PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

Size: px
Start display at page:

Download "PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R"

Transcription

1 PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R

2 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface. A computer with multiple network interfaces (said multi-homed) has multiple IP addresses, one for each interface. For example, a computer with an Ethernet interface and a Wi-Fi interface will have two IP addresses, if both interfaces are active simultaneously. Frequently, a network interface is referred to as NIC (Network Interface Card). Currently, it is rare to see "NICs" because they are implemented "on-board", i.e., together with the computer's motherboard. A more up-to-date name is network adapter. Each network adapter of a computer has two addresses: the IP address and the physical address (MAC address, according to the nomenclature proposed by the IEEE 802 standard). The IEEE 802 proposes a subdivision of the data link layer of the OSI model into two sub layers: MAC (Medium Access Control) and LLC (Logic Link Control). The MAC layer is dependent of the transmission technology but the LLC is not. The LLC sub-layer provides high level addressing useful to forward protocol packets to specific processes (similar to the function provided by the transport protocols, but at a lower level). The physical address is considered part of the MAC sub layer, hence the name.

3 2. MAC Address The MAC address (6 bytes) defines an address space (i.e., all possible addresses) much bigger than the IPv4 addresses (4 bytes). Different than the IP addresses, MAC addresses are not related to the network topology. In fact, MAC addresses are related to the manufacturer of the NIC or the motherboard with embedded networking circuits. The network adapters present on the computer already comes with a pre-defined MAC address formed by the manufacturer code followed by a serial number. Usually, the driver of the network adapter allows you to change the MAC address. If you do not want to risk conflict with the MAC address of any other computer on your network, you must a specific range of MAC addressed called: locally administered. A situation where the use of locally administered addresses is necessary or advantageous is absolutely rare. No user level application uses the MAC address to address another computer. In the TCP/IP architecture, applications always address other computers using IP address. It is up to the operating system of the transmitter the responsibility to discover the MAC address of the recipient before encapsulating an IP packet within a frame.

4 3. NIC Address Filtering MAC and IP addresses are in different layers of the OSI model: data link and network layers. These layers are handled by separate processors. A network adaptor has its own processor, which permit to interpret the frames independently from the main CPU of the computer. This is necessary because the network adaptor is constantly receiving frames that should not be interpreted by the operating system of the computer. The network adaptor will only deliver a frame to the operating system of a computer in three specific situations. a) The destination MAC address of the frame matches the MAC address of the network adaptor. b) The destination MAC address of the frame is a broadcast, that is, FF.FF.FF.FF.FF.FF (all bits equal to 1). c) The destination MAC address is a multicast address that has been configured by the operating systems. The topic of multicast addressing will be discussed later in the course. In these situations, the network interface generates an interrupt to the main CPU of the computer, and sends the packet to the operating system, more precisely, to the process corresponding to the network layer protocol.

5 4. IP and MAC Addresses When hosts A and B are in the same physical network, the relationship between MAC and IP addresses is one to one. That is, a frame sent from host A to host B will contain the source addresses of A (MAC and IP) and the destination addresses of B (MAC and IP). As we shall see, if A and B are on different physical networks, i.e., separated by a router, the MAC address of the router will eventually be used in the place of MAC B, in a frame transmitted from A to B. In any case, the operating system of host A does not previously know the MAC address of B (or the router). As previously stated, the user level applications always indentify the destination of a packet in terms of an IP address. When the request for sending a packet to address IP B arrives at the network layer of host A, a protocol called ARP (Address Resolution Protocol) is used to discover the MAC address of B.

6 5. Address Resolution Protocol - ARP The ARP (Address Resolution Protocol) is used for MAC-to-IP address resolution. This protocol was originally designed to operate only with the Ethernet, but was later expanded to operate with other layer 2 technologies. This protocol is based on two messages. The transmitting station sends a message named ARP Request informing the recipient's IP address and requesting its MAC address. The ARP request is a broadcast message (i.e., uses the destination MAC address FF:FF:FF:FF:FF:FF). All stations in the LAN will receive the request, but only the station which has the IP address responds with an ARP Reply message informing its MAC address. The ARP protocol is encapsulated directly in the Data Link protocol. That is, the ARP messages have no IP header. It is important to note that this whole process occurs effectively before the first packet sent by the upper layers is effectively transmitted. That is, the request to send an IP packet gets frozen until the ARP completes the MAC address discovery procedure. This procedure is quite costly, because ARP is based on broadcast messages, and it is triggered each time a packet is sent to a new IP destination. As we shall see next, the cost of the ARP can be mitigated the use of a caching mechanism.

7 6. ARP Messages The ARP request message is a message sent in broadcast, i.e. your destination MAC address is FF.FF.FF.FF.FF. All computers on the same physical network receive all ARP Request messages sent. This occurs even if the computers are connected to a Switch. Computers that receive the ARP message but do not have the requested IP address ignore the message. Only the computer that holds the requested IP address sends an ARP Reply, which is an unicast message. The address resolution Protocol (ARP) has the following main fields: 1) Hardware type: Specifies the link layer technology. Currently several options are supported, such as Ethernet, ATM, HDLC and FrameRelay. 2) Protocol type: Specifies the network layer technology. In the TCP/IP architecture, it specifies the IPv4 protocol. 3) Hardware addresses size: 6 bytes in the case of MAC addresses used by the Ethernet Protocol. 4) Network address size: 4 bytes for IPv4 5) Message type: ARP Request and ARP Reply, among others. 6) Hardware address of the transmitter: i.e., the MAC of the computer that sent the message.

8 7. ARP Cache Sending messages in broadcast is highly detrimental to the performance of the network. In the presence of this type of message, switches behave identically to the Hubs, i.e., an ARP message received on a port is transmitted to all the others. A network with many computers may present a high level of broadcast messages. These messages can cause network congestion, and lead to a decrease in network performance. Another problem is that broadcast messages are not filtered by network adaptors of the computers, because its contents need to be interpreted by the network layer of the operating system. Thus, ARP messages steal CPU processing time from user level applications. To reduce the amount of ARP messages generated, a cache mechanism is used. All discovered MAC addresses are stored in an ARP cache, in the memory of the local computer. The ARP entries have a limited TTL (time to live), usually 5 minutes. Before sending an ARP message, the operating system queries the cache, and only sends the ARP message if it cannot find the IP address of the destination in the ARP table. The ARP cache of any computer, regardless the operating system, can be seen by the user using the standard console command arp a.

9 8. ARP works only in the LAN By default, packets sent in broadcast do not traverse routers. That is, routers can receive broadcast messages, such as an ARP request, but they not propagate the message received from one interface to the others. Although you can configure routers to forward broadcast messages, this is not done (certainly not by Internet routers). Thus, if ARP messages cannot pass through routers, a computer is unable to determine the MAC address of other computers that are located on a different physical network. Fortunately, in the TCP/IP architecture, this isn't necessary. A host only tries to locate the MAC addresses of destinations that are located in the same subnet (i.e., destinations with the same IP network prefix). If the destination has a different network prefix, the packet must be forwarded to a router which has an interface in the same subnet than the host. Thus, an ARP request message is still required, but not to locate the physical address of the target computer, but to find the MAC address of the router.

10 9. Duplicated IP Address Detection ARP is used to identify duplicated IP addresses. When the IP address of a computer is configured for the first time, or the network service is initiated (during the computer s boot, for example), the operation system of the computer performs a test to verify if the assigned IP address is already being used by another computer. For this, it sends an ARP request message asking the MAC corresponding to the IP that is being assigned. If any other computer responds, then it is certain that the address is already being used. The user of the computer that answered the ARP request message can also be notified that was an attempt to duplicate the IP address of his computer. The use of the ARP mechanism to detect duplicated IP addresses does not permit to determine if an IP address already exist in other physical networks, because the ARP Request messages cannot traverse routers. However, duplicating an IP address in other network is usually harmless for a user, because the routers will forward the packets are only to the true owner of the network prefix. Currently, the IP addresses are classified into public and private. The public IP addresses are required to be unique in the Internet, but the private addresses can be duplicated in different subnets. This form of addressing will be studied later in the course.

11 10. Intranet and Internet Communication The ARP operation indicates that the procedure for forwarding IP packets is different when the destination address belongs to another subnet. Because of this, the IP routing must be considered in two distinct situations: Intranet communication and Internet communication. Intranet communication refers to the scenario where the communication occurs between two computers with the same network prefix, located on the same LAN. This communication does not involve routers. Internet communications occurs when two computers are located in different subnets. This operation is always intermediated by routers. It is important to note that who decides that a packet will go through a router is the transmitter computer. It does this by comparing the network prefix of the destination address with its own prefix. If they are equal, the communication is Intranet, otherwise, it is Internet.

12 11. Frame Format The way a computer builds a frame depends if the communication is intranet or internet. If the communication is intranet, the computer determines the destination MAC address using the ARP protocol, and builds a frame where the destination physical address corresponds to the final destination. If the communication is internet, the computer determines the MAC address of the first router that the packet must go to get to the destination (i.e., the next hop), also using the ARP. The destination physical address of the frame sent by the computer corresponds to the interface of the router that is in the same subnet than the computer. In both cases, the destination IP address always indentifies the final destination. It is important to note that the router IP address never appears in the packet.

13 12. Internet Communication In multi-hop communication, during the process of forwarding a packet between successive routers, the source and destination MAC addresses are changed by the transmitting router to reflect the link where the frame is being forwarded. Ethernet technology is not always used in point-to-point links between routers, but in this example, let's assume that all the links are Ethernet. Consider the following steps corresponding to the transmission indicated in the figure. 1) The source computer sends the frame to the MAC address of Router 1 (MAC2). 2) When the Router 1 forwards the frame to Router 2, the source and destination physical addresses are changed to MAC3 and MAC4, respectively. 3) When the Router 2 sends the frame to the destination computer, the source and destination physical addresses are, respectively, MAC5 and MAC6. Note that the source does not need to know the MAC address of the destination, and the destination, upon receiving the frame, doesn't know the MAC address of the source. In an internet communication, the IP addresses are responsible for the end-to-end addressing. The physical addresses are responsible for the addressing between successive hops.

14 13. ARP in Internet Communication The figure shows how a packet is encapsulated when it traverses a router. Before sending the packet, if the MAC address is not already in the ARP cache, the computer sends an ARP Request to determine the MAC address of the router. After discovering the MAC address, the computer build a frame where the destination is the MAC address of the router`s interface that is directly connected to the computer. When the router receives the frame, it extracts the packet and prepares to build a new frame. By analyzing the destination address of the packet, the router determines that it is necessary discover the MAC address of the computer IP D. To do this, it sends an ARP request message in broadcast through its C interface. After discovering the MAC address corresponding to IP D, the router creates a new frame, where the sources address it the MAC address of its C interface, and the destination is the MAC address of computer IP D. It is important to observe that a router never modifies the IP addresses. The exception is when the router is performing NAT (network address translation), something only necessary when private IP addresses are used. This topic will be discussed ahead in this course.

15 14. Example The figure illustrates the frame and packet formats when a message is sent from computer A IP to computer F with IP To help to understand this scenario, remember that the MAC addresses do not have global significance. Also, remember that no frame can be MAC addresses belonging to different subnets, i.e., the source and destination MAC addresses must belong always to the same subnet. Remember that the Ethernet protocol belongs to the data link layer. The term data link refers to a part of the network that is not intermediated by routers. It can be a simple cable, as the peer-to-peer connection between two adjacent routers in the figure. Or a LAN formed by switches and hubs, such as the location of the source and destination computers. The frame sent by the source computer is used to transport the packet until the first router. When the packet is transferred from one interface of the router to another, a new frame is created. This new frame is used to transport the packet just to the next router. This process of rebuilding the frame continues until the packet is delivered to the destination.

16 15. Routing Table When transmitting IP packets through a WAN, computers and routers needs to decide if a packet can be delivered directly to the destination, or whether it must be forwarded to a router. It is also necessary to know the IP address of the routers in this process. The process of forwarding IP packets is called routing. All information needed for a computer or router to forward IP packets is contained in a memory structure called "routing table". A routing table contains multiple entries. Each entry corresponds to a destination network to which a computer or router can send packets. Each of these entries consists of four fields: 1) Destination network: identifies a block of IP addresses 2) Gateway: identifies to which router interface a packet must be forwarded to reach the destination network. 3) Interface: indicates the interface from which the packet must be delivered. The interface can be identified by an IP address or a logical name, depending on the operating system of the device. Observe that interface refers always to the local equipment and gateway refers to equipment. Also, gateway and interface must always belong to the same subnet. In some situations, the interface field may be omitted, as it can be logically deduced as being the interface that is in the same network than the gateway. 4) Cost: it is useful to select a specific route when there are two or more paths to a destination.

17 16. Destination Network A destination network can have multiple sizes. It can be as large as the Internet ( /0) or as small as a single computer ( /32). A destination network is described by a base address (the first address of subnet) and a subnet mask, which determine the number of addresses. For example, the network /24 (i.e., with mask ) defines a block of addresses ranging from to When a computer or router needs to forward a packet, it looks for an entry in the routing table whose destination network field represents a block that contains the destination address of the packet. The test the routing table entries, one performs a logical AND (bit-to-bit) between the destination address of the packet and the subnet mask of the destination network. If the result is the base address, then the corresponding entry is used to forward the packet. If not, a new entry in the table is selected, and the test is repeated. For example, suppose a packet must be sent to the address and we want to test if the packet matches the first entry of the routing table shown in the figure. If we perform a logical and between and (i.e., the bits corresponding to the host ID are set to 0 ), the result is Therefore, the entry is selected. It is easy to observe that the result of this operation depends on the order that the routing table entries are tested. The destination address matches the first, third and fourth routing entry shown in the figure. The question is, which one is selected?

18 17. Routing Table Example To illustrate the concept of routing tables, consider the scenario shown in the figure. All computers and routers in the figure have routing tables. As good initial guess is to consider that the number of entries in a routing table is equal to the number of subnets in the WAN. In this scenario, the subnets are /24, /24 and /0. The link between routers 1 and 2 is also a network, but usually it's not worth including it in the routing table, since it is possible to manage the routers from the other interfaces. The mask/30 is ideal for assigning addresses to point-to-point links, because it sets a block with only 4 addresses, being only two unicast addresses. Therefore, the routing table of all elements in the figure should include three entries. This rule is not always valid, because there are some situations where the number of entries in the routing table does not match the number of subnets. In some cases, it is possible eliminate some entries in the routing table using the concept of super-nets, discussed earlier in this course. Also, in case of multiple paths to the same network, it is possible to a route to appear more than one time in the routing table.

19 18. Routing Table of Host B The figure shows the routing table of computer B. The table has three entries, one for each network accessible by the computer. The first route indicates how the computer should forward packets to their own network. In this case, the gateway field is not necessary. Operating systems represent routes to local networks in different ways. Windows, for example, indicates "On-link" in this field. Linux uses to indicate that the gateway is not required. The interface field is identical for all entries in the table once the computer has only one network interface. Again, the form of representation of this field is quite variable. The logical name "eth0" is commonly used by Linux to designate the first (or the only) Ethernet network interface of the computer. Windows, on the other hand, uses the IP address of the interface on that field. The cost in this case was arbitrarily chosen as 1 because there are no alternative paths to the networks listed in the table. In this case, any value of cost would be valid.

20 19. How Route Tables are Tested At first sight, the routing table of computer B could indicates a sort of conflict because the Internet encompasses the other two networks. That is, any destination address tested by the computer is contained in the route to the Internet, including the local addresses. Fortunately, this problem does not occur because there is a convention about the order in which the routing table entries are tested. This convention is based on two important rules. The first rule says that a more-specific route should always be tested before a less specific route. The more specific term refers to the size of the corresponding block address represented by the route. Routes corresponding to smaller blocks of addresses are tested first. According to the first rules, the route to the Internet is always the last one to be tested. For example, the route to /24 should be tested before the route /0 because it represents a smaller address block. The second rule says that if there is a tie in relation to the size of the block of addresses represented by the route, cost field must be used. In this case, a lower cost route should always be tested first.

21 20. Routing Table of Router 1 The figure shows the routing table of Router 1. The first two table entries are said local routes, because the router has one of its interfaces directly connected to the destination network. Local routes are created automatically once an address is assigned to an interface of the router. The subnet is indentified by performing a logical AND between the IP address of the interface and the subnet mask. Again, for local routes, no gateway is needed. In many systems, local routes automatically receive 0 in the cost field of the routing table. This indicates that it is not possible to find an alternative route with lower cost. Router 1 must sent the packets addressed to the Internet to Router 2. This is indicated by the third rule in the table. The cost 1 indicated for this rule has no effect, once there is no alternate route. The cost field will be discussed in details next in this booklet.

22 21. Routing Table of Router 2 The figure shows the routing table of Router 2. Note how the IP addresses of the links that connect Routers 1 and 2 and Router 2 and the ISP (Internet Service Provider) were defined. The IP addresses of routers connected to the same link must necessarily belong to the same subnet. The link between Routers 1 and 2 belongs to the subnet /30. The mask/30 has only 2 bits to identify hosts and therefore corresponds to a block of only 2 2 = 4 addresses, from to As the first and last addresses of the block cannot be used, the addresses and were assigned to the routers. The mask /30 corresponds to in decimal dotted notation. Similarly, the link between the Router 2 and the ISP belongs to the subnet /30, which comprises the addresses to

23 22. Default Gateway and Default Route When configuring a computer manually (without the help of DHCP, studied ahead in this course), besides the IP address and the subnet mask, the user is asked to provide an IP address called default gateway or default router. In general, the term default gateway is used to designate the router that gives the computer access to all other subnets in the same organization and the Internet. Normally, this is the only router that is required to be known by the computer. The computer's routing table is automatically generated using the following three parameters: the computer's IP, the subnet mask and the default gateway. In the figure, the first routing table entry of computer B is the route to the local network. It is defined by a logical "and" between the IP and the subnet mask /24 ( ). The result is the subnet /24. The third routing table entry is created from the information about the default gateway. This route is usually referred to as default route. The second entry in the routing table is unnecessary because the network /24 can be considered part of the Internet, since it is accessed by the same router. This route entry can be eliminated. As a general rule, all table entries with the same gateway as the Internet route can be eliminated.

24 23. Multiple Routes and Cost Routing tables permit to represent more than one route to the same destination. The network software of the operating system always tests the entries of the routing table in a specific order, using the longest prefix match as first sorting criteria and the cost of the route as the second. The first route that includes the destination address of the packet being forwarded is selected. This route is known as the best or main route. Routes other than the best route are only considered in the event of a failure of the main route, which occurs, for example, due to a link failure or a failure in the hardware or software of a router. There are basically two strategies to define costs. The first is based on counting the number of hops (i.e., the number of routers) that a packet must traverse to reach the destination network. This strategy is suitable only in situations where the transmission rate of the links is very similar. The second strategy consists of assigning costs to the links in a manner inversely proportional to its transmission rate. Generally, the link cost is calculated by dividing the highest transmission rate among all links of the network by the transmission rate of the link. For example, in the figure, the highest transmission rate is 100Mbit/s. Therefore, the 100Mbit/s links would have cost 1 and the 10Mbit/s link would have cost 10. The table shown in figure corresponds to the Router 1. The costs without parentheses were calculated in hops and those within parentheses using the rate of the links.

25 24. Route Aggregation In the previous examples we have considered only networks with default masks, i.e. masks corresponding to the classes A, B and C. Let us now consider the construction of routing tables with variable-sized masks. In this case, suppose a router connects two subnets formed by the partition of the class C subnet /24. If we replace the subnet mask /24 by a /25, we define two subnets of identical size (128 addresses): /25 (with addresses between and ) and /25 (with addresses between and ) Observe that the router 2 does not need to take into account the division of the class C subnet into two smaller subnets. From the viewpoint of router 2, the path to achieve both subnets is identical, and must pass through router 1 using the interface. Therefore, a single /24 route can be still be used in router 2 to represent both subnets. The routing tables corresponding to this scenario are illustrated in sequence of this chapter.

26 25. Routing Tables with Route Aggregation The table corresponding to the computer uses the concept of default route. As most computers, the computer has only two routes: a route to its local network and other to the Internet. The Router 1 has three routes, two local routes and one for the Internet. Router 2 has only two routes, a route to subnet /24 and another for the Internet. Note that the router 2 does not need use two routes to address the /25 subnets. All it needs to know is that any destination address between and can be reached by sending the packet to the interface of Router 1. In this case, it is up to the Router 1 to decide what subnet ( /25 or /25) the packet must be sent. The process of representing two or more subnets with a single route is known as route aggregation. It is very important for the performance of the Internet. It permits hiding from the Internet routers the numerous subdivisions made internally by companies and Internet Service Providers.

27 26. Conclusion The integration between Internet Protocol (IP) and the data link layer is made with the aid of the Address Resolution Protocol (ARP). The ARP is responsible for finding the MAC address corresponding to an IP address. ARP is based on two main messages: ARP request and ARP reply. The ARP request is sent in broadcast, and it is considered one of the greatest villains of the network performance. The ARP is one of the main motivations for introducing the concept of VLANs (Virtual LANs) in the Ethernet technology. VLANs will be studied later in the course. Finally, we saw that all the elements involved in IP communication (computers and routers) have routing tables. We also saw that the concept of VLSM allows to aggregate routes to decrease the number of entries in the tables of the routers of the Internet. Presently, the internet routers have about 500 thousand entries in the routing tables. Without the concept of route aggregation, this number would be much higher.

Internet Protocol Addressing and Routing. Redes TCP/IP

Internet Protocol Addressing and Routing. Redes TCP/IP Internet Protocol Addressing and Routing Redes TCP/IP Internet Topology Internet - WAN Gateway or router Physical Network (LAN) internet LAN LAN LAN Dotted Decimal Notation 2 7 2 6 2 5 2 4 2 3 2 2 2 1

More information

Chapter 6 Addressing the Network- IPv4

Chapter 6 Addressing the Network- IPv4 Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

6 Chapter 6. Figure 1 Required Unique Addresses

6 Chapter 6. Figure 1 Required Unique Addresses 6 Chapter 6 6.1 Public and Private IP Addresses The stability of the Internet depends directly on the uniqueness of publicly used network addresses. In Figure 1 Required Unique Addresses, there is an issue

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Connecting to the Network

Connecting to the Network Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

Addressing and Routing

Addressing and Routing Addressing and Routing Andrew Scott a.scott@lancaster.ac.uk Physical/ Hardware Addresses Aka MAC* or link(-layer) address Can only talk to things on same link Unique ID given to every network interface

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

5. Providing a narrower address space is the primary design goal for IPv6.

5. Providing a narrower address space is the primary design goal for IPv6. Chapter 2: IP Addressing and Related Topics TRUE/FALSE 1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. T PTS: 1 REF: 59 2.

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves

More information

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

Configuring IPv4. Finding Feature Information. This chapter contains the following sections: This chapter contains the following sections: Finding Feature Information, page 1 Information About IPv4, page 2 Virtualization Support for IPv4, page 6 Licensing Requirements for IPv4, page 6 Prerequisites

More information

Data Communication & Computer Networks Week # 13

Data Communication & Computer Networks Week # 13 Data Communication & Computer Networks Week # 13 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home Powerpoint

More information

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

McGraw-Hill The McGraw-Hill Companies, Inc., 2000 !! McGraw-Hill The McGraw-Hill Companies, Inc., 2000 "#$% & '$# )1 ) ) )6 ) )* )- ). )0 )1! )11 )1 )1 )16 )1 3'' 4", ( ( $ ( $ $$+, $$, /+ & 23,4 )/+ &4 $ 53" Network Layer Position of network layer Figure

More information

1.4 VPN Processing Principle and Communication Method

1.4 VPN Processing Principle and Communication Method This section contains a description of operation principle and communication method of VPN that can be constructed by SoftEther VPN. An overview of the modules and functions that was used by VPN communications.

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Thursday, Nov 1 st Homework #4 Due Tuesday, Nov 6 th Project #2 Due 2 IPv4 addresses are usually displayed

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 206 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #2 preview: Data Communications

More information

IPv6 Feature Facts

IPv6 Feature Facts 12.1.2 IPv6 Feature Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. You should know

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

Putting it all together

Putting it all together Putting it all together What happens when a user shows up to a new network and wants to access a web site? (These are new slides. Please stop and ask questions if anything is unclear!) Scenario Scenario

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem. Tutorial 9 1 Router Architecture Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for

More information

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Interconnecting Cisco Networking Devices Part 1

Interconnecting Cisco Networking Devices Part 1 ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 2 Version 1.0 Student Guide Editorial, Production, and Web Services: 07.25.07 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO

More information

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics Guide to TCP/IP Fourth Edition Chapter 2: IP Addressing and Related Topics Objectives Describe IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing

More information

Cisco CCNA Basic IP Routing Part I

Cisco CCNA Basic IP Routing Part I Cisco CCNA Basic IP Routing Part I Cisco CCNA IP Routing In this chapter, we re to discuss the IP routing process. This is an important subject to understand since it pertains to all routers and configurations

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations

More information

Lecture 2. Computer Networks Models. Network Models 1-1

Lecture 2. Computer Networks Models. Network Models 1-1 Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Interconnecting Cisco Networking Devices Part 1 ICND1

Interconnecting Cisco Networking Devices Part 1 ICND1 Interconnecting Cisco Networking Devices Part 1 ICND1 Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

CSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9

CSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9 CSE/EE 461: Introduction to Computer Communications Networks Autumn 2010 Module 9 IP Addressing John Zahorjan zahorjan@cs.washington.edu 534 Allen Center Last Time: Addresses Imply Location 142.150.210.12

More information

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview Interconnecting Cisco

More information

Internet Protocol (IP)

Internet Protocol (IP) CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

EE-311 Data Communication & Networks

EE-311 Data Communication & Networks National University of Computer & Emerging Sciences, Islamabad, Pakistan Name: Roll No: EE-311 Data Communication & Networks Summer 2007 Final Thursday, 2 nd August 2007 Total Time: 3 Hours Total Marks:

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

NETWORK LAYER: IP Addressing

NETWORK LAYER: IP Addressing NETWORK LAYER: IP Addressing McGraw-Hill The McGraw-Hill Companies, Inc., 2004 2000 Position of network layer McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Network layer duties McGraw-Hill The McGraw-Hill

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

CCNA 1 Chapter 6 v5.0 Exam Answers 2013

CCNA 1 Chapter 6 v5.0 Exam Answers 2013 CCNA 1 Chapter 6 v5.0 Exam Answers 2013 1 After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router

More information

Operation Manual ARP H3C S5500-SI Series Ethernet Switches. Table of Contents

Operation Manual ARP H3C S5500-SI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 ARP Overview... 1-1 1.1.1 ARP Function... 1-1 1.1.2 ARP Message Format... 1-1 1.1.3 ARP Address Resolution Process... 1-2 1.1.4 ARP Mapping Table... 1-3 1.2

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Configuring Banyan VINES

Configuring Banyan VINES Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 20 Pu+ng ALL the Pieces Together Spring 2018 Rachit Agarwal What is a computer network? A set of network elements connected together, that implement

More information