+ All Categories
Home > Documents > Introduction Types of network Network principles Internet protocols Network case studies:

Introduction Types of network Network principles Internet protocols Network case studies:

Date post: 11-Feb-2016
Category:
Upload: morty
View: 61 times
Download: 0 times
Share this document with a friend
Description:
Chapter 3: Networking and Internetworking. Introduction Types of network Network principles Internet protocols Network case studies: Ethernet, wireless LAN and ATM Summary. Network performance measures l = length of signal path in communication medium (metres) - PowerPoint PPT Presentation
54
• Introduction Types of network Network principles Internet protocols Network case studies: Ethernet, wireless LAN and ATM • Summary Chapter 3: Networking and Internetworking
Transcript
Page 1: Introduction Types of network Network principles Internet protocols Network case studies:

• Introduction• Types of network• Network principles• Internet protocols• Network case studies:

Ethernet, wireless LAN and ATM• Summary

Chapter 3: Networking and Internetworking

Page 2: Introduction Types of network Network principles Internet protocols Network case studies:

Network performance measures• l = length of signal path in communication medium (metres)• v = signal propagation speed in the medium (metres/second)• L = average length of frame or packet (bits)• C = transmission rate (bits/second)• Propagation delay = l / v , in seconds• shows how long a bit takes to propagate along the path• Transmission time = L / C , in seconds• shows how long it takes to get packet onto the medium• Throughput: how fast data can pass a certain point• can be measured in bits/second, packets/second, …• Efficiency is related to throughput, e.g.• efficiency = throughput (in packets/sec) * packet transmission

time

Revision on Networking

Page 3: Introduction Types of network Network principles Internet protocols Network case studies:

Consider an optical fibre 3000 km long with transmitter transmitting at 1.5 Gbps (1 Gbps = 1 000 000 000 bps). The signal propagation speed in optical fibre is approximately 200 000 km/sec. Suppose packet switching is being used with a packet length of 2000 bits.

• What is the bit propagation delay along the fibre ?• What is the packet transmission time here ?• How many packets have been transmitted and are propagating over the fibre when the first bit reaches the destination ?

Ex1

Page 4: Introduction Types of network Network principles Internet protocols Network case studies:

• Consider a route in a store-and-forward network goingthrough 8 intermediate nodes. The packets contain 1000 bits and are transmitted at 64 kbps. Assume propagation delays over the links are negligible. As a packet travels along the route, it encounters an average of 5 packets when it arrives at each node. How long does it take forthe packet to get to the receiver if the nodes transmit on a “first come first served” basis ?

• At each intermediate node, 6 packets must be transmitted in order for “our” packet to be transmitted: our packet finds 5 packets ahead of it, which will be transmitted first due to the “first come first served” policy.

• What is the bit propagation delay along the fibre ?• What is the packet transmission time here ?• How many packets have been transmitted and are propagating over the fibre when the first bit reaches the destination ?

Ex2

Page 5: Introduction Types of network Network principles Internet protocols Network case studies:

150 nodes are connected to a 1000 metre length of coaxialcable. Using some (unspecified) protocol, each node cantransmit 70 frames/second, where each frame is 1000 bitslong. The transmission rate at each node is 100 Mbps.• What is the per-node throughput ?• What is the total throughput (of the 150 nodes) ?• What is the efficiency of this protocol ?

Ex3

Page 6: Introduction Types of network Network principles Internet protocols Network case studies:

• Internetwork – integrate many subnets that use different network

technologies

• Requirements– Unified internetwork addressing scheme that enables packets

to be addressed to any host connected to any subnet– A protocol defining the format of internetwork packets and

giving rules according to which they are handled– Interconnecting components that route packets to their

destinations in terms of internetwork addresses, transmitting the packets using subnets with a variety of network technologies

Internetworking

Page 7: Introduction Types of network Network principles Internet protocols Network case studies:

• Internetwork – integrate many subnets that use different network

technologies

• Requirements– Unified internetwork addressing scheme that enables packets

to be addressed to any host connected to any subnet– A protocol defining the format of internetwork packets and

giving rules according to which they are handled– Interconnecting components that route packets to their

destinations in terms of internetwork addresses, transmitting the packets using subnets with a variety of network technologies

Internetworking

Page 8: Introduction Types of network Network principles Internet protocols Network case studies:

• Router– Conduct routing, additionally link networks of different types

• Bridge– link networks of different types, but not conduct routing

• Hub– Connect hosts and extend segments of Ethernet and other

broadcast local network

• Switch– Perform similar function to router, but for LANs only

Internetworking components

Page 9: Introduction Types of network Network principles Internet protocols Network case studies:

• Introduction• Types of network• Network principles• Internet protocols• Network case studies: Ethernet, wireless

LAN and ATM• Summary

Chapter 3: Networking and Internetworking

Page 10: Introduction Types of network Network principles Internet protocols Network case studies:

• Protocol layers (n1)– TCP(UDP)/IP,(n2) web [HTTP], Email [SMTP,POP], news

[NNTP], FTP, SSL, etc

• Exceptions to the universal adoption of TCP/IP– The use of WAP for wireless applications on portable

devices– Special protocols to support multimedia streaming

applications• Heterogeneous underlying networks support

– The success of TCP/IP: independence of the underlying transmission technology (n3)

– E.g., IP over ATM, IP over Ethernet, IP over PPP, etc

Internet protocols

Page 11: Introduction Types of network Network principles Internet protocols Network case studies:

Internet protocol layers

Messages (UDP) or Streams (TCP)

Application

Transport

Internet

UDP or TCP packets

IP datagrams

Network-specific frames

MessageLayers

Underlying network

Network interface

Page 12: Introduction Types of network Network principles Internet protocols Network case studies:

• Schemes for naming and addressing hosts and for routing IP packets to their destination is challenging.

• Requirement:– It must be universal– It must be efficient– The addressing scheme must lend itself to the development of

routing scheme• The scheme

– A 32-bit numeric identifier containing a network identifier and a host identifier

– There are four allocated classed of Internet address-A,B,C,D

IP addressing

Page 13: Introduction Types of network Network principles Internet protocols Network case studies:

Internet address structure

7 24

Class A: 0 Network ID Host ID

14 16

Class B: 1 0 Network ID Host ID

21 8

Class C: 1 1 0 Network ID Host ID

28

Class D (multicast): 1 1 1 0 Multicast address

27

Class E (reserved): 1 1 1 1 unused0

28

Page 14: Introduction Types of network Network principles Internet protocols Network case studies:

Decimal representation of Internet addresses

octet 1 octet 2 octet 3

Class A: 1 to 127

0 to 255 0 to 255 1 to 254

Class B: 128 to 191

Class C: 192 to 223

224 to 239 Class D (multicast):

Network ID

Network ID

Network ID

Host ID

Host ID

Host ID

Multicast address

0 to 255 0 to 255 1 to 254

0 to 255 0 to 255 0 to 255

0 to 255 0 to 255 0 to 255

Multicast address

0 to 255 0 to 255 1 to 254240 to 255 Class E (reserved):

1.0.0.0 to 127.255.255.255

128.0.0.0 to 191.255.255.255

192.0.0.0 to 223.255.255.255

224.0.0.0 to 239.255.255.255

240.0.0.0 to 255.255.255.255

Range of addresses

Two steps were taken: IPv6, Classless interdomain routing (CIDR)

Page 15: Introduction Types of network Network principles Internet protocols Network case studies:

• Transmits datagrams from one host to another, if necessary via intermediate routers– Unreliable (best-effort) delivery semantics

• packets can be lost, duplicated, delayed or delivered out of order

– Address resolution: Address Resolution Module(ARP)• IP address -> Ethernet address mapping, (IP address,

Ethernet address) pairs cache on each host

IP protocol

dataIP address of destinationIP address of source

header

up to 64 kilobytes

Page 16: Introduction Types of network Network principles Internet protocols Network case studies:

[1] Addressing• [1] How to find if destination is in the same

network ?– IP address = network ID + host ID.

• Source and destination network IDs match => same network (I.e. direct connectivity)

– Splitting address into multiple parts is called hierarchical addressing

Network Host

Boundary

Page 17: Introduction Types of network Network principles Internet protocols Network case studies:

IP Forwarding: Example Scenario

IP datagram:

223.1.1.1

223.1.1.2

223.1.1.3

223.1.1.4 223.1.2.9

223.1.2.2

223.1.2.1

223.1.3.2223.1.3.1

223.1.3.27

A

BE

miscfields

sourceIP addr

destIP addr data

datagram remains unchanged, as it travels source to destinationaddr fields of interest here

routing table in ADest. Net. next router Nhops223.1.1 1223.1.2 223.1.1.4 2223.1.3 223.1.1.4 2

Page 18: Introduction Types of network Network principles Internet protocols Network case studies:

IP Forwarding (Direct)

223.1.1.1

223.1.1.2

223.1.1.3

223.1.1.4 223.1.2.9

223.1.2.2

223.1.2.1

223.1.3.2223.1.3.1

223.1.3.27

A

BE

Starting at A, given IP datagram addressed to B:look up net. address of Bfind B is on same net. as Alink layer will send datagram directly to B inside link-layer frame

B and A are directly connected

Dest. Net. next router Nhops223.1.1 1223.1.2 223.1.1.4 2223.1.3 223.1.1.4 2

miscfields 223.1.1.1 223.1.1.3 data

Page 19: Introduction Types of network Network principles Internet protocols Network case studies:

IP Forwarding (Indirect): Step 1

223.1.1.1

223.1.1.2

223.1.1.3

223.1.1.4223.1.2.9

223.1.2.2

223.1.2.1

223.1.3.2223.1.3.1

223.1.3.27

A

BE

Dest. Net. next router Nhops223.1.1 1223.1.2 223.1.1.4 2223.1.3 223.1.1.4 2Starting at A, dest. E:

look up network address of EE on different network

A, E not directly attached

routing table: next hop router to E is 223.1.1.4 link layer sends datagram to router 223.1.1.4 inside link-layer framedatagram arrives at 223.1.1.4 continued…..

miscfields 223.1.1.1 223.1.2.2 data

Page 20: Introduction Types of network Network principles Internet protocols Network case studies:

IP Forwarding (Indirect): Step 2

223.1.1.1

223.1.1.2

223.1.1.3

223.1.1.4 223.1.2.9

223.1.2.2

223.1.2.1

223.1.3.2223.1.3.1

223.1.3.27

A

BE

Arriving at 223.1.1.4, destined for 223.1.2.2look up network address of EE on same network as router’s interface 223.1.2.9

router, E directly attached

link layer sends datagram to 223.1.2.2 inside link-layer frame via interface 223.1.2.9 datagram arrives at 223.1.2.2

miscfields 223.1.1.1 223.1.2.2 data network router Nhops interface

223.1.1 - 1 223.1.1.4 223.1.2 - 1 223.1.2.9223.1.3 - 1 223.1.3.27

Dest. next

Page 21: Introduction Types of network Network principles Internet protocols Network case studies:

The Internet Network layer

routingtable

Host, router network layer functions:

Routing protocols•path selection•RIP, OSPF, BGP

IP protocol•addressing conventions•datagram format•packet handling conventions

ICMP protocol•error reporting•router “signaling”

Transport layer: TCP, UDP

Link layer

physical layer

Networklayer

Page 22: Introduction Types of network Network principles Internet protocols Network case studies:

IP Addressing: introduction• IP address: 32-bit identifier

for host, router interface • Interface: connection

between host, router and physical link– router’s typically have

multiple interfaces– host may have multiple

interfaces– IP addresses associated with

interface, not host, router• Hosts in the same network have

same network ID

223.1.1.1

223.1.1.2

223.1.1.3

223.1.1.4 223.1.2.9

223.1.2.2

223.1.2.1

223.1.3.2223.1.3.1

223.1.3.27

223.1.1.1 = 11011111 00000001 00000001 00000001

223 1 11

Page 23: Introduction Types of network Network principles Internet protocols Network case studies:

IP Address Formats• Class A: Network Host0

71 24 bits

Network Host10142 16 bits

Class B:

Network Host110213 8 bits

Class C:

Router Router

Multicast Group addresses1110284 bits

Class D:

Class E: Reserved.

Page 24: Introduction Types of network Network principles Internet protocols Network case studies:

Subnet Addressing• Classful addressing inefficient: Everyone

wants class B addresses • Can we split class A, B addresses spaces and

accommodate more networks ?– Need another level of hierarchy. Defined by

“subnet mask”, which in general specifies the sets of bits belonging to the network address and host address respectively

Network Host

Boundary is flexible, and defined by subnet mask

Page 25: Introduction Types of network Network principles Internet protocols Network case studies:

• Routs packets from source to destination– Internet topology: Autonomous System, Areas(n1)– Routing algorithms:

• RIP -1• RIP-2• Open Short Path First (OSPF)

– Default routes: trade routing efficiency for table size– Classless interdomain routing (CIDR): create subnet

by means of subdividing address or aggregating addresses by mask field, e.g. 162.105.203.0/24

IP routing

Page 26: Introduction Types of network Network principles Internet protocols Network case studies:

• IPv6(n1)– 2128 (3*1038) addresses, 1000 IP addresses per square meter of

the Earth’s surface– Routing speed : no checksum, no fragmentation– Real time : priority and flow label which is used to reserve

resources– Extension header ( information of router, authentication, etc),– multicast and anycast– Security through extension header type

• Migration from IPv4: – IPv6 router island, – depend on economics

Future of IP

Page 27: Introduction Types of network Network principles Internet protocols Network case studies:

IPv6 header layout

Source address(128 bits)

Destination address(128 bits)

Version (4 bits) Priority (4 bits) Flow label (24 bits)

Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)

Page 28: Introduction Types of network Network principles Internet protocols Network case studies:

The MobileIP routing mechanism

Sender

Home

Mobile host MH

Foreign agent FAInternet

agent

First IP packet addressed to MH

Address of FAreturned to sender

First IP packettunnelled to FA

Subsequent IP packetstunnelled to FA

Page 29: Introduction Types of network Network principles Internet protocols Network case studies:

• Use of ports– Provide process-to-process communication

• UDP features• TCP features

TCP and UDP

Page 30: Introduction Types of network Network principles Internet protocols Network case studies:

• Connectionless• Datagram delivery

– A UDP datagram is encapsulated inside an IP packet, up to 64kb in size

• Con– unreliable delivery due to unreliable IP

• Pro– minimal additional cost and transmission delays

UDP features

Page 31: Introduction Types of network Network principles Internet protocols Network case studies:

• Connection oriented– two side must shake hands to establish a bi-directional communication

channel

• Message delivery– Deliver arbitrary long sequences of bytes via stream-based programming

abstraction– Sequencing: divide stream into data segments, sequence number on each

segment– Checksum: cover the header and the data in the segment

• Flow control– Receiver send the highest number of received segment and window size to

sender by acknowledge message– Buffering: receiver buffer and sender buffer used for flow control– In interactive application, receiver inform sender when timeout or the buffer

reaches the MTU limit – Retransmission: retransmit the segment when no acknowledgement within a

specified timeout

TCP

Page 32: Introduction Types of network Network principles Internet protocols Network case studies:

• Symbolic names for hosts and networks– upm.edu.my

• The DNS would not workable without the extensive use of caching.

Domain names

Page 33: Introduction Types of network Network principles Internet protocols Network case studies:

• The purpose of a firewall is to monitor and control all communication into and out of an intranet– including service control, – behavior control – and user control

• Filter approaches (n1)– IP packet filtering, e.g. router/filter– TCP gateway, e.g. bastion– Application level gateway, e.g. telnet proxy process

• Virtual private networks (VPN)– Secure connections located at different sites using public Internet links– By the use of cryptographically protected secure channels at the IP level

Firewall

Page 34: Introduction Types of network Network principles Internet protocols Network case studies:

Firewall configurations

Internet

Router/ Protected intraneta) Filtering router

Internet

b) Filtering router and bastion

filter

Internet

R/filterc) Screened subnet for bastion R/filter Bastion

R/filter Bastion

web/ftpserver

web/ftpserver

web/ftpserver

Page 35: Introduction Types of network Network principles Internet protocols Network case studies:

• Introduction• Types of network• Network principles• Internet protocols• Network case studies: Ethernet, wireless

LAN and ATM• Summary

Chapter 3: Networking and Internetworking

Page 36: Introduction Types of network Network principles Internet protocols Network case studies:

• IEEE 802.3[Xerox 1973]– Carrier sensing, multiple access with collision detection – Frame broadcasting– Bandwidth: 3m -> 10m -> 100m -> 1000m

• Ethernet packet layout (n1)– 248 different addresses

• Packet collisions– Carrier sensing

• wait until no signal is present then transmit– Collision detection

• When transmit through output port, also listen on the input port, and compare the two signals, If differ, send jamming signal

– Back-off • wait a time n before retransmitting, n: a random integer

Ethernet

Page 37: Introduction Types of network Network principles Internet protocols Network case studies:

Ethernet frame layout

Destinationaddress

Sourceaddress

Length

of data

Data for transmission Frame checksequence

7bytes 1byte 6 bytes 6 bytes 2 bytes 46 bytes ≤ length ≤ 1500bytes 4 bytes

Spreamble

Page 38: Introduction Types of network Network principles Internet protocols Network case studies:

• Ethernet efficiency– Efficiency = number of packets transmitted successfully /

theoretical maximum number without collision– Affected by

• A finite time for a signal inserted at a point in the media to reach all other points

• number of stations on the network• stations’ level of activity

Ethernet … continued

Page 39: Introduction Types of network Network principles Internet protocols Network case studies:

• Wireless LAN types– Infrastructure network, e.g. IEEE 802.11 (n1)– Ad hoc network: network built on the fly

• Collision detection failures in 802.11– Hidden stations: carrier sensing fail to detect that

another station on the network is transmitting, lead to collision at base station

– Fading: the strength of radio signals diminishes rapidly with the distance from the transmitter, so that defeating both carrier sensing and collision detection

– Collision masking

Wireless LAN

Page 40: Introduction Types of network Network principles Internet protocols Network case studies:

Wireless LAN configuration

LAN

Server

WirelessLAN

Laptops

Base station/access point

Palmtop

radio obstruction

A B C

D E

Page 41: Introduction Types of network Network principles Internet protocols Network case studies:

• Slot reservation added to the MAC protocol in 802.11 1. Firstly, sense the medium, if no carrier signal, then

• medium is available• an out-of-range station is in the process of requesting a slot• an out-of-range station is using a slot

2. Sender send a RTS (Request To Send) frame to receiver; Receiver reply a CTS (Clear To Send) frame to sender. The effect of the exchange is

• the station within range of sender will pick up the RTS frame and take note of the duration

• the station within range of receiver will pick up the CTS frame and take note of the duration

3. Begin to transmit

802.11 introduction

Page 42: Introduction Types of network Network principles Internet protocols Network case studies:

• 802.11 avoid collisions in ways– CTS frames avoid the hidden station and fading problem – If RTS/CTS is corrupted, then a back-off period is used– When RTS/CTS exchange correctly, there is no collisions in the

following communication except intermittent fading prevents a third party from receiving either of them

• Security in 802.11– Shared-key authentication mechanism– XOR operation on the base of shared key to prevent from

eavesdropping

802.11 introduction … continued

Page 43: Introduction Types of network Network principles Internet protocols Network case studies:

Asynchronous Transfer Mode networks (ATM)• Deploy ATM on top of other networks

– Can be implemented over existing digital telephony networks, Bandwidth from 32 kbps (voice) to 622mbps

– Native mode: Over optical fiber, copper and other transmission media, bandwidth up to several gigabits per seconds

• ATM layers (n1)– Adaptation layer

• end-to-end layer implemented at the sending and receiving host– ATM layer

• connection-oriented service that transmits fixed length packets called cells, avoid flow control and error checking at the switching, provide bandwidth and latency guarantees

• VC (virtual channel): a logical unidirectional association between two endpoints of a link in the physical path from source to destination

• VP (virtual path): a bundle of virtual channel that are associated with a physical path between two switching nodes

Page 44: Introduction Types of network Network principles Internet protocols Network case studies:

ATM protocol layers

Physical

Application

ATM layer

Higher-layer protocols

ATM cells

ATM virtual channels

MessageLayers

ATM adaption layer

Page 45: Introduction Types of network Network principles Internet protocols Network case studies:

ATM… continued

• The nodes in a ATM network can play three distinct roles (n1)– Hosts: send and receive messages– VP switches: hold tables showing the correspondence

information between incoming and outgoing VPs– VP/VC switches: correspondence information for both VPs

and VCs• ATM cell: 5-bytes header and a 48-byte data field

Flags DataVirtual channel idVirtual path id

53 bytes

Header: 5 bytes

Page 46: Introduction Types of network Network principles Internet protocols Network case studies:

Switching virtual paths in an ATM network

VPI in VPI out

23

45

VPI = 3

VPI = 5

VPI = 4

Virtual path Virtual channels

VPI = 2

VPI : virtual path identifier

VP switch VP/VCswitch

VP switch

Host

Host

Page 47: Introduction Types of network Network principles Internet protocols Network case studies:

• Introduction• Types of network• Network principles• Internet protocols• Network case studies: Ethernet, wireless

LAN and ATM• Summary

Chapter 3: Networking and Internetworking

Page 48: Introduction Types of network Network principles Internet protocols Network case studies:

• Layered protocols– 7 layers in OSI model / 5 layers in the Internet

• Delivery approach– Packet switch, frame relay

• Routing mechanism– distance vector / link state

• Congestion control• The Internet

– TCP/IP• Network cases

– Ethernet, WLAN, ATM

Summary

Page 49: Introduction Types of network Network principles Internet protocols Network case studies:

OSI protocol summary

Layer Description Examples

Application Protocols that are designed to meet the communication requirements ofspecific applications, often defining the interface to a service.

HTTP, FTP, SMTP,CORBA IIOP

Presentation Protocols at this level transmit data in a network representation that isindependent of the representations used in individual computers, which maydiffer. Encryption is also performed in this layer, if required.

Secure Sockets(SSL),CORBA DataRep.

Session At this level reliability and adaptation are performed, such as detection offailures and automatic recovery.

Transport This is the lowest level at which messages (rather than packets) are handled.Messages are addressed to communication ports attached to processes,Protocols in this layer may be connection-oriented or connectionless.

TCP, UDP

Network Transfers data packets between computers in a specific network. In a WANor an internetwork this involves the generation of a route passing throughrouters. In a single LAN no routing is required.

IP, ATM virtualcircuits

Data link Responsible for transmission of packets between nodes that are directlyconnected by a physical link. In a WAN transmission is between pairs ofrouters or between routers and hosts. In a LAN it is between any pair of hosts.

Ethernet MAC,ATM cell transfer,PPP

Physical The circuits and hardware that drive the network. It transmits sequences ofbinary data by analogue signalling, using amplitude or frequency modulationof electrical signals (on cable circuits), light signals (on fibre optic circuits)or other electromagnetic signals (on radio and microwave circuits).

Ethernet base- bandsignalling, ISDN

EJB

Page 50: Introduction Types of network Network principles Internet protocols Network case studies:

Distance-Vector Routing table for the network

Routings from DTo Link CostABCDE

336

local6

12201

Routings from ETo Link CostABCDE

4456

local

21110

Routings from A Routings from B Routings from CTo Link Cost To Link Cost To Link CostABCDE

local1131

01212

ABCDE

1local

214

10121

ABCDE

22

local55

21021

Hosts Linksor local networks

A

D E

B

C

12

5

43

6

Routers

Page 51: Introduction Types of network Network principles Internet protocols Network case studies:

Psudo-code for RIP routing algorithm

Send: Each t seconds or when Tl changes, send Tl on each non-faulty outgoing link.Receive: Whenever a routing table Tr is received on link n:

for all rows Rr in Tr {if (Rr.link <> n) {

Rr.cost = Rr.cost + 1;Rr.link = n;if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tlelse for all rows Rl in Tl {

if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n))

Rl = Rr;// Rr.cost < Rl.cost : remote node has better route// Rl.link = n : remote node is more authoritative

}}

}

Page 52: Introduction Types of network Network principles Internet protocols Network case studies:

Simplified view of the QMW Computer Science network

file

compute

dialup

hammer

henry

hotpoint

138.37.88.230

138.37.88.162

bruno138.37.88.249

router/sickle

138.37.95.241138.37.95.240/29

138.37.95.249

copper138.37.88.248

firewall

web

138.37.95.248/29

server

desktop computers 138.37.88.xx

subnet

subnet

Eswitch

138.37.88

server

server

server

138.37.88.251

custard138.37.94.246

desktop computers

Eswitch

138.37.94

hubhub

Student subnetStaff subnet

otherservers

router/firewall

138.37.94.251

1000 Mbps EthernetEswitch: Ethernet switch

100 Mbps Ethernet

file server/gateway

printers

Campusrouter

Campusrouter

138.37.94.xx

Page 53: Introduction Types of network Network principles Internet protocols Network case studies:

Tunnelling

A BIPv6 IPv6

IPv6 encapsulated in IPv4 packets

Encapsulators

IPv4 network

A BIP IP

IP encapsulated in PPP packets

Encapsulators

PPP network

Page 54: Introduction Types of network Network principles Internet protocols Network case studies:

ATM cell layout

Flags DataVirtual channel idVirtual path id

53 bytes

Header: 5 bytes


Recommended