Lecture_6
Lecture_6
E_mail: [email protected]
Internet Control Message Protocol (ICMP)
Destination Unreachable
If a router can’t send an IP datagram to any destination device, it uses ICMP to
send a message back to the sender.
Ping: Packet Internet Groper It uses ICMP echo request and replies
messages to check the physical and logical connectivity of machines over
the network.
Buffer Full: If a router’s memory buffer is full, it will use ICMP to send out this
message until congestion is decreased.
Ethernet
Fast Ethernet
Token Ring
FDDI
Ethernet
The second ring is used for backup and recovery in case the first ring fail.
Example If you want to open Google, You directly type www.google.com instead of
given Google’s IP address.
Secure Shell (SSH)
It performs operations like logging into the system, and moving files
from one system to another
It uses a secure key for transmitting data securely. Only the sender
and receiver know this key.
SSH uses TCP port number 22
Reverse Address Resolution Protocol (RARP)
Hub
Bridge
Bridge
A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source
and destination.
Switch
A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a
data link layer device.
Switch
Switch
Wireless Access Point
is a device that allows wireless devices, like smartphones and laptops, to connect
to a wired network.
It creates a Wi-Fi network that lets wireless devices communicate with the internet.
Access points are used to extend the range of a network
Router
10.0.0.50 12.0.0.60
Firewall
A firewall is a network security device that controls the flow of data between your
computer or network and the internet.
It acts as a barrier, blocking unauthorized access while allowing trusted data to pass
through. Firewalls protect your network from hackers, viruses, and other
online threats by filtering traffic based on security rules.
Thank
You!