Introduction to Internetworking
|
|
- Lydia Spencer
- 5 years ago
- Views:
Transcription
1 Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023
2 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any network.
3 Can t we just scale up LANs?
4 Can t we just scale up LANs? You can connect a lot of Ethernet segments together, just refreshing the signal Problem: all hosts hear all traffic, so that doesn t scale well. You can connect a lot of Ethernet segments together by tracking where hosts are Switches learn where hosts are by listening. Traffic only goes where it needs to go. Problem: each switch needs to learn where every host is. Lots of state Packets still go everywhere until switches learn.
5 Can t we just scale up LANs? You can connect a lot of Ethernet segments together, just refreshing the signal Problem: all hosts hear all traffic, so that doesn t scale well. You can connect a lot of Ethernet segments together with switches, tracking where hosts are Switches learn where hosts are by listening. Traffic only goes where it needs to go. Problem: each switch needs to learn where every host is. Lots of state Packets still go everywhere until switches learn.
6
7 Default answer to all systems problems: If it doesn t scale, add hierarchy. If it doesn t go fast enough, add a cache. 7
8 Default answer to all systems problems: If it doesn t scale, add hierarchy. If it doesn t go fast enough, add a cache. 8
9 Two-layer Internet Hierarchy 1. Connect hosts together into Local-Area Networks (LANs) Eg. Ethernet, WiFi, etc LAN addresses responsible for getting packets to each host on that LAN. 2. Add a router to each LAN; connect routers together to form a Wide-Area Network (WAN) Add an extra layer that s responsible for getting packets between LANs: an Internetwork protocol.... host host host... host host host LAN 1 LAN 2 router router router WAN WAN
10 Addressing Within a LAN: flat MAC addresses No structure. Can just plug any computer in anywhere. Between LANs: structured IP addresses All computers on the same LAN have close network addresses Routers only need to know how to reach a LAN, not which computers are on that network
11 Basic Internet Design Principles Layering Best effort service model End-to-end principle Datagram packet forwarding One internetwork protocol
12 Basic Internet Design Principles Layering Best effort service model End-to-end principle Datagram packet forwarding One internetwork protocol
13 Datagram Packet Forwarding Divide messages into a sequence of datagrams Network deals with each datagram individually Each datagram carries enough information to allow any switch to decide how to get it to its destination Each datagram must contain all relevant network information in its header: Every packet contains complete destination address Routers consult forwarding table Process of building forwarding tables: routing
14 Routers Routers are more powerful switches that use IP addresses to forward packets across the Internet What does a router consist of? Set of interfaces where packets arrive, and from which should depart Some form of interconnect between interfaces host host... host host host... host LAN 1 router router router WAN WAN LAN 2 Router
15 Routers Routers are more powerful switches that use IP addresses to forward packets across the Internet What does a router do? Talk to other routers to figure out paths Forward packets to corresponding output interface host host... host host host... host LAN 1 router router router WAN WAN LAN 2 Router
16 Why Datagram Packet Forwarding? 1. Achieve higher levels of utilization Statistical multiplexing: provision for upper end of expected demand, not worst-case demand 2. Avoid per-flow state inside the network Plenty of routing state, but no finer-grained (e.g., perapplication) state Enables robust failover if paths fail Helps scaling
17 IP: One Networking Layer Protocol Design goal #1 of the Internet: Connect existing heterogeneous networks together IP unifies the architecture of the network of networks As long as applications can run over IP, they can run on any network As long as networks support IP, they can run any application WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP!! ethernet PPP! CSMA async sonet...! copper fiber radio...!
18 IP: One Networking Layer Protocol Design goal #1 Corollary: of the Internet: Connect existing To run heterogeneous over all networks, IP must be very networks together undemanding of the underlying networks. To support all applications, IP must TCP provide UDP! IP unifies the architecture of the network! of networks a very simple service. WWW phone...! SMTP HTTP RTP...! IP! As long as applications can run over IP, they can run on any network As long as networks support IP, they can run any application! ethernet PPP! CSMA async sonet...! copper fiber radio...!
19 RFC 1149: IP over Avian Carriers First implementa7on of RFC 1149 by Bergen Linux Users Group 20
20 RFC 1149: IP over Avian Carriers First implementa7on of RFC 1149 by Bergen Linux Users Group 21
21 Let s design the Internet Protocol (IP)
22 IP Header We ll add an IP header to each packet. Carried across each link in a link-layer (L2) packet such as Ethernet. IP header stays (mostly) the same as the packet traverses between networks. FDDI link Ethernet link Router 2 Router 1 Sender
23 IP Header We ll add an IP header to each packet. Carried across each link in a link-layer (L2) packet such as Ethernet. IP header stays (mostly) the same as the packet traverses between networks. Ethernet header IP header to R1 to Dst IP payload FDDI link Ethernet link Router 2 Router 1 Sender
24 IP Header We ll add an IP header to each packet. Carried across each link in a link-layer (L2) packet such as Ethernet. IP header stays (mostly) the same as the packet traverses between networks. FDDI header IP header to R2 to Dst IP payload FDDI link Ethernet link Router 2 Router 1 Sender
25 IP Header We ll add an IP header to each packet. Carried across each link in a link-layer (L2) packet such as Ethernet. IP header stays (mostly) the same as the packet traverses between networks. FDDI header IP header to R2 to Dst IP payload Ethernet link FDDI link Destination Router 2 Router 1
26 IP Header We ll add an IP header to each packet. Carried across each link in a link-layer (L2) packet such as Ethernet. IP header stays (mostly) the same as the packet traverses between networks. Ethernet header IP header to D to Dst IP payload Ethernet link FDDI link Destination Router 2 Router 1
27 IP Header (2) IP header needs to contain the destination address. Routers will look at this to decide where next to forward the packet. What else should be in the IP header?
28 What else should be in the IP header? Some questions to consider: How will you reply to the packet? How does the recipient know what to do with the packet? How big can a packet be? What happens if the routers get confused? Are some packets more important than others? What happens if a packet gets corrupted?
29 How will you reply to the packet? To reply, you need to know the source address of the packet. Do you need this in the IP header? Advantages: One common way to find out the source. Can be used to scope other identifiers to uniquely identify a conversation. Disadvantages: Waste bits in every packet. Could just send once at the start of a conversation, and use some conversation ID after that. On balance, simpler to include source address.
30 How does the recipient know what to do with the packet? We re going to build many protocols on top of IP. Reliable transport (TCP) Unreliable transport (UDP) Tunnelling (GRE), Control (ICMP), etc Need some way to tell the recipient which software (for which protocol) to hand the packet to. Solution: Include a next protocol ID in the IP header. Have well-defined values: TCP=6, UDP=17, etc.
31 How does the recipient know what to do with the packet? We re going to build many protocols on top of IP. Reliable transport (TCP) Unreliable transport (UDP) Tunnelling (GRE), Control (ICMP), etc Need some way to tell the recipient which software (for which protocol) to hand the packet to. Solution: Include a next protocol ID in the IP header. Have well-defined values: TCP=6, UDP=17, etc.
32 How big can a packet be? We d like to allow reasonably large IP packets. Can we allow arbitrary packet size?
33 How big can a packet be? We d like to allow reasonably large IP packets. Problem: Many link technologies have a maximum frame size. This differs depending on the link type. Assume we don t want to design for smallest known maximum frame size, a priori: What happens if a smaller one comes along later?
34 How big can a packet be? (2) Problem: Packet is too big Solution: IP fragmentation If a packet arrives at a router, and it s too big for the next link, have the router split the packet into smaller packets that will fit. New problem: Who puts it back together again?
35 Who puts fragments back together again? Host A MTU=1000B R1 MTU=500B MTU=1000B Host B 1000 R2 MTU = Maximum Transfer Unit
36 Who puts fragments back together again? Host A MTU=1000B R1 MTU=500B MTU=1000B Host B R2 MTU = Maximum Transfer Unit
37 Who puts fragments back together again? Host A MTU=1000B R1 MTU=500B MTU=1000B Host B R2 MTU = Maximum Transfer Unit
38 Who puts fragments back together again? Host A MTU=1000B R1 MTU=500B MTU=1000B Host B 1000 MTU = Maximum Transfer Unit R
39 Who puts fragments back together again? Answer #1: within the network, with no help from end-host B (receiver) Host A MTU=1000B R1 MTU=500B MTU=1000B Host B R MTU = Maximum Transfer Unit
40 Who puts fragments back together again? Answer #1: within the network, with no help from end-host B (receiver) Answer #2: at end-host B (receiver) with no help from the network Host A MTU=1000B R1 MTU=500B MTU=1000B Host B 1000 MTU = Maximum Transfer Unit R
41 Who puts fragments back together again? Answer #1: within the network, with no help from end-host B (receiver) Answer #2: at end-host B (receiver) with no help from the network Host A MTU=1000B R1 MTU=500B MTU=1000B Host B 1000 MTU = Maximum Transfer Unit R
42 Let s consider a slightly more complex case Answer #1: within the network, with no help from end-host B (receiver) Answer #2: at end-host B (receiver) with no help from the network Host A MTU=1000B R1 MTU=500B R3 MTU=1000B Host B R2 MTU = Maximum Transfer Unit
43 Fragments can take different paths... Answer #1: within the network, with no help from end-host B (receiver) Answer #2: at end-host B (receiver) with no help from the network Host A MTU=1000B R1 MTU=500B R3 500 MTU=1000B Host B R MTU = Maximum Transfer Unit
44 We must reassemble at the receiver Answer #1: within the network, with no help from end-host B (receiver) Answer #2: at end-host B (receiver) with no help from the network Host A MTU=1000B R1 MTU=500B R3 500 MTU=1000B Host B R MTU = Maximum Transfer Unit
45 We must reassemble at the receiver Answer #1: within the network, with no help from end-host B (receiver) Answer #2: at end-host B (receiver) with no help from the network Only the receiver is guaranteed to be on all the possible paths taken by fragments. MTU=1000B R3 MTU=1000B MTU=500B Receiver buffers fragmented packets until R1 500 all fragments arrive, and reassembles fragments before passing them to upper layer Host A 1000 MTU = Maximum Transfer Unit 500 R Host B 1000
46 What happens if the routers get confused? Routers talk to each other to figure out how to get to a destination network D S is sending to D S
47 What happens if the routers get confused? Routers talk to each other to figure out how to get to a destination network. What happens if they temporarily have inconsistent state? D S is sending to D S
48 What happens if the routers get confused? Routers talk to each other to figure out how to get to a destination network. What happens if they temporarily have inconsistent state? Link 2-3 fails D S
49 What happens if the routers get confused? Routers talk to each other to figure out how to get to a destination network. What happens if they temporarily have inconsistent state? Link 2-3 fails D S Routers 4 and 5 don t know about the failure yet and s7ll try to use old path 7
50 What happens if the routers get confused? Routers talk to each other to figure out how to get to a destination network. What happens if they temporarily have inconsistent state? Routers 1 and 2 know about a route that s7ll works and switch to that Link 2-3 fails D S Routers 4 and 5 don t know about the failure yet and s7ll try to use old path 7
51 What happens if the routers get confused? Routers talk to each other to figure out how to get to a destination network. What happens if they temporarily have inconsistent state? D S 4 5 Traffic from S to D loops un7l: it s dropped due to massive conges7on router 4 learns about the failure 6 7
52 What happens if the routers get confused? Solution: Add a counter to packets Have each router decrease the counter by one If the counter reaches zero, drop the packet... and send an ICMP time exceeded message back to the source In IP packets, we call this counter time-to-live (TTL)
53 Are some packets more important than others?
54 Are some packets more important than others? When packets arrive too fast at a router, they ll have to queue. queue of packets waiting to cross the link Do we need a way for some important packets to jump the queue?
55 Are some packets more important than others? Do we need a way for some important packets to jump the queue? It s easy to add a priority field to packets. Higher priority packets overtake lower priority ones at a queue. It s harder to police who gets high priority. Do you want to pay more to get high priority? Packets traverse many networks. Whom do you pay?
56 Are some packets more important than others? Do we need a way for some important packets to jump the queue? It s easy to add a priority field to packets. Higher priority packets overtake lower priority ones at a queue. It s harder to police who gets high priority. Do you want to pay more to get high priority? Packets traverse many networks. Who to pay?
57 What happens if a packet gets corrupted? Most errors will be detected by the link CRC. Some may escape detection (e.g. bit flipped in router memory). Do we care? Punt to higher layer protocol? Only the application knows how much error detection overhead is appropriate. Checksum in IP? Avoids misrouted packets if destination address corrupted General solution protects all application protocols Solution: End-to-end argument implies don t checksum payload. Add simple checksum protecting IP header only to avoid misrouting.
58 What happens if a packet gets corrupted? Most errors will be detected by the link CRC. Some may escape detection (e.g. bit flipped in router memory). Do we care? Punt to higher layer protocol? Only the application knows how much error detection overhead is appropriate. Checksum in IP? Avoids misrouted packets if destination address corrupted General solution protects all application protocols Solution: End-to-end argument implies don t checksum payload. Add simple checksum protecting IP header only to avoid misrouting.
59 What happens if a packet gets corrupted? Most errors will be detected by the link CRC. Some may escape detection (e.g. bit flipped in router memory). Do we care? Punt to higher layer protocol? Only the application knows how much error detection overhead is appropriate. Checksum in IP? Avoids misrouted packets if destination address corrupted General solution protects all application protocols Solution: End-to-end argument implies don t checksum payload. Add simple checksum protecting IP header only to avoid misrouting.
60 The IP Packet Header
61 The IP Packet Header Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Ident, Don t Frag / More Frag flags & offset: used for fragmentation Options: extra stuff to extend IP
62 The IP Packet Header Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes Ident, Don t Frag / More Frag flags & offset: used for fragmentation TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Options: extra stuff to extend IP
63 The IP Packet Header Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes Ident, Don t Frag / More Frag flags & offset: used for fragmentation TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Options: extra stuff to extend IP
64 The IP Packet Header Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes Ident, Don t Frag / More Frag flags & offset: used for fragmentation TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Options: extra stuff to extend IP
65 The IP Packet Header Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes Ident, Don t Frag / More Frag flags & offset: used for fragmentation TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Options: extra stuff to extend IP
66 The IP Packet Header Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes Ident, Don t Frag / More Frag flags & offset: used for fragmentation TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Options: extra stuff to extend IP
67 The IP Packet Header SourceAddr, DestinationAddr: IP addresses of packet source and destination. Version: Indicates the version of the IP protocol (4 for this) HLen: Number of 32-bit words in the header 5 (20 bytes) if no options present. Type of Service: Allows some packets to be treated differently Length of packet in bytes Ident, Don t Frag / More Frag flags & offset: used for fragmentation TTL: time to live counter Protocol: next layer, eg TCP Checksum: only covers header Options: extra stuff to extend IP
68 Designing IP Addresses Question #1: what should an address be associated with? e.g., a telephone number is associated not with a person, but with a handset Question #2: what structure should addresses have? What are the implications of different types of structure? Question #3: who determines the particular addresses used in the global Internet? What are the implications of how this is done?
69 IPv4 Addresses A unique 32-bit number Uniquely identifies and associated with an interface (on a host, on a router,...) For humans, represented in dotted-quad notation a.b.c.d where each component is an eight-bit decimal number between zero and 255 e.g
70 Structure of Internet Addresses Original Internet address structure First eight bits: network address block (/8) Last 24 bits: host address 8 24 Network Host Assumed 256 networks were more than enough! (They weren t )
71 Next Design: Classful Addressing Constrain network, host parts to be fixed lengths Class A: Very large blocks (e.g., IBM, MIT, HP have /8 s) Class B: Large blocks (e.g., medium-sized organizations) Class C: Small blocks (e.g., very small organizations) Class A: Networks Hosts/network million Class B: 16,384 65,534 Class C: 2 million 254
72 Address Classes Inhibited Growth Class C networks too small for mid-sized organizations, so most organizations got a class B Resulting demand lead to scarcity of class B networks If network reaches the physical size limit imposed by the link layer, then need to allocate a new network address block to that organization, even though it hasn t filled its class B block! Number of networks Hosts/network Class A million Class B 16,384 65,535 Class C 2 million 256
73 Addressing in Today s Internet: CIDR Classless Interdomain Routing Classless: CIDR removes the constraint on network, host address size Flexible boundary between network, host addresses, resulting in high address assignment efficiency
74 CIDR Addressing Use two 32-bit numbers to represent a network. Network number = IP address AND mask IP address: IP mask: Address: Mask: Network number Host part Mask must be a contiguous prefix of 1s, starting from the most significant bit, then 0s thereafter; this gives rise to a mask length Written as network number/mask length; e.g /15 or 12.4/15
75 CIDR: Hierarchal Address Allocation Prefixes are key to Internet scalability Addresses allocated in contiguous chunks (prefixes) Routing protocols and packet forwarding based on prefixes / / / / / / / / / / / / / /17
76 CIDR Scalability: Address Aggregation Customer # /24 Customer # /24 Customer # /24 Customer # /24 Provider A Provider B Send me anything with addresses beginning /20 Send me anything with addresses beginning /16 Routers in the rest of Internet just need to know how to reach /20 Provider A can then direct packets to the correct customer Internet
77 Forwarding Packets Link 1 Provider A Link 4 Link 2 Link 3 Customer 1 Customer 2 Customer 3 Customer / / / /23 Prefix Link /22 Link /24 Link /24 Link /23 Link 4
78 Prefix Matching in Routers Packets only contain addresses, not prefix lengths. Route information in routers contains addresses with prefix lens / / / /23 Consider incoming packet with dest : First 21 bits match four partial prefixes First 22 bits match three partial prefixes First 23 bits match two partial prefixes First 24 bits match exactly one full prefix
79 Prefix Matching in Routers Packets only contain addresses, not prefix lengths. Route information in routers contains addresses with prefix lens / / / /23 Consider incoming packet with dest : First 21 bits match four partial prefixes First 22 bits match three partial prefixes First 23 bits match two partial prefixes First 24 bits match exactly one full prefix
80 Prefix Matching in Routers Packets only contain addresses, not prefix lengths. Route information in routers contains addresses with prefix lens / / / /23 Consider incoming packet with dest : First 21 bits match four partial prefixes First 22 bits match three partial prefixes First 23 bits match two partial prefixes First 24 bits match exactly one full prefix
81 Prefix Matching in Routers Packets only contain addresses, not prefix lengths. Route information in routers contains addresses with prefix lens / / / /23 Consider incoming packet with dest : First 21 bits match four partial prefixes First 22 bits match three partial prefixes First 23 bits match two partial prefixes First 24 bits match exactly one full prefix
82 Prefix Matching in Routers Packets only contain addresses, not prefix lengths. Route information in routers contains addresses with prefix lens / / / /23 Consider incoming packet with dest : First 21 bits match four partial prefixes First 22 bits match three partial prefixes First 23 bits match two partial prefixes First 24 bits match exactly one full prefix
83 Is Exact Matching All We Need? Customer # /24 Customer # /24 Customer # /24 Customer # /24 Provider A Provider B Send me anything with addresses beginning /20 Send me anything with addresses beginning /16 Routers in the rest of Internet just need to know how to reach /20 Provider A can then direct packets to the correct customer Internet
84 What if a Customer has 2 Providers? Customer # /24 Customer # /24 Customer # /24 Provider A Send me /20 Customer #1 Provider B Send me / /16, /24 Internet Multi-homed Customer #1 ( /24) has two providers Rest of Internet needs to know how to reach Customer #1 through either Therefore, /24 route must be globally visible
85 Consider Any Provider Beyond A, B Customer # /24 Internet Customer # /24 Provider A Send me /20 Customer # /24 Provider C Customer # /24 Provider B Send me /16, /24 Multi-homed Customer #1 ( /24) has two providers Rest of Internet needs to know how to reach Customer #1 through either Therefore, /24 route must be globally visible
86 Whom Should Provider C Forward To? Someone s one prefix is covered completely by another. E.g /24 is a subset of /20 in previous slide / /24 Consider incoming packet with dest :
87 Whom Should Provider C Forward To? Someone s one prefix is covered completely by another. E.g /24 is a subset of /20 in previous slide / / Consider incoming packet with dest : First 20 bits precisely match all of first prefix First 24 bits precisely match all of second prefix Which one should the router use?
88 Whom Should Provider C Forward To? Someone s one prefix is covered completely by another. E.g /24 is a subset of /20 in previous slide / / Consider incoming packet with dest : First 20 bits precisely match all of first prefix First 24 bits precisely match all of second prefix Which one should the router use?
89 Whom Should Provider C Forward To? Someone s one prefix is covered completely by another. E.g /24 is a subset of /20 in previous slide / / Consider incoming packet with dest : First 20 bits precisely match all of first prefix First 24 bits precisely match all of second prefix Which one should the router use? Use the longest prefix that matches completely
90 CIDR: Aggregation Not Always Possible Customer # /24 Customer # /24 Customer # /24 Provider A Send me /20, /24 Customer #1 Provider B Send me / /16, /24 Internet Multi-homed Customer #1 ( /24) has two providers Rest of Internet needs to know how to reach Customer #1 through either Therefore, /24 route must be globally visible. Must advertise the more specific prefix from both, or only provider B will be used
91 Are 32-bit Addresses Enough? Not all that many unique addresses: 2 32 = 4,294,967,296 Just over four billion Some (many) reserved for special purposes And addresses are allocated in larger blocks Many devices need IP addresses Computers, phones, routers, tanks, toasters, Long-term solution (perhaps): larger address space IPv6 has 128-bit addresses (2 128 = ) Short-term solutions: limping along with IPv4 Network address translation (NAT) Dynamically-assigned addresses (DHCP) Private addresses
ECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More informationNetwork Layer: Control/data plane, addressing, routers
Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)
More informationLecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1
Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 13 THE Internet Protocol Spring 2018 Rachit Agarwal 2 Reflection The events in last few days have left me sad! Such events must be condemned
More informationComputer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage
More informationInternetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationLecture 3: Packet Forwarding
Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR
More informationCS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018
CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationCS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).
Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical
More informationDepartment of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri
Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 2: Internet architecture and Internetworking Stefan Savage Some history 1968: DARPANET (precursor to Internet) Bob Taylor, Larry Roberts create
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16
CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what
More informationGoal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t
Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2010 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable calculators are permitted
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationCS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay
Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety
More informationInternet Protocol (IP)
CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationComputer Networks Prof. Ashok K. Agrawala
Computer Networks Prof. Ashok K. Agrawala 2017 Ashok Agrawala September 13, 2018 1 Message, Segment, Packet, and Frame 2 Packet Switching (e.g., Internet) Data traffic divided into packets; each packet
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer
More informationCH. 3 IP FORWARDING AND ROUTING
1 2012, Morgan-Kaufmann Pub. Co., Prof. Larry Peterson and Bruce Davie Some marked texts and figures from textbook Conceptual Computer Networks & José María Foces Vivancos CH. 3 IP FORWARDING AND ROUTING
More informationNetwork Layer. IP Protocol Stack: Key AbstracHons. Best- Effort Global Packet Delivery. Circuit Switching (e.g., Phone Network)
IP Protocol Stack Key AbstracHons Network Layer Mike Freedman COS 461 Computer Networks Application Transport Network Link Applications Reliable streams Messages Best-effort global packet delivery Best-effort
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationWhere we are in the Course
Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More information19: Networking. Networking Hardware. Mark Handley
19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking
More informationIP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching
IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationCSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical
CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet
More informationInternet Addresses Reading: Chapter 4. 2/11/14 CS125-myaddressing
Internet Addresses Reading: Chapter 4 1 Internet Addresses Outline/Goals IP addresses RFC 950, STD 05 Dotted-quad notation IP prefixes for aggregation Address allocation Classful addresses Classless InterDomain
More information2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.
Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationCSCI-1680 Network Layer: IP & Forwarding John Jannotti
CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer II Dmitri Loguinov Texas A&M University April 3, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter 4:
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationIPv4. Christian Grothoff.
IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving
More informationCSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca
CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement
More informationIP - The Internet Protocol
IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)
More informationChapter 3 Internetworking
Chapter 3 Internetworking Basic Internetworking (IP) (cont d) Datagram forwarding in IP Every datagram contains the IP address of the destination host If directly connected to destination network, then
More informationRecap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.
Recap First mile problem Internet www.yahoo.com Comcast Sprint End Users SBC UUNET www.cnn.com Last mile problem Recap Direct link networks Packet switching Internetworking 1 IP Internet Concatenation
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationPosition of IP and other network-layer protocols in TCP/IP protocol suite
Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationBasic Internetworking (IP)
Basic Internetworking (IP) CSCI 466: Networks Keith Vertanen Fall 2011 Internetworking Service model Internet protocol (IP) History Packet format Fragmenta?on Global addressing Overview Discovering link-
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationCommunication Systems DHCP
Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal
More informationIP Addresses. IP Addresses
IP Addresses Introductory material. IP Addressing Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses ting CIDR IP Version 6 addresses An entire module
More informationCS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray
CS 457 Networking and the Internet Fall 2016 Indrajit Ray Problems Earlier we saw how to connect one node to another, or to an existing network. How do we build networks of global scale? How do we interconnect
More informationCC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite
CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationInternetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 16/08/2018 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationData Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer
Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationComputer Networking. IP Packets, IPv6 & NAT. Some Slides from Internet
Computer Networking Packets, v6 & NAT Some Slides from Internet Outline Packet Format v6 NAT 2 Service Model Low-level communication model provided by Internet Datagram Each packet self-contained All information
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationCSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca
CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:
More informationCIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationCSCI Networking Name:
CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct
More informationEP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer
EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationThe Network Layer Forwarding Tables and Switching Fabric
The Network Layer Forwarding Tables and Switching Fabric Smith College, CSC 249 February 27, 2018 1 Network Layer Overview q Network layer services v v Desired services and tasks Actual services and tasks
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationNETWORK LAYER: IP Addressing
NETWORK LAYER: IP Addressing McGraw-Hill The McGraw-Hill Companies, Inc., 2004 2000 Position of network layer McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Network layer duties McGraw-Hill The McGraw-Hill
More informationCS118 Discussion, Week 6. Taqi
CS118 Discussion, Week 6 Taqi 1 Outline Network Layer IP NAT DHCP Project 2 spec 2 Network layer: overview Basic functions for network layer Routing Forwarding Connection v.s. connection-less delivery
More informationCSCI Computer Networks Fall 2016
source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationOutline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address
Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationC14a: Internetworks and The Internet
CISC 7332X T6 C14a: Internetworks and The Internet Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in
More informationCS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017
CS 43: Computer Networks The Network Layer Kevin Webb Swarthmore College November 2, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network
More informationL10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L10: Simple Internetworking Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationThe Internet Protocol (IP)
The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More information