ITEC 3210 Lecture Notes - Lecture 4: Network Layer, Application Layer, Routing Protocol

69 views9 pages

Document Summary

Also, for traffic on bbns, other options exist: will apply to traffic on mans, wans and internet, and wont apply to traffic between distribution layers/core layer. But if you have more than one possible way from one building to another, then it"s considered as a large core layer. Bbn (need a router: moves data btwn access layers (i. e. subnetworks), distribution layers, and btwn. Man/wans/internet: other key functions: security (acl) and protocol conversion (ch8 and 10, acl: access control list will use ip addresses to filter traffic, i. e. this subnetwork can only be accessed by these ip address. Prevents unauthorized accesses: protocol conversion: the only way to secure traffic btwn two access layers is to use a router. + special os: plug and play: no need to do some configuration. It"s what allows routers to operate and determine what to do w the packet.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents