Internetworking Part 2
|
|
- Ami Craig
- 5 years ago
- Views:
Transcription
1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, /08/2018 1
2 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning networks based on any technology Problems: heterogeneity and scalability heterogeneity: need to support different LANs, point-to-point technologies, switched networks, different addressing formats scalability: addressing (management and configuration) and routing must be able to handle millions of hosts We will examine the (original) IP protocol (IPv4), IP addressing, packet forwarding, subnetting, and IPv6. 2
3 Outline Internet architecture IP service model IP forwarding Address translation (ARP) Automatic host configuration (DHCP) and error reporting (ICMP) Virtual Private Networks (VPNs) Subnetting Supernetting: Classless routing (CIDR) IPv6 3
4 Terminology The Internet and IP network = network based on one technology internet = network of networks The Internet = internet using IP routers = nodes connecting networks IP = Internet Protocol, current version IPv4 (IP Version 4) 4
5 What is internetwork Internetworking An arbitrary collection of networks interconnected to provide some sort of host-host to packet delivery service A simple internetwork where H represents hosts and R represents routers
6 What is IP Internetworking IP stands for Internet Protocol Key tool used today to build scalable, heterogeneous internetworks It runs on all the nodes in a collection of networks and defines the infrastructure that allows these nodes and networks to function as a single logical internetwork A simple internetwork showing the protocol layers
7 IP principles Each host has a globally unique IP address must be reachable by everyone and from everywhere Simple packet forwarding Network nodes simply forward packets Keeping the routers as simple as possible was one of the original design goals of IP 7
8 Internet architecture Recall Internet architecture from Chapter 1 Application layer: FTP, HTTP, (Last Chapter) Transport layer: TCP (reliable byte transfer) and UDP (unreliable datagram delivery) provide logical channels to applications (Next Chapter) Network or IP layer: IP protocol interconnects multiple networks into a single logical network (This Chapter) Link layer: wide variety of LAN and point-to-point protocols FTP HTTP NV TFTP TCP UDP IP NET 1 NET 2 NET n 8
9 IP Service Model Packet Delivery Model Connectionless model for data delivery Best-effort delivery (unreliable service) packets are lost packets are delivered out of order duplicate copies of a packet are delivered packets can be delayed for a long time Format of datagram (next slide) Global Addressing Scheme Provides a way to identify all hosts in the network
10 IP packet (datagram) format Format aligned at 32 bit words simplifies packet processing in software Header fields Version(4): version 4 (IPv4) or version 6 (IPv6) Hlen(4): header length, in 32-bit words (min 5) TOS(8): type of service (not widely used), used to give priorities to packets (QoS issue) Length(16): data+header length, in bytes Ident (16): used by fragmentation Flags/Offset (16): used by fragmentation TTL(8): time to live, no of times packet allowed to be forwarded (no of hops), default 64, detects packets caught in routing loop Protocol(8): identifies upper layer protocols, TCP=6, UDP =17 Checksum(16): header only, erroneous packets discarded DestAddr & SrcAddr (32): global Internet addresses Options: rarely used 10
11 Fragmentation/reassembly Each network has an MTU (Maximum Transmission Unit) e.g., Ethernet 1500 bytes, PPP 532 bytes Strategy Fragmentation occurs in a router when it receives a datagram that it wants to forward over a network which has (MTU < datagram. In general, try to avoid fragmentation: Hosts are encouraged to perform path MTU discovery Fragments are self-contained datagrams All the fragments carry the same identifier in the Ident field Flags (M-bit) and Offset used to guide fragmentation process Offset measured in 8 byte units Fragmented packet can be again re-fragmented Reassembly is performed only at destination host Reassembly does not try to recover lost fragments 11
12 Fragmentation/reassembly example Assume H5 wants to send a 1400 byte datagram to H8 (see slide 5): 1400 bytes + 20 bytes (IP header) MTU: and Ethernet 1500 bytes, PPP 532 bytes IP datagrams traversing the sequence of physical networks 12
13 Example (continued) Header fields used in IP fragmentation. (a) Unfragmented packet: H5 R1 R2 (b) Fragmented packets: R2 R3 H8 Can you think of a strategy that will abuse fragmentation to carry out a denial-of-service attack? How can one prevent such an attack? 13
14 IP global addressing Properties globally unique, 32 bits hierarchical: network part + host part address identifies interface end host has one interface router has many interfaces IP address domain name Original classful addressing class A, B and C networks defines different sized networks idea: small no of WANs, modest no of campus networks, large no of LANs Dotted Decimal Notation 32 bit addresses represented as groups of 8 bit integers e.g., Format A : to B : to C : to
15 Classful Adressing IP addr.= ; = Class: A (consider first bit - 0) Net ID: Host ID: IP addr.= ; = Class: C (consider first three bits 110) Net ID: Host ID: Class IP address Net Host Net Host # of PCs ID No bit # bit # in network A w x.y.z = 16,777,214 B w.x y.z =65534 C w.x.y z =
16 Network and Broadcast Numbers 0 indicates a network 255 broadcast address; all PCs in a network Class C address ; Network number: A device that wants to send a message to all the PCs in this network will use the following address; Class B address ; Network number: A device that wants to send a message to all the PCs in this network will use the following address;
17 Forwarding vs. routing Forwarding: Process of taking a packet from input interface, looking at its destination address, consulting a forwarding table, and sending the packet over an output interface determined by that table Routing: Process by which forwarding tables are constructed Routing must create optimal or efficient paths that the packets should follow 17
18 IP forwarding Preliminaries Every datagram contains destination s address Every router has a forwarding table Each host has a default router configured Routers maintain forwarding tables with multiple entries (constructed via routing process) Forwarding table maps network number into next hop router number or local interface number Strategy A router receiving a packet checks destination network address of datagram and if directly connected to destination network, then forwards directly to host need to map IP address to physical LAN address (ARP) if not directly connected to destination network, then forwards to next hop router 18
19 IP Datagram Forwarding Algorithm if (NetworkNum of destination = NetworkNum of one of my interfaces) then deliver packet to destination over that interface else if (NetworkNum of destination is in my forwarding table) then deliver packet to NextHop router else deliver packet to default router For a host with only one interface and only a default router in its forwarding table, this simplifies to if (NetworkNum of destination = my NetworkNum)then deliver packet to destination directly else deliver packet to default router
20 IP forwarding example 1 H1 H3: forwarding on the same network H5 H8: forwarding via R1 and R2 Router R2 20
21 IP forwarding example 2 Suppose, A wants to send a datagram to B. Thus, A knows I B = Step 1: A and B are on different networks, so to reach , A routes a datagram to R 1 (address ) Step 2: Router R 1 sees (from its table) that to reach , it is necessary to send a datagram to R 2 (address ). Step 3: Router R 2 sends to R 3 (address ). Step 4: Router R 3 is on the same network as B, so R 3 delivers the datagram to B directly. 21
22 Routers vs. bridges Bridges are used for interconnecting LANs of the same type whereas routers interconnect networks of different (or the same) types Bridge (+/-) + bridge operation is simple, requires less processing + transparent (no configuration needed when new nodes added to LAN) restricted topology (forwarding determined by a spanning tree) LANs use a flat addressing space (no hierarchical network structure) Router (+/-) + arbitrary topologies, enables use of efficient routing algorithms for distributing traffic (helps traffic management) + hierarchical addressing enables scalability: scalability requires minimization of address info stored in routers routing based on network numbers forwarding tables contain info on all networks, not all nodes requires IP address configuration packet processing more demanding Summary: bridges do well in small (~ 100 hosts) networks while routers are used in large networks (1000s of hosts) 22
23 Address translation What to do when router/host notes that it is connected directly to the network where an arriving packet is destined? Need to map IP addresses into physical LAN addresses destination host next hop router Techniques encode physical LAN address in host part of IP address not scalable! (not implemented) table-based (maintain IP address, PHY address pairs) ARP 23
24 Address translation Algorithm of direct routing Start Hosts A and B are on the same network. A wants to send a datagram to B. ARP is used here!! Knowing I B of B, learn P B Encapsulate the datagram in a data-link frame I B IP addr. of B P B phys. addr. of B Send the frame using P B End To know that A and B are on the same network: it is enough to compare netid s I A and I B. 24
25 ARP details ARP (Address Resolution Protocol) utilizes LAN s broadcast capabilities each node maintains table of IP to physical LAN address bindings broadcast request if address not in table table entries are discarded if not refreshed target machine responds with its physical LAN address ARP request contains also source addresses (physical and IP) all interested parties can learn the source address Node (host/router) actions: table entries timeout in about 10 minutes if node already has an entry for source, refresh timer if node is the target, reply and update table with source info if node not target and does not have entry for the source, ignore source info 25
26 ARP packet format HardwareType: type of physical network (e.g., Ethernet) ProtocolType: type of higher layer protocol (e.g., IP) HLen & PLen: length of physical and upper layer addresses Operation: request or response Physical/IP addresses of Source and Target 26
27 Mapping with ARP protocol A B IP = IP = MAC = 02C00011DE25 MAC=... Broadcast message 1.Who has IP = ? Frame from A Local Area Network Dest. MAC = FFFFFFFFFFFF Orig. MAC = 02C00011DE25 ARP Source MAC=02C00011DE25 Sorce IP = Target MAC =? Target IP = Unicast message C IP = MAC = 4B000D9182EA MAC address is a physical 2. IP address(unique locally). has MAC= 4B000D9182EA It is assigned to each network interface Frame from C card ( NIC ). Dest. MAC = 02C00011DE25 ARP features: 1. Works only in a LAN. 2. LAN must provide the broadcasting capability. 3. Broadcasting is used only to transmit ARP request messages, ARP reply messages are Orig. MAC = 4B000D9182EA ARP Source MAC=02C00011DE25 Sorce IP = Target MAC = 4B000D9182EA Target IP = unicast.
28 ARP Protocol Host 1 (datalink) Host 2 Host 3 Host N IP packet (datagram) to Host 3: phys. addr. of Host 3 -? ARP frame ARP frame (phys.addr. of Host3) Broadcast IP packet (in aframe) Time 28
29 Need for automatic host configuration! IP addresses need to be reconfigurable Ethernet addresses hardwired onto the network adapter. Ethernet addresses are configured into network by manufacturer and they are unique. IP addresses must be unique on a given internetwork but also must reflect the structure of the internetwork. IP address consists of network and host part. hosts can move between networks host gets new address in each network Need for automated host configuration hosts need other configuration info, e.g., the default router configuration manually impossible (too much work and errors) Automated Configuration Process is required Dynamic Host Configuration Protocol (DHCP) DHCP server is responsible for providing configuration information to hosts at least one DHCP server for each administrative domain DHCP server maintains a pool of available addresses centralized repository for configuration info two operation modes: administrator chooses host addresses and configures them to DHCP DHCP manages the addresses by allocating addresses dynamically 29 from a pool of available addresses (more sophisticated)
30 Server discovery: Newly booted or attached host sends DHCPDISCOVER message to IP broadcast address ( ) Message broadcasted only on same network If server on same network, host receives its IP address DHCP operation If not, message picked up by DHCP relay agent Relay agent knows address of DHCP server, forwards the message to DHCP server and host receives its IP address Use of DHCP relay agent makes it possible to have fewer DHCP servers (relay agent configuration simpler than DHCP server configuration) 30
31 Internet Control Message Protocol (ICMP) ICMP used for reporting errors in Internet Defines a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully Messages Echo (ping), Echo reply Redirect (from router to source host if router knows of a better route to packet s destination) Destination host unreachable due to link/node failure (protocol, port, or host) TTL had reached 0 - exceeded (so datagrams don t cycle forever) IP header checksum failed Reassembly failed Cannot fragment 31
32 Virtual private networks (VPN) Problem: group of isolated networks geographically distant from each other need to connect different networks together into a private network securely e.g., company with many branch offices Solution: VPN Methods Build a private network from leased lines (not shared) Create a virtual private network which is overlaid on top of public networks ATM and Frame Relay: Use virtual circuits IP: Use IP tunneling (usually coupled with secure IPsec) 32
33 VPN and IP tunneling Problem with IP: - not possible to connect to Internet via router without the whole Internet also knowing about your network. Tunneling virtual point-to-point link between two nodes separated by arbitrary no of networks created at R1 by providing it with address of R2 R1 encapsulates original packet in a new packet addressed to R2 packet forwarded normally inside IP network R2 receives packet and strips off packet header and notices payload contains an encapsulated packet addressed to some host inside network 2 33
34 Global Internet Scalability Issues IP hides hosts in address hierarchy, but... Inefficient use of address space class C network with 2 hosts (2/255 = 0.78% efficient) class B network with 256 hosts (256/65535 = 0.39% efficient) Too many networks today's Internet has tens of thousands of networks routing tables do not scale route propagation protocols do not scale 34
35 Subnetting Problem 1: Any network with more than 255 hosts, needs class B addresses, or should get many class C addresses Problem 2: Each new network implies additional entry in forwarding table large table Solution: Share one network number between several networks. another level is added to address/routing hierarchy : subnet 35
36 Network Mask (according to classes) The network mask is generally used to find the network and host bits of an IP address and thus determine the network address. Network mask allows the two computers on the network to understand that they are on the same network or not. class IP addr. Net Host Net Host Network No No bit # bit # Mask A w x.y.z B w.x y.z C w.x.y z ( ( (
37 Network Mask, example IP address: Network address: Host address: Network mask: Broadcast address: IP address: Network address: Network mask: Broadcast address: IP address: Network address: Network mask: Broadcast address:
38 Subnetting Makes most sense for large corporations or campuses Corporation networks share 1 network number Number of other networks within the corporation, using subnet masks E.g., a class B address, is shared among 8 networks (2 3 ), by using a 19-bit subnet mask ( = ) i.e., subnet addresses are defined by first 19 bits of the IP address. Host part now has a subnet part in it. Class B network address continues to be advertised to the rest of the Internet, subnetting only used within campus (i.e. Subnets visible only within site). 38
39 Subnetting Another example: a class B address, is shared among 256 networks (2 8 ), by using a 24-bit subnet mask : ( = ) 39
40 Subnet example Forwarding table at R1: 40
41 Forwarding algorithm with subnetting D = destination IP address for each entry < SubnetNum, SubnetMask, NextHop> D1 = SubnetMask & D if D1 = SubnetNum if NextHop is an interface deliver datagram directly to destination else deliver datagram to NextHop (a router) Q: Apply the algorithm when H1 is sending to H2 and H3. Notes: Would use a default router if nothing matches Not necessary for all ones in subnet mask to be contiguous Can put multiple subnets on one physical network Subnets not visible from the rest of the Internet 41
42 Subnetting Example Where does the router forward packets addressed to: > Interface > R > R > R > R4 Subnet Number Subnet Mask Next Hop Interface Interface R R3 <default> R4 42
43 Supernetting (CIDR) (1) Classful addressing: inefficient use of address space, address space exhaustion subnetting does not get around the fact that a network with more than 255 hosts requires a class B address class B net allocate addresses for 65K hosts, even if only 2K hosts in that network CIDR: Classless InterDomain Routing network portion of address of arbitrary length address format: a.b.c.d/x, where x is # bits in network portion of address network part /23 host part 43
44 Supernetting (CIDR) (2) Assign block of contiguous network numbers to near-by networks helps to aggregate routers less entries in the forwarding tables Restrict block sizes to powers of 2 E.g. Consider an Autonomous system(as) with 16 class C network numbers ( to ) the top 20 bits are same ( ) 20-bit network number (a single network prefix) can be used in forwarding tables. Something between class B and class C classless! CIDR tries to balance the desire to minimize the number of routes that a router needs to know against the need to hand out addresses efficiently. 44
45 Classless Addressing Requires to hand out blocks of class C addresses that share a common prefix The convention is to place a /X after the prefix where X is the prefix length in bits For example, the 20-bit prefix for all the networks through is represented as /20 By contrast, if we wanted to represent a single class C network number, which is 24 bits long, we would write it /24 45
46 Route aggregation with CIDR To achieve scalability, you need to reduce the amount of information stored in routers Uses a single entry in the forwarding table to tell the router how to reach a lot of different networks Breaks the rigid boundaries between address classes Hierarchical aggregation: IP has a two-level hierarcy (network+host) 46
47 A simple example Suppose hosts had arbitrary addresses Then every router would need a lot of information to know how to direct packets toward the host host host... host host host... host LAN 1 router router router WAN WAN LAN forwarding table 47
48 Example continued.. Number related hosts from a common subnet /24 on the left LAN /24 on the right LAN host host... host host host... host LAN 1 router router router WAN WAN LAN / /24 forwarding table 48
49 Example continued.. Easy to add a new host No need to update the routers E.g., adding a new host on the right Doesn t require adding a new forwarding entry host host... host host host... host LAN / /24 router router router WAN WAN LAN 2 host forwarding table 49
50 Longest Prefix Match IP forwarding mechanism assumes that it can find the network number in a packet and then look up that number in the forwarding table With CIDR, prefixes may be of any length (from 2 to 32 bits) and may overlap (some addresses may match more than one prefix). For example, suppose we have the following in the forwarding table at a router: (a 16-bit prefix) (a 24-bit prefix) A packet with destination address matches both prefixes The rule is to choose the longest prefix(longest match) to forward to ( in this case) Consider also The longest match would be not Efficient algorithms are required for finding the longest match in a forwarding table 50
51 CIDR Example Suppose the router does the longest-prefix match. Where does the router forward packets addressed (in hex) to: C4.5E > B C4.5E > A C > E 5E > F C4.6D.31.2E > C C4.6B.31.2E > D Net / Mask Length Next Hop C / 12 C4.5E.10.0 / 20 C / 12 C / 14 A B C D / 1 E / 2 F / 2 G 51
52 Today s Internet Sites are connected arbitrarily rather than as a tree-like structure as was the case in 1990s Some large corporations connect with each other. This is called peering A simple multi-provider Internet 52
53 Problems How do we build a routing system that can handle hundreds of thousands of networks and billions of end nodes? How to handle address space exhaustion of IPV4? How to enhance the functionalities of Internet?
54 Routing in the Internet (1) The Global Internet consists of Autonomous Systems (AS) interconnected with each other. AS: corresponds to an administrative domain examples: University, company, backbone network Each AS is assigned a 16-bit number A network with two autonomous system 54
55 Routing in the Internet (2) We can classify ASs into three types: Stub AS: small corporation: a single connection to one other AS. only carry local traffic Multihomed AS: large corporation: multiple connections to other AS s. (no transit, i.e. refuses to carry others traffic) Transit AS: backbone provider, hooking many AS s together (an AS has connections to more than one other AS, and is designed to carry both transit and local traffic) Q: Which ASes are Stub, Multihomed and Transit in Slide 52? Two-level routing: Intra-AS: Routing within a single autonomous system (administrator responsible for choice of routing algorithm within network) Inter-AS: Routing between autonomous systems. 55 Unique standard for inter-as routing: BGP
56 Intra-AS, Inter-AS routing Most common Intra-AS routing protocols: - RIP: Routing Information Protocol - OSPF: Open Shortest Path First - IGRP: Interior Gateway Routing Protocol Most common Inter-AS routing protocol is Border Gateway Protocol (BGP) - Assumes that the Internet is an arbitrarily interconnected set of ASs - Leave optimality aside. Just find a loop-free path - Thus only bothers with reachability R5 AS1 (RIP intra - AS routing) R1 BGP R2 R3 BGP AS2 ( OSPF intra - AS routing) R4 AS3 ( OSPF intra - AS routing) 56
57 Major Features 128-bit addresses Multicast Real-time service IPv6 (1) Authentication and security Autoconfiguration End-to-end fragmentation Enhanced routing functionality, including support for mobile hosts Protocol extensions 57
58 IPv6 (2) IPv6 addresses Classless addressing/routing (similar to CIDR) Notation: x:x:x:x:x:x:x:x (x = 16-bit hex number) contiguous 0s are compressed: 47CD::A456:0124 IPv6 compatible IPv4 address: :: Address assignment provider-based geographic 58
59 40-byte base header Extension headers (fixed order, mostly fixed length) fragmentation source routing authentication and security other options IPv6 Header 59
60 Routing for Mobile Hosts Mobile IP home agent Router located on the home network of the mobile hosts home address The permanent IP address of the mobile host. Has a network number equal to that of the home network and thus of the home agent foreign agent Router located on a network to which the mobile node attaches itself when it is away from its home network
61 Routing for Mobile Hosts Problem of delivering a packet to the mobile node How does the home agent intercept a packet that is destined for the mobile node? Proxy ARP How does the home agent then deliver the packet to the foreign agent? IP tunnel Care-of-address How does the foreign agent deliver the packet to the mobile node?
62 Routing for Mobile Hosts Route optimization in Mobile IP The route from the sending node to mobile node can be significantly sub-optimal One extreme example The mobile node and the sending node are on the same network, but the home network for the mobile node is on the far side of the Internet Triangle Routing Problem Solution Let the sending node know the care-of-address of the mobile node. The sending node can create its own tunnel to the foreign agent Home agent sends binding update message The sending node creates an entry in the binding cache The binding cache may become out-of-date The mobile node moved to a different network Foreign agent sends a binding warning message
Internetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationCS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray
CS 457 Networking and the Internet Fall 2016 Indrajit Ray Problems Earlier we saw how to connect one node to another, or to an existing network. How do we build networks of global scale? How do we interconnect
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More informationLecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1
Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2
More informationL10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L10: Simple Internetworking Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained
More informationCS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).
Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationChapter 3 Internetworking
Chapter 3 Internetworking Basic Internetworking (IP) (cont d) Datagram forwarding in IP Every datagram contains the IP address of the destination host If directly connected to destination network, then
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationC14a: Internetworks and The Internet
CISC 7332X T6 C14a: Internetworks and The Internet Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in
More informationEPL606. Internetworking. Part 2a. 1Network Layer
EPL606 Internetworking Part 2a The majority of the slides in this course are adapted from the accompanying slides to the books by Larry Peterson and Bruce Davie and by Jim Kurose and Keith Ross. Additional
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationRecap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.
Recap First mile problem Internet www.yahoo.com Comcast Sprint End Users SBC UUNET www.cnn.com Last mile problem Recap Direct link networks Packet switching Internetworking 1 IP Internet Concatenation
More informationComputer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationCSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca
CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement
More informationCopyright 2010, Elsevier Inc. All rights Reserved
Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie C 3 Internetworking Copyright 2010, Elsevier Inc. All rights Reserved Switching and Forwarding Store-and-Forward Switches
More informationOutline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting
Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer
More informationNetwork Layer Protocols
internetwork n. &v. Network Layer Protocols CSCI 363 Computer Networks Department of Computer Science 1 logical network built out of a collection of physical networks. 2 tr. to interconnect physical networks
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationTSIN02 - Internetworking
Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the
More informationOutline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address
Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16
CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationCSCI-1680 Network Layer: IP & Forwarding John Jannotti
CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationIP - The Internet Protocol
IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCH. 3 IP FORWARDING AND ROUTING
1 2012, Morgan-Kaufmann Pub. Co., Prof. Larry Peterson and Bruce Davie Some marked texts and figures from textbook Conceptual Computer Networks & José María Foces Vivancos CH. 3 IP FORWARDING AND ROUTING
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight
More informationCS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3
CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment
More informationTSIN02 - Internetworking
Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene
More informationHY 335 Φροντιστήριο 8 ο
HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source
More informationReview of Internet Architecture and Protocols
Review of Internet Architecture and Protocols Professor Guevara Noubir Northeastern University noubir@ccs.neu.edu Lecture Reference Textbook: (source of some diagrams) Computer Networks: A Systems Approach,
More informationEnd-to-End Communication
End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How
More informationNetwork Layer: Control/data plane, addressing, routers
Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)
More informationInternetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)
Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationTopics for This Week
Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what
More informationInternet Protocol (IP)
CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)
More informationCIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationLecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationBasic Internetworking (IP)
Basic Internetworking (IP) CSCI 466: Networks Keith Vertanen Fall 2011 Internetworking Service model Internet protocol (IP) History Packet format Fragmenta?on Global addressing Overview Discovering link-
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationCSEP 561 Internetworking. David Wetherall
CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport
More information2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.
Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44
More informationData Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I
Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer
More informationCSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical
CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet
More informationCOMP 631: NETWORKED & DISTRIBUTED SYSTEMS 9/6/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. IP Addressing. Jasleen Kaur. Fall 2016
COMP 631: NETWORKED & DISTRIBUTED SYSTEMS IP Addressing Jasleen Kaur Fall 2016 1 How to Deal With Heterogeneity & Scale? Requirements from IP addressing: Should be globally unique Should facilitate easy
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationData Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer
Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science
More informationCS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay
Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety
More informationQuiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting
Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition
More informationIPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land
IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationIPv4. Christian Grothoff.
IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving
More informationInternet Protocol, Version 6
Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:
More informationThe Internet. The Internet is an interconnected collection of netw orks.
The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationDepartment of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri
Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationCSCI Computer Networks Fall 2016
source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.
More informationChapter 4: Advanced Internetworking. Networking CS 3470, Section 1
Chapter 4: Advanced Internetworking Networking CS 3470, Section 1 Intra-AS and Inter-AS Routing a C C.b b d A A.a a b A.c c B.a a B c Gateways: perform inter-as routing amongst themselves b perform intra-as
More informationUNIT III. 3.1 Circuit switching vs. packet switching / Packet switched networks. Figure 3.1.1: Switching Techniques
UNIT III Circuit switching vs. packet switching / Packet switched networks IP ARP RARP DHCP ICMP Queueing discipline Routing algorithms RIP OSPF Subnetting CIDR Interdomain routing BGP Ipv6 Multicasting
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationLecture 3: Packet Forwarding
Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR
More informationAddress Translation. Map IP addresses into physical addresses destination host next hop router
Address Translation Map IP addresses into physical addresses destination host next hop router Techniques encode physical address in host part of IP address table-based ARP table of IP to physical address
More informationARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address
ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted
More informationThe Internet Protocol (IP)
The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing
More informationMost important (cont d) What s most important in Project 1. Important for individuals. From from Most Important
What s most important in Project 1 Most important (cont d) gain some experience with the techniques of protocol implementation Learn to design timeouts and resending Peer to peer interface and protocol
More informationDongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis
Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification
More informationC14b: Classless Intradomain Routing
CISC 7332X T6 C14b: Classless Intradomain Routing Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in this
More informationThe Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly
The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:
More informationOutline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits
Lecture 2 Outline Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits TCP/IP protocol suite Good name for our book! User application, e.g., http with Mozilla Communication
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Link Layer, Multiple access 2. IP addressing, CIDR, NAT 3. IP/L3 routing, OSPF (link state), RIP(DV), Issues 4. L2 routing
More informationOverview 4.2: Routing
Overview 4.2: Routing Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph A 6 1
More informationIP Routing & Bridging
CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More information