Đang chuẩn bị liên kết để tải về tài liệu:
The Illustrated Network- P29

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The Illustrated Network- P29:In this chapter, you will learn about the protocol stack used on the global public Internet and how these protocols have been evolving in today’s world. We’ll review some key basic defi nitions and see the network used to illustrate all of the examples in this book, as well as the packet content, the role that hosts and routers play on the network, and how graphic user and command line interfaces (GUI and CLI, respectively) both are used to interact with devices. | CHAPTER 9 Forwarding IP Packets 249 Management Management Terminal Terminal FIGURE 9.4 The three router access methods. Note that the console port requires access to the router while the others allow remote access. called VTY lines on a Cisco router with a more secure remote access program called secure shell SSH using a Web browser HTTP is the protocol or with SNMP Simple Network Management Protocol a protocol invented expressly for remote router management. These arrangements are shown in Figure 9.4. Small routers usually only have a console port. With the proper cables these console ports can be hooked up to a modem for remote access but obviously cannot be used simultaneously for local access. On some routers the console ports are labeled Admin or Management. It is tempting to try and access a console or AUX ports using the normal graphical interface provided by Windows a Mac or Unix X-Windows. But the console and AUX ports only understand a simple character-based serial protocol. On Windows PCs for example only HyperTerminal or another serial terminal emulation program can communicate with a router through the console or AUX ports. FORWARDING TABLE LOOKUPS In the connectionless best-effort world of IP every packet is forwarded independently hop by hop toward the destination. Each router determines the next hop for the destination address in the packet header based on information gathered into the routing table and distilled into the forwarding table. The essential operation of a router is the looking up of the packet s destination IP address in this table to determine the next hop. 250 PART II Core Protocols It s unusual that a packet address is an exact match for a table entry. Otherwise routing and forwarding tables would need an entry for every host in the world all 32 bits for IPv4 and 128 bits for IPv6 So in the current classless prefix world of IP addressing the host-hop destination is chosen by the longest match rule. Figure 9.5 shows how the next-hop .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.