Understanding the Network: A practical Guide to Internetworking Michael J. Martin

Similar documents
ECE4110 Internetwork Programming. Introduction and Overview

User Datagram Protocol

EE 610 Part 2: Encapsulation and network utilities

ELC 537 Communication Networks

Packet Header Formats

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Networking Technologies and Applications

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Network and Security: Introduction

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

Introduction to TCP/IP networking

TCP /IP Fundamentals Mr. Cantu

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

UNIT V. Computer Networks [10MCA32] 1

CHAPTER-2 IP CONCEPTS

Introduction to Internetworking

Information Network 1 TCP 1/2

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Transport Protocols. Raj Jain. Washington University in St. Louis

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Lecture 3: The Transport Layer: UDP and TCP

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CSCI-GA Operating Systems. Networking. Hubertus Franke

Chapter 09 Network Protocols

1: Review Of Semester Provide an overview of encapsulation.

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

The Internet Protocol (IP)

ECE 650 Systems Programming & Engineering. Spring 2018

Vorlesung Kommunikationsnetze

The Transport Layer. Part 1

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Networking interview questions

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Data & Computer Communication

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

User Datagram Protocol (UDP):

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

EEC-682/782 Computer Networks I

Review of Important Networking Concepts

Sequence Number. Acknowledgment Number. Checksum. Urgent Pointer plus Sequence Number indicates end of some URGENT data in the packet

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

OSI Transport Layer. objectives

Lab - Using Wireshark to Examine TCP and UDP Captures

I TCP 1/2. Internet TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) TCP Connection-oriented

Introduction to Networks and the Internet

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

TSIN02 - Internetworking

Study Guide. Module Two

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Protocol Suite

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Need For Protocol Architecture

Need For Protocol Architecture

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST

7. TCP 최양희서울대학교컴퓨터공학부

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Lecture 11: IP routing, IP protocols

Special expressions, phrases, abbreviations and terms of Computer Networks

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

CS457 Transport Protocols. CS 457 Fall 2014

Networks Fall This exam consists of 10 problems on the following 13 pages.

Multiple unconnected networks

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Internetwork Protocols

Computer Networks. Transmission Control Protocol. Jianping Pan Spring /3/17 CSC361 1

ECE 158A: Lecture 7. Fall 2015

EEC-484/584 Computer Networks

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Sequence Number. Acknowledgment Number. Data

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

4. The transport layer

TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.

Cisco Cisco Certified Network Associate (CCNA)

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

05 Transmission Control Protocol (TCP)

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1

Transport Protocols & TCP TCP

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

Sirindhorn International Institute of Technology Thammasat University

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Transcription:

Understanding the Network: A practical Guide to Internetworking 0735709777 Michael J. Martin Copyright 2001 by New Riders Publishing Warning and Disclaimer: Every effort has been made to make this book as complete and accurate as possible, but no warranty or fitness is implied. The information is provided on an as-is basis. The authors and New Riders Publishing shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. Misprint Page 1 What were once spreadsheet stations and personal printing presses have now become powerful communication tools that utilize text, graphics, video, and sound-to-relay information. Page 5 Interface issues are minimized by using high quality shielded and unshielded cable casings. Although the shielding minimizes the effects of outside noise, it also reduces the signal strength of the twisted pairs, which use their crosstalk to help amplify the carrier signal. For this reason, not all signaling methods can operate on shielded twisted pair. Page 6 cycle the shift in the electromagnetic wave from it's peak positive amplitude to its peak negative amplitude. The completion of a single cycle is known as a period. Page 11 The transport protocol, known as Ethernet, uses a 48-bit address called the Media Access Control (MAC) address for this purpose. Page 13 This period lasts as long as it takes to reach the ends of the network. Page 15 IEEE 802.x Ethernet and Apple s LocalTalk are CSMA/CD-based transmission protocols. Correction What were once spreadsheet stations and personal printing presses have now become powerful communication tools that utilize text, graphics, and sound-to-relay information. Using high quality shielded and unshielded cable casings minimizes electrical interference issues. In most environments unshielded cable is more than adequate for most data transmission. However, in environments where high levels of electrical noise and interference exist, in places such as manufacturing facilities, the use of shielded cable is highly recommended. Keep in mind though that not all data transmission protocols can operate over shielded or unshielded cable. So always refer to the transmission protocol specification for the proper cable type prior to installing your data cable infrastructure. A wave that shifts from its peak positive to its peak negative amplitude has only gone through a _ cycle; a cycle is completed when the wave returns to its initial value. For example, the OSI-RM data-link protocol, Ethernet, uses a 48-bit address known as the Media Access Control (MAC) address for this purpose. This period lasts as long as it takes to reach the ends of the segment. IEEE 802.x Ethernet is a CSMA/CD-based transmission protocol.

Page 19 R R roadcast Page 20 node f node g node h node i node j node a node b node c node d node e node e R node d node c ridge Port ridge Port A node b node a Page 44 If the first bit is 0, it is a Class A network, which can support up to 16 million hosts. Page 49 Decimal Mask in its 255.220.0.0 Page 55 Table 2.9 Class A Entry Number of Hosts per Net: 16,000,000 Page 56 Class C: 192.160.0.0 to 192.168.255.0 255.255.255.0 or /24 Page 76 If the first bit is 0, it is a Class A network, which can support over 16 million hosts. Decimal Mask in its 255.240.0.0 Number of Hosts per Net: 16,777,214 Class C: 192.168.0.0 to 192.168.255.0 255.255.255.0 or /24 (missing address space) Dynamic Assignment: 169.254.0.0 to 169.254.255.0 255.255.255.0 or /24 (missing text) The dynamic assignment address space is allocated for dynamic IP addressing systems, such as DHCP. It is not typically used for addressing private IP networks. 0 16 32 Source Port Destination Port Sequence Number Data Offset Reserved Checksum Acknowledgment Number Control Flags Window Urgent Pointer Options Padding Page 76 The TCP header is 40 bytes in size, which is rather Data The TCP header is quite large for a network packet header. The TCP header is constructed using 4 or 5,

large for a network packet header. Page 76 Source Port This is the TCP port the process is coming from. Destination Port This is the TCP port the process is sending data to. Sequence Number This is the sequence number for data contained in the packet. Acknowledgment Number This field contains the sequence number the sender expects to receive from the destination. Data Offset This field indicates how large the TCP header is. Control flags indicate the status of the TCP connection: SYN sets up TCP connections. ACK indicates if the information in the Acknowledgement filed is relevant. RST resets TCP connections. PSH tells the destination that the DATA should be delivered to the ULP upon delivery. FIN ends the TCP connections. Window This field is used to provide flow control information. The value is the amount of data the sender can accept. 4-octet (32-bit) segments, containing 10 fixed length and 1 variable length fields. The fixed length segments are 160 bits in length for an average header size of 20 octets (20 ytes). The variable length field, when utilized, extends the header to 192 bits (24 octets) in length. When combined with the IP header, the over 40 bytes of delivery and control information are sent along with ever TCP packet transmitted. Source Port (16-bits) This is the TCP port the process is coming from. Destination Port (16-bits) This is the TCP port the process is sending data to. Sequence Number (32-bits) This is the sequence number for the outbound segment data contained in the packet. Acknowledgment Number (32-bits) This is the sequence number of the next segment of data the sender expects to receive from the destination. Data Offset (4-bits) This field indicates how large the TCP header is, expressed in 32-bit segments. Reserved (6-bits) This field is unused; it is reserved for future modifications to the protocol. Control flags (6-bits) indicate the status and contents of the data: URG indicates that the data continued in the packet is urgent. SYN indicates the initiation of a TCP session. ACK indicates the acknowledgement filed is relevant. RST resets the TCP session. PSH indicates that the data should be delivered to the ULP upon receipt. FIN indicates the sender byte stream has been completed. Window (16-bits) This field indicates how much buffer space is available for inbound data delivery. Checksum (16-bits) The checksum is used to validate the integrity of the data. The checksum is calculated by appending a 12-byte pseudo header containing the key data elements needed to deliver the data to the data segment and generated a 16-bit checksum. Upon arrival, the receiver performs the same calculation and compares the results. If they match, the data is assumed to be valid. Urgent Pointer (16-bits) This field is used to indicate that the packet s data is of a control nature that may affect the operation of the application. Options (variable length) This optional

field is used to send miscellaneous packet handling or connection information. Its most common use is to specify the Maximum Segment Size (MSS) the TCP application will accept. The MSS is typically grounded to the Maximum Transmission Unit (MTU) of the data-link protocol. The idea here is to ensure that the communicating hosts transmit data segments of a size they can handle efficiently. Hosts that do not communicate over a common data-link path can discover the smallest MTU in the transmission path through IP MUT discovery or use the minimum MTU 576-bytes, which results in a MSS of 536-bytes. Padding (variable length) Not including the options field, the TCP header is 160-its in length. For efficiency, the header is constructed of 32-bit segments. When no options are used the header falls on a 32-bit boundary. To accommodate for the variable size of the options field, padding bits are sometimes added to round-out the TCP header. Page 77 0 16 32 Source Port Destination Port Checksum Packet Size Data Page 82 (missing RFCs) RFC 813 Window and Acknowledgement Strategy in TCP RFC 896 Congestion Control IP/TCP Internetworks Page 137 Ethernet s media access mechanism Carrier Sense Multiple Access (CSMA/CD), was based on work done by Dr. Norman Abramson at the University of Hawaii on the radio transmission WAN known as the ALOHA system. RFC 1063 IP MTU Discovery Options Ethernet s media access mechanism Carrier Sense Multiple Access Detection (CSMA/CD), was based on work done by Dr. Norman Abramson at the University of Hawaii on the radio transmission WAN known as the ALOHA system.

Page 184 FDDI / SAS FDDI / SAS FDDI Concentrator Page 191 PSTN was originally developed from every other, but that the continuity of each separate transmission be distinguishable from every other, but the continuity of each separate transmission be maintained. Page 236 FDDI / SAS PSTN was originally developed from every other, but that the continuity of each separate transmission be indistinguishable from every other, but the continuity of each separate transmission be maintained. Management Plane ATM Adaption Layer ATM Adaption Layer ATM Layer Physical Layer Page 262 (Note to follow section Spanning Tree Algorithm ) The 802.1d specification defines a five-state machine for port operation. Under normal operation ports on the bridge will be in Forwarding or locking mode. 1. Forwarding, port is active, learning MAC addresses and forwarding frames. This is the normal operational mode for an active bridge or switch port. 2. Listening, port is active, sending and receiving PDUs in order to learn the topology of the network. The absence of PDU or changes in the segment topology will cause the bridge to shift from a Forwarding/locking state to a Listening state while the bridge topology reconverges. 3. Learning, port is active, in the process of moving to a forwarding state. The learning state is a 15-second transitional period from listening to forwarding. During this state the bridge port is collecting MAC information on its adjacent

Page 351 An! indicates that a 64-bit UDP packet has been successfully transferred, and 0 indicates a missed packet. Page 362 OS Daemon Logfile Root Location Linux /usr/sbin/syslogd-n /var/log Page 368 CiscoSecure 1.0 (TACACS+) Page 385 ut what if the link between F and A is a 10Mbps link and the link between A and C is an OC3 (155Mbps)? Page 413 Although it is not generally a good idea to start adjusting cost metrics, there might be a need because OSPF s cost metric is only valid up to 1Gbps. Page 537 missing line Page 538 missing Note preceding the section Inter- Autonomous GP Page 547 missing bulleted text to follow <show ip bgp neighbors.> devices and entering them in the bridge s SAT. 4. locking, port is listening for PDUs but not learning addresses or forwarding frames. This is the normal operational mode for a stand-by bridge link in a redundant path bridge topology. 5. Disabled/Down, port either down or STP has been disabled. An! indicates that a 64-yte UDP packet has been successfully transferred, and 0 indicates a missed packet. OS Daemon Logfile Root Location Linux /usr/sbin/syslogd-r /var/log CiscoSecure 1.0 (TACACS) ut what if the link between F and A is a 10Mbps link and the link between A and C is an OC3? Although it is not generally a good idea to start adjusting cost metrics, there might be a need because OSPF s cost metric is only valid up to 100Gbps. <show ip bgp neighbor> <show ip bgp neighbor [ip address] ad> <show ip bgp peer-group> As a network reachability protocol, a GP peer will only announce networks that are contained in its routing table. The route table entries are generally constructed by a dynamic routing protocol, howe3ver static route entries may also be used. In fact, in large internetworks it s common to announce GP routing information from a standalone Computer or Router running GP using static generated routing table. To announce static routes via GP on a Cisco router, the static entries must either point to a reachable adjacent IP gateway, Physical or <null> router interface. <show ip bgp neighbor [ip address] ad> This command lists all of the networks being announced to a GP peer. This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.