part iii network layer

179
PART III NETWORK LAYER 1

Upload: nikkos

Post on 15-Jan-2016

35 views

Category:

Documents


1 download

DESCRIPTION

Part III Network Layer. Networking and Internetworking Devices. Connecting Devices. Following are the networking devices mostly used. Connecting Devices and the OSI Model. A Repeater in the OSI Model :Repeater is a regenerator not an amplifier. A Repeater. Function of a Repeater. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Part III Network Layer

PART III NETWORK LAYER

1

Page 2: Part III Network Layer

Networking and

Internetworking Devices

Page 3: Part III Network Layer

Connecting Devices

Following are the networking devices mostly used

Page 4: Part III Network Layer

Connecting Devices and the OSI Model

Page 5: Part III Network Layer

A Repeater in the OSI Model :Repeater is a regenerator not an amplifier

Page 6: Part III Network Layer

A Repeater

Page 7: Part III Network Layer

Function of a Repeater

Page 8: Part III Network Layer

Bridge : Operates in both physical and data link layer

Page 9: Part III Network Layer

A Bridge

Page 10: Part III Network Layer

Function of a Bridge

Page 11: Part III Network Layer

Multiport Bridge

Page 12: Part III Network Layer

Router: Router is Network layer device Router relay packets among multiple

interconnected networks

Page 13: Part III Network Layer

Gateway :Is a protocol convertor A gateway accept a packet formatted for

one protocol and convert it to packet formatted for another protocol

Page 14: Part III Network Layer

A Gateway

Page 15: Part III Network Layer

Single-Protocol: Designd to route packet belonging to same protocol

Multiprotocol Router:Designd to route packet belonging to two or more protocol

Page 16: Part III Network Layer

16

NETWORK LAYER DUTIES

Page 17: Part III Network Layer

INTERNETWORKING

The Motivation for Internetworking There are many different LAN and WAN technologies In real world, computers are connected by many different

technologies Any system that spans a large organization must accommodate

multiple technologies

Universal services Telephones are useful because any telephone can reach any other

telephone Universal service among computers greatly increases the usefulness

of each computer Providing universal service requires interconnecting networks

employing different technologies

Page 18: Part III Network Layer

WHAT IS INTERNETWORKING?

A scheme that provides universal service among heterogeneous networks

Hardware Used to interconnect a set of physical networks

Software Provide universal services

Internet System of connected physical networks

Page 19: Part III Network Layer

INTERNETWORK

Page 20: Part III Network Layer

NETWORK LAYER IN AN INTERNETWORK

Page 21: Part III Network Layer

IPv4 ADDRESSESIPv4 ADDRESSES

An An IPv4 addressIPv4 address is a is a 32-bit32-bit address that uniquely and address that uniquely and universally defines the connection of a device (for universally defines the connection of a device (for example, a computer or a router) to the Internet.example, a computer or a router) to the Internet.

Address SpaceNotationsClassful AddressingClassless AddressingNetwork Address Translation (NAT)

Topics discussed in this section:Topics discussed in this section:

Page 22: Part III Network Layer

FINDING THE ADDRESS CLASS

Page 23: Part III Network Layer

FINDING THE CLASS IN DECIMAL NOTATION

Page 24: Part III Network Layer

Example 4Example 4

Find the class of each address:

a. 227.12.14.87

b. 252.5.15.111

c. 134.11.78.56

SolutionSolutiona. The first byte is 227 (between 224 and 239); the class is D.b. The first byte is 252 (between 240 and 255); the class is E.c. The first byte is 134 (between 128 and 191); the class is B.

Page 25: Part III Network Layer

NETID AND HOSTID

Page 26: Part III Network Layer

NETWORK ADDRESS

Page 27: Part III Network Layer

Example 5Example 5

Given the address 23.56.7.91, find the network address.

SolutionSolution

The class is A. Only the first byte defines the netid. We can find the network address by replacing the hostid bytes (56.7.91) with 0s. Therefore, the network address is 23.0.0.0.

Page 28: Part III Network Layer

Example 6Example 6

Given the address 132.6.17.85, find the network address.

SolutionSolution

The class is B. The first 2 bytes defines the netid. We can find the network address by replacing the hostid bytes (17.85) with 0s. Therefore, the network address is 132.6.0.0.

Page 29: Part III Network Layer

Example 7Example 7

Given the network address 17.0.0.0, find the class.

SolutionSolution

The class is A because the netid is only 1 byte.

Page 30: Part III Network Layer

30

A NETWORK WITH TWO LEVELS OF HIERARCHY

• IP addresses are designed with two levels of hierarchy.

Page 31: Part III Network Layer

31

A NETWORK WITH THREE LEVELS OF HIERARCHY

Page 32: Part III Network Layer

ADDRESSES IN A NETWORK WITH AND WITHOUT SUBNETTING

Page 33: Part III Network Layer

SUBNET MASK

Page 34: Part III Network Layer

Dotted-decimal notation and binary notation for an IPv4 address

Page 35: Part III Network Layer

Change the following IPv4 addresses from binary notation to dotted-decimal notation.

SolutionWe replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation.

Page 36: Part III Network Layer

Change the following IPv4 addresses from dotted-decimal notation to binary notation.

SolutionWe replace each decimal number with its binary equivalent (see Appendix B).

Page 37: Part III Network Layer

Finding the classes in binary and dotted-decimal notation

Page 38: Part III Network Layer

Find the class of each address.a. 00000001 00001011 00001011 11101111b. 11000001 10000011 00011011 11111111c. 14.23.120.8d. 252.5.15.111

Solutiona. The first bit is 0. This is a class A address.b. The first 2 bits are 1; the third bit is 0. This is a class C address.c. The first byte is 14; the class is A.d. The first byte is 252; the class is E.

Page 39: Part III Network Layer

Default masks for classful addressing

Mask Address

Page 40: Part III Network Layer

shows a block of addresses, in both binary and dotted-decimal notation, granted to a small business that needs 16 addresses.

We can see that the restrictions are applied to this block. The addresses are contiguous. The number of addresses is a power of 2 (16 = 24), and the first address is divisible by 16. The first address, when converted to a decimal number, is 3,440,387,360, which when divided by 16 results in 215,024,210.

Page 41: Part III Network Layer

A block of 16 addresses granted to a small organization

Page 42: Part III Network Layer

A block of addresses is granted to a small organization. We know that one of the addresses is 205.16.37.39/28. What is the first address in the block?

SolutionThe binary representation of the given address is

11001101 00010000 00100101 00100111If we set 32−28 rightmost bits to 0, we get

11001101 00010000 00100101 0010000 or

205.16.37.32. This is actually the block shown in Figure 19.3.

Page 43: Part III Network Layer

Find the last address for the block in the above example

SolutionThe binary representation of the given address is

11001101 00010000 00100101 00100111If we set 32 − 28 rightmost bits to 1, we get

11001101 00010000 00100101 00101111 or

205.16.37.47This is actually the block shown in Figure 19.3.

Page 44: Part III Network Layer

b. The last address can be found by ORing the given addresses with the complement of the mask. ORing here is done bit by bit. The result of ORing 2 bits is 0 if both bits are 0s; the result is 1 otherwise. The complement of a number is found by changing each 1 to 0 and each 0 to 1.

Page 45: Part III Network Layer

c. The number of addresses can be found by complementing the mask, interpreting it as a decimal number, and adding 1 to it.

Page 46: Part III Network Layer

Configuration and addresses in a subnetted network

Page 47: Part III Network Layer

Three-level hierarchy in an IPv4 address

Page 48: Part III Network Layer

Network and Host Addresses

Page 49: Part III Network Layer

A Network with Two Levels of Hierarchy

Page 50: Part III Network Layer

A Network with Three Levels of Hierarchy

Page 51: Part III Network Layer

Addresses with and without Subnetting

Page 52: Part III Network Layer

Masking

Page 53: Part III Network Layer

IP Datagram

Page 54: Part III Network Layer

Detail of IP datagram

Version Number- Four bit version number defines the version of IP Header length- Defines the total length of the datagram header Service type-How the datagram should be handelled Total length – Defines total length of IP datagram Identification,Flags and fragmentation offset- These three fields are related to the fragmentation of the IP datagram when the size of the datagram is larger than the underplaying network can carry Time-to-alive- Is used to control the maximum number of hopes visited by the router

Page 55: Part III Network Layer

Continue…

Protocol – In TCP/IP ,the data section of a packet ,called the payload ,carries the whole packet from another protocol Header checksum – Checking of header of IP is the responsibility of header checksum as IP is not a reliable protocol Source and Destination address- IP address of source machine and destination machine Option – A datagram header can have up to 40 bytes of optiones Payload – Is data coming from its higher layer

Page 56: Part III Network Layer

ARP

Page 57: Part III Network Layer

Routing Algorithm

Two common methods are used to calculate shortest path between

two routers :Distance vector routing

Link state routing

Page 58: Part III Network Layer

Example of an Internet

Page 59: Part III Network Layer

Distance Vector routing

Three keys to understand how this algorithm works1.Knowledge about the whole network –Each routers shares its knowledge about the entire network2.Routing only to its neighbor-Each router periodically shows its knowledge about the network only to those routers to which it has direct link .3.Information sharing at regular interval –For example ,every 30 seconds router send its information about the whole network to its neighbor

Page 60: Part III Network Layer

The Concept of Distance Vector Routing

Page 61: Part III Network Layer

Distance Vector Routing Table

Page 62: Part III Network Layer

Routing Table Distribution

Page 63: Part III Network Layer

Updating Routing Table for Router A

Page 64: Part III Network Layer

Final Routing Tables

Page 65: Part III Network Layer
Page 66: Part III Network Layer

1. Router transmits its distance vector to each of its neighbors.

2. Each router receives and saves the most recently received distance vector from each of its neighbors.

3. A router recalculates its distance vector when:

a. It receives a distance vector from a neighbor containing different information than before.

b. It discovers that a link to a neighbor has gone down (i.e., a topology change).

The DV calculation is based on minimizing the cost to each destination.

Algorithm :Distance Vector Routing Algorithm :Distance Vector Routing

Page 67: Part III Network Layer

67

Link State Routing

The following are true related to link state routing 1.Knowledge about the neighborhood 2.To all routers –Each router send this information to every other router on the internetwork not just to its neighbor .3.Information sharing when there is change –Each router send out information about the neighbors when there is change.

Page 68: Part III Network Layer

Algorithm :Link State routing Algorithm :Link State routing

1. Each router is responsible for meeting its neighbors and learning their names.

2. Each router constructs a link state packet (LSP) which consists of a list of names and cost to reach each of its neighbors.

3. The LSP is transmitted to ALL other routers. Each router stores the most recently generated LSP from each other router.

4. Each router uses complete information on the network topology to compute the shortest path route to each destination node.

Page 69: Part III Network Layer

Concept of Link State Routing

Page 70: Part III Network Layer

Cost in Link State Routing

Page 71: Part III Network Layer

Link State Packet

Page 72: Part III Network Layer

Flooding of A’s LSP

Page 73: Part III Network Layer

Link State Database

Page 74: Part III Network Layer

Initially mark all nodes (except source) with infinite distance.

working node = source nodeSink node = destination nodeWhile the working node is not equal to the sink 1. Mark the working node as permanent. 2. Examine all adjacent nodes in turn

If the sum of label on working node plus distance from working node to adjacent node is less than current labeled distance on the adjacent node, this implies a shorter path. Relabel the distance on the adjacent node and label it with the node from which the probe was made.

3. Examine all tentative nodes (not just adjacent nodes) and mark the node with the smallest labeled value as permanent. This node becomes the new working node.

Reconstruct the path backwards from sink to source.

Dijkstra’s Shortest Path Algorithm

Page 75: Part III Network Layer

Costs in the Dijkstra Algorithm

Page 76: Part III Network Layer

Shortest Path Calculation, Part I

Page 77: Part III Network Layer

Shortest Path Calculation, Part II

Page 78: Part III Network Layer

Shortest Path Calculation, Part III

Page 79: Part III Network Layer

Shortest Path Calculation, Part IV

Page 80: Part III Network Layer

Shortest Path Calculation, Part V

Page 81: Part III Network Layer

Shortest Path Calculation, Part VI

Page 82: Part III Network Layer

Shortest Path Calculation, Part VII

Page 83: Part III Network Layer

Shortest Path Calculation, Part VIII

Page 84: Part III Network Layer

Shortest Path Calculation, Part IX

Page 85: Part III Network Layer

Shortest Path Calculation, Part X

Page 86: Part III Network Layer

Shortest Path Calculation, Part XI

Page 87: Part III Network Layer

Shortest Path Calculation, Part XII

Page 88: Part III Network Layer

Shortest Path Calculation, Part XIII

Page 89: Part III Network Layer

Routing Table for Router A

Page 90: Part III Network Layer

Multiprotocol Router Vs Single protocol Router

90

Single protocol Router: (Unicast Routing protocol ) : One to one source and destination network RIP :Routing Information Protocol OSPF : Open Shortest Path First BGP4 :Boarder Gateway Protocol 4

Multiprotocol Router (Multicast routing Protocol) One source and group of destination (One to many ) Protocols are DVMRP :Distance Vector Multicast routing protocol MOSF :Multicast open Shortest Path First PIM :Protocol Independent Multicast

Page 91: Part III Network Layer

Part-IV Transport Layer

Page 92: Part III Network Layer

Transport Layer protocol

Two protocols : UDP and TCP UDP is connectionless protocol while TCP is connection oriented protocol

Page 93: Part III Network Layer

Duties of transport layer Duties of transport layer

Process-to-Process Communication Stream Delivery Service Full-Duplex Communication Multiplexing and Demultiplexing

Page 94: Part III Network Layer

UDP Format

Page 95: Part III Network Layer

15-2 TCP FEATURES

To provide the services mentioned in the previous section, TCP has several features that are briefly summarized in this section and discussed later in detail.

Page 96: Part III Network Layer

The bytes of data being transferred in each connection are numbered by TCP.

The numbering starts with an arbitrarily generated number.

Note

Page 97: Part III Network Layer

Suppose a TCP connection is transferring a file of 5,000 bytes. The first byte is numbered 10,001. What are the sequence numbers for each segment if data are sent in five segments, each carrying 1,000 bytes?

SolutionThe following shows the sequence number for each segment:

Page 98: Part III Network Layer

The value in the sequence number field of a segment defines the number

assigned to the first data byte contained in that segment.

Note

Page 99: Part III Network Layer

Stream delivery

Page 100: Part III Network Layer

Sending and receiving buffers

Stream of bytes

Page 101: Part III Network Layer

TCP segments

Segment 1

H

Segment N

H

Page 102: Part III Network Layer

The value of the acknowledgment field in a segment defines the number of the next

byte a party expects to receive.

The acknowledgment number is cumulative.

Note

Page 103: Part III Network Layer

SEGMENT

Before discussing TCP in more detail, let us discuss the TCP packets themselves. A packet in TCP is called a segment.

Page 104: Part III Network Layer

TCP segment format

Page 105: Part III Network Layer

Control field

Page 106: Part III Network Layer

TCP header fields106

Port Number: A port number identifies the endpoint of a

connection. A pair <IP address, port number> identifies one

endpoint of a connection. Two pairs <client IP address, server port number> and <server IP address, server port number> identify a TCP connection.

TCP

IP

Applications

23 10480Ports:

TCP

IP

Applications

7 1680 Ports:

Page 107: Part III Network Layer

TCP header fields107

Sequence Number (SeqNo): Sequence number is 32 bits long. So the range of SeqNo is

0 <= SeqNo <= 232 -1 4.3 Gbyte

Each sequence number identifies a byte in the byte stream

Initial Sequence Number (ISN) of a connection is set during connection establishment

Page 108: Part III Network Layer

TCP header fields108

Acknowledgement Number (AckNo): Acknowledgements are piggybacked, I.e

a segment from A -> B can contain an acknowledgement for a segment sent in the B -> A direction.

A hosts uses the AckNo field to send acknowledgements. (If a host sends an AckNo in a segment it sets the “ACK flag”)

The AckNo contains the next SeqNo that a hosts wants to receiveExample: The acknowledgement for a segment with sequence number 0 and 1500 data bytes is AckNo=1500+1

Page 109: Part III Network Layer

TCP header fields109

Acknowledge Number (cont’d) TCP uses the sliding window flow protocol to

regulate the flow of traffic from sender to receiver TCP uses the following variation of sliding window:

no NACKs (Negative ACKnowledgement) only cumulative ACKs

Example: Assume: Sender sends two segments with “0..1500”

and “1501..3000”, but receiver only gets the second segment.

In this case, the receiver cannot acknowledge the second packet. It can only send AckNo=0+1

Page 110: Part III Network Layer

TCP header fields110

Header Length ( 4bits): Length of header in 32-bit words Note that TCP header has variable length

(with minimum 20 bytes)

Page 111: Part III Network Layer

TCP header fields111

Flag bits: URG: Urgent pointer is valid

If the bit is set, the following bytes contain an urgent message in the range:

SeqNo <= urgent message <= SeqNo+urgent pointer

ACK: Acknowledgement Number is valid PSH: PUSH Flag

Notification from sender to the receiver that the receiver should pass all data that it has to the application.

Normally set by sender when the sender’s buffer is empty

Page 112: Part III Network Layer

TCP header fields112

Flag bits: RST: Reset the connection

The flag causes the receiver to reset the connection

Receiver of a RST terminates the connection and indicates higher layer application about the reset

SYN: Synchronize sequence numbers Sent in the first packet when initiating a connection

FIN: Sender is finished with sending Used for closing a connection Both sides of a connection must send a FIN

Page 113: Part III Network Layer

TCP header fields113

Window Size: Each side of the connection advertises the

window size Window size is the maximum number of

bytes that a receiver can accept. Maximum window size is 216-1= 65535 bytes

TCP Checksum: TCP checksum covers TCP segment and IP

pseudo header (see discussion on UDP). Urgent Pointer:

Only valid if URG flag is set

Page 114: Part III Network Layer

TCP header fields114

Options: NOP is used to pad TCP header to multiples

of 4 bytes Maximum Segment Size Window Scale Options

Increases the TCP window from 16 to 32 bits This option can only be used in the SYN

segment (first segment) during connection establishment time

Timestamp Option Can be used for roundtrip measurements

Page 115: Part III Network Layer

Services of TCP115

Connection Management (TCP transmission policy) :To establish connection before transmitting data

Congestion Management Timer Management for sending lost

frame and others

Page 116: Part III Network Layer

Connection Management in TCP

116

Opening a TCP Connection Closing a TCP Connection Special Scenarios State Diagram

Page 117: Part III Network Layer

TCP Connection Establishment

117

TCP uses a three-way handshake to open a connection:(1) ACTIVE OPEN: Client sends a segment with

SYN bit set port number of client initial sequence number (ISN) of client

(2) PASSIVE OPEN: Server responds with a segment with

SYN bit set initial sequence number of server ACK for ISN of client

(3) Client acknowledges by sending a segment with:

ACK ISN of server

Page 118: Part III Network Layer

A TCP CONNECTION

TCP is connection-oriented. It establishes a virtual path between the source and destination. All of the segments belonging to a message are then sent over this virtual path. You may wonder how TCP, which uses the services of IP, a connectionless protocol, can be connection-oriented. The point is that a TCP connection is virtual, not physical. TCP operates at a higher level. TCP uses the services of IP to deliver individual segments to the receiver, but it controls the connection itself. If a segment is lost or corrupted, it is retransmitted.

Page 119: Part III Network Layer

Connection establishment using three-way handshake

Connectionopened

PassiveopenActive

open

SYN

U A P R S F

seq: 8000

SYN + ACKU A P R S F

seq: 15000

ack: 8001rwnd: 5000

ACK

U A P R S F

seq: 8000ack: 15001

rwnd: 10000

Means “no data” !

Page 120: Part III Network Layer

A SYN segment cannot carry data, but it consumes one sequence number.

A SYN + ACK segment cannot carry data, but does consume one

sequence number.

An ACK segment, if carrying no data, consumes no sequence number.

Page 121: Part III Network Layer

WINDOWS IN TCP

Before discussing data transfer in TCP and the issues such as flow, error, and congestion control, we describe the windows used in TCP. TCP uses two windows (send window and receive window) for each direction of data transfer, which means four windows for a bidirectional communication. To make the discussion simple, we make an assumption that communication is only unidirectional; the bidirectional communication can be inferred using two unidirectional communications with piggybacking.

Page 122: Part III Network Layer

Topics Discussed in the SectionTopics Discussed in the Section

Send Window Receive Window

Page 123: Part III Network Layer

Send window in TCP

Page 124: Part III Network Layer

Receive window in TCP

Page 125: Part III Network Layer

FLOW CONTROL

As discussed in, flow control balances the rate a producer creates data with the rate a consumer can use the data. TCP separates flow control from error control. In this section we discuss flow control, ignoring error control. We temporarily assume that the logical channel between the sending and receiving TCP is error-free. Figure 15.24 shows unidirectional data transfer between a sender and a receiver; bidirectional data transfer can be deduced from unidirectional one as discussed in Chapter 13.

Page 126: Part III Network Layer

TCP/IP protocol suite

Messagesare pushed

1

Segements are pushed

2

Messagesare pulled

3

Flow control feedback

4

Flow controlfeedback5

Page 127: Part III Network Layer

ERROR CONTROL

TCP is a reliable transport layer protocol. This means that an application program that delivers a stream of data to TCP relies on TCP to deliver the entire stream to the application program on the other end in order, without error, and without any part lost or duplicated.

Error control in TCP is achieved through the use of three tools: checksum, acknowledgment, and time-out.

Page 128: Part III Network Layer

CONGESTION CONTROL

Congestion control in TCP is based on both open loop and closed-loop mechanisms. TCP uses a congestion window and a congestion policy that avoid congestion and detect and alleviate congestion after it has occurred.

Page 129: Part III Network Layer

TCP TIMERS: Timer Management

To perform its operation smoothly, most TCP implementations use at least four timers as shown in Figure 15.38 (slide 83).

Page 130: Part III Network Layer

TCP timers

Page 131: Part III Network Layer

TCP TimerTCP Timer

Retransmission Timer(RTT):To retransmit lost segments TCP employs one retransmission timer

Rules of RTT

1.When TCP send the segment in front of the sending queue ,it starts the timer

2.When the timer expires TCP send first segment in front of the queue and restart the timer

3.When the segments are cumulatively acknowledged segment or segments are purged from the queue

4.If the queue is empty ,TCP stops the timer ,otherwise TCP restarts the timer

Page 132: Part III Network Layer

Persistence Timer :To deal with zero window size advertise TCP uses other timer known as persistence timer .If the receiving TCP announces a window size of zero ,the sending TCP stops transmitting segments until the receiving TCP sends an ACK segment announcing non zero size of window Keepalive Timer: Is used in some implementation to prevent long idle connection between two TCPs.Suppose a client open a connection with server and transfer data and become silent . TIME-WAIT Timer:Is used during connection termination

Page 133: Part III Network Layer

Part-V Presentation and Application Layer

Page 134: Part III Network Layer

Session Layer Dialog

Page 135: Part III Network Layer

Session-to-Transport Layer Communication

Page 136: Part III Network Layer

Synchronization Points

Page 137: Part III Network Layer

Presentation Layer Functions

Page 138: Part III Network Layer

Direct and Indirect Methods of Translation

Page 139: Part III Network Layer

Concept of Encryption and Decryption

Page 140: Part III Network Layer

Encryption/Decryption Methods

Page 141: Part III Network Layer

Monoalphabetic Substitution

Page 142: Part III Network Layer

Polyalphabetic Substitution

Page 143: Part III Network Layer

Transpositional Encryption

Page 144: Part III Network Layer

Encoding/Decoding

Page 145: Part III Network Layer

Permutation

Page 146: Part III Network Layer

Substitution

Page 147: Part III Network Layer

Product

Page 148: Part III Network Layer

Exclusive OR

Page 149: Part III Network Layer

Rotation

Page 150: Part III Network Layer

DES

Page 151: Part III Network Layer

Subkey Generation in DES

Page 152: Part III Network Layer

One of the 16Steps in DES

Page 153: Part III Network Layer

Public Key Encryption

Page 154: Part III Network Layer

RSA

Page 155: Part III Network Layer

RSA Encryption and Decryption

Page 156: Part III Network Layer

Security of RSA

Page 157: Part III Network Layer

Signature Authentication

Page 158: Part III Network Layer

Application Layer

Page 159: Part III Network Layer

Client-Server Model

Page 160: Part III Network Layer

DNS in the Internet

Page 161: Part III Network Layer

Generic Domains

Page 162: Part III Network Layer

Country Domains

Page 163: Part III Network Layer

Inverse Domain

Page 164: Part III Network Layer

Local Login

Page 165: Part III Network Layer

Remote Login

Page 166: Part III Network Layer

Concept of NVT

Page 167: Part III Network Layer

FTP

Page 168: Part III Network Layer

SMTP Concept

Page 169: Part III Network Layer

UAs and MTs

Page 170: Part III Network Layer

Relay MTAs

Page 171: Part III Network Layer

Mail Gateways

Page 172: Part III Network Layer

E-mail Address

Page 173: Part III Network Layer

The Entire E-mail System

Page 174: Part III Network Layer

MIME

Page 175: Part III Network Layer

POP3 and SMTP

Page 176: Part III Network Layer

SNMP Concept

Page 177: Part III Network Layer

Internet Management Components

Page 178: Part III Network Layer

MIB

Page 179: Part III Network Layer

SNMP Messages