... 7 .2 General form of an IP datagram, the TCP/ IP analogy to a network frame. IP specifies the header format including the source and destination IP addresses. IP does not specify the ... data go undetected. Fields SOURCE IP ADDRESS and DESTINATION IP ADDRESS contain the 32- bit IP addresses of the datagram's sender and intended recipient. Although the datagram may ... header extends to an exact multiple of 32 bits (recall that the header length field is specified in units of 32- bit words). 7.8 Internet Datagram Options The IP OPTIONS field following the
Ngày tải lên: 04/07/2014, 22:21
... directly to multiple networks. Both hosts and routers participate in routing an IP datagram to its destination. When an application program on a host attempts to communicate, the TCPJIP protocols ... is to make IP routing decisions. What about multi-homed hosts? Any computer with multiple network connections can act as a router, and as we will see, multi-homed hosts running TCPJIP have all ... you have access to an implementation of IP, revise it and test your locally available im- plementations of IP to see if they reject IP datagrarns with an out-of-date version number.
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P16 potx
... algorithm used with classless IP addresses. 122 Internet Protocol: Routing IP Datagrams Chap. 8 Algorithm: RouteDatagram (Datagram, RoutingTable) Extract destination IP address, D, from the ... specify the IP address of the original source and the IP address of the ultimate destination?. When IP executes the routing algorithm, it selects a new IP address, the IP address of ... host may have multiple physical connec- tions, each with its own IP address. When an IP datagram arrives, the machine must compare the destination internet address to the IP address for each
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P20 pptx
... assign another block 128 .21 1.176 .21 2 129 , which covers the address range that Figure 10. 12 specifies. Dotted Decimal 32- bit Binary Equivalent lowest 128 .21 1 .l76 .21 2 10000000 11 01 001 ... 001 1 101 10000 11 01 01 00 highest 128 .21 1.176 .21 5 10000000 1101001 1 101 10000 110101 11 Figure 10. 12 An example of CIDR block 128 .21 1.176 .21 2 129 . The use of an arbitrary bit mask ... Extensions (CIDR) Chap. 10 Dotted Decimal 32- bit Binary Equivalent lowest 128 .21 1.1 68.0 1 0000000 1 101 001 1 101 01 000 00000000 highest 128 .21 1.175 .25 5 10000000110100111010111111111111 Figure
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P21 pptx
... provides an example. Prefix 128 .1 0.0.0 I 16 128 .1 0 .2. 0 124 128 .10.3.0 124 128 .1 0.4.0 124 128 .1 0.4.3 1 32 128 .1 0.5.0 124 128 .10.5.1 1 32 Next Hop 10.0.0 .2 10.0.0.4 10.1.0.5 10.0.0.6 ... 1 72. 161 12 1 72. 1 6.0.0 1 72. 31 .25 5 .25 5 1 92. 1681 16 1 92. 1 68.0.0 1 92. 1 68 .25 5 .25 5 169 .25 4 1 16 169 .25 4.0.0 169 .25 4 .25 5 .25 5 Figure 10.16 The prefmes reserved for use with private internets not ... 169 .25 4/16, is unusual because it is used by systems that autoconfigure IP addresses. Prefix Lowest Address Highest Address 1018 10.0.0.0 10 .25 5 .25 5 .25 5 1 72. 161 12 1 72. 1 6.0.0 1 72. 31 .25 5 .25 5
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P23 ppt
... layered structure. 11.1 1 The Basic Idea Behind Multiplexing And Demultiplexing Communication protocols use techniques of multiplexing and demultiplexing throughout the layered hierarchy. When ... contents. Multiplexing and demultiplexing occur at almost every protocol layer. For exam- ple, after the network interface demultiplexes frames and passes those frames that con- tain IP datagrams ... IP module, the IP software extracts the datagram and demulti- plexes further based on the transport protocol. Figure 11.11 demonstrates demultiplex- ing at the Internet layer. A Demultiplexing
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P24 pot
... speed with messages of 25 6, 5 12, 1 024 , 20 48, 4096, and 81 92 bytes. Can you explain the results (hint: what is your network MTU)? 12. 2 Why is the UDP checksum separate from the IP checksum? ... the IP header, assemble them into the pseudo-header format, and recompute the checksum. Sec. 12. 5 UDP Pseudo-Header 20 1 SOURCE IP ADDRESS DESTINATION IP ADDRESS Figure 12. 2 The 12 ... from IP. 12. 8 UDP Multiplexing, Demultiplexing, And Ports We have seen in Chapter 11 that software throughout the layers of a protocol hierarchy must multiplex or demultiplex among multiple
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P26 ppsx
... multiple connections to share an endpoint. For example, we could add another connec- tion to the two listed above from machine ( 128 .2. 254.139) at CMU to the machine at Purdue: ( 128 .2. 254.139, ... ( 128 .2. 254.139, 1184) and ( 128 .10 .2. 3, 53). It might seem strange that two connections can use the TCP port 53 on machine 128 .10 .2. 3 simultaneously, but there is no ambiguity. Because TCP associates incom- ... times, TCP computes an elapsed time known as a sample round trip time or round trip sample. Whenever it obtains a new round trip sample, TCP adjusts its notion of the average round trip
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P27 pptx
... round trip time is slightly longer than some multiple of T. Implementations of TCP that associate acknowledgements with the most recent re- transmission have been observed in a stable state with ... values in the table are equivalent to using y =2. 23 0 Reliable Stream Transport Service (TCP) Chap. 13 TCP recomputes the round trip estimate and resets the timeout accordingly. Experience ... successive packets arrive without retransmission. 10 2 8s 6s Time 4s 2s Reliable Stream Transport Service (TCP) Chap. 13 I I I I I I I I I I I) 10 20 30 40 50 60 70
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P29 ppt
... 24 8 Reliable Stream Transport Service (TCP) Chap. 13 13. 32. 3 Send-Side Silly Window Avoidance The heuristic a sending TCP uses to avoid silly window syndrome ... data with each call. Thus, the outgoing TCP buffer be- gins with sufficient data for at least one maximum size segment. Furthermore, because the application produces data faster than TCP can ... packet loss will TCP retransmit significant volumes of data unnecessarily? Lost TCP acknowledgements do not necessarily force retransmissions. Explain why. Experiment with local machines
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P31 docx
... 2 Net 4 Net 17 Net 24 Net 30 Net 42 Distance 0 0 8 5 6 2 2 (a> Route Destination direct Net 1 direct - Net4 Router L Net 17 Router M - Net 21 Router J Net 24 ... longer part of the TCPJIP standards$, it does provide a concrete example of distance-vector routing. GGP was designed to travel in IP da- tagrams similar to UDP datagrams or TCP segments. Each ... adopted the term IP router, scientists originally used the term IP gateway. $The IETF has declared GGP historic, which means that it is no longer recommended for use with TCPAP. Sec.
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P32 pps
... Figure 15 .2 shows an example that will illustrate the concept. Q- router participating Local Net 1 (I) Local Net 2 Figure 15 .2 An example of multiple networks and routers with a ... participating participating router router nonparticipating router Figure 15.1 An architecture that can cause the extra hop problem. Nonop- timal routing occurs when a nonparticipating ... the problem can occur whenever a nonparticipating router uses a participating router for delivery. To see why, consider the example in Figure 15.1. 27 2 Routing: Exterior Gateway Protocols And
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P33 doc
... from the message. Field WITHDRAWN LEN is a 2- octet field that specifies the size of the Withdrawn Destinations field that follows. If no destinations are being with- drawn, WlTHDRAWN LEN ... associated with new destinations being advertised. If there are no new destinations, the PATH LEN field contains zero. Sec. 15.13 BGP UPDATE Message 28 1 0 16 31 WITHDRAWN LEN 1 I Withdrawn ... the Withdrawn Destinations and the Destination Networks fields contain a list of IP network addresses. To accommodate classless addressing, BGP must send an ad- dress mask with each IP
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P35 pps
... addresses used with CIDR. When version 2 of RIP (RIP2) was defined, the protocol was extended to include an explicit subnet mask along with each address. In addition, RIP2 updates in- ... result, RIP2 offers siWcantly increased functionality as well as improved resistance to errors. 16.3.8 RIP2 Message Format The message format used with RIP2 is an extension of the RIP1 format, ... use by TCPJIP; it can be used with multiple net- work protocol suites. As Figure 16.5 shows, each network address reported by RIP can have an address of up to 14 octets. Of course, IP addresses
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP IP vol i
... A TCP Connection 23 7 13 .24 Initial Sequence Numbers 23 9 13 .25 Closing a TCP Connection 23 9 13 .26 TCP Connection Reset 24 1 13 .27 TCP State Machine 24 1 13 .28 Forcing Data Delivery 24 3 ... 22 .1 7 Obtaining And Setting The Internal Host Domain 427 22 .1 8 Socket Library Calls 427 22 .19 Network Byte Order Conversion Routines 428 22 .20 IP Address Manipulation Routines 429 ... 22 .21 Accessing The Domain Name System 431 22 .22 Obtaining Information About Hosts 4 32 22 .23 Obtaining Information About Networks 433 22 .24 Obtaining Information About Protocols 434 22 .25 ...
Ngày tải lên: 19/03/2014, 13:35
Internetworking with TCP/IP- P1 ppt
... Speed Backbone (vBNS) 45 2. 11 Other Technologies Over Which TCPIIP Has Been Used 46 2. 12 Summary And Conclusion 50 Chapter 3 Internetworking Concept And Architectural Model Introduction ... class="bi x0 y0 w2 h4" alt=""
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P2 pps
... 22 .20 IP Address Manipulation Routines 429 22 .21 Accessing The Domain Name System 431 22 .22 Obtaining Information About Hosts 4 32 22 .23 Obtaining Information About Networks 433 22 .24 ... Addresses 422 22 . 12 Obtaining And Setting Socket Options 423 22 .13 Specifying A Queue Length For A Server 424 22 .14 How A Server Accepts Connections 424 22 .15 Servers That Handle Multiple Services ... 425 22 .16 Obtaining And Setting Host Names 426 22 .1 7 Obtaining And Setting The Internal Host Domain 427 22 .1 8 Socket Library Calls 427 22 .19 Network Byte Order Conversion Routines 428 ...
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P3 doc
... (SMTP) 518 27 .10 Mail Retrieval And Mailbox Manipulation Protocols 27 .1 1 The MIME Extension For Non-ASCII Data 522 27 . 12 MIME Multipart Messages 523 27 .13 Summary 524 Chapter 28 Applications: ... Wide Web (HTTP) 28 .1 Introduction 527 28 .2 Importance Of The Web 527 28 .3 Architectural Components 528 28 .4 Uniform Resource Locators 528 28 .5 An Example Document 529 28 .6 Hypertext ... Chapter 32 Internet Security And Firewall Design (IPsec) 32. 1 Introduction 58 1 32. 2 Protecting Resources 5 82 32. 3 Information Policy 583 32. 4 Internet Security 583 32. 5 IP Security (IPsec)...
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P4 potx
... because it allowed programmers to use TCPIIP protocols with little effort. Thus, it encouraged researchers to experiment with TCPm. The success of the TCP/ IP technology and the Internet among ... Technologies Other Books In the Internetworking Series from Douglas Comer and Prentice Hall Internetworking With TCP/ IP Volume 11: Design, Implementation, and Internals (with David Stevens), 3rd ... algorithm interacts with the Partridge-Kam exponential retransmission backoff algorithm and how routing updates interact with datagram forwarding. Internetworking With TCP/ IP Volume 111: Client-Server...
Ngày tải lên: 04/07/2014, 22:21
Internetworking with TCP/IP- P5 pps
... site that use TCP/ IP. 1 .2 Plot the growth of TCP/ IP technology and Internet access at your organization. How many computers, users, and networks were connected each year? 13 TCPm products ... operations. 1 .I 1 Organization Of The Text The material on TCPAP has been written in three volumes. This volume presents the TCPIIP technology, applications that use it, and the architecture ... that the growth had reached 15% per month. By 20 00, the global Internet reached over 50 million computers in 20 9 countries. Early adoption of TCP/ IP protocols and growth of the Internet has...
Ngày tải lên: 04/07/2014, 22:21
Bạn có muốn tìm thêm với từ khóa: