ITEC 3210 Lecture Notes - Lecture 4: Network Layer, Application Layer, Routing Protocol

69 views9 pages

Document Summary

Also, for traffic on bbns, other options exist: will apply to traffic on mans, wans and internet, and wont apply to traffic between distribution layers/core layer. But if you have more than one possible way from one building to another, then it"s considered as a large core layer. Bbn (need a router: moves data btwn access layers (i. e. subnetworks), distribution layers, and btwn. Man/wans/internet: other key functions: security (acl) and protocol conversion (ch8 and 10, acl: access control list will use ip addresses to filter traffic, i. e. this subnetwork can only be accessed by these ip address. Prevents unauthorized accesses: protocol conversion: the only way to secure traffic btwn two access layers is to use a router. + special os: plug and play: no need to do some configuration. It"s what allows routers to operate and determine what to do w the packet.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents