You are on page 1of 78

Chapter 21

Networking
and
Internetworking
Devices
McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-1

Connecting Devices

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-2

Connecting Devices and the OSI Model

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-3

A Repeater in the OSI Model

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-4

A Repeater

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-5

Function of a Repeater

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-6

A Bridge in the OSI Model

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-7

A Bridge

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-8

Function of a Bridge

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-9

Multiport Bridge

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-10

A Router in the OSI Model

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-11

Routers in an Internet

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-12

A Gateway in the OSI Model

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-13

A Gateway

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-14

McGraw-Hill

Single-Protocol versus
Multiprotocol Router

The McGraw-Hill Companies, Inc., 2001

Figure 21-15

McGraw-Hill

Brouter

The McGraw-Hill Companies, Inc., 2001

Figure 21-16

Switch

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-17

Example of an Internet

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-18

McGraw-Hill

The Concept of Distance


Vector Routing

The McGraw-Hill Companies, Inc., 2001

Figure 21-19

Distance Vector Routing Table

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-20

Routing Table Distribution

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-21

Updating Routing Table for Router A

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-22

McGraw-Hill

Final Routing Tables

The McGraw-Hill Companies, Inc., 2001

Figure 21-23

McGraw-Hill

Example 21.1

The McGraw-Hill Companies, Inc., 2001

Figure 21-24

McGraw-Hill

Concept of Link State Routing

The McGraw-Hill Companies, Inc., 2001

Figure 21-25

Cost in Link State Routing

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-26

Link State Packet

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-27

Flooding of As LSP

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-28

Link State Database

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-29

Costs in the Dijkstra Algorithm

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-30, Part I

Shortest Path Calculation, Part I

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-30, Part II

Shortest Path Calculation, Part II

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-30, Part III

Shortest Path Calculation, Part III

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-30, Part IV

Shortest Path Calculation, Part IV

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-30, Part V

Shortest Path Calculation, Part V

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-30, Part VI

Shortest Path Calculation, Part VI

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part VII

Shortest Path Calculation, Part VII

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part I

Shortest Path Calculation, Part VIII

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part II

Shortest Path Calculation, Part IX

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part III

Shortest Path Calculation, Part X

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part IV

Shortest Path Calculation, Part XI

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part V

Shortest Path Calculation, Part XII

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-31, Part VI

Shortest Path Calculation, Part XIII

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 21-32

Routing Table for Router A

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Chapter 23

Upper
OSI
Layers
McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-1

Session Layer Dialog

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-2

Session-to-Transport Layer Communication

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-3

Synchronization Points

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-4

SPDU

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-5

Presentation Layer Functions

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-6

Direct and Indirect Methods of Translation

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-7

Concept of Encryption and Decryption

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-8

Encryption/Decryption Methods

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-9

Monoalphabetic Substitution

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-10

Polyalphabetic Substitution

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-11

Transpositional Encryption

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-12

Encoding/Decoding

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-13

Permutation

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-14

Substitution

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-15

Product

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-16

Exclusive OR

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-17

Rotation

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-18

DES

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-19

McGraw-Hill

Subkey Generation in DES

The McGraw-Hill Companies, Inc., 2001

Figure 23-20

One of the 16
Steps in DES

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-21

Public Key Encryption

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-22

RSA

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-23

RSA Encryption and Decryption

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-24

Security of RSA

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-25

Signature Authentication

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-26

Data Compression Methods

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-27

Run-Length Encoding

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-28

MHS

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-29

Message Format in MHS

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-30

Virtual File Storage

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-31

Local Access

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-32

Remote Access

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

Figure 23-33

Virtual Terminal

McGraw-Hill

The McGraw-Hill Companies, Inc., 2001

You might also like