... 0b d4 6d 00 00 04 3b 8c 28 28 20
0d 00 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15
16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25
26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35
36 37
d Octets ... 26 44)
Internetworking With TCP/ IP vol 1 Part 1
21 20 05
Why Study TCP/ IP?
d The Internet is everywhere
d Most applications are distributed
Internetworking With TCP/ IP vol 1 Part 1
8 20 05
Summary
d TCP/ IP is ... is 02. 07.01.00 .27 .ba
d Source is 08.00.2b.0d.44.a7
d Frame type is 08.00 (IP)
Internetworking With TCP/ IP vol 1 Part 2 18 20 05
Remainder Of This Section
d History of Internet protocols (TCP/ IP)
d...
... Speed Backbone (vBNS)
45
2. 11 Other Technologies Over Which TCPIIP Has Been Used
46
2. 12 Summary And Conclusion
50
Chapter
3
Internetworking Concept And Architectural Model
Introduction ... class="bi x0 y0 w2 h4" alt=""
... because it allowed programmers to use
TCPIIP protocols with
little effort. Thus, it encouraged researchers to experiment with
TCPm.
The success of the TCP/ IP technology and the Internet among ... Technologies
Other Books In the Internetworking Series
from Douglas Comer and Prentice
Hall
Internetworking With TCP/ IPVolume
11:
Design, Implementation, and
Internals (with David Stevens),
3rd ... algorithm interacts with the Partridge-Kam exponential retransmission
backoff algorithm and how routing updates interact with datagram forwarding.
Internetworking With TCP/ IPVolume 111: Client-Server...
... site that use
TCP/ IP.
1 .2
Plot the growth of
TCP/ IP
technology and Internet access at your organization. How many
computers, users, and networks were connected each year?
13
TCPm
products ...
operations.
1
.I
1
Organization Of The Text
The material on TCPAP has been written in three volumes. This volume presents
the TCPIIP technology, applications that use it, and the architecture ... that the growth had reached 15% per month. By
20 00,
the
global Internet reached over 50 million computers in
20 9
countries.
Early adoption of TCP/ IP protocols and growth of the Internet has...
... associated with the computers at-
tached to the network. Each Ethemet cable is about
1 12
inch in diameter and up to
500
22
Review
Of
Underlying Network Technologies
Chap.
2
puter. ... communicate by sending signals to a satellite orbiting the
earth.
20 Review
Of
Underlying Network Technologies
Chap.
2
2. 3.1
Network Hardware Addresses
Each network hardware technology ... examples of
hardware addressing schemes; later chapters explain how
TCP/ IP accommodates diverse
hardware addressing schemes.
2. 4
Ethernet Technology
Ethemet
is the name given to a popular...
... Computers attach to the cables on each
floor.
2. 4. 12 Extending An Ethernet With Bridges
Connecting two Ethernets with a bridge is superior to connecting them with a re-
peater or hub because bridges ... network. The table
in Figure
2. 1
1
lists fields in an FDDI frame.
Field
PA
SD
FC
DA
SA
RI
DATA
FCS
ED
FS
Length in
4-bit units
4 or more
2
2
4or 12
4or 12
0
to
60
0
or more ...
2
2. 5.1
Properties
Of
An FDDI Network
An
FDDI network is a
100
Mbps shared token passing ring technology with a
self-healing capability.
An
FDDI network is
shared
because multiple...
... There is no mathematical rela-
tionship between such addresses and the addresses used by TCP/ IP. Thus, a computer
that tunnels TCP/ IP data across an X .25 network must maintain a table of mappings ... may find
X25NET
strange because public services use the
CCITT X .25
protocols exclusively while the In-
ternet uses
TCP/ IP
protocols. Unlike most packet switching hardware,
X .25
protocols ... and
X25NET
illustrates how
TCPW
has been adapted to use high level
facilities. The technique, sometimes called
tunneling,
simply means that
TCPIIP
treats
a complex network system with...
... 51.840 Mbps
81 0
STS-3
OC-3 155. 520 Mbps
24 30
STS- 12
OC- 12 622 .080 Mbps
9 720
STS -24 OC -24
1 ,24 4.1 60
Mbps 19440
STS-48 OC-48
2, 488. 320 Mbps 38880
Figure
2. 17
Example
data
rates of ...
the TCP/ IP protocols
52
Review
Of
Underlying Network Technologies
Chap.
2
2. 6
What characteristic of a satellite communication channel is most desirable? Least desir-
able?
2. 7
Find ...
tain contact with a mobile unit while transferring a stream of packets.
2. 1 2
Summary And Conclusion
We have reviewed several network hardware technologies used by the TCPIIP pro-
tocols,...
... more than 21 6 (i.e., 65,536) hosts, devote
7
bits to netid and 24 bits to hostid.
Class
B
addresses, used for intern~ediate size networks that have between 28 (i.e., 25 6)
and 21 6 hosts, ... of a start-
up procedure before it learns its
IP
address or the IP address prefm for the local net-
work. Once the host learns the correct IP address for the local network, however, it
should ...
ad-
dresses, used for networks that have less than 28 hosts, allocate 21 bits to the netid and
only
8
bits to the hostid. Note that the
IP
address was originally defined in such a way
that...
... classful scheme
provides for
127
networks with over a million hosts each, thousands of networks with
thousands of hosts each, and over a million networks with up to 25 4 hosts each. To
make such ... has responsibility for assigning unique network addresses within its TCP/ IP in-
ternet. Indeed, many corporate groups that use TCP/ IP protocols do assign internet ad-
dresses on their own. ... routing is efficient.
An
important property of
IP
ad-
dresses is that they refer to network connections. Hosts with multiple connections have
multiple addresses. One advantage of the internet...
... computer with the
IP
address
1 92. 5.48.3
because
1 92. 5.48.3
is a class
C
address with the host portion equal to
3.
For networks like proNET, computing a physical address from an
IP
address ... dynamic resolution with
ARP
is simple:
when host
A
wants to resolve
IP
address
ZB,
it broadcasts a special packet that asks the
host with
IP
address
le
to respond with its physical ... is given by Plummer
[RFC
826 1
and has
become a TCPAP internet protocol standard. Dalal and Printis
[I9811
describes the re-
lationship between Ethernet and
IP
addresses, and Clark
[RFC...
... packets can be discarded. IP is such a fundamental part of the design that a
TCP/ IP internet is sometimes called an
IP- based technology.
We begin our consideration of IP in this chapter by looking ... each machine using TCP/ IP is assigned one or more
32- bit
IP
addresses that are independent of the machine's hardware addresses. Applica-
tion programs always use the IP address when specifying ... fundamental principle of connectionless
delivery and discusses how it is provided by the
Internet
Protocol (IP) , which is one of
the two major protocols used in internetworking (TCP being the...