Download Downlaod File

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Zigbee wikipedia , lookup

Distributed firewall wikipedia , lookup

AppleTalk wikipedia , lookup

TCP congestion control wikipedia , lookup

Net bias wikipedia , lookup

Network tap wikipedia , lookup

RapidIO wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

CAN bus wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Zero-configuration networking wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Packet switching wikipedia , lookup

Deep packet inspection wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
MISY 3312
Mansour Alrammah
201001339
Q1/
A subnet is a logical grouping of connected network devices. Nodes on a subnet tend to
be located in close physical proximity to each other on a LAN. Network designers employ
subnets as a way to partition networks into logical segments for greater ease of administration.
When subnets are properly implemented, both the performance and security of networks can be
improved. In Internet Protocol (IP) networking, devices on a subnet share contiguous ranges of
IP address numbers. A mask (known as the subnet mask or network mask) defines the
boundaries of an IP subnet. The correspondence between subnet masks and IP address ranges
follows defined mathematical formulas. IT professionals use subnet calculators to map between
masks and addresses.
Q2/
Routing is an umbrella term for the set of protocols that determine the path that data
follows in order to travel across multiple networks from its source to its destination. Data is
routed from its source to its destination through a series of routers, and across multiple networks.
The IP Routing protocols enable routers to build up a forwarding table that correlates final
destinations with next hop addresses. When an IP packet is to be forwarded, a router uses its
forwarding table to determine the next hop for the packet's destination (based on the destination
IP address in the IP packet header), and forwards the packet appropriately. The next router then
repeats this process using its own forwarding table, and so on until the packet reaches its
destination. At each stage, the IP address in the packet header is sufficient information to
determine the next hop; no additional protocol headers are required.
In the routing of messages from one internet module to another, datagrams may need to traverse
a network whose maximum packet size is smaller than the size of the datagram. To overcome
this difficulty, a fragmentation mechanism is provided in the internet protocol.
Q3/
- Application Layer: Where a Communication Originates.
-Transport Layer: Where Data Encapsulation Begins.
-Internet Layer: Where Packets Are Prepared for Delivery.
-Data-Link Layer: Where Framing Takes Place.
-Physical Network Layer: Where Frames Are Sent and Received.
-The packet's history begins when a user on one system sends a message or issues a
command that must access a remote system. The application protocol formats the packet so that
the appropriate transport layer protocol, TCP or UDP, can handle the packet. Suppose the user
issues an rlogin command to log in to the remote system. The rlogin command uses the TCP
transport layer protocol. TCP expects to receive data in the form of a stream of bytes that contain
the information in the command. Therefore, rlogin sends this data as a TCP stream. When the
data arrives at the transport layer, the protocols at the layer start the process of data
encapsulation. The transport layer encapsulates the application data into transport protocol data
units. The transport layer protocol creates a virtual flow of data between the sending and
receiving application, differentiated by the transport port number. The port number identifies a
port, a dedicated location in memory for receiving or sending data. In addition, the transport
protocol layer might provide other services, such as reliable, in order data delivery. The end
result depends on whether TCP, SCTP, or UDP handles the information. The transport protocols
TCP, UDP, and SCTP pass their segments and packets down to the Internet layer, where the IP
protocol handles the segments and packets. IP prepares them for delivery by formatting them
into units called IP datagrams. IP then determines the IP addresses for the datagrams, so that they
can be delivered effectively to the receiving host. Data-link layer protocols, such as PPP, format
the IP datagram into a frame. These protocols attach a third header and a footer to “frame” the
datagram. The frame header includes a cyclic redundancy check (CRC) field that checks for
errors as the frame travels over the network media. Then, the data-link layer passes the frame to
the physical layer. The physical network layer on the sending host receives the frames and
converts the IP addresses into the hardware addresses appropriate to the network media. The
physical network layer then sends the frame out over the network media.
http://compnetworking.about.com/od/workingwithipaddresses/g/bldef_subnet.htm
http://network-technologies.metaswitch.com/ip-routing-unicast/what-is-ip-routing.aspx
http://tools.ietf.org/html/rfc760
http://docs.oracle.com/cd/E19082-01/819-3000/ipov-29/index.html