Computer Networking

Embed Size (px)

DESCRIPTION

networking, cn,computer

Citation preview

  • Computer networksComputer networks

    Subject code: EC2352

    Year: III

    Unit: I

    Title: Introduction to computer networks

    CODED BY: M.KASI RAJAN AP / CSE

    Subject code: EC2352

    Year: III

    Unit: I

    Title: Introduction to computer networks

    CODED BY: M.KASI RAJAN AP / CSE

    Subject code: EC2352

    Year: III

    Unit: I

    Title: Introduction to computer networks

    CODED BY: M.KASI RAJAN AP / CSE

    Subject code: EC2352

    Year: III

    Unit: I

    Title: Introduction to computer networks

    CODED BY: M.KASI RAJAN AP / CSE

  • Computer Networks

    Introduction to Computer Networks

    Computer Networks

    Computer network connectstwo or more autonomouscomputers.

    The computers can begeographically locatedanywhere.

    Computer network connectstwo or more autonomouscomputers.

    The computers can begeographically locatedanywhere.

    Computer network connectstwo or more autonomouscomputers.

    The computers can begeographically locatedanywhere.

    Computer network connectstwo or more autonomouscomputers.

    The computers can begeographically locatedanywhere.

    Computer network connectstwo or more autonomouscomputers.

    The computers can begeographically locatedanywhere.

  • LAN, MAN & WAN

    Introduction to Computer Networks

    LAN, MAN & WAN

    Network in small geographical Area (Room, Building or aCampus) is called LAN (Local Area Network)

    Network in a City is call MAN (Metropolitan Area Network)

    Network spread geographically (Country or across Globe) iscalled WAN (Wide Area Network)

    Network in small geographical Area (Room, Building or aCampus) is called LAN (Local Area Network)

    Network in a City is call MAN (Metropolitan Area Network)

    Network spread geographically (Country or across Globe) iscalled WAN (Wide Area Network)

    Network in small geographical Area (Room, Building or aCampus) is called LAN (Local Area Network)

    Network in a City is call MAN (Metropolitan Area Network)

    Network spread geographically (Country or across Globe) iscalled WAN (Wide Area Network)

    Network in small geographical Area (Room, Building or aCampus) is called LAN (Local Area Network)

    Network in a City is call MAN (Metropolitan Area Network)

    Network spread geographically (Country or across Globe) iscalled WAN (Wide Area Network)

  • Applications of Networks

    Introduction to Computer Networks

    Applications of Networks

    Resource SharingHardware (computing resources, disks, printers)Software (application software)

    Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

    CommunicationEmailMessage broadcast

    Remote computing

    Distributed processing (GRID Computing)

    Resource SharingHardware (computing resources, disks, printers)Software (application software)

    Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

    CommunicationEmailMessage broadcast

    Remote computing

    Distributed processing (GRID Computing)

    Resource SharingHardware (computing resources, disks, printers)Software (application software)

    Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

    CommunicationEmailMessage broadcast

    Remote computing

    Distributed processing (GRID Computing)

    Resource SharingHardware (computing resources, disks, printers)Software (application software)

    Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

    CommunicationEmailMessage broadcast

    Remote computing

    Distributed processing (GRID Computing)

    Resource SharingHardware (computing resources, disks, printers)Software (application software)

    Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

    CommunicationEmailMessage broadcast

    Remote computing

    Distributed processing (GRID Computing)

    Resource SharingHardware (computing resources, disks, printers)Software (application software)

    Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

    CommunicationEmailMessage broadcast

    Remote computing

    Distributed processing (GRID Computing)

  • Network Topology

    Introduction to Computer Networks

    Network Topology

    The network topologydefines the way in whichcomputers, printers, andother devices areconnected. A networktopology describes thelayout of the wire anddevices as well as thepaths used by datatransmissions.

    The network topologydefines the way in whichcomputers, printers, andother devices areconnected. A networktopology describes thelayout of the wire anddevices as well as thepaths used by datatransmissions.

    The network topologydefines the way in whichcomputers, printers, andother devices areconnected. A networktopology describes thelayout of the wire anddevices as well as thepaths used by datatransmissions.

    The network topologydefines the way in whichcomputers, printers, andother devices areconnected. A networktopology describes thelayout of the wire anddevices as well as thepaths used by datatransmissions.

  • Bus Topology

    Introduction to Computer Networks

    Bus Topology

    Commonly referred to as alinear bus, all the deviceson a bus topology areconnected by one singlecable.

    Commonly referred to as alinear bus, all the deviceson a bus topology areconnected by one singlecable.

    Commonly referred to as alinear bus, all the deviceson a bus topology areconnected by one singlecable.

  • Star & Tree Topology

    Introduction to Computer Networks

    Star & Tree TopologyThe star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

    The star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

    The star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

    The star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

    The star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

    The star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

    The star topology is the most commonly used architecture in Ethernet LANs.

    When installed, the star topologyresembles spokes in a bicyclewheel.

    Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames or packets,like bridges, switches, and routers,this topology significantly reducesthe traffic on the wires by sendingpackets only to the wires of thedestination host.

  • Ring Topology

    Introduction to Computer Networks

    Ring TopologyA frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

    A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

    A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

    A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

    A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

    A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

    A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data aswell as the destination address to theframe.

    The frame then continues around thering until it finds the destination node,which takes the data out of the frame.

    Single ring All the devices on thenetwork share a single cable

    Dual ring The dual ring topologyallows data to be sent in bothdirections.

  • Mesh Topology

    Introduction to Computer Networks

    Mesh Topology

    The mesh topologyconnects all devices(nodes) to each other forredundancy and faulttolerance.

    It is used in WANs tointerconnect LANs and formission critical networkslike those used by banksand financial institutions.

    Implementing the meshtopology is expensive anddifficult.

    The mesh topologyconnects all devices(nodes) to each other forredundancy and faulttolerance.

    It is used in WANs tointerconnect LANs and formission critical networkslike those used by banksand financial institutions.

    Implementing the meshtopology is expensive anddifficult.

    The mesh topologyconnects all devices(nodes) to each other forredundancy and faulttolerance.

    It is used in WANs tointerconnect LANs and formission critical networkslike those used by banksand financial institutions.

    Implementing the meshtopology is expensive anddifficult.

    The mesh topologyconnects all devices(nodes) to each other forredundancy and faulttolerance.

    It is used in WANs tointerconnect LANs and formission critical networkslike those used by banksand financial institutions.

    Implementing the meshtopology is expensive anddifficult.

    The mesh topologyconnects all devices(nodes) to each other forredundancy and faulttolerance.

    It is used in WANs tointerconnect LANs and formission critical networkslike those used by banksand financial institutions.

    Implementing the meshtopology is expensive anddifficult.

    The mesh topologyconnects all devices(nodes) to each other forredundancy and faulttolerance.

    It is used in WANs tointerconnect LANs and formission critical networkslike those used by banksand financial institutions.

    Implementing the meshtopology is expensive anddifficult.

  • Network Components

    Introduction to Computer Networks

    Network Components

    Physical Media

    Interconnecting Devices

    Computers

    Networking Software

    Applications

    Physical Media

    Interconnecting Devices

    Computers

    Networking Software

    Applications

    Physical Media

    Interconnecting Devices

    Computers

    Networking Software

    Applications

    Physical Media

    Interconnecting Devices

    Computers

    Networking Software

    Applications

  • Networking Media

    Introduction to Computer Networks

    Networking Media

    Networking media can bedefined simply as themeans by which signals(data) are sent from onecomputer to another(either by cable or wirelessmeans).

    Networking media can bedefined simply as themeans by which signals(data) are sent from onecomputer to another(either by cable or wirelessmeans).

    Networking media can bedefined simply as themeans by which signals(data) are sent from onecomputer to another(either by cable or wirelessmeans).

  • Networking Devices

    Introduction to Computer Networks

    Networking Devices

    HUB, Switches, Routers,Wireless Access Points,Modems etc.

    HUB, Switches, Routers,Wireless Access Points,Modems etc.

  • Computers: Clients and Servers

    Introduction to Computer Networks

    Computers: Clients and ServersIn a client/server networkarrangement, networkservices are located in adedicated computer whoseonly function is to respondto the requests of clients.

    The server contains thefile, print, application,security, and other servicesin a central computer thatis continuously available torespond to client requests.

    In a client/server networkarrangement, networkservices are located in adedicated computer whoseonly function is to respondto the requests of clients.

    The server contains thefile, print, application,security, and other servicesin a central computer thatis continuously available torespond to client requests.

    In a client/server networkarrangement, networkservices are located in adedicated computer whoseonly function is to respondto the requests of clients.

    The server contains thefile, print, application,security, and other servicesin a central computer thatis continuously available torespond to client requests.

    In a client/server networkarrangement, networkservices are located in adedicated computer whoseonly function is to respondto the requests of clients.

    The server contains thefile, print, application,security, and other servicesin a central computer thatis continuously available torespond to client requests.

    In a client/server networkarrangement, networkservices are located in adedicated computer whoseonly function is to respondto the requests of clients.

    The server contains thefile, print, application,security, and other servicesin a central computer thatis continuously available torespond to client requests.

    In a client/server networkarrangement, networkservices are located in adedicated computer whoseonly function is to respondto the requests of clients.

    The server contains thefile, print, application,security, and other servicesin a central computer thatis continuously available torespond to client requests.

  • Networking Protocol: TCP/IP

    Introduction to Computer Networks

    Networking Protocol: TCP/IP

  • Applications

    Introduction to Computer Networks

    Applications

    E-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio

    E-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio

    E-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio

    E-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio

    E-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio

  • Network ArchitectureNetwork Architecture

    Provides a general, effective, fair, and robust connectivity of computers

    Provides a blueprint

    Types

    OSI ArchitectureInternet Architecture

    Provides a general, effective, fair, and robust connectivity of computers

    Provides a blueprint

    Types

    OSI ArchitectureInternet Architecture

    Provides a general, effective, fair, and robust connectivity of computers

    Provides a blueprint

    Types

    OSI ArchitectureInternet Architecture

    Provides a general, effective, fair, and robust connectivity of computers

    Provides a blueprint

    Types

    OSI ArchitectureInternet Architecture

    Provides a general, effective, fair, and robust connectivity of computers

    Provides a blueprint

    Types

    OSI ArchitectureInternet Architecture

    Provides a general, effective, fair, and robust connectivity of computers

    Provides a blueprint

    Types

    OSI ArchitectureInternet Architecture

  • OSI ARCHITECTUREOSI ARCHITECTURE

    Open Systems Interconnection (OSI) model is a reference model developedby ISO (International Organization for Standardization) in 1984

    OSI model defines the communications process into Layers

    Provides a standards for communication in thenetwork

    Primary architectural model for inter-computing and Inter networkingcommunications.

    network communication protocols have a structure based on OSI Model

    Open Systems Interconnection (OSI) model is a reference model developedby ISO (International Organization for Standardization) in 1984

    OSI model defines the communications process into Layers

    Provides a standards for communication in thenetwork

    Primary architectural model for inter-computing and Inter networkingcommunications.

    network communication protocols have a structure based on OSI Model

    Open Systems Interconnection (OSI) model is a reference model developedby ISO (International Organization for Standardization) in 1984

    OSI model defines the communications process into Layers

    Provides a standards for communication in thenetwork

    Primary architectural model for inter-computing and Inter networkingcommunications.

    network communication protocols have a structure based on OSI Model

    Open Systems Interconnection (OSI) model is a reference model developedby ISO (International Organization for Standardization) in 1984

    OSI model defines the communications process into Layers

    Provides a standards for communication in thenetwork

    Primary architectural model for inter-computing and Inter networkingcommunications.

    network communication protocols have a structure based on OSI Model

    Open Systems Interconnection (OSI) model is a reference model developedby ISO (International Organization for Standardization) in 1984

    OSI model defines the communications process into Layers

    Provides a standards for communication in thenetwork

    Primary architectural model for inter-computing and Inter networkingcommunications.

    network communication protocols have a structure based on OSI Model

  • OSI ArchitectureOSI Architecture

  • Direct Links: OutlineDirect Links: Outline

    Physical Layer Link technologies Encoding

    Link Layer Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:

    Existing protocols: Ethernet, Token Rings, Wireless

    Physical Layer Link technologies Encoding

    Link Layer Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:

    Existing protocols: Ethernet, Token Rings, Wireless

    Physical Layer Link technologies Encoding

    Link Layer Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:

    Existing protocols: Ethernet, Token Rings, Wireless

    Physical Layer Link technologies Encoding

    Link Layer Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:

    Existing protocols: Ethernet, Token Rings, Wireless

    Physical Layer Link technologies Encoding

    Link Layer Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:

    Existing protocols: Ethernet, Token Rings, Wireless

    Physical Layer Link technologies Encoding

    Link Layer Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:

    Existing protocols: Ethernet, Token Rings, Wireless

  • Link TechnologiesLink Technologies

    Cables: Cat 5 twisted pair, 10-100Mbps, 100m Thin-net coax, 10-100Mbps, 200m Thick-net coax, 10-100Mbps, 500m Fiber, 100Mbps-2.4Gbps, 2-40km

    Leased Lines: Copper based: T1 (1.544Mbps), T3 (44.736Mbps) Optical fiber: STS-1 (51.84Mbps), STS-N (N*51.84Mbps)

    Cables: Cat 5 twisted pair, 10-100Mbps, 100m Thin-net coax, 10-100Mbps, 200m Thick-net coax, 10-100Mbps, 500m Fiber, 100Mbps-2.4Gbps, 2-40km

    Leased Lines: Copper based: T1 (1.544Mbps), T3 (44.736Mbps) Optical fiber: STS-1 (51.84Mbps), STS-N (N*51.84Mbps)

    Cables: Cat 5 twisted pair, 10-100Mbps, 100m Thin-net coax, 10-100Mbps, 200m Thick-net coax, 10-100Mbps, 500m Fiber, 100Mbps-2.4Gbps, 2-40km

    Leased Lines: Copper based: T1 (1.544Mbps), T3 (44.736Mbps) Optical fiber: STS-1 (51.84Mbps), STS-N (N*51.84Mbps)

    Cables: Cat 5 twisted pair, 10-100Mbps, 100m Thin-net coax, 10-100Mbps, 200m Thick-net coax, 10-100Mbps, 500m Fiber, 100Mbps-2.4Gbps, 2-40km

    Leased Lines: Copper based: T1 (1.544Mbps), T3 (44.736Mbps) Optical fiber: STS-1 (51.84Mbps), STS-N (N*51.84Mbps)

  • Link TechnologiesLink Technologies

    Last-Mile Links: POTS (56Kbps), ISDN (2*64Kbps) xDSL: ADSL (16-640Kbps, 1.554-8.448Mbps), VDSL (12.96Mbps-

    55.2Mbps)

    CATV: 40Mbps downstream, 20Mbps upstream Wireless Links: Cellular, Satellite, Wireless Local Loop

    Last-Mile Links: POTS (56Kbps), ISDN (2*64Kbps) xDSL: ADSL (16-640Kbps, 1.554-8.448Mbps), VDSL (12.96Mbps-

    55.2Mbps)

    CATV: 40Mbps downstream, 20Mbps upstream Wireless Links: Cellular, Satellite, Wireless Local Loop

    Last-Mile Links: POTS (56Kbps), ISDN (2*64Kbps) xDSL: ADSL (16-640Kbps, 1.554-8.448Mbps), VDSL (12.96Mbps-

    55.2Mbps)

    CATV: 40Mbps downstream, 20Mbps upstream Wireless Links: Cellular, Satellite, Wireless Local Loop

    Last-Mile Links: POTS (56Kbps), ISDN (2*64Kbps) xDSL: ADSL (16-640Kbps, 1.554-8.448Mbps), VDSL (12.96Mbps-

    55.2Mbps)

    CATV: 40Mbps downstream, 20Mbps upstream Wireless Links: Cellular, Satellite, Wireless Local Loop

  • FRAMING

    An efficient data transmission technique

    It is a message forwarding system in which data packets, calledframes, are passed from one or many start-points to one

    An efficient data transmission technique

    It is a message forwarding system in which data packets, calledframes, are passed from one or many start-points to one

    An efficient data transmission technique

    It is a message forwarding system in which data packets, calledframes, are passed from one or many start-points to one

  • ApproachesApproaches

    Byte oriented Protocol(PPP)BISYNC

    Binary Synchronous Communication

    DDCMP

    Digital Data Communication Message Protocol

    Bit oriented Protocol(HDLC)Clock based Framing(SONET)

    Byte oriented Protocol(PPP)BISYNC

    Binary Synchronous Communication

    DDCMP

    Digital Data Communication Message Protocol

    Bit oriented Protocol(HDLC)Clock based Framing(SONET)

    Byte oriented Protocol(PPP)BISYNC

    Binary Synchronous Communication

    DDCMP

    Digital Data Communication Message Protocol

    Bit oriented Protocol(HDLC)Clock based Framing(SONET)

    Byte oriented Protocol(PPP)BISYNC

    Binary Synchronous Communication

    DDCMP

    Digital Data Communication Message Protocol

    Bit oriented Protocol(HDLC)Clock based Framing(SONET)

    Byte oriented Protocol(PPP)BISYNC

    Binary Synchronous Communication

    DDCMP

    Digital Data Communication Message Protocol

    Bit oriented Protocol(HDLC)Clock based Framing(SONET)

    Byte oriented Protocol(PPP)BISYNC

    Binary Synchronous Communication

    DDCMP

    Digital Data Communication Message Protocol

    Bit oriented Protocol(HDLC)Clock based Framing(SONET)

  • Byte oriented Protocol(PPP)

    BISYNC FRAME FORMAT

    SYH SYH SOH Header STXBody

    ETX CRC

    BISYNC FRAME FORMAT

    Body

    PPP Frame Format

    Flag Address Control Protocol Payload Flag

  • DDCMP Frame Format

    SYN SYN Class Count Header Body CRC

  • Bit Oriented Protocol(HDLC)

    Collection of Bits1.HDLC

    High-Level Data Link Control

    2.Closed Based Framing(SONET)

    Synchronous Optical Network

    Collection of Bits1.HDLC

    High-Level Data Link Control

    2.Closed Based Framing(SONET)

    Synchronous Optical Network

    Collection of Bits1.HDLC

    High-Level Data Link Control

    2.Closed Based Framing(SONET)

    Synchronous Optical Network

    Collection of Bits1.HDLC

    High-Level Data Link Control

    2.Closed Based Framing(SONET)

    Synchronous Optical Network

  • HDLC Frame FormatHDLC Frame Format

    Beginning sequence

    Header Body CRC Ending sequence

    Bit Stufffing

    After 5 consecutive 1s insert 0

    Next bit is 0 stuffed removedNext bit is 1 end of frame or erorr

    Bit Stufffing

    After 5 consecutive 1s insert 0

    Next bit is 0 stuffed removedNext bit is 1 end of frame or erorr

    Bit Stufffing

    After 5 consecutive 1s insert 0

    Next bit is 0 stuffed removedNext bit is 1 end of frame or erorr

  • Closed Based Framing(SONET)

    STS-1 Frame9 rows of 90 byte each

    First 3 byte for overhead rest contains data

    Payload bytes scrambled- exclusive OR

    Supports Multiplexing

    STS-1 Frame9 rows of 90 byte each

    First 3 byte for overhead rest contains data

    Payload bytes scrambled- exclusive OR

    Supports Multiplexing

    STS-1 Frame9 rows of 90 byte each

    First 3 byte for overhead rest contains data

    Payload bytes scrambled- exclusive OR

    Supports Multiplexing

    STS-1 Frame9 rows of 90 byte each

    First 3 byte for overhead rest contains data

    Payload bytes scrambled- exclusive OR

    Supports Multiplexing

    Payloads

    9 rows

    90 columuns

    9 rows

    90 columuns

  • ERROR DETECTIONERROR DETECTION

    Detecting Errors In TransmissionElectrical Interference, thermal noise

    Approaches

    Two Dimensional Parity

    Internet Checksum Algorithm

    Cyclic Redundancy Check

    Detecting Errors In TransmissionElectrical Interference, thermal noise

    Approaches

    Two Dimensional Parity

    Internet Checksum Algorithm

    Cyclic Redundancy Check

    Detecting Errors In TransmissionElectrical Interference, thermal noise

    Approaches

    Two Dimensional Parity

    Internet Checksum Algorithm

    Cyclic Redundancy Check

    Detecting Errors In TransmissionElectrical Interference, thermal noise

    Approaches

    Two Dimensional Parity

    Internet Checksum Algorithm

    Cyclic Redundancy Check

    Detecting Errors In TransmissionElectrical Interference, thermal noise

    Approaches

    Two Dimensional Parity

    Internet Checksum Algorithm

    Cyclic Redundancy Check

  • Two Dimensional Parity

    7 bits of data 8 bits including parity 7 bits of data 8 bits including parity

    Number of 1s even oddNumber of 1s even odd

    0000000 (0) 00000000 100000000

    1010001 (3) 11010001 01010001

    1101001 (4) 01101001 11101001 1101001 (4) 01101001 11101001

    1111111 (7) 11111111 01111111 1111111 (7) 11111111 01111111

  • Transmission sent using even parity:

    A wants to transmit: 1001

    A computes parity bit value: 1^0^0^1 = 0

    A adds parity bit and sends: 10010

    B receives: 10010 B computes parity: 1^0^0^1^0 = 0

    B reports correct transmission after observing expected even result.

    A wants to transmit: 1001

    A computes parity bit value: 1^0^0^1 = 0

    A adds parity bit and sends: 10010

    B receives: 10010 B computes parity: 1^0^0^1^0 = 0

    B reports correct transmission after observing expected even result.

    A wants to transmit: 1001

    A computes parity bit value: 1^0^0^1 = 0

    A adds parity bit and sends: 10010

    B receives: 10010 B computes parity: 1^0^0^1^0 = 0

    B reports correct transmission after observing expected even result.

    A wants to transmit: 1001

    A computes parity bit value: 1^0^0^1 = 0

    A adds parity bit and sends: 10010

    B receives: 10010 B computes parity: 1^0^0^1^0 = 0

    B reports correct transmission after observing expected even result.

    A wants to transmit: 1001

    A computes parity bit value: 1^0^0^1 = 0

    A adds parity bit and sends: 10010

    B receives: 10010 B computes parity: 1^0^0^1^0 = 0

    B reports correct transmission after observing expected even result.

  • Transmission sent using odd parity:Transmission sent using odd parity:

    A wants to transmit: 1001 A computes parity bit value: ~(1^0^0^1) = 1 A adds parity bit and sends: 10011 B receives: 10011 B computes overall parity: 1^0^0^1^1 = 1 B reports correct transmission after observing expected odd result.

    A wants to transmit: 1001 A computes parity bit value: ~(1^0^0^1) = 1 A adds parity bit and sends: 10011 B receives: 10011 B computes overall parity: 1^0^0^1^1 = 1 B reports correct transmission after observing expected odd result.

    A wants to transmit: 1001 A computes parity bit value: ~(1^0^0^1) = 1 A adds parity bit and sends: 10011 B receives: 10011 B computes overall parity: 1^0^0^1^1 = 1 B reports correct transmission after observing expected odd result.

    A wants to transmit: 1001 A computes parity bit value: ~(1^0^0^1) = 1 A adds parity bit and sends: 10011 B receives: 10011 B computes overall parity: 1^0^0^1^1 = 1 B reports correct transmission after observing expected odd result.

  • Reliable TransmissionReliable Transmission

    Deliver Frames Reliably

    Accomplished by Acknowledgements and Timeouts

    ARQ-Automatic Repeat Request

    Mechanism:

    Stop and Wait

    Sliding Window

    Concurrent Logical Channels

    Deliver Frames Reliably

    Accomplished by Acknowledgements and Timeouts

    ARQ-Automatic Repeat Request

    Mechanism:

    Stop and Wait

    Sliding Window

    Concurrent Logical Channels

    Deliver Frames Reliably

    Accomplished by Acknowledgements and Timeouts

    ARQ-Automatic Repeat Request

    Mechanism:

    Stop and Wait

    Sliding Window

    Concurrent Logical Channels

    Deliver Frames Reliably

    Accomplished by Acknowledgements and Timeouts

    ARQ-Automatic Repeat Request

    Mechanism:

    Stop and Wait

    Sliding Window

    Concurrent Logical Channels

    Deliver Frames Reliably

    Accomplished by Acknowledgements and Timeouts

    ARQ-Automatic Repeat Request

    Mechanism:

    Stop and Wait

    Sliding Window

    Concurrent Logical Channels

    Deliver Frames Reliably

    Accomplished by Acknowledgements and Timeouts

    ARQ-Automatic Repeat Request

    Mechanism:

    Stop and Wait

    Sliding Window

    Concurrent Logical Channels

  • Stop And Wait ARQStop And Wait ARQ

    The source station transmits a single frame and then waits for anacknowledgement (ACK).

    Data frames cannot be sent until the destination stations replyarrives at the source station.

    It discards the frame and sends a negative acknowledgement (NAK)back to the sender

    causes the source to retransmit the damaged frame in case of error

    The source station transmits a single frame and then waits for anacknowledgement (ACK).

    Data frames cannot be sent until the destination stations replyarrives at the source station.

    It discards the frame and sends a negative acknowledgement (NAK)back to the sender

    causes the source to retransmit the damaged frame in case of error

    The source station transmits a single frame and then waits for anacknowledgement (ACK).

    Data frames cannot be sent until the destination stations replyarrives at the source station.

    It discards the frame and sends a negative acknowledgement (NAK)back to the sender

    causes the source to retransmit the damaged frame in case of error

    The source station transmits a single frame and then waits for anacknowledgement (ACK).

    Data frames cannot be sent until the destination stations replyarrives at the source station.

    It discards the frame and sends a negative acknowledgement (NAK)back to the sender

    causes the source to retransmit the damaged frame in case of error

    The source station transmits a single frame and then waits for anacknowledgement (ACK).

    Data frames cannot be sent until the destination stations replyarrives at the source station.

    It discards the frame and sends a negative acknowledgement (NAK)back to the sender

    causes the source to retransmit the damaged frame in case of error

  • Acknowledgements & TimeoutsAcknowledgements & Timeouts

    Sender Receiver

    Frame

    ACKTim

    eout

    Tim

    e

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    Tim

    eout

    Frame

    ACKTim

    eout

    (a) (c)

    (b) (d)

    Sender Receiver

    Frame

    ACKTim

    eout

    Tim

    e

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    Tim

    eout

    Frame

    ACKTim

    eout

    (a) (c)

    (b) (d)

    Sender Receiver

    Frame

    ACKTim

    eout

    Tim

    e

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    Tim

    eout

    Frame

    ACKTim

    eout

    (a) (c)

    (b) (d)

    Sender Receiver

    Frame

    ACKTim

    eout

    Tim

    e

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    Tim

    eout

    Frame

    ACKTim

    eout

    (a) (c)

    (b) (d)

    Sender Receiver

    Frame

    ACKTim

    eout

    Tim

    e

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    Tim

    eout

    Frame

    ACKTim

    eout

    (a) (c)

    (b) (d)

    Sender Receiver

    Frame

    ACKTim

    eout

    Tim

    e

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    ACKTim

    eout

    Frame

    ACKTim

    eout

    Sender Receiver

    Frame

    Tim

    eout

    Frame

    ACKTim

    eout

    (a) (c)

    (b) (d)

  • Stop & wait sequence numbersSender Receiver Sender Receiver

    imeo

    ut

    Sender ReceiverTi

    meo

    utim

    eout

    Tim

    eout

    imeo

    ut

    Tim

    eout

    Tim

    eout

    (c) (d)(c) (d)

    (e)

    Simple sequence numbers enable the client to discard duplicate copies of the same frame

    Stop & wait allows one outstanding frame, requires two distinct sequence numbers

    Simple sequence numbers enable the client to discard duplicate copies of the same frame

    Stop & wait allows one outstanding frame, requires two distinct sequence numbers

    Simple sequence numbers enable the client to discard duplicate copies of the same frame

    Stop & wait allows one outstanding frame, requires two distinct sequence numbers

  • Stop And WaitStop And Wait

  • Sliding Window Sliding Window

    bi-directional data transmission protocol used in the data link layer(OSI model) as well as in TCP

    It is used to keep a record of the frame sequences sent

    respective acknowledgements received by both the users.

    bi-directional data transmission protocol used in the data link layer(OSI model) as well as in TCP

    It is used to keep a record of the frame sequences sent

    respective acknowledgements received by both the users.

    bi-directional data transmission protocol used in the data link layer(OSI model) as well as in TCP

    It is used to keep a record of the frame sequences sent

    respective acknowledgements received by both the users.

    bi-directional data transmission protocol used in the data link layer(OSI model) as well as in TCP

    It is used to keep a record of the frame sequences sent

    respective acknowledgements received by both the users.

  • Sliding Window: SenderSliding Window: Sender

    Assign sequence number to each frame (SeqNum) Maintain three state variables:

    send window size (SWS) last acknowledgment received (LAR) last frame sent (LFS)

    Maintain invariant: LFS - LAR

  • Sequence Number SpaceSequence Number Space

    SeqNum field is finite; sequence numbers wrap around Sequence number space must be larger then number of outstanding frames SWS

  • Sliding Window: ReceiverSliding Window: Receiver

    Maintain three state variables receive window size (RWS) largest frame acceptable (LFA) last frame received (LFR)

    Maintain invariant: LFA - LFR LFA discarded

    Send cumulative ACKs send ACK for largest frame such that all frames less than this have been received

    Maintain three state variables receive window size (RWS) largest frame acceptable (LFA) last frame received (LFR)

    Maintain invariant: LFA - LFR LFA discarded

    Send cumulative ACKs send ACK for largest frame such that all frames less than this have been received

    RWS

    Maintain three state variables receive window size (RWS) largest frame acceptable (LFA) last frame received (LFR)

    Maintain invariant: LFA - LFR LFA discarded

    Send cumulative ACKs send ACK for largest frame such that all frames less than this have been received

    RWS

    LFR LFA

    Maintain three state variables receive window size (RWS) largest frame acceptable (LFA) last frame received (LFR)

    Maintain invariant: LFA - LFR LFA discarded

    Send cumulative ACKs send ACK for largest frame such that all frames less than this have been received

    Maintain three state variables receive window size (RWS) largest frame acceptable (LFA) last frame received (LFR)

    Maintain invariant: LFA - LFR LFA discarded

    Send cumulative ACKs send ACK for largest frame such that all frames less than this have been received

    Maintain three state variables receive window size (RWS) largest frame acceptable (LFA) last frame received (LFR)

    Maintain invariant: LFA - LFR LFA discarded

    Send cumulative ACKs send ACK for largest frame such that all frames less than this have been received

  • EhernetEhernet

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

    local-area network (LAN) covered by the IEEE 802.3.

    two modes of operation: half-duplex full-duplex modes. .

  • Three basic elements :

    1. the physical medium used to carry Ethernet signals betweencomputers,

    2. a set of medium access control rules embedded in eachEthernet interface that allow multiple computers to fairlyarbitrate access to the shared Ethernet channel,

    3. an Ethernet frame that consists of a standardized set of bitsused to carry data over the system

    Three basic elements :

    1. the physical medium used to carry Ethernet signals betweencomputers,

    2. a set of medium access control rules embedded in eachEthernet interface that allow multiple computers to fairlyarbitrate access to the shared Ethernet channel,

    3. an Ethernet frame that consists of a standardized set of bitsused to carry data over the system

    Three basic elements :

    1. the physical medium used to carry Ethernet signals betweencomputers,

    2. a set of medium access control rules embedded in eachEthernet interface that allow multiple computers to fairlyarbitrate access to the shared Ethernet channel,

    3. an Ethernet frame that consists of a standardized set of bitsused to carry data over the system

    Three basic elements :

    1. the physical medium used to carry Ethernet signals betweencomputers,

    2. a set of medium access control rules embedded in eachEthernet interface that allow multiple computers to fairlyarbitrate access to the shared Ethernet channel,

    3. an Ethernet frame that consists of a standardized set of bitsused to carry data over the system

    Three basic elements :

    1. the physical medium used to carry Ethernet signals betweencomputers,

    2. a set of medium access control rules embedded in eachEthernet interface that allow multiple computers to fairlyarbitrate access to the shared Ethernet channel,

    3. an Ethernet frame that consists of a standardized set of bitsused to carry data over the system

  • IEEE 802.5 FormatIEEE 802.5 Format

  • Frame Format IEEE 802.5Frame Format IEEE 802.5

  • IEEE 802.3 MAC Data Frame Format IEEE 802.3 MAC Data Frame Format

  • WirelessWireless

    The process by which the radio waves are propagated through airand transmits data

    Wireless technologies are differentiated by :

    Protocol Connection typePoint-to-Point (P2P) SpectrumLicensed or unlicensed

    The process by which the radio waves are propagated through airand transmits data

    Wireless technologies are differentiated by :

    Protocol Connection typePoint-to-Point (P2P) SpectrumLicensed or unlicensed

    The process by which the radio waves are propagated through airand transmits data

    Wireless technologies are differentiated by :

    Protocol Connection typePoint-to-Point (P2P) SpectrumLicensed or unlicensed

    The process by which the radio waves are propagated through airand transmits data

    Wireless technologies are differentiated by :

    Protocol Connection typePoint-to-Point (P2P) SpectrumLicensed or unlicensed

    The process by which the radio waves are propagated through airand transmits data

    Wireless technologies are differentiated by :

    Protocol Connection typePoint-to-Point (P2P) SpectrumLicensed or unlicensed

  • TypesTypes

    Infrared Wireless Transmission

    Tranmission of data signals using infrared-light waves

    Microwave Radio

    sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)

    Communications Satellites microwave relay stations in orbit around the earth.

    Infrared Wireless Transmission

    Tranmission of data signals using infrared-light waves

    Microwave Radio

    sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)

    Communications Satellites microwave relay stations in orbit around the earth.

    Infrared Wireless Transmission

    Tranmission of data signals using infrared-light waves

    Microwave Radio

    sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)

    Communications Satellites microwave relay stations in orbit around the earth.

    Infrared Wireless Transmission

    Tranmission of data signals using infrared-light waves

    Microwave Radio

    sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)

    Communications Satellites microwave relay stations in orbit around the earth.

    Infrared Wireless Transmission

    Tranmission of data signals using infrared-light waves

    Microwave Radio

    sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)

    Communications Satellites microwave relay stations in orbit around the earth.

    Infrared Wireless Transmission

    Tranmission of data signals using infrared-light waves

    Microwave Radio

    sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)

    Communications Satellites microwave relay stations in orbit around the earth.

  • UNIT III Packet SwitchingUNIT III Packet Switching

    Is a network communications method Groups all transmitted data, irrespective of content, type, or structure

    into suitably-sized blocks, called packets.

    Optimize utilization of available link capacity Increase the robustness of communication. When traversing network adapters, switches and other network nodes packets are buffered and queued, resulting in variable delay and

    throughput, depending on the traffic

    Is a network communications method Groups all transmitted data, irrespective of content, type, or structure

    into suitably-sized blocks, called packets.

    Optimize utilization of available link capacity Increase the robustness of communication. When traversing network adapters, switches and other network nodes packets are buffered and queued, resulting in variable delay and

    throughput, depending on the traffic

    Is a network communications method Groups all transmitted data, irrespective of content, type, or structure

    into suitably-sized blocks, called packets.

    Optimize utilization of available link capacity Increase the robustness of communication. When traversing network adapters, switches and other network nodes packets are buffered and queued, resulting in variable delay and

    throughput, depending on the traffic

    Is a network communications method Groups all transmitted data, irrespective of content, type, or structure

    into suitably-sized blocks, called packets.

    Optimize utilization of available link capacity Increase the robustness of communication. When traversing network adapters, switches and other network nodes packets are buffered and queued, resulting in variable delay and

    throughput, depending on the traffic

  • TypesTypes

    Connectionless each packet is labeled with a connection ID rather than

    an address.

    Example:Datagram packet switching

    connection-oriented each packet is labeled with a destination address Example:X.25 vs. Frame Relay

    Connectionless each packet is labeled with a connection ID rather than

    an address.

    Example:Datagram packet switching

    connection-oriented each packet is labeled with a destination address Example:X.25 vs. Frame Relay

    Connectionless each packet is labeled with a connection ID rather than

    an address.

    Example:Datagram packet switching

    connection-oriented each packet is labeled with a destination address Example:X.25 vs. Frame Relay

    Connectionless each packet is labeled with a connection ID rather than

    an address.

    Example:Datagram packet switching

    connection-oriented each packet is labeled with a destination address Example:X.25 vs. Frame Relay

    Connectionless each packet is labeled with a connection ID rather than

    an address.

    Example:Datagram packet switching

    connection-oriented each packet is labeled with a destination address Example:X.25 vs. Frame Relay

  • Star TopologyStar Topology

  • Source RoutingSource Routing

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

    0

    13

    2

    0

    1 3

    2

    0

    13

    2

    0

    13

    23 0 1 3 01

    30 1

    Switch 3

    Host B

    Switch 2

    Host A

    Switch 1

  • Virtual Circuit SwitchingVirtual Circuit Switching Explicit connection setup (and tear-down) phase Subsequence packets follow same circuit Sometimes called connection-oriented model

    Explicit connection setup (and tear-down) phase Subsequence packets follow same circuit Sometimes called connection-oriented model

    132

    013

    2Switch 2

    Switch 1

    0

    1325 11

    Host A

    Analogy: phone call

    Each switch maintains a VC table

    01 3

    7

    Switch 3

    Host A

    Analogy: phone call

    Each switch maintains a VC table

    1 3

    24 Host B

    Analogy: phone call

    Each switch maintains a VC table

  • Datagram SwitchingDatagram Switching

    No connection setup phase Each packet forwarded independently Sometimes called connectionless model

    No connection setup phase Each packet forwarded independently Sometimes called connectionless model

    Host D

    No connection setup phase Each packet forwarded independently Sometimes called connectionless model

    2

    0

    13Switch 2

    Switch 1

    Host D

    Host EHost F Analogy: postal

    system

    Each switch maintains a forwarding (routing) table

    0

    13

    22

    Switch 2

    Host A

    Host C

    Analogy: postal system

    Each switch maintains a forwarding (routing) table

    0 Switch 3Host B

    Host A

    Host G

    Analogy: postal system

    Each switch maintains a forwarding (routing) table

    0

    1 3

    2

    Switch 3Host BHost G

    Host HHost H

  • Virtual Circuit ModelVirtual Circuit Model

    Typically wait full RTT for connection setup before sending first data packet.

    While the connection request contains the full address for destination

    each data packet contains only a small identifier, making the per-packet header overhead small.

    If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.

    Connection setup provides an opportunity to reserve resources.

    Typically wait full RTT for connection setup before sending first data packet.

    While the connection request contains the full address for destination

    each data packet contains only a small identifier, making the per-packet header overhead small.

    If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.

    Connection setup provides an opportunity to reserve resources.

    Typically wait full RTT for connection setup before sending first data packet.

    While the connection request contains the full address for destination

    each data packet contains only a small identifier, making the per-packet header overhead small.

    If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.

    Connection setup provides an opportunity to reserve resources.

    Typically wait full RTT for connection setup before sending first data packet.

    While the connection request contains the full address for destination

    each data packet contains only a small identifier, making the per-packet header overhead small.

    If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.

    Connection setup provides an opportunity to reserve resources.

    Typically wait full RTT for connection setup before sending first data packet.

    While the connection request contains the full address for destination

    each data packet contains only a small identifier, making the per-packet header overhead small.

    If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.

    Connection setup provides an opportunity to reserve resources.

    Typically wait full RTT for connection setup before sending first data packet.

    While the connection request contains the full address for destination

    each data packet contains only a small identifier, making the per-packet header overhead small.

    If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.

    Connection setup provides an opportunity to reserve resources.

  • Datagram ModelDatagram Model

    There is no round trip delay waiting for connection setup; ahost can send data as soon as it is ready.

    Source host has no way of knowing if the network is capable ofdelivering a packet or if the destination host is even up.

    Since packets are treated independently, it is possible to routearound link and node failures.

    Since every packet must carry the full address of thedestination, the overhead per packet is higher than for theconnection-oriented model.

    There is no round trip delay waiting for connection setup; ahost can send data as soon as it is ready.

    Source host has no way of knowing if the network is capable ofdelivering a packet or if the destination host is even up.

    Since packets are treated independently, it is possible to routearound link and node failures.

    Since every packet must carry the full address of thedestination, the overhead per packet is higher than for theconnection-oriented model.

    There is no round trip delay waiting for connection setup; ahost can send data as soon as it is ready.

    Source host has no way of knowing if the network is capable ofdelivering a packet or if the destination host is even up.

    Since packets are treated independently, it is possible to routearound link and node failures.

    Since every packet must carry the full address of thedestination, the overhead per packet is higher than for theconnection-oriented model.

    There is no round trip delay waiting for connection setup; ahost can send data as soon as it is ready.

    Source host has no way of knowing if the network is capable ofdelivering a packet or if the destination host is even up.

    Since packets are treated independently, it is possible to routearound link and node failures.

    Since every packet must carry the full address of thedestination, the overhead per packet is higher than for theconnection-oriented model.

    There is no round trip delay waiting for connection setup; ahost can send data as soon as it is ready.

    Source host has no way of knowing if the network is capable ofdelivering a packet or if the destination host is even up.

    Since packets are treated independently, it is possible to routearound link and node failures.

    Since every packet must carry the full address of thedestination, the overhead per packet is higher than for theconnection-oriented model.

    There is no round trip delay waiting for connection setup; ahost can send data as soon as it is ready.

    Source host has no way of knowing if the network is capable ofdelivering a packet or if the destination host is even up.

    Since packets are treated independently, it is possible to routearound link and node failures.

    Since every packet must carry the full address of thedestination, the overhead per packet is higher than for theconnection-oriented model.

  • Bridges and Extended LANsBridges and Extended LANs

    LANs have physical limitations (e.g., 2500m) Connect two or more LANs with a bridge

    accept and forward strategy level 2 connection (does not add packet header)

    Ethernet Switch = Bridge on Steroids

    LANs have physical limitations (e.g., 2500m) Connect two or more LANs with a bridge

    accept and forward strategy level 2 connection (does not add packet header)

    Ethernet Switch = Bridge on Steroids

    LANs have physical limitations (e.g., 2500m) Connect two or more LANs with a bridge

    accept and forward strategy level 2 connection (does not add packet header)

    Ethernet Switch = Bridge on Steroids

    LANs have physical limitations (e.g., 2500m) Connect two or more LANs with a bridge

    accept and forward strategy level 2 connection (does not add packet header)

    Ethernet Switch = Bridge on Steroids

    A B C

    Port 1

    LANs have physical limitations (e.g., 2500m) Connect two or more LANs with a bridge

    accept and forward strategy level 2 connection (does not add packet header)

    Ethernet Switch = Bridge on Steroids

    Bridge

    X Y Z

    Port 1

    Port 2

    LANs have physical limitations (e.g., 2500m) Connect two or more LANs with a bridge

    accept and forward strategy level 2 connection (does not add packet header)

    Ethernet Switch = Bridge on Steroids X Y Z

  • Spanning Tree Algorithm Spanning Tree Algorithm

    Problem: loops

    Bridges run a distributed spanning tree algorithm select which bridges actively forward developed by Radia Perlman now IEEE 802.1 specification

    A Problem: loops

    Bridges run a distributed spanning tree algorithm select which bridges actively forward developed by Radia Perlman now IEEE 802.1 specification

    B3

    A

    C

    DB2

    B5

    B

    B7 K

    Problem: loops

    Bridges run a distributed spanning tree algorithm select which bridges actively forward developed by Radia Perlman now IEEE 802.1 specification

    E

    B2 B7 K

    F

    H

    B1

    G

    Problem: loops

    Bridges run a distributed spanning tree algorithm select which bridges actively forward developed by Radia Perlman now IEEE 802.1 specification

    H

    B4

    J

    B6

    G

    I

    Problem: loops

    Bridges run a distributed spanning tree algorithm select which bridges actively forward developed by Radia Perlman now IEEE 802.1 specification

    Problem: loops

    Bridges run a distributed spanning tree algorithm select which bridges actively forward developed by Radia Perlman now IEEE 802.1 specification

  • Algorithm DetailsAlgorithm Details

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

  • Algorithm DetailsAlgorithm Details

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

    Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge

    Each bridge records current best configuration message for each port

    Initially, each bridge believes it is the root

  • Thank UCODED BY: M.KASI RAJAN AP / CSE

    Thank UCODED BY: M.KASI RAJAN AP / CSE

    Thank UCODED BY: M.KASI RAJAN AP / CSE

  • Computer networksComputer networks

    Subject code: EC2352

    Year: III

    Unit: II

    Title: Introduction to network layers

    CODED BY: M.KASI RAJAN AP / CSE

    Subject code: EC2352

    Year: III

    Unit: II

    Title: Introduction to network layers

    CODED BY: M.KASI RAJAN AP / CSE

    Subject code: EC2352

    Year: III

    Unit: II

    Title: Introduction to network layers

    CODED BY: M.KASI RAJAN AP / CSE

    Subject code: EC2352

    Year: III

    Unit: II

    Title: Introduction to network layers

    CODED BY: M.KASI RAJAN AP / CSE

  • InternetworkingInternetworking

    An internetwork is a collection of individual networks, connected byintermediate networking devices, that functions as a single largenetwork.

    different kinds of network technologies that can be interconnectedby routers and other networking devices to create an internetwork

    An internetwork is a collection of individual networks, connected byintermediate networking devices, that functions as a single largenetwork.

    different kinds of network technologies that can be interconnectedby routers and other networking devices to create an internetwork

    An internetwork is a collection of individual networks, connected byintermediate networking devices, that functions as a single largenetwork.

    different kinds of network technologies that can be interconnectedby routers and other networking devices to create an internetwork

    An internetwork is a collection of individual networks, connected byintermediate networking devices, that functions as a single largenetwork.

    different kinds of network technologies that can be interconnectedby routers and other networking devices to create an internetwork

  • TypesTypes

    Local-area networks (LANs)enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers.

    Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity.

    technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others.

    Local-area networks (LANs)enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers.

    Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity.

    technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others.

    Local-area networks (LANs)enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers.

    Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity.

    technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others.

    Local-area networks (LANs)enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers.

    Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity.

    technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others.

    Local-area networks (LANs)enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers.

    Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity.

    technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others.

  • ETHETH

  • IPV4 Packet HeaderIPV4 Packet Header

    Version HLen TOS LengthVersion HLen TOS Length

    Ident Flags OffsetFlags Offset

    TTL Protocol Checksum

    SourceAddr

    Destination AddrDestination Addr

    Options(variable) Pad(variable)

    DataData

  • Datagram DeliveryDatagram Delivery

  • Packet FormatPacket Format

  • IPV4 Packet headerIPV4 Packet header

  • Fragmentation and ReassemblyFragmentation and Reassembly

  • Fragmentation and ReassemblyFragmentation and Reassembly

  • Fragmentation and ReassemblyFragmentation and Reassembly

  • (RARP)Reverse Address Resolution Protocol

    (RARP)Reverse Address Resolution Protocol

    (RARP) is a Link layer networking protocol RARP is described in internet EngineeringTask ForceETF) publication

    RFC 903

    It has been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol(DHCP)

    BOOTP configuration server assigns an IP address to each client from a pool of addresses.

    BOOTP uses the User Datagram Protocol (UDP)

    (RARP) is a Link layer networking protocol RARP is described in internet EngineeringTask ForceETF) publication

    RFC 903

    It has been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol(DHCP)

    BOOTP configuration server assigns an IP address to each client from a pool of addresses.

    BOOTP uses the User Datagram Protocol (UDP)

    (RARP) is a Link layer networking protocol RARP is described in internet EngineeringTask ForceETF) publication

    RFC 903

    It has been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol(DHCP)

    BOOTP configuration server assigns an IP address to each client from a pool of addresses.

    BOOTP uses the User Datagram Protocol (UDP)

    (RARP) is a Link layer networking protocol RARP is described in internet EngineeringTask ForceETF) publication

    RFC 903

    It has been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol(DHCP)

    BOOTP configuration server assigns an IP address to each client from a pool of addresses.

    BOOTP uses the User Datagram Protocol (UDP)

    (RARP) is a Link layer networking protocol RARP is described in internet EngineeringTask ForceETF) publication

    RFC 903

    It has been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol(DHCP)

    BOOTP configuration server assigns an IP address to each client from a pool of addresses.

    BOOTP uses the User Datagram Protocol (UDP)

  • Router

    Routing

    RouterA router is a device that determines the next network pointto which a packet should be forwarded toward itsdestination

    Allow different networks to communicate with each other

    A router creates and maintain a table of the availableroutes and their conditions and uses this information todetermine the best route for a given packet.

    A packet will travel through a number of network pointswith routers before arriving at its destination.

    There can be multiple routes defined. The route with alower weight/metric will be tried first.

    A router is a device that determines the next network pointto which a packet should be forwarded toward itsdestination

    Allow different networks to communicate with each other

    A router creates and maintain a table of the availableroutes and their conditions and uses this information todetermine the best route for a given packet.

    A packet will travel through a number of network pointswith routers before arriving at its destination.

    There can be multiple routes defined. The route with alower weight/metric will be tried first.

    A router is a device that determines the next network pointto which a packet should be forwarded toward itsdestination

    Allow different networks to communicate with each other

    A router creates and maintain a table of the availableroutes and their conditions and uses this information todetermine the best route for a given packet.

    A packet will travel through a number of network pointswith routers before arriving at its destination.

    There can be multiple routes defined. The route with alower weight/metric will be tried first.

    A router is a device that determines the next network pointto which a packet should be forwarded toward itsdestination

    Allow different networks to communicate with each other

    A router creates and maintain a table of the availableroutes and their conditions and uses this information todetermine the best route for a given packet.

    A packet will travel through a number of network pointswith routers before arriving at its destination.

    There can be multiple routes defined. The route with alower weight/metric will be tried first.

    A router is a device that determines the next network pointto which a packet should be forwarded toward itsdestination

    Allow different networks to communicate with each other

    A router creates and maintain a table of the availableroutes and their conditions and uses this information todetermine the best route for a given packet.

    A packet will travel through a number of network pointswith routers before arriving at its destination.

    There can be multiple routes defined. The route with alower weight/metric will be tried first.

    A router is a device that determines the next network pointto which a packet should be forwarded toward itsdestination

    Allow different networks to communicate with each other

    A router creates and maintain a table of the availableroutes and their conditions and uses this information todetermine the best route for a given packet.

    A packet will travel through a number of network pointswith routers before arriving at its destination.

    There can be multiple routes defined. The route with alower weight/metric will be tried first.

  • Routing

    Routing

    Routing

  • Routing Protocols

    Routing

    Routing ProtocolsStatic Routing

    Dynamic Routing

    IGP (Interior Gateway Protocol): Route data within an Autonomous System

    RIP (Routing Information Protocol)

    RIP-2 (RIP Version 2)

    OSPF (Open Shortest Path First)

    IGRP (Interior Gateway Routing Protocol)

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    IS-IS

    EGP (Exterior Gateway Protocol): Route data between AutonomousSystems

    BGP (Border Gateway Protocol)

    Static Routing

    Dynamic Routing

    IGP (Interior Gateway Protocol): Route data within an Autonomous System

    RIP (Routing Information Protocol)

    RIP-2 (RIP Version 2)

    OSPF (Open Shortest Path First)

    IGRP (Interior Gateway Routing Protocol)

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    IS-IS

    EGP (Exterior Gateway Protocol): Route data between AutonomousSystems

    BGP (Border Gateway Protocol)

    Static Routing

    Dynamic Routing

    IGP (Interior Gateway Protocol): Route data within an Autonomous System

    RIP (Routing Information Protocol)

    RIP-2 (RIP Version 2)

    OSPF (Open Shortest Path First)

    IGRP (Interior Gateway Routing Protocol)

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    IS-IS

    EGP (Exterior Gateway Protocol): Route data between AutonomousSystems

    BGP (Border Gateway Protocol)

    Static Routing

    Dynamic Routing

    IGP (Interior Gateway Protocol): Route data within an Autonomous System

    RIP (Routing Information Protocol)

    RIP-2 (RIP Version 2)

    OSPF (Open Shortest Path First)

    IGRP (Interior Gateway Routing Protocol)

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    IS-IS

    EGP (Exterior Gateway Protocol): Route data between AutonomousSystems

    BGP (Border Gateway Protocol)

    Static Routing

    Dynamic Routing

    IGP (Interior Gateway Protocol): Route data within an Autonomous System

    RIP (Routing Information Protocol)

    RIP-2 (RIP Version 2)

    OSPF (Open Shortest Path First)

    IGRP (Interior Gateway Routing Protocol)

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    IS-IS

    EGP (Exterior Gateway Protocol): Route data between AutonomousSystems

    BGP (Border Gateway Protocol)

    Static Routing

    Dynamic Routing

    IGP (Interior Gateway Protocol): Route data within an Autonomous System

    RIP (Routing Information Protocol)

    RIP-2 (RIP Version 2)

    OSPF (Open Shortest Path First)

    IGRP (Interior Gateway Routing Protocol)

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    IS-IS

    EGP (Exterior Gateway Protocol): Route data between AutonomousSystems

    BGP (Border Gateway Protocol)

  • The Routing AlgorithmThe Routing AlgorithmThe Routing AlgorithmThe Routing Algorithm

    u the shortest path tree is contained in the routing table

    u Calculations are based on the Bellman-Ford algorithm

    u the shortest path tree is contained in the routing table

    u Calculations are based on the Bellman-Ford algorithm

    u the shortest path tree is contained in the routing table

    u Calculations are based on the Bellman-Ford algorithm

    u the shortest path tree is contained in the routing table

    u Calculations are based on the Bellman-Ford algorithm

    Iskra Djonova-Popova

  • The Centralized Version of the The Centralized Version of the AlgorithmAlgorithm

    The Centralized Version of the The Centralized Version of the AlgorithmAlgorithm

    21 21

    A B C2

    4

    1 A B C2

    3 4

    1

    D E

    3 4 56 D E

    3 4

    Cycle Node B C D E

    Initial (., ) (., ) (., ) (., )

    1 (1, 1) (2, 2) (3, 1) (4, 2)

    D E

    Cycle Node B C D E

    Initial (., ) (., ) (., ) (., )

    1 (1, 1) (2, 2) (3, 1) (4, 2)

    Iskra Djonova-Popova

  • The Distributed VersionThe Distributed Version

    A B C1 2

    Routing table for AA B C

    3 4

    From A to Link CostB 1 1C 1 2D 3 1E 1 2

    D E

    3 4

    5

    6

    From A to Link CostB 1 1C 1 2D 3 1E 1 2

    D E6

    Example of simple network with 5 nodes (routers) and 6 links (interfaces)The cost of all links is assumed to be 1

    Example of simple network with 5 nodes (routers) and 6 links (interfaces)The cost of all links is assumed to be 1

    Iskra Djonova-Popova

  • AdvantagesAdvantages

    simple to implement

    low requirement in processing and memory at the nodes

    suitable for small networks

    simple to implement

    low requirement in processing and memory at the nodes

    suitable for small networks

    simple to implement

    low requirement in processing and memory at the nodes

    suitable for small networks

    simple to implement

    low requirement in processing and memory at the nodes

    suitable for small networks

    Iskra Djonova-Popova

  • DisadvantagesDisadvantages

    Slow convergenceBouncing effectCounting to infinity problem

    Slow convergenceBouncing effectCounting to infinity problem

    Slow convergenceBouncing effectCounting to infinity problem

    Slow convergenceBouncing effectCounting to infinity problem

    Slow convergenceBouncing effectCounting to infinity problem

    Iskra Djonova-Popova

  • Slow ConvergenceSlow Convergence

    A B C2

    XXXA B C

    3 4

    XXX

    link 1 breaks

    D E

    3 4

    5

    6

    link 1 breaks

    D E

    When a link breaks the routers are supposed to reestablish the routing tables

    Iskra Djonova-Popova

  • The Bouncing EffectThe Bouncing Effect

    A B CXXX

    1A B C

    3 4

    XXX

    D E

    3 4

    5

    6

    link 2 breaks and A sends its routing table to B before B sends it to A

    D E

    link 2 breaks and A sends its routing table to B before B sends it to A

    Iskra Djonova-Popova

  • Counting to Infinity ProblemsCounting to Infinity Problems

    A B C2

    XXX

    3

    A B C

    4

    XXX

    Links 1 and 6break.D E

    3 4

    5

    XXX

    Links 1 and 6break.D EXXXLinks 1 and 6break.

    A sends its old routing table before D sends the new routing tableA sends its old routing table before D sends the new routing table

    Iskra Djonova-Popova

    A sends its old routing table before D sends the new routing table

  • SubnetsSubnets

    Each organization assigns IP addresses to specific computers on its networks

    IP addresses are assigned so that all computers on the same LAN have similar addresses

    Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be

    designated as a subnet using a subnet mask*

    Each organization assigns IP addresses to specific computers on its networks

    IP addresses are assigned so that all computers on the same LAN have similar addresses

    Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be

    designated as a subnet using a subnet mask*

    Each organization assigns IP addresses to specific computers on its networks

    IP addresses are assigned so that all computers on the same LAN have similar addresses

    Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be

    designated as a subnet using a subnet mask*

    Each organization assigns IP addresses to specific computers on its networks

    IP addresses are assigned so that all computers on the same LAN have similar addresses

    Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be

    designated as a subnet using a subnet mask*

    Each organization assigns IP addresses to specific computers on its networks

    IP addresses are assigned so that all computers on the same LAN have similar addresses

    Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be

    designated as a subnet using a subnet mask*

    Each organization assigns IP addresses to specific computers on its networks

    IP addresses are assigned so that all computers on the same LAN have similar addresses

    Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be

    designated as a subnet using a subnet mask*

    * Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is on the same or a different subnet

    * Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is on the same or a different subnet

  • Subnet AddressingSubnet Addressing

    Figure 5-6

  • Subnet AddressingSubnet Addressing

    Example 1

    Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x

    Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet.

    The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.

    Example 1

    Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x

    Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet.

    The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.

    Example 1

    Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x

    Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet.

    The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.

    Example 1

    Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x

    Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet.

    The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.

    Example 1

    Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x

    Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet.

    The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.

    Example 1

    Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x

    Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet.

    The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.

  • Subnet AddressingSubnet Addressing

    Example 2

    Partial bytes can also be used as subnets.

    For example, consider the subnet mask 255.255.255.128, which is 11111111.11111111.11111111.10000000.

    Here, all computers with the same first three bytes and last byte from 128 to 254 would be on the same subnet.

    Example 2

    Partial bytes can also be used as subnets.

    For example, consider the subnet mask 255.255.255.128, which is 11111111.11111111.11111111.10000000.

    Here, all computers with the same first three bytes and last byte from 128 to 254 would be on the same subnet.

    Example 2

    Partial bytes can also be used as subnets.

    For example, consider the subnet mask 255.255.255.128, which is 11111111.11111111.11111111.10000000.

    Here, all computers with the same first three bytes and last byte from 128 to 254 would be on the same subnet.

    Example 2

    Partial bytes can also be used as subnets.

    For example, consider the subnet mask 255.255.255.128, which is 11111111.11111111.11111111.10000000.

    Here, all computers with the same first three bytes and last byte from 128 to 254 would be on the same subnet.

    Example 2

    Partial bytes can also be used as subnets.

    For example, consider the subnet mask 255.255.255.128, which is 11111111.11111111.11111111.10000000.

    Here, all computers with the same first three bytes and last byte from 128 to 254 would be on the same subnet.

  • Providing AddressesProviding Addresses

    Providing addresses to networked computers

    Static addressing Dynamic addressing

    Pr