Network Gateway Services John Enck

Size: px
Start display at page:

Download "Network Gateway Services John Enck"

Transcription

1 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a multivendor environment, however, a gateway can provide gateway tunneling/encapsulation services or translation/device emulation services. In a PC LAN, a gateway can provide network access for a remote PC over a dial-in circuit. These are all legitimate gateway services, though they are all quite different from one another. Introduction In the context of data communications, gateways are highly specialized devices that interconnect networks. With one exception, formal definitions for gateways are sketchy. For example, gateways can be composed of hardware, software, or combinations of both, and they provide functions ranging from simple protocol encapsulation to sophisticated protocol conversions. The exception is the Transmission Control Protocol/Internet Protocol (TCP/IP) environment. Unlike other network environments IBM's System Network Architecture (SNA),Digital's DECnet, and Novell's NetWare, for example in which the term gateway is ill-defined, a gateway in a TCP/IP network has a specific purpose and conforms to established rules. The architecture even includes formal protocols that apply only to TCP/IP gateways. The Big Picture The dictionary describes a gateway as a means of access. Although this definition embraces the spirit of network gateways, a more technical description for a gateway is a device or point-of-presence that interconnects dissimilar networks. The key concept is dissimilar networks, because networks can be dissimilar in a number of ways. For example, Ethernet and Token-Ring LANs are dissimilar. IBM System Network Architecture and TCP/IP networks are dissimilar. Wide-area Synchronous Data Link Control (SDLC) and metropolitan-area Fiber Distributed Data Interface (FDDI)networks are dissimilar. In truth, it is usually easier to find dissimilarities between networks than it is to find similarities. Gateways attempt to resolve most dissimilarities between networks, although rarely does a single gateway attempt to do it all. Network Functions of Gateways Many environments would benefit from the installation of a gateway. Although specific environments are too numerous to address individually, in general, gateways can be separated into groups that provide significantly different functions: Resource management. Transport. Intranetwork.

2 Interoperability. Resource Management Gateways in this category manage multiple, possibly concurrent access to a common network resource. For example, a modem gateway can be installed on a PC LAN that allows PCs to contend for access to dial-out services. Or a PC on a LAN can be dedicated as a remote control gateway to allow remote PCs to dial up and access all of the services of the LAN. Transport This kind of gateway carries data from one type of network over a second type of network. This is typically handled by embedding all of the information associated with one protocol inside another protocol. Two scenarios exemplify this approach: Tunneling. Traffic from one type of network can be routed through a different type of network. For example, IBM SNA traffic can be routed through atcp/ip network if one gateway inserts SNA protocol information from one SNA subnetwork into a TCP/IP network and another gateway extracts the System Network Architecture data from the TCP/IP network at a different geographical location and forwards it to another SNA subnetwork. This is sometimes referred to as tunneling. Encapsulation. To reduce the number of protocols required on a LAN, client-side software can embed foreign protocol information into the local protocol and route the traffic to a gateway, which can then extract the foreign protocol and forward it to the foreign network. For example, PC background software can embed Digital Local Area Transport (LAT) information into Novell Internet Packet EXchange (IPX) frames and route them to an IPX/LAT gateway. The gateway removes the Local Area Transport information and forwards it over a separate link to a LAT-oriented device (e.g., a Digital Equipment Corporation host computer). This technique is often called encapsulation. Intranetwork Internetwork gateways make connections within a single network architecture (e.g., SNA, TCP/IP, NetWare, DECnet). The connection allows traffic flow between multiple logical networks or between multiple physical networks (e.g., Ethernet and token ring). One of the confusing aspects of this category of gateways is that it overlaps with bridges and routers. Interoperability Gateways in this category translate network and application-oriented services between two (or more) types of networks to accommodate interoperability. These types of gateways require a high degree of sophistication because they must be able to translate between network protocols, network services, and data formats. For example, a gateway that accommodates exchange between SNA anddecnet must be fluent in the mail protocols and formats used in both network environments. Similarly, a gateway for file transfer and workstation access must translate between network file access services and also provide workstation emulation.

3 The TCP/IP Strategy Although it is possible to operate all the different kinds of gateways (resource management, transport, intranetwork, or interoperability) in a TCP/IP environment, the TCP/IP architecture depends on gateways to provide connections between different logical or physical networks. In terms of the gateway functions described,tcp/ip gateways fall into the intranetwork category. To better explain the role of TCP/IP gateways, the TCP/IP network address strategy must be demonstrated. 32-bit IP Addresses Under the TCP/IP architecture, each system in the network is assigned a four-byte (32-bit) address termed the IP address. Instead of being represented as hexadecimal values, however, these bytes are usually represented using the format w.x.y.z, where w, x, y, and z are replaced with a decimal number between 0 (hex 00) and 255 (hex FF). For example, is a valid IP address. The four-byte IP address is further broken down so that a portion of it identifies a logical network address and the rest of it identifies a system within that network. For example, identifies a specific system (address 12) within a specific network(address ). Similarly, address identifies system within network The IP address can be composed using one of three different formats, termed classes. Each class breaks the overall address down into network and host system components differently. Class A uses the format network.host.host.host, with the network component falling in the range between 0 and 127 (exclusive of 0 and 127) and the host component being greater than 0. For example, in the address , 64 identifies the network and identifies the host system. Class B uses the format network.network.host.host, with the first network component falling in the range from 128 to 191 (including 128and 191) and the host component being greater than 0. For example, in the address , identifies the network and 0.68identifies the host system. Class C uses the format network.network.network.host, with the first network component falling in the range from 192 to 223(including 192 and 223) and the host component being greater than 0.For example, in the address , identifies the network and 37 identifies the host system. All three address formats identify a particular host system within a specific network. A fourth type of address a Class D address is used for multicast addresses. Multicast addresses are intended for multiple systems that possibly reside in different networks; therefore Class D addresses have no network or host components. Class D addresses begin with a number in the range of 224 to 239 (inclusive of 224 and 239). If these four address classes are viewed as binary information, the high order bits of the first address byte determine the class type. Specifically, Class A addresses have the high order bit set to 0; in Class B the high order bits are set to 10; in Class C they are 110;and finally, in Class D the high order bits are These bit patterns then determine the acceptable address range for the first byte. TCP/IP Networks IP addresses not only define the boundaries for different physical networks, but in most implementations of TCP/IP software, these addresses create barriers between logical

4 networks. For example, a system at address usually cannot communicate with a system at address , even if the two systems are physically on the same cable segment. The safest assumption to make is that every system must go through a gateway to access a system residing in a different physical or logical network. This means, of course, that each system must be aware of the gateway(s) present in its local network. Conceptually, this poses no problem, because each gateway has an IP address for each network it handles therefore a gateway attached to three networks will have three different IP addresses. The logistics of informing a system about the presence of gateways depends on the protocol the host system uses to communicate with the gateways. Some protocols provide a means for gateways to announce themselves and the routes they support, whereas other protocols assume that the host system is explicitly informed of any gateways it is to use. For the sake of simplicity, this discussion focuses on the second case, where hosts must be explicitly informed. In most networks that involve cross-network traffic, each host system is configured to support a single, default gateway. Any traffic a system needs to route to any other network is delivered to that gateway, and the gateway forwards it as needed to reach the destination. If only one gateway is present in the network, then a single, default gateway connection can be defined for each host system to handle all of the cross-network traffic. If, however, the local network has multiple gateways and each gateway controls access to a different network (or set of networks),then the host systems must be made aware of each routing choice. Usually the configuration process begins by establishing a default gateway for each host system to handle any cross-network traffic not explicitly sent to other gateways. Establishing a default gateway is not absolutely necessary, but it does serve as a safety net to catch and report traffic that cannot be delivered because of missing or improper configuration information. After establishing a default gateway, every host system is then informed of each gateway and what specific systems or networks are obtainable through that gateway. Identifying gateways is a relatively simple process that associates target networks with gateway addresses. For example, a system residing in network may be given the following gateway assignments: To reach Use gateway all others (default gateway) Using this table, if a host system is trying to deliver a message to a system at address , it will route that message to gateway , because that gateway is responsible for all traffic to network Similarly, if the system needs to send a message to the host system at address , it will use gateway If, however, the system needs to send a message to address , it will use the default gateway ( ),because no gateway is explicitly configured to handle traffic for network Exactly how this information is configured at the host system level depends greatly on the operating system implementation. One common methodology used by many UNIX and UNIX-derived implementations is to use the route command to set up the routing table. For example, the previous routing table could be established using the following commands:

5 route route route route Regardless of how it is constructed, a simple list of networks and gateways provides a host system with all the information it needs to decide what gateway should handle its crossnetwork traffic. Unfortunately, the type of information required within the gateways as well as how that information is discovered is far more complex. TCP/IP Gateway Types In addition to the relationship that exists between host systems and the gateways that service them, gateways also have formal relationships with one another. This relationship allows gateways to share Routing Information and communicate changes that occur to therouting information. For example, if a gateway picks up a new network connection, it can share this information with other gateways. The protocol that a gateway uses to communicate with another gateway depends on the type of gateway it is. In the world of TCP/IP, all gateways are not equal and are, in fact, divided into three categories: interior gateways, noncore exterior gateways, and core exterior gateways. These gateways are shown in Exhibit 1. Types of TCP/IP Gateways Interior Gateways An interior gateway exists inside an autonomous, self-contained network. An autonomous network may be a small LAN, a series of interconnected LANs, a campuswide network, or anything in between. The defining aspect of an autonomous network is not the size; rather it is the fact that the network is fully functional in its own right it does not need external connections to be whole. The purpose of an interior gateway is to provide interconnections within the confines of the autonomous network. Noncore Exterior Gateways A noncore exterior gateway, on the other hand, provides a connection between two or more autonomous networks. In other words, an exterior gateway interfaces autonomous networks to the outside world. In the most simple case, exterior gateways can link up two autonomous networks. The more typical use, however, is to use exterior gateways to connect an autonomous network with the Internet. The Internet The difference between core and noncore exterior gateways comes into play on the Internet. Specifically, core exterior gateways provide interconnections within the framework of the Internet network. Unlike noncore exterior gateways, core gateways do not interface with autonomous networks they are dedicated to maintaining interconnections inside the Internet. When an autonomous network needs connectivity to the Internet, it uses a noncore exterior gateway that in turn interfaces to a core exterior gateway. The noncore gateways receive Internet Routing Information from the core gateway and makes those routes available to any interior gateways within the autonomous network. In simpler terms, when sending a message over the Internet, information will first pass from an interior gateway to a noncore exterior gateway, then from the noncore

6 exterior gateway to a core exterior gateway, which in turn routes the message through the Internet to another core gateway. At that point the message passes through another noncore external gateway and another internal gateway before reaching the destination host system. This message flow in shown in Exhibit 2. Traffic Flow Through TCP/IP Gateways TCP/IP Gateway Protocols As noted, the protocol used by a gateway to disseminate and maintain Routing Information is based on the type of gateway it is. The protocols used by the different types of gateways core exterior, noncore exterior, and interior are shown in Exhibit 3. TCP/IP Gateway Protocols Core exterior gateways use a gateway protocol known as SPREAD to talk with one another. This protocol is only used within the Internet. Because core exterior gateways also communicate with noncore exterior gateways, they support the same protocol used by noncore exterior gateways. A protocol known as the Exterior Gateway Protocol (EGP) can be used between any noncore exterior gateways to interconnect autonomous networks, or between a noncore gateway and a core exterior gateway to connect an autonomous network to the Internet. A noncore exterior gateway must also support at least one interior gateway protocol so it can communicate with interior gateways or host systems. Interior gateways support a variety of protocols because there are no formal Internet connectivity requirements within autonomus networks, therefore networking vendors can offer whatever protocol they happen to endorse. Some of the more common protocols are: HELLO. The HELLO protocol is one of the original interior gateway protocols used in TCP/IP networks. HELLO is different from the other interior gateway protocols in that it determines the best route for a message to take based on the estimated elapsed travel time. Although the HELLO protocol is still in use, it is not nearly as widespread asrouting Information Protocol. RIP. The RIP (RIP) was developed to provide routing services in Xerox Network System (XNS) networks. The XNS implementation was subsequently adapted for use in the TCP/IP and Novell NetWare environments. Routers using RIP broadcast their routing tables to one another on a regular basis. RIP operates as the Transmission Control Protocol level of TCP/IP and assumes that a path that passes through the fewest number of routers (has the fewest number of hops ) is the best path to take. OSPF. The Open Shortest Path First (OSPF) protocol was developed to replace RIP and offers several advantages over RIP. First, it operates at the IP level within TCP/IP, therefore it is capable of routing a wider variety of services than RIP. Second, OSPF is not as boisterous as RIP under OSPF, routing table updates get distributed to neighboring routers only. Finally, OSPF takes into account a number of factors to determine the best possible route, including line speeds, error rates, and current loading. Note that a gateway can fulfill both noncore exterior and interior roles there is no requirement that these functions must be provided by independent platforms. Many UNIX

7 systems, for example, include a program called gated that supports the EGP, HELLO, and RIP protocols, thereby enabling a host system to become an interior and a noncore exterior gateway. Conclusion Hardware or Software? Although the definitions of the various types of gateways describe key functions and specific protocols, the definitions do not dictate the characteristics of the system acting as a gateway. Is a TCP/IP gateway a dedicated piece of hardware or is it software running in a host system or server? The answer is simple a gateway can be either. It is possible to run dedicated gateway hardware or gateway software in an application host, or to do both. Another commonly asked question about gateways is this: how do gateway functions differ from the functions offered by network routers? The simple truth is that they do not differ. Gateways are called gateways in TCP/IP networks because they have been around long before routers came into popular use. In other words,tcp/ip gateways are gateways because that is the way it has always been. Author Biographies John Enck John Enck is a data communications and networking specialist with more than 15years of hands-on experience. He is currently employed as a network analyst with Forest Computer Inc., a manufacturer of multivendor gateways. He has also worked for Electronic Data Systems Corp.,Burroughs Corp., Illinois Law Enforcement Commission, and the US Department of Defense. He is the author of several networking books as well as articles for Data Communications Management, DEC Professional, HP Professional, MIDRANGE Systems, Network World, NEWS 3X/400,UniReview, and 3X/400 Information Management. He has a BA in computer science/communications from Antioch College.

8

9

10

Table of Contents. Cisco TCP/IP

Table of Contents. Cisco TCP/IP Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

NetWare Protocols. Background. Technology Basics CHAPTER

NetWare Protocols. Background. Technology Basics CHAPTER CHAPTER 19 NetWare Protocols Background NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc. and introduced to the market in the early 1980s. Then,

More information

Written and provided by. Expert Reference Series of White Papers. TCP/IP Overview COURSES.

Written and provided by. Expert Reference Series of White Papers. TCP/IP Overview COURSES. Written and provided by Expert Reference Series of White Papers TCP/IP Overview 1-800-COURSES www.globalknowledge.com Table of Contents TCP/IP Overview...1 Document ID: 13769...1 Introduction...1 TCP/IP

More information

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER 24 CHAPTER Chapter Goals Understand bridging in a mixed Ethernet and Token Ring environment. Describe the differences between source-route transparent and translational bridging. List some of the challenges

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network 87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess

More information

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork UNIT - II Internetworking An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. different kinds of network technologies

More information

Mixed-Media Bridging

Mixed-Media Bridging CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information

More information

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

Lecture 2. Computer Networks Models. Network Models 1-1

Lecture 2. Computer Networks Models. Network Models 1-1 Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -

More information

DECnet. Background CHAPTER

DECnet. Background CHAPTER CHAPTER 28 DECnet Background DECnet is a group of data-communications products, including a protocol suite, developed and supported by Digital Equipment Corporation. The first version of DECnet, released

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

Novell. NetWare 6. FILTER CONFIGURATION

Novell. NetWare 6.   FILTER CONFIGURATION Novell NetWare 6 www.novell.com FILTER CONFIGURATION Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 200-105 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Vendor : Cisco Version : DEMO Get Latest

More information

Windows NT Server Operating System. Server. Unicast Routing Principles. White Paper. Abstract

Windows NT Server Operating System. Server. Unicast Routing Principles. White Paper. Abstract Windows NT Server Operating System Server Unicast Routing Principles White Paper Abstract With Windows NT Server 4.0, the implementation and configuration of routing has become much easier. Windows NT

More information

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER 40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn

More information

AppleTalk. Chapter Goals. Introduction CHAPTER

AppleTalk. Chapter Goals. Introduction CHAPTER 35 CHAPTER Chapter Goals Describe the development history of the protocol, used almost exclusively in Macintosh computers. Describe the components of networks and extended network. Discuss the primary

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

NetWare Protocols. Background CHAPTER

NetWare Protocols. Background CHAPTER CHAPTER 31 NetWare Protocols Background NetWare is a network operating system (NOS) that provides transparent remote file access and numerous other distributed network services, including printer sharing

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Several versions of DECnet have been released. The first allowed two directly attached minicomputers to communicate.

Several versions of DECnet have been released. The first allowed two directly attached minicomputers to communicate. DECnet DECnet is a group of data communications products, including a protocol suite, developed and supported by Digital Equipment Corporation (Digital). The first version of DECnet, released in 1975,

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model [Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of

More information

Frame Relay. Frame Relay Information 1 of 18

Frame Relay. Frame Relay Information 1 of 18 Frame Relay Information 1 of 18 This document was retrieved from the Web and has been been edited by Thomas Jerry Scott for use in his TCP/IP network classes. Chapter Goals Describe the history of Frame

More information

Networks Hardware Components

Networks Hardware Components Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Lecture (05) Network Access layer fundamentals II LAN, & WAN

Lecture (05) Network Access layer fundamentals II LAN, & WAN Lecture (05) Network Access layer fundamentals II LAN, & WAN Agenda Ethernet Addressing Ethernet Framing By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II ٢ Ethernet Addressing

More information

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1 Chapter 4: Advanced Internetworking Networking CS 3470, Section 1 Intra-AS and Inter-AS Routing a C C.b b d A A.a a b A.c c B.a a B c Gateways: perform inter-as routing amongst themselves b perform intra-as

More information

COSC 6377 Mid-Term #2 Fall 2000

COSC 6377 Mid-Term #2 Fall 2000 Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information.

More information

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦 KillTest Exam : 100-101 Title : CCNA Interconnecting Cisco Networking Devices 1 (ICND1) Version : Demo 1 / 15 1.Which three statements are true about the operation of a full-duplex Ethernet network? (Choose

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

IP Routing & Bridging

IP Routing & Bridging CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If

More information

Chapter 7: Routing Dynamically. Routing & Switching

Chapter 7: Routing Dynamically. Routing & Switching Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based

More information

DECnet. Chapter Goals. Introduction CHAPTER

DECnet. Chapter Goals. Introduction CHAPTER 38 CHAPTER Chapter Goals Describe the development history of the protocol, used primarily in Digital Equipment Corporation minicomputers. Describe the architecture of networks. Discuss the addressing methods

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Winter 2004 Lecture 18 Announcements Fourth quiz on Monday, March 1 st. Third HTML discussion session today by Kiran (before class). Summary posted on

More information

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324 Data Encapsulation & OSI & TCP/IP Models Week 2 Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Network Protocols A protocol is a formal description of a set of rules and conventions that govern a particular

More information

Chapter 7 Routing Protocols

Chapter 7 Routing Protocols Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa IP Basics Unix/IP Preparation Course June 29, 2010 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are divided into separate

More information

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008 CEN445 Network Protocols & Algorithms Network Layer Prepared by Dr. Mohammed Amer Arafah Summer 2008 1 Internetworking Two or more networks can be connected together to form an Internet. A variety of different

More information

Configuring Transparent Bridging

Configuring Transparent Bridging Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple

More information

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

This talk will cover the basics of IP addressing and subnetting. Topics covered will include: This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

Finish Network Layer Start Transport Layer. CS158a Chris Pollett Apr 25, 2007.

Finish Network Layer Start Transport Layer. CS158a Chris Pollett Apr 25, 2007. Finish Network Layer Start Transport Layer CS158a Chris Pollett Apr 25, 2007. Outline OSPF BGP IPv6 Transport Layer Services Sockets Example Socket Program OSPF We now look at routing in the internet.

More information

Open Shortest Path First (OSPF)

Open Shortest Path First (OSPF) CHAPTER 42 Open Shortest Path First (OSPF) Background Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP) working

More information

Front Novell Guide to NLSP Migration

Front Novell Guide to NLSP Migration Front Novell Guide to NLSP Migration Front : 1 2 Novell Guide to NLSP Migration About This Guide.......................................... 7 Introduction..................................... 7 NetWare

More information

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide? SEMESTER 1 Chapter 5 OSI Network Layer V 4.0 5.1.1.1 What services does the network layer provide? What are the 4 basic processes used at the network layer? What is the PDU of the network layer? What information

More information

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-5-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers

More information

TCP/IP Network Essentials

TCP/IP Network Essentials TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet

More information

Routing. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP

Routing. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP outing Info 341 Networking and Distributed Applications Context Layer 3 Addresses, fragmentation, reassembly Layer 4 end-to-end communication UDP, TCP outing At layer 3 Often relies on layer 4 Application

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

CHAPTER 2 - NETWORK DEVICES

CHAPTER 2 - NETWORK DEVICES CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Introduction to Routing

Introduction to Routing 1 Introduction to Routing Session 2 Presentation_ID.scr 1 Agenda Addressing Concepts Routing Protocols Statics and Defaults 3 ISO OSI Reference Model Routing Information Protocol (RIP and RIPv2) L7 L6

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Ip Routing Protocols Rip Ospf Bgp Pnni And Cisco Routing Protocols

Ip Routing Protocols Rip Ospf Bgp Pnni And Cisco Routing Protocols Ip Routing Protocols Rip Ospf Bgp Pnni And Cisco Routing Protocols We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Networks II Agenda Introduction to networking architecture Historical

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Chapter 1 The IP Routing Protocols

Chapter 1 The IP Routing Protocols Chapter 1 The IP Routing Protocols 1 This chapter describes routing protocol options for the Internet Protocol (IP) suite. The chapter Routing IP contains all the information you need for configuring IP.

More information

Networking TCP/IP routing and workload balancing

Networking TCP/IP routing and workload balancing System i Networking TCP/IP routing and workload balancing Version 6 Release 1 System i Networking TCP/IP routing and workload balancing Version 6 Release 1 Note Before using this information and the product

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Overview of Bridging

Overview of Bridging Overview of Bridging The Bridging section of this guide discusses the following software components for bridging and routing protocols in Cisco routers: Transparent and Source-Route Transparent (SRT) Bridging,

More information

Configuring Novell IPX

Configuring Novell IPX First Published: July 01, 2007 Last Updated: October 15, 2012 Note Effective with Cisco IOS Release 15.1(3)S, 15.2(2)T, and 15.1(1)SY, this feature is not available in Cisco IOS software. Cisco IOS software

More information

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan Routing Protocols of IGP Koji OKAMURA Kyushu University, Japan Routing Protocol AS (Autonomous System) Is operated autonomous in the organization. 6bit IGP (Interior Gateway Protocol) Routing Control inside

More information

Unicast Routing. TCP/IP class

Unicast Routing. TCP/IP class Unicast Routing TCP/IP class Routing Protocols intro RIP and son of RIP OSPF BGP odd bodkins NAT TCP/IP Internetworking Protocols 2 divide routing world into 3 parts topology IETF ISO/OSI same link or

More information