially creates a parallel, independent network. Exchanging traffic between the two networks requires translator gateways employing NAT64; or other transition technologies, such as tunneling protocols However, IPv6 is compatible with the auxiliary Internet protocols (see next Sec ) Deployment of IPv6 has been slow & painful, but is picking up pace now that IPv.4 addresses are exhausted. As of September 2013, about 4% of domain names and 16.2% of the networks on the internet have IPv6 protocol support.

125 IPv6 deployment IPv6 has been implemented on all major operating systems in use in commercial, business, and home consumer environments. Since 2008, DNS (domain name system) can be used in IPv6. IPv6 was first used in a major world event during the 2008 Summer Olympic Games, the largest showcase of IPv6 technology to date. Some governments (incl. U.S. and China) are starting to require IPv6 capability on their equipment. In 2009, Verizon mandated IPv6 operation and deprecated IPv4 as an optional capability for cellular (LTE) hardware. T-Mobile USA followed suit: as of June 2012, they support external IPv6 access.

126 5.6.4 Internet Control Protocols IP works with the help of several control protocols: ICMP is a companion to IP that returns error info Required, and used in many ways, e.g., for traceroute ARP finds Ethernet address of a local IP address Glue that is needed to send any IP packets Host queries an address and the owner replies DHCP assigns a local IP address to a host Gets host started by automatically configuring it Host sends request to server, which grants a lease

127 ICMP Main ICMP (Internet Control Message Protocol) types:

128 ARP: Address Resolution Prot.

129 ARP RFC 826 Routers do not forward Ethernet broadcasts (why?) but they can be configured for proxy ARP

130 QUIZ ARP Problem 35: You have just explained ARP to a friend, and (s)he says: ARP provides a service to the Network layer, so it s part of the data link layer. What do you reply?

131 DHCP RFC 2131, 2132 Host w/o IP address broadcasts DHCP DISCOVER pkt. DHCP server replies with DHCP OFFER pkt. Leasing is used to avoid inactive host hogging up addresses.

132 Read and understand sections through 5.6.4, and all the examples we gave today SKIP the remainder of Ch.5, starting with MPLS

133 Don t forget the homework is due next time! Homework for Ch.5 1, 2, 6, 7, 16, 24, 26, 27, 28, 30 Due Thu, April 21

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

Computer Networks. Main Functions

Computer Networks. Main Functions Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is Store-and-Forward packet switching? What is a connectionless

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage

More information

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

The Internet. Internet Technologies and Applications

The Internet. Internet Technologies and Applications The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

IP Addressing. IP Addresses. Introductory material.

IP Addressing. IP Addresses. Introductory material. IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Addresses (You should read Chapter 4 in Forouzan) Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Internet Protocols. Addressing & Services. Updated: 9-29-2012

Internet Protocols. Addressing & Services. Updated: 9-29-2012 Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013 CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Internet Protocol version 4 Part I

Internet Protocol version 4 Part I Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University

More information

Savera Tanwir. Internet Protocol

Savera Tanwir. Internet Protocol Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Classful IP Addressing (cont.)

Classful IP Addressing (cont.) Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]

More information

Chapter 19 Network Layer: Logical Addressing 19.1

Chapter 19 Network Layer: Logical Addressing 19.1 Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Lecture 8. IP Fundamentals

Lecture 8. IP Fundamentals Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series SUBNETTING CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets

IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13

More information

VLAN und MPLS, Firewall und NAT,

VLAN und MPLS, Firewall und NAT, Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was

More information

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information

Introduction to LAN/WAN. Network Layer (part II)

Introduction to LAN/WAN. Network Layer (part II) Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Routing Protocols (RIP, OSPF, BGP)

Routing Protocols (RIP, OSPF, BGP) Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

CHAPTER 3 STATIC ROUTING

CHAPTER 3 STATIC ROUTING CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing 19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected]

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected] SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination. Layer Introduction Datagrams and Virtual ircuits Routing Traffic ontrol Main Objective Data delivery from source to destination Node (Router) Application Presentation Session Transport Data Link Data Link

More information