Có 100+ tài liệu thuộc chủ đề "tiêu chuẩn mạng không dây"
tailieu.vn Xem trực tuyến Tải xuống
7.3 Internet Architecture And Philosophy 96 7.4 The Conceptual Service Organization 96 7.5 Connectionless Delivery System 97 7.6 Purpose Of The Internet Protocol 97 7.7 The Internet Datagram 97. 10.9 lmplementation Of Subnets With Masks 156 10.10 Subnet Mask Representation 157. 10.1 1 Routing In The Presence Of Subnets 158 10.12 The Subnet Routing Algorithm 159 10.13 A Unified Routing...
tailieu.vn Xem trực tuyến Tải xuống
27.1 Introduction Electronic Mail 5 1 1. 27.3 Mailbox Names And Aliases 5 13. 27.4 Alias Expansion And Mail Forwarding 5 13 27.5 The Relationship Of Internetworking And Mail 514 27.6 TCPIIP Standards For Electronic Mail Service 5 16 27.7 Electronic Mail Addresses 5 16. 27.8 Pseudo Domain Addresses 5 18. 27.9 Simple Mail Transfer Protocol (SMTP Mail Retrieval And...
tailieu.vn Xem trực tuyến Tải xuống
Although such experimen- tation is safest when the instructional laboratory network is isolated from production computing facilities, we have found that students exhibit the most enthusiasm, and benefit the most, when they have access to a functional TCP/IP internet.. Chapters 3-13 describe the TCP/IP Internet from the viewpoint of a single host, showing the pro- tocols a host contains and...
tailieu.vn Xem trực tuyến Tải xuống
Early adoption of TCP/IP protocols and growth of the Internet has not been limited to government-funded projects. Major computer corporations connected to the Internet as did many other large corporations including: oil companies, the auto industry, elec- tronics firms, pharmaceutical companies, and telecommunications carriers. Medium and small companies began connecting in the 1990s. In addition, many companies have used the...
tailieu.vn Xem trực tuyến Tải xuống
telephone system uses a connection-oriented technology - a telephone call establishes a connection from the originating phone through the local switching office, across trunk lines, to a remote switching office, and finally to the destination telephone. While a connection is in place, the phone equipment samples the microphone repeatedly, encodes the samples di- gitally, and transmits them across the connection...
tailieu.vn Xem trực tuyến Tải xuống
For now, it is enough to understand that the lowest level hardware does not distinguish among transmissions - a hub passes all packets to each host interface, which chooses packets the computer should receive and filters out all others. Ethernet is called a best-effort delivery mechanism because the hardware provides no information to the sender about whether the packet was...
tailieu.vn Xem trực tuyến Tải xuống
The technologies discussed in the remainder of this chapter were selected because they figure prominently in both the history of the Internet and later ex- amples in the text.. One of the oldest wide area technologies, the ARPANET, was funded by ARPA, the Advanced Research Projects Agency. ARPA awarded a contract for the develop- ment of the ARPANET to Bolt,...
tailieu.vn Xem trực tuyến Tải xuống
48 Review Of Underlying Network Technologies Chap. 2.1 1.2 Point-To-Point Networks. The table in Figure 2.16 lists a few common data rates used in North America and Europe.. Figure 2.16 Example data rates available on digital circuits leased from a telephone company. In addition to standards that specify the transmission of high data rates over copper, the phone companies have...
tailieu.vn Xem trực tuyến Tải xuống
Remember that TCPAP is designed to provide a universal interconnection among computers independent of the particular networks to which they attach. Thus, we want a user to view an internet as a single, virtual network to which all machines connect despite their physical connections. Figure 3.3a shows how thinking of an internet in- stead of constituent networks simplifies the details...
tailieu.vn Xem trực tuyến Tải xuống
Classful Internet Addresses Chap. In addition to unicast delivery, in which a packet is delivered to a single computer, and broadcast delivery, in which a packet is delivered to all computers on a given net- work, the IP addressing scheme supports a special form of multipoint delivery known as multicasting, in which a packet is delivered to a specific subset...
tailieu.vn Xem trực tuyến Tải xuống
78 Mapping Internet Addresses To Physical Addresses (ARP) Chap. The question arises: how does A map that address to B's physical ad- dress, PB?. The computer sending the packet must map the final destination's Internet address to the destination's physical address. Thus, the sender must map the intermediate router's Internet address to a physical address.. The problem of mapping high-level...
tailieu.vn Xem trực tuyến Tải xuống
Determining An Internet. We now know that physical network addresses are both low-level and hardware dependent, and we understand that each machine using TCP/IP is assigned one or more 32-bit IP addresses that are independent of the machine's hardware addresses. Applica- tion programs always use the IP address when specifying a destination. they rely on address resolution schemes like ARP...
tailieu.vn Xem trực tuyến Tải xuống
Also like a frame, the datagram header contains the source and destination addresses and a type field that identifies the contents of the datagram. The difference, of course, is that the datagram header contains IP ad- dresses whereas the frame header contains physical addresses. Figure 7.2 shows the general form of a datagram:. Figure 7.2 General form of an IP...
tailieu.vn Xem trực tuyến Tải xuống
Figure 7.10 The division of the option code octet into three fields of length 1, 2, and 5 bits.. The fields of the OPTION CODE consist of a 1-bit COPY flag, a 2-bit OPTION CLASS, and the 5-bit OPTION NUMBER. When the COPY bit is set to I , it specifies that the option should be copied into all fragments....
tailieu.vn Xem trực tuyến Tải xuống
From an internet perspective, it is easiest to think of direct delivery as the final step in any datagram transmission, even if the datagram traverses many networks and intermediate routers. The final router along the path between the datagram source and its destination will connect directly to the same physical network as the destination.. Thus, the final router will deliver...
tailieu.vn Xem trực tuyến Tải xuống
The previous chapter shows how the Internet Protocol software provides an unreli- able, connectionless datagram delivery service by arranging for each router to forward datagrams. A datagram travels from router to router until it reaches one that can deliver the datagram directly to its final destination. If a router cannot route or deliver a da- tagram, or if the router...
tailieu.vn Xem trực tuyến Tải xuống
When router R, receives the datagram, it cannot send an ICMP redirect message to R, because it does not know R,'s address. In addition to the requisite TYPE, CODE, and CHECKSUM fields, each redirect message contains a 32-bit ROUTER INTERNET ADDRESS field and an INTERNET HEADER field, as Figure 9.6 shows.. 1 ROUTER INTERNET ADDRESS. Figure 9.6 ICMP redirect message...
tailieu.vn Xem trực tuyến Tải xuống
The chief advantage of dividing an IP address into two parts arises from the size of the routing tables required in routers. Class B addresses partition the 32 bits into 16-bit network and host portions, while class C partitions the address into a 24-bit network portion and an 8-bit host portion.. To understand some of the address extensions in this...
tailieu.vn Xem trực tuyến Tải xuống
10.1 1 Routing In The Presence Of Subnets. What may not be obvious is that unless restrictions are added to the use of subnetting, other hosts and routers at the site may also need to use subnet routing. To see how a problem arises without restrictions, consider the example set of networks shown in Figure 10.7.. In the figure, physical...
tailieu.vn Xem trực tuyến Tải xuống
After a brief review of classful lookup, we will consider one of the data structures used for classless lookup.. 10.22.1 Hashing And Classful Addresses. Even if some entries in a table correspond to subnet routes, hashing is still efficient be- cause the network portion of the address can be extracted and used as a key. If multiple routes hash to...