7010INT Data Communications Lecture 7 The Network Layer
|
|
- Ashlynn Jenkins
- 5 years ago
- Views:
Transcription
1 Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical Addressing, Routing & Packet Delivery Text reference: Chapters 16, 19 & 21 Dr. Ruben Gonzalez School of Information Technology Connecting LANs Why Interconnect? Often you need to connect a local area network to another local area network or to a wide area network. Local area network-to-local area network connections are often performed with a bridge-like device. Local area network-to-wide area network connections are usually performed with a router. A third device, the switch, can be used to interconnect segments of a local area network. Application Gateway Presentation Session Router Data Link Bridge / Switch Physical Repeater / Hub To separate / connect one corporate division with another. To connect two LANs with different protocols. To connect a LAN to the Internet. To break a LAN into segments to relieve traffic congestion. To provide a security wall between two different types of users.
2 Repeaters Operate purely at the physical layer. Propagate all traffic in both directions between the LAN sections they link Used to extend the length of a LAN segment beyond the normal limit imposed by the medium. Regenerate all signals received on one segment and forwarding (repeats) them onto the next. They may connect different types of cable, but use the same data link and network protocol. LLC MAC PHY Repeater Repeater LLC MAC PHY Bridges A bridge (or bridge-like device) can be used to connect two similar LANs, such as two CSMA/CD LANs. A bridge can also be used to connect two closely similar LANs, such as a CSMA/CD LAN and a token ring LAN. The bridge examines the destination address in a frame and either forwards this frame onto the next LAN or does not. The bridge examines the source address in a frame and places this address in a routing table, to be used for future routing decisions. LAN Segment LAN Segment LAN Segment Bridges Transparent Bridge LLC MAC PHY LAN Segment Relay MAC MAC PHY PHY Bridge LAN Segment LLC MAC PHY A transparent bridge does not need programming but observes all traffic and builds routing tables from this observation. This observation is called backward learning. Each bridge has two connections (ports) and there is a routing table associated with each port. A bridge observes each packet that arrives at a port, extracts the source address from the packet, and places that address in the port s routing table. Transparent bridges are used with CSMA/CD LANs.
3 Transparent Bridge Transparent Bridge A transparent bridge can also convert one frame Header Frame contents format to another Traile Preamble SD DA SA Length DATA Pad FCS Preamble Header SD Frame contents Trailer FC DA SA DATA FCS ED Header Frame contents Trailer SD AC FC DA SA DATA FCS ED FS SD = Start Delimiter FC = Frame Control AC = Access Control DA = Destination address FCS = Frame check sequence ED = End Delimiter FS = Frame Status SA = Source address Note that some people / manufacturers call a bridge such as this a gateway or sometimes a router. The bridge removes the headers and trailers from one frame format and inserts (encapsulates) the headers and trailers for the second frame format. A Problem With Transparent Bridges A 1 Routing Table Dest Port A 1/2 D? A to D 2 3 Bridge Bridge 2 3 D Routing Table Dest Port A 1/2 D? F H
4 Spanning Tree Algorithm Spanning Tree Algorithm Initialisation Attempts to solve the routing problem Every port on every bridge is categorised as either a forwarding port or a blocking port Forwarding and blocking ports are assigned such that no loops can be formed Once the spanning tree has been established, any packets received by a bridge with an unknown destination are only sent out to on forwarding ports. Each bridge on the LAN is assigned an ID number (arbitrarily). The bridge with the smallest ID is chosen to be the root bridge by all themselves. Each port on every bridge is assigned a cost. The cost is determined by the bit rate of the attached segment: the higher the bit rate, the lower the cost. If all ports have the same bit rate then the cost is set to 1 for each port. Spanning Tree Algorithm - Operation Each bridge determines its root port (the port with the lowest path cost to the root). A designated port is found for each LAN segment. If only one bridge is connected to a LAN segment, then the designated port will be the port connecting that segment to the bridge. If more than one bridge is connected to a single LAN segment, then the designated bridge will be the one that can carry a frame from the LAN segment to the root with the cheapest path cost. The port that connects the designated bridge to the LAN is the designated port. Note that a root port cannot be selected as the designated port. Any ports that have not been assigned as either root ports or designated ports are labelled as blocking ports. Root ports and designated ports are labelled as forwarding ports. Path cost Segment 1 Segment 2 Root path Blocking port Segment 3 2 A Spanning Tree Des Des RP BP RP 4 2 Segment 4 Segment 5 Root Des Des RP Des RP BP Designated port 4 4
5 Source-routing Bridges A source-routing bridge is used in token ring networks. They do not learn from watching tables. When a workstation wants to send a frame, it must know the exact path of network / bridge / network / bridge / network If a workstation does not know the exact path, it sends out a discovery frame. The discovery frame makes its way to the final destination, then as it returns, it records the path. Used mostly with token ring LANs, so not generally used today. Using Bridges to Connect Different Types of LANs - Issues Frame format Each LAN protocol has its own frame format, hence conversion is necessary. Payload size The maximum allowable length for the data field varies between protocols. This may require a frame to be subdivided before being forwarded. (Eg from token ring to Ethernet). Data rate Different protocols operate at different data rates (as well as different LANs running the same protocol eg 10Base-T and 100Base-T). Frames travelling from a faster to a slower LAN must be buffered accordingly. Address bit order the binary representation of physical addresses varies between protocols. Appropriate conversion must be performed. Bridge Disadvantages Since a bridge receives and buffers all frames in their entirety before performing the forwarding them, it introduces an additional store-and-forward delay compared with a repeater. Bridges don t perform flow control and may overload during periods of high traffic. Bridging of segments operating with different data link protocols (and frame formats) means that the contents of frames must be modified prior to forwarding. This necessitates a new frame check sequence being generated by the bridge with the effect that any errors introduced while frames are being relayed across the bridge will go undetected.
6 Hubs Switches As seen earlier, a hub interconnects two or more workstations into a local area network. When a workstation transmits to a hub, the hub immediately resends the data frame out all connecting links. A hub can be managed or unmanaged. A managed hub possesses enough processing power that it can be managed from a remote location. A switch is a combination of a hub and a bridge. It can interconnect two or more workstations, but like a bridge, it observes traffic flow and learns. When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection. Workstations that connect to a hub are on a shared segment. Workstations that connect to a switch are on a switched segment. Switches The backplane of a switch is fast enough to support multiple data transfers at one time. A switch that employs cut-through architecture is passing on the frame before the entire frame has arrived at the switch. Multiple workstations connected to a switch use dedicated segments. This is a very efficient way to isolate heavy users from the network. A switch can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server.
7 Switches v s Hubs Maximum total capacity = 10 Mbps 10 Mbps Hub 10 Mbps 10 Mbps 10 Mbps Maximum total capacity = N x10 Mbps Switch 10 Mbps 10 Mbps Routers Routers in a Connect two or more LANs with same network layers. Can determine which is the best path for a message to take between networks. A router can be a special purpose black box, a computer with several NICs or a special network software module within a computer. A router makes no change to the network layer packet it receives. It is quite common now for bridges to be bridge-routers and the distinction between the two is becoming blurred. Present Session DataLink PHY Router Router Router / Gateway Relay DataLink DataLink PHY PHY Router Router Present Session DataLink PHY 1 2
8 Routing Concepts Adaptive and nonadaptive routing In nonadaptive routing, once the best path to a particular destination has been determined, every single packet addressed to that destination is sent along that path. This happens regardless of any changes in network conditions. In adaptive routing, the routing tables are continually being updated to reflect changing network conditions (such as congestion, failure, reconfiguration, etc.). Hence every packet addressed to a particular destination may travel a different path even if some of the packets belong to a single message. Packet Lifetime When adaptive routing is used, it is possible that a packet can get lost in an infinite loop. To prevent this, an extra field to the packet called the packet lifetime or time to live (TTL). This field gives the number of hops that the packet can take before it is considered lost. Each router that receives the packet decrements the TTL field before forwarding the packet. If a router receives a packet with a TTL value of zero, it destroys the packet without forwarding it. Brouters Brouters are devices that combine the functions of both bridges and routers. They operate at both the data link & network layers. They can connects both same and different data link type network LAN segments. As fast as bridges for same data link type networks. Gateways (Protocol Converters) Gateway Illustration A gateway is a protocol converter. Used to connect LANs with same or different physical, data link and network layers. A gateway can be: A stand alone computer with special software and several NICs Software installed in a router. A front end processor (FEP) in a mainframe. A special circuit card installed in a network server. Some protocol conversions simply require a change in the header and trailer of the packet. Others are more complicated and can involve changing the data rate, packet size and overall packet format. SNA Gateway Netware
9 A Rose by Any Other Name ing Device Comparison The terminology used in the marketplace may differ substantially and tends to change as fast a catalogues can be printed! For example, one vendor s bridge may provide the functions of another s router. Some other networking devices that are available: Multiprotocol bridges translate between different data link layer protocols. Multiprotocol routers can understand several different network layer protocols. Protocol filtering bridges multiprotocol bridges that forward only packets of a certain type. Encapsulating bridges connect networks with different data link protocols. Layer-3 switches (IP switches) switch messages base on network layer address. Device OSI Layer Physical Data Link Hub/Repeater Physical Same/Different Same Same Bridge Data Link Same/Different Usually Same Same Switch Data Link Same/Different Same Same Routers Same/Different Same/Different Same Brouters /DL Same/Different Same/Different Same Gateway Application Same/Different Same/Different Same/Different Common Backbone Designs Routed Backbones When many LANs are connected together, the connecting network is usually called a backbone In designing/classifying backbone networks, the most important characteristic is the way in which packets are moved across the backbone. There are three basic backbone designs : routed, bridged and switched Routed backbones move packets based on their network layer address. The primary advantage is that routed backbones clearly segment each part of the network connected to the backbone. There are two disadvantages to routed backbones. The routers in the network impose time delays Routed networks require a lot of management.
10 Bridged Backbones Bridged/Routed Backbone Bridged backbones move packets based on their physical address. Advantages: Bridges tend to be less expensive than routers. Bridged backbones tend to be simpler to install. Disadvantages: Individual segment management is difficult. throughput is lower than routed backbones since broadcast messages must be permitted to travel everywhere leading to congestion. Hub LAN Backbone Switched Backbones Switched Backbone Most switched backbones use the data link layer address to move packets. A collapsed backbone is the most common form. Advantages: Improved performance Far fewer networking devices. Flexible very easy to install and move nodes. Potential disadvantages: More broadcast traffic Difficult to isolate and separately manage individual LANs. Use more cable and if the switch fails, so does the network. Hub Switch LAN Backbone
11 Virtual LANs Switches permit the creation of Virtual LANs (VLANs). These provide greater opportunities to manage the flow of traffic on the LAN to avoid congestion and enhance security. VLANs are groups of computers in an intelligent switched network. Intelligent Switches Intelligent switches can be connected together to create very large networks supporting hundreds of network ports. Since there is not enough capacity in the backplane to support all ports if they become active the switch forms groups of connections and assigns capacity using time division multiplexing. This means that the switch no longer guarantees simultaneous transmission on all ports, but will accept simultaneous input and will switch incoming data to outgoing ports as fast as possible. These groups are called VLANs Port and MAC Based VLANs Port-Based VLANs (Layer-1 VLANs) Use the physical layer port address to form the VLAN groups. It is logical to connect computers that are physically close together on the LAN into ports that are physically close together on the switch, and to assign ports that are physically close together into the same VLAN. This is the traditional approach in LAN design: physical location determines the LAN, but is not always the most effective approach. Ports can be used to balance capacity against traffic MAC-Based VLANs (Layer-2 VLANs) MAC-based VLANs use the dame data link layer addresses to form the VLAN groups. The advantage is that they are simpler to manage when computers are moved. IP and Application Based VLANs IP-Based VLANs(Layer-3 VLANs) IP-based VLANs use the network layer address (i.e. TCP/IP address) to form the VLAN groups. Layer-3 VLANs reduce the time spent reconfiguring the network when a computer is moved as well. Some layer-3 VLANs can also use the network layer protocol to create VLAN groups. This flexibility enables manager even greater precision in the allocation of network capacity. Application-Based VLANs (Layer-4 VLANs) Application-based VLANs use the application layer protocol in combination with the data link layer and network layer addresses to form the VLAN groups. The advantage is a very precise allocation of network capacity.
12 TCP/IP Layer (IP) IP (Internetwork Protocol) is an unreliable, connectionless protocol. The data units (packets) in IP are called datagrams and have the following format: Addressing In order for messages to get to the correct destination, addresses must be specified. Three main levels of addressing are used in a TCP/IP network: Header Format: 1 st byte in header Service VER HLEN Type Identification Time to live Protocol Source IP address Destination IP address Options Total length Flags Fragmentation Off (13 bi ) Header Checksum Datagram Format: Header bytes Data bytes Address Type Application Layer Layer (Logical) Data Link Layer (Physical) Eg of Protocol/Software Web browser / client Example / someone@gu.edu.au TCP/IP Ethernet 00-0C-00-F5-03-5A 1 byte (8 bits) IP Addresses Dotted Decimal Notation In TCP/IP the network layer address is called the IP address Five classes of addresses are defined to cater for the needs of various organisations The format of IP addresses is as follows: Byte 1 Byte 2 Byte 3 Byte 4 Class B Netid Hostid Byte 1 Byte 2 Byte 3 Byte 4 Class A Class B Class C Class D Class E 0 Netid Hostid 10 Netid 110 Netid 1110 Multicast address 1111 Reserved Hostid Hostid Class A B C Available Addresses 16 Million 16, Address Structure 50.x.x.x x.x x NetID (bits) HostID (bits)
13 TCP/IP Internet Addressing Example Subnet Addressing Note that devices with more than one network connection have more than one network (IP) address G G a.b.c.d To Internet R R Outside world Netid Hosttid Netid Hosttid Subnetid Within Organisation Subnetwork Masks Subnetworking Example A network node identifies the subnetwork portion of the address using a mask. A mask is a 32-bit pattern that is ANDed with an IP address. A subnetwork mask will have a 1 for all bits that indicate the subnet, and 0 for all bits that designate the host. Examples, The subnetwork mask for the case in the previous eg would be The subnetwork mask for an organisation that has been assigned a class C network address and wishes to use the first three bit of the last byte to designate the subnet would be: subnetwork R subnetwork subnetwork :
14 Other Protocols in the TPC/IP Layer Address Resolution Protocol Address Resolution Protocol (ARP) associates an IP (network) address with the physical address (the address on the NIC). Internet Control Message Protocol (ICMP) used by hosts and routers to inform sender of problems with datagram delivery. Internet Group Message Protocol (IGMP) used to support multicasting. Used by a router to determine which hosts on a LAN belong to the multicast group defined by a given class D address. I m looking for the physical address of the node whose IP address is ARP Request I m the node you re after and my physical address C0-12-AF-BG ARP Response
VLANS and Other Hardware
VLANS and Other Hardware CS442 First, a review problem Subnet mask: 255.255.255.0 Examples: Client in A wants to contact server in A or B 1 Other Network Devices Brouters are devices that combine the functions
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More informationThe Internet. The Internet is an interconnected collection of netw orks.
The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationUNIT III NETWORK LAYER 1. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationHubs. twisted pair. hub. 5: DataLink Layer 5-1
Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationTCP/IP and the OSI Model
TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationSwitching and Forwarding Reading: Chapter 3 1/30/14 1
Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any
More informationPART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)
PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High
More informationTSIN02 - Internetworking
Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationUnit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationLecture 11: Networks & Networking
Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationKing Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationThe Internet Protocol (IP)
The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationMixed-Media Bridging
CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationNetworks Hardware Components
Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices
More informationThe Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.
The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,
More informationCC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite
CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols 1 Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationNetwork Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:
Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless
More informationNetwork Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control
The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationChapter 06 IP Address
Chapter 06 IP Address IP Address Internet address Identifier used at IP layer 32 bit binary address The address space of IPv4 is 2 32 or 4,294,967,296 Consists of netid and hosted IP Address Structure
More informationWired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices
Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address
ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted
More informationECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then
More informationMODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:
BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationNetwork Layer: outline
Network Layer: outline 1 introduction 2 virtual circuit and datagram networks 3 what s inside a router 4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 5 routing algorithms link state
More informationCOSC 6377 Mid-Term #2 Fall 2000
Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information.
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationMcGraw-Hill The McGraw-Hill Companies, Inc., 2000
!! McGraw-Hill The McGraw-Hill Companies, Inc., 2000 "#$% & '$# )1 ) ) )6 ) )* )- ). )0 )1! )11 )1 )1 )16 )1 3'' 4", ( ( $ ( $ $$+, $$, /+ & 23,4 )/+ &4 $ 53" Network Layer Position of network layer Figure
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationLecture (03) Internet Protocol tcp/ip> OSI>
Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationPosition of IP and other network-layer protocols in TCP/IP protocol suite
Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationCourse 6. Internetworking Routing 1/33
Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node
More informationIP: Addressing, ARP, Routing
IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics
More informationNetwork.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components
Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess
More informationNetwork Layer/IP Protocols
Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header
More informationThis talk will cover the basics of IP addressing and subnetting. Topics covered will include:
This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationTSIN02 - Internetworking
Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the
More informationCMPE 150 Winter 2009
CMPE 150 Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.
More informationMore on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009
More on Link Layer Kai Shen Recap of Last Class Ethernet dominant link layer technology for local-area l networks Ethernet frame structure Ethernet multiple access control CSMA/CD, exponential back-off
More informationInternetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms
Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationFundamentals of Networking Introduction to Networking Devices
Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationLecture 7. Network Layer. Network Layer 1-1
Lecture 7 Network Layer Network Layer 1-1 Agenda Introduction to the Network Layer Network layer functions Service models Network layer connection and connectionless services Introduction to data routing
More informationInternetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1
Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following
More informationLecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I
Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationLAN Interconnection and Other Link Layer Protocols
LAN Interconnection and Other Link Layer Protocols Ethernet dominant link layer technology for local-area networks Ethernet frame structure Kai Shen Dept. of Computer Science, University of Rochester Ethernet
More informationGood day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.
Computer Networks Prof: Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Local Internetworking Good day. Today we will be talking about
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More information