+ All Categories
Home > Documents > computer networks

computer networks

Date post: 18-Dec-2015
Category:
Upload: arsal
View: 6 times
Download: 0 times
Share this document with a friend
Description:
networks basics
Popular Tags:
68
MCA-309, Advanced Computer Networks © Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.1 © Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U1. 1 Advanced Computer Networks UNIT - II © Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 2 Learning Objectives In this Unit we will discuss : Network Layer ARP, RARP ICMP Routing Algorithms and Protocols Router Operation and Configuration Internetworking IPV4 Protocol IPV6 Protocol © Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 3 Network Layer Network Layer is responsible for host-to-host delivery and for routing the packets through the routers.
Transcript
  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.1

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U1.1

    Advanced Computer NetworksUNIT - II

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 2

    Learning ObjectivesIn this Unit we will discuss : Network Layer ARP, RARP ICMP Routing Algorithms and Protocols Router Operation and Configuration Internetworking IPV4 Protocol IPV6 Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 3

    Network Layer

    Network Layer is responsible for host-to-host delivery and for routing the packets through the routers.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.2

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 4

    ARP

    Address MappingARP ProtocolARP Package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 5

    ARP and RARP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 6

    ARP and RARPPosition of ARP and RARP in TCP/IP protocol suite

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.3

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 7

    ARP

    ARP associates an IP address with its physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address that is usually imprinted on the NIC.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 8

    ARP

    It may be noted that the knowledge of hosts IP address is not sufficient for sending packets, because data link hardware does not understand internet addresses. For example, in an Ethernet network, the Ethernet controller card can send and receive using 48-bit Ethernet addresses. The 32-bit IP addresses are unknown to these cards. This requires a mapping of the IP addresses to the corresponding Ethernet addresses. This mapping is accomplished by using a technique known as Address Resolution Protocol (ARP).

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 9

    ARP

    An ARP request is broadcast to all stations in the network

    An ARP reply is an unicast to the host requesting the mapping

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.4

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 10

    ARP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 11

    ARPARP Packet

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 12

    ARPEncapsulation of ARP packet

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.5

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 13

    ARPFour cases using ARP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 14

    ARPExample

    A host with IP address 130.23.43.20 and physical address B2:34:55:10:22:10 has a packet to send to another host with IP address 130.23.43.25 and physical address A4:6E:F4:59:83:AB (which is unknown to the first host). The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 15

    ARPNote that the ARP data field in this case is 28 bytes, and that the individual addresses do not fit in the 4-byte boundary. That is why we do not show the regular 4-byte boundaries for these addresses. Also note that the IP addresses are shown in hexadecimal.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.6

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 16

    ARP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 17

    Proxy ARP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 18

    ARP Package

    This ARP package involves five modules:

    1. a cache table,

    2. queues,

    3. an output module,

    4. an input module,

    5. and a cache-control module.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.7

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 19

    ARP Package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 20

    Summary

    Delivery of packet to a host or router requires two levels of addresses : logical and physical.

    A logical address identifies a host or router at the network level. TCP/IP call this logical address an IP address.

    A physical address identifies a host or router at the physical level.

    ARP protocol is used to find physical address given a logical address.

    ARP request is broadcast to all devices on the network.

    ARP reply is unicast to the host requesting the mapping.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 21

    RARPIntroductionRARP ProtocolRARP Package

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.8

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 22

    RARPThe TCP/IP protocols include another related protocol known as reverse ARP, which can be used by a computer such as a diskless host to find out its own IP address. It involves the following steps:

    Diskless host A broadcasts a RARP request specifying itself as the target

    RARP server responds with the reply directly to host A

    Host A preserves the IP address in its main memory for future use until it reboots

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 23

    RARPRARP finds the logical address for a machine that only knows its physical address.

    The RARP request packets are broadcast;

    the RARP reply packets are unicast.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 24

    RARP

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.9

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 25

    RARP Packet

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 26

    RARP PacketEncapsulation of RARP packet

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 27

    Summary

    RARP is used to find the logical address for a machine that only knows its physical address.

    RARP request is created and broadcast on the local network.

    Another machine on the local network that knows all the IP addresses will respond with a RARP reply.

    Requesting machine must be running at RARP client program.

    Responding machine must be running at RARP server program.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.10

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 28

    ICMPIntroductionMessagesDebugging ToolsICMP Package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 29

    ICMPTo make efficient use of the network resources, IP was designed to provide unreliable and connectionless best-effort datagram delivery service. As a consequence, IP has no error-control mechanism and also lacks mechanism for host and management queries. A companion protocol known as Internet Control Message Protocol (ICMP), has been designed to compensate these two deficiencies.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 30

    ICMPPosition of ICMP in the network layer

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.11

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 31

    ICMPICMP encapsulation

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 32

    ICMPICMP Messages

    ICMP messages are divided into error-reporting messages and query messages. The error-reporting messages report problems that a router or a host (destination) may encounter. The query messages get specific information from a router or another host.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 33

    ICMPICMP Messages

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.12

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 34

    ICMPICMP messagesICMP messages

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 35

    ICMPMessage Format

    An ICMP message has an 8-byte header and a variable-size data section. Although the general format of the header is different for each message type, the first 4 bytes are common to all.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 36

    ICMPMessage Format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.13

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 37

    ICMPERROR REPORTING

    IP, as an unreliable protocol, is not concerned with error checking and error control. ICMP was designed, in part, to compensate for this shortcoming. ICMP does not correct errors, it simply reports them.

    ICMP always reports error messages to the original source.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 38

    ICMP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 39

    ICMPContents of data field for the error messages

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.14

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 40

    ICMPDestination-unreachable format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 41

    ICMPDestination-unreachable format

    Destination-unreachable messages with codes 2 or 3 can be created only by the destination host.

    Other destination-unreachable messages can be created only by routers.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 42

    ICMPSource-quench format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.15

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 43

    ICMPSource-quench format

    A source-quench message informs the source that a datagram has been discarded due to

    congestion in a router or the destination host.

    The source must slow down the sending of datagrams until the congestion is relieved.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 44

    ICMPSource-quench format

    One source-quench message is sent for each datagram that is discarded due to congestion.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 45

    ICMPTime-exceeded message

    Whenever a router decrements a datagram with a time-to-live value to zero, it discards the datagram

    and sends a time-exceeded message to the original source.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.16

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 46

    ICMPTime-exceeded message

    When the final destination does not receive all of the fragments in a set time, it discards the

    received fragments and sends a time-exceeded message to the original source.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 47

    ICMPTime-exceeded message

    code 0 is used only by routers to show that the value of the time-to-live field is zero. Code 1 is

    used only by the destination host to show that not all of the fragments have arrived within a set time.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 48

    ICMPTime-exceeded message format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.17

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 49

    ICMPTime-exceeded message format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 50

    ICMPParameter-problem

    A parameter-problem message can be created by a router or the destination host.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 51

    ICMPParameter-problem message format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.18

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 52

    ICMPRedirection concept

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 53

    ICMPRedirection concept

    A host usually starts with a small routing table that is gradually augmented and updated. One of

    the tools to accomplish this is the redirection message.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 54

    ICMPRedirection message format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.19

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 55

    ICMPRedirection message

    A redirection message is sent from a router to a host on the same local network.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 56

    ICMPQUERY Messages

    ICMP can also diagnose some network problems through the query messages, a group of four

    different pairs of messages. In this type of ICMP message, a node sends a message that is answered

    in a specific format by the destination node.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 57

    ICMP

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.20

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 58

    ICMP

    An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo-request

    message.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 59

    ICMP

    Echo-request and echo-reply messages can be used by network managers to check the operation

    of the IP protocol.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 60

    ICMP

    Echo-request and echo-reply messages can test the reachability of a host. This is usually done by

    invoking the ping command.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.21

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 61

    ICMPEcho-request and echo-reply messages

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 62

    ICMP

    Timestamp-request and timestamp-reply

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 63

    ICMP

    Timestamp-request and timestamp-reply messages can be used to calculate the round-trip time between a source and a destination machine

    even if their clocks are not synchronized.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.22

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 64

    ICMP

    The timestamp-request and timestamp-reply messages can be used to synchronize two clocks

    in two machines if the exact one-way time duration is known.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 65

    ICMPTimestamp-request and timestamp-reply message format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 66

    ICMP

    Mask-request and mask-reply message format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.23

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 67

    ICMPRouter-solicitation message format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 68

    ICMPRouter-advertisement message format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 69

    ICMP

    Two tools that use ICMP for debugging: 1. ping2. traceroute.

    Debugging Tools

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.24

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 70

    ICMP

    Example

    $ ping fhda.edu

    PING fhda.edu (153.18.8.1) 56 (84) bytes of data.64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=0 ttl=62 time=1.91 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=1 ttl=62 time=2.04 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=2 ttl=62 time=1.90 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=3 ttl=62 time=1.97 ms64 bytes from tiptoe.fhda.edu (153.18.8.1): icmp_seq=4 ttl=62 time=1.93 ms

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 71

    ICMPThe traceroute program operation

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 72

    ICMP

    We use the traceroute program to find the route from the computer voyager.deanza.edu to the server fhda.edu. The following shows the result:

    Example

    $ traceroute fhda.edu

    traceroute to fhda.edu (153.18.8.1), 30 hops max, 38 byte packets1 Dcore.fhda.edu (153.18.31.254) 0.995 ms 0.899 ms 0.878 ms2 Dbackup.fhda.edu (153.18.251.4) 1.039 ms 1.064 ms 1.083 ms3 tiptoe.fhda.edu (153.18.8.1) 1.797 ms 1.642 ms 1.757 ms

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.25

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 73

    ICMP

    To give an idea of how ICMP can handle the sending and receiving of ICMP messages, an ICMP package made of two modules: an input module and an output module.

    ICMP Package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 74

    ICMPICMP Package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 75

    Summary

    ICMP send five types of error reporting messages and four types pairs of query messages to support the unreliable and connectionless Internet Protocol.

    ICMP messages are encapsulated in IP datagrams.

    Packet InterNet Groper (Ping) is an application program that uses the services of ICMP to test the reachablity of a host.

    A simple ICMP design can consist of an input module that handles incoming ICMP packets and an output module that handles demands for ICMP services.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.26

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 76

    Routing Algorithms

    IntroductionRouting ProtocolsUnicast Routing ProtocolsMulticast Routing protocols

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 77

    Routing Algorithms

    Unicast Routing Protocols: RIP, OSPF, and BGP

    1. intra and inter domain routing2. distance vector routing and RIP3. link state routing and OSPF4. path vector routing and BGP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 78

    Routing Algorithms

    Intra and Inter Domain Routing Protocols

    Routing inside an autonomous system is referred to as intradomain routing.

    Routing between autonomous systems is referred to as interdomain routing.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.27

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 79

    Routing Algorithms

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 80

    Routing Algorithms

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 81

    Routing Algorithms

    Distance Vector Routing

    In distance vector routing, the least cost route between any two nodes is the route with minimum distance. In this protocol each node maintains a vector (table) of minimum distances to every node

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.28

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 82

    Routing Algorithms

    In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 83

    Routing Algorithms

    In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 84

    Routing AlgorithmsDistance vector routing tables

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.29

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 85

    Routing AlgorithmsInitialization of tables in distance vector routing

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 86

    Routing AlgorithmsUpdating in distance vector routing

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 87

    Routing AlgorithmsTwo-node instability

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.30

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 88

    Routing Protocol

    The Routing Information Protocol (RIP) is an intradomain routing protocol used inside an autonomous system. It is a very simple protocol based on distance vector routing.

    RIP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 89

    Routing Protocol

    The Routing Information Protocol (RIP) is one of the most commonly used Interior Gateway Protocol on internal networks which helps a router dynamically adapt to changes of network connections by communicating information about which networks each router can reach and how far away those networks are. Although RIP is still actively used, it is generally considered to have been obsolete by Link-state routing protocol such as OSPF.

    RIP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 90

    Routing Protocol

    RIP uses the services of UDP on well-known port 520.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.31

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 91

    Routing ProtocolExample of a domain using RIP

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 92

    Routing ProtocolRIP message format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 93

    Routing ProtocolRequest messages

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.32

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 94

    Routing ProtocolRIP timers

    RIP uses certain timers to regulate its performance. The biggest drawback to a RIP router is the broadcast it makes. RIP uses numerous timers to regulate its performance. These include a routing-update timer, a route-timeout timer, and a route-flush timer. The routing-update timer clocks the interval between periodic routing updates, each router periodically transmits it entire routing table to all the other routers on the network. Generally, it is set to 30 seconds, with a small random amount of time added whenever the timer is reset.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 95

    Routing ProtocolRIP timers

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 96

    Routing ProtocolRIP version 2 format

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.33

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 97

    Routing ProtocolRIP version 2 format

    RIP Version 2 (RIPv2) RIP Version 2 adds a "network mask" and "next hop address" field to the original RIP packet while remaining completely compatible with RIP. Thus RIPv2 routers can coexist with RIP routers without any problems. The subnet mask field contains the network bit mask associated with the destination; it also allows the implementation of CIDR addressing. This will allow RIP to function in a variety of environments, which may implement variable subnet masks on a network.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 98

    Routing Algorithms

    Link State Routing

    In link state routing, if each node in the domain has the entiretopology of the domain, the node can use Dijkstrasalgorithm to build a routing table.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 99

    Routing Algorithms

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.34

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 100

    Routing AlgorithmsLink state knowledge

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 101

    Routing Algorithms

    Dijkstra algorithm

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 102

    Routing AlgorithmsExample of formation of shortest path tree

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.35

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 103

    Routing Algorithms

    Routing table for node A

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 104

    Routing Protocol

    OSPF

    Open Shortest Path First (OSPF) is another Interior Gateway Protocol. It is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). The working group was formed in 1988 to design an IGP based on the Shortest Path First (SPF) algorithm for use in the Internet. OSPF was created because in the mid-1980s, the Routing Information Protocol (RIP) was increasingly incapable of serving large, heterogeneous internetworks. OSPF being a SPF algorithm scales better than RIP.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 105

    Routing Protocol

    OSPF

    The Open Shortest Path First (OSPF) protocol is an intra domain routing protocol based on link state routing. Its domain is also an autonomous system.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.36

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 106

    Routing ProtocolOSPF also has the following features:

    Advertise about neighborhood: Instead of sending its entire routing table, a router sends information about its neighborhood only. Flooding: Each router sends this information to every other router on the internetwork, not just to its neighbors. It does so by a process of flooding. In Flooding, a router sends its information to all its neighbors (through all of its output ports). Every router sends such messages to each of its neighbor, and every router that receives the packet sends copies to its neighbor. Finally, every router has a copy of same information. Active response: Each outer sends out information about the neighbor when there is a change.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 107

    Routing Protocol

    OSPF packets are encapsulated in IP datagrams.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 108

    Routing Protocol

    Areas in an autonomous system

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.37

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 109

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 110

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 111

    Routing Protocol

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.38

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 112

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 113

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 114

    Routing Protocol

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.39

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 115

    Routing ProtocolOSPF common header

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 116

    Routing ProtocolLink state update packet

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 117

    Routing ProtocolLSA general header

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.40

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 118

    Routing ProtocolRouter link

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 119

    Routing ProtocolRouter link LSA

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 120

    Routing ProtocolLink types, link identification, and link dataLink types, link identification, and link data

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.41

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 121

    Routing Protocol

    Example - Give the router link LSA sent by router 10.24.7.9

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 122

    Routing Protocol

    This router has three links: two of type 1 (point-to-point) and one of type 3 (stub network).

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 123

    Routing Algorithms

    Path Vector Routing

    Path vector routing is similar to distance vector routing. There is at least one node, called the speaker node, in each AS that creates a routing table and advertises it to speaker nodes in the neighboring ASs..

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.42

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 124

    Routing Algorithms

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 125

    Routing Algorithms

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 126

    Routing Protocol

    Border Gateway Protocol

    Border Gateway Protocol (BGP) is an inter domain routing protocol using path vector routing. It first appeared in 1989 and has gone through four versions.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.43

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 127

    Routing Protocol

    BGP supports classless addressing and CIDR.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 128

    Routing Protocol

    BGP uses the services of TCP on port 179.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 129

    Routing Protocol

    Internal and external BGP sessions

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.44

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 130

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 131

    Routing ProtocolBGP packet header

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 132

    Routing ProtocolOpen message

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.45

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 133

    Routing ProtocolUpdate message

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 134

    Routing ProtocolKeepalive message

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 135

    Routing ProtocolNotification message

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.46

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 136

    Routing Protocol

    A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 137

    Routing ProtocolUnicast :- the router forwards the received packet

    through only one of its interfaces

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 138

    Routing ProtocolMultiicast :- the router may forward the received packet

    through several of its interfaces

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.47

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 139

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 140

    Routing Protocol

    Emulation of multicasting through multiple unicasting is not efficient and may create long

    delays, particularly with a large group.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 141

    Routing Protocol

    In unicast routing, each router in the domain has a table that defines a shortest path tree to

    possible destinations.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.48

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 142

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 143

    Routing Protocol

    In multicast routing, each involved router needs to construct a shortest path tree for each group.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 144

    Routing Protocol

    In the source-based tree approach, each router needs to have one shortest path tree for each

    group.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.49

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 145

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 146

    Routing Protocol

    In the group-shared tree approach, only the core router, which has a shortest path tree for each

    group, is involved in multicasting.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 147

    Routing Protocol

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.50

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 148

    Routing Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 149

    Summary

    A metric is the cost assigned for passage of a packet through a network.

    A router consults its routing table to determine the best path of a packet.

    An autonomous system is a group of networks and routers under the authority of a single administration.

    RIP and OSPF are popular intra domain routing protocols used to update routing table in an AS.

    RIP use three timers.

    BGP is an inter autonomous system routing protocol used to update routing tables.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 150

    Router OperationIntroduction to RoutersOverview of Router ModesRouter Interfaces

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.51

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 151

    Router ConfigurationOverview of Router ConfigurationStatic RoutingDynamic RoutingDefault Routing

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 152

    IPV4 Protocol

    IntroductionDatagramsFragmentationIP Package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 153

    IPV4 Protocol

    IP is an unreliable and connectionless best-effort delivery service protocol. By best effort we mean that there is no error and flow control. However, IP performs error detection and discards a packet, if it is corrupted. To achieve reliability, it is necessary to combine it with a reliable protocol such as TCP. Packets in IP layer are called datagrams. The IP header provides information about various functions the IP performs.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.52

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 154

    IPV4 Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 155

    IPV4 Protocol

    A packet in the IP layer is called a datagram, a variable-length packet consisting of two parts: header and data. The header is 20 to 60 bytes in length and contains information essential to routing and delivery.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 156

    IPV4 ProtocolIP Datagram

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.53

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 157

    IPV4 ProtocolService type or differentiated services

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 158

    IPV4 Protocol

    The precedence subfield was designed, but never used in version 4.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 159

    IPV4 ProtocolTypes of service

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.54

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 160

    IPV4 ProtocolMultiplexing

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 161

    IPV4 ProtocolProtocols

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 162

    IPV4 ProtocolFragmentation

    The format and size of a frame depend on the protocol used by the physical network. A datagram may have to be fragmented to fit the protocol regulations.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.55

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 163

    IPV4 ProtocolFragmentation

    Each network imposes a limit on maximum size, known as maximum transfer unit (MTU) of a packet because of various reasons. One approach is to prevent the problem to occur in the first place, i.e. send packets smaller than the MTU. Second approach is to deal with the problem using fragmentation. When a gateway connects two networks that have different maximum and or minimum packet sizes, it is necessary to allow the gateway to break packets up into fragments, sending each one as an internet packet. The technique is known as fragmentation.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 164

    IPV4 ProtocolMaximum Transfer Unit (MTU)

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 165

    IPV4 ProtocolMTUs for some networks

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.56

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 166

    IPV4 ProtocolFragmentation Example

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 167

    IPV4 Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 168

    IPV4 ProtocolOPTIONS

    The header of the IP datagram is made of two parts: a fixed part and a variable part. The variable part comprises the options that can be a maximum of 40 bytes.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.57

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 169

    IPV4 ProtocolOPTION Format

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 170

    IPV4 ProtocolCategories of Option

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 171

    IPV4 ProtocolNo Operation Option

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.58

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 172

    IPV4 ProtocolRecord Route Option

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 173

    IPV4 ProtocolRecord Route Concept

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 174

    IPV4 ProtocolTime Stamp Concept

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.59

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 175

    IPV4 ProtocolChecksum

    The error detection method used by most TCP/IP protocols is called the checksum. The checksum protects against the corruption that may occur during the transmission of a packet. It is redundant information added to the packet.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 176

    IPV4 ProtocolChecksum

    To create the checksum the sender does the following:

    The packet is divided into k sections, each of n bits.

    All sections are added together using 1s complementarithmetic.

    The final result is complemented to make thechecksum.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 177

    IPV4 Protocol

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.60

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 178

    IPV4 Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 179

    IPV4 Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 180

    IPV4 ProtocolIP Package

    IP software package to show its components and the relationships between the components. This IP package involves following modules.

    1. Header-Adding Module2. Processing Module3. Queues4. Routing Table5. Forwarding Module6. MTU Table7. Fragmentation Module8. Reassembly Table9. Reassembly Module

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.61

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 181

    IPV4 ProtocolIP Components

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 182

    IPV4 ProtocolMTU Table

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 183

    IPV4 ProtocolReassembly Table

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.62

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 184

    Summary

    IP is an unreliable connectionless protocol responsible for source-to-destination delivery.

    Packets in the IP layer are called datagrams.

    A datagram consists of a header (20 to 60 bytes) and data.

    The maximum length of a datagram is 65535 bytes.

    MTU is the maximum number of bytes that a data link control can encapsulate. MTU is vary from protocol to protocol.

    The options section of the IP header is used for network testing and debugging.

    The error detection method used by IP is the checksum.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 185

    IPV6 Protocol

    IntroductionPacket FormatTransition from IPV4 to IPV6

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 186

    IPV6 Protocol

    The network layer that is present in use in commonly referred to as IPv4. Although IPv4 is well designed and has helped the internet to grow rapidly, it has some deficiencies, These deficiencies has made it unsuitable for the fast growing internet. To overcome these deficiencies, Internet Protocol, Version 6 protocol has been proposed and it has evolved into a standard.

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.63

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 187

    IPV6 Protocol

    Important features of IPv6 are highlighted below:

    IPv6 uses 128-bit address instead of 32-bit address to provide larger address space Uses more flexible header format, which simplifies and speeds up the routing process Basic header followed by extended header Resource Allocation options, which was not present in IPv4 Provision of new/future protocol options Support for security with the help of encryption and authentication Support for fragmentation at source

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 188

    IPV6 Protocol

    IPv6 has these advantages over IPv4:

    1. larger address space 2. better header format 3. new options4. allowance for extension5. support for resource allocation 6. support for more security

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 189

    IPV6 Protocol

    IPv6 Address

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.64

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 190

    IPV6 Protocol

    IPv6 Datagram

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 191

    IPV6 Protocol

    IPv6 Datagram

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 192

    IPV6 Protocol

    Comparison between IPv4 and IPv6 packet header

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.65

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 193

    IPV6 Protocol

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 194

    IPV6 ProtocolIPV6 Extension Header

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 195

    IPV6 Protocol

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.66

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 196

    IPV6 ProtocolComparison between

    IPv4 options and IPv6 extension headers

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 197

    Summary

    IPV6, the latest version of Internet Protocol., has a 128-bit address space, a revised header format, new options, an allowance for extension, support for resource allocation, and increased security measures.

    IPV6 uses hexadecimal colon notation with abbreviation methods available.

    An IPV6 datagram is composed of a base header and a payload.

    ICMP6, like version 4, report errors, handles group memberships, updates specific router and host tables, and checks the viability of a host.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 198

    ConclusionNetwork Layer

    ARPAddress MappingARP ProtocolARP Package

    RARPIntroductionRARP ProtocolRARP Package

    ICMPIntroductionMessagesDebugging ToolsICMP Package

    Routing Algorithms and ProtocolsIntroduction

    Routing ProtocolsUnicast Routing ProtocolsMulticast Routing protocols

    Router Operation and Configuration

    IPV4 ProtocolIntroductionDatagramsFragmentationIP Package

    IPV6 ProtocolIntroductionPacket FormatTransition from IPV4 to IPV6

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.67

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 199

    Objective Type1. Network layer is responsible for ____ to ____ delivery.

    2. ARP is used to find ______ address to _______ address.

    3. RARP is used to find _________ address to ____ address.

    4. An autonomous system is a _______ of network.

    5. BGP is a _________ protocol.

    6. ICMP is a companion to the _______ protocol.

    7. _______ and _______ are two types of ICMP messages.

    8. In IPV4 address is of _____ bits.

    9. In IPV6 address is of _____ bits.

    10. Router works on _____ layer.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 200

    Short Questions

    1. Which layer determines path selection in an internet work?

    2. What is one method mapping network addresses to MAC addressed?

    3. What is one method mapping MAC address to network address.

    4. What do you mean by Encapsulation.?5. What do you mean by BGP ?6. What is fragmentation in IP protocol ?7. What are the various roles played by the Network

    Layer?8. Compare link-state and distance vector routing

    algorithms.9. Compare IPV4 and IPV6 header fields.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 201

    Short Questions10)Explain the following ICMP messages11)Write a Short note on RARP header.12)Explain debugging tools in ICMP.13)Explain different types of messages in ICMP.14)How does ARP protocol work when a packet is to be

    sent?15)Explain the working of RARP.16)Write the commands for configuring the router for

    giving address to various interfaces. Give commands for establishing connection between two networks & communicating between them using some protocol. Save the configuration. Write commands for seeing other commands. How will you give password to a router?

  • MCA-309, Advanced Computer Networks

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain

    U2.68

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 202

    Long Questions1. Draw IPV4 header and explain in detail.2. A host with IP address 130.23.43.20 and physical

    address Ox B23455102210 has a packet to send to another host with address 130.23.43.25 and physical address Ox A46EF45983AB. The two hosts are on the same Ethernet network. Show ARP request and reply packet encapsulated in Ethernet frame.

    3. Explain RIP protocol in detail.4. Draw and differentiate between IPV 4 and IPV 6

    header.5. Compare ARP and RARP. Give their respective

    operations.6. Explain various parameters set during router

    configuration.7. Explain ARP package8. Explain RARP package

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 203

    Long Questions9. Explain the types of BGP messages. Explain the

    various fields involved.10.Explain the various query messages in ICMP. Also

    draw and explain the packet formats.11.Describe the various links in OSPF.12.What are the various components of a CISCO

    Router? Explain them briefly.13.Discuss the header of the Internet Protocol (IP).

    Explain how fragmentation is done in IP with the help of an example. What is the need of fragmentations?

    14.What is proxy ARP? Explain with the help of an example.

    15.What are the problems associated with RIP? How can these problems b overcome. Explain with the help of example.

    Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi-63 by Vishal Jain U2.. 204

    ReferencesMain Reading Books:

    1. Behrouz A. Forouzan, TCP/IP Protocol Suit, TMH, 4th Edition2. Behrouz A. Forouzan, Data Communication and Networking, TMH, 3rd edition Reference Books:1. Black U, Computer Networks-Protocols, Standards and Interfaces, PHI, 1996.2. Stallings W., Data and Computer Communications, 6th Ed., PHI, 2002.3. Stallings W., SNMP, SNMPv2, SNMPv3, RMON 1 & 2, 3rd Ed., Addison Wesley,1999.4. Laurra Chappell (Ed), Introduction to Cisco RouterConfiguration, Techmedia, 1999.5. Tananbaum A. S., Computer Networks, 3rd Ed., PHI, 1999.


Recommended