Chapter 6. The Network Layer

Size: px
Start display at page:

Download "Chapter 6. The Network Layer"

Transcription

1 Chapter 6 The Network Layer 1

2 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented Service Comparison of Virtual-Circuit and Datagram Subnets 2

3 Store-and-Forward Packet Switching fig 5-1 The environment of the network layer protocols. 3

4 4

5 5

6 Implementation of Connectionless Service Routing within a diagram subnet. 6

7 Implementation of Connection-Oriented Service Routing within a virtual-circuit subnet. 7

8 8

9 Comparison of Virtual-Circuit and Datagram Subnets 5-4 9

10 Routing algorithms can be grouped into two classes: nonadaptive and adaptive 10

11 Routing Algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Link State Routing Hierarchical Routing Broadcast Routing Multicast Routing Routing for Mobile Hosts 11

12 Routing Algorithms (2) Conflict between fairness and optimality. 12

13 13

14 The Optimality Principle (a) A subnet. (b) A sink tree for router B. 14

15 15

16 Shortest Path Routing The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working node. 16

17 Flooding Flooding Algorithm: Every incoming packet is sent out on every outgoing line except the one its arrived on Methods for damming the flood (a) hop count (b) keeping track of which packets have been flooded (list of sequence numbers) Modified flooding algorithm: Selective flooding Application of the flooding algorithm (a) military (b) distribution of database (c) wireless networks (d) bench mark for other algorithm (shortest path) 17

18 Distance Vector Routing 1. Each router maintains a routing table, whose entry contains two parts: the preferred outgoing line to use for that destination and an estimate of the time or distance to that destination 2. The router is assumed to know the distance to each of its neighbors 3. Each router sends the routing table (destination, distance) to each neighbor ihb 4B 4. Based on the collected routing tables from the neighbors, ihb the router computes the shortest distance for each destination and update the routing table 18

19 Distance Vector Routing (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J. 19

20 Distance Vector Routing g( (2) Good news propagates fast Routers may take infinite number of exchanges to know bad news (a router was down) The count-to-infinity problem. 20

21 Link State Routing Each router must do the following: 1. Discover its neighbors, learn their network addresses. 2. Measure the delay or cost to each of its neighbors. 3. Construct a packet telling all it has just learned. 4. Send this packet to all other routers. 5. Compute the shortest path to every other router. 21

22 Learning about the Neighbors The LAN is modeled as a node (artificial) (a) Nine routers and a LAN. (b) A graph model of (a). 22

23 Measuring Line Cost A special ECHO packet is sent to the other side to measure the delay (with / without taking the load into account) A subnet in which the East and West parts are connected by two lines. 23

24 24

25 25

26 26

27 27

28

29 Distributing the Link State Packets Flooding is used to distribute the link state packet Over a router has accumulates a full set of link state packet, it can construct the entire subnet graph and compute the shortest path. The packet buffer for router B in the previous slide (Fig. 6-13). 29

30 Hierarchical Routing Hierarchical routing. 30

31 31

32

33 Multicast Routing (a) Anetwork network. (b) A spanning tree for the leftmost router. (c) A multicast tree for group 1. (d) A multicast tree for group 2. 33

34 Broadcast Routing Reverse path forwarding. (a) A subnet. (b) a Sink tree. (c) The tree built by reverse path forwarding. 34

35

36 36

37 37

38 Routing for Mobile Hosts (2) Packet routing for mobile users. 38

39 Routing in Ad Hoc Networks Possibilities i when the routers are mobile: 1. Military vehicles on battlefield. No infrastructure. 2. A fleet of ships at sea. All moving all the time 3. Emergency works at earthquake. The infrastructure destroyed. 4. A gathering of people with notebook computers. In an area lacking

40 Route Discovery a) (a) Range of A's broadcast. b) (b) After B and D have received A's broadcast. c) (c) After C, F, and G have received A's broadcast. d) (d) After E, H, and I have received A's broadcast. Shaded nodes are new recipients. Arrows show possible reverse routes. 40

41 Route Discovery y( (2) Format of a ROUTE REQUEST packet. 41

42 Route Discovery y( (3) Format of a ROUTE REPLY packet. 42

43 Route Maintenance (a) D's Ds routing table before G goes down. (b) The graph after G has gone down. 43

44 Node Lookup in Peer-to-Peer Networks ()A (a) set of 32 node identifiers arranged in a circle. The shaded d ones correspond to actual machines. The arcs show the fingers from nodes 1, 4, and 12. The labels on the arcs are the table indices. (b) Examples of the finger tables. 44

45 Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control lin Datagram Subnets Load Shedding Jitter Control 45

46 Congestion When too much traffic is offered, congestion sets in and performance degrades sharply. 46

47 General Principles of Congestion Control 1. Monitor the system. detect when and where congestion occurs. 2. Pass information to where action can be taken. 3. Adjust system operation to correct the problem. 47

48 Congestion Prevention Policies (timeout interval) 5-26 (input /output queue) (timeout interval) (selective repeat) (response time) Policies that affect congestion. 48

49 Congestion Control in Virtual-Circuit Subnets a. Admission control (no more new VC will be setup) b. New VCs are allowed only to bypass the congestion areas c. Resources (bandwidth, buffer,..) reservation (a) A congested subnet. (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B. 49

50 Congestion control in datagram subnets a. Each router estimates the availability of each output line. unew = auold + ( 1 a) a: updating period f: utilization of the line f b. Whenever u moves above the threshold, h some action will be taken c. The warning bit method d. Choke packets (to source) e. hop-by-hop choke packets 50

51 Hop-by-Hop Choke Packets (a) A choke packet that affects only the source. (b) A choke packet that affects each hop it passes through. h 51

52 Load shedding (discarding packets) a. wine policy (minimize i i retransmission) i b. milk policy (for multimedia, new is better) c. priority (discarding low priority packets) d. Random Early Detection (for wired subnet, the router discards the packets randomly, and the source should response lost packets by slowing down the transmission rate) 52

53 Jitter Control Jitter control is important for audio and video applications a. Routers adjust the transmission order of output packets b. For video on demand packets can be buffered at the receiver in advance (a) High jitter. (b) Low jitter. 53

54 Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS 54

55 Requirements 5-30 How stringent the quality-of-service requirements are. 55

56 ATM networks classify flows into four categories: 1. Constant bit rate (telephony) 2. Real-time variable bit rate ( compressed video) 3. Non-real-time variable bit rate (movie over Internet) 4. Available bit rate (file transfer) 56

57 Techniques for Achieving Good QOS 1. Over provisioning (over supply) 2. Buffering 3. Traffic shapping (agreement on certain traffic pattern) 4. The leaky bucket algorithm 5. The token bucket algorithm 6. Resource reservation 7. Admission control 8. Proportional routing 9. Packet scheduling 57

58 Buffering Smoothing the output stream by buffering packets. 58

59 59

60 60

61 61

62 The Leaky Bucket Algorithm (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) () 500 KB, (e) () 750 KB, (f) Output from a 500KB token bucket feeding a 10-MB/sec leaky bucket. 62

63 63

64 Resource reservation Three different kinds of resources can be reserved Bandwidth Buffer space CPU cycles 64

65 Because of random arrivals, and random service time distribution, queues can build up and delays can occur. Consider that packets arrives with Poisson distribution with mean packet/sec, the service time is exponential with μ packet/sec. The CPU can be modeled as an M/M/1 queue. The delay is given as ρ T = λ ρ = λ ( 1 ρ ) μ = 1 1 μ 1 ρ For example = λ = packets μ = packets / ρ = 0.95 T = 20μ sec onds / sec sec λ 65

66 Admission Control When the incoming traffic from some flow is well shaped, the capacity can be reserved in advance on the routers along the path. When a flow with flow specification (produced by the sender) is offered, the router along the router examines the flow specification and modifies the parameters as need be. Finally the acceptable flow specification (acceptable parameters) can be established. 66

67 An example of flow specification 5-34 maximum sustained rate average over a long time interval maximum capacity of the bucket maximum tolerated t transmission rate related related to protocols and processing time A router will map the parameters to a set of specific resource reservations 67

68 Proportional Routing To provide a high quality of service, the traffic can be split over multiple routes. A simple method is to divide the traffic equally or in proportion to the capacities of the outgoing links. 68

69 Packet Scheduling 1. Fair queueing algorithm The router has separate queues for each output line, one for each flow. When a line becomes idle, the router scans the queues round robins, taking the first packet on the nest queue. 2. Weighted fair queueing algorithm * for priority service (e.g. giving some servers more bandwidth) (a) A router with five packets queued for line O. (b) Finishing times for the five packets. 69

70 Integrated Services It was aimed at both unicast (streaming video) and multicast (digital television broadcasting) applications In many multicast applications groups can change membership dynamically. Under these conditions, the approach of having the senders reserve bandwidth in advance dose not work well. If the number of receivers are large, the dynamical grouping dose not work at all. 70

71 Integrated Services (flow-based algorithms) RSVP-The ReSerVation Protocol (a) Anetwork network, (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2. 71

72 RSVP-The ReSerVation Protocol (2) Already reserved When Host5 requests, new reservation is needed d (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1. 72

73 Differentiated services (class-based) Differentiated Service (DS) can be offered by a set of routers forming an administrative domain (e.g. an ISP or a Telco). The administration defined a set of service classes with corresponding forwarding rules. Some classes (e.g. premium service) with higher requirements may has better service than others. DS scheme does not require advance setup, resource reservation or time consuming end-to-end negotiation for each flow. This makes DS relatively easy to implement. For example, the operator reserves resources for all IP-phone users (the IP-phone class), on contrary, a flow-based scheme, each phone call gets its own resources and 73 guarantees.

74 Differentiated Services (class-based service) Expedited Forwarding Two queues for each output line, one for expedited packets and one for regular packets Expedited packets experience a traffic-free network. 74

75 Assured Forwarding The assured forwarding scheme which manages the service classes, specifies three packet discard d probabilities bili i and four priority classes, each class having its own resources. Taken together, three two factors define 12 service classes. Implementation procedure 1. Classify the packets into one of the four classes (on the sending host or the ingress router) 2. Mark the packets (type A service in IP, which is specified in the type of service field) 3. Pass the packets through a shaper/dropper filter (e.g. leaky buckets or token buckets) 75

76 Assured Forwarding A possible implementation of the data flow for assured forwarding. 76

77 Label Switching and MPLS This scheme adds a label in front each packet and does the routing based on the label rather than on the destination address. Making the label an index into an internal table makes finding the correct output line becomes just a matter of table lookup. (X, 25, ATM, frame relay and virtual circuits i did the similar il thing) 77

78 Label Switching and MPLS A new MPLS header is added in front of the IP header. On a router-to-router line using PPP as the framing protocol MPLS is layer 2.5 s: stacking multiple labels in hierarchical networks TTL: Time To Live Transmitting a TCP segment using IP, MPLS, and PPP. 78

79 1. MPLS headers are not part of the network layer packet or the data link layer frame 2. It is possible to build MPLS switches that can forward both IP packets and ATM cells 3. In the MPLS router, the label is used as an index into a table to determine the outgoing line to use and the new label to be used (label swapping) 4. The router may group multiple flows that end at a particular router (LAN) and use a single label l (Forwarding Equivalence Class, FEC) 5. No setup is needed for MPLS routing 79

80 6. Two ways to create the forwarding table. Dt Data-driven: di The hit router asks the router downstream to generate a label for the flow (for ATM subnet) Control-driven: di The router checks to see for which hihrouters it is the final destination. It then creates one or more FECs for them, allocates a label for each one, and passes the labels in their forwarding table and send new ones to their neighbors. 7. A packet may carry an entire stack of labels. The S bit is set to 1 for the bottom label and 0 for all the other labels. 80

81 Internetworking How Networks Differ How Networks Can Be Connected Concatenated Virtual Circuits Connectionless Internetworking Tunneling Internetwork Routing Fragmentation 81

82 82

83 Connecting Networks A collection of interconnected networks. 83

84 How Networks Differ 5-43 Some of the many ways networks can differ. 84

85 85

86 How Networks Can Be Connected (a) Two Ethernets connected by a switch. (b) Two Ethernets connected by routers. 86

87 87

88 88

89 89

90 90

91 an Autonomous System (AS) Each network in an internetwork is independent and is often referred to as 91

92 92

93 Fragmentation (a) Transparent fragmentation. (b) Nontransparent fragmentation. 93

94 Fragmentation (2) Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes. (b) Fragments after passing through a network with maximum packet size of 8 payload bytes plus header. (c) Fragments after passing through a size 5 gateway. 94

95 The Network Layer in the Internet The IP Protocol IP Addresses Internet Control Protocols OSPF The Interior Gateway Routing Protocol BGP The Exterior Gateway Routing Protocol Internet Multicasting Mobile IP IPv6 95

96 96

97 Design Principles for Internet 1. Make sure it works. 2. Keep it simple. 3. Make clear choices. 4. Exploit modularity. 5. Expect heterogeneity. 6. Avoid static options and parameters. (negotiation is preferred) 7. Look for a good design; it need not be perfect. 8. Be strict when sending and tolerant when receiving. 9. Think about scalability. 10. Consider performance and cost. 97

98 Collection of Subnetworks The Internet is an interconnected collection of many networks. 98

99 Fragment offset: Tell where in the current datagram this fragment belongs (A 13 maximum of 2 =8192 fragments per datagram) 99 Time to line: Packet lifetime 255 seconds

100 The IP Protocol (2) 5-54 Some of the IP options. 100

101 and Numbers) ICANN (Internet t Corporation for Assigned Names 101

102 102

103 Subnets Getting a new network address would be hard to do since network addresses are scarce. The problem is the rule that a single class A, B or C address refers to on network, not to a collection of LANs. To solve this problem is to allow a network to be split into several parts for internal use but still act like a single network to the outside world. In the Internet literature, the parts of the network (e.g. Ethernets) are called subnets. (Do not confuse with subnet used elsewhere) 103

104 Subnets A campus network consisting of LANs for various departments. 104

105 Subnets (2) To implement subnetting, the main router needs a subnet mask that indicates the split between network +subnet number and host. Subnet masks are also written in dotted decimal notation or (/number of bits). For example, the original 16-bit host number is split into 6-bit subnet number and 10-bit host number, allowing for up to 64 Ethernets, each with maximum of 1022 hosts (0 and -1 are not available) A class B network subnetted into 64 subnets. 105

106 106

107 CDR Classless InterDomain Routing The Internet is rapidly running out of IP addresses. One solution is CIDR which allocates the remaining IP addresses in variable-singed blocks. If a site needs 2000 addresses, it is given a block of 2048 addresses. For example, a set of IP addresses assignments is given as follows. A set of IP address assignments. 107

108 Dropping the classes makes forwarding more complicated. The network-based forwarding scheme is no longer applicable. A table look-up with address matching forwarding algorithm is devised. When the set of IP address is assigned to the three universities: Cambridge, Edinburgh and doxford. The router uses the mask to get the value which only matches Oxford address as The Oxford entry is used and the packet is sent along the line going to Oxford. A remote router, say Omaha, Nebraska, may use a single aggregate entry with a binary address and submask. 108

109 NAT Network Address Translation IP addresses are scarce. NAT is a quick fix. Each company is a assigned a few IP addresses for Internet traffic. Within the company, every computer gets a unique IP address for intramural traffic No packets containing these addresses may appear on the Internet. There are three reserved ranges. Most IP packets carry TCP or UPD payload, which have source port and destination port. NAT box will establish translation table based on the TCP or UPD source port and destination port. Placement and operation of a NAT box. 109

110 NAT can quickly solve the IP address shortage problem (even for ADSL, cable modem application) Here are some of the objections 1. NAT violates the architectural model of IP, i.e. every IP address identifies a single machine worldwide 2. NAT establish the translation table, which changes the Internet from connectionless to a kind of connection-oriented network 3. NAT violates the layer structure 4. NAT can only handle IP packets with TCP or UDP payload, not others 5. NAT will not work when IP addresses are inserted in the body of the text (e.g. FTP, H.323) 6. Each IP address can only map up to =61440 machines 7. Delay the implantation of IPV6 110

111 Internet Control Protocols (ICP) ICP includes ICMP, ARP, RARP, BOOTP, and DHCP Internet Control Message Protocol (I CMP) ICMP is used to test the internet and to report unexpected events Each ICMP message type is encapsulated in an IP packet. The principal ICMP message types. 111

112 112

113 When Host1 (E1) sends a packet to a user on Host2 ( ) by . The Domain Name System (DNS) will find the address corresponding to IP address

114 send all traffic for host 4 to the router, and this solution is called proxy ARP. 114

115 RARP, BOOTP, and DHCP Given an Ethernet address, what is the corresponding IP address? Reverse Address Resolution Protocol (RARP) allows a newlybooted workstation to broadcast its Ethernet address. The RARP server sees the request, looks up the file and sends back the corresponding IP address. RARP server is needed on each network, because the router will not forward the broadcost (all 1 s) packet. BOOTP uses UDP messages, however BOOTP requires manual configuration of tables mapping IP address to Ethernet address. 115

116 Dynamic Host Configuration Protocol (DHCP) DHCP allows both manual IP assignment and automatic assignment. agent Operation of DHCP. 116

117 OSPF-The Interior Gateway Routing Protocol Design principlesp 1. published algorithm 2. support variety of distance metrics, including physical distance, delay, etc. 3. dynamic, adapting to changes 4. support routing based on type of service 5. Do load balancing (load splitting) 6. support for hierarchical systems 7. security 117

118 6 118

119 119

120 120

121 121

122 122

123 123

124 124

125 125

126 126

127 127

128 128

129 129

130 130

131 131

132 132

133 Flow label will be used to allow a source and destination to setup a pseudo connection Next header tells which of the six extension headers Fig. The IPv6 fixed header (required) 133

134 IPv6 address 134

135 135

136 Extension Headers (2) To support of datagram exceeding 64KB The hop-by-hop extension header for large datagrams (jumbograms). 136

137 Extension Headers (3) The routing header lists one or more routers that must be visited The next header tells which of the six extension headers follow this one. If this header is the last IP header, then the Next header tells which transport protocol handler to pass the packet to The routing type field gives the format of the rest of the header. The segments left field keeps track of how many addresses have not yet been visited. When it hits 0, the packet is on its own (no more guidance). The extension header for routing. 137

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is Store-and-Forward packet switching? What is a connectionless

More information

Computer Networks. Main Functions

Computer Networks. Main Functions Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

Introduction to LAN/WAN. Network Layer (part II)

Introduction to LAN/WAN. Network Layer (part II) Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

The Network Layer Functions: Congestion Control

The Network Layer Functions: Congestion Control The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Internet Protocol version 4 Part I

Internet Protocol version 4 Part I Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult: How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

Internet Protocols. Addressing & Services. Updated: 9-29-2012

Internet Protocols. Addressing & Services. Updated: 9-29-2012 Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Multimedia Requirements. Multimedia and Networks. Quality of Service

Multimedia Requirements. Multimedia and Networks. Quality of Service Multimedia Requirements Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Transfer/Control Protocols Quality of Service

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

The Internet. Internet Technologies and Applications

The Internet. Internet Technologies and Applications The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected]

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected] SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]

More information

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

DG Forwarding Algorithm

DG Forwarding Algorithm DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell [email protected] our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Savera Tanwir. Internet Protocol

Savera Tanwir. Internet Protocol Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information