Skip to main content

CS402: Computer Communications and Networks

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS402: Computer Communications and Networks /
  • Unit 5: The Network Layer /
  • 5.2: Internet Protocol
Back to 'Unit 5: The Network Layer'
  • 5.2: Internet Protocol

    •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

      Read the introduction to section 5.2, "Internet Protocol." Stop at section 5.2.1 "IP Version 4," which you will read below.

      In this section we will explore the Internet Protocol (IP) to discover how IP enables the applications running above the transport layer (UDP/TCP) to utilize any of the different datalink layers available.

    • 5.2.1: IP version 4 (IPv4)

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 5.2.1, "IP version 4," on pages 141-150.

        This section starts with a discussion of IP version 4 before exploring network addressing in more detail. As you read, consider the following questions: What are two of the problems with IP version 4 that led to the development of the Classless Interdomain Routing (CIDR) architecture? How does CIDR improve the scalability of the IP routing system?

    • 5.2.2: Internet Control Message Protocol (ICMP) Version 4

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 5.2.2, "ICMP version 4," on pages 151-157. Sometimes a router or the destination host has to inform the sender of the packet of a problem that occurred while processing that packet. In the TCP/IP protocol suite, this reporting is done by the Internet Control Message Protocol (ICMP). How are these messages generated by the ICMP?

    • 5.2.3: IP version 6 (IPv6)

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 5.2.3, "IP version 6," on pages 157-164. As the popularity of the Internet grew exponentially, it became necessary for an expanded addressing architecture, IP version 6 (IPv6). This section discusses how IPv6 has resolved a number of routing issues while becoming the new standard.

    • 5.2.4: ICMP Version 6 (ICMPv6)

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 5.2.4, "ICMP version 6," on pages 164-166. ICMPv6 is the companion protocol for IPv6, just as ICMPv4 is the companion protocol for IPv4. ICMPv6 is used by routers and hosts to report problems when processing IPv6 packets. In addition, ICMPv6 is used when auto-configuring addresses. This section discusses messaging for IPv6.

    • 5.2.5: Middleboxes

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read the introduction to section 5.2.5, "Middleboxes." Stop at "Firewalls," which you will read below. As you read, consider the following questions: What is a Middlebox? Why do we need them?

      • 5.2.5.1: Firewalls

        •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

          Read "Firewalls" on pages 166-168. Stop at "NAT," which you will read below. As you read, consider the following questions: When you first used your computer to access the Internet, what was the first security technique you heard about? How does a firewall protect your system from the "evil-doers" lurking on the Internet?

      • 5.2.5.2: Network Address Translation (NAT)

        •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

          Read "NAT" on pages 168-169. Stop at section 5.3 "Routing in IP networks."

          Large corporations and government agencies prefer their networks to be private (that is, not seen on the Internet). In this section, explore the concept of private networks to learn how their need to communicate with the outside world and with specific machines under certain conditions has resulted in NAT; the mechanism that allows private networks to communicate openly with the outside world. How does NAT work?

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy