;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

Size: px
Start display at page:

Download ";. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON."

Transcription

1 ;. ' ;. - ' Computer Networking ^4 Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic University, Brooklyn PEARSON Addison Weslev Boston San Francisco N e w York London Toronto Sydney Tokyo Singapore Madrid Mexico City Munich Paris Cape Town H o n g Kong Montreal

2 Chapter 1 Computer Networks and the Internet What Is the Internet? A Nuts-and-Bolts Description A Services Description What Is a Protocol? The Network Edge Client and Server Programs Access Networks Physical Media The Network Core Circuit Switching and Packet Switching How Do Packets Make Their Way Through Packet-Switched Networks? ISPs and Internet Backbones Delay, Loss, and Throughput in Packet-Switched Networks Overview of Delay in Packet-Switched Networks Queuing Delay and Packet Loss End-to-End Delay Throughput in Computer Networks Protocol Layers and Their Service Models Layered Architecture Messages, Segments, Datagrams, and Frames Networks Under Attack History of Computer Networking and the Internet The Development of Packet Switching: Proprietary Networks and Internetworking: A Proliferation of Networks: The Internet Explosion: The 1990s Recent Developments Summary 65 Road-Mapping This Book 66 XVII

3 xviii Table of Contents Homework Problems and Questions 67 Problems 69 Discussion Questions 75 Ethereal Lab 76 Interview: Leonard Kleinrock 78 Chapter 2 Application Layer Principles of Network Applications Network Application Architectures Processes Communicating Transport Services Available to Applications Transport Services Provided by the Internet Application-Layer Protocols Network Applications Covered in This Book The Web and HTTP OverviewofHTTP Non-persistent and Persistent Connections HTTP Message Format User-Server Interaction: Cookies Web Caching The Conditional GET File Transfer: FTP FTP Commands and Replies Electronic Mail in the Internet SMTP Comparison with HTTP Mail Message Formats and MIME Mail Access Protocols DNS The Internet's Directory Service Services Provided by DNS Overview of How DNS Works DNS Records and Messages Peer-to-Peer Applications P2P File Distribution Searching for Information in a P2P Community Case Study: P2P Internet Telephony with Skype Socket Programming with TCP Socket Programming with TCP An Example Client-Server Application in Java Socket Programming with UDP Summary 177

4 xix Homework Problems and Questions 178 Problems 180 Discussion Questions 187 Socket Programming Assignments 188 Ethereal Labs 190 Interview: Bram Cohen 192 Chapter 3 Transport Layer Introduction and Transport-Layer Services Relationship Between Transport and Network Layers Overview of the Transport Layer in the Internet Multiplexing and Demultiplexing Connectionless Transport: UDP UDP Segment Structure UDP Checksum Principles of Reliable Data Transfer Building a Reliable Data Transfer Protocol Pipelined Reliable Data Transfer Protocols Go-Back-N (GBN) Selective Repeat (SR) Connection-Oriented Transport: TCP The TCP Connection TCP Segment Structure Round-Trip Time Estimation and Timeout Reliable Data Transfer Flow Control TCP Connection Management Principles of Congestion Control The Causes and the Costs of Congestion Approaches to Congestion Control Network-Assisted Congestion-Control Example: ATM ABR Congestion Control TCP Congestion Control Fairness Summary 290 Homework Problems and Questions 293 Problems 295 Discussion Questions 304 Programming Assignments 305 Ethereal Labs 305 Interview: Sally Floyd 307

5 Chapter 4 The Network Layer Introduction Forwarding and Routing Network Service Models Virtual Circuit and Datagram Networks Virtual-Circuit Networks Datagram Networks Origins of VC and Datagram Networks What's Inside a Router? Input Ports Switching Fabric Output Ports Where Does Queuing Occur? The Internet Protocol (IP): Forwarding and Addressing in the Internet Datagram Format IPv4 Addressing Internet Control Message Protocol (ICMP) IPv A Brief Introduction into IP Security VPNs Routing Algorithms The Link-State (LS) Routing Algorithm The Distance-Vector (DV) Routing Algorithm Hierarchical Routing Routing in the Internet Intra-AS Routing in the Internet: RIP Intra-AS Routing in the Internet: OSPF Inter-AS Routing: BGP Broadcast and Multicast Routing Broadcast Routing Algorithms Multicast Summary 415 Homework Problems and Questions 416 Problems 419 Discussion Questions 429 Programming Assignment 430 EtherealLabs 431 Interview: Vinton G. Cerf 432 Chapter 5 The Link Layer and Local Area Networks Link Layer: Introduction and Services The Services Provided by the Link Layer Where Is the Link Layer Implemented? 440

6 xxi 5.2 Error-Detection and -Correction Techniques ParityChecks Checksumming Methods Cyclic Redundancy Check (CRC) Multiple Access Protocols Channel Partitioning Protocols Random Access Protocols Taking-Turns Protocols Local Area Networks (LANs) Link-Layer Addressing MACAddresses Address Resolution Protocol (ARP) Ethernet Ethernet Frame Structure CSMA/CD: Ethernet's Multiple Access Protocol Ethernet Technologies Link-Layer Switches Forwarding and Filtering Self-Learning Properties of Link-Layer Switching Switches Versus Routers PPP: The Point-to-Point Protocol PPP Data Framing Link Virtualization: A Network as a Link Layer Asynchronous Transfer Mode (ATM) Networks Multiprotocol Label Switching (MPLS) Summary 500 Homework Problems and Questions 501 Problems 503 Discussion Questions 508 Ethereal Labs 509 Interview: Simon S. Lam 510 Chapter 6 Wireless and Mobile Networks Introduction Wireless Links and Network Characteristics CDMA WiFi: Wireless LANs The Architecture The MAC Protocol The IEEE Frame Mobility in the Same IP Subnet 541

7 xxii Table of Contents Advanced Features in Beyond : Bluetooth and WiMAX Cellular Internet Access An Overview of Cellular Architecture Cellular Standards and Technologies: A Brief Survey Mobility Management: Principles Addressing Routing to a Mobile Node Mobile IP Managing Mobility in Cellular Networks Routing Calls to a Mobile User Handoffs in GSM Wireless and Mobility: Impact on Higher-layer Protocols Summary 578 Homework Problems and Questions 579 Problems 580 Discussion Questions 584 Ethereal Labs 584 Interview: Charlie Perkins 585 Chapter 7 Multimedia Networking Multimedia Networking Applications Examples of Multimedia Applications Hurdles for Multimedia in Today's Internet How Should the Internet Evolve to Support Multimedia Better? Audio and Video Compression Streaming Stored Audio and Video Accessing Audio and Video Through a Web Server Sending Multimedia from a Streaming Server to a Helper Application Real-Time Streaming Protocol (RTSP) Making the Best of the Best-Effort Service The Limitations of a Best-Effort Service Removing Jitter at the Receiver for Audio Recovering from Packet Loss Distributing Multimedia in Today's Internet: Content Distribution Networks Dimensioning Best-Effort Networks to Provide Quality of Service Protocols for Real-Time Interactive Applications RTP RTP Control Protocol (RTCP) 628

8 xxiii SIP H Providing Multiple Classes of Service Motivating Scenarios Scheduling and Policing Mechanisms Diffserv Providing Quality of Service Guarantees A Motivating Example Resource Reservation, Call Admission, Call Setup Guaranteed QoS in the Internet: Intserv and RSVP Summary 664 Homework Problems and Questions 665 Problems 666 Discussion Questions 673 Programming Assignment 674 Interview: Henning Schulzrinne 676 Chapter 8 Security in Computer Networks What Is Network Security? Principles of Cryptography Symmetrie Key Cryptography Public Key Encryption Message Integrity Cryptographic Hash Functions Message Authentication Code Digital Signatures End-Point Authentication Authentication Protocol apl.o Authentication Protocol ap Authentication Protocol ap Authentication Protocol ap Authentication Protocol ap Authentication Protocol ap Securing Secure PGP Securing TCP Connections: SSL The Big Picture A More Complete Picture Network-Layer Security: IPsec Authentication Header (AH) Protocol The ESP Protocol 731

9 xxiv Table of Contents SA and Key Management Securing Wireless LANs Wired Equivalent Privacy (WEP) IEEE802.11i Operational Security: Firewalls and Intrusion Detection Systems Firewalls Intrusion Detection Systems Summary 748 Homework Problems and Questions 749 Problems 750 Discussion Questions 753 Ethereal Lab 754 Interview: Steven M. Bellovin 755 Chapter 9 Network Management What Is Network Management? The Infrastructure for Network Management The Internet-Standard Management Framework Structure of Management Information: SMI Management Information Base: MIB SNMP Protocol Operations and Transport Mappmgs Security and Administration ASN.l Conclusion 786 Homework Problems and Questions 787 Problems 787 Discussion Questions 788 Interview: Jeff Case 789 References Index

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst CMPSCI 453 Computer Networking Professor V. Arun Department of Computer Science University of Massachusetts Amherst 1 What is this course about? introductory (first) course in computer networking q learn

More information

CS 5480 Computer Networks

CS 5480 Computer Networks CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks

More information

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

How To Understand And Understand Network Theory

How To Understand And Understand Network Theory University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

CDA 4504 -- Introduction to Computer Networks

CDA 4504 -- Introduction to Computer Networks CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

PART-A Questions. 9. What are the two parts of message inside the envelope?

PART-A Questions. 9. What are the two parts of message inside the envelope? PART-A Questions 1. Differentiate between internet and intranet. 2. What are the two types of spread spectrum? 3. Define hamming distance. 4. What are carrier sense protocols? 5. What are the two types

More information

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2010, to make the next catalog (2011-12) production DATE (CHANGE DATE EACH TIME REVISED):

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Chapter 32 Internet Security

Chapter 32 Internet Security Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Communication Networks MAP-TELE 2012/13

Communication Networks MAP-TELE 2012/13 Communication Networks MAP-TELE 2012/13 Objective of the course The main objective of the course is to present the fundamentals of modern communication systems and networks and allow students to consolidate

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Computer System Design: Laws, Principles, Trends - II

Computer System Design: Laws, Principles, Trends - II Computer System Design: Laws, Principles, Trends - II Presenter: Sandeep K. S. Gupta Reference: -Computer Networking: A Top-Down Approach, 5ed, Ross and Kurose. -Computer Organization and Design: The Hardware/Software

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information

The Internet. Internet Technologies and Applications

The Internet. Internet Technologies and Applications The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking

More information

CSE 3214: Computer Network Protocols and Applications

CSE 3214: Computer Network Protocols and Applications CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic (vlajic@cse.yorku.ca)

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

User Datagram Protocol - Wikipedia, the free encyclopedia

User Datagram Protocol - Wikipedia, the free encyclopedia Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers

More information

Advanced Internetworking

Advanced Internetworking Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Introduction to IP networking

Introduction to IP networking DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

VLAN und MPLS, Firewall und NAT,

VLAN und MPLS, Firewall und NAT, Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Third Edition Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 vi Тор-Down Network Design Contents at a Glance Introduction xxii Part I Identifying

More information

Audio and Video for the Internet

Audio and Video for the Internet RTP Audio and Video for the Internet Colin Perkins TT rvaddison-wesley Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney 'lokyo Singapore Mexico City CONTENTS PREFACE

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

CPSC 4550 Computer Networks Fall 2012, Section 0

CPSC 4550 Computer Networks Fall 2012, Section 0 CPSC 4550 Computer Networks Fall 2012, Section 0 Course: CPSC4550, Section 0, CRN 42534 Title: Computer Networks Class Schedule: Classroom-Internet, Time-Internet Credit: 3 Faculty: Dr. Li Yang Office:

More information

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs : Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay

More information

Principles of Network Applications. Dr. Philip Cannata

Principles of Network Applications. Dr. Philip Cannata Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

IP, Ethernet and MPLS

IP, Ethernet and MPLS IP, Ethernet and MPLS Networks Resource and Fault Management Andre Perez ISTE WILEY Table of Contents Preface xi Chapter 1. Network Operation 1 1.1. Basic concepts 1 1.1.1. Layered structure 1 1.1.2. LANs

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $100,000 % ISP intranet % % % backbone satellite link desktop computer: server: network

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Interactive telecommunication between people Analog voice

Interactive telecommunication between people Analog voice History background on Circuit switch and Packet based switch network Telephony Interactive telecommunication between people Analog voice Transmitter/receiver continuously in contact with electronic circuit

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

Content Networking Fundamentals

Content Networking Fundamentals Content Networking Fundamentals Silvano Da Ros Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA X Contents Introduction Part I Overview of Content Networking 3 Chapter 1 Introducing Content

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Lesson: TANDBERG and IP

Lesson: TANDBERG and IP Welcome to the TANDBERG University prerequisite. Before commencing you are requested to ensure that you have completed the Introduction to the TANDBERG University elearning Experience Module that is available

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

International Telecommunication Union. IETF Security Work. Magnus Nyström. Technical Director, RSA Security Presentation made on behalf of the IETF

International Telecommunication Union. IETF Security Work. Magnus Nyström. Technical Director, RSA Security Presentation made on behalf of the IETF International Telecommunication Union IETF Security Work Magnus Nyström Technical Director, RSA Security Presentation made on behalf of the IETF Background Internet Engineering Task Force o International

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Multimedia Networking and Network Security

Multimedia Networking and Network Security CMPT371 12-1 Multimedia Networking and Network Security 1 Multimedia Networking and Network Security This note is based on Chapters 7 and 8 of the text book. Outline of multimedia networking Multimedia

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the

More information

End-to-End QoS Network Design

End-to-End QoS Network Design End-to-End QoS Network Design Tim Szigeti, CCIE No. 9794, and Christina Hattingh Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Table of Contents Introduction xxii Part I Introduction

More information

Managing (VoIP) Applications DYSWIS

Managing (VoIP) Applications DYSWIS Managing (VoIP) Applications DYSWIS Henning Schulzrinne Dept. of Computer Science Columbia University July 2005 DYSWIS 1 Overview User experience for VoIP still inferior Existing network management doesn

More information