02/17/16 Exam 2 Review Chapter 5. Network and Transport Layer Review focuses: 1. Three functions of TCP/IP: Packetizing: breaking data into packets, numbering, error control, reassembling - TCP Addressing: determines the correct network layer and data link layer addresses - IP Routing: determines where the message should be sent next on its way to its final destination. – IP 2. Addressing 1) Internet IP addresses: - address assigning - dynamic addressing: bootstrap Protocol, Dynamic Host Control Protocol (DHCP) 2) Address classes: A, B, C, D, E 3) Subnet and subnet mask - Why need subnet mask and how to design a subnet mask 4) Three levels of addresses: application layer address (domain name), network layer address, data link layer address 5) Address resolution: server name resolution, data link layer address resolution 6) Four pieces of information for a client: its IP address, subnet mask, DNS server IP address, gateway IP address 7) Multicasting 3. Routing 1) Dynamic routing: routing table update, RIP, ICMP, and OSPF 2) Connectionless vs. connection-oriented (virtual circuit) 3) Traffic types: real-time, elastic 4) QoS: Quality of Service (QoS) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and, to some extent, guaranteed in advance. 5) QoS routing: a special connection-oriented dynamic routing in which different data flows are assigned different priorities and classes of service. 6) Network congestion: what is it? 7) Network service types: Best effort, IntServ and DiffServ: - How they work? 8) Internet flow control: slow start and congestion avoidance algorithms Key terms: Address resolution, routing, application layer address, network layer address, data link layer address, multicasting, subnet mask, virtual circuit, domain name, name server, QoS routing, routing table, IntServ, DiffServ, flow control, traffic congestion. Chapter 6. LANs 1. 2. 3. Network components a. Computers (server, client) b. NIC c. Cable d. NOS e. Hub Network topology a. Physical vs. logical Ethernet a. Standard: IEEE 802.3 b. CSMA/CD 1 02/17/16 4. 5. c. 10Base-T vs. 100Base-T Ethernet (3 versions) d. New types of Ethernet: 1000Base-T (1GbE), 10GbE, 40GbE Wireless LAN a. WLAN and LAW b. Standard: IEEE 802.11b, IEEE 802.11a and IEEE 802.11g c. MAC protocol: CSMA/CA, (contrast with CSMA/CD) d. Hidden node problem and how it is solved How to improve the performance of a LAN Key terms: NOS, CSMA/CD, CSMA/CA, 10Base-T, 100Base-T, 1000Base-T, hidden node problem. Chapter 7. Backbone Networks 1. 2. 3. 4. Backbone devices a. Hub b. Bridge c. Switch (Layer 3 and layer 2 switches) d. Router e. Gateway Contrast between different kinds of networking devices a. Switch vs. hub b. Switch vs. bridge c. Bridge vs. router d. Router vs. gateway e. Router vs. switch Backbone design a. Three layers of architecture: access layer, distribution layer, and core layer b. Four architectures: - Routed backbone – using routers Advantage – clearly segment each part of the network Disadvantage – Delay, and more management - Bridged backbone – using bridges, not popular any more Advantages – cheaper, simpler Disadvantages – difficulties in management - Collapsed backbone –using switches, is most commonly used. Advantages - Better performance, Fewer network devices are used Disadvantages – switch problem may fail whole network, more cabling work Two types Rack-based collapsed backbone Chassis-based collapsed backbone Virtual LAN (VLAN) (not required) Backbone network technologies a. FDDI i. 100Mbps ii. Dual-ring structure iii. Token passing MAC protocol b. ATM i. 155/622 Mbps ii. Fixed size cell/packet (53 bytes) iii. Connection-oriented service iv. Two types of virtual circuits: permanent virtual circuit (PVC), switched virtual circuit (SVC) v. Packet conversion between Ethernet and ATP – LAN encapsulation (LANE) vi. Four service classes: CBR, VBR, ABR, UBR 2 02/17/16 c. Fibre Channel (not required this time) Questions/Answers (Not necessarily cover all topics): 1. How is TCP different from UDP? TCP is a connection-oriented protocol. UDP is a connection-less protocol. What are the differences between connectionless and connection-oriented routing? Connection-oriented routing sets up a virtual circuit between the sender and receiver. In this case, a temporary virtual circuit is defined between the sender and receiver. The network layer makes one routing decision when the connection is established, and all packets follow the same route. All packets in the same message arrive at the destination in the same order in which they were sent. In this case, packets only need to contain information about the stream to which it belongs; sequence numbers are not needed, although many connection-oriented protocols include a sequence number to ensure that all packets are actually received. Connection-oriented routing has greater overhead than connectionless routing, because the sender must first “open” the circuit by sending a control packet that instructs all the intervening devices to establish the circuit routing. Likewise, when the transmission is complete, the sender must “close” the circuit. Connection-oriented protocols also tend to have more overhead bits in each packet. Connectionless routing means each packet is treated separately and makes its own way through the network. It is possible that different packets will take different routes through the network depending upon the type of routing used and the amount of traffic. Because packets following different routes may travel at different speeds, they may arrive out of sequence at their destination. The sender’s network layer therefore puts a sequence number on each packet, in addition to information about the message stream to which the packet belongs. The network layer must reassemble them in the correct order before passing the message to the application layer. 2. How does TCP establish a connection? TCP sets up a virtual circuit between the sender and the receiver. The transport layer software sends a special packet (called a SYN, or synchronization characters) to the receiver requesting that a connection be established. The receiver either accepts or rejects the connection, and together, they settle on the packet sizes the connection will use. Once the connection is established, the packets flow between the sender and the receiver, following the same route through the network. 3. What is a subnet and why do networks need them? Each organization must assign the IP addresses it has received to specific computers on its networks. In general, IP addresses are assigned so that all computers on the same local area network have a similar addresses. For example, suppose a university has just received a set of Class B addresses starting with 128.184.x.x. It is customary to assign all the computers in the same LAN numbers that start with the same first three digits, so the Business School LAN might be assigned 128.184.56.x while the Computer Science LAN might be assigned 128.184.55.x (see Figure 6-8). Likewise, all the other LANs at the university and the backbone network that connects them, would have a different set of numbers. Each of these LANs are called a TCP/IP subnet because they are logically grouped together by IP number. Knowing whether a computer is on your subnet or not it very important for message routing. 4. How does TCP/IP perform address resolution for network layer addresses? Server name resolution is the translation of application layer addresses into network layer addresses (e.g., translating an Internet address such as www.cba.uga.edu into an IP address such as 128.192.98.3). This is done using the Domain Name Service (DNS). Throughout the Internet there are a series of computers called name servers that provide DNS services. These name servers run special address databases that store 3 02/17/16 thousands of Internet addresses and their corresponding IP addresses. These name servers are in effect the "directory assistance" computers for the Internet. Any time a computer does not know the IP number for a computer, it sends a message to the name server requesting the IP number. When TCP/IP needs to translate an application layer address into an IP address, it sends a special TCPlevel packet to the nearest DNS server. This packet asks the DNS server to send the requesting computer the IP address that matches the Internet address provided. If the DNS server has a matching name in its database, it sends back a special TCP packet with the correct IP address. If that DNS server does not have that Internet address in its database, it will issue the same request to another DNS server elsewhere on the Internet. Once your computer receives an IP address it is stored in a server address table. This way, if you ever need to access the same computer again, your computer does not need to contact a DNS server. Most server address tables are routinely deleted whenever you turn off your computer. 5. How does TCP/IP perform address resolution for data link layer addresses? To send a message to a computer in its network, a computer must know the correct data link layer address. In this case, the TCP/IP software sends a broadcast message to all computers in its subnet. A broadcast message, as the name suggests, is received and processed by all computers in the same LAN (which is usually designed to match the IP subnet). The message is a specially formatted TCP-level request using Address Resolution Protocol (ARP) that says “Whoever is IP address xxx.xxx.xxx.xxx, please send me your data link layer address.” The TCP software in the computer with that IP address then responds with its data link layer address. The sender transmits its message using that data link layer address. The sender also stores the data link layer address in its address table for future use. 6. Explain the terms 10Base-2, 10BaseT, 100BaseT, 1000BaseT, 10GbE, and 10/100 Ethernet? The original ethernet specification was a 10 Mbps data rate using baseband signaling on thick coaxial cable, called 10Base5 (or “Thicknet”), capable of running 500 meters between hubs. Following 10Base5 was 10Base2 or thinnet as we used to say. Thinnet or RG-58 coaxial cable, similar to what is used for cable TV was considerably cheaper and easier to work with, although it was limited to 185 meters between hubs. The 10Base-2 standard was often called “Cheapnet.” When twisted pair cabling was standardized for supporting Ethernet (app. 1988) the T replaced the 2 to represent “twisted-pair”. Twisted pair is the most commonly used cable type for Ethernet. 10BaseT breaks down as 10 Mbps, baseband, and the “T” means it uses twisted pair wiring (actually unshielded twisted pair). It was the 10Base-T standard that revolutionized Ethernet, and made it the most popular type of LAN in the world. Eventually the 10BaseT standard was improved to support Fast Ethernet or 100BaseT that breaks down as 100Mbps baseband over twisted-pair cable. This eventually was improved even further to 1000BaseT or 1 Billion BITs per second baseband. There is currently a revised standard evolving which makes Ethernet even faster. It is known as the 10GbE or 10 Billion BITs per second Ethernet. Though proven to work it has yet to reach the marketplace. But it would be astute to consider that it will be here in the near future. Finally, 10/100Mbps Ethernet refers to the standard that can autosense which speed it needs to run at between the two speeds of 10Mbos or 100Mbps. It comes down to the type of NIC running at the individual node and the type of switch port that the node connects into. It is commonplace to run 10/100Mbps switches in LAN operating environments where there are older NICs already operating and no real business case requirements for upgrading these nodes. 7. Explain how the two approaches to media access control work in CSMA/CA? The two approaches are Physical Carrier Sense Method (PCSM) and Virtual Carrier Sense Method (VCSM). PCSM is based on the ability of the computers to physically listen before they transmit. After a transmission is sent the receiving computer acknowledges (ACK) the transmission by sending an ACK packet in reply. The source computer upon receipt of the ACK packet then knows it has a connection and 4 02/17/16 can continue transmission to the destination computer. VCSM does not rely on physical media. A computer running this protocol first must send a Request to Transmit (RTS) packet to the AP. If all clear the AO responds with a Clear to Send (CTS) packet back to the source computer. The source computer may then begin transmission. 8. Explain how routed backbones work. Routed backbones move packets along the backbone based on their network layer address (i.e., layer 3 address). The most common form of routed backbone uses a bus topology (e.g., using Ethernet 100BaseT). Routed backbones can be used at the core or distribution layers. At the core layer routed backbones are sometimes called subnetted backbones or hierarchical backbones and are most commonly used to connect different buildings within the same campus network. At the distribution layer a routed backbone uses routers or layer 3 switches to connect a series of LANs (access layer) to a single shared media backbone network. Each of the LANs are a separate subnet. Message traffic stays within each subnet unless it specifically needs to leave the subnet to travel elsewhere on the network, in which case the network layer address (e.g., TCP/IP) is used to move the packet. 9. Explain how bridged backbones work. Bridged backbones move packets along the backbone based on their data link layer address (i.e., layer 2 address). The most common form also uses a bus topology. They were common in the distribution layer, but their use is declining; few organizations install bridged networks because they have major performance problems. Bridged backbones are sometimes called flat backbones. With a bridged backbone the entire network (backbone and all connected network segments) are on the same subnet. All LANs are part of the same overall network and all must have the same data link layer protocol. This is in sharp contrast to the routed backbone in which the LANs are isolated and may be different. 10. Explain how collapsed backbones work? Collapsed backbone networks use a star topology with one device, usually a switch, at its center. The traditional backbone circuit and set of routers or bridges is replaced by one switch and a set of circuits to each LAN. The collapsed backbone has more cable, but fewer devices. There is no backbone cable. The “backbone” exists only in the switch, which is why this is called a collapsed backbone. The original collapsed backbone technology uses layer-2 switches and suffers some disadvantage due to the load of data link layer overhead message traffic and limitations on network segmentation. As this weakness has been recognized, collapsed backbone technology is adapting by evolving to the use of layer-3 switches to overcome these problems. The result is better performance and improved network management capabilities for collapsed backbone networks. Collapsed backbones are probably the most common type of backbone network used in the distribution layer (i.e., within a building). Most new building backbone networks designed today use collapsed backbones. They also are making their way into the core layer as the campus backbone, but routed backbones still remain common. 11. What are the key advantages and disadvantages among bridged, routed and collapsed backbones. Bridged backbones Advantages Since bridges tend to be less expensive than routers, they are often cheaper. Bridges are usually simpler to install because the network manager does not need to worry about building many different Disadvantages Bridged backbones pay a penalty for the broadcast paradigm and are slower than routed backbones. Since bridged backbone and all networks connected to them are part of the same subnet, broadcast messages 5 02/17/16 subnets and assigning a whole variety of different subnet masks and addresses in each part of the network Routed backbones Collapsed backbones Clear segmentation of parts of the network connected to the backbone as each network has a subnet address and can be managed separately. Performance is improved. With the traditional backbone network, the backbone circuit was shared among many LANs; each had to take turns sending messages. With the collapsed backbone, each connection into the switch is a separate point-to-point circuit. The switch enables simultaneous access, so that several LANs can send messages to other LANs at the same time. Throughput is increased significantly, often by 200% to 600%, depending upon the number of attached LANs and the traffic pattern. Since there are far fewer networking devices in the network, this reduces costs and greatly simplifies network management. All the key backbone devices are in the same physical location, and all traffic must flow through the switch. If something goes wrong or if new (e.g., address requests) must be permitted to travel everywhere in the backbone. This means, for example, that a computer in one LAN attempting to find the data link layer address of a server in the same LAN will issue a broadcast message that will travel to every computer on every LAN attached to the backbone. (In contrast, on a routed backbone such messages would never leave the LAN in which they originated.) Overhead or utility messages add to the broadcast paradigm penalty. There are many different types of broadcast messages other than address requests (e.g., a printer reporting it is out of paper, a server about to be shut down). These broadcast messages quickly use up network capacity in a large bridged network. The result is slower response times for the user. In a small network, the problems are not as great, because there are fewer computers to issue such broadcast messages. Since the backbone and all attached networks are considered part of the same subnet, it is more difficult to permit different individuals to manage different parts of the network (e.g., LANs); a change in one part of the network has the potential to significantly affect all other parts. It is possible to run out of IP addresses if the entire network has many computers. Slower performance as routing takes more time than bridging or switching. Management and/or software overhead costs due to need to establish subnet addressing and provide reconfiguration when computers are moved (or support dynamic addressing). Because data link layer addresses are used to move packets, there is more broadcast traffic flowing through the network and it is harder to isolate and separately manage the individually attached LANs. Layer 3 switches can use the network layer address, so future collapsed backbones built with layer 3 will not suffer from this problem. Collapsed backbones use more cable, and the cable must be run longer distances, which often means that fiber optic cables must be used. If the switch fails, so does the entire backbone network. If the reliability of the switch has the same reliability as the reliability of the routers, then there is less chance of an failure (because there are fewer devices to fail). For most organizations, the relatively minor 6 02/17/16 cabling is needed, it can all be done in one place. Software reconfiguration replaces hardware reconfiguration. disadvantages of cable requirements and impacts of potential switch failure are outweighed by the benefits offered by collapsed backbones. 7