IP datagrams are forwarded across the internet through a process of encapsulation and forwarding. Routers along the path encapsulate each IP datagram within a link layer frame and forward it based on the destination address. If a datagram is larger than the maximum transmission unit of the outgoing link, routers fragment it into smaller pieces that are reassembled by the destination host. Forwarding tables allow routers to determine the next hop for each datagram using longest prefix matching.
The document discusses the key aspects of the Internet Protocol (IP) including its connectionless delivery service, packet format and processing by routers. IP provides end-to-end delivery of packets across interconnected networks, with each packet containing a header for routing. Routers examine packet headers to forward packets via the best path towards the destination based on routing tables. IP itself provides a best-effort delivery service, while higher level protocols implement reliable connections.
The network layer is responsible for delivering packets from source to destination. It must know the topology of the subnet and choose appropriate paths. When sources and destinations are in different networks, the network layer must deal with these differences. The network layer uses logical addressing that is independent of the underlying physical network. Routing ensures packets are delivered through routers and switches from source to destination across interconnected networks.
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptVINAYTANWAR18
The Internet Protocol (IP) provides an unreliable, best-effort, connectionless packet delivery service. It defines the basic unit of data transfer called a datagram and performs routing functions according to rules for unreliable packet delivery. IP datagrams can be fragmented into smaller pieces to fit into frames when the datagram is larger than the maximum transmission unit of a network. Routers replicate some IP options in all fragments while others are replicated in a single fragment only.
The document discusses Internet protocols and TCP/IP. It describes how the Internet protocols were developed in the 1970s to facilitate communication between different computer systems. The key protocols are TCP and IP. TCP provides reliable data transmission and IP provides best-effort delivery of packets across networks. The document outlines the TCP/IP protocol stack and key concepts like IP addressing, ARP, routing, ICMP, TCP connection establishment and sliding windows.
The document discusses the TCP/IP protocol stack and address resolution. It describes the five layers of the TCP/IP protocol suite - physical, data link, network, transport, and application layers. It also compares the TCP/IP and OSI models. Address resolution is explained, which is the process of mapping between Layer 3 network addresses and Layer 2 hardware addresses. The Address Resolution Protocol (ARP) allows hosts to dynamically discover the MAC address associated with a known IP address on the local network.
This document discusses the network layer in the internet. It covers the internet protocol (IP) which provides connectionless best-effort delivery of packets called internet datagrams. The transmission control protocol (TCP) provides reliable stream service using acknowledgments, while the user datagram protocol (UDP) provides connectionless datagram service. The document then describes the IP version 4 protocol, including the header fields, fragmentation, addressing, and subnetting techniques.
Computer Networks and Vulnerabilities
Dr. Wei Chen discusses computer network vulnerabilities in three main areas: the network layer, transport layer, and hands-on experiments. The document outlines IP spoofing, routing attacks, and ICMP attacks that can occur in the network layer. It also discusses protection of confidentiality, integrity, and authentication using cryptography in the transport layer. Dr. Chen provides an outline of hands-on experiments to demonstrate IP packets, IP routing, IP spoofing, TCP SYN flooding, and traffic analysis.
The document discusses the key aspects of the Internet Protocol (IP) including its connectionless delivery service, packet format and processing by routers. IP provides end-to-end delivery of packets across interconnected networks, with each packet containing a header for routing. Routers examine packet headers to forward packets via the best path towards the destination based on routing tables. IP itself provides a best-effort delivery service, while higher level protocols implement reliable connections.
The network layer is responsible for delivering packets from source to destination. It must know the topology of the subnet and choose appropriate paths. When sources and destinations are in different networks, the network layer must deal with these differences. The network layer uses logical addressing that is independent of the underlying physical network. Routing ensures packets are delivered through routers and switches from source to destination across interconnected networks.
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptVINAYTANWAR18
The Internet Protocol (IP) provides an unreliable, best-effort, connectionless packet delivery service. It defines the basic unit of data transfer called a datagram and performs routing functions according to rules for unreliable packet delivery. IP datagrams can be fragmented into smaller pieces to fit into frames when the datagram is larger than the maximum transmission unit of a network. Routers replicate some IP options in all fragments while others are replicated in a single fragment only.
The document discusses Internet protocols and TCP/IP. It describes how the Internet protocols were developed in the 1970s to facilitate communication between different computer systems. The key protocols are TCP and IP. TCP provides reliable data transmission and IP provides best-effort delivery of packets across networks. The document outlines the TCP/IP protocol stack and key concepts like IP addressing, ARP, routing, ICMP, TCP connection establishment and sliding windows.
The document discusses the TCP/IP protocol stack and address resolution. It describes the five layers of the TCP/IP protocol suite - physical, data link, network, transport, and application layers. It also compares the TCP/IP and OSI models. Address resolution is explained, which is the process of mapping between Layer 3 network addresses and Layer 2 hardware addresses. The Address Resolution Protocol (ARP) allows hosts to dynamically discover the MAC address associated with a known IP address on the local network.
This document discusses the network layer in the internet. It covers the internet protocol (IP) which provides connectionless best-effort delivery of packets called internet datagrams. The transmission control protocol (TCP) provides reliable stream service using acknowledgments, while the user datagram protocol (UDP) provides connectionless datagram service. The document then describes the IP version 4 protocol, including the header fields, fragmentation, addressing, and subnetting techniques.
Computer Networks and Vulnerabilities
Dr. Wei Chen discusses computer network vulnerabilities in three main areas: the network layer, transport layer, and hands-on experiments. The document outlines IP spoofing, routing attacks, and ICMP attacks that can occur in the network layer. It also discusses protection of confidentiality, integrity, and authentication using cryptography in the transport layer. Dr. Chen provides an outline of hands-on experiments to demonstrate IP packets, IP routing, IP spoofing, TCP SYN flooding, and traffic analysis.
This document discusses Internet Protocol version 4 (IPv4) and the Internet Control Message Protocol (ICMP). It provides details on IPv4 including that it is an unreliable, connectionless protocol operating at layer 3. It describes IPv4 header fields and fragmentation. It also explains that ICMP is used for error reporting and network queries since IPv4 lacks these functions. Specific ICMP message types are outlined including echo request/reply, destination unreachable, and source quench.
The document discusses the TCP/IP protocol stack and the headers used at each layer.
It describes that TCP works to divide files into packets and send them to workstations, while IP handles routing packets through networks. The TCP header includes fields like source/destination port numbers, sequence numbers, flags, and checksums. The IP header treats the TCP header+data as a datagram and adds its own header fields like version, length, identification, flags, time to live, and source/destination addresses.
An Authentication Header can also be added for security purposes to authenticate senders and protect against modification of packets.
The document discusses the TCP/IP protocol stack and the headers used at each layer.
It describes that TCP works to divide files into packets and send them to workstations, while IP handles routing packets through networks. The TCP header includes fields like source/destination port numbers, sequence numbers, flags, and checksums. The IP header treats the TCP header+data as a datagram and adds its own header fields like version, length, identification, flags, time to live, and source/destination addresses.
An Authentication Header can also be added for security purposes to authenticate senders and protect against modification of packets.
This document describes the TCP/IP protocol stack. It has 4 main layers: the application layer containing protocols like HTTP, FTP; the transport layer containing TCP and UDP which handle reliable/unreliable data transmission; the internet layer containing IP which routes packets between hosts, along with ARP and ICMP for address resolution and error handling; and the link layer which deals with physical network addressing and transmission. TCP/IP has fewer layers than OSI and focuses on essential functions for internetworking.
This document describes a custom network protocol designed to improve throughput performance compared to traditional TCP/IP protocols. The custom protocol uses a simplified 8-byte header containing only essential fields like source/destination addresses and port numbers, and sequence number. Tests of the custom protocol transferring a 10MB file between nodes achieved throughputs up to 902kbps, significantly higher than when using smaller packet sizes. By removing unnecessary TCP/IP header fields and processing, the custom protocol reduces overhead and improves throughput.
The document summarizes key concepts about the network layer:
1) The network layer is responsible for transporting data segments from sending to receiving hosts by encapsulating segments into datagrams. Routers examine header fields to forward datagrams.
2) The network layer provides three key functions - forwarding, routing, and call setup. Forwarding moves packets through routers, routing determines the path between source and destination, and call setup establishes connections before data flows.
3) The Internet's network layer uses IP to define addressing and datagram format. Routing protocols determine paths and ICMP reports errors. This allows connectionless and best-effort delivery across media.
IP routing is used to forward packets between networks using IP addresses. Routers use routing protocols like BGP and OSPF to learn about network reachability and maintain routing tables to know where to forward packets. BGP is used between autonomous systems to exchange routing and reachability information, prioritizing paths based on attributes like AS path length, local preference, and MED. Interior routing protocols like OSPF are used within an autonomous system.
The document summarizes key aspects of the Internet Protocol version 4 (IPv4) including:
- IPv4 provides unreliable, connectionless delivery of packets called internet datagrams between hosts on diverse networks.
- The IPv4 header contains fields for version, header length, type of service, total length, identification, flags, fragment offset, time-to-live, protocol, header checksum, source address, and destination address.
- IPv4 addresses are hierarchical, consisting of a network portion and local host portion, and are divided into classes A, B, and C based on network size.
The document discusses the four levels of addressing used in TCP/IP:
1. Physical address - identifies network interfaces or devices
2. Logical address - IP addresses that identify devices on the network
3. Port address - identifies applications/processes on devices using port numbers
4. Application-specific address - some applications use their own addressing schemes above the port level.
Chapter 4 internetworking [compatibility mode]Sĩ Anh Nguyễn
The document provides an overview of network layer concepts including internetworking, IP addressing, routing protocols, and routing algorithms. Some key points include:
- Internetworking allows different networks to connect through protocols like virtual circuits and tunneling.
- IP addresses identify systems on a network and consist of a network portion and host portion. Private IP addresses are used internally.
- Routing protocols like RIP, OSPF, and BGP allow routers to share route information and determine the best path between networks.
- Subnetting divides network classes into smaller subnets to better manage IP addresses and network design.
IP addresses are 32-bit numbers that uniquely identify devices on the internet. They consist of a network portion and host portion. IP addresses are divided into classes A, B, and C based on the number of bits used for the network portion. Class A uses 8 bits for the network portion, allowing up to 16 million hosts, Class B uses 16 bits for networks of 65,000 hosts, and Class C uses 24 bits for networks of 254 hosts. IP addresses are written in dotted decimal notation with each 8-bit octet represented as a number between 0-255.
PPT Slides explains about OSI layer, Internet Protocol(IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP) & Internet Control Message Protocol(ICMP). It focuses on Protocol Headers and the interpretation of various header fields.
PPT describes about how to detect malicious datagrams, packet filtering systems behaviors & anomalies causing due to fragmentation.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
A document about Internet Protocol (IP) is summarized as follows:
- Internet Protocol version 4 (IPv4) is responsible for packetizing, forwarding, and delivering packets at the network layer. It provides "best effort" delivery with no guarantees.
- IPv4 packets can be fragmented into smaller pieces by routers if their size exceeds the Maximum Transmission Unit (MTU) of a link. Fragmentation fields in the IPv4 header are used for this purpose.
- The Address Resolution Protocol (ARP) maps IP addresses to link-layer addresses to allow communication between the network and data-link layers.
The document discusses transport layer protocols, specifically UDP and TCP. It provides details on:
- UDP being a connectionless, unreliable protocol using checksums and having no flow/error control.
- TCP being connection-oriented and reliable, using sequence numbers, acknowledgments, flow and error control, and establishing connections via three-way handshakes before bidirectional data transfer.
- Both UDP and TCP encapsulating data into segments or datagrams which are delivered process-to-process using port numbers.
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
The document discusses IP forwarding and ICMP. It describes how IP datagrams are forwarded across networks using routers and forwarding tables. ICMP allows routers to send error or control messages back to the source if a datagram experiences problems during forwarding. The key types of ICMP messages are described, such as echo request/reply for ping, destination unreachable, time exceeded, and parameter problem messages.
presentation on TCP/IP protocols data comunicationsAnyapuPranav
The document provides an overview of the TCP/IP protocol architecture. It discusses the five layers of TCP/IP including the physical, network access, internet, transport, and application layers. It describes the protocols used at each layer, such as IP, TCP, UDP, HTTP, and FTP. The document also discusses how data is encapsulated as it passes through each layer of the TCP/IP model and is transmitted from one host to another across networks and the internet.
This document provides an overview of a networking and cybersecurity bootcamp to be held on February 21st, 2022. It will cover vulnerabilities in computer networks, including experiments on IP spoofing, TCP SYN flooding, and traffic analysis. The bootcamp agenda includes reviewing network layer and transport layer protocols, with a focus on vulnerabilities in the IP and TCP protocols. Hands-on experiments will allow participants to explore IP packets, IP routing, and other networking concepts.
This document provides an overview of data link control protocols. It discusses various framing, flow control, and error control techniques used at the data link layer, including fixed and variable framing, byte/bit stuffing, automatic repeat request (ARQ), and protocols like stop-and-wait ARQ, go-back-N ARQ, and selective repeat ARQ. It also covers sliding windows, sequence numbers, acknowledgments, and protocols like HDLC. Examples are provided to illustrate how different protocols handle lost or corrupted frames.
The document discusses various functions and design issues related to the data link layer, including:
1. The data link layer provides services like framing, error control, and flow control to regulate data transmission between network layers.
2. Functions of the data link layer include providing an interface to the network layer, dealing with transmission errors, and regulating data flow to prevent fast senders from swamping slow receivers.
3. The document discusses various data link layer techniques for framing, error detection, error correction, and flow control including bit stuffing, parity schemes, CRC schemes, and error-correcting codes.
This document discusses Internet Protocol version 4 (IPv4) and the Internet Control Message Protocol (ICMP). It provides details on IPv4 including that it is an unreliable, connectionless protocol operating at layer 3. It describes IPv4 header fields and fragmentation. It also explains that ICMP is used for error reporting and network queries since IPv4 lacks these functions. Specific ICMP message types are outlined including echo request/reply, destination unreachable, and source quench.
The document discusses the TCP/IP protocol stack and the headers used at each layer.
It describes that TCP works to divide files into packets and send them to workstations, while IP handles routing packets through networks. The TCP header includes fields like source/destination port numbers, sequence numbers, flags, and checksums. The IP header treats the TCP header+data as a datagram and adds its own header fields like version, length, identification, flags, time to live, and source/destination addresses.
An Authentication Header can also be added for security purposes to authenticate senders and protect against modification of packets.
The document discusses the TCP/IP protocol stack and the headers used at each layer.
It describes that TCP works to divide files into packets and send them to workstations, while IP handles routing packets through networks. The TCP header includes fields like source/destination port numbers, sequence numbers, flags, and checksums. The IP header treats the TCP header+data as a datagram and adds its own header fields like version, length, identification, flags, time to live, and source/destination addresses.
An Authentication Header can also be added for security purposes to authenticate senders and protect against modification of packets.
This document describes the TCP/IP protocol stack. It has 4 main layers: the application layer containing protocols like HTTP, FTP; the transport layer containing TCP and UDP which handle reliable/unreliable data transmission; the internet layer containing IP which routes packets between hosts, along with ARP and ICMP for address resolution and error handling; and the link layer which deals with physical network addressing and transmission. TCP/IP has fewer layers than OSI and focuses on essential functions for internetworking.
This document describes a custom network protocol designed to improve throughput performance compared to traditional TCP/IP protocols. The custom protocol uses a simplified 8-byte header containing only essential fields like source/destination addresses and port numbers, and sequence number. Tests of the custom protocol transferring a 10MB file between nodes achieved throughputs up to 902kbps, significantly higher than when using smaller packet sizes. By removing unnecessary TCP/IP header fields and processing, the custom protocol reduces overhead and improves throughput.
The document summarizes key concepts about the network layer:
1) The network layer is responsible for transporting data segments from sending to receiving hosts by encapsulating segments into datagrams. Routers examine header fields to forward datagrams.
2) The network layer provides three key functions - forwarding, routing, and call setup. Forwarding moves packets through routers, routing determines the path between source and destination, and call setup establishes connections before data flows.
3) The Internet's network layer uses IP to define addressing and datagram format. Routing protocols determine paths and ICMP reports errors. This allows connectionless and best-effort delivery across media.
IP routing is used to forward packets between networks using IP addresses. Routers use routing protocols like BGP and OSPF to learn about network reachability and maintain routing tables to know where to forward packets. BGP is used between autonomous systems to exchange routing and reachability information, prioritizing paths based on attributes like AS path length, local preference, and MED. Interior routing protocols like OSPF are used within an autonomous system.
The document summarizes key aspects of the Internet Protocol version 4 (IPv4) including:
- IPv4 provides unreliable, connectionless delivery of packets called internet datagrams between hosts on diverse networks.
- The IPv4 header contains fields for version, header length, type of service, total length, identification, flags, fragment offset, time-to-live, protocol, header checksum, source address, and destination address.
- IPv4 addresses are hierarchical, consisting of a network portion and local host portion, and are divided into classes A, B, and C based on network size.
The document discusses the four levels of addressing used in TCP/IP:
1. Physical address - identifies network interfaces or devices
2. Logical address - IP addresses that identify devices on the network
3. Port address - identifies applications/processes on devices using port numbers
4. Application-specific address - some applications use their own addressing schemes above the port level.
Chapter 4 internetworking [compatibility mode]Sĩ Anh Nguyễn
The document provides an overview of network layer concepts including internetworking, IP addressing, routing protocols, and routing algorithms. Some key points include:
- Internetworking allows different networks to connect through protocols like virtual circuits and tunneling.
- IP addresses identify systems on a network and consist of a network portion and host portion. Private IP addresses are used internally.
- Routing protocols like RIP, OSPF, and BGP allow routers to share route information and determine the best path between networks.
- Subnetting divides network classes into smaller subnets to better manage IP addresses and network design.
IP addresses are 32-bit numbers that uniquely identify devices on the internet. They consist of a network portion and host portion. IP addresses are divided into classes A, B, and C based on the number of bits used for the network portion. Class A uses 8 bits for the network portion, allowing up to 16 million hosts, Class B uses 16 bits for networks of 65,000 hosts, and Class C uses 24 bits for networks of 254 hosts. IP addresses are written in dotted decimal notation with each 8-bit octet represented as a number between 0-255.
PPT Slides explains about OSI layer, Internet Protocol(IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP) & Internet Control Message Protocol(ICMP). It focuses on Protocol Headers and the interpretation of various header fields.
PPT describes about how to detect malicious datagrams, packet filtering systems behaviors & anomalies causing due to fragmentation.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
A document about Internet Protocol (IP) is summarized as follows:
- Internet Protocol version 4 (IPv4) is responsible for packetizing, forwarding, and delivering packets at the network layer. It provides "best effort" delivery with no guarantees.
- IPv4 packets can be fragmented into smaller pieces by routers if their size exceeds the Maximum Transmission Unit (MTU) of a link. Fragmentation fields in the IPv4 header are used for this purpose.
- The Address Resolution Protocol (ARP) maps IP addresses to link-layer addresses to allow communication between the network and data-link layers.
The document discusses transport layer protocols, specifically UDP and TCP. It provides details on:
- UDP being a connectionless, unreliable protocol using checksums and having no flow/error control.
- TCP being connection-oriented and reliable, using sequence numbers, acknowledgments, flow and error control, and establishing connections via three-way handshakes before bidirectional data transfer.
- Both UDP and TCP encapsulating data into segments or datagrams which are delivered process-to-process using port numbers.
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
The document discusses IP forwarding and ICMP. It describes how IP datagrams are forwarded across networks using routers and forwarding tables. ICMP allows routers to send error or control messages back to the source if a datagram experiences problems during forwarding. The key types of ICMP messages are described, such as echo request/reply for ping, destination unreachable, time exceeded, and parameter problem messages.
presentation on TCP/IP protocols data comunicationsAnyapuPranav
The document provides an overview of the TCP/IP protocol architecture. It discusses the five layers of TCP/IP including the physical, network access, internet, transport, and application layers. It describes the protocols used at each layer, such as IP, TCP, UDP, HTTP, and FTP. The document also discusses how data is encapsulated as it passes through each layer of the TCP/IP model and is transmitted from one host to another across networks and the internet.
This document provides an overview of a networking and cybersecurity bootcamp to be held on February 21st, 2022. It will cover vulnerabilities in computer networks, including experiments on IP spoofing, TCP SYN flooding, and traffic analysis. The bootcamp agenda includes reviewing network layer and transport layer protocols, with a focus on vulnerabilities in the IP and TCP protocols. Hands-on experiments will allow participants to explore IP packets, IP routing, and other networking concepts.
This document provides an overview of data link control protocols. It discusses various framing, flow control, and error control techniques used at the data link layer, including fixed and variable framing, byte/bit stuffing, automatic repeat request (ARQ), and protocols like stop-and-wait ARQ, go-back-N ARQ, and selective repeat ARQ. It also covers sliding windows, sequence numbers, acknowledgments, and protocols like HDLC. Examples are provided to illustrate how different protocols handle lost or corrupted frames.
The document discusses various functions and design issues related to the data link layer, including:
1. The data link layer provides services like framing, error control, and flow control to regulate data transmission between network layers.
2. Functions of the data link layer include providing an interface to the network layer, dealing with transmission errors, and regulating data flow to prevent fast senders from swamping slow receivers.
3. The document discusses various data link layer techniques for framing, error detection, error correction, and flow control including bit stuffing, parity schemes, CRC schemes, and error-correcting codes.
The document summarizes key concepts about the data link layer, including the services it provides to the network layer, such as error control and flow control. It describes functions of the data link layer like framing, error detection, and flow control. Specific data link protocols are also discussed, including HDLC, PPP, and protocols used for Ethernet and the Internet. Error detection techniques like parity checks and CRC are explained. Sliding window protocols including stop-and-wait, go-back-N, and selective repeat are covered.
Cyber crimes, especially against women, are increasing and include cyber stalking, cyber defamation, cyber bullying, cyber hacking, and sharing of pornographic images without consent. Children are also targeted online through grooming, exploitation, and exposure to harmful content. Zero-day exploits take advantage of unknown software vulnerabilities to launch attacks, like the Stuxnet virus targeting Iranian nuclear facilities and WannaCry ransomware affecting computers worldwide. Zero-click attacks install malware without any action from the user by exploiting operating system flaws.
Circuit switching directly connects the sender and receiver through an unbroken path. Message switching transmits entire messages from node to node without establishing a dedicated path. Packet switching breaks messages into packets that can take different routes to the destination and are reassembled upon arrival. The document discusses these three switching techniques and their advantages and disadvantages.
This document provides an overview of key concepts in the relational data model, including relational model concepts, relational constraints, and update operations. It defines relations, tuples, attributes, domains, keys, and integrity constraints. It also discusses relational database schemas and provides examples of a relational schema for a COMPANY database including entities, attributes, and referential integrity constraints. Finally, it covers update operations and how integrity constraints can be violated during updates.
CSMA/CD is a media access control method used in Ethernet that improves on CSMA by allowing stations to detect collisions. When a collision is detected, the station sends a jam signal and waits a random time before resending the frame. This allows collisions to be handled efficiently. CSMA/CD provides reliable transmission since collisions are detected and packets are retransmitted, making it effective for local area networks, though it has limitations such as maximum segment length and scaling to large networks.
A network interface card (NIC) allows computers to communicate on a local area network (LAN). The NIC provides the hardware interface between the computer and the network. It functions like an input/output device, handling data transmission and reception without requiring the CPU's constant attention. NICs are available for both wired Ethernet and wireless WiFi networks. They install into expansion slots or directly on the motherboard and have ports for connecting Ethernet cables or antennas for wireless communication. The NIC implements the necessary circuitry and protocols to communicate on the LAN using standards like Ethernet or token ring.
The document discusses the entity relationship (ER) model used in database design. It describes the components of an ER diagram including entities (represented by rectangles), attributes (described by ovals), and relationships (shown as diamonds) between entities. Entities can have key attributes, composite attributes, multivalued attributes, and derived attributes. Relationships can be one-to-one, one-to-many, many-to-one, or many-to-many depending on whether one or more entities are associated. The ER model provides a conceptual view of data that defines elements and relationships within a system.
The document discusses key concepts of the relational data model including relations, tuples, attributes, domains, relation schemas, and relation states. It defines these terms formally based on set theory and explains examples to illustrate the concepts. Constraints on relations are also introduced, specifically key constraints, entity integrity constraints, and referential integrity constraints.
The document provides an overview of entity-relationship (ER) modeling and diagramming. It discusses key concepts like entities, attributes, relationships, cardinalities, keys, and weak entities. It also covers ER diagram components and symbols, including rectangles for entities, diamonds for relationships, and lines connecting them. The document aims to illustrate how ER diagrams define relationships between entities and help incorporate those relationships into the database design process.
Layering is a fundamental concept in computer networking that involves dividing network functionality into a series of layers. Each layer provides specific services to the layer above it to simplify network design and allow for modularity, interoperability, and evolution of individual layers independently. The document then describes the four layers of the TCP/IP protocol suite - the application layer for end-user data exchange, the transport layer for reliable communication between hosts, the internet layer for packet routing across networks, and the link layer for transmission of data frames over a physical link.
Database system applications are used in many sectors including railway reservation systems, library management, banking, education, credit cards, social media, broadcasting, online accounts, online shopping, human resource management, manufacturing, and healthcare. They store information about tickets, books, financial transactions, students, credit card purchases, social connections, broadcast content, financial instruments, products, employees, inventory, and patient medical records. Database management systems provide functionality for data retrieval, manipulation, security, backup/recovery, multi-user access, and reporting/analysis.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
1. CHAPTER 22
IP Datagram Forwarding
CECS 474 Computer Network Interoperability
Notes for Douglas E. Comer, Computer Networks and Internets (5th Edition)
Tracy Bradley Maples, Ph.D.
Computer Engineering & Computer Science
California State University, Long Beach
2. TCP/IP
TCP/IP forms the basis for all Internet communication.
TCP/IP includes protocols for both:
• An unreliable connectionless delivery service (UDP)
• A reliable connection-oriented service (TCP)
Both UDP and TCP run at Layer 4 on top of the IP Protocol.
3. IP Datagrams
How does a packet (IP Datagram) travel across the Internet?
A host:
• creates a packet
• places the destination address in the packet header
• sends the packet to a nearby router
A router
• receives a packet
• uses the destination address to select the next router on the path
• forwards the packet
Eventually, the packet reaches a router that can deliver the packet to its final
destination
4. IP Datagrams (cont’d)
IP defines a packet format that is independent of the hardware.
The result is a universal, virtual packet called an IP datagram.
As the term virtual implies:
• IP Datagram format is not tied directly to any hardware
• The underlying hardware does not understand or recognize an IP datagram
• Instead, each host or router in the Internet contains protocol software that
recognizes the IP datagrams.
Each datagram consists of a header followed by data area (payload):
• The amount of data carried in a datagram is not fixed
• The size of a datagram is determined by the application that sends data
• A datagram can contain as little as a single octet of data or at most 64K octets
5. IP Datagram Header (Version 4)
What does a datagram header contain?
• It contains the IP address of the destination (the ultimate recipient) which is
used to forward the datagram
The datagram header also contains information, such as:
• the IP address of the source (the original sender)
• and a field that specifies the type of data being carried in the payload
Important: each address in
the datagram header is an IP
address.
MAC addresses for the
sender and recipient do
not appear
Note: Each field in an IP
datagram header has a fixed
size
This makes header
processing efficient.
6. IP Datagram Fields
VERS -- Each datagram begins with a 4-bit protocol version number (the figure shows a
version 4 header)
H.LEN -- 4-bit header specifies the number of 32-bit quantities in the header (If no
options, the value is 5)
SERVICE TYPE -- 8-bit field that carries a class of service for the datagram (seldom
used in practice)
TOTAL LENGTH -- 16-bit integer that specifies the total number of bytes in the
datagram (both header and data)
IDENTIFICATION -- 16-bit number (usually sequential) assigned to the datagram
(used in fragments, too)
FLAGS -- 3-bit field with individual bits specifying whether the datagram is a fragment
FRAGMENT OFFSET -- 13-bit field that specifies where in the original datagram the
data in this fragment belongs (the value of the field is multiplied by 8 to obtain an offset)
7. IP Datagram Fields (cont’d)
TIME TO LIVE -- 8-bit integer initialized by the original sender; decremented by each
router that processes the datagram; if the value reaches zero (0), the datagram is discarded
and an error message is sent back to the source
TYPE -- 8-bit field that specifies the type of the payload
HEADER CHECKSUM -- 16-bit ones-complement checksum of header fields
SOURCE IPADDRESS -- 32-bit Internet address of the original sender (the addresses
of intermediate routers are not in the header)
DESTINATION IPADDRESS -- 32-bit Internet address of the ultimate destination
IP OPTIONS -- Optional header fields used to control routing and datagram processing
(seldom used)
PADDING -- If options do not end on a 32-bit boundary, zero bits of padding are added
to make the header a multiple of 32 bits
8. Forwarding an IP Datagram
The Internet uses next-hop forwarding.
Each router along the path:
• receives the datagram
• extracts the destination address from the header
• uses the destination address & forwarding Table to determine the next hop to
which the datagram should be sent
• then the router forwards the datagram to the next hop (either the final destination
or another router)
The forwarding table is filled with entries by the routing algorithm.
The forwarding table is initialized when the router boots and must be updated if the
topology changes or hardware fails.
9. Forwarding an IP Datagram
Figure 22.3 shows an example internet and the contents of a forwarding table for
router R2:
10. Network Prefix Extraction
• The router uses the forwarding table to select the next hop for a datagram.
• This process is called forwarding.
• The mask field in a forwarding table entry is used to extract the network
portion of an address.
EXAMPLE:
When a router encounters a datagram with destination IP address D the
forwarding function must find an entry in the forwarding table that specifies a
next hop for D.
• The software examines each entry in the table by using the subnet mask in the
entry to extract the prefix of address D.
• It compares the resulting prefix to the Destination field of the entry
• If the two are equal, the datagram will be forwarded to the Next Hop
11. Network Prefix Extraction (cont’d)
The bit mask representation makes extraction efficient:
• the computation consists of a Boolean & between the mask and destination
address, D
The computation to examine the ith entry in the table can be as:
if ( (Mask[i] & D) == Destination[i] ) forward to NextHop[i]
12. Forwarding Table Notes
In practice, Internet forwarding tables can be extremely large and the forwarding
algorithm is complex.
This table is a trivial example:
Internet forwarding tables contain a default entry that provides a path for all
destinations that are not explicitly listed.
A network manager can specify a host-specific route.
A forwarding table can have addresses that overlap.
13. Longest Prefix Match
Suppose a router's forwarding table contains entries for the following two network
prefixes:
128.10.0.0/16 and 128.10.2.0/24
What happens if a datagram arrives destined to 128.10.2.3?
Matching procedure succeeds for both of the entries:
• a Boolean and of a 16-bit mask will produce 128.10.0.0
• a Boolean and with a 24-bit mask will produce 128.10.2.0
Question: Which entry should be used?
Answer: Internet forwarding uses a longest prefix match.
In this example, 128.10.2.0/24
14. The IP Protocol (Layer 3)
IP uses “Best Effort” Service.
IP makes the best effort it can to deliver each datagram, but it does not guarantee that it
will handle all problems, such as:
• Datagram duplication
• Delayed or out-of-order delivery
• Corruption of data
• Datagram loss
IP is designed to run over any type of network.
High-speed and low-speed networks can be attached together using routers.
15. Encapsulation
When IP datagram is encapsulated in a hardware frame, the entire datagram is placed
in the data area of the frame.
Notes:
• The network hardware treats the IP datagram like any other frame.
• The hardware does not examine the data area of the frame.
• The sender and receiver must agree on the value used in the frame type field of
the frame header in order to know the incoming frame contains an IP datagram.
• Encapsulation also requires the sender to supply the physical address of the
next computer to which the datagram should be sent (using the ARP
command).
16. Transmission
Across an
Internet
Encapsulation
applies to one
transmission at a
time (i.e., to one
hop across the
network at a time).
Notes:
Hosts and routers
store a datagram in
memory with no
additional header.
The Layer 2 frame
headers are
discarded at each
router.
17. MTU, Datagram Size, and Encapsulation
Defn: The maximum transmission unit (MTU) is the maximum amount of data that a
frame can carry.
Each hardware technology specifies its own MTU.
• There is no exception to the MTU limit.
• A datagram must be smaller or equal to the MTU in order to be transmitted.
Difficulty: In a heterogeneous network, a router can connect networks with different
MTUs.
18. Fragmentation & Reassembly
When a datagram is larger than the MTU of the network over which it must be sent,
the router divides the datagram into smaller pieces called fragments, and sends each
fragment independently.
• The fragments have the same format as other datagrams.
• The FLAG field contains a bit that means the datagram is a fragment.
• Other fields in the header contain information that allows the fragments to be
reassembled.
• Each fragment has a copy of the original header with fields modified as necessary.
19. Reassembly
The process of creating the original datagram from the fragments is called reassembly.
Note: The final fragment has a special bit set in the header to signal that all fragments
have arrived successfully.
The Internet Protocol specifies that the ultimate destination host should reassembly
the fragments.
Two advantages to reassembly at the destination:
• Reduces the amount of information in each router.
• It allows the routes to change dynamically.
In the figure, H2 will perform reassembly. R2 will simply forward the fragments.
20. Identifying a Datagram
• Each datagram has a unique identification number placed in the
IDENTIFICATION field.
• This datagram IDENTIFICATION field is also copied into each fragment.
• Thus, the IDENTIFICATION field plus the IP source address to determine to
which datagram a fragment belongs.
• For fragment ordering, the FRAGMENT OFFSET field specifies where in the
original datagram the fragment belongs.
Fragment Loss
• Since IP does not guarantee delivery, fragments may be lost or delayed.
• IP holds fragments for a limited time (a timer is set) to see whether all of the
fragments arrive.
• If they do, the datagram is reassembled completely.
• If all the fragments do not arrive, the datagram is discarded.
• Fragments are not retransmitted.
.
21. Fragmenting a Fragment
• If the MTU of a subsequent network is smaller than the one that caused
fragmentation, the fragments must be fragmented further.
• The IP fragmentation scheme allows this fragmentation with all fragments still
being treated in exactly the same way.
Example:
532