Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I
|
|
- Augustus Evans
- 5 years ago
- Views:
Transcription
1 Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing ٢ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
2 OSI Layer 2 of WANs WAN protocols used on point to point serial links provide the basic function of data delivery across that one link. The two most popular data link protocols used on point topoint links are High Level Data Link Control (HDLC) and Point to Point Protocol (PPP). ٣ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (2) 1. HDLC HDLC performs OSI Layer 2 functions, Arbitration Determines when it is appropriate to use the physical medium Addressing Ensures that the correct recipient(s) receives and processes the data that is sent Error detection Determines whether the data made the trip across the physical medium successfully Identifying the encapsulated data Determines the type of header that follows the datalink header ٤ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
3 OSI Layer 2 of WANs (3) 1. Arbitration HDLC is very simple as compared with Ethernet Ethernet uses CSMA/CD algorithm arbitrates point to point serial link, each router can send over the fourwire (two pair) circuit at any time, so there is no need for any kind of a arbitration. ٥ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (4) HDLC defines framing that includes an 1. address field, 2. frame check sequence (FCS) field, 3. And a protocol type field. These three fields in the HDLC frame help provide the other three functions of the data link layer. ٦ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
4 OSI Layer 2 of WANs (5) 2. Addressing HDLC defines a 1 byte address field, although on point topoint links, it is not really needed. In the past HDLC was used for a multidrop circuit. With a multidrop circuit, one central site device could send and receive frames with multiple remote sites. HDLC defined the address field to identify the different remote sites on a multidrop link. Now HDLC used for point to point links so address is not used, routers insert decimal 3 into address field. ٧ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (6) 3. Error Detection HDLC performs error detection just like Ethernet it uses an FCS field in the HDLC trailer. And just like Ethernet, if a received frame has errors in it, the frame is discarded, with no error recovery performed by HDLC. 4. Identifying the encapsulated data HDLC performs the function of identifying the encapsulated data just like Ethernet as well. When a router receives an HDLC frame, it wants to know what type of packet is held inside the frame. ٨ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
5 OSI Layer 2 of WANs (7) 2. Point to Point Protocol Comparing the basics, PPP behaves exactly like HDLC 1. There is an address field, but the addressing does not matter. ٩ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II 2. PPP does discard errored frames that do not pass the FCS check. 3. And PPP uses a 2 byte Protocol Type field although PPP s Protocol Type field is defined by the protocol ١٠ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
6 OSI Layer 2 of WANs (8) PPP unique features fall into two main categories: 1. Those needed regardless of the Layer 3 protocol sent across the link 2. Those specific to each Layer 3 protocol Each link that uses PPP has one LCP (link control protocol) per link and one CP (control protocol) for each Layer 3 protocol defined on the link. ١١ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (9) Link Control Protocol (LCP), focuses on the features that apply regardless of the Layer 3 protocol used. LCP performs most of its work when the line comes up, so it has a lot more work to do with dialed links, which come up and down a lot, versus leased lines, which hopefully seldom fail. ١٢ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
7 OSI Layer 2 of WANs (10) ١٣ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (11) IP Control Protocol (IPCP) (type of LC) provides for IP address assignment over a PPP link. When a user dials a new connection to an ISP using a modem, PPP typically is used, with IPCP assigning an IP address to the remote PC. If a router is configured for IPX, AppleTalk, and IP on a PPP serial link, the router configured for PPP encapsulation automatically tries to bring up the appropriate controlprotocols for each Layer 3 protocol. ١٤ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
8 ١٥ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (12) 3. Other Point to Point WAN Data Link Protocols WAN data link protocols can be compared relative to two main attributes. 1. First, some protocols do support multiprotocol traffic by virtue of having a defined protocol type field. 2. Also, some protocols actually perform error recovery so when the receiving end notices that the received frame did not pass the FCS check, it causes the frame to be resent. ١٦ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
9 OSI Layer 2 of WANs (13) ١٧ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (14) Synchronization Both of HDLC and PPP are synchronous. Synchronous means sending and receiving ends uses the same clock. it is expensive to build devices that truly can operate at exactly the same speed. So, the devices operate at close to the same speed and listen to the speed of the other device on the other side of the link. One side makes small adjustments in its rate to match the other side. ١٨ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
10 ١٩ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (16) Frame Relay Frame Relay networks are multi access networks, which means that more than two devices can attach to the network, similar to LANs. To support more than two devices, the protocols must be a little more detailed. ٢٠ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
11 OSI Layer 2 of WANs (17) Frame Relay uses the same Layer 1 features as a point topoint leased line. For a Frame Relay services, a leased line is installed between each router and a nearby Frame Relay switch; these links are called access links. The access links run the same speeds and use the same signaling standards as do point to point leased lines. ٢١ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (18) Each frame header holds an address field called a data link connection identifier (DLCI). The WAN switch forwards the frame, based on the DLCI, through the provider s network until it gets to the router on the other side of the network. so that it s called packet switching service, and that s the main difference between point2point and frame relay. ٢٢ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
12 ٢٣ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (19) Frame Relay protocols resemble OSI Layer 2 protocols; the term usually used for the bits sent by a Layer 2 device is frame the Frame Relay switches are called DCE, and the customer equipment routers, in this case are called DTE DCE refers to the device providing the service, and the term DTE refers to the device needing the frame switching service. ٢٤ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
13 OSI Layer 2 of WANs (20) At the same time, the CSU/DSU provides clocking to the router, so from a Layer 1 perspective, the CSU/DSU is still the DCE and the router is still the DTE. It s just two different uses of the same terms. ٢٥ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (21) The logical path between each pair of routers is called a Frame Relay permanent virtual circuits (PVCs). When R1 needs to forward a packet to R2, it encapsulates the Layer 3 packet into a Frame Relay header and trailer and then sends the frame. R1 uses a Frame Relay address called a DLCI in the Frame Relay header. ٢٦ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
14 OSI Layer 2 of WANs (22) Permanent virtual circuit (PVC) is the main feature of frame relay over p2p Figure shows connecting 3 sites using 3 leased lines and 3 frame relay switches ٢٧ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II OSI Layer 2 of WANs (23) In the example, both VCs terminating at R1 use the same access link. So, with large networks with many WAN sites that need to connect to a central location, only one physical access link is required from the main site router to the Frame Relay network. If point to point links were used, a physical circuit, a separate CSU/DSU, and a separate physical interface on the router would be required for each point to point link. So, Frame Relay enables you to expand the WAN but add less hardware to do so. ٢٨ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II
15 OSI Layer 2 of WANs (24) Frame Relay is designed with the concept of a committed information rate (CIR). Each VC has a CIR, which is a guarantee by the provider that a particular VC gets at least that much bandwidth. You can think of CIR of a VC like the bandwidth or clock rate of a point to point circuit, except that it s the minimum value you can actually send more, in most cases. ٢٩ Dr. Ahmed ElShafee, ACU Fall2015, Computer Networks II Internetwork layer ٣٠
16 Introduction Typical features of OSI layer 3 OSI layer 3 or network layer, or internet layer in case of TCP/IP protocol is a protocol that defines routing and addressing Such as Connectionless Network Services (CLNS), Internet Protocol (IP), Novell Internetwork Packet Exchange (IPX), or AppleTalk Dynamic Data Routing (DDR) network layer protocols have many similarities. ٣١ Introduction (2) Routing (Path Selection) Routing focuses on the end to end logic of forwarding data. Figure shows a simple example of how routing works. The logic seen in the figure is relatively simple. For PC1 to send data to PC2, it must send something to R1, when sends it to R2, then on to R3, and finally to PC2. ٣٢
17 Introduction (3) PC1 s Logic: Sending Data to a Nearby Router In this example, PC1 has some data to send data to PC2. Because PC2 is not on the same Ethernet as PC1, PC1 needs to send the packet to a router that is attached to the same Ethernet as PC1. The sender sends a data link frame across the medium to the nearby router; this frame includes the packet in the data portion of the frame. ٣٣ Introduction (4) That frame uses data link layer (Layer 2) addressing in the data link header to ensure that the nearby router receives the frame. The main point here is that the originator of the data does not know much about the network just how to get the data to some nearby router. PC1 needs to know only how to get the packet to R1. ٣٤
18 Introduction (5) R1 and R2 s Logic: Routing Data Across the Network R1 and R2 both use the same general process to route the packet The routing table contains one entry per group of addresses The router compares the destination network layer address in the packet to the entries in the routing table The matching entry in the routing table tells this router where to forward the packet next. ٣٥ Introduction (6) Likewise, in Figure everyone in this the network whose IP address starts with is on the Token Ring on which PC2 resides, So the routers can just have one routing table entry that means all addresses that start with Eventually, the packet is delivered to the router connected to the network or subnet of the destination host (R3), ٣٦
19 Introduction (7) R3 s Logic: Delivering Data to the End Destination R3 needs to forward the packet directly to PC2, not to some other router. ٣٧ Network Layer Interaction with the Data Link Layer four different types of data links were used to deliver the data When the network layer protocol is processing the packet, it decides to send the packet out the appropriate data link layer. the data link layer adds the appropriate header and trailer to the packet, creating a frame, before sending the frames over each physical network. ٣٨
20 The network layer processes deliver the packet end to end, using successive data link headers and trailers just to get the packet to the next router or host in the path. the PCs and routers must have some way to decide what datalink addresses to use Address Resolution Protocol (ARP) is used to dynamically learn the data link address of an IP host connected to a LAN. ٣٩ One key feature of network layer addresses is that they were designed to allow logical grouping of addresses (routing process) In TCP/IP, this group is called a network or a subnet. In IPX, it is called a network. In AppleTalk, the grouping is called a cable range. Just like postal street addresses, network layer addresses are grouped based on physical location in a network ٤٠
21 In each of these network layer protocols, all devices on opposite sides of a router must be in a different Layer 3 group. The routing tables for each network layer protocol can have one entry for the group, Imagine an Ethernet with 100 TCP/IP hosts. A router needing to forward packets to any of those hosts needs only one entry in its IP routing table. This basic fact is one of the key reasons that routers can scale to allow tens and hundreds of thousands of devices ٤١ The same logic of people in the same ZIP code live near to each other. If that local town wants to add streets, the rest of the post offices in the country already are prepared because they just forward letters based on the ZIP code, which they already know. The only postal employees who care about the new streets are the people in the local post office. Also, you can have duplicate local street addresses, as long as they are in different ZIP codes, and it all ٤٢ still works.
22 Example Layer 3 Address Structures Each Layer 3 address structure contains at least two parts. One (or more) part at the beginning of the address works like the ZIP code and essentially identifies the grouping. All addresses with the same value in the first part are in the same group for example, the same IP subnet or IPX network or AppleTalk cable range. The last part of the address acts as a local address, uniquely identifying that device in that particular group ٤٣ Routing Protocols In most cases, routing table entries are built dynamically by use of a routing protocol. Routing protocols learn about all the locations of the network layer groups in a network. Routing protocols define message formats and procedures to build the routing table. The end goal of each routing protocol is to fill the routing table with all known destination groups and with the best route to reach each group. ٤٤
23 routers uses the Routing Information Protocol (RIP) to learn the routes IP protocol called routed protocol, which is responsible of packet forwarded, or routed, through a network. ٤٥ IP Addressing Definitions If a device wants to communicate using TCP/IP, it needs an IP address. Any device that can send and receive IP packets is called an IP host. IP addresses consist of a 32 bit number, usually written in dotted decimal notation For instance, is an IP address written in dotteddecimal form Each of the decimal numbers in an IP address is called an octet which is a byte. The range of decimal numbers in each octet is between 0 and ٤٦ 255, inclusive.
24 computer s network card has an IP address. If you put two Ethernet cards in a PC to forward IP packets through both cards, they both would need unique IP addresses. Similarly, routers, which typically have many network interfaces that forward IP packets, have an IP address for each interface. ٤٧ How IP Addresses Are Grouped Together For example, all IP addresses that begin with 8 are on the Token Ring on the left. Likewise, all IP addresses that begin with are on the right. Along the same lines, is the prefix on the serial link. By following this convention, the routers build a routing table with three entries, one for each prefix, or network number. ٤٨
25 So, the general ideas about how IP address groupings can be summarized are as follows: All IP addresses in the same group must not be separated by a router. IP addresses separated by a router must be in different groups. ٤٩ Classifying IP Addresses In IP addressing scheme, some arbitrary number of bits for it is assigned an for network ID, The remaining bits then be used for the host ID. suppose that half of the address (16 bits) would be used for the network, the remaining 16 bits used for the host ID. result of that scheme would be 65,536 networks, each of those networks could have 65,536 hosts. Suppose that a network of 1,000 computers joins the Internet and is assigned one of these hypothetical network IDs, that network then wast 64,000 IP addresses for hosts. ٥٠
26 Solution, is IP address classes The IP protocol defines five different address classes: A, B, C, D, and E. of the first three classes, A C, uses a different size for the network ID and host ID portion of the address. Class D is for a special type of address called a multicast address. Class E is an experimental address class that isn t used. ٥١ ٥٢
27 The first four bits of the IP address are used to determine into which class a particular address fits, as follows: If the first bit is zero, the address is a Class A address 0xxx If the first bit is one and if the second bit is zero, the address is a Class B address. 10xx If the first two bits are both one and if the third bit is zero, the address is a Class C address. 110x If the first three bits are all one and if the fourth bit is zero, the address is a Class D address 1100 If the first four bits are all one, the address is a Class E address ٥٣ ٥٤
28 Class A addresses Class A addresses are designed for very large networks, as only eight bits are allocated to the network, first of these bits is used to indicate that the address is a Class A, only 126 Class A networks can exist in the entire Internet. The last 3 octets are used for hosts, so each network can accommodate more than 16 million hosts. Only about 40 Class A addresses are actually assigned to companies or organizations, The rest are either reserved by ٥٥ Internet Assigned Numbers Authority (IANA) ٥٦
29 ٥٧ Class B addresses the first two octets of the IP address are used as the network ID, and the second two octets are used as the host ID. in order to indicate that the address is Class B the first two bits of the first octet are required to be 10, As a result, a total of 16,384 Class B networks can exist. Each Class B network can accommodate more than 65,000 hosts. ٥٨
30 The problem with Class B networks is that even though they are much smaller than Class A networks, they still allocate far too many host IDs. ٥٩ Note: Class A addresses end with126.x.y.z, and Class B addresses begin with 128.x.y.z. What happened to 127.x.y.z? This special range of addresses is reserved for loopback testing, so these addresses aren t assigned to public networks. ٦٠
31 Class C addresses the first three octets are used for the network ID, and the fourth octet is used for the host ID. with 24 network ID bits, Class C addresses allow for more than 2 million networks, each Class C network can accommodate only 254 hosts The problem with Class C networks is that they re too small. ٦١ Subnetting A subnet is a network that falls within a Class A, B, or C network. Subnets are created by using one or more of the Class A, B, or C host bits to extend the network ID. Thus, instead of the standard 8, 16, or 24 bit network ID, subnets can have network IDs of any length. Following Figure shows an example of a network before and after subnetting has been applied. In the unsubnetted network, the network has been assigned the Class B address All the devices on this network must share the same broadcast domain. ٦٢
32 ٦٣ In the second network, the first four bits of the host ID are used to divide the network into two small networks, identified as subnets 16 and 32. To the outside world (that is, on the other side of the router), these two networks still appear to be a single network identified as For example, the outside world considers the device at to belong to the network. As a result, a packet sent to this device will be delivered to the router at The router then considers the subnet portion of the host ID to decide whether to route the packet to subnet 1 or subnet 2. ٦٤
33 Subnet masks For subnetting to work, the router must be told which portion of the host ID should be used for the subnet network ID. That is accomplished by using another 32 bit number, known as a subnet mask. Those IP address bits that represent the network ID are represented by a 1 in the mask, and those bits that represent the host ID appear as a 0 in the mask. ٦٥ Subnet mask here ٦٦
34 Router PCs ٦٧ Example Router IP Subnet Mask Network IP ٦٨ PC1 IP Subnet Mask Network IP
35 Example Router IP Subnet Mask Network IP ٦٩ PC1 IP Subnet Mask Network IP PC2 IP Subnet Mask Network IP ٧٠
36 Example 01 Router IP Subnet Mask Network IP ٧١ PC1 in sub network 1 IP Subnet Mask Network IP Dr. Ahmed 192 ElShafee, ACU Fall , Network I 0 0 PC2 PC1 in sub network 2 IP Subnet Mask Network IP ٧٢
37 Router IP Subnet Mask Network IP PC1 IP Subnet Mask ٧٣ Network IP Dr. Ahmed 192 ElShafee, ACU Fall , Network I 16 0 PC2 IP Subnet Mask Network IP ٧٤
38 Subnetting Router IP Subnet Mask Network IP PC1 IP Subnet Mask ٧٥ Network IP Dr. Ahmed 192 ElShafee, ACU Fall , Network I 0 0 PC2 IP Subnet Mask Network IP ٧٦
39 Example 02 Router IP Subnet Mask Network IP ٧٧ PC1 on sub network 1 IP Subnet Mask Network IP Dr. Ahmed 192 ElShafee, ACU Fall , Network I PC2 on sub network 2 IP Subnet Mask Network IP ٧٨
40 Thanks,.. See you next week (ISA), ٧٩
Lecture (08) Fundamentals of WANs (II)
Agenda Lecture (08) Fundamentals of WANs (II) OSI Layer 2 of WANs ATM & SONET WAN Dr. Ahmed M. ElShafee ١ ٢ OSI Layer 2 of WANs OSI Layer 2 of WANs (2) WAN protocols used on point to point serial links
More informationLecture (03) Internet Protocol tcp/ip> OSI>
Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing
More informationLecture (02) The TCP/IP Networking Model
Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationLecture (06) Network Access layer LAN, & WAN. Agenda. By: Dr. Ahmed ElShafee. Ethernet Framing (2) Ethernet Framing What is MAN?
Lecture (06) Network Access layer fundamentals III LAN, & WAN Agenda Ethernet Framing What is WAN? What is MAN? By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II ٢ Dr. Ahmed ElShafee,
More informationLecture (03) (I) OSI Reference Model
Agenda Lecture (03) (I) OSI Reference Model Dr. Ahmed M. ElShafee History OSI Layers Layers function OSI & TCP/IP & NetWare Example protocols OSI Layering Concepts and Benefits OSI Terminologies ١ ٢ History
More informationLecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)
Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda Introduction to networking architecture Historical
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Networks II Agenda Introduction to networking architecture Historical
More informationLecture (05) Network Access layer fundamentals II LAN, & WAN
Lecture (05) Network Access layer fundamentals II LAN, & WAN Agenda Ethernet Addressing Ethernet Framing By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II ٢ Ethernet Addressing
More informationLecture (08) Internetwork Layer II
genda Lecture (08) Internetwork Layer II Network Layer (Layer 3) ddressing (continue) IP Routing and Routing Protocols y: Dr. hmed ElShafee ١ ٢ Private and public addresses ny host with a direct connection
More informationLecture (02) The TCP/IP Networking Model
Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationLecture (07) Fundamentals of WANs (I)
Lecture (07) Fundamentals of WANs (I) Dr. Ahmed M. ElShafee ١ Agenda What is WAN? What is MAN? OSI layer1 of WANs Circuit switching services Packet Switching Services ٢ What is WAN? LAN standards and protocols
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationLecture (04) Network Access layer fundamentals I
Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data
More informationLecture (04) Network Access layer fundamentals I
Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T
More informationIT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)
IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders
More informationLecture (03) Network Model
١ Lecture (03) Network Model By: Dr. Ahmed ElShafee Agenda Layering concept History Discovering the network layers Application Layer same layer interaction concept; Transport Layer Adjacent layer interaction
More informationIP Addressing - Subnetting
IP Addressing - Subnetting The Two Parts of an IP Address 32 Bits Prefix Host Prefix Length IP Address Classes Classes are now considered obsolete But you have to learn them because Everyone in the industry
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationLecture (04 & 05) Data link layer fundamental
Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationChapter 6 Addressing the Network- IPv4
Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by
More informationNetWare Link-Services Protocol
44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationOSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationOSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
More informationLecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..
Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,.. By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda TCP/IP suite Data Encapsulation OSI History
More informationOSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
More informationData Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I
Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide
More informationLecture (03) Data Encapsulation. Network Layer (Physical/Data link)
Lecture (03) Data Encapsulation and OSI model Network Layer (Physical/Data link) By: Dr. Ahmed ElShafee ١ Dr. Ahmed elshafee, ACU : Spring 2018, CSE401 Computer Networks Agenda TCP/IP suite Data Encapsulation
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationThis talk will cover the basics of IP addressing and subnetting. Topics covered will include:
This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?
More informationChapter 18 and 22. IPv4 Address. Data Communications and Networking
University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing
More informationImi :... Data:... Nazwisko:... Stron:...
Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols
More informationIP: Addressing, ARP, Routing
IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics
More informationFrame Relay. Frame Relay Information 1 of 18
Frame Relay Information 1 of 18 This document was retrieved from the Web and has been been edited by Thomas Jerry Scott for use in his TCP/IP network classes. Chapter Goals Describe the history of Frame
More informationICND1 Open-Ended Questions
A P P E N D I X J ICND1 Open-Ended Questions Earlier editions of this book included some open-ended questions at the conclusion of each chapter to help readers prepare for the exam. Open-ended questions
More informationINTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi
INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview
More information7010INT Data Communications Lecture 7 The Network Layer
Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationPart II. Chapter 6. Frame Relay
Part II Chapter 6 is one of the most popular methods used to connect WAN links because of its speed, reliability, and cost. is a packet-switched technology. Packet-switched networks allow end devices to
More informationCCNA 4 - Final Exam Answers
CCNA 4 - Final Exam Answers 1 Which of the following describes the roles of devices in a WAN? (Choose three.) *** A CSU/DSU terminates a digital local loop. A modem terminates a digital local loop. A CSU/DSU
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationPUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R
PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.
More informationCCNA 4 - Final Exam (A)
CCNA 4 - Final Exam (A) 1. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What
More informationUnit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask
1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationCCNA 4 - Final Exam (B)
CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationIntroducing Frame Relay
Frame Relay CCNA 4 Note Much of the information in this presentation comes from the CCNP 2 version 3.0 module on Frame Relay. I find a lot of the information in CCNA 4 module 5 Frame Relay not very well
More informationIP Address Assignment
IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationIP Routing & Bridging
CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If
More informationTCP/IP and the OSI Model
TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationPrivate and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee
Agenda Lecture (09) Internetwork Layer (3) Private and public addresses Network Address Translation Virtual Private Network (VPN) Virtual LANs By: Dr. Ahmed ElShafee ١ ٢ Private and public addresses Private
More informationUsing Serial Ports to Connect to ATM with DXI Encapsulation
Using Serial Ports to Connect to ATM with DXI Encapsulation Document ID: 10418 Contents Introduction Prerequisites Requirements Components Used Conventions Physical Setup ATM DXI Modes ATM DXI Headers
More informationWAN technology which are to be discussed:
WAN Technology Operates at 3 layer OSI model as below: 1. PHY 2. Data Link 3. Network Most of WAN technology are packetswitched network categorized as Switched Virtual circuit Network ( 3-phase, connection
More informationPART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)
PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationChapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office
ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationLecture (04) Network Layer (Physical/Data link) 2
Lecture (04) Network Layer (Physical/Data link) 2 By: Dr. Ahmed ElShafee ١ Dr. Ahmed elshafee, ACU : Spring 2018, CSE401 Computer Networks Agenda Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationHands-On Network Security: Practical Tools & Methods
Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationLecture 8 Network Layer: Logical addressing
Data Communications ACOE412 Lecture 8 Network Layer: Logical addressing Spring 2009 1 0. Overview In this lecture we will cover the following topics: 14.Network Layer: Logical addressing 14.1 IPv4 Addresses
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationThe Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.
The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,
More informationLecture (01) Determining IP Routes (1)
Lecture (01) Determining IP Routes (1) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Practical App. Networks II Overview Routing is the process of determining where to send data packets
More informationOverview. Cisco 805 Router Overview CHAPTER
CHAPTER 1 Overview This chapter provides an overview of the Cisco 805 router, sample networks in which the router is commonly used, and router configuration options. Cisco 805 Router Overview The Cisco
More informationCisco IP Addressing and Subnetting for New Users
Table of Contents IP Addressing and Subnetting for New Users...1 Introduction...1 Understanding IP Addresses...1 Understanding Subnetting...2 Let's See Some Examples...3 Example 1: Class B...3 Example
More informationThe Internet Protocol (IP)
The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More informationPPP. Point-to-Point Protocol
PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas
More informationInternetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms
Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing
More informationChapter 6. The Protocol TCP/IP. Introduction to Protocols
Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationEthereal Exercise 2 (Part A): Link Control Protocol
Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol
More informationExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you
ExamTorrent http://www.examtorrent.com Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you Exam : 100-105 Title : Cisco Interconnecting Cisco Networking Devices Part 1
More informationFIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats
Classful IP Addressing When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value.
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 200-105 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Vendor : Cisco Version : DEMO Get Latest
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols
Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds
More informationOnline Documentation: To access the online documentation for this and other Novell products, and to get updates, see
Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationmaterial. For more information on how to get additional questions, please see a.
Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You
More informationNetwork Devices,Frame Relay and X.25
Network Devices,Frame Relay and X.25 Hardware/Networking Devices: Networking hardware may also be known as network equipment computer networking devices. Network Interface Card (NIC): NIC provides a physical
More informationImplementing Enterprise WAN Links
Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise Chapter 7 Version 4.0 1 Objectives Describe the features and benefits of common WAN connectivity options. Compare and
More informationComputer Networks Question Bank
Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual
More informationIP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324
IP Addressing Week 6 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Addressing: Network & Host Network address help to identify route through the network cloud Network address
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More information