7010INT Data Communications Lecture 7 The Network Layer

Size: px
Start display at page:

Download "7010INT Data Communications Lecture 7 The Network Layer"

Transcription

1 Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical Addressing, Routing & Packet Delivery Text reference: Chapters 16, 19 & 21 Dr. Ruben Gonzalez School of Information Technology Connecting LANs Why Interconnect? Often you need to connect a local area network to another local area network or to a wide area network. Local area network-to-local area network connections are often performed with a bridge-like device. Local area network-to-wide area network connections are usually performed with a router. A third device, the switch, can be used to interconnect segments of a local area network. Application Gateway Presentation Session Router Data Link Bridge / Switch Physical Repeater / Hub To separate / connect one corporate division with another. To connect two LANs with different protocols. To connect a LAN to the Internet. To break a LAN into segments to relieve traffic congestion. To provide a security wall between two different types of users.

2 Repeaters Operate purely at the physical layer. Propagate all traffic in both directions between the LAN sections they link Used to extend the length of a LAN segment beyond the normal limit imposed by the medium. Regenerate all signals received on one segment and forwarding (repeats) them onto the next. They may connect different types of cable, but use the same data link and network protocol. LLC MAC PHY Repeater Repeater LLC MAC PHY Bridges A bridge (or bridge-like device) can be used to connect two similar LANs, such as two CSMA/CD LANs. A bridge can also be used to connect two closely similar LANs, such as a CSMA/CD LAN and a token ring LAN. The bridge examines the destination address in a frame and either forwards this frame onto the next LAN or does not. The bridge examines the source address in a frame and places this address in a routing table, to be used for future routing decisions. LAN Segment LAN Segment LAN Segment Bridges Transparent Bridge LLC MAC PHY LAN Segment Relay MAC MAC PHY PHY Bridge LAN Segment LLC MAC PHY A transparent bridge does not need programming but observes all traffic and builds routing tables from this observation. This observation is called backward learning. Each bridge has two connections (ports) and there is a routing table associated with each port. A bridge observes each packet that arrives at a port, extracts the source address from the packet, and places that address in the port s routing table. Transparent bridges are used with CSMA/CD LANs.

3 Transparent Bridge Transparent Bridge A transparent bridge can also convert one frame Header Frame contents format to another Traile Preamble SD DA SA Length DATA Pad FCS Preamble Header SD Frame contents Trailer FC DA SA DATA FCS ED Header Frame contents Trailer SD AC FC DA SA DATA FCS ED FS SD = Start Delimiter FC = Frame Control AC = Access Control DA = Destination address FCS = Frame check sequence ED = End Delimiter FS = Frame Status SA = Source address Note that some people / manufacturers call a bridge such as this a gateway or sometimes a router. The bridge removes the headers and trailers from one frame format and inserts (encapsulates) the headers and trailers for the second frame format. A Problem With Transparent Bridges A 1 Routing Table Dest Port A 1/2 D? A to D 2 3 Bridge Bridge 2 3 D Routing Table Dest Port A 1/2 D? F H

4 Spanning Tree Algorithm Spanning Tree Algorithm Initialisation Attempts to solve the routing problem Every port on every bridge is categorised as either a forwarding port or a blocking port Forwarding and blocking ports are assigned such that no loops can be formed Once the spanning tree has been established, any packets received by a bridge with an unknown destination are only sent out to on forwarding ports. Each bridge on the LAN is assigned an ID number (arbitrarily). The bridge with the smallest ID is chosen to be the root bridge by all themselves. Each port on every bridge is assigned a cost. The cost is determined by the bit rate of the attached segment: the higher the bit rate, the lower the cost. If all ports have the same bit rate then the cost is set to 1 for each port. Spanning Tree Algorithm - Operation Each bridge determines its root port (the port with the lowest path cost to the root). A designated port is found for each LAN segment. If only one bridge is connected to a LAN segment, then the designated port will be the port connecting that segment to the bridge. If more than one bridge is connected to a single LAN segment, then the designated bridge will be the one that can carry a frame from the LAN segment to the root with the cheapest path cost. The port that connects the designated bridge to the LAN is the designated port. Note that a root port cannot be selected as the designated port. Any ports that have not been assigned as either root ports or designated ports are labelled as blocking ports. Root ports and designated ports are labelled as forwarding ports. Path cost Segment 1 Segment 2 Root path Blocking port Segment 3 2 A Spanning Tree Des Des RP BP RP 4 2 Segment 4 Segment 5 Root Des Des RP Des RP BP Designated port 4 4

5 Source-routing Bridges A source-routing bridge is used in token ring networks. They do not learn from watching tables. When a workstation wants to send a frame, it must know the exact path of network / bridge / network / bridge / network If a workstation does not know the exact path, it sends out a discovery frame. The discovery frame makes its way to the final destination, then as it returns, it records the path. Used mostly with token ring LANs, so not generally used today. Using Bridges to Connect Different Types of LANs - Issues Frame format Each LAN protocol has its own frame format, hence conversion is necessary. Payload size The maximum allowable length for the data field varies between protocols. This may require a frame to be subdivided before being forwarded. (Eg from token ring to Ethernet). Data rate Different protocols operate at different data rates (as well as different LANs running the same protocol eg 10Base-T and 100Base-T). Frames travelling from a faster to a slower LAN must be buffered accordingly. Address bit order the binary representation of physical addresses varies between protocols. Appropriate conversion must be performed. Bridge Disadvantages Since a bridge receives and buffers all frames in their entirety before performing the forwarding them, it introduces an additional store-and-forward delay compared with a repeater. Bridges don t perform flow control and may overload during periods of high traffic. Bridging of segments operating with different data link protocols (and frame formats) means that the contents of frames must be modified prior to forwarding. This necessitates a new frame check sequence being generated by the bridge with the effect that any errors introduced while frames are being relayed across the bridge will go undetected.

6 Hubs Switches As seen earlier, a hub interconnects two or more workstations into a local area network. When a workstation transmits to a hub, the hub immediately resends the data frame out all connecting links. A hub can be managed or unmanaged. A managed hub possesses enough processing power that it can be managed from a remote location. A switch is a combination of a hub and a bridge. It can interconnect two or more workstations, but like a bridge, it observes traffic flow and learns. When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection. Workstations that connect to a hub are on a shared segment. Workstations that connect to a switch are on a switched segment. Switches The backplane of a switch is fast enough to support multiple data transfers at one time. A switch that employs cut-through architecture is passing on the frame before the entire frame has arrived at the switch. Multiple workstations connected to a switch use dedicated segments. This is a very efficient way to isolate heavy users from the network. A switch can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server.

7 Switches v s Hubs Maximum total capacity = 10 Mbps 10 Mbps Hub 10 Mbps 10 Mbps 10 Mbps Maximum total capacity = N x10 Mbps Switch 10 Mbps 10 Mbps Routers Routers in a Connect two or more LANs with same network layers. Can determine which is the best path for a message to take between networks. A router can be a special purpose black box, a computer with several NICs or a special network software module within a computer. A router makes no change to the network layer packet it receives. It is quite common now for bridges to be bridge-routers and the distinction between the two is becoming blurred. Present Session DataLink PHY Router Router Router / Gateway Relay DataLink DataLink PHY PHY Router Router Present Session DataLink PHY 1 2

8 Routing Concepts Adaptive and nonadaptive routing In nonadaptive routing, once the best path to a particular destination has been determined, every single packet addressed to that destination is sent along that path. This happens regardless of any changes in network conditions. In adaptive routing, the routing tables are continually being updated to reflect changing network conditions (such as congestion, failure, reconfiguration, etc.). Hence every packet addressed to a particular destination may travel a different path even if some of the packets belong to a single message. Packet Lifetime When adaptive routing is used, it is possible that a packet can get lost in an infinite loop. To prevent this, an extra field to the packet called the packet lifetime or time to live (TTL). This field gives the number of hops that the packet can take before it is considered lost. Each router that receives the packet decrements the TTL field before forwarding the packet. If a router receives a packet with a TTL value of zero, it destroys the packet without forwarding it. Brouters Brouters are devices that combine the functions of both bridges and routers. They operate at both the data link & network layers. They can connects both same and different data link type network LAN segments. As fast as bridges for same data link type networks. Gateways (Protocol Converters) Gateway Illustration A gateway is a protocol converter. Used to connect LANs with same or different physical, data link and network layers. A gateway can be: A stand alone computer with special software and several NICs Software installed in a router. A front end processor (FEP) in a mainframe. A special circuit card installed in a network server. Some protocol conversions simply require a change in the header and trailer of the packet. Others are more complicated and can involve changing the data rate, packet size and overall packet format. SNA Gateway Netware

9 A Rose by Any Other Name ing Device Comparison The terminology used in the marketplace may differ substantially and tends to change as fast a catalogues can be printed! For example, one vendor s bridge may provide the functions of another s router. Some other networking devices that are available: Multiprotocol bridges translate between different data link layer protocols. Multiprotocol routers can understand several different network layer protocols. Protocol filtering bridges multiprotocol bridges that forward only packets of a certain type. Encapsulating bridges connect networks with different data link protocols. Layer-3 switches (IP switches) switch messages base on network layer address. Device OSI Layer Physical Data Link Hub/Repeater Physical Same/Different Same Same Bridge Data Link Same/Different Usually Same Same Switch Data Link Same/Different Same Same Routers Same/Different Same/Different Same Brouters /DL Same/Different Same/Different Same Gateway Application Same/Different Same/Different Same/Different Common Backbone Designs Routed Backbones When many LANs are connected together, the connecting network is usually called a backbone In designing/classifying backbone networks, the most important characteristic is the way in which packets are moved across the backbone. There are three basic backbone designs : routed, bridged and switched Routed backbones move packets based on their network layer address. The primary advantage is that routed backbones clearly segment each part of the network connected to the backbone. There are two disadvantages to routed backbones. The routers in the network impose time delays Routed networks require a lot of management.

10 Bridged Backbones Bridged/Routed Backbone Bridged backbones move packets based on their physical address. Advantages: Bridges tend to be less expensive than routers. Bridged backbones tend to be simpler to install. Disadvantages: Individual segment management is difficult. throughput is lower than routed backbones since broadcast messages must be permitted to travel everywhere leading to congestion. Hub LAN Backbone Switched Backbones Switched Backbone Most switched backbones use the data link layer address to move packets. A collapsed backbone is the most common form. Advantages: Improved performance Far fewer networking devices. Flexible very easy to install and move nodes. Potential disadvantages: More broadcast traffic Difficult to isolate and separately manage individual LANs. Use more cable and if the switch fails, so does the network. Hub Switch LAN Backbone

11 Virtual LANs Switches permit the creation of Virtual LANs (VLANs). These provide greater opportunities to manage the flow of traffic on the LAN to avoid congestion and enhance security. VLANs are groups of computers in an intelligent switched network. Intelligent Switches Intelligent switches can be connected together to create very large networks supporting hundreds of network ports. Since there is not enough capacity in the backplane to support all ports if they become active the switch forms groups of connections and assigns capacity using time division multiplexing. This means that the switch no longer guarantees simultaneous transmission on all ports, but will accept simultaneous input and will switch incoming data to outgoing ports as fast as possible. These groups are called VLANs Port and MAC Based VLANs Port-Based VLANs (Layer-1 VLANs) Use the physical layer port address to form the VLAN groups. It is logical to connect computers that are physically close together on the LAN into ports that are physically close together on the switch, and to assign ports that are physically close together into the same VLAN. This is the traditional approach in LAN design: physical location determines the LAN, but is not always the most effective approach. Ports can be used to balance capacity against traffic MAC-Based VLANs (Layer-2 VLANs) MAC-based VLANs use the dame data link layer addresses to form the VLAN groups. The advantage is that they are simpler to manage when computers are moved. IP and Application Based VLANs IP-Based VLANs(Layer-3 VLANs) IP-based VLANs use the network layer address (i.e. TCP/IP address) to form the VLAN groups. Layer-3 VLANs reduce the time spent reconfiguring the network when a computer is moved as well. Some layer-3 VLANs can also use the network layer protocol to create VLAN groups. This flexibility enables manager even greater precision in the allocation of network capacity. Application-Based VLANs (Layer-4 VLANs) Application-based VLANs use the application layer protocol in combination with the data link layer and network layer addresses to form the VLAN groups. The advantage is a very precise allocation of network capacity.

12 TCP/IP Layer (IP) IP (Internetwork Protocol) is an unreliable, connectionless protocol. The data units (packets) in IP are called datagrams and have the following format: Addressing In order for messages to get to the correct destination, addresses must be specified. Three main levels of addressing are used in a TCP/IP network: Header Format: 1 st byte in header Service VER HLEN Type Identification Time to live Protocol Source IP address Destination IP address Options Total length Flags Fragmentation Off (13 bi ) Header Checksum Datagram Format: Header bytes Data bytes Address Type Application Layer Layer (Logical) Data Link Layer (Physical) Eg of Protocol/Software Web browser / client Example / someone@gu.edu.au TCP/IP Ethernet 00-0C-00-F5-03-5A 1 byte (8 bits) IP Addresses Dotted Decimal Notation In TCP/IP the network layer address is called the IP address Five classes of addresses are defined to cater for the needs of various organisations The format of IP addresses is as follows: Byte 1 Byte 2 Byte 3 Byte 4 Class B Netid Hostid Byte 1 Byte 2 Byte 3 Byte 4 Class A Class B Class C Class D Class E 0 Netid Hostid 10 Netid 110 Netid 1110 Multicast address 1111 Reserved Hostid Hostid Class A B C Available Addresses 16 Million 16, Address Structure 50.x.x.x x.x x NetID (bits) HostID (bits)

13 TCP/IP Internet Addressing Example Subnet Addressing Note that devices with more than one network connection have more than one network (IP) address G G a.b.c.d To Internet R R Outside world Netid Hosttid Netid Hosttid Subnetid Within Organisation Subnetwork Masks Subnetworking Example A network node identifies the subnetwork portion of the address using a mask. A mask is a 32-bit pattern that is ANDed with an IP address. A subnetwork mask will have a 1 for all bits that indicate the subnet, and 0 for all bits that designate the host. Examples, The subnetwork mask for the case in the previous eg would be The subnetwork mask for an organisation that has been assigned a class C network address and wishes to use the first three bit of the last byte to designate the subnet would be: subnetwork R subnetwork subnetwork :

14 Other Protocols in the TPC/IP Layer Address Resolution Protocol Address Resolution Protocol (ARP) associates an IP (network) address with the physical address (the address on the NIC). Internet Control Message Protocol (ICMP) used by hosts and routers to inform sender of problems with datagram delivery. Internet Group Message Protocol (IGMP) used to support multicasting. Used by a router to determine which hosts on a LAN belong to the multicast group defined by a given class D address. I m looking for the physical address of the node whose IP address is ARP Request I m the node you re after and my physical address C0-12-AF-BG ARP Response

VLANS and Other Hardware

VLANS and Other Hardware VLANS and Other Hardware CS442 First, a review problem Subnet mask: 255.255.255.0 Examples: Client in A wants to contact server in A or B 1 Other Network Devices Brouters are devices that combine the functions

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

UNIT III NETWORK LAYER 1. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Mixed-Media Bridging

Mixed-Media Bridging CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Networks Hardware Components

Networks Hardware Components Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols 1 Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall: Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless

More information

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Chapter 06 IP Address

Chapter 06 IP Address Chapter 06 IP Address IP Address Internet address Identifier used at IP layer 32 bit binary address The address space of IPv4 is 2 32 or 4,294,967,296 Consists of netid and hosted IP Address Structure

More information

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

Network Layer: outline

Network Layer: outline Network Layer: outline 1 introduction 2 virtual circuit and datagram networks 3 what s inside a router 4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 5 routing algorithms link state

More information

COSC 6377 Mid-Term #2 Fall 2000

COSC 6377 Mid-Term #2 Fall 2000 Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information.

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

McGraw-Hill The McGraw-Hill Companies, Inc., 2000 !! McGraw-Hill The McGraw-Hill Companies, Inc., 2000 "#$% & '$# )1 ) ) )6 ) )* )- ). )0 )1! )11 )1 )1 )16 )1 3'' 4", ( ( $ ( $ $$+, $$, /+ & 23,4 )/+ &4 $ 53" Network Layer Position of network layer Figure

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess

More information

Network Layer/IP Protocols

Network Layer/IP Protocols Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header

More information

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

This talk will cover the basics of IP addressing and subnetting. Topics covered will include: This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

CMPE 150 Winter 2009

CMPE 150 Winter 2009 CMPE 150 Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.

More information

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009 More on Link Layer Kai Shen Recap of Last Class Ethernet dominant link layer technology for local-area l networks Ethernet frame structure Ethernet multiple access control CSMA/CD, exponential back-off

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

Lecture 7. Network Layer. Network Layer 1-1

Lecture 7. Network Layer. Network Layer 1-1 Lecture 7 Network Layer Network Layer 1-1 Agenda Introduction to the Network Layer Network layer functions Service models Network layer connection and connectionless services Introduction to data routing

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

LAN Interconnection and Other Link Layer Protocols

LAN Interconnection and Other Link Layer Protocols LAN Interconnection and Other Link Layer Protocols Ethernet dominant link layer technology for local-area networks Ethernet frame structure Kai Shen Dept. of Computer Science, University of Rochester Ethernet

More information

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks. Computer Networks Prof: Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Local Internetworking Good day. Today we will be talking about

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information