Chapter 2 Advanced TCP/IP

Size: px
Start display at page:

Download "Chapter 2 Advanced TCP/IP"

Transcription

1 Tactical Perimeter Defense 2-1 Chapter 2 Advanced TCP/IP At a Glance Instructor s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms

2 Tactical Perimeter Defense 2-2 Lecture Notes Overview Chapter 2 introduces you to the fundamentals of TCP/IP networking. To secure a network, understanding the TCP/IP protocol suite is vital. You review IP addressing briefly, revisit the TCP life cycle, and review how TCP communications sessions work. Then you move on to learn about Internet Protocol version 6 (IPv6), the next generation of IP. Even if you re familiar with TCP/IP and IPv4, IPv6 involves some new protocols and functions you need to know. In this chapter, you examine the core protocols of IPv6 and learn about IPv6 addressing and utilities. Chapter Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe Internet Protocol version 6 (IPv6) Teaching Tips TCP/IP Fundamentals Review 1. Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a suite of many protocols for transmitting information from point to point on a network. Teaching Tip Read more about the Internet protocol suite at: The OSI Model and TCP/IP Protocols 1. Mention that TCP/IP protocols correspond roughly to OSI layers. Use Figure 2-1 to illustrate your explanation. TCP/IP Addressing 1. Explain that IPv4 addressing calls for 32 bits (4 octets) of data. An IPv4 address contains two parts: a. Network address: shared among computers in network b. Host address: unique to a computer in its subnet 2. Mention that subnet mask distinguishes between network and host address for other computers.

3 Tactical Perimeter Defense Explain that network address translation (NAT) hides internal addresses of network. 4. Mention that IPv4 allows five address classes based on the number of networks compared to the number of hosts. Use Table 2-1 to illustrate your explanation. 5. Explain that subnetting logically segments internal networks. It borrows bits from host portion of IP address to create subset of networks with network IDs. Use Table 2-2 to illustrate your explanation. 6. Mention that subnetting makes network management easier and optimizes security, performance, and access. 7. Describe the following additional purposes of subnetting: a. Mirror organization s physical layout b. Mirror organization s administrative structure c. Plan for future growth d. Reduce and control network traffic 8. Explain that you should select the mask that most meets your needs. To do this, find usable IP addresses for the host and broadcast addresses. Next, convert the last masking octet to binary. Then, determine the block size from the binary place value of the last masking digit. Finally, you need to assign the mask to your network. Use Table 2-4 to show a subnetting example. 9. Describe the formula for calculating subnets a. 2 y 2 = number of usable subnets (y is the number of borrowed bits) b. 2 x - 2 = number of usable hosts per subnet (x is the number of unborrowed bits) 10. Explain that variable length subnet masking (VLSN) involves applying masks of varying sizes to the same network. VLSN allows more efficient use of address spaces. 11. Step through Activity 2-1: Determining your computer s IP address. Objective: Determine the IP address of your computer using the ipconfig command. 12. Explain that classless interdomain routing (CIDR) specifies the number of masked bits in an IP address/subnet mask combination. CIDR overcomes the limits of default subnet masks in that unused addresses don t go to waste. 13. In addition, CIDR helps you to exchange subnet mask information between routers and allows VLSM and supernetting to work. Example: becomes /27 in CIDR notation. Teaching Tip Supernetting, also known as summarization, is used to summarize multiple routing table entries into one entry.

4 Tactical Perimeter Defense Describe unicasting, multicasting, and broadcasting. With unicasting, a packet is sent from a server to each client that requests a file or application. Multicasting means a packet is sent from server to all requesting clients as a group in one transmission. It reduces network traffic. A broadcast communication is sent to all network points. There are two types of broadcast: flooded and directed. Examining Internet Protocol Version 4 1. Explain that TCP/IP is packet-based; it gives computers a fairly simple framework for transmitting information in small packages called packets or datagrams. 2. Mention that attackers may intercept packets and falsify or manipulate information. These attacks can disable servers and make networks vulnerable. IP Datagrams 1. Mention that each complete message is separated into multiple datagrams. Each IP datagram is divided into the following sections: a. Header b. Data c. Optional footer d. Optional CRC (Cyclic Redundancy Check): error-checking algorithm 2. Explain that the header section is used to communicate across network. Use Figure 2-3 to describe the IP header structure. IP header holds the following fields: a. Header version: IP version b. Header length: describes length in 32-bit words c. Type of service: four options for quality of service d. Total length: 16-bit field e. Identification: used to reassemble packets in order f. Flags: indicate whether packet is fragment or last fragment g. Fragment offset: indicates where fragment fits in data stream h. Time to live (TTL): max time before packet is dropped i. Protocol: type of transport packet j. Header checksum: sum of header packet values calculated by CRC k. Source IP address: address of device sending packet l. Destination IP address: address of device receiving packet m. Options: security; routing information ICMP Messages 1. Explain that Internet Control Message Protocol (ICMP) is designed to assist TCP/IP networks with troubleshooting communication problems. ICMP indicates whether another host can be reached through a ping signal. Use Table 2-5 to list some common ICMP types.

5 Tactical Perimeter Defense 2-5 Teaching Tip For more information about ICMP, refer to the following Web site: TCP Headers 1. Explain that TCP headers contain the following six flags to filter packets: a. URG (urgent) b. ACK (acknowledgement) c. PSH (forces forward and delivery of packet) d. RST (reset the connection) e. SYN (synchronize sequence numbers) f. FIN (no more data from sender) 2. Mention that there are two new flags for congestion notification: ECN, CWR. UDP Headers 1. Explain that User Datagram Protocol (UDP) provides a datagram transport service for IP, but this protocol is considered unreliable because it is connectionless. UDP is faster than TCP and good for real-time and multimedia, broadcast messages, and some protocols (SNTP, TFTP). 2. Explain that attackers can scan for open UDP services to exploit by sending empty UDP datagrams to a suspected open port. If the port is closed, the system sends back an ICMP Destination Unreachable message (type 3). 3. Use Figure 2-5 to describe the UDP header structure. Activity 2-2: Using Wireshark 1. Objective: Download, install, and explore software for monitoring and analyzing network traffic. Packet Fragmentation 1. Mention that packet fragmentation was originally created to allow large packets to pass through routers. 2. Explain that packet fragmentation creates security problems. Only fragment number 0 has a port number; all others pass through the filter. As a solution, you should configure firewall to drop fragmented packets or allow only reassembled packets to pass through. The TCP Life Cycle 1. Explain that before a client initiates a TCP session, it must determine the port number that identifies the session and the starting sequence number.

6 Tactical Perimeter Defense Explain that the TCP three-way handshake (see Figure 2-11) establishes a reliable connection between two points. Three methods are used to control the flow of data: a. Buffering b. TCP sliding windows c. Congestion avoidance Domain Name System 1. Explain that the Domain Name System (DNS) translates fully qualified domain names (FQDNs) to IP addresses. DNS helps administrators block unwanted communications. 2. Describe how DNS can be exploited by attackers, including: a. Buffer overflow: long DNS name b. Zone transfer: list of DNS-configured hosts on network c. Cache poisoning: stored DNS addresses Encryption 1. Mention that encryption protects data by converting plain text to encoded cipher text. 2. Explain that encryption is often used with digital certificates. Digital certificates use a digital signature to authenticate identity and key to encrypt/decrypt. 3. Mention that for high security, you should use a Public Key Infrastructure (PKI) for public and private key distribution. Teaching Tip Digital signatures and PKI are crucial to security on the Internet. For more information on these topics, do an Internet search or consult related RFCs. Activity 2-3: Examining a Digital Certificate 1. Objective: Examine a default digital certificate on a Windows XP computer. Quick Quiz 1 1. The tells another computer which part of the IP address is the network address and which part is the host address. Answer: subnet mask 2. involves applying masks of varying sizes to the same network. Answer: Variable length subnet masking (VLSM) Variable length subnet masking VLSM 3. is an address notation scheme that specifies the number of masked bits in an IP address/subnet mask combination. Answer: Classless Interdomain Routing (CIDR)

7 Tactical Perimeter Defense 2-7 Classless Interdomain Routing CIDR 4. TCP/IP is transmitted along networks as discrete chunks called packets or. Answer: datagrams Examining Internet Protocol Version 6 1. Describe the advantages of IPv6 over IPv4, including: a. Larger address space of 128 bits b. Backbone routing table only need entries of directly connected routers since the header contains remaining routing information c. Integrated support for IPSec d. Autoconfiguration capabilities i. Stateful: improved version of DHCP requiring updates ii. Stateless: determine own IP address based on MAC address IPv6 Core Protocols 1. Explain that IPv6 is a connectionless, unreliable datagram protocol used mainly for addressing and routing packets between hosts. IPv6 relies on higher layers for acknowledgement and recovery of lost packets. 2. Explain that an IPv6 datagram consists of the IPv6 header and the IPv6 payload. The IPv6 header is made up of the IPv6 base header and IPv6 optional extension headers. 3. Explain that IPv4 and IPv6 are not interoperable. Use Figure 2-12 to illustrate your explanation. 4. Describe the fields found in the IPv6 header, including: a. Version: 6 b. Traffic class: priority field c. Flow label: specifies handling of connections d. Payload length: payload length in octets e. Next header: specifies next extension field or transport protocol f. Hop limit: max number of hops before dropped packet g. Source address h. Destination address 5. Describe the IPv6 extension header fields, including: a. Routing: lists intermediary nodes b. Fragment: sends packets larger than MTU allows c. Authentication: verifies the packet s source d. Encapsulating: ESP extension headers for datagram confidentiality and integrity e. Destination options: optional information for destination node only f. Hop by hop: information for every node

8 Tactical Perimeter Defense Explain that ICMPv6, an integral component of IPv6 communications, is used by IPv6 nodes for reporting errors and for diagnostic purposes. As in ICMPv4, ICMPv6 uses the Ping and Tracert commands as well as other diagnostics you already know. 7. Mention that an ICMPv6 message is preceded by an IPv6 header and sometimes by extension headers. Use Table 2-6 and Figure 2-13 to illustrate your explanation. 8. Explain that multicasts are used to deliver information to multiple subscribers at once. IP multicast traffic is sent to a single address but processed by all members of multicast group. The address can be permanent or transient and the group membership is dynamic. 9. Explain that Multicast Listener Directory (MLD) allows IPv6 routers to discover multicast listeners on a direct link. MLD determines which listeners are of interest and tracks membership with ICMPv6 messages. 10. Use Table 2-8 to describe various MLD message types. 11. Explain that Neighbor Discovery (ND) locates neighboring routers and redirects hosts to better routes. Use Table 2-9 to describe various ND functions. 12. Describe the following five different types of ICMP functions defined by ND: a. Router Solicitation: sent by hosts b. Router Advertisement: informs hosts about router presence c. Neighbor Solicitation: sent by node to determine link-layer of neighbor; duplicate address detection d. Neighbor Advertisements: response to Neighbor Solicitation; update neighbors of link-layer address e. Redirect: sent by routers to inform hosts of better first-hop addresses IPv6 addressing 1. Explain that an IPv6 address is 128 bits long. To make IPv6 addresses manageable, the hexadecimal numbering format known as base 16 (or just hex ) is used. 2. Explain that an IPv6 address consists of eight hex groups separated by colons. Each digit is a 4-bit value. Leading zeros can be compressed with double colon. Example: 0:0:0:0:0:FFFF: or ::FFFF: Step through Activity 2-4: Viewing Your IPv6 IP Address with Ipconfig. Objective: View your IPv6 address with Ipconfig. 4. Describe the following three types of addresses used by IPv6: a. Unicast b. Multicast c. Anycast

9 Tactical Perimeter Defense 2-9 Teaching Tip You can find additional information about IPv6 specifications and implementations at IPv6 configuration 1. Explain that Microsoft OSs since Windows XP SP 1 have IPv6 support built in. By default, a link-local address is assigned to every Ethernet interface during startup. IPv6 addresses, such as site-local addresses or global addresses, are assigned automatically based on the receipt of IPv6 Router Advertisement messages. 2. Mention that manual configuration is necessary for advanced features. IPv6 Utilities 1. Describe the following IPv6 utilities: a. Net.exe b. Ipv6.exe c. Ipsec6.exe 2. Use Table 2-13 to describe other IPv6 utilities, including: a. ttcp.exe b. 6to4cfg.exe c. checkv4.exe 3. Explain that nonrepudiation is provided through encryption. Encryption protects integrity, confidentiality, and authentication of digital information. Quick Quiz 2 1. IPv4 addresses are now in short supply, so Internet Protocol version 6 (IPv6), which has a larger address space of bits, is under development to allow an almost endless supply of IP addresses. Answer: is basically an improved version of DHCP, referred to as stateful because the DHCP client and server must keep their information updated to prevent addressing conflicts. Answer: Stateful autoconfiguration 3. allows the computer attempting to connect to determine its own IP address based on its Media Access Control (MAC) address. Answer: Stateless autoconfiguration 4. addresses are not assigned a specific range; instead, they are created automatically when a unicast address is assigned to more than one interface. Answer: Anycast

10 Tactical Perimeter Defense 2-10 Class Discussion Topics 1. What are the differences between IPv4 addresses and IPv6 addresses? 2. What are the advantages of anycast addresses? Justify your answers. Additional Projects 1. Ask your students to read more about ICMP and create a diagram of the message sequences for the ping and trace route commands. 2. Ask your students to read the following article at about the risk of using a PKI and write a report summarizing the most important points. Additional Resources 1. Introduction to TCP/IP 2. Internet Control Message Protocol 3. Public key infrastructure 4. IPv IPv6 Key Terms anycast An address created automatically when a unicast address is assigned to more than one interface. Anycast addresses are assigned from unicast address ranges and have the same scopes as unicast addresses. broadcast A communication sent to all points on a specific network. Classless Interdomain Routing (CIDR) An IP address notation method that uses a slash (/) followed by the number of masked bits for an address for example, /27 instead of datagrams Discrete chunks of information; each datagram contains source and destination addresses, control settings, and data. Also called packets. footer A section sometimes added to a TCP/IP packet that tells a computer it s the end of the packet.

11 Tactical Perimeter Defense 2-11 fully qualified domain names (FQDNs) Complete DNS names of computers that include the computer name, domain name, and domain name extension, such as header The part of a packet containing source and destination information and general information about the packet. host address The part of an IP address that s unique to a computer in its subnet. Internet Control Message Protocol (ICMP) A protocol that reports network communication errors to support IP communications. The Ping command is a common troubleshooting utility based on ICMP. Internet Protocol version 4 (IPv4) The IP addressing system currently in widespread use on the Internet, in which addresses are created with 32 bits (4 bytes) of data. Internet Protocol version 6 (IPv6) A new version of IP that s gaining support among software and hardware manufacturers and that will eventually replace IPv4; this version calls for 128-bit IP addresses. multicast A transmission used for one-to-many communication, in which a single host can send packets to a group of recipients. Multicast Listener Discovery (MLD) A core IPv6 protocol that enables IPv6 routers to discover multicast listeners on a directly connected link and to decide which multicast addresses are of interest to those nodes. Neighbor Discovery (ND) A core IPv6 protocol used to resolve addresses, locate neighboring routers, and redirect hosts to better routes to reach destination addresses. ND uses ICMPv6 messages to manage node-to-node communications. network address The part of an IP address that a computer has in common with other computers in its subnet. scopes Unicast addresses used in IPv6 to identify the application suitable for the address; scopes include global unicast, site-local unicast, and link-local unicast. stateful autoconfiguration In IPv6, this feature is basically an improved version of DHCP. It s referred to as stateful because the DHCP client and server must keep their information updated to prevent addressing conflicts. stateless autoconfiguration A feature of IPv6 that allows the computer attempting to connect to determine its own IP address based on the addressing of neighboring nodes. subnet mask A value that tells another computer which part of a computer s IP address is its network address and which part is the host address. Transmission Control Protocol/Internet Protocol (TCP/IP) A suite of protocols for transmitting information from point to point on a network. unicast A transmission in which one packet is sent from a server to each client that requests a file or application. User Datagram Protocol (UDP) A core transport protocol of the TCP/IP suite. UDP is connectionless, meaning it doesn t ensure delivery or provide ordering, as TCP does. UDP is much faster and is useful for transmissions that require speed over reliability. UDP relies on upper-level protocols for error-checking and sequencing services. variable length subnet masking (VLSM) A means of allocating IP addressing according to the network s needs that involves applying masks of varying sizes to the same network. This method creates subnets within subnets and multiple divisions of an IP network.

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols Computer Networks Lecture 9 Network and transport layers, IP, TCP, UDP protocols Network layer The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol

More information

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

This talk will cover the basics of IP addressing and subnetting. Topics covered will include: This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1 Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-5 Introduction to IPv6 DNS 1-8 Protocols

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1 Table of Contents 1 IPv6 Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-6 Introduction to IPv6 DNS 1-8 Protocols

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

Module 7: Configuring and Supporting TCP/IP

Module 7: Configuring and Supporting TCP/IP Module 7: Configuring and Supporting TCP/IP Contents Overview 1 Introduction to TCP/IP 2 Examining Classful IP Addressing 10 Defining Subnets 17 Using Classless Inter-Domain Routing 29 Configuring IP Addresses

More information

Chapter 19 Network Layer: Logical Addressing 19.1

Chapter 19 Network Layer: Logical Addressing 19.1 Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 IPv4 IPv4 addresses are 32 bit length. IPv4 addresses are

More information

Lecture 11: IP routing, IP protocols

Lecture 11: IP routing, IP protocols Lecture 11: IP routing, IP protocols Contents Routing principles Local datagram delivery ICMP Protocol UDP Protocol TCP/IP Protocol Assuring requirements for streaming TPC Building and terminating TCP

More information

OSI Data Link & Network Layer

OSI Data Link & Network Layer OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

Network Layer/IP Protocols

Network Layer/IP Protocols Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

Chapter 5 TCP/IP SUITE

Chapter 5 TCP/IP SUITE Chapter 5 TCP/IP SUITE Objectives:- TCP/ IP Model Concept. Defining/functioning of different Layers of TCP / IP suite. 5.1 Introduction Addressing mechanism in the Internet An IP address is an address

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL IPv6 Protocol & Structure npnog3 9-11 Dec, 2017 Chitwan, NEPAL Protocol Header Comparison IPv4 contains 10 basic header fields, while IPv6 has 6 basic header fields IPv6 header size is 40 octets compared

More information

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th

More information

IPv6 Protocol Architecture

IPv6 Protocol Architecture IPv6 Protocol Architecture v4/v6 Header Comparison Not kept in IPv6 Renamed in IPv6 Same name and function New in IPv6 2 New Functional Improvement Address Space Increase from 32-bit to 128-bit address

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008 Networks an overview dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 4, 2008 dr. C. P. J. Koymans (UvA) Networks February 4, 2008 1 / 53 1 Network modeling Layered networks

More information

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0 Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 7 - Sections & Objectives 7.1 IPv4 Network Addresses Convert between binary and decimal numbering

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Configuring IPv6 for Gigabit Ethernet Interfaces

Configuring IPv6 for Gigabit Ethernet Interfaces CHAPTER 46 IP version 6 (IPv6) provides extended addressing capability beyond those provided in IP version 4 (IPv4) in Cisco MDS SAN-OS. The architecture of IPv6 has been designed to allow existing IPv4

More information

Networking Potpourri: Plug-n-Play, Next Gen

Networking Potpourri: Plug-n-Play, Next Gen Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia

More information

COMMON LOWER-LAYER PROTOCOLS

COMMON LOWER-LAYER PROTOCOLS COMMON LOWER-LAYER PROTOCOLS Whether troubleshooting latency issues, identifying malfunctioning applications, or zeroing in on security threats in order to be able to spot abnormal traffic, you must first

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information