COSC 6377 Mid-Term #2 Fall 2000
|
|
- Francis Knight
- 6 years ago
- Views:
Transcription
1 Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information. You may use a calculator to convert from binary to decimal and back. All questions graded. 1. From Forouzan section 3.3, we know that a switched network consists of a series of interlinked nodes, called switches. These help ensure that only intended recipients receive copies of frames. The text discussed three general approaches: circuit, packet and message switching. Packet switching can be further divided into datagram switching and virtual circuit switching. The following four diagrams show how a layer two network might respond to the need to transmit a single large message from T to R through three intermediate nodes, A, B, and C. Do not assume that A, B, and C are routers. The message to be sent from T to R is the same in all four pictures. Label each of the four diagrams below to illustrate which one of the four switching schemes they illustrate. This is not a question about error-checking, or acknowledgments of packet transmissions assume that the system was designed assuming 100% reliability and that there are no errors on the network. Page 1 of 9
2 T A B C R T A B C R t a.: Datagram Packet Switching no call-request or call-accept packets to establish a path between T and R, but the message is divided up into multiple packets. (2 points) T A B C R Call Request Call Accept Acknowledgment t b.: Virtual Circuit Packet Switching resembles circuit switching with call setup, but messages are broken into individual packets for travel on shared data network. (2 points) Page 2 of 9
3 T A Call Request t B C R Call Accept Acknowledgment c.: Circuit Switching establish a path, and then send message in its entirety on a dedicated network. (2 points) T A B C R t d.: Switching message sent hop-by-hop, but there is no breaking up of message into individual packets. (2 points) e. Which of these four approaches most closely models the Internet s implementation of IP? Circle the correct answer. 1. Circuit Switching 2. Datagram Packet Switching 3. Virtual Circuit Packet Switching 4. Switching Answer: 2. If you answered 3, this is correct for TCP, but not for IP. (2 points) Page 3 of 9
4 2. Find the netid and hostid of the following IP addresses. Assume classful addressing. Remember that the netid is a fragment of an IP address such as 10.5, not a complete IP address like (2 points) (2 points) (2 points) none Special Use none Special Use (2 points) (2 points) 3. A host with IP address sends a message to a host with IP address Assume classful addressing. Yes or No: does the message travel through a router? How do you know? Yes these are class B addresses, but the first sixteen bits (first two decimal numbers) are different. Therefore they belong to different networks and must travel through a router. (2 points) 4. What two fundamental properties (not variables) must all routing tables guarantee and what do they mean? Be brief answer in the space provided. 1. Universal routing all valid destination addresses specified in packets arriving at a router must correspond to a route in the routing table. (2 points) 2. Shortest path the next hop for a packet indicated by a route must be the shortest one possible among the paths available to the router (2 points) What two values must a routing or switching table contain? What layer of the protocol stack does each one represent? 1. Destination layer 3 (or in general, layer n) (2 points) 2. Port or Hop layer 2 (or in general, layer n-1) (2 points) Page 4 of 9
5 5. The ARI organization has received a class C IP address for its internetwork: /24. The network manager needs to decide how to assign addresses to each part of the network shown below. This class C network is the only set of addresses available, and the entire set of reachable networks is shown in the diagram below. There are Ethernet LANs in four cities: Jax, San Fran, Tampa, and Dallas. There are 10 users with PCs on the Jax LAN. There are 5 users with PCs on each of the other three LANs. Each LAN also has a router to connect it to the other sites. Sites are interconnected with three point-to-point connections between the Jax routers and each of the other routers. The network manager wishes to suppress the forwarding of broadcasts between networks. Assume every network segment uses IP and routing. 10 users Router Jax T1 T1 T1 San Fran Router Tampa Router Router Dallas 5 users 5 users 5 users Part I: How many total IP addresses will you assign to devices on the Jax LAN? Circle the correct answer: a) 10 b) users + 1 router (1 point) c) 14 d) 16 How many total IP addresses will you assign to all devices on the Dallas LAN? a) 5 b) 6 5 users + 1 router (1 point) Page 5 of 9
6 c) 8 d) 9 e) 10 How many subnets will you assign to this network? a) 0 b) 1 c) 4 d) 5 e) 7 4 subnets for LANs, 3 for WANs (1 point) f) 8 Draw a circle on the diagram for each subnetwork you would create. Draw carefully! (4 points) Based on the answers above, how many bits should we take from the fourth octet of the class C network to describe subnets? Plan for growth of one new LAN and one PC per LAN, but pick the smallest number of subnets that will solve the problem. Assume we may not assign or use the subnet that contains the Class C network number or the Class C broadcast address. a) 0 b) 1 c) 2 d) 3 e) 4 (1 point) If you chose 3 bits and it was consistent with the number of subnets you chose, you received credit. f) 5 Does this subnetting solution make reasonably efficient use of addresses on all network segments for this company? Circle the correct answer and very briefly explain why. No. 16 addresses used to provide subnet for LAN with 10 PCs leaves 14 of 16 unused on WAN links requiring 2. (2 points) Calculate the ratio of the number of addresses that are available for assignment to devices / the total number of addresses possible in the Class C network. Assume that we reserve network and broadcast addresses they are not available for assignment. You do not have to calculate the percentage a formula is sufficient. (2^4 2) subnets * (2^4 2) assignable IPs per subnet / 2^8 possible IPs (for our class C) (2 points) Part II: Suppose now that the number of users on the JAX LAN increases to 58. What subnet mask would you now use on their class C network to allow for a subnet of 58 users? Page 6 of 9
7 (2 points). 58 users requires a subnet of 64 addresses, which in turn requires 6 bits for host ID. This leaves 2 bits for network ID, which is.192. Would using this new subnetwork mask produce a sufficient number of assignable subnets for the rest of ARI s network? How many subnets would your mask allow? No. (2 points). Two bits creates 4 combinations, 2 of which cannot be used, leaving 2 assignable across 4 LANs and 3 WANs. Not enough. What subnet mask makes the most sense to use for the T1 (serial) links assuming we cannot assign a subnet with the network number or the broadcast address? (2 points). T1 links are point-to-point, not a bus, and can never have more than 2 devices. Thus there is no need for growth later. 2 devices requires a subnet of 4 combinations, since 2 are wasted, leading to 2 bits for host id. This leaves 6 for network id, , which is.252. What subnetting scheme did we discuss in class that would allow you to still use this class C network and provide a sufficient number of assignable subnets and host IPs? VLSM or Variable-Length Subnet Masking (2 points). CIDR is what the ISP does to provide you with contiguous blocks of Class Cs. That is not the situation here. 6. Suppose we have a department with n computers on a single Ethernet segment running TCP/IP applications. Traffic between machines is distributed evenly, and broadcasts account for a small percentage of traffic. There are too many collisions and you want to divide the network into two parts. What device would you add to this network to help reduce the number of collisions. Explain how this would help reduce the number of collisions. The one and only answer is Bridge (10 points). It physically divides the LAN into two LANs, forwarding packets that must be sent from one LAN to another, filtering all others. Since the traffic pattern is distributed evenly between devices, this reduces the traffic by 50%, and therefore reduces the number of packets per second on each segment, thus reducing collisions. 7. Why is a repeater not the same thing as an amplifier if they both operate at layer one? An amplifier amplifies the waveform, including any noise that has been introduced in the signal in its journey. A repeater converts the incoming analog waveform back into a digital stream that the analog waveform represented, and re-encodes it as a new, noise-free waveform for delivery. (10 points) Page 7 of 9
8 8. You are hired as a network assistant and are given the task of configuring a new workstation for use on the network. You are told to assign the workstation the IP address /23. Assume that we are using subnetting, and that the network and broadcast addresses may not be assigned to a host. What is the network address (not the netid) for this particular subnetwork? (2 points). /23 means 23 bits of network ID. Thus, the first 23 bits of the 32 in the IP mask are 1s, the rest 0s. The last two octets in binary look like this: Now we apply this mask to , the IP address given. The last 16 bits given are , which when XOR d with the mast give you , or What is the range of IP addresses in this network or subnetwork assignable to hosts? (2 points). Simply state the range of combinations in the host portion of the network address from all 0 s to all 1 s, removing the first and the last. In other words, from to Add this to the network number and you have the range It is more difficult to calculate this without converting to binary first. What subnet mask should this workstation use? Show your answer in decimal (2 points). Set all network bits to 1, leaving all host bits 0 = = What is the direct broadcast IP address that this workstation should use? (2 points). Set all host bits to 1 = = How many addresses are available for assignment from this subnetwork (include.17)? 2^9 2, or 510(2 points). 23 bits of network (/23) leaves 9 bits for host, 2^ We have found the following CIDR block route entry in our router: /23 How many Class C addresses does this summarized route identify? Circle the correct answer. b. 2 (10 points). All or nothing on this one. Class C would normally be /24. We are told this is /23, so on extra bit has been reserved for the customer, thereby combining 2 possible class C s: the one whose 23 rd bit is 0, and the one whose 23 rd bit is 1. Page 8 of 9
9 10. We wish to examine the following network of PCs, Ethernet segments, and Bridges: S1 S2 S3 S4 S5 S1 S5 LAN1 LAN2 LAN3 B1 B2 port 1 port 2 port 1 port 2 Address Port Address Port S1 1 S1 1 S2 1 S2 1 S5 2 S5 1 S4 2 Show the final state of the B1 and B2 MAC tables as the following events occur. Assume each MAC table has enough memory to hold five entries as shown, implemented as a most-recently-used buffer. The first entry has been shown for you already. 1. S1 sends a packet to S5 (shown on the diagram already) 2. S2 sends a packet to S5 recorded only in right table 3. S5 sends a packet to S3 recorded only in right table 4. S4 sends a packet to S5 recorded only in right table 5. S3 generates a loopback IP packet generates no packet 6. S5 is physically moved to LAN 2 generates no packet 7. S5 sends a packet to S2 updated in both tables (10 points) Getting the S5 entry updated in table two properly was worth 4 points. Page 9 of 9
Linux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationChapter 18 and 22. IPv4 Address. Data Communications and Networking
University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing
More informationLecture 8 Network Layer: Logical addressing
Data Communications ACOE412 Lecture 8 Network Layer: Logical addressing Spring 2009 1 0. Overview In this lecture we will cover the following topics: 14.Network Layer: Logical addressing 14.1 IPv4 Addresses
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationLecture 2. Computer Networks Models. Network Models 1-1
Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationIP Addressing and Subnetting
IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet
More informationIP: Addressing, ARP, Routing
IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationChapter 9: Subnetting IP Networks
Chapter 9: Subnetting IP Networks Network Segmentation Reasons for Subnetting Subnetting is the process of segmenting a network into multiple smaller network spaces called subnetworks or subnets. The purpose
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More informationCC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite
CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.
More informationCCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks
CCNA Exploration Network Fundamentals Chapter 10 Planning and Cabling Networks Updated: 15/07/2008 1 10.0.1 Introduction 2 10.0.1 Introduction The following have been covered in previous chapters: considered
More informationChapter 2 Review Questions
Chapter 2 Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationInternet Protocol (IP)
CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationAddress Class (Exercise) B A
Address Class (Exercise) Address Class 177.100.18.4 B 119.18.45.0 A 192.249.234.191 C 10.10.251.12 A 223.32.232.190 C 129.132.24.2 B 18.250.1.1 A 150.10.15.0 B 197.14.2.0 C 174.17.9.1 B 148.17.9.1 B 193.42.1.1
More informationNetwork Layer/IP Protocols
Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationDepartment of Computer Science and Engineering. CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016
Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016 Midterm Examination Instructions: Examination time: 75 min.
More informationThe Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.
The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2010 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable calculators are permitted
More informationPART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)
PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationNETWORK LAYER: IP Addressing
NETWORK LAYER: IP Addressing McGraw-Hill The McGraw-Hill Companies, Inc., 2004 2000 Position of network layer McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Network layer duties McGraw-Hill The McGraw-Hill
More informationDepartment of Computer Science and Engineering. COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005
Department of Computer Science and Engineering COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005 Midterm Examination Instructions: Examination time: 75 min. Print
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 4 Packet Tracer file located in Supplemental Materials.
Part 1 Variable Length Subnet Mask (VLSM) Note: This case study utilizes Packet Tracer Please see the Chapter 4 Packet Tracer file located in Supplemental Materials An organization has been assigned the
More informationMcGraw-Hill The McGraw-Hill Companies, Inc., 2000
!! McGraw-Hill The McGraw-Hill Companies, Inc., 2000 "#$% & '$# )1 ) ) )6 ) )* )- ). )0 )1! )11 )1 )1 )16 )1 3'' 4", ( ( $ ( $ $$+, $$, /+ & 23,4 )/+ &4 $ 53" Network Layer Position of network layer Figure
More informationTutorial 2 : Networking
Lund University ETSN01 Advanced Telecommunication Tutorial 2 : Networking Author: Emma Fitzgerald Tutor: Farnaz Moradi November 26, 2015 Contents I Before you start 3 II Whole Class Exercise: Networking
More informationIP Address Assignment
IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections
More informationChapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number
More informationThe Internet. The Internet is an interconnected collection of netw orks.
The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationModule 7: Configuring and Supporting TCP/IP
Module 7: Configuring and Supporting TCP/IP Contents Overview 1 Introduction to TCP/IP 2 Examining Classful IP Addressing 10 Defining Subnets 17 Using Classless Inter-Domain Routing 29 Configuring IP Addresses
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationThe identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or
CBCN4103 The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address
More informationCS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).
Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More information7010INT Data Communications Lecture 7 The Network Layer
Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 06 IP Address
Chapter 06 IP Address IP Address Internet address Identifier used at IP layer 32 bit binary address The address space of IPv4 is 2 32 or 4,294,967,296 Consists of netid and hosted IP Address Structure
More informationCourse 6. Internetworking Routing 1/33
Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node
More informationUnit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham
More informationLecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1
Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationNetworking: Network Layer
CS 4410 Operating Systems Networking: Network Layer Summer 2013 Cornell University 1 Today How packages are exchanged in a WAN? Network Layer IP Naming Subnetwork Forwarding Routing Algorithms 2 Protocol
More informationInternetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms
Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 10: IP Routing and Addressing Extensions
CS 5520/ECE 5590NA: Network Architecture I Spring 2009 Lecture 10: IP Routing and Addressing Extensions This lecture provides discussion of the mechanisms used to route IP datagrams (Chapter 7). It also
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationTutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.
Tutorial 9 1 Router Architecture Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for
More informationLecture 11: Networks & Networking
Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page
More informationINTERNET ARCHITECTURE & PROTOCOLS
INTERNET ARCHITECTURE & PROTOCOLS Set # 01 Delivered By: Engr Tahir Niazi What is Internet? Basically it is called Network of networks Nuts and Bolts (Pieces of internet) Services description (applications)
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationData Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer
Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science
More informationTCP/IP and the OSI Model
TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol
More informationNetwork Layer: outline
Network Layer: outline 1 introduction 2 virtual circuit and datagram networks 3 what s inside a router 4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 5 routing algorithms link state
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationNetwork+ Guide to Networks
Yarmouk University Providing Fundamental ICT Skills for Syrian Refugees (PFISR) Network+ Guide to Networks Dr. Mohammad A. Al-Jarrah jarrah@yu.edu.jo In-Depth TCP/IP Networking Understand methods of network
More informationTable of Contents. Cisco TCP/IP
Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing
More informationChapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0
Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 8 - Sections & Objectives 8.1 Subnetting an IPv4 Network Explain how subnetting segments
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationChapter 18. Introduction to Network Layer
Chapter 18. Introduction to Network Layer 18.1 Network Layer Services 18.2 Packet Switching 18.3 Network Layer Performance 18.4 IPv4 Addresses 18.5 Forwarding of IP Packets Computer Networks 18-1 Communication
More informationAppleTalk. Chapter Goals. Introduction CHAPTER
35 CHAPTER Chapter Goals Describe the development history of the protocol, used almost exclusively in Macintosh computers. Describe the components of networks and extended network. Discuss the primary
More informationCS 520: Network Architecture I Winter Lecture 11: IP Address Conservation
CS 520: Network Architecture I Winter 2006 Lecture 11: IP Address Conservation This lecture provides discussion of several approaches that are used to make better use of the IP address space. Subnetting
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationCS118 Discussion, Week 6. Taqi
CS118 Discussion, Week 6 Taqi 1 Outline Network Layer IP NAT DHCP Project 2 spec 2 Network layer: overview Basic functions for network layer Routing Forwarding Connection v.s. connection-less delivery
More informationData Communication & Computer Networks Week # 13
Data Communication & Computer Networks Week # 13 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home Powerpoint
More informationInternet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationFull file at
Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics
More informationLab 9.6.2: Challenge EIGRP Configuration Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway HQ BRANCH1 BRANCH2 PC1 PC2 PC3 Fa0/0 S0/0/0 S0/0/1 Lo1 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/0 S0/0/1 NIC NIC NIC All
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationFirst the Basics Binary Arithmetic
www.preplogic.com -00-4-679 First the Basics Binary Arithmetic If you understand how binary numbers work, you can skip this section and go to the next. But, if you don t, you need to spend a bit of time
More informationAntonio Cianfrani. Fundamentals of IP Networking
Antonio Cianfrani Fundamentals of IP Networking The Internet network routers networks Hosts Network devices TCP/IP protocol stack Application Transport (TCP/UDP) Network (IP) Data Link Applications (HTTP,
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationINTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking
CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-6 SYSTEM 1 2 Large Scale Networking No Single Technology can Adequately Serve Every One s Need. Each LAN/ WAN has specific
More informationRouter Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers
Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router
More informationHubs. twisted pair. hub. 5: DataLink Layer 5-1
Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management
More informationWhat is the fundamental purpose of a communication system? Discuss the communication model s elements.
What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The
More informationEE122 - Midterm 1 Examination EECS-UC Berkeley October 2000
EE122 - Midterm 1 Examination EECS-UC Berkeley October 2000 B This is a closed book exam. The paper consists of 7 pages including the cover page. THe total poin obtinable for the paper is 100. Students
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves
More informationThis Lecture. BUS Computer Facilities Network Management. Internetworking. Internetworking
his Lecture BUS3150 - Computer Facilities Network Management Principles of internetworking. Protocol Version 4 (v4). v4 Address structure including subnetworking. Faculty of nformation echnology Monash
More informationCEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008
CEN445 Network Protocols & Algorithms Network Layer Prepared by Dr. Mohammed Amer Arafah Summer 2008 1 Internetworking Two or more networks can be connected together to form an Internet. A variety of different
More information