Computer Networks Performance Metrics Computer Networks Term B10.
computer networks
description
Transcript of computer networks
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.1
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U1.1
Advanced Computer NetworksUNIT - II
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 2
Learning ObjectivesIn this Unit we will discuss : Network Layer ARP, RARP ICMP Routing Algorithms and Protocols Router Operation and Configuration Internetworking IPV4 Protocol IPV6 Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 3
Network Layer
Network Layer is responsible for host-to-host delivery and for routing the packets through the routers.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.2
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 4
ARP
Address MappingARP ProtocolARP Package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 5
ARP and RARP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 6
ARP and RARPPosition of ARP and RARP in TCP/IP protocol suite
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.3
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 7
ARP
ARP associates an IP address with its physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address that is usually imprinted on the NIC.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 8
ARP
It may be noted that the knowledge of hosts IP address is not sufficient for sending packets, because data link hardware does not understand internet addresses. For example, in an Ethernet network, the Ethernet controller card can send and receive using 48-bit Ethernet addresses. The 32-bit IP addresses are unknown to these cards. This requires a mapping of the IP addresses to the corresponding Ethernet addresses. This mapping is accomplished by using a technique known as Address Resolution Protocol (ARP).
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 9
ARP
An ARP request is broadcast to all stations in the network
An ARP reply is an unicast to the host requesting the mapping
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.4
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 10
ARP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 11
ARPARP Packet
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 12
ARPEncapsulation of ARP packet
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.5
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 13
ARPFour cases using ARP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 14
ARPExample
A host with IP address 130.23.43.20 and physical address B2:34:55:10:22:10 has a packet to send to another host with IP address 130.23.43.25 and physical address A4:6E:F4:59:83:AB (which is unknown to the first host). The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 15
ARPNote that the ARP data field in this case is 28 bytes, and that the individual addresses do not fit in the 4-byte boundary. That is why we do not show the regular 4-byte boundaries for these addresses. Also note that the IP addresses are shown in hexadecimal.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.6
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 16
ARP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 17
Proxy ARP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 18
ARP Package
This ARP package involves five modules:
1. a cache table,
2. queues,
3. an output module,
4. an input module,
5. and a cache-control module.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.7
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 19
ARP Package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 20
Summary
Delivery of packet to a host or router requires two levels of addresses : logical and physical.
A logical address identifies a host or router at the network level. TCP/IP call this logical address an IP address.
A physical address identifies a host or router at the physical level.
ARP protocol is used to find physical address given a logical address.
ARP request is broadcast to all devices on the network.
ARP reply is unicast to the host requesting the mapping.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 21
RARPIntroductionRARP ProtocolRARP Package
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.8
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 22
RARPThe TCP/IP protocols include another related protocol known as reverse ARP, which can be used by a computer such as a diskless host to find out its own IP address. It involves the following steps:
Diskless host A broadcasts a RARP request specifying itself as the target
RARP server responds with the reply directly to host A
Host A preserves the IP address in its main memory for future use until it reboots
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 23
RARPRARP finds the logical address for a machine that only knows its physical address.
The RARP request packets are broadcast;
the RARP reply packets are unicast.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 24
RARP
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.9
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 25
RARP Packet
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 26
RARP PacketEncapsulation of RARP packet
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 27
Summary
RARP is used to find the logical address for a machine that only knows its physical address.
RARP request is created and broadcast on the local network.
Another machine on the local network that knows all the IP addresses will respond with a RARP reply.
Requesting machine must be running at RARP client program.
Responding machine must be running at RARP server program.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.10
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 28
ICMPIntroductionMessagesDebugging ToolsICMP Package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 29
ICMPTo make efficient use of the network resources, IP was designed to provide unreliable and connectionless best-effort datagram delivery service. As a consequence, IP has no error-control mechanism and also lacks mechanism for host and management queries. A companion protocol known as Internet Control Message Protocol (ICMP), has been designed to compensate these two deficiencies.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 30
ICMPPosition of ICMP in the network layer
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.11
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 31
ICMPICMP encapsulation
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 32
ICMPICMP Messages
ICMP messages are divided into error-reporting messages and query messages. The error-reporting messages report problems that a router or a host (destination) may encounter. The query messages get specific information from a router or another host.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 33
ICMPICMP Messages
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.12
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 34
ICMPICMP messagesICMP messages
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 35
ICMPMessage Format
An ICMP message has an 8-byte header and a variable-size data section. Although the general format of the header is different for each message type, the first 4 bytes are common to all.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 36
ICMPMessage Format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.13
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 37
ICMPERROR REPORTING
IP, as an unreliable protocol, is not concerned with error checking and error control. ICMP was designed, in part, to compensate for this shortcoming. ICMP does not correct errors, it simply reports them.
ICMP always reports error messages to the original source.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 38
ICMP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 39
ICMPContents of data field for the error messages
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.14
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 40
ICMPDestination-unreachable format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 41
ICMPDestination-unreachable format
Destination-unreachable messages with codes 2 or 3 can be created only by the destination host.
Other destination-unreachable messages can be created only by routers.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 42
ICMPSource-quench format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.15
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 43
ICMPSource-quench format
A source-quench message informs the source that a datagram has been discarded due to
congestion in a router or the destination host.
The source must slow down the sending of datagrams until the congestion is relieved.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 44
ICMPSource-quench format
One source-quench message is sent for each datagram that is discarded due to congestion.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 45
ICMPTime-exceeded message
Whenever a router decrements a datagram with a time-to-live value to zero, it discards the datagram
and sends a time-exceeded message to the original source.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.16
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 46
ICMPTime-exceeded message
When the final destination does not receive all of the fragments in a set time, it discards the
received fragments and sends a time-exceeded message to the original source.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 47
ICMPTime-exceeded message
code 0 is used only by routers to show that the value of the time-to-live field is zero. Code 1 is
used only by the destination host to show that not all of the fragments have arrived within a set time.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 48
ICMPTime-exceeded message format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.17
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 49
ICMPTime-exceeded message format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 50
ICMPParameter-problem
A parameter-problem message can be created by a router or the destination host.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 51
ICMPParameter-problem message format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.18
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 52
ICMPRedirection concept
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 53
ICMPRedirection concept
A host usually starts with a small routing table that is gradually augmented and updated. One of
the tools to accomplish this is the redirection message.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 54
ICMPRedirection message format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.19
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 55
ICMPRedirection message
A redirection message is sent from a router to a host on the same local network.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 56
ICMPQUERY Messages
ICMP can also diagnose some network problems through the query messages, a group of four
different pairs of messages. In this type of ICMP message, a node sends a message that is answered
in a specific format by the destination node.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 57
ICMP
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.20
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 58
ICMP
An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo-request
message.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 59
ICMP
Echo-request and echo-reply messages can be used by network managers to check the operation
of the IP protocol.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 60
ICMP
Echo-request and echo-reply messages can test the reachability of a host. This is usually done by
invoking the ping command.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.21
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 61
ICMPEcho-request and echo-reply messages
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 62
ICMP
Timestamp-request and timestamp-reply
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 63
ICMP
Timestamp-request and timestamp-reply messages can be used to calculate the round-trip time between a source and a destination machine
even if their clocks are not synchronized.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.22
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 64
ICMP
The timestamp-request and timestamp-reply messages can be used to synchronize two clocks
in two machines if the exact one-way time duration is known.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 65
ICMPTimestamp-request and timestamp-reply message format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 66
ICMP
Mask-request and mask-reply message format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.23
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 67
ICMPRouter-solicitation message format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 68
ICMPRouter-advertisement message format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 69
ICMP
Two tools that use ICMP for debugging: 1. ping2. traceroute.
Debugging Tools
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.24
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 70
ICMP
Example
$ ping fhda.edu
PING fhda.edu (153.18.8.1) 56 (84) bytes of data.64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=0 ttl=62 time=1.91 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=1 ttl=62 time=2.04 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=2 ttl=62 time=1.90 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=3 ttl=62 time=1.97 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=4 ttl=62 time=1.93 ms
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 71
ICMPThe traceroute program operation
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 72
ICMP
We use the traceroute program to find the route from the computer voyager.deanza.edu to the server fhda.edu. The following shows the result:
Example
$ traceroute fhda.edu
traceroute to fhda.edu (153.18.8.1), 30 hops max, 38 byte packets1 Dcore.fhda.edu (153.18.31.254) 0.995 ms 0.899 ms 0.878 ms2 Dbackup.fhda.edu (153.18.251.4) 1.039 ms 1.064 ms 1.083 ms3 tiptoe.fhda.edu (153.18.8.1) 1.797 ms 1.642 ms 1.757 ms
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.25
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 73
ICMP
To give an idea of how ICMP can handle the sending and receiving of ICMP messages, an ICMP package made of two modules: an input module and an output module.
ICMP Package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 74
ICMPICMP Package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 75
Summary
ICMP send five types of error reporting messages and four types pairs of query messages to support the unreliable and connectionless Internet Protocol.
ICMP messages are encapsulated in IP datagrams.
Packet InterNet Groper (Ping) is an application program that uses the services of ICMP to test the reachablity of a host.
A simple ICMP design can consist of an input module that handles incoming ICMP packets and an output module that handles demands for ICMP services.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.26
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 76
Routing Algorithms
IntroductionRouting ProtocolsUnicast Routing ProtocolsMulticast Routing protocols
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 77
Routing Algorithms
Unicast Routing Protocols: RIP, OSPF, and BGP
1. intra and inter domain routing2. distance vector routing and RIP3. link state routing and OSPF4. path vector routing and BGP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 78
Routing Algorithms
Intra and Inter Domain Routing Protocols
Routing inside an autonomous system is referred to as intradomain routing.
Routing between autonomous systems is referred to as interdomain routing.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.27
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 79
Routing Algorithms
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 80
Routing Algorithms
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 81
Routing Algorithms
Distance Vector Routing
In distance vector routing, the least cost route between any two nodes is the route with minimum distance. In this protocol each node maintains a vector (table) of minimum distances to every node
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.28
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 82
Routing Algorithms
In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 83
Routing Algorithms
In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 84
Routing AlgorithmsDistance vector routing tables
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.29
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 85
Routing AlgorithmsInitialization of tables in distance vector routing
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 86
Routing AlgorithmsUpdating in distance vector routing
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 87
Routing AlgorithmsTwo-node instability
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.30
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 88
Routing Protocol
The Routing Information Protocol (RIP) is an intradomain routing protocol used inside an autonomous system. It is a very simple protocol based on distance vector routing.
RIP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 89
Routing Protocol
The Routing Information Protocol (RIP) is one of the most commonly used Interior Gateway Protocol on internal networks which helps a router dynamically adapt to changes of network connections by communicating information about which networks each router can reach and how far away those networks are. Although RIP is still actively used, it is generally considered to have been obsolete by Link-state routing protocol such as OSPF.
RIP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 90
Routing Protocol
RIP uses the services of UDP on well-known port 520.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.31
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 91
Routing ProtocolExample of a domain using RIP
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 92
Routing ProtocolRIP message format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 93
Routing ProtocolRequest messages
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.32
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 94
Routing ProtocolRIP timers
RIP uses certain timers to regulate its performance. The biggest drawback to a RIP router is the broadcast it makes. RIP uses numerous timers to regulate its performance. These include a routing-update timer, a route-timeout timer, and a route-flush timer. The routing-update timer clocks the interval between periodic routing updates, each router periodically transmits it entire routing table to all the other routers on the network. Generally, it is set to 30 seconds, with a small random amount of time added whenever the timer is reset.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 95
Routing ProtocolRIP timers
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 96
Routing ProtocolRIP version 2 format
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.33
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 97
Routing ProtocolRIP version 2 format
RIP Version 2 (RIPv2) RIP Version 2 adds a "network mask" and "next hop address" field to the original RIP packet while remaining completely compatible with RIP. Thus RIPv2 routers can coexist with RIP routers without any problems. The subnet mask field contains the network bit mask associated with the destination; it also allows the implementation of CIDR addressing. This will allow RIP to function in a variety of environments, which may implement variable subnet masks on a network.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 98
Routing Algorithms
Link State Routing
In link state routing, if each node in the domain has the entiretopology of the domain, the node can use Dijkstrasalgorithm to build a routing table.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 99
Routing Algorithms
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.34
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 100
Routing AlgorithmsLink state knowledge
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 101
Routing Algorithms
Dijkstra algorithm
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 102
Routing AlgorithmsExample of formation of shortest path tree
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.35
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 103
Routing Algorithms
Routing table for node A
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 104
Routing Protocol
OSPF
Open Shortest Path First (OSPF) is another Interior Gateway Protocol. It is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). The working group was formed in 1988 to design an IGP based on the Shortest Path First (SPF) algorithm for use in the Internet. OSPF was created because in the mid-1980s, the Routing Information Protocol (RIP) was increasingly incapable of serving large, heterogeneous internetworks. OSPF being a SPF algorithm scales better than RIP.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 105
Routing Protocol
OSPF
The Open Shortest Path First (OSPF) protocol is an intra domain routing protocol based on link state routing. Its domain is also an autonomous system.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.36
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 106
Routing ProtocolOSPF also has the following features:
Advertise about neighborhood: Instead of sending its entire routing table, a router sends information about its neighborhood only. Flooding: Each router sends this information to every other router on the internetwork, not just to its neighbors. It does so by a process of flooding. In Flooding, a router sends its information to all its neighbors (through all of its output ports). Every router sends such messages to each of its neighbor, and every router that receives the packet sends copies to its neighbor. Finally, every router has a copy of same information. Active response: Each outer sends out information about the neighbor when there is a change.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 107
Routing Protocol
OSPF packets are encapsulated in IP datagrams.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 108
Routing Protocol
Areas in an autonomous system
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.37
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 109
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 110
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 111
Routing Protocol
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.38
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 112
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 113
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 114
Routing Protocol
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.39
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 115
Routing ProtocolOSPF common header
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 116
Routing ProtocolLink state update packet
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 117
Routing ProtocolLSA general header
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.40
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 118
Routing ProtocolRouter link
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 119
Routing ProtocolRouter link LSA
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 120
Routing ProtocolLink types, link identification, and link dataLink types, link identification, and link data
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.41
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 121
Routing Protocol
Example - Give the router link LSA sent by router 10.24.7.9
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 122
Routing Protocol
This router has three links: two of type 1 (point-to-point) and one of type 3 (stub network).
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 123
Routing Algorithms
Path Vector Routing
Path vector routing is similar to distance vector routing. There is at least one node, called the speaker node, in each AS that creates a routing table and advertises it to speaker nodes in the neighboring ASs..
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.42
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 124
Routing Algorithms
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 125
Routing Algorithms
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 126
Routing Protocol
Border Gateway Protocol
Border Gateway Protocol (BGP) is an inter domain routing protocol using path vector routing. It first appeared in 1989 and has gone through four versions.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.43
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 127
Routing Protocol
BGP supports classless addressing and CIDR.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 128
Routing Protocol
BGP uses the services of TCP on port 179.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 129
Routing Protocol
Internal and external BGP sessions
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.44
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 130
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 131
Routing ProtocolBGP packet header
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 132
Routing ProtocolOpen message
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.45
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 133
Routing ProtocolUpdate message
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 134
Routing ProtocolKeepalive message
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 135
Routing ProtocolNotification message
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.46
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 136
Routing Protocol
A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 137
Routing ProtocolUnicast :- the router forwards the received packet
through only one of its interfaces
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 138
Routing ProtocolMultiicast :- the router may forward the received packet
through several of its interfaces
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.47
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 139
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 140
Routing Protocol
Emulation of multicasting through multiple unicasting is not efficient and may create long
delays, particularly with a large group.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 141
Routing Protocol
In unicast routing, each router in the domain has a table that defines a shortest path tree to
possible destinations.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.48
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 142
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 143
Routing Protocol
In multicast routing, each involved router needs to construct a shortest path tree for each group.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 144
Routing Protocol
In the source-based tree approach, each router needs to have one shortest path tree for each
group.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.49
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 145
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 146
Routing Protocol
In the group-shared tree approach, only the core router, which has a shortest path tree for each
group, is involved in multicasting.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 147
Routing Protocol
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.50
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 148
Routing Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 149
Summary
A metric is the cost assigned for passage of a packet through a network.
A router consults its routing table to determine the best path of a packet.
An autonomous system is a group of networks and routers under the authority of a single administration.
RIP and OSPF are popular intra domain routing protocols used to update routing table in an AS.
RIP use three timers.
BGP is an inter autonomous system routing protocol used to update routing tables.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 150
Router OperationIntroduction to RoutersOverview of Router ModesRouter Interfaces
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.51
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 151
Router ConfigurationOverview of Router ConfigurationStatic RoutingDynamic RoutingDefault Routing
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 152
IPV4 Protocol
IntroductionDatagramsFragmentationIP Package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 153
IPV4 Protocol
IP is an unreliable and connectionless best-effort delivery service protocol. By best effort we mean that there is no error and flow control. However, IP performs error detection and discards a packet, if it is corrupted. To achieve reliability, it is necessary to combine it with a reliable protocol such as TCP. Packets in IP layer are called datagrams. The IP header provides information about various functions the IP performs.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.52
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 154
IPV4 Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 155
IPV4 Protocol
A packet in the IP layer is called a datagram, a variable-length packet consisting of two parts: header and data. The header is 20 to 60 bytes in length and contains information essential to routing and delivery.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 156
IPV4 ProtocolIP Datagram
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.53
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 157
IPV4 ProtocolService type or differentiated services
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 158
IPV4 Protocol
The precedence subfield was designed, but never used in version 4.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 159
IPV4 ProtocolTypes of service
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.54
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 160
IPV4 ProtocolMultiplexing
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 161
IPV4 ProtocolProtocols
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 162
IPV4 ProtocolFragmentation
The format and size of a frame depend on the protocol used by the physical network. A datagram may have to be fragmented to fit the protocol regulations.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.55
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 163
IPV4 ProtocolFragmentation
Each network imposes a limit on maximum size, known as maximum transfer unit (MTU) of a packet because of various reasons. One approach is to prevent the problem to occur in the first place, i.e. send packets smaller than the MTU. Second approach is to deal with the problem using fragmentation. When a gateway connects two networks that have different maximum and or minimum packet sizes, it is necessary to allow the gateway to break packets up into fragments, sending each one as an internet packet. The technique is known as fragmentation.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 164
IPV4 ProtocolMaximum Transfer Unit (MTU)
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 165
IPV4 ProtocolMTUs for some networks
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.56
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 166
IPV4 ProtocolFragmentation Example
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 167
IPV4 Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 168
IPV4 ProtocolOPTIONS
The header of the IP datagram is made of two parts: a fixed part and a variable part. The variable part comprises the options that can be a maximum of 40 bytes.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.57
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 169
IPV4 ProtocolOPTION Format
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 170
IPV4 ProtocolCategories of Option
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 171
IPV4 ProtocolNo Operation Option
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.58
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 172
IPV4 ProtocolRecord Route Option
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 173
IPV4 ProtocolRecord Route Concept
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 174
IPV4 ProtocolTime Stamp Concept
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.59
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 175
IPV4 ProtocolChecksum
The error detection method used by most TCP/IP protocols is called the checksum. The checksum protects against the corruption that may occur during the transmission of a packet. It is redundant information added to the packet.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 176
IPV4 ProtocolChecksum
To create the checksum the sender does the following:
The packet is divided into k sections, each of n bits.
All sections are added together using 1s complementarithmetic.
The final result is complemented to make thechecksum.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 177
IPV4 Protocol
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.60
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 178
IPV4 Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 179
IPV4 Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 180
IPV4 ProtocolIP Package
IP software package to show its components and the relationships between the components. This IP package involves following modules.
1. Header-Adding Module2. Processing Module3. Queues4. Routing Table5. Forwarding Module6. MTU Table7. Fragmentation Module8. Reassembly Table9. Reassembly Module
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.61
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 181
IPV4 ProtocolIP Components
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 182
IPV4 ProtocolMTU Table
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 183
IPV4 ProtocolReassembly Table
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.62
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 184
Summary
IP is an unreliable connectionless protocol responsible for source-to-destination delivery.
Packets in the IP layer are called datagrams.
A datagram consists of a header (20 to 60 bytes) and data.
The maximum length of a datagram is 65535 bytes.
MTU is the maximum number of bytes that a data link control can encapsulate. MTU is vary from protocol to protocol.
The options section of the IP header is used for network testing and debugging.
The error detection method used by IP is the checksum.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 185
IPV6 Protocol
IntroductionPacket FormatTransition from IPV4 to IPV6
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 186
IPV6 Protocol
The network layer that is present in use in commonly referred to as IPv4. Although IPv4 is well designed and has helped the internet to grow rapidly, it has some deficiencies, These deficiencies has made it unsuitable for the fast growing internet. To overcome these deficiencies, Internet Protocol, Version 6 protocol has been proposed and it has evolved into a standard.
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.63
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 187
IPV6 Protocol
Important features of IPv6 are highlighted below:
IPv6 uses 128-bit address instead of 32-bit address to provide larger address space Uses more flexible header format, which simplifies and speeds up the routing process Basic header followed by extended header Resource Allocation options, which was not present in IPv4 Provision of new/future protocol options Support for security with the help of encryption and authentication Support for fragmentation at source
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 188
IPV6 Protocol
IPv6 has these advantages over IPv4:
1. larger address space 2. better header format 3. new options4. allowance for extension5. support for resource allocation 6. support for more security
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 189
IPV6 Protocol
IPv6 Address
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.64
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 190
IPV6 Protocol
IPv6 Datagram
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 191
IPV6 Protocol
IPv6 Datagram
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 192
IPV6 Protocol
Comparison between IPv4 and IPv6 packet header
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.65
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 193
IPV6 Protocol
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 194
IPV6 ProtocolIPV6 Extension Header
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 195
IPV6 Protocol
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.66
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 196
IPV6 ProtocolComparison between
IPv4 options and IPv6 extension headers
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 197
Summary
IPV6, the latest version of Internet Protocol., has a 128-bit address space, a revised header format, new options, an allowance for extension, support for resource allocation, and increased security measures.
IPV6 uses hexadecimal colon notation with abbreviation methods available.
An IPV6 datagram is composed of a base header and a payload.
ICMP6, like version 4, report errors, handles group memberships, updates specific router and host tables, and checks the viability of a host.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 198
ConclusionNetwork Layer
ARPAddress MappingARP ProtocolARP Package
RARPIntroductionRARP ProtocolRARP Package
ICMPIntroductionMessagesDebugging ToolsICMP Package
Routing Algorithms and ProtocolsIntroduction
Routing ProtocolsUnicast Routing ProtocolsMulticast Routing protocols
Router Operation and Configuration
IPV4 ProtocolIntroductionDatagramsFragmentationIP Package
IPV6 ProtocolIntroductionPacket FormatTransition from IPV4 to IPV6
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.67
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 199
Objective Type1. Network layer is responsible for ____ to ____ delivery.
2. ARP is used to find ______ address to _______ address.
3. RARP is used to find _________ address to ____ address.
4. An autonomous system is a _______ of network.
5. BGP is a _________ protocol.
6. ICMP is a companion to the _______ protocol.
7. _______ and _______ are two types of ICMP messages.
8. In IPV4 address is of _____ bits.
9. In IPV6 address is of _____ bits.
10. Router works on _____ layer.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 200
Short Questions
1. Which layer determines path selection in an internet work?
2. What is one method mapping network addresses to MAC addressed?
3. What is one method mapping MAC address to network address.
4. What do you mean by Encapsulation.?5. What do you mean by BGP ?6. What is fragmentation in IP protocol ?7. What are the various roles played by the Network
Layer?8. Compare link-state and distance vector routing
algorithms.9. Compare IPV4 and IPV6 header fields.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 201
Short Questions10)Explain the following ICMP messages11)Write a Short note on RARP header.12)Explain debugging tools in ICMP.13)Explain different types of messages in ICMP.14)How does ARP protocol work when a packet is to be
sent?15)Explain the working of RARP.16)Write the commands for configuring the router for
giving address to various interfaces. Give commands for establishing connection between two networks & communicating between them using some protocol. Save the configuration. Write commands for seeing other commands. How will you give password to a router?
-
MCA-309, Advanced Computer Networks
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain
U2.68
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 202
Long Questions1. Draw IPV4 header and explain in detail.2. A host with IP address 130.23.43.20 and physical
address Ox B23455102210 has a packet to send to another host with address 130.23.43.25 and physical address Ox A46EF45983AB. The two hosts are on the same Ethernet network. Show ARP request and reply packet encapsulated in Ethernet frame.
3. Explain RIP protocol in detail.4. Draw and differentiate between IPV 4 and IPV 6
header.5. Compare ARP and RARP. Give their respective
operations.6. Explain various parameters set during router
configuration.7. Explain ARP package8. Explain RARP package
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 203
Long Questions9. Explain the types of BGP messages. Explain the
various fields involved.10.Explain the various query messages in ICMP. Also
draw and explain the packet formats.11.Describe the various links in OSPF.12.What are the various components of a CISCO
Router? Explain them briefly.13.Discuss the header of the Internet Protocol (IP).
Explain how fragmentation is done in IP with the help of an example. What is the need of fragmentations?
14.What is proxy ARP? Explain with the help of an example.
15.What are the problems associated with RIP? How can these problems b overcome. Explain with the help of example.
Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 204
ReferencesMain Reading Books:
1. Behrouz A. Forouzan, TCP/IP Protocol Suit, TMH, 4th Edition2. Behrouz A. Forouzan, Data Communication and Networking, TMH, 3rd edition Reference Books:1. Black U, Computer Networks-Protocols, Standards and Interfaces, PHI, 1996.2. Stallings W., Data and Computer Communications, 6th Ed., PHI, 2002.3. Stallings W., SNMP, SNMPv2, SNMPv3, RMON 1 & 2, 3rd Ed., Addison Wesley,1999.4. Laurra Chappell (Ed), Introduction to Cisco RouterConfiguration, Techmedia, 1999.5. Tananbaum A. S., Computer Networks, 3rd Ed., PHI, 1999.