IP, Ethernet and MPLS Networks

Size: px
Start display at page:

Download "IP, Ethernet and MPLS Networks"

Transcription

1

2

3 IP, ernet and MPLS Networks

4

5 IP, ernet and MPLS Networks Resource and Fault Management André Perez

6 First published 2011 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Adapted and updated from Gestion des ressources et des défaillances dans les réseaux IP, MPLS et ernet published 2009 in France by Hermes Science/Lavoisier LAVOISIER 2009 Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd John Wiley & Sons, Inc St George s Road 111 River Street London SW19 4EU Hoboken, NJ UK USA ISTE Ltd The rights of André Perez to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act Library of Congress Cataloging-in-Publication Data Perez, Andre. [Gestion des ressources et des defaillances dans les reseaux IP, MPLS et ernet. English] IP, ernet, and MPLS networks : resource and fault management / Andre Perez. p. cm. Includes bibliographical references and index. ISBN Computer networks--management. 2. Computer networks--quality control. 3. Resource allocation. 4. Fault-tolerant computing. I. Title. TK P dc British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN Printed and bound in Great Britain by CPI Antony Rowe, Chippenham and Eastbourne.

7 Table of Contents Preface... xi Chapter 1. Network Operation Basic concepts Layered structure LANs WANs networks Protocol architecture Addressing principles IP technology Routing The IPv4 protocol The IPv6 protocol The MPLS technology Label switching Tables in the LSR The PHP function The format of the MPLS header Encapsulation of a labeled packet The ICMP ernet technology The physical layer The data link layer Chapter 2. Characterizing Quality of Service Quality of service functions Quality of network operation Availability... 29

8 vi IP, ernet and MPLS Networks Admissibility Loss ratio Delay Jitter Classes of service Bandwidth Requirements of applications Voice Video Application and control data The service contract The Enterprise section The Service section The Technology section The Quality of Service report Chapter 3. Transport Protocols Introduction The TCP Format of the TCP header Initiating and closing a connection Data transfer The slow start and congestion avoidance mechanisms The fast retransmit and fast recovery mechanisms The ECN mechanism The UDP Format of the UDP header The RTP Format of the RTP header The RTCP Format of the SR message Format of the RR message The DCCP DCCP procedure Congestion control Format of the DCCP header Options The SCTP Format of the SCTP header Association Data transfer... 73

9 Table of Contents vii Chapter 4. Implementing Operation Quality The architectural framework Implementation of resource management Relative QoS Guaranteed QoS Resource reservation scenarios Mechanisms associated with the user plane Load balancing Link optimization mechanisms Implementing fault management Network reconfiguration Fault detection Equipment reconfiguration Chapter 5. IP Technology Resource Management Introduction The DiffServ model The DSCP field The DiffServ architecture The IntServ model Principles of resource reservation The RSVP The ARSVP protocol Principles of aggregation The ARSVP procedure Chapter 6. IP Technology Fault Management Introduction Hot Standby Router Protocol Operating principles Format of the HSRP message Load balancing Virtual Router Redundancy Protocol Operating principles Format of the VRRP message OSPF protocol Operating principles Format of the OSPF message Restarting the OSPF protocol Border Gateway Protocol Operating principles

10 viii IP, ernet and MPLS Networks Format of the BGP message Path attributes Route selection BGP restart Chapter 7. MPLS Technology Resource Management Introduction Support for DiffServ Types of virtual circuits Interaction between markings Traffic engineering Operating principles The RSVP-TE protocol OSPF-TE protocol Chapter 8. MPLS Technology Fault Management Introduction The LDP Operating principles Format of the LDP PDU The LDP messages Restarting the LDP The RSVP-TE protocol Failure detection Restarting the RSVP-TE protocol The FRR mechanism Operating principles Extensions of the RSVP-TE protocol Procedure of the FRR mechanism Chapter 9. ernet Technology Resource Management Introduction Priority management Resource reservation The bandwidth manager The SBM protocol Flow control The access network Architecture of the PON Priority management in EPON Priority management in GPON The aggregation network

11 Table of Contents ix Chapter 10. ernet Technology Fault Management Introduction The STP Operating principles Format of the BPDU message Procedure of the STP The RSTP Operating principles Format of the BPDU message Procedure of the RSTP The MSTP Operating principles Format of the BPDU message Procedure of the MSTP Link aggregation Operating principles The LACP message The Marker protocol The aggregation network Operating principles The APS protocol Conclusion Bibliography Abbreviations Index

12

13 Preface This book addresses two aspects of network operation quality; namely, resource management and fault management. Network operation quality is among the functions to be fulfilled in order to offer quality of service, QoS, to the end user. It is characterized by four parameters: packet loss; delay; jitter, or the variation of delay over time; availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service. Internet Protocol (IP), Multiprotocol Label Switching (MPLS) and ernet are the main technologies deployed by operators, in the case of wide area networks (WANs), and by businesses, in the case of local area networks (LANs). Initially, these technologies were not designed to deal with resource management, which partly explains their simplicity and commercial success. The features offered were sufficient at the time to offer services without QoS (best effort) constraints, such as web access and electronic messaging. Resource management is indispensable when QoS constraints need to be taken into account. Voice and video are two applications illustrative of strong QoS requirements. Resource management can be provided using two different approaches:

14 xii IP, ernet and MPLS Networks resources are managed node by node. No resource is allocated to a flow from end to end. In this case, there is a risk of congestion, as the resources of one node may become insufficient to meet demand. The network thus offers relative QoS; resources are allocated to a flow from end to end. The Connection Admission Control (CAC) function allows congestion to be avoided in the network, in that case offering guaranteed QoS. Deployed networks essentially implement relative QoS, as they have the advantage of simplicity compared with guaranteed QoS. The oversizing of current networks, associated with traffic measurement functions that feed into capacity planning, has so far enabled congestion problems to be solved in a satisfactory manner. Such a mode of operation can prove inadequate in cases of large increases in video traffic. The latter can be classified according to two communication patterns: broadcast video. A video source broadcasts one and the same program to several users. Resource consumption depends on the number of sources and is relatively independent from the number of users. A network offering relative QoS allows for the transport of this type of traffic, whose increase is not dramatic; unicast video. The video signal is exchanged in real time between a source and a user (on-demand video) or between two users. Resource consumption depends on the number of users. Given the required throughput per video program, oversizing the network may not be an adequate response. A network offering guaranteed QoS may prove to be the only option for this type of traffic. Fault management relies on devices that enable a reconfiguration of the network following a fault in a node or link, and the reconfiguration of a node following a fault in the data processing board of the control plane. The main parameter associated with the reconfiguration of the network is the convergence time. This is relatively long for IP and ernet networks. Depending on network size, it can reach several tens of seconds. These values may be sufficient for businesses that deploy LANs. In contrast, operators that deploy WANs require substantially quicker times and seek values less than one second or even one tenth of a second. The reconfiguration of the node, upon its detection by adjacent nodes, will cause a first reconfiguration of the network when the processor board is faulty, and a second reconfiguration of the network once switching to the standby board has taken place. The purpose of Graceful Restart-type mechanisms is to avoid this double switching.

15 Preface xiii Consequently, this book is structured in 10 chapters; the main topics discussed therein are summarized in the following table. Chapter Designation Description 1 Network Operation IP, MPLS, ernet technologies 2 Characterizing Quality of Service Operation quality parameters, requirements of applications, the service contract 3 Transport Protocols The TCP, UDP, RTP, DCCP, and SCTP protocols Implementing Operation Quality IP Technology Resource Management IP Technology Fault Management MPLS Technology Resource Management MPLS Technology Fault Management ernet Technology Resource Management ernet Technology Fault Management Mechanisms associated with the user plane Relative QoS: the DiffServ model; Guaranteed QoS: the IntServ model and the RSVP protocol Network reconfiguration: LAN-side HSRP and VRRP protocols, WAN-side OSPF and BGP routing protocols. Node reconfiguration: the Graceful Restart mechanism Relative QoS: DiffServ support; Guaranteed QoS: traffic engineering and the RSVP-TE and OSPF-TE protocols Node reconfiguration: the Graceful Restart mechanism and the LDP and RSVP-TE protocols. Network reconfiguration: the FRR mechanism Relative QoS: frame tagging; the PON access network. Guaranteed QoS: the SBM protocol Network configuration: the STP, RSTP, and MSTP protocols; linear protection. Link reconfiguration: the LACP protocol

16

17 Chapter 1 Network Operation 1.1. Basic concepts The purpose of the network is to convey data between the terminal stations, or hosts. The network is comprised of nodes that are interconnected with one another by links. The network nodes perform two elemental functions: transmission: this function allows for the adaptation of the data to be transmitted on the transmission medium (copper pair, optical fiber, free space); connectivity: this function allows for the transfer of the data between an input and an output of the network node. The network includes two entities: the local area network (LAN): this is a private network, deployed inside a company, and provides a connection between hosts (client stations, servers, telephone terminals); the wide area network (WAN): this is a public network, deployed by operators or service providers, and provides interconnection between LANs. The WAN is comprised of access networks, aggregation networks, and a core network Layered structure The transmitted data are structured in layers (Figure 1.1). Each layer implements an encapsulation that corresponds to a PCI (protocol control information) header including fields whose interpretation is defined by a protocol. The Internet or

18 2 IP, ernet and MPLS Networks Transmission Control Protocol (TCP)/Internet Protocol (IP) model is composed of three layers: the application layer (layer 7), which enables communication between distant software applications. The obtained data structure constitutes the message; the transport layer (layer 4): the TCP and UDP (User Datagram Protocol) are the most common protocols. The transport layer enables a remote application to be addressed through a target port number. The TCP additionally makes it possible to check that the data transfer was performed properly from end to end. The Real-time Transport Protocol (RTP) complements the UDP. It is used for real-time applications (e.g. voice or video). The obtained data structure constitutes a segment; the network layer (layer 3): the Internet model defines two versions of the IP, IPv4 and IPv6. The network layer allows data to be transferred across the network. The information used is the destination IP address. The network nodes that perform such a transfer are the routers. The network layer therefore fulfils the connection function. IP operates in a non-connected mode: the data transfer is not conditional upon the implementation of a path between the two endpoints. The obtained data structure constitutes a packet. Internet Model DNS, DHCP, SNMP TELNET Layer Number Structure Name Encapsulation Header : PCI Protocol Control Information HTTP, SMTP, POP3 FTP 7 Message PCI TCP - UDP 4 Segment PCI IP 3 Packet PCI Data Link Layer 2 Frame PCI Physical Layer 1 Frame/Bit PCI Figure 1.1. Layered structure

19 Network Operation 3 The protocols for the data link layer (layer 2) and the physical layer (layer 1) depend on the type of network traversed: the purpose of the data link layer is to delineate the beginning and end of the transmitted data structure. Other functions may be added, such as flow control or error checking. The obtained data structure constitutes a frame; the purpose of the physical layer is to define the interface of the node (level, impedance, sensitivity, line code, or modulation). The physical layer performs the transmission function. Some protocols also define a header whose main function is to synchronize the physical frame LANs Typical LANs deployed in large businesses consist of several blocks (Figure 1.2): the Users block allows the client stations, i.e. the network users, to be connected; the Server block encompasses all the company s application servers; the Management block comprises the servers and the supervision and administration stations of the LAN; the Access block provides access to the WAN network; the Core network block performs the interconnection of the various blocks. The equipment that makes up the Users, Servers, and Management blocks belongs to two types: access switches; and distribution switches. Distribution switches are also used in the Core and WAN Access blocks. An access switch is a machine that employs ernet technology. The latter specifies the protocols for the physical layer and the data link layer. The physical layer uses a copper pair or optical fiber as the transmission medium. The data link layer allows the data to be transferred across the LAN. The information used to perform the transfer is the target MAC (Media Access Control) address contained in the ernet header. The ernet data link layer thus performs a connectivity function. The switching table of the switch is acquired through a learning process, based on the source MAC addresses of the received frames. Similar to the IP, the ernet operates in a non-connected mode.

20 4 IP, ernet and MPLS Networks The distribution switch is a multi-level or multi-layer switch (MLS). It can provide connectivity between an input port and an output port using the following layers: the ernet data link layer; the IP network layer; and the TCP or UDP transport layer. Level 3 connectivity is identical to that used by an IP router; the difference lies in the interfaces. An MLS has ernet interfaces and is less constrained resourcewise than an IP router, which has interfaces with the WAN whose throughput rates might be lower. Level 4 (transport layer) connectivity may be used at the Servers block. Connectivity is then based on port numbers. Level 4 connectivity allows users to utilize the same IP address (that of the MLS) to reach the various servers without distinction. Users Block Access Switch Distribution Switch MLS Users Block Core Block MLS MLS Router WAN Access Block Servers Block WAN Management Block Figure 1.2. Architecture of a LAN

21 Network Operation WANs networks It is customary for WANs to be structured in three entities (Figure 1.3): the Access Network, which allows a client to be connected to the first technical site of the operator; the Aggregation Network, which performs the collection of traffic from access networks; the Core Network, a mesh network that provides the interconnection of the various aggregation networks and an interface with different operators networks. The combination of the access network and aggregation network is based on the transport of ernet frames. Such transport is provided by the Q-in-Q, VPLS (Virtual Private LAN Service), and VPWS (Virtual Private Wire Service) ernet technologies. An IP router provides an interconnection with the core network. The MPLS (Multi-Protocol Label Switching) technology is often employed by operators in the core network. The OTN (Optical Transport Network)/DWDM (Dense Wavelength-Division Multiplexing) technology enables large throughput rates to be achieved for the interconnection of the equipment in the aggregation network and core network. Core Network Aggregation Network Access Network Figure 1.3. Architecture of a WAN The MPLS technology operates in a mixed mode for the following reasons: IP connectivity (non-connected mode) is provided at an edge node of the network; a virtual circuit, called an LSP (Label Switching Path), is implemented between two edge nodes. Equipment within the MPLS network performs label switching.

22 6 IP, ernet and MPLS Networks The VPWS and VPLS technologies allow ernet frames to be transported across the network using the concepts of MPLS technology. The VPWS technology enables the provision of a point-to-point link service. The VPLS technology enables the provision of a multiple-access broadcasting network emulation service. As with the MPLS technology, the connection mode is mixed for the following reasons: ernet connectivity (non-connected mode) is provided at an edge node of the network; a virtual circuit, referred to as a Pseudo-Wire, is created between two edge nodes. As with the MPLS network, equipments within the VPLS or VPWS network perform label switching. The OTN/DWDM technology relies on two types of multiplexing: a time multiplexing of tributaries at 1 Gb/s (Giga ernet Interface) or 2.5 Gbit/s (STM-16 interface), or at 10 Gbit/s (STM-64 or 10G ernet interfaces) into a 40 Gbit/s resultant; a wavelength multiplexing, DWDM, into an 80- or 160-wavelength resultant, wherein each wavelength can support a 40 Gbit/s rate. Optical fibers are used as the transmission medium employed to connect the equipment in the aggregation network and the core network, whereas three types of medium are used in the access network: optical fibers, with point-to-point ernet links for the connection of large businesses. A wiring program using optical fibers for residential users is underway in France, with point-to-point ernet or point-to-multipoint PON (Passive Optical Network) links. Optical fibers are mainly used in dense urban areas; copper pairs, with ADSL (Asymmetric Digital Subscriber Line) or SHDSL (Single pair High-speed Digital Subscriber Line) links for the connection of residential users, professionals, and small and medium businesses. Copper pairs are used in urban areas of high or medium density; free space, with WiMax wireless links for rural areas, or WiFi in the case of HotSpots. WiFi technology is also present in LANs Protocol architecture The different operations performed by network components are described in Figure 1.4.

23 Network Operation 7 Host Host LAN WAN LAN switch router router switch L7 L4 IP Connectivity Connectivity IP IP Connectivity IP IP Connectivity IP IP Connectivity L7 L4 IP L2 L2 L2 L2 L1 L1 L1 L1 Transmission Transmission Transmission Transmission Transmission Transmission Figure 1.4. Protocol architecture The end user (for example, a PC or server) carries out various encapsulations before transmitting the data to its access switch. Based on the received data, the switch performs the following operations: when receiving, it unencapsulates the physical layer and the ernet data link layer, retrieves the destination MAC address, and searches the switching table for the output port; when transmitting, it performs the encapsulation of the data link layer and the ernet physical layer and transmits the data to the router. It should be noted that the IP packet is not interpreted by the switch. The router performs the following operations: when receiving, it unencapsulates the physical layer, the ernet data link layer and the network layer IP, retrieves the destination IP address, and searches the routing table for the output port; when transmitting, it performs the encapsulation of the IP network layer, of the data link layer and of the physical layer, and sends the data to the WAN. It should be noted that the segment is not interpreted by the router. The physical layer and data link layer protocols, at the interface between the router and the WAN, are specified by the service provider or operator. The WAN s IP routers perform the same basic functions as that which interconnects the LAN to the WAN. The operation of MPLS routers will be explained later. Networks are partitioned into a plurality of AS (Autonomous System) domains. All the equipment in a domain is administered by a single entity.

24 8 IP, ernet and MPLS Networks Inside a domain, routers exchange information that allows the routing table to be dynamically populated. This information, which contains the destination networks and associated metrics, is carried by IGP (Internal Gateway Protocol) routing protocols. The edge routers of the different domains are interconnected with one another. They, too, exchange information, which is carried by EGP (External Gateway Protocol) routing protocols Addressing principles Two types of relationship between terminals are defined in the Internet model; the difference between them arises from the way in which the session (socket) identifiers are implemented: the client-server relationship; the peer-to-peer relationship. The relationship between terminals utilizes a session identified by four identifiers: the IP address of the source; the IP address of the destination; the port number of the source; the port number of the destination. In a client-server relationship, the session is always initialized by the client that sets up the socket: the IP address of the source may be static (manually configured) or dynamic (obtained by sending a request to a DHCP (Dynamic Host Configuration Protocol) server); the IP address of the destination is obtained dynamically from a DNS (Domain Name System) server. The information provided to the DNS server to obtain that IP address is an URL (Uniform Resource Locator; Figure 1.5); the port number of the source is a random number greater than 1,024; the destination port number depends on the application to which the client is establishing a connection. In a peer-to-peer relationship, each peer defines a half-socket including the IP address and port number of the source. Additional messages need to be exchanged

25 Network Operation 9 between the two peers in order for each end to retrieve the half-socket determined by the other end. Voice transmission is an example of a peer-to-peer relationship. SIP (Session Initiation Protocol) and SDP (Session Description Protocol) signaling messages enable each entity to complete its socket. Application URL: Universal Resource Locator Domain name Browser Protocol Web Server Directory File DNS Server Query DNS Protocol IP : (decimal notation) WEB Server Query or Gateway Router Query ARP Protocol MAC : 00:C0:9F:B7:60:37 (hex notation) Figure 1.5. Mechanisms for retrieving destination addresses The identifiers used for the ernet data link layer are the MAC (Media Access Control) addresses of the source and destination. The MAC address of the source is generally that provided by the network card vendor. The destination MAC address is obtained from the destination IP address using the ARP (Address Resolution Protocol) protocol (Figure 1.5): the destination MAC address is that of the recipient if the latter is in the same network as the source in the IP addressing scheme sense; the destination MAC address is that of the router, which provides a way out of the LAN, if the source and recipient are in two different networks in the IP addressing scheme sense IP technology Routing The main purpose of the router is to transfer received packets to an output port. In order to carry out this function, the router needs to determine, for each received

26 10 IP, ernet and MPLS Networks packet, the IP address of the next hop. That information is obtained from the routing protocols used, in order to construct two tables: RIB (Routing Information Table). This table is located in the processor board performing the processing of data belonging to the control plane; FIB (Forwarding Information Table). This table is located in the line card performing the processing of data belonging to the user plane. The RIB table is directly populated from the routing protocols. The FIB table is a copy of the RIB table. When a packet is received, a decision is made directly at the line card level, without having to search the RIB table. This arrangement significantly improves the router s transfer capacity The IPv4 protocol The IPv4 protocol resides in each end station or host in the network, and in each router involved in conveying the packet. It fulfils two basic functions: routing and fragmentation. Routing is based on the destination address contained in the header. Fragmentation consists of constructing reduced-size packets, according to the type (in the level 2 protocol sense) of network being traversed. The IPv4 protocol, in its basic version, does not provide a reliable packet routing service. There is no acknowledgment among routers, no error checking of the data encapsulated by the IP header, and no flow control. The IP only performs error checking on the header. The IPv4 protocol header contains the following fields (Figure 1.6) Version IHL Type of Service Total Length Identification Flags Fragment Offset Time To Live Protocol Header Checksum Source Address Destination Address Figure 1.6. Format of the IPv4 header

27 Network Operation 11 Version: this field comprises the version number of the IP. Its value equals four. IHL (Internet Header Length): this field comprises the size of the IP header as a multiplier of 4 bytes. For a header with no options, the value of this field equals five. Type of service: this field was defined in the original version of the standard in order to implement priority management, and to provide indications on the required level of delay, rate, and reliability. It has been superseded by the DSCP (DiffServ Code Point) field, which identifies a set of flows for which quality-of-service mechanisms are defined. Total length: this field comprises the size of the packet, including the IP header and the encapsulated data. Identification: this field comprises a value allowing the fragments of the IP packet to be reassembled upon reception. Flags: this field comprises three bits that are used as follows: the first bit is always set to 0; the second bit determines whether fragmentation is enabled (bit set to 0) or disabled (bit set to 1); the third bit identifies the last fragment (bit set to 0) or the intervening fragments (bit set to 1). Fragment offset: this field indicates the position of the fragment within the initial packet. Time to live (TTL): this field comprises the maximum number of routers crossed by the packet. Each crossed router decrements by one unit the value of this field. When the value equals zero, the packet is discarded and an ICMP error message is returned to the source. Protocol: this field comprises a value allowing the identification of the type of data encapsulated by the IP header. Header checksum: this field comprises a checksum calculated solely on the header. Source address: this field comprises the IP address of the packet source. Destination address: this field comprises the IP address of the packet recipient.

28 12 IP, ernet and MPLS Networks Options: the options defined in the original version of the standard are as follows: loose source routing: this field contains a non-exclusive list of routers to be crossed by the IP packet (source routing); strict source routing: this field contains an exclusive list of routers to be crossed by the IP packet (source routing); record route: this field contains the list of all routers crossed by the IP packet; Internet timestamp: this field contains the time at which a packet crossed a router The IPv6 protocol The main modification brought in by the IPv6 protocol regards the size (16 bytes) allocated to the field of the source and destination addresses, which results in a larger-sized header (40 bytes). The IPv6 protocol introduced simplifications over the IPv4 protocol, allowing for better performance in terms of packet processing by routers. The following fields were deleted from the IPv6 header: IHL: the IPv6 header has a fixed length; identification, flags, fragment offset: fragmentation is dealt with through an extension; header checksum: it is considered that the transmission is of a good quality and that binary errors are infrequent. Options were removed from the basic header and replaced by new headers, called extensions, which can be ignored by intermediary routers. Apart from the hop-by-hop option, which is processed by all intermediary routers, other options are only taken into account by the terminal stations. The IPv6 header contains the following fields (Figure 1.7). Version: this field presents the version number of the IP. Its value equals six. Traffic class: this field is equivalent to the DS field in the IPv4 header. Flow label: this field presents a unique number chosen by the source, whose purpose is to facilitate the task of the routers in implementing the quality of service functions for a particular flow.

29 Network Operation Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address Figure 1.7. Format of the IPv6 header Payload length: this field presents the size of the data encapsulated by the IP header. Next header: this field presents the identifier of the next header of the data encapsulated by the IP header. This field has the same role as the Protocol field in the IPv4 header. This field allows the extensions of the IPv6 header to be chained: hop-by-hop options: this extension is processed by all routers crossed by the IP packet. It includes the router alert option, which is used when sending an RSVP message; routing: this extension enables source routing and contains a non-exclusive list of the routers to be crossed by the IP packet (loose source routing); fragment: this extension supports the fragmentation of an IPv6 packet. Unlike the fragmentation carried out by the router under IPv4, fragmentation in IPv6 must be carried out by the sender of the packet. For that purpose, the sender therefore has to implement a packet size discovery technique; destination options: this extension presents options that are processed by the recipient;

Network Performance Analysis

Network Performance Analysis Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

The Internet of Things

The Internet of Things The Internet of Things The Internet of Things Connecting Objects to the Web Edited by Hakima Chaouchi First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1 Introduction to routing in the Internet Ethernet, switching vs. routing Internet architecture IPv4 Addressing Routing principles Protocols: IPv4, ICMP, ARP (Chapters 2 3 in Huitema) E7310/Internet basics/comnet

More information

Protocols. End-to-end connectivity (host-to-host) Process-to-Process connectivity Reliable communication

Protocols. End-to-end connectivity (host-to-host) Process-to-Process connectivity Reliable communication Protocols Tasks End-to-end connectivity (host-to-host) Process-to-Process connectivity Reliable communication Error detection Error recovery, e.g. forward error correction or retransmission Resource management

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

QoS OVER HETEROGENEOUS NETWORKS

QoS OVER HETEROGENEOUS NETWORKS QoS OVER HETEROGENEOUS NETWORKS Mario Marchese Department of Communications, Computer and System Science University of Genoa, Italy QoS OVER HETEROGENEOUS NETWORKS QoS OVER HETEROGENEOUS NETWORKS Mario

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer s Introduction Course goals Advanced topics in ing cross-layer vision advanced functionalities design, performance Organization h course slides are not exhaustive - you must take notes

More information

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks... Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer

More information

Overview p. 1 Broadband and ATM p. 2 The Evolution Toward Broadband p. 3 Access Networks, Core Networks, and Service Providers p.

Overview p. 1 Broadband and ATM p. 2 The Evolution Toward Broadband p. 3 Access Networks, Core Networks, and Service Providers p. Contents p. v Preface p. xxiii Conventions p. xxiv Acknowledgments p. xxiv Overview p. 1 Broadband and ATM p. 2 The Evolution Toward Broadband p. 3 Access Networks, Core Networks, and Service Providers

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

A Segment Routing (SR) Tutorial. R. Bonica NANOG70 June 6, 2017

A Segment Routing (SR) Tutorial. R. Bonica NANOG70 June 6, 2017 A Segment Routing (SR) Tutorial R. Bonica NANOG70 June 6, 2017 AKA: SPRING IETF Standardization Source Packet Routing In Networking (SPRING) WG ISIS, OSPF, IDR and MPLS WGs What is SR? A tunneling technology

More information

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo. QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Concurrent, Real-Time and Distributed Programming in Java

Concurrent, Real-Time and Distributed Programming in Java Concurrent, Real-Time and Distributed Programming in Java FOCUS SERIES Jean-Charles Pomerol Concurrent, Real-Time and Distributed Programming in Java Threads, RTSJ and RMI Badr Benmammar First published

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

SYED AMMAL ENGINEERING COLLEGE

SYED AMMAL ENGINEERING COLLEGE QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

10 Gigabit Ethernet XM LAN Services Modules

10 Gigabit Ethernet XM LAN Services Modules 10 Gigabit Ethernet XM LAN Services Modules Ixia s 10 Gigabit Ethernet XM LAN Services Modules (LSMs) offer unprecedented scalability, performance, and service testing flexibility as part of the Optixia

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Reti di Calcolatori I

Reti di Calcolatori I Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria

More information

CSCI Networking Name:

CSCI Networking Name: CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Multimedia in the Internet

Multimedia in the Internet Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Common Protocols. The grand finale. Telephone network protocols. Traditional digital transmission

Common Protocols. The grand finale. Telephone network protocols. Traditional digital transmission The grand finale Common Protocols An Engineering Approach to Computer Networking Previous chapters presented principles, but not protocol details these change with time real protocols draw many things

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Where we are in the Course

Where we are in the Course Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Gigabit Ethernet XMVR LAN Services Modules

Gigabit Ethernet XMVR LAN Services Modules Gigabit Ethernet XMVR LAN Services Modules Ixia's Gigabit Ethernet XMVR LAN Services Modules (LSMs) offer Layer 2-3 network testing functionality in a single test system. Each test port supports wire-speed

More information

Gigabit Ethernet XMVR LAN Services Modules

Gigabit Ethernet XMVR LAN Services Modules Gigabit Ethernet XMVR LAN Services Modules Ixia's Gigabit Ethernet XMVR LAN Services Modules (LSMs) offer Layer 2-3 network testing functionality in a single test system. Each test port supports wire-speed

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

Router 6000 R17 Training Programs. Catalog of Course Descriptions

Router 6000 R17 Training Programs. Catalog of Course Descriptions Router 6000 R7 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 IP NETWORKING... 4 IP OVERVIEW & FUNDAMENTALS... 8 IP ROUTING OVERVIEW & FUNDAMENTALS...0

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

Review of Important Networking Concepts TCP/IP

Review of Important Networking Concepts TCP/IP Review of Important Networking Concepts / / Protocol Suite Assignment of Protocols to Layers Addressing / Layers in the Example Encapsulation and Demultiplexing Different Layers Views of Networking / Protocol

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK UNIT 1

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK UNIT 1 VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Year & Semester : II / IV Section : CSE Subject Code : CS6551 Subject Name

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science & Engineering

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science & Engineering INTERNAL ASSESSMENT TEST 2 Date : 01/04/2015 Max Marks : 50 Subject & Code : Computer Networks-II/10CS64 Section : VI- A & VI-C Name of faculty : Ravi Dixit Time : 8:30-10:00am Note: Answer ALL Questions

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Computer Networking. Introduction. Quintin jean-noël Grenoble university

Computer Networking. Introduction. Quintin jean-noël Grenoble university Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

Configuration and Management of Networks. Pedro Amaral

Configuration and Management of Networks. Pedro Amaral Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

TXS 10/100 Mbps and Gigabit Ethernet Load Modules

TXS 10/100 Mbps and Gigabit Ethernet Load Modules TXS 10/100 Mbps and Gigabit Ethernet Load Modules Ixia's TXS family of Ethernet load modules offer complete layer 2-7 network and application testing functionality in a single platform. Wire-speed layer

More information

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services By Scott Kotrla How VPLS Compares to Existing VPN Technologies Multipoint Bridged Ethernet is a service offering that attempts to recreate

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information