part iii network layer
DESCRIPTION
Part III Network Layer. Networking and Internetworking Devices. Connecting Devices. Following are the networking devices mostly used. Connecting Devices and the OSI Model. A Repeater in the OSI Model :Repeater is a regenerator not an amplifier. A Repeater. Function of a Repeater. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/1.jpg)
PART III NETWORK LAYER
1
![Page 2: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/2.jpg)
Networking and
Internetworking Devices
![Page 3: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/3.jpg)
Connecting Devices
Following are the networking devices mostly used
![Page 4: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/4.jpg)
Connecting Devices and the OSI Model
![Page 5: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/5.jpg)
A Repeater in the OSI Model :Repeater is a regenerator not an amplifier
![Page 6: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/6.jpg)
A Repeater
![Page 7: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/7.jpg)
Function of a Repeater
![Page 8: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/8.jpg)
Bridge : Operates in both physical and data link layer
![Page 9: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/9.jpg)
A Bridge
![Page 10: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/10.jpg)
Function of a Bridge
![Page 11: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/11.jpg)
Multiport Bridge
![Page 12: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/12.jpg)
Router: Router is Network layer device Router relay packets among multiple
interconnected networks
![Page 13: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/13.jpg)
Gateway :Is a protocol convertor A gateway accept a packet formatted for
one protocol and convert it to packet formatted for another protocol
![Page 14: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/14.jpg)
A Gateway
![Page 15: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/15.jpg)
Single-Protocol: Designd to route packet belonging to same protocol
Multiprotocol Router:Designd to route packet belonging to two or more protocol
![Page 16: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/16.jpg)
16
NETWORK LAYER DUTIES
![Page 17: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/17.jpg)
INTERNETWORKING
The Motivation for Internetworking There are many different LAN and WAN technologies In real world, computers are connected by many different
technologies Any system that spans a large organization must accommodate
multiple technologies
Universal services Telephones are useful because any telephone can reach any other
telephone Universal service among computers greatly increases the usefulness
of each computer Providing universal service requires interconnecting networks
employing different technologies
![Page 18: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/18.jpg)
WHAT IS INTERNETWORKING?
A scheme that provides universal service among heterogeneous networks
Hardware Used to interconnect a set of physical networks
Software Provide universal services
Internet System of connected physical networks
![Page 19: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/19.jpg)
INTERNETWORK
![Page 20: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/20.jpg)
NETWORK LAYER IN AN INTERNETWORK
![Page 21: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/21.jpg)
IPv4 ADDRESSESIPv4 ADDRESSES
An An IPv4 addressIPv4 address is a is a 32-bit32-bit address that uniquely and address that uniquely and universally defines the connection of a device (for universally defines the connection of a device (for example, a computer or a router) to the Internet.example, a computer or a router) to the Internet.
Address SpaceNotationsClassful AddressingClassless AddressingNetwork Address Translation (NAT)
Topics discussed in this section:Topics discussed in this section:
![Page 22: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/22.jpg)
FINDING THE ADDRESS CLASS
![Page 23: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/23.jpg)
FINDING THE CLASS IN DECIMAL NOTATION
![Page 24: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/24.jpg)
Example 4Example 4
Find the class of each address:
a. 227.12.14.87
b. 252.5.15.111
c. 134.11.78.56
SolutionSolutiona. The first byte is 227 (between 224 and 239); the class is D.b. The first byte is 252 (between 240 and 255); the class is E.c. The first byte is 134 (between 128 and 191); the class is B.
![Page 25: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/25.jpg)
NETID AND HOSTID
![Page 26: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/26.jpg)
NETWORK ADDRESS
![Page 27: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/27.jpg)
Example 5Example 5
Given the address 23.56.7.91, find the network address.
SolutionSolution
The class is A. Only the first byte defines the netid. We can find the network address by replacing the hostid bytes (56.7.91) with 0s. Therefore, the network address is 23.0.0.0.
![Page 28: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/28.jpg)
Example 6Example 6
Given the address 132.6.17.85, find the network address.
SolutionSolution
The class is B. The first 2 bytes defines the netid. We can find the network address by replacing the hostid bytes (17.85) with 0s. Therefore, the network address is 132.6.0.0.
![Page 29: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/29.jpg)
Example 7Example 7
Given the network address 17.0.0.0, find the class.
SolutionSolution
The class is A because the netid is only 1 byte.
![Page 30: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/30.jpg)
30
A NETWORK WITH TWO LEVELS OF HIERARCHY
• IP addresses are designed with two levels of hierarchy.
![Page 31: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/31.jpg)
31
A NETWORK WITH THREE LEVELS OF HIERARCHY
![Page 32: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/32.jpg)
ADDRESSES IN A NETWORK WITH AND WITHOUT SUBNETTING
![Page 33: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/33.jpg)
SUBNET MASK
![Page 34: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/34.jpg)
Dotted-decimal notation and binary notation for an IPv4 address
![Page 35: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/35.jpg)
Change the following IPv4 addresses from binary notation to dotted-decimal notation.
SolutionWe replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation.
![Page 36: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/36.jpg)
Change the following IPv4 addresses from dotted-decimal notation to binary notation.
SolutionWe replace each decimal number with its binary equivalent (see Appendix B).
![Page 37: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/37.jpg)
Finding the classes in binary and dotted-decimal notation
![Page 38: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/38.jpg)
Find the class of each address.a. 00000001 00001011 00001011 11101111b. 11000001 10000011 00011011 11111111c. 14.23.120.8d. 252.5.15.111
Solutiona. The first bit is 0. This is a class A address.b. The first 2 bits are 1; the third bit is 0. This is a class C address.c. The first byte is 14; the class is A.d. The first byte is 252; the class is E.
![Page 39: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/39.jpg)
Default masks for classful addressing
Mask Address
![Page 40: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/40.jpg)
shows a block of addresses, in both binary and dotted-decimal notation, granted to a small business that needs 16 addresses.
We can see that the restrictions are applied to this block. The addresses are contiguous. The number of addresses is a power of 2 (16 = 24), and the first address is divisible by 16. The first address, when converted to a decimal number, is 3,440,387,360, which when divided by 16 results in 215,024,210.
![Page 41: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/41.jpg)
A block of 16 addresses granted to a small organization
![Page 42: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/42.jpg)
A block of addresses is granted to a small organization. We know that one of the addresses is 205.16.37.39/28. What is the first address in the block?
SolutionThe binary representation of the given address is
11001101 00010000 00100101 00100111If we set 32−28 rightmost bits to 0, we get
11001101 00010000 00100101 0010000 or
205.16.37.32. This is actually the block shown in Figure 19.3.
![Page 43: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/43.jpg)
Find the last address for the block in the above example
SolutionThe binary representation of the given address is
11001101 00010000 00100101 00100111If we set 32 − 28 rightmost bits to 1, we get
11001101 00010000 00100101 00101111 or
205.16.37.47This is actually the block shown in Figure 19.3.
![Page 44: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/44.jpg)
b. The last address can be found by ORing the given addresses with the complement of the mask. ORing here is done bit by bit. The result of ORing 2 bits is 0 if both bits are 0s; the result is 1 otherwise. The complement of a number is found by changing each 1 to 0 and each 0 to 1.
![Page 45: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/45.jpg)
c. The number of addresses can be found by complementing the mask, interpreting it as a decimal number, and adding 1 to it.
![Page 46: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/46.jpg)
Configuration and addresses in a subnetted network
![Page 47: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/47.jpg)
Three-level hierarchy in an IPv4 address
![Page 48: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/48.jpg)
Network and Host Addresses
![Page 49: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/49.jpg)
A Network with Two Levels of Hierarchy
![Page 50: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/50.jpg)
A Network with Three Levels of Hierarchy
![Page 51: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/51.jpg)
Addresses with and without Subnetting
![Page 52: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/52.jpg)
Masking
![Page 53: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/53.jpg)
IP Datagram
![Page 54: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/54.jpg)
Detail of IP datagram
Version Number- Four bit version number defines the version of IP Header length- Defines the total length of the datagram header Service type-How the datagram should be handelled Total length – Defines total length of IP datagram Identification,Flags and fragmentation offset- These three fields are related to the fragmentation of the IP datagram when the size of the datagram is larger than the underplaying network can carry Time-to-alive- Is used to control the maximum number of hopes visited by the router
![Page 55: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/55.jpg)
Continue…
Protocol – In TCP/IP ,the data section of a packet ,called the payload ,carries the whole packet from another protocol Header checksum – Checking of header of IP is the responsibility of header checksum as IP is not a reliable protocol Source and Destination address- IP address of source machine and destination machine Option – A datagram header can have up to 40 bytes of optiones Payload – Is data coming from its higher layer
![Page 56: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/56.jpg)
ARP
![Page 57: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/57.jpg)
Routing Algorithm
Two common methods are used to calculate shortest path between
two routers :Distance vector routing
Link state routing
![Page 58: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/58.jpg)
Example of an Internet
![Page 59: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/59.jpg)
Distance Vector routing
Three keys to understand how this algorithm works1.Knowledge about the whole network –Each routers shares its knowledge about the entire network2.Routing only to its neighbor-Each router periodically shows its knowledge about the network only to those routers to which it has direct link .3.Information sharing at regular interval –For example ,every 30 seconds router send its information about the whole network to its neighbor
![Page 60: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/60.jpg)
The Concept of Distance Vector Routing
![Page 61: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/61.jpg)
Distance Vector Routing Table
![Page 62: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/62.jpg)
Routing Table Distribution
![Page 63: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/63.jpg)
Updating Routing Table for Router A
![Page 64: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/64.jpg)
Final Routing Tables
![Page 65: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/65.jpg)
![Page 66: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/66.jpg)
1. Router transmits its distance vector to each of its neighbors.
2. Each router receives and saves the most recently received distance vector from each of its neighbors.
3. A router recalculates its distance vector when:
a. It receives a distance vector from a neighbor containing different information than before.
b. It discovers that a link to a neighbor has gone down (i.e., a topology change).
The DV calculation is based on minimizing the cost to each destination.
Algorithm :Distance Vector Routing Algorithm :Distance Vector Routing
![Page 67: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/67.jpg)
67
Link State Routing
The following are true related to link state routing 1.Knowledge about the neighborhood 2.To all routers –Each router send this information to every other router on the internetwork not just to its neighbor .3.Information sharing when there is change –Each router send out information about the neighbors when there is change.
![Page 68: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/68.jpg)
Algorithm :Link State routing Algorithm :Link State routing
1. Each router is responsible for meeting its neighbors and learning their names.
2. Each router constructs a link state packet (LSP) which consists of a list of names and cost to reach each of its neighbors.
3. The LSP is transmitted to ALL other routers. Each router stores the most recently generated LSP from each other router.
4. Each router uses complete information on the network topology to compute the shortest path route to each destination node.
![Page 69: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/69.jpg)
Concept of Link State Routing
![Page 70: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/70.jpg)
Cost in Link State Routing
![Page 71: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/71.jpg)
Link State Packet
![Page 72: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/72.jpg)
Flooding of A’s LSP
![Page 73: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/73.jpg)
Link State Database
![Page 74: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/74.jpg)
Initially mark all nodes (except source) with infinite distance.
working node = source nodeSink node = destination nodeWhile the working node is not equal to the sink 1. Mark the working node as permanent. 2. Examine all adjacent nodes in turn
If the sum of label on working node plus distance from working node to adjacent node is less than current labeled distance on the adjacent node, this implies a shorter path. Relabel the distance on the adjacent node and label it with the node from which the probe was made.
3. Examine all tentative nodes (not just adjacent nodes) and mark the node with the smallest labeled value as permanent. This node becomes the new working node.
Reconstruct the path backwards from sink to source.
Dijkstra’s Shortest Path Algorithm
![Page 75: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/75.jpg)
Costs in the Dijkstra Algorithm
![Page 76: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/76.jpg)
Shortest Path Calculation, Part I
![Page 77: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/77.jpg)
Shortest Path Calculation, Part II
![Page 78: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/78.jpg)
Shortest Path Calculation, Part III
![Page 79: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/79.jpg)
Shortest Path Calculation, Part IV
![Page 80: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/80.jpg)
Shortest Path Calculation, Part V
![Page 81: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/81.jpg)
Shortest Path Calculation, Part VI
![Page 82: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/82.jpg)
Shortest Path Calculation, Part VII
![Page 83: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/83.jpg)
Shortest Path Calculation, Part VIII
![Page 84: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/84.jpg)
Shortest Path Calculation, Part IX
![Page 85: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/85.jpg)
Shortest Path Calculation, Part X
![Page 86: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/86.jpg)
Shortest Path Calculation, Part XI
![Page 87: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/87.jpg)
Shortest Path Calculation, Part XII
![Page 88: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/88.jpg)
Shortest Path Calculation, Part XIII
![Page 89: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/89.jpg)
Routing Table for Router A
![Page 90: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/90.jpg)
Multiprotocol Router Vs Single protocol Router
90
Single protocol Router: (Unicast Routing protocol ) : One to one source and destination network RIP :Routing Information Protocol OSPF : Open Shortest Path First BGP4 :Boarder Gateway Protocol 4
Multiprotocol Router (Multicast routing Protocol) One source and group of destination (One to many ) Protocols are DVMRP :Distance Vector Multicast routing protocol MOSF :Multicast open Shortest Path First PIM :Protocol Independent Multicast
![Page 91: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/91.jpg)
Part-IV Transport Layer
![Page 92: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/92.jpg)
Transport Layer protocol
Two protocols : UDP and TCP UDP is connectionless protocol while TCP is connection oriented protocol
![Page 93: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/93.jpg)
Duties of transport layer Duties of transport layer
Process-to-Process Communication Stream Delivery Service Full-Duplex Communication Multiplexing and Demultiplexing
![Page 94: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/94.jpg)
UDP Format
![Page 95: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/95.jpg)
15-2 TCP FEATURES
To provide the services mentioned in the previous section, TCP has several features that are briefly summarized in this section and discussed later in detail.
![Page 96: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/96.jpg)
The bytes of data being transferred in each connection are numbered by TCP.
The numbering starts with an arbitrarily generated number.
Note
![Page 97: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/97.jpg)
Suppose a TCP connection is transferring a file of 5,000 bytes. The first byte is numbered 10,001. What are the sequence numbers for each segment if data are sent in five segments, each carrying 1,000 bytes?
SolutionThe following shows the sequence number for each segment:
![Page 98: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/98.jpg)
The value in the sequence number field of a segment defines the number
assigned to the first data byte contained in that segment.
Note
![Page 99: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/99.jpg)
Stream delivery
![Page 100: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/100.jpg)
Sending and receiving buffers
Stream of bytes
![Page 101: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/101.jpg)
TCP segments
Segment 1
H
Segment N
H
![Page 102: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/102.jpg)
The value of the acknowledgment field in a segment defines the number of the next
byte a party expects to receive.
The acknowledgment number is cumulative.
Note
![Page 103: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/103.jpg)
SEGMENT
Before discussing TCP in more detail, let us discuss the TCP packets themselves. A packet in TCP is called a segment.
![Page 104: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/104.jpg)
TCP segment format
![Page 105: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/105.jpg)
Control field
![Page 106: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/106.jpg)
TCP header fields106
Port Number: A port number identifies the endpoint of a
connection. A pair <IP address, port number> identifies one
endpoint of a connection. Two pairs <client IP address, server port number> and <server IP address, server port number> identify a TCP connection.
TCP
IP
Applications
23 10480Ports:
TCP
IP
Applications
7 1680 Ports:
![Page 107: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/107.jpg)
TCP header fields107
Sequence Number (SeqNo): Sequence number is 32 bits long. So the range of SeqNo is
0 <= SeqNo <= 232 -1 4.3 Gbyte
Each sequence number identifies a byte in the byte stream
Initial Sequence Number (ISN) of a connection is set during connection establishment
![Page 108: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/108.jpg)
TCP header fields108
Acknowledgement Number (AckNo): Acknowledgements are piggybacked, I.e
a segment from A -> B can contain an acknowledgement for a segment sent in the B -> A direction.
A hosts uses the AckNo field to send acknowledgements. (If a host sends an AckNo in a segment it sets the “ACK flag”)
The AckNo contains the next SeqNo that a hosts wants to receiveExample: The acknowledgement for a segment with sequence number 0 and 1500 data bytes is AckNo=1500+1
![Page 109: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/109.jpg)
TCP header fields109
Acknowledge Number (cont’d) TCP uses the sliding window flow protocol to
regulate the flow of traffic from sender to receiver TCP uses the following variation of sliding window:
no NACKs (Negative ACKnowledgement) only cumulative ACKs
Example: Assume: Sender sends two segments with “0..1500”
and “1501..3000”, but receiver only gets the second segment.
In this case, the receiver cannot acknowledge the second packet. It can only send AckNo=0+1
![Page 110: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/110.jpg)
TCP header fields110
Header Length ( 4bits): Length of header in 32-bit words Note that TCP header has variable length
(with minimum 20 bytes)
![Page 111: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/111.jpg)
TCP header fields111
Flag bits: URG: Urgent pointer is valid
If the bit is set, the following bytes contain an urgent message in the range:
SeqNo <= urgent message <= SeqNo+urgent pointer
ACK: Acknowledgement Number is valid PSH: PUSH Flag
Notification from sender to the receiver that the receiver should pass all data that it has to the application.
Normally set by sender when the sender’s buffer is empty
![Page 112: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/112.jpg)
TCP header fields112
Flag bits: RST: Reset the connection
The flag causes the receiver to reset the connection
Receiver of a RST terminates the connection and indicates higher layer application about the reset
SYN: Synchronize sequence numbers Sent in the first packet when initiating a connection
FIN: Sender is finished with sending Used for closing a connection Both sides of a connection must send a FIN
![Page 113: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/113.jpg)
TCP header fields113
Window Size: Each side of the connection advertises the
window size Window size is the maximum number of
bytes that a receiver can accept. Maximum window size is 216-1= 65535 bytes
TCP Checksum: TCP checksum covers TCP segment and IP
pseudo header (see discussion on UDP). Urgent Pointer:
Only valid if URG flag is set
![Page 114: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/114.jpg)
TCP header fields114
Options: NOP is used to pad TCP header to multiples
of 4 bytes Maximum Segment Size Window Scale Options
Increases the TCP window from 16 to 32 bits This option can only be used in the SYN
segment (first segment) during connection establishment time
Timestamp Option Can be used for roundtrip measurements
![Page 115: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/115.jpg)
Services of TCP115
Connection Management (TCP transmission policy) :To establish connection before transmitting data
Congestion Management Timer Management for sending lost
frame and others
![Page 116: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/116.jpg)
Connection Management in TCP
116
Opening a TCP Connection Closing a TCP Connection Special Scenarios State Diagram
![Page 117: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/117.jpg)
TCP Connection Establishment
117
TCP uses a three-way handshake to open a connection:(1) ACTIVE OPEN: Client sends a segment with
SYN bit set port number of client initial sequence number (ISN) of client
(2) PASSIVE OPEN: Server responds with a segment with
SYN bit set initial sequence number of server ACK for ISN of client
(3) Client acknowledges by sending a segment with:
ACK ISN of server
![Page 118: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/118.jpg)
A TCP CONNECTION
TCP is connection-oriented. It establishes a virtual path between the source and destination. All of the segments belonging to a message are then sent over this virtual path. You may wonder how TCP, which uses the services of IP, a connectionless protocol, can be connection-oriented. The point is that a TCP connection is virtual, not physical. TCP operates at a higher level. TCP uses the services of IP to deliver individual segments to the receiver, but it controls the connection itself. If a segment is lost or corrupted, it is retransmitted.
![Page 119: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/119.jpg)
Connection establishment using three-way handshake
Connectionopened
PassiveopenActive
open
SYN
U A P R S F
seq: 8000
SYN + ACKU A P R S F
seq: 15000
ack: 8001rwnd: 5000
ACK
U A P R S F
seq: 8000ack: 15001
rwnd: 10000
Means “no data” !
![Page 120: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/120.jpg)
A SYN segment cannot carry data, but it consumes one sequence number.
A SYN + ACK segment cannot carry data, but does consume one
sequence number.
An ACK segment, if carrying no data, consumes no sequence number.
![Page 121: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/121.jpg)
WINDOWS IN TCP
Before discussing data transfer in TCP and the issues such as flow, error, and congestion control, we describe the windows used in TCP. TCP uses two windows (send window and receive window) for each direction of data transfer, which means four windows for a bidirectional communication. To make the discussion simple, we make an assumption that communication is only unidirectional; the bidirectional communication can be inferred using two unidirectional communications with piggybacking.
![Page 122: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/122.jpg)
Topics Discussed in the SectionTopics Discussed in the Section
Send Window Receive Window
![Page 123: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/123.jpg)
Send window in TCP
![Page 124: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/124.jpg)
Receive window in TCP
![Page 125: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/125.jpg)
FLOW CONTROL
As discussed in, flow control balances the rate a producer creates data with the rate a consumer can use the data. TCP separates flow control from error control. In this section we discuss flow control, ignoring error control. We temporarily assume that the logical channel between the sending and receiving TCP is error-free. Figure 15.24 shows unidirectional data transfer between a sender and a receiver; bidirectional data transfer can be deduced from unidirectional one as discussed in Chapter 13.
![Page 126: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/126.jpg)
TCP/IP protocol suite
Messagesare pushed
1
Segements are pushed
2
Messagesare pulled
3
Flow control feedback
4
Flow controlfeedback5
![Page 127: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/127.jpg)
ERROR CONTROL
TCP is a reliable transport layer protocol. This means that an application program that delivers a stream of data to TCP relies on TCP to deliver the entire stream to the application program on the other end in order, without error, and without any part lost or duplicated.
Error control in TCP is achieved through the use of three tools: checksum, acknowledgment, and time-out.
![Page 128: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/128.jpg)
CONGESTION CONTROL
Congestion control in TCP is based on both open loop and closed-loop mechanisms. TCP uses a congestion window and a congestion policy that avoid congestion and detect and alleviate congestion after it has occurred.
![Page 129: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/129.jpg)
TCP TIMERS: Timer Management
To perform its operation smoothly, most TCP implementations use at least four timers as shown in Figure 15.38 (slide 83).
![Page 130: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/130.jpg)
TCP timers
![Page 131: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/131.jpg)
TCP TimerTCP Timer
Retransmission Timer(RTT):To retransmit lost segments TCP employs one retransmission timer
Rules of RTT
1.When TCP send the segment in front of the sending queue ,it starts the timer
2.When the timer expires TCP send first segment in front of the queue and restart the timer
3.When the segments are cumulatively acknowledged segment or segments are purged from the queue
4.If the queue is empty ,TCP stops the timer ,otherwise TCP restarts the timer
![Page 132: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/132.jpg)
Persistence Timer :To deal with zero window size advertise TCP uses other timer known as persistence timer .If the receiving TCP announces a window size of zero ,the sending TCP stops transmitting segments until the receiving TCP sends an ACK segment announcing non zero size of window Keepalive Timer: Is used in some implementation to prevent long idle connection between two TCPs.Suppose a client open a connection with server and transfer data and become silent . TIME-WAIT Timer:Is used during connection termination
![Page 133: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/133.jpg)
Part-V Presentation and Application Layer
![Page 134: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/134.jpg)
Session Layer Dialog
![Page 135: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/135.jpg)
Session-to-Transport Layer Communication
![Page 136: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/136.jpg)
Synchronization Points
![Page 137: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/137.jpg)
Presentation Layer Functions
![Page 138: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/138.jpg)
Direct and Indirect Methods of Translation
![Page 139: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/139.jpg)
Concept of Encryption and Decryption
![Page 140: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/140.jpg)
Encryption/Decryption Methods
![Page 141: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/141.jpg)
Monoalphabetic Substitution
![Page 142: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/142.jpg)
Polyalphabetic Substitution
![Page 143: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/143.jpg)
Transpositional Encryption
![Page 144: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/144.jpg)
Encoding/Decoding
![Page 145: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/145.jpg)
Permutation
![Page 146: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/146.jpg)
Substitution
![Page 147: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/147.jpg)
Product
![Page 148: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/148.jpg)
Exclusive OR
![Page 149: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/149.jpg)
Rotation
![Page 150: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/150.jpg)
DES
![Page 151: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/151.jpg)
Subkey Generation in DES
![Page 152: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/152.jpg)
One of the 16Steps in DES
![Page 153: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/153.jpg)
Public Key Encryption
![Page 154: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/154.jpg)
RSA
![Page 155: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/155.jpg)
RSA Encryption and Decryption
![Page 156: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/156.jpg)
Security of RSA
![Page 157: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/157.jpg)
Signature Authentication
![Page 158: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/158.jpg)
Application Layer
![Page 159: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/159.jpg)
Client-Server Model
![Page 160: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/160.jpg)
DNS in the Internet
![Page 161: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/161.jpg)
Generic Domains
![Page 162: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/162.jpg)
Country Domains
![Page 163: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/163.jpg)
Inverse Domain
![Page 164: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/164.jpg)
Local Login
![Page 165: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/165.jpg)
Remote Login
![Page 166: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/166.jpg)
Concept of NVT
![Page 167: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/167.jpg)
FTP
![Page 168: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/168.jpg)
SMTP Concept
![Page 169: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/169.jpg)
UAs and MTs
![Page 170: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/170.jpg)
Relay MTAs
![Page 171: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/171.jpg)
Mail Gateways
![Page 172: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/172.jpg)
E-mail Address
![Page 173: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/173.jpg)
The Entire E-mail System
![Page 174: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/174.jpg)
MIME
![Page 175: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/175.jpg)
POP3 and SMTP
![Page 176: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/176.jpg)
SNMP Concept
![Page 177: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/177.jpg)
Internet Management Components
![Page 178: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/178.jpg)
MIB
![Page 179: Part III Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062322/5681499b550346895db6de2e/html5/thumbnails/179.jpg)
SNMP Messages