Preview (6 of 20 pages)

Preview Extract

CHAPTER 5 NETWORK AND TRANSPORT LAYERS Chapter Summary The network layers and transport layer are responsible for moving messages from end to end in a network. They are so closely tied together that they are usually discussed together. The transport layer (layer 4) performs three functions: linking the application layer to the network, segmenting (breaking long messages into smaller packets for transmission), and session management (establishing an end-to-end connection between the sender and receiver). The network layer (layer 3) performs two functions: routing (determining the next computer to which the message should be sent to reach the final destination) and addressing (finding the address of that next computer). There are several standard transport and network layer protocols that specify how packets are to be organized, in the same way that there are standards for data link layer packets. However, only one protocol is in widespread use today: Transmission Control Protocol/Internet Protocol (TCP/IP), the protocol used on the Internet. This chapter takes a detailed look at how TCP/IP works. Learning Objectives After reading this chapter, students should be able to: be aware of the TCP/IP protocols be familiar with linking to the application layer, segmenting, and session management be familiar with addressing be familiar with routing understand how TCP/IP works Key Terms Access Control List (ACL) address resolution Address Resolution Protocol (ARP) addressing application layer address autonomous systems auxiliary port Border Gateway Protocol (BGP) border router broadcast message centralized routing Cisco IOS classless addressing connectionless messaging connection-oriented messaging console port data link layer address designated router destination port address distance vector dynamic routing Domain Name Service (DNS) dynamic addressing Dynamic Host Configuration Protocol (DHCP) dynamic routing Enhanced Interior Gateway Routing Protocol (EIGRP) exterior routing protocol gateway hop Intermediate System to Intermediate System (IS-IS) Interior Gateway Routing Protocol (IGRP) interior routing protocol Internet address classes Internet Control Message Protocol (ICMP) Internet Corporation for Assigned Names and Numbers (ICANN) Internet Group Management Protocol (IGMP) link state dynamic routing multicast message name server Network Interface port (TCP/IP port) network layer address Open Shortest Path First (OSPF) port address Quality of Service (QoS) Real-Time Streaming Protocol (RTSP) RSS Real-Time Transport Protocol (RTP) Resource Reservation Protocol (RSVP) router routing Routing Information Protocol (RIP) routing table segment segmenting source port address static routing subnet subnet mask Transmission Control Protocol/Internet Protocol (TCP/IP) unicast message User Datagram Protocol (UDP) Chapter Outline INTRODUCTION TRANSPORT AND NETWORK LAYER PROTOCOLS Transmission Control Protocol (TCP) Internet Protocol (IP) TRANSPORT LAYER FUNCTIONS Linking to the Application Layer Segmenting Session Management ADDRESSING Assigning Addresses Address Resolution ROUTING Types of Routing Routing Protocols Multicasting The Anatomy of a Router TCP/IP EXAMPLE Known Addresses, Same Subnet Known Addresses, Different Subnet Unknown Addresses TCP Connections TCP/IP and Network Layers IMPLICATIONS FOR MANAGEMENT SUMMARY Answers to Textbook Exercises What does the transport layer do? The transport layer links application software in the application layer with the network and is responsible for the end-to-end delivery of the message. The transport layer sits between the application layer and the network layer. The transport layer accepts messages from the application layer and packetizes them. Packetizing means to take one outgoing message from the application layer and break it into a set of smaller packets for transmission through the network. Conversely, it also means to take the incoming set of smaller packets form the network layer and reassemble them into one message for the application layer. What does the network layer do? The network layer performs three important functions: addressing, routing, and breaking long messages into smaller packets for transmission by the data link layer. The network layer sits between the application layer and the data link layer. The network layer accepts messages from the application layer and formats and addresses them for transmission by the data link layer. The network layer also accepts individual messages from the data link layer and organizes them into coherent messages that it passes to the application layer. What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP? TCP performs packetizing: breaking the data into smaller packets, numbering them, ensuring each packet is reliably delivered, and putting them in the proper order at the destination. IP performs routing and addressing. IP software is used at each of the intervening computers through which the message passes; it is IP that routes the message to the final destination. The TCP software only needs to be active at the sender and the receiver, because TCP is only involved when data comes from or goes to the application layer. TCP/IP is the network layer protocol now used on the Internet. It is also the world’s most popular network layer protocol, used by almost 70 percent of all backbone, metropolitan, and wide area networks. TCP/IP is commonly combined with Ethernet. Compare and contrast the three types of addresses used in a network. When users work with application software, they typically use the application layer address (e.g., entering an Internet address into a browsers, such as www.cba.uga.edu). When a user types an Internet address into a Web browser, the request is passed to the network layer as part of an application layer packet formatted using the HTTP standard. The network layer software translates this application layer address into a network layer address. The network layer protocol used on the Internet is TCP/IP, so this Web address (www.cba.uga.edu) is translated into an TCP/IP address (usually just called an IP address for short) which is four bytes long when using IPv4 (e.g., 128.192.78.5). The network layer then determines the best route through the network to the final destination. Based on this routing, the network layer identifies the data link layer address of the next computer to which the message should be sent. If the data link layer is running Ethernet, then the network layer IP address would be translated into an Ethernet address (e.g., 00-0F-00-81-14-00). How is TCP different from UDP? TCP is a connection-oriented protocol. UDP is a connection-less protocol. What are the differences between connectionless and connection-oriented routing? Connection-oriented routing sets up a virtual circuit between the sender and receiver. In this case, a temporary virtual circuit is defined between the sender and receiver. The network layer makes one routing decision when the connection is established, and all packets follow the same route. All packets in the same message arrive at the destination in the same order in which they were sent. In this case, packets only need to contain information about the stream to which it belongs; sequence numbers are not needed, although many connection-oriented protocols include a sequence number to ensure that all packets are actually received. Connection-oriented routing has greater overhead than connectionless routing, because the sender must first “open” the circuit by sending a control packet that instructs all the intervening devices to establish the circuit routing. Likewise, when the transmission is complete, the sender must “close” the circuit. Connection-oriented protocols also tend to have more overhead bits in each packet. Connectionless routing means each packet is treated separately and makes its own way through the network. It is possible that different packets will take different routes through the network depending upon the type of routing used and the amount of traffic. Because packets following different routes may travel at different speeds, they may arrive out of sequence at their destination. The sender’s network layer therefore puts a sequence number on each packet, in addition to information about the message stream to which the packet belongs. The network layer must reassemble them in the correct order before passing the message to the application layer. How does TCP establish a session? TCP sets up a virtual circuit between the sender and the receiver. The transport layer software sends a special packet (called a SYN, or synchronization characters) to the receiver requesting that a connection be established. The receiver either accepts or rejects the connection, and together, they settle on the packet sizes the connection will use. Once the connection is established, the packets flow between the sender and the receiver, following the same route through the network. What is a subnet and why do networks need them? Each organization must assign the IP addresses it has received to specific computers on its networks. In general, IP addresses are assigned so that all computers on the same local area network have a similar address. For example, suppose a university has just received a set of Class B addresses starting with 128.184.x.x. It is customary to assign all the computers in the same LAN numbers that start with the same first three digits, so the Business School LAN might be assigned 128.184.56.x while the Computer Science LAN might be assigned 128.184.55.x (see Figure 6-8). Likewise, all the other LANs at the university and the backbone network that connects them, would have a different set of numbers. Each of these LANs are called a TCP/IP subnet because they are logically grouped together by IP number. Knowing whether a computer is on your subnet or not it very important for message routing. What is a subnet mask? While it is customary to use the last byte of the IP address to indicate different subnets, it is not required. Any portion of the IP address can be designated as a subnet by using a subnet mask. Every computer in a TCP/IP network is given a subnet mask to enable it to determine which computers are on the same subnet (i.e., LAN) as it is, and which computers are outside of its subnet. The subnet mask is a number that each routing device on a network can use to compare the routing packet to in order to determine if the packet stays in that portion or the network, or should be routed on to the next portion of the network. For example, a network could be configured so that the first two bytes indicated a subnet (e.g., 128.184.x.x) so all computers would be given a subnet mask giving the first two bytes as the subnet indicator. This would mean that a computer with an IP address of 128.184.22.33 would be on the same subnet as 128.184.78.90, and that the message stays within that network. On the other hand, if the subnet comparison shows that the message is not on that particular subnet, then the routing device will move the packets on in their journey. How does dynamic addressing work? With dynamic addressing, a server is designated to supply a network layer address to a computer each time the computer connects to the network. This is commonly done for client computers, but usually not done for servers. Instead of providing a network layer address in a configuration file, a special software package is installed on the client that instructs it to contact bootp or DHCP servers using data link layer addresses. This message asks the servers to assign the requesting computer a unique network layer address. The server runs a corresponding bootp or DHCP software package that responds to these requests and sends a message back to the client giving it its network layer address (and its subnet mask). What benefits and problems does dynamic addressing provide? The bootp or DHCP server can be configured to assign the same network layer address to the computer each time it requests an address (based on its data link layer address), or it can lease the address to the computer by picking the “next available” network layer address from a list of authorized addresses. Addresses can be leased for as long as the computer is connected to the network or for a specified time limit (e.g., two hours). When the lease expires, the client computer must contact the bootp or DHCP server to get a new address. Address leasing is commonly used by Internet service providers (ISPs) for dial-up users. Dynamic addressing greatly simplifies network management in non-dial-up networks too. With dynamic addressing, address changes need to be done only to the bootp or DHCP server, not each individual computer. The next time each computer connects to the network or whenever the address lease expires, it automatically gets the new address. What is address resolution? In order to send a message, the sender must be able to translate the application layer address (or server name) of the destination into a network layer address and in turn translate that into a data link layer address. This process is called address resolution. There are many different approaches to address resolution that range from completely decentralized (each computer is responsible for knowing all addresses) to completely centralized (there is one computer that knows all addresses). How does TCP/IP perform address resolution for network layer addresses? Server name resolution is the translation of application layer addresses into network layer addresses (e.g., translating an Internet address such as www.cba.uga.edu into an IP address such as 128.192.98.3). This is done using the Domain Name Service (DNS). Throughout the Internet there are a series of computers called name servers that provide DNS services. These name servers run special address databases that store thousands of Internet addresses and their corresponding IP addresses. These name servers are in effect the "directory assistance" computers for the Internet. Any time a computer does not know the IP number for a computer, it sends a message to the name server requesting the IP number. When TCP/IP needs to translate an application layer address into an IP address, it sends a special TCP-level packet to the nearest DNS server. This packet asks the DNS server to send the requesting computer the IP address that matches the Internet address provided. If the DNS server has a matching name in its database, it sends back a special TCP packet with the correct IP address. If that DNS server does not have that Internet address in its database, it will issue the same request to another DNS server elsewhere on the Internet. Once your computer receives an IP address it is stored in a server address table. This way, if you ever need to access the same computer again, your computer does not need to contact a DNS server. Most server address tables are routinely deleted whenever you turn off your computer. How does TCP/IP perform address resolution for data link layer addresses? To send a message to a computer in its network, a computer must know the correct data link layer address. In this case, the TCP/IP software sends a broadcast message to all computers in its subnet. A broadcast message, as the name suggests, is received and processed by all computers in the same LAN (which is usually designed to match the IP subnet). The message is a specially formatted TCP-level request using Address Resolution Protocol (ARP) that says “Whoever is IP address xxx.xxx.xxx.xxx, please send me your data link layer address.” The TCP software in the computer with that IP address then responds with its data link layer address. The sender transmits its message using that data link layer address. The sender also stores the data link layer address in its address table for future use. What is routing? Routing is the process of determining the route or path through the network that a message will travel from the sending computer to the receiving computer. Every computer that performs routing has a routing table developed by the network manager that specifies how messages will travel through the network. How does decentralized routing differ from centralized routing? With centralized routing, all routing decisions are made by one central host computer. Centralized routing is used typically only in host-based networks and in this case, routing decisions are rather simple. All computers are connected to the central computer by individual point-to-point circuits, so any message received is simply retransmitted on the point-to-point circuit connected to the destination. Decentralized routing allows all computers in the network make their own routing decisions following a formal routing protocol. In MANs and WANs, the routing table for each computer is developed by its individual network manager. Most decentralized routing protocols are self-adjusting, meaning that they can automatically adapt to changes in the network configuration (e.g., adding and deleting computers and circuits). What are the differences between connectionless and connection-oriented routing? Connectionless routing means each packet is treated separately and makes its own way through the network. It is possible that different packets will take different routes through the network depending upon the type of routing used and the amount of traffic. Because packets following different routes may travel at different speeds, they may arrive out of sequence at their destination. The sender’s network layer therefore puts a sequence number on each packet, in addition to information about the message stream to which the packet belongs. The network layer must reassemble them in the correct order before passing the message to the application layer. Connection-oriented routing sets up a virtual circuit between the sender and receiver. In this case, a temporary virtual circuit is defined between the sender and receiver. The network layer makes one routing decision when the connection is established, and all packets follow the same route. All packets in the same message arrive at the destination in the same order in which they were sent. In this case, packets only need to contain information about the stream to which it belongs; sequence numbers are not needed, although many connection-oriented protocols include a sequence number to ensure that all packets are actually received. Connection-oriented routing has greater overhead than connectionless routing, because the sender must first “open” the circuit by sending a control packet that instructs all the intervening devices to establish the circuit routing. Likewise, when the transmission is complete, the sender must “close” the circuit. Connection-oriented protocols also tend to have more overhead bits in each packet. What is a session? A session can be thought of as a conversation between two computers. When the sender wants to send a message, it first establishes a session with the destination computer. The sender then sends the data packets in order until all data has been sent. Then the session is ended. What is Quality of Service routing and why is it useful? Quality of service (QoS) routing is a special type of connection-oriented dynamic routing in which different messages or packets are assigned different priorities. For example, videoconferencing requires fast delivery of packet to ensure that the images and voices appear smooth and continuous; they are very time-dependent, because delays in routing will seriously affect the quality of the service provided. Email can have a low QoS, as it is not critical that it be delivered immediately to the destination. Compare and contrast unicast, broadcast, and multicast messages. The most common type of message in a network is the usual transmission between two computers. One computer sends a message to another computer (e.g., a client requesting a Web page). This is called a unicast message. In the situation of a broadcast message, the message is sent to all computers on a specific LAN or subnet. A third type of message called a multicast message is used to send the same message to a group of computers. Explain how multicasting works. Computers wishing to participate in a multicast (e.g., for videoconferencing) send a message to the sending computer or some other computer performing routing along the way using a special type of TCP-level packet called Internet Group Management Protocol (IGMP). Each multicast group is assigned a special Class D IP address to identify the group. Any computer performing routing knows to route all multicast messages with this Class D IP address onto the subnet that contains the requesting computer. The routing computer sets the data link layer address on multicast messages to a matching multicast data link layer address. Each requesting computer must inform its data link layer software to process incoming messages with this multicast data link layer address. When the multicast session ends (e.g., the videoconference is over), the client computer sends another IGMP message to the organizing computer or the computer performing routing to remove it from the multicast group. Explain how the client computer in Figure 5.14 (128.192.98.xx) would obtain the data link layer address of its subnet gateway. When a computer is installed on a TCP/IP network (or dials into a TCP/IP network), it knows the IP address of its subnet gateway. This information can be provided by a configuration file or via a bootp or DHCP server. However, the computer does not know the subnet gateway’s Ethernet address (data link layer address). Therefore, TCP would broadcast an ARP request to all computers on its subnet, requesting that the computer whose IP address is 128.192.98.1 to respond with its Ethernet address. All computers on the subnet would process this request, but only the subnet gateway would respond with an ARP packet giving its Ethernet address. The network layer software on the client would then store this address in its data link layer address table. How does HTTP use TCP and DNS use UDP? HTTP at the application layer would pass its message packet with overhead, including the Internet address of the destination, to the transport layer where TCP software would complete packetization at the Transport layer and hand it off to the Network layer. Domain Name Services, the Domain Name Server (aka DNS) is primarily responsible for translating IP Addresses into valid Domain Names and translating valid Domain Names into IP addresses. UDP is a connection-less transport layer protocol. DNS would pass either a Domain Name or an IP address along with its packet(s) to the Transport layer for forwarding to the Network layer to be routed to the destination. How does static routing differ from dynamic routing? When would you use static routing? When would you use dynamic routing? With static routing, the routing table is developed by the network manager, and changes only when computers are added to or removed from the network. For example, if the computer recognizes that a circuit is broken or unusable (e.g., after the data link layer retry limit has been exceeded without receiving an acknowledgment), the computer will update the routing table to indicate the failed circuit. If an alternate route is available, it will be used for all subsequent messages. Otherwise, messages will be stored until the circuit is repaired. When new computers are added to the network, they announce their presence to the other computers, who automatically add them into their routing tables. Static routing is commonly used in networks that have few routing options. For example, most LANs are connected to the backbone network in only one place. There is only one route from the LAN to the backbone, so static routing is used. Dynamic routing (or adaptive routing) is used when there are multiple routes through a network and it is important to select the best route. Dynamic routing attempts to improve network performance by routing messages over the fastest possible route, away from busy circuits and busy computers. An initial routing table is developed by the network manager, but is continuously updated by the computers themselves to reflect changing network conditions, such as network traffic. Routers can monitor outgoing messages to see how long they take to transmit and how long it takes for the receiving computer to acknowledge them. Based on this monitoring the router can effectuate table updating. What type of routing does a TCP/IP client use? What type of routing does a TCP/IP gateway use? Explain. The TCP/IP client uses static routing because the client must always point to a single gateway router. The TCP/IP gateway router uses dynamic routing because typically it must process multiple requests for routing beyond the single segment that it physically supports. What is the transmission efficiency of a 10-byte Web request sent using HTTP, TCP/IP, and Ethernet? Assume the HTTP packet has 100 bytes in addition to the 10-byte URL. Hint: Remember from Chapter 4 that efficiency = user data/total transmission size. Total user data = 10 bytes Total transmission size = 192 bytes Efficiency = User Data / Total transmission size 10/192 = .05 What is the transmission efficiency of a 1000 byte file sent in response to a web request HTTP, TCP/IP, and Ethernet? Assume the HTTP packet has 100 bytes in addition to the 1000-byte file. Hint: Remember from Chapter 4, that efficiency = user data / total transmission size. Total user data = 1000 bytes Total transmission size = 1171 bytes Efficiency = User Data / Total transmission size 1000/1171 = .85 What is the transmission efficiency of a 5000 byte file sent in response to a web request HTTP, TCP/IP, and Ethernet? Assume the HTTP packet has 100 bytes in addition to the 5000-byte file. Assume that the maximum packet size is 1200 bytes Hint: Remember from Chapter 4, that efficiency = user data / total transmission size. User data = 1200 bytes Transmission size = 1223 bytes Efficiency = 1200/1223 = .98  (.98) * 4 = 3.92 User data = 271 bytes Transmission size = 1223 bytes Efficiency = 271/1223 = .22 Total transmission efficiency = (3.92 + .22) / 5 = .828  .83 Describe the anatomy of a router. How does a router differ from a computer? A router consists of a CPU, memory, and ports or interfaces. A router differs from a computer because they are diskless and they don’t come with a monitor, keyboard or mouse. Mini-cases I. Central University How would you assign the IP addresses to the various subnets? You will have to make some assumptions to answer both questions below, so be sure to state your assumptions. Let’s assume, the university would be getting a legal Class B IP address range. Further assume that there would be a unit or department responsible for managing IP address assignment, operation and maintenance. One approach would be to employ sub-netting in a manner that assigns the third OCTET to the individual colleges, staff departments and dormitories. The remaining OCTET can be used to facilitate IP address assignment to individual hosts within the resulting address range. How would you control the process by which IP addresses are assigned to individual computers? Assuming the university had a server or server process in place in support of each subnet, they could run dynamic host configuration protocol to assign IP addresses automatically to individual computers on startup. In this way the need for visiting each computer to maintain IP address assignment is eliminated. II. Connectus Connectus currently uses RIP as its routing protocol, but is considering moving to OSPF. Should it stay with RIP or move to OSPF? Why? Migrating from RIP to the OSPF protocol is the right choice. Although RIP is supported by TCP/IP and IPX/SPX, OSPF is much more efficient and is much more flexible. As an ISP provider, Connectus must be able to support and route high levels of traffic utilizing the shortest path. Thus, Open Shortest Path First (OSPF). III. Old Army Old Army currently uses RIP as its routing protocol, but is considering moving to OSPF. Should it stay with RIP or move to OSPF? Why? Old Army should continue using the RIP protocol, as their 1000 stores are maintained through a hub and spoke environment. Since Old Army utilize their LAN and WAN for internal purposes (i.e. batch transaction, financial, inventory, and email) the need is somewhat consistent and really does not warrant the OSPF flexibility. Thus, moving to the OSPF would be an over kill and the added functionality would not be used. IV. General Stores General Stores currently uses RIP as its routing protocol, but is considering moving to OSPF. Should it stay with RIP or move to OSPF? Why? Answer: General Stores should migrate to the OSPF protocol. The General Stores network is used for their internal business processes (i.e. payroll, inventory, and email); however, they also use it for external use (i.e. credit card processing) and they are considering adding telephone traffic. With the external functionality, the General Stores will need to migrate to a protocol that will support its growth. Next Day Air Service Case Study Review the topics in this chapter. Prepare an agenda for your training session. The agenda should be an outline, showing topics and subtopics with enough detail to allow the reader to follow. Remember Bob Jones' advice on what the management and staff will want and expect from your session. The agenda for the training session should follow this chapter’s topics and material. Here is a model outline: INTRODUCTION Network Layer NETWORK PROTOCOLS Transmission Control Protocol/Internet Protocol (TCP/IP) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) X.25 Systems Network Architecture (SNA) ADDRESSING Assigning Addresses Address Resolution ROUTING Static Routing Dynamic Routing Connectionless versus Connection-Oriented Routing Multicasting TCP/IP EXAMPLE Known Addresses, Same Subnet Known Addresses, Different Subnet Unknown Addresses Jones calls to warn you that the new manager of International Services, Sally Wong, will be present at the training session. She wants to be sure any new data communications system will be able to handle international messaging. Bob suggests that you include material in the session on how adherence to standards can ensure smooth integration of the NDAS data communication with overseas systems. You agree. Present a review of standards and standardizing groups for data communications. Which standards do you consider most important for NDAS? Be prepared to defend your view. a. The primary purpose of a standard is to ensure that hardware and software produced by different vendors can work together, by defining the interfaces between each layer, station, or node of a network. b. The two most important standards-making bodies with regard to data communications are the International Organization for Standardization (ISO), which makes technical recommendations about data communication interfaces and the International Telecommunications Union. The membership of the ISO is comprised of the national standards organizations of each ISO member country. The International Telecommunications Union - Telecommunications Standardization Sector (ITU-TSS) - The Telecommunications Standardization Sector (ITU-TSS) is the technical standards-setting organization of the United Nations International Telecommunication Union (ITU). It is comprised of representatives from over 150 national Postal Telephone and Telegraphs (PTTs), private telecommunications agencies, as well as industrial and scientific organizations. ISO is a member of ITU-TSS. NDAS strictly adheres to these standards to ensure interfacing with overseas networks. c. The following are other key standardizing organizations and standards. Again, NDAS strictly adheres to these standards to ensure network interfacing. American National Standards Institute (ANSI) Institute of Electrical and Electronics Engineers (IEEE) Electronic Industries Association (EIA) National Institute of Standards and Technology (NIST) National Exchange Carriers Association (NECA) Electronic Data Interchange (EDI) Jones also reminds you that he needs a straightforward, simple, and understandable explanation of the Internet TCP/IP protocol. Prepare a bullet chart that describes the key concepts of TCP/IP. Key concepts of TCP/IP are: 1. The Transmission Control Protocol Internet Protocol (TCP/IP) probable is the oldest networking standard. 2. It was developed for the U.S. Department of Defense’s Advanced Research Project Agency NETwork (ARPANET) in the 1970’s. 3. It is the most popular network protocol, used by almost 50% of all installed backbone, metropolitan, and wide area networks. 4. TCP/IP allows reasonably efficient and error-free transmission between different systems. 5. TCP/IP can send large files of information across sometimes unreliable networks with great assurance that the data will arrive in an uncorrupted form. 6. TCP/IP has two parts: TCP - which does the following: breaks the data into smaller packets, numbers them, ensures that each packet is reliably delivered, and puts them in the proper order upon receipt. IP does the following: routes and addresses packets. IP software is used at each of the intervening computers through which the message passes to route the message to the final destination. IP can use either static routing (RIP) or dynamic routing (OSPF) to make routing decisions. TCP software only needs to be active at the sender and the receiver, because TCP is only involved when data comes from or goes to the process layer. TCP/IP can operate either as connection-oriented or connectionless routing. 11. TCP/IP will support a variety of data link protocols but is typically combined with ethernet. Additional Content Teaching Notes This chapter combines coverage of two of the more significant layers of the OSI Model, Network and Transport layers, including addressing and the major aspects of Routing. For these reasons it is necessary to spend about 4-6 hours covering this chapter. My goal in teaching about network layer protocols is to drive home (again) the fact that there are different packets used by the different software at the different layers in a network and to show that network layer addresses are used at this layer, not data link layer addresses. Moreover, it is important to distinguish that IPv4 is dominant, but within a few years IPv6 will likely enter widespread use. This is an area that bears watching. Internet addressing is the start of understanding how all the upper layers of the OSI Model fit together so I spend a lot of time on it – subnets, and address resolution in particular, and possibly network address translation if one has time. Routing gets less time. I spend a good hour going through a series of detailed examples of how TCP/IP works. In my opinion, the “protocol wars” are over and TCP/IP has won, so I devote a lot of time to it. The Internet is always a source of interest to the students so they are motivated to learn this material. I view this section as one of the most important in the entire course Solution Manual for Business Data Communications and Networking Jerry FitzGerald , Alan Dennis , Alexandra Durcikova 9781118891681, 9781118086834

Document Details

Related Documents

Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right