1234 Merged
1234 Merged
COURSE
BASIC COMPUTER NETWORK
Provide connectivity and ensure that data flows across the network
55/104
/50 6
7 88/104
/50
1. Network Components 1. Network Components
Network Media Network Media
provides the channel over which the message travels from source provides the channel over which the message travels from source
to destination. to destination.
Media Types Description
Metal wires within Uses electrical
cables impulses
Glass or plastic Uses pulses of
fibers within cables light.
(fiber-optic cable)
Wireless Uses modulation
transmission of specific
frequencies of
electromagnetic
waves.
99/104
/50 10
10/104
/50
1. Network Components
Network Interface Card (NIC)
A NIC physically connects the end device to the network.
Physical Port
A connector or outlet on a networking device where
the media connects to an end device or another networking device.
2 Topology
Interface
Specialized ports on a networking device that connect to individual
networks. Because routers connect networks, the ports on a router
are referred to as network interfaces.
11
11/104
/50 12
2. Topology (network analysis) 2. Topology (network design)
Network graph is acyclic, or is a tree Physical Topology Diagrams: physical location of intermediary
devices and cable installation.
cable installation Room
Rack
Shelf
Network presentation
15
15/104
/50 16
3. Common Types of Networks 3. Common Types of Networks
Small home networks: connect a few computers to each other and The Small Office/Home Office (SOHO) network: enables
the Internet. computers within a home office or a remote office to connect to a
corporate network or access to centralized, shared resources.
17
17/104
/50 18
18/104
/50
19
19/104
/50 20
20/104
/50
3. Common Types of Networks 3. Common Types of Networks
LANs and WANs LANs and WANs
Two most common types of networks: A LAN is a network A WAN is a network
o Local Area Network (LAN) and Wide Area Network (WAN) infrastructure that spans a infrastructure that spans a wide
small geographical area. geographical area.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between
21 devices. LANs. 22
23
23/104
/50 24
3. Common Types of Networks
Intranet and Extranet
Intranet: a private connection of LANs and WANs that belongs to
an organization.
25
25/104
/50 26
4. Protocol 4. Protocol
People communicate in many different ways. Devices communicate in exactly the same way.
Vocal a look a hand signal body language
Translate
29
29/104
/50 30
30/104
/50
4. Protocol 4. Protocol
Protocols: Message Encoding
are the rules that communications will follow. Encoding is the process of converting information into another,
These rules will vary depending on the protocol. acceptable form, for transmission.
Decoding reverses this process.
Destination
Decoded
31
31/104
/50 32
32/104
/50
4. Protocol 4. Protocol
Message Formatting and Encapsulation Message Formatting and Encapsulation
Source Destination
Encoded Decoded
33
33/104
/50 34
34/104
/50
4. Protocol 4. Protocol
Message Size Message Size
? ?
? ?
?
?
35
35/104
/50 36
36/104
/50
4. Protocol 4. Protocol
Message Size Message Size The source host breaks a long message
into individual pieces that meet both the
minimum and maximum size
requirements.
This is known as SEGMENTING.
4. Protocol 4. Protocol
Message Timing Message Delivery Options
People use timing to determine: Unicast
o When to speak.
o How fast or slow to talk.
o How long to wait for a response.
41
41/104
/50 42
42/104
/50
4. Protocol 4. Protocol
Network protocols: define a common set of rules. Network protocols:
Can be implemented on devices in: Devices use agreed-upon
o Software Protocol Description protocols to communicate.
o Hardware Type Protocols may have may
o Both Network enable two or more devices to have one or functions.
Communi communicate over one or more
cations networks
Protocols have their own: Network secure data to provide Function Description
o Function Security authentication, data integrity, and
Addressing Identifies sender and receiver
o Format data encryption
Reliability Provides guaranteed delivery
o Rules Routing enable routers to exchange route
information, compare path Flow Control Ensures data flows at an efficient rate
information, and select best path Sequencing Uniquely labels each transmitted segment of data
Service used for the automatic detection of Error Detection Determines if data became corrupted during transmission
Discovery devices or services Application Interface Process-to-process communications between network applications
43
43/104
/50 44
44/104
/50
4. Protocol
Network protocols:
Networks require the use of several
protocols.
Each protocol has its own function
and format.
5. Layers 5. Layers
Application: software you use. Application:
Application layer
LANs (Local Area Networks): LANs (Local
networks that provide Area Networks):
Transport layer
the connection between machines
within a home, school or
corporation. IP layer
TCP (Transport Control Protocol): deals with transport and TCP (Transport Control
connections and actually sending user data. Protocol):
47
47/104
/50 48
48/104
/50
5. Layers 5. Layers
A layer: corresponds to the idea of a programming interface (or These are the benefits of using a layered model:
library), with the understanding that a given layer communicates
directly only with the two layers immediately above and below it.
Assist in protocol design because protocols that operate at a
specific layer have defined information that they act upon and a
Application NO interact defined interface to the layers above and below.
library directly with the
IP and LAN Foster competition because products from different vendors can
Hands off a layers .
chunk of data
TCP work together.
library
Prevent technology or capability changes in one layer from
Makes calls IP library affecting other layers above and below
49
49/104
/50 50
50/104
/50
6. Packet
Packets: modest-sized buffers of data, transmitted as a unit through
some shared set of links.
6 Packet
51 52
52/104
/50
6. Packet 6. Packet
? byte
100 Kg
500 Kg
3 Ton
53
53/104
/50 54
54/104
/50
6. Packet
The maximum packet size.
Ethernet packets: 1500 bytes of data.
TCP/IP packets: (originally) 512 bytes of data,
Token Ring packets: up to 4 kB of data.
ATM (Asynchronous Transfer Mode) packets 48 bytes of data.
7 Congestion
55
55/104
/50 56
7. Congestion 7. Congestion
Packets arriving faster than they can be sent out. On the Internet, most packet losses are due to congestion.
Inbound interface has a higher bandwidth than the outbound This is not because congestion is especially bad (though it can be, at
interface. times), but rather that other types of losses (e.g., due to packet
corruption) are insignificant by comparison.
Queue
(buffer)
Dropped Full
Inbound outbound
interface interface
57
57/104
/50 58
58/104
/50
59 60
60/104
/50
8. Data Rate, Throughput, Bandwidth, and Delay 8. Data Rate, Throughput, Bandwidth, and Delay
> >
Packets are the key to supporting shared transmission lines; that is,
Bandwidth Throughput Goodput they support the multiplexing of multiple communications channels
over a single cable.
Theoretical Transmission overhead Application
e.g., header data only
Bit by bit
without Protocol inefficiencies
delay e.g., synchronous,
retransmission
Competing traffic
e.g., network collision
61
61/104
/50 62
62/104
/50
8. Data Rate, Throughput, Bandwidth, and Delay 8. Data Rate, Throughput, Bandwidth, and Delay
When a router or switch receives a packet, it decides to what next node Forwarding delay equal to the time needed to read the entire/a part
to forward it. of packet.
63
63/104
/50 64
64/104
/50
8. Data Rate, Throughput, Bandwidth, and Delay
Store-and-forward delay: equal to the sum of the bandwidth delays
out of each router along the path.
65
65/104
/50 66
67
67/104
/50 68
68/104
/50
9. LANs and Ethernet 9. LANs and Ethernet
Almost Ethernets today are fully switched. Ethernet address:
No collision. physical address or hardware address or MAC (Media
Each packet is delivered only to the host to which it is addressed. Access Control) address.
Prevents host-based eavesdropping. o Burned into the ROM.
o Six bytes long
However: Queuing issue. The first three bytes of the physical address have been
o So seldom fill up that assigned to the manufacturer.
they are almost invisible. The subsequent three bytes are a serial number assigned
by that manufacturer.
71 72
72/104
/50
10. Datagram Forwarding
<destination,next_hop> pairs
Destination
S1
Interface ID Destination
S2
Interface ID
11 IP - Internet Protocol
A A
B B
C C
D D
E E
o The network portion of the address is the same for all hosts on
the same network.
Means care Host number. Network address Int Network address Int
E.g., 192.168.10.0/24
Net4 Net5
R3 R4 R5
Network address Int Network address Int Network address Int
79
79/104
/50 80
12. Routing Loops
Loop vs. Loop-free network.
REDUNDANCY
12 Routing Loops
81 82
82/104
/50
83
83/104
/50 84
84/104
/50
12. Routing Loops
Some solutions (mechanism or algorithm):
IP:
o Using to (TTL) field in the IP header.
Set by the sender (e.g., 64 internal, 128 external).
Decremented by 1 at each router.
A packet is discarded if its TTL reaches 0.
13 Transport
Infinite (endlessly) loop finite loop
85
85/104
/50 86
IP only supports sending to a specific host. TCP holds early-arriving out-of-order packets for delivery at
o No method to access multiple applications in one host (e.g., Email the correct time.
and web).
Every arriving data packet is acknowledged by the receiver.
Timeout and retransmission occurs when an
acknowledgment packet received by the sender
within a given time.
87
87/104
/50 88
88/104
/50
13. Transport 13. Transport
Solution: Transport layer Solution: Transport layer
E.g., Transmission Control Protocol (TCP) E.g., Transmission Control Protocol (TCP)
o Connection-orientation: o Stream-orientation: An application using TCP can write 1 byte
Once a TCP connection is made, an application sends data at a time, or 100 kB at a time; TCP will buffer and/or divide up
simply by writing to that connection. the data into appropriately sized packets. (Segmentation)
No further application-level addressing is needed. Segmenting messages has two primary benefits:
Increases speed - Large amounts of data can be sent
TCP connections are managed by the operating-system kernel, over the network without tying up a communications link.
not by the application. Increases efficiency - Only segments which fail to reach
the destination need to be retransmitted, not the entire
data stream.
89
89/104
/50 90
90/104
/50
91
91/104
/50 92
92/104
/50
13. Transport 13. Transport
Socket addresses: User Datagram Protocol (UDP):
TCP endpoints are of the form <host,port> Like TCP, provides port numbers to support delivery to multiple
o Servers for connections to sockets they have opened. endpoints within the receiving host, in effect to a specific process on
o Client a connection to a server. the host.
Also use socket addresses.
NO:
o Connection setup,
o Lost-packet detection,
o Automatic timeout/retransmission
o Segmentation/Reassemble (application must manage its own
packetization)
o Ordered Delivery.
o BUT data transmission can get started faster.
93
93/104
/50 94
94/104
/50
95 96
96/104
/50
14. Network Protocol Suites 14. Network Protocol Suites
Open Systems Interconnection (OSI) protocols - This is a family
of protocols developed jointly in 1977 by the International Organization
for Standardization (ISO) and the International Telecommunications
Union (ITU).
The OSI protocol included a seven-layer model called the OSI
reference model.
o The OSI reference model categorizes the functions of its protocols.
97
97/104
/50 98
98/104
/50
99
99/104
/50 100
100/104
/50
14. Network Protocol Suites 14. Network Protocol Suites
101
101/104
/50 102
102/104
/50
COURSE
BASIC COMPUTER NETWORK
3/66
/50 4/66
/50
1. 10- Classic Ethernet 1. 10- Classic Ethernet
There were three physical formats for 10 Mbps Ethernet cable. Repeaters
thick-coax cabling, connections were made via taps, often literally Signal amplifier (might attempt to clean up a noisy signal).
drilled into the coax central conductor. Process each bit individually and did no buffering.
Thin coax allowed the use of T-connectors to attach hosts.
Twisted-pair does not allow mid-cable attachment; it is only used
for point-to-point links.
Hub
A repeater with more than two ports.
Star topologies in which each host
connects directly to the hub rather than to
one long run of coax.
Twisted-pair cable.
Tap, T-connector, and RJ-45
5/66
/50 6/66
/50
7/66
/50 8/66
/50
1. 10- Classic Ethernet 1. 10- Classic Ethernet
CSMA/CD (Carrier Sense, Multiple Access, Collision Detect) CSMA/CD (Carrier Sense, Multiple Access, Collision Detect)
To transmit, each host will listen on the media. To transmit, each host will listen on the media.
o If a signal from another device is present, it will wait for a o If a signal from another device is present, it will wait for a
specific amount of time (e.g., 9.6 for 10-Mbps Ethernet) and specific amount of time (e.g., 9.6 for 10-Mbps Ethernet) and
listen again. listen again.
o If no signal is present, it will transmit. o If no signal is present, it will transmit.
9/66
/50 10/66
/50
11/66
/50 12/66
/50
1. 10- Classic Ethernet 1. 10- Classic Ethernet
CSMA/CD (Carrier Sense, Multiple Access, Collision Detect) CSMA/CD (Carrier Sense, Multiple Access, Collision Detect)
It can happen that two devices will determine that it is safe to Both devices detect the collision and send out a jamming signal.
transmit at exactly the same time. o The jamming signal is detected by all devices and all devices now
o In that case, both will transmit their frame. know that a collision has occurred on the network.
13/66
/50 14/66
/50
17/66
/50 18/66
/50
If a collision does occur, send the jam signal, choose a backoff time o If there are 1024 hosts simultaneously trying to send.
as follows: Once the backoff range has reached <1024 ( =10),
o For transmission ( represents the original attempt): It is a good chance that one station will succeed in seizing the
If , choose randomly with . channel,
If , choose randomly with . That is; the minimum value of all the random chosen
will be unique.
o Wait slot times ( µsec).
o If reach (16 transmission attempts), give up.
19/66
/50 20/66
/50
1. 10- Classic Ethernet 1. 10- Classic Ethernet
? A2 will occupy the
Exponential Backoff Algorithm entire bandwidth There are two styles of Ethernet framing:
IEEE 802.3 Ethernet standard which has been updated several
times to include new technologies
Ethernet II is the
Ethernet frame
format used in TCP/IP
networks.
21/66
/50 22/66
/50
23/66
/50 24/66
/50
1. 10- Classic Ethernet 1. 10- Classic Ethernet
Broadcast address. (FF-FF-FF-FF-FF-FF) Ethernet Multicast
If a switch receives a broadcast packet on one port, it forwards the Transmit to a set of stations; streaming video to multiple
packet out every other port. simultaneous viewers.
25/66
/50 26/66
/50
27/66
/50 28/66
/50
1. 10- Classic Ethernet 1. 10- Classic Ethernet
29/66
/50 30/66
/50
MAC
o Data encapsulation
o Media access control
o Implemented by hardware, typically in the computer NIC.
31/66
/50 32/66
/50
2. 100 Mbps (Fast) Ethernet
100 Mbps Ethernet is officially known as 100BASE-TX.
Operates over twisted-pair cable.
2 100 Mbps (Fast) Ethernet o Instead of increasing the minimum packet size, the decision was
made to ensure collision detectability by reducing the network
diameter (in meters).
33 34/66
/50
3
Gigabit Ethernet moved to a 4096-bit (512-byte, or 4.096 µsec)
Gigabit Ethernet slot time for the twisted-pair versions.
o Increase the minimum frame size to 512 bytes.
o Short frames need to be padded, but this padding is done by the
hardware.
37 38/66
/50
4 Ethernet Switches
Cisco Catalyst 9600 Series Switches Cisco Nexus 9000 Series Switches
(LAN core and distribution) (Data center)
41 42/66
/50
43/66
/50 44/66
/50
4. Ethernet Switches 4. Ethernet Switches
45/66
/50 46/66
/50
47/66
/50 48/66
/50
4. Ethernet Switches
5 Switch Hardware
49/66
/50 50
51/66
/50 52/66
/50
5. Switch Hardware 5. Switch Hardware
53/66
/50 54/66
/50
55/66
/50 56/66
/50
5. Switch Hardware
6 Hierarchical Networks
57/66
/50 58
Hierarchy in the Borderless Switched Network Hierarchy in the Borderless Switched Network
Creating a borderless switched network requires network design are
used to ensure maximum availability, flexibility, security, and Three-Tier Model Two-Tier Model
manageability.
Access, Distribution, and Core Layer Functions Access, Distribution, and Core Layer Functions
Access layer
Distribution layer
o The access layer represents
o Aggregating large-scale wiring
the network edge, where
closet networks.
traffic enters or exits the
campus network o Aggregating Layer 2 broadcast
domains and Layer 3 routing
o The primary function of an boundaries.
access layer switch is to o Providing intelligent switching,
provide network access to routing, and network access
the user. policy functions to access the
rest of the network.
61/66
/50 62/66
/50
Access, Distribution, and Core Layer Functions Access, Distribution, and Core Layer Functions
Core layer
Distribution layer
o o High speed backbone of
the network.
o Providing high availability o Interconnect between
through redundant distribution distribution layer devices
layer switches and equal cost o Must be capable of
paths to the core quickly forwarding large
o Providing differentiated services amounts of data.
to various classes of service
applications at the edge of o Must be highly available
network and redundant.
63/66
/50 64/66
/50
6. Hierarchical Networks
THANK YOU FOR YOUR ATTENTION
Three-Tier and Two-Tier Examples
COURSE
BASIC COMPUTER NETWORK
3/23
/50 4/23
/50
1. Packet Delay 1. Packet Delay
Assume:
Store-and-forward delay Delay examples. Queuing delay = 0
The time spent reading in the entire packet before any of it can be Case 1: A------------------B Store-and-forward delay = 0
retransmitted. o Propagation delay is 40 µsec
o Bandwidth is 1 byte/µsec (1 MB/sec, 8 Mbit/sec)
o Packet size is 200 bytes (200 µsec bandwidth delay)
One-way transmit time = µsec
Queuing delay A B
5/23
/50 6/23
/50
7/23
/50 8/23
/50
1. Packet Delay 1. Packet Delay
Round-trip time (RTT) Bandwidth x Delay
At most non-LAN scales, the delay is typically simplified to the RTT. Represents how much we can send before we hear anything back.
o The time between sending a packet and receiving a response. (Delay: usually involving RTT)
o Mobile nodes are involved, then the distance and thus the
propagation delay can change. to be the time it takes to transmit a packet from A to B,
and receive an acknowledgment back, with no queuing delay.
We will usually assume that is fixed and well-defined
11/23
/50 12/23
/50
2. Packet Size
How big should packets be?
Should they be large ( 64 kB)
or small ( 48 bytes)?
2 Packet Size Large packets would not allow other senders timely access to
transmit.
Large packets waste a smaller percentage of bandwidth on headers.
In store-and-forward switches, smaller packets have much better
throughput.
13 14/23
/50
To be fair, very large packets can be sent reliably on most cable links
(e.g., TDM and SONET). Limited to the maximum Ethernet packet size.
Wireless, however, is more of a problem. o IPv4: 1500 bytes
o IPv6: 2000 bytes
15/23
/50 16/23
/50
3. Error Detection
Packet error detection is to add some extra bits (or called error-
detection code)
Allow the receiver to determine if the packet has been corrupted in
transit.
A corrupted packet will then be discarded by the receiver.
3 Error Detection
Reasons:
Low-frequency bit errors due to things like
cosmic rays.
Interference errors, typically generated by
nearby electrical equipment.
17 18/23
/50
o Receive: 10110
A weakness of any error-detecting code based on sums is that
Check: 1^0^1^1^0 = 1 0 transposing words leads to the same sum, and the error is not
Data is corrupted. detected.
o In particular, if a message is fragmented and the fragments are
reassembled in the wrong order, the ones-complement sum will
likely not detect it.
19/23
/50 20/23
/50
3. Error Detection 3. Error Detection
Cyclical Redundancy Check (CRC) Error-Correcting Codes (also called forward error correction)
Ethernet frame. That allows the receiver in many cases to figure out which bits are
corrupted, and fix them.
21/23
/50 22/23
/50
COURSE
BASIC COMPUTER NETWORK
3/66
/50 4/66
/50
1. The IPv4 Header 1. The IPv4 Header
Time-to-Live (TTL): Contains an 8-bit binary Internet Header Length (IHL) - Contains a
value that is used to limit the lifetime of a packet 4-bit binary value identifying the number of 32-bit
(referred to as hop count). words in the header. The IHL value varies due to the Options and
Decreased by one each time the packet is processed by a router, or Padding fields.
hop. If the TTL field decrements to 0, the router discards the packet
and sends an Internet Control Message Protocol (ICMP) Time Minimum: 5 Maximum: 15
Exceeded message to the source IP address.
Protocol: This 8-bit binary value indicates the data payload type Total Length (Packet Length), this 16-bit field defines the entire
(upper-layer). packet (fragment) size, including header and data, in bytes.
ICMP (0x01), TCP (0x06), and UDP (0x11) . Minimum: 20 -> Maximum: 65,535 bytes.
Flags - This 3-bit field identifies how the packet is fragmented. It is 2 Fragmentation
used with the Fragment Offset and Identification fields to help
reconstruct the fragment into the original packet.
DF: D Fragments flag, MF: More Fragments flag
R1 R2 FragOffset R3 B FragOffset
1st Fragment 1st Fragment
2nd Fragment 2nd Fragment
3rd Fragment 3rd Fragment
4th Fragment 4th Fragment
9/66
5th Fragment 5th Fragment 10
/50
2. Fragmentation 2. Fragmentation
Flag (3 bits) Reassembly timer
More Fragment
If a fragment arrives, a buffer is allocated.
reserved
(DF) (MF) o Because of the field, the fragment can then be
stored in the buffer in the appropriate position.
Reassembly timer is started.
Must be 0 Must not fragment Set to 1 for all fragments except the final one.
the packet and
must drop it
Tells the receiver where the fragments stop When all fragments have arrived, the packet is sent on up as a
instead. completed IPv4 packet.
11/66
/50 12/66
/50
3. Interfaces
IP addresses are assigned not to hosts or nodes, but to interfaces.
E.g., LAN interface in PC.
3 Interfaces
13 14/66
/50
3. Interfaces 3. Interfaces
Loopback interface Multihomed hosts
Providing a way to deliver IP packets to other processes on the same A non-router host with multiple non-loopback network interfaces is
machine. often said to be multihomed.
o IPv4 loopback address: 127.0.0.1 o Interfaces are been used simultaneously, with different IP
o IPv6 loopback address: ::1 addresses assigned to each.
Client/server testing.
Check the processes in current host. o E.g., Laptops have both an Ethernet interface and a Wi-Fi
interface.
Virtual interface
VPN connections.
Virtual machine
15/66
/50 16/66
/50
4. Special Addresses
Private addresses
IPv4 addresses intended only for site internal use.
If a packet shows up at any non-private router (e.g., at an ISP
router), with a private IPv4 address as either source or destination
address, the packet should be dropped.
4 Special Addresses
23 24/66
/50
5. The Classless IP Delivery Algorithm 5. The Classless IP Delivery Algorithm
Classful (discontinuation) Classless
Fixed the network portion and host portion Dynamic network portion and host portion
o Have to use Subnet Mask
25/66
/50 26/66
/50
Hierarchical routing:
6 IPv4 Subnets first we route to the
primary network, then
inside that site we
route to the subnet,
and finally the last hop
delivers to the host.
29 30/66
/50
Network: 192.168.1.0/25
Mask: 255.255.255.128
Network: 192.168.1.128/25
Mask: 255.255.255.128
31/66
/50 32/66
/50
6. IPv4 Subnets 6. IPv4 Subnets
33/66
/50 34/66
/50
6. IPv4 Subnets
Need 4 Subnets?
Borrowing 2 bits to create 4 subnets. 22 = 4 subnets
35/66
/50 36
7. VLSM 7. VLSM
Traditional subnetting - same number of addresses is allocated for each Variable Length Subnet Mask (VLSM) or subnetting a subnet
subnet. provides more efficient use of addresses.
Subnets that require fewer addresses have unused (wasted) addresses. Process repeated as necessary to
For example, WAN links only need 2 addresses. create subnets of various sizes.
37/66
/50 38/66
/50
7. VLSM 7. VLSM
192.168.20.64/27 192.168.20.128/27
10.0.0.0/8 Subnet using /16
192.168.20.0/27 192.168.20.128/27
Subnet 1st Host Last Host Broadcast
10.0.0.0/16 10.0.0.1 10.0.255.254 10.0.255.255
10.1.0.0/16 10.1.0.1 10.1.255.254 10.1.255.255
10.2.0.0/16 Subnet
10.2.0.1 1st Host
10.2.255.254 Last Host
10.2.255.255 Broadcast
192.168.20.32/27 192.168.20.96/27 192.168.20.64/27
10.3.0.0/16 10.2.0.0/24
10.3.0.1 10.2.0.1
10.3.255.254 10.2.0.254
10.3.255.255 10.2.0.255
Sub-subnet
Etc. 10.2.1.0/24 10.2.1.1 10.2.1.254 10.2.1.255 7 Networks with 30 usable
Using /24
10.255.0.0/16 10.2.2.0/24 10.2.2.1
10.255.0.1 10.255.255.254 10.2.2.254
10.255.255.255 10.2.2.255 addresses for each network
Etc.
10.2.255.0/24 10.2.255.1 10.2.255.254 10.2.255.255
Wasted 28 addresses on each
WAN link
39/66
/50 40/66
/50
7. VLSM 7. VLSM
41/66
/50 42/66
/50
43 44/66
/50
8. Address Resolution Protocol: ARP
45/66
/50 46
9. Dynamic Host Configuration Protocol (DHCP) 9. Dynamic Host Configuration Protocol (DHCP)
DHCP works in a client/server mode. Lease Origination: 4 Step Process.
When the client connects, the server assigns or leases an IP address
to the device.
The device connects to the network with that leased IP address until
the lease period expires.
The host must contact the DHCP server periodically to extend the
lease.
The leasing of addresses assures that addresses that are no longer
used are returned to the address pool for use by other devices.
47/66
/50 48/66
/50
9. Dynamic Host Configuration Protocol (DHCP)
Lease Renewal: 2 Step Process
49/66
/50 50
10. Internet Control Message Protocol 10. Internet Control Message Protocol
ICMP is a protocol for sending IP-layer error and status messages. The Destination Unreachable type has a large number of subtypes:
ICMP messages are identified by an 8-bit type field. Network unreachable: some router had no entry for forwarding
the packet, and no default route.
Queries
sent by one host
to another
Error
sent by
a
router
to the
sender
,
51/66
/50
192.168.4.1 52
10. Internet Control Message Protocol 10. Internet Control Message Protocol
The Destination Unreachable type has a large number of subtypes: The Destination Unreachable type has a large number of subtypes:
Network unreachable: some router had no entry for forwarding Host unreachable: the packet reached a router that was on the
the packet, and no default route. same LAN as the host, but the host failed to respond to ARP queries
192.168.1.0/24 F0/0 192.168.1.0/24 F0/0
192.168.2.0/24 F0/1 192.168.2.0/24 F0/1
192.168.4.0/24 ???
192.168.3.0/24 S0/0/0 192.168.3.0/24 S0/0/0
192.168.4.0/24 S0/0/0
ICMP Request
192.168.4.1 53 192.168.4.100 54
10. Internet Control Message Protocol 10. Internet Control Message Protocol
The Destination Unreachable type has a large number of subtypes: The Destination Unreachable type has a large number of subtypes:
Host unreachable: the packet reached a router that was on the Port unreachable:
same LAN as the host, but the host failed to respond to ARP queries o The packet was sent to a UDP port on a given host, but that port
was not open.
192.168.4.100 ??? TCP, on the other hand, deals with this situation by replying to
ICMP: Host Unreachable the connecting endpoint with a reset packet.
o FYI: the UDP Port Unreachable message is sent to the host, not
to the application on that host that sent the undeliverable packet,
and so is close to useless as a practical way for applications to be
informed when packets cannot be delivered.
192.168.4.100 55 56/66
/50
10. Internet Control Message Protocol 10. Internet Control Message Protocol
The Destination Unreachable type has a large number of subtypes: The Destination Unreachable type has a large number of subtypes:
Port unreachable: Port unreachable:
o The packet was sent to a UDP port on a given host, but that port o The packet was sent to a UDP port on a given host, but that port
was not open. was not open.
HTTP
server
not
DNS
server
192.168.4.1:53 (DNS) 57
192.168.4.1:53 (DNS) 58
10. Internet Control Message Protocol 10. Internet Control Message Protocol
The Destination Unreachable type has a large number of subtypes: The Destination Unreachable type has a large number of subtypes:
Fragmentation required but DF flag set: a packet arrived at a Fragmentation required but DF flag set: a packet arrived at a
router and was too big to be forwarded without fragmentation. router and was too big to be forwarded without fragmentation.
However, the Fragment bit in the IPv4 header was set, However, the Fragment bit in the IPv4 header was set,
forbidding fragmentation. forbidding fragmentation. Packet size is too big, must fragment.
192.168.4.1 59
192.168.4.1 60
10. Internet Control Message Protocol 10. Internet Control Message Protocol
The Destination Unreachable type has a large number of subtypes: The Destination Unreachable type has a large number of subtypes:
Administratively Prohibited: this is sent by a router that knows it Administratively Prohibited: this is sent by a router that knows it
can reach the network in question, but has configure intro to drop can reach the network in question, but has configure intro to drop
the packet and send back Administratively Prohibited messages. A the packet and send back Administratively Prohibited messages. A
router can also be configured to blackhole messages: to drop the router can also be configured to blackhole messages: to drop the
packet and send back nothing. packet and send back nothing.
access to Server 1. Drop the packet.
192.168.4.1 61
192.168.4.1 62
10. Internet Control Message Protocol 10. Internet Control Message Protocol
Traceroute and Time Exceeded Redirects
The traceroute program uses ICMP Time Exceeded messages. Most non-router hosts start up with an IPv4 forwarding table
consisting of a single (default) router.
At the initial state, when the switch receives a frame, how can it forward that
frame? Send the frame out all the ports.
How long is the 10-Mbps-Ethernet diameter? 232 bits
What is the primary collision control mechanism of Ethernet? CSMA/CD
What is the correct answer mentioned in the Preamble? 11111111 11111111
11111111 11111111 11111111 11111111 11111111 11111110
In 10-Mbps-Ethernet, how many bits does the Jam signal? 512
In Gigabit-Ethernet, how many bits does the Jam signal? 4096
A physical (or MAC) address has 6 bytes.
Typically, what does the switch do when it receives a multicast frame? Forward
the frame to all devices on the networks.
The Bridge can be referred to as: Switch
What is the protocol standard of Ethernet? IEEE 802.3
How many concurrent devices are there on an Ethernet network which uses only
Hub as an intermediary device? 1024
How long is the 100-Mbps-Ethernet diameter? 232 bits
What is the maximum Ethernet packet size of the IPv6 packet? 2000 bytes
What class of IPv4 address: 172.16.172.16/22 – B
How many hosts are available in the subnetwork containing an IPv4 address of
10.10.10.10/14? 262142