Documentos de Académico
Documentos de Profesional
Documentos de Cultura
• Bus architectures
• ISA (Industry Standard Architecture)
• EISA (Extended ISA)
• PCI (Peripheral Component Interconnect)
• MCA (Micro Channel Architecture)
• PCMCIA (Personal Computer Memory
Card International Association)
NICs in the OSI Model
Repeaters: Layer 1
Repeaters
Combine the
connectivity of a
hub with the traffic
regulation of a
bridge on each
port
Cual es la diferencia entre un
"Switch" y un "Hub" ?
• El "Hub" básicamente extiende la funcionalidad de la red (LAN) para que el
cableado pueda ser extendido a mayor distancia, es por esto que un "Hub" puede
ser considerado como una repetidora. El problema es que el "Hub" transmite estos
"Broadcasts" a todos los puertos que contenga, esto es, si el "Hub" contiene 8
puertos ("ports"), todas las computadoras que estén conectadas al "Hub" recibirán
la misma información, y como se mencionó anteriormente , en ocasiones resulta
innecesario y excesivo
–MAC address
–Assigned to end devices
Layer 3 Devices and Their
Function
ARP IGMP
Internet IPv4 ICMP
IPv6
Network Mobile
Ethernet Wi-Fi broadband
Interface
Protocols in the TCP/IP Suite
OSI TCP/IP TCP/IP Protocol Suite
ARP IGMP
Network Internet IPv4 ICMP IPv6
TCP/UDP
IPv4 IPv6
Understanding IPv4 Addressing
• IPv4 Addressing
• Public and Private IPv4 Addresses
• How Dotted Decimal Notation Relates to
Binary Numbers
• Simple IPv4 Implementations
• More Complex IPv4 Implementations
IPv4 Addressing
An IPv4 configuration identifies a computer to other computers on a network
IP Address Subnet 1
192.168.2.180
255.255.255.0
IP Address
192.168.2.181
255.255.255.0
Dotted decimal
IP Address
representation
192.168.1.201
of the address 255.255.255.0
and subnet mask IP Address
192.168.1.202
Subnet 2 255.255.255.0
Public and Private IPv4
Addresses
Public Private
• Required by devices and • Not routable on the
hosts that connect directly Internet
to the Internet • 10.0.0.0/8
• 172.16.0.0/12
• Must be globally unique • 192.168.0.0./16
• Routable on the Internet • Can be assigned locally
by organization
• Must be assigned by
IANA/RIR • Must be translated to
access the Internet
How Dotted Decimal
Notation Relates to Binary
Numbers
8-Bit Octet
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
Decimal Value
Simple IPv4 Implementations
Class A (/8) Network Host ID
Large ID
0
Network w x y z
172.16.17.0/24
172.16.20.0/22
172.16.18.0/24
172.16.28.0/22
Subnetting and Supernetting
• How Bits Are Used in a Subnet Mask or
Prefix Length
• The Benefits of Using Subnetting
• Calculating Subnet Addresses
• Calculating Host Addresses
• Discussion: Creating a Subnetting
Scheme for a New Office
How Bits Are Used in a Subnet
Mask or Prefix Length
Class B Address with Subnet
Number of Subnets 32
128
64
168
2
40
256
1 0
By
Your Name
Objectives
• Introduction to static routing
• Dynamic routing overview
• Routing protocols overview
Static Versus Dynamic Routes
Why Use a Static Route?
The ip route Command
Static Routes
The ip default-network
Command
Verifying a Static Route
• The command show
running-config is
used to view the active
configuration in
NVRAM to verify that
the static route was
entered correctly.
Troubleshooting Static Routes
• The show interfaces command
• The ping command
• The traceroute command
Dynamic Routing Overview
Routed Protocols Versus
Routing Protocol
Autonomous System
Dynamic Routing Operations
Classes of Routing Protocols
Distance Vector Routing
Basics
Distance Vector Discovery
Complex Metrics
Link-State Routing Basics
Link-State Network Discovery
Link-State Topology Changes
Link-State Concerns
Distance Vector Versus
Link State
Path Determination
Path Selection and Packet
Switching
IP Routing Configuration
Tasks
The router and network
Commands
Routing Protocols
• RIP — A distance vector interior routing protocol
• IGRP — The Cisco distance vector interior
routing protocol
• OSPF — A link-state interior routing protocol
• EIGRP — The Cisco advanced distance vector
interior routing protocol
• BGP — A distance vector exterior routing
protocol
CAPAS SUPERIORES
Tema 3
TCP/IP Transport and
Application Layers
Objectives
• TCP/IP transport layer
• TCP/IP application layer
Routed Protocols Versus
Routing Protocols
106
Flow Control
• Avoids the problem of a host at one side of the
connection overflowing the buffers in the host at
the other side
• Ensures the integrity of the data
Session Establishment
Three-Way Handshake
Windowing
• A method of controlling the amount of
information transferred end to end
• Information can be measured in terms of the
number of packets or the number of bytes
Window Size
114
UDP
• Connectionless
• Unreliable
• Transmits messages (called user datagrams)
• Provides no software checking for message
delivery (unreliable)
• Does not reassemble incoming messages
• Uses no acknowledgments
• Provides no flow control
Unreliable Message Delivery Service
checksum length
DATA
116
UDP Segment Format
Why Would Anyone Use UDP?
• Finer control over what data is sent and when
– As soon as an application process writes into the socket
– … UDP will package the data and send the packet
• No delay for connection establishment
– UDP just blasts away without any formal preliminaries
– … which avoids introducing any unnecessary delays
• No connection state
– No allocation of buffers, parameters, sequence #s, etc.
– … making it easier to handle many active clients at once
• Small packet header overhead
– UDP header is only eight-bytes long
118
Popular Applications That Use
UDP
• Multimedia streaming
– Retransmitting lost/corrupted packets is not worthwhile
– By the time the packet is retransmitted, it’s too late
– E.g., telephone calls, video conferencing, gaming
• Simple query protocols like Domain Name System
– Overhead of connection establishment is overkill
– Easier to have application retransmit if needed
119 “12.3.4.15”
TCP/IP Protocol Graph
TCP
• Connection oriented
• Reliable
• Divides outgoing messages into segments
• Reassembles messages at the destination
station
• Resends anything not received
• Reassembles messages from incoming
segments
TCP Segment Format
Port Numbers
Transmission Control Protocol (TCP)
• Connection oriented
– Explicit set-up and tear-down of TCP session
• Stream-of-bytes service
– Sends and receives a stream of bytes, not messages
• Reliable, in-order delivery
– Checksums to detect corrupted data
– Acknowledgments & retransmissions for reliable delivery
– Sequence numbers to detect losses and reorder data
• Flow control
– Prevent overflow of the receiver’s buffer space
• Congestion control
– Adapt to network congestion for the greater good
124
An Analogy: Talking on a Cell Phone
125
Some Take-Aways from the Example
126
Challenges of Reliable Data Transfer
127
TCP Support for Reliable
Delivery
• Checksum
– Used to detect corrupted data at the receiver
– …leading the receiver to drop the packet
• Sequence numbers
– Used to detect missing data
– ... and for putting the data back in order
• Retransmission
– Sender retransmits lost or corrupted data
– Timeout based on estimates of round-trip time
– Fast retransmit algorithm for rapid retransmission
128
Tearing Down the Connection
B
A
time
129
Sending/Receiving the FIN
Packet
• Sending a FIN: close() • Receiving a FIN: EOF
– Process is done sending – Process is reading data
data via the socket from the socket
– Process invokes “close()” – Eventually, the attempt to
to close the socket read returns an EOF
– Once TCP has sent all of
the outstanding bytes…
– … then TCP sends a FIN
130