0% found this document useful (0 votes)
99 views51 pages

Cs3591-Unit 3

LECTURE NOTE

Uploaded by

reshma.r
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
99 views51 pages

Cs3591-Unit 3

LECTURE NOTE

Uploaded by

reshma.r
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 51
i oye = 2 Unit IN Metwors k Layers ‘ j Susitehing:“Reket: sivit chin Internet Pastore]. jtPvi, “1? Barns cy roar "Ph , PRP, RERP CHP DHCP! , ‘ eet 3:1 Netsosk Layer: ‘al Netosos k Loyen 48 the sthisid Layen 9 the, ost mode] T+ handles the service sequests dion : Pronspost Rayer ond guxther goswousids the Vier staguest to the. clato Blok Anges . te worl, Layer Aorans tates the. Aogical tld r0%202 Pryzical chels1ed3es - x Tr clatenreres the stout dior the Scouse Be dsbration -crck also “nounaiyes the totic Pais kuch ad awitthing: novtnayand contol, anguesti on oy plate. packeb . a E The. rman stole gpthe petwos lk, Aesye s pote the packet fiom Serchiney host Ap tra Bost 2 1 Network Layer Aenvices © | Maun’ teats 4 “Bhe. nedwooe k Payer, 1g e packets dorm the. Bounce. host! te rhe, on host. Metwoxk Jayer Bewvices ‘Oouentedch “Semwices « f oe Sa WG Benvice , thes, 28.0. Swlotionshi P between al! Peokets belongings tb De MPEMAGE « Before “all Alogi, tuo] Connecti, AA vo restage, £9) be, sent, a VI Should be. etup cto whine the “path Nor the DOLAGHams . Pee ya larat Bekup, the Mataghams con all dollous #he. Borne path, : am this type, not oral We the peickat Leortoin the. Source: vrsch. chiatinatcon a es, He roust ee wonteln ee Aabel. wee packets = Vistuol Cixi 5 a packet. ub ‘aut | a the Lavel 15 thes. Packet Tp this thse, the Seok: cucsion 4a based on the Value a es tO Sic | SN “iu Le SEE e eb Qsiented sent, ©. Oe Re 7. daseck | “s Seba 20h ah othe : : +» clotos: transden | " : Teardocon phase Tn SUP pi nase, ‘the. EchHOR WEY xe, . Locldnesses Tay ina bodice us| Wm Teak dable Cntyies dow the | Senvia: ee apmgckion osuiendd @ shosidlouss phase, the. “ounce: anck clastinatis,, re the, sous Tip dalite, the, L034 poral’ Arranges Cece ie ise sited om I Tirsterrset, ake! (OP) 4 On [Bet Bet! Y suules, jor, poating ook ' late, So thet they on i ea veve ch Oeedue, wet Shs Braversin the. internet 4 vsti. Broalln fueces Kall A pee kek on “GB veittoched tpeadhy paciet 949 OF ON helps” routers Ab Send sught Place. Berman, protocol ,. ielget prstecol Vesssion 4 (Pv) 43 eee ble. fox petck etizing | OF oe veunel, clebivea of me Packet ur the ea tga if RAS. , eee TF yakiRcadtion —WP AP Packet ue ps fi ie a, the Brenan Pogmented use isston Ol the. porkain Barre siaicie Os ati oe dent 4 osuigina| iP pac leat thes belay to y Hiags 2 AS puguine o. by the netuset Ie |gsource’, +f IP Packet +8 too Lange te hendle, ppne geo Hells if they won be. Grogan ad loot not - p Foagroert offset - y the Fragment ip the dug nal IP Pac ¥ Time to hive - 4 1a Bent Loith Some This offset tells the. eocack pester ket > wavoid ‘looping sin the yetuaw k 2 even packs TT Value set, crepe) bh tells the networls bow man stoudens, This yon «cxwss . At each hop, dts Value ds vole csermérted by one. vorod UOhe > the Value seaches ZO, the packet 438 cuiscerrclec : | Wo Prtocol _ Tells the netwos Is Layer vat the dlastination post, 22 wobich protocol this packet beloras dp, je the mock devel protocol | Protocol nurcbes 4 Tep 13 6 and upP eT | 7 Heacles checksum This fetd 48 used to keep thecksum Value 2 eptioe heackes porich 43 then aned to checl< id the. pacleet a noceived ean gee - Iv Bounen Addness - 32 cpetciness 3 treserden & the | Poctcet , \v Destination A ot the packet: v Options - This +8 plier field, wobich is ndod | the Value Sf IHL As ppodilen thon 5. ahic pee jot dilsess 32 pit wrciclous’ 94 the. seceive, ast Adelsessira, Mode : ; in —“ Thie rooele. 18 0 nice F| the pxevtous tice \e the packet sent 4B neither listined to 0 host 0% all the bast on the 4egroent. In this ch et, The olesti ration adders contains A Apecta| delses. sobich Atasl Lith AQl-x.x.X and can be Biertaided by rome an one host * ao pot Bs Senves B ah Sug Chiené —Seaven © DB Seven Sends packats 40bich ove entertarnedl rae than one sever . Every retools has LIP cdclocess AeZervect dor the netroowk number yusents the etuocrk ond one. [IP addoy on the bevoadcast cioldaess, obich sepsesend, boil Lr thet metworle | \Pvy sea AiwiAUchiial McldKessing Scheme An _usbich 43 82 bit in Length 43 voldvicled iit, i be MS Wiha of bi 48 da.ternsined by 2. said ec (posi Lior Dy that 44 the Value Bt a bt sition 6 42 QT(6-1) that 42 6 that js 32 tal Value 2 the octet 1h detenoined buy “up the. pesi tonal value ot biG. The velue. o Joop AB RATS = 122), Some. examples rave shag, = y -Adduess Classes : ae eT Taternet psotocol tak g contain § 1a} classes S| Jp col clsusses to be waxed Agidenty gous, Aituctions F8 Pes the Paguisarnent S| spetwoork . Broodly » the IPvi, ald ser3" ny jiviced ‘inte dive Kia g8 08 4 IP cack vcesiog ee by athe. divest at oatet sufrred Pow a the lyfe mcs cae Paes oe foot “depict dotteel ub cet A LB Pool ooo 62 vy 3 TelossB Adtaness Ap IP aclolsess tobich loelorgs te class B hag the fe teoo bits ‘wn the fisst octet Set 4 Id ie {0000000 — tolilti | ize -— (91 vClass B IP Acldswy2 ex range fom 28-0.x. 7 191-255-x-x The elgoutt subnet roasts gov class R 28 i} 255-255- XX. lass B has 16384 (at) Netwos I¢ aol clseesseg and b853y (24-2) Host acldsesseg Klass, B IP acldlsess fosmat +48 ID IVI. NIV. HHH BB > class ¢ Addness » The. frat octet 2 lass co 1 Picelelre ss haz, ab gout 2 bit set to Ile that 4: tloococoe —lollil| 192 - 223 Class ¢ |Padduesses, mange diom 142-0-0-x to 283-256-255 -% - The. selefeustt Aubnet nog Ic fon class G 3 QEB. 26EH-255°X Class c, Kqived LOU! 52 (2?") Netw0% le waddbiesses wane 254 (28-25 Hest aclsusseg . Class CIP cidebrwess qorreat Le! VONNANV © VIVNIVNN IN 1 - NNVWNWN iv HH OHH 4d oN a . feless 9 D Addnes ‘ vey ofisat fous bi ot the, dist octet Ltr class Dd \P cleus es OH, Bb ABO, ivi... O ee Site ‘locooo —\1 01114 oa ee 284 Class D pas IPadalewss sarge dior, Qar4-0:b.0 to 234 -QS5-ASS- ISS: Llass > LAR puservedl farm rout cast og. Dip routticast:, lect 1a not élestined dos LN parti caclon, a J thet 48 uoby there, 18 mone ete ect act host cddvess dors the (Paddestancd wes: D cloes Not have. oa Agree roasle . 1 VA WIV 9 > Class E Addness ; xs 1p closs 42 fasenve d ps OG peuvent) Purposes only dos Btucly: iP cdl ster Bo th, [elass Hanges dos 40.0-0: 6 te age. asc. aca 2 Lite. Clags Dp, this toss tio 1k “not? EGA ppe df oi th any Aubnet rast. « ost Cl, ZB: Subnettio qi : Each \Pudlass ag equipped Loltts Geir, Jeult dubnet reask which ‘boun cli that! p Less to have poagioced Bursber sf nebwor lo, urek prfinceal murnben 4 host Per netic le. Chas sul IP erclelnes.sy ic lees not proviele Ons, (cue having, hess nuraber % Hosts / Per Netto k 08 Mon netoosls per IP Chess . Bubed- b, Bing Subnetling » one. Shed 1P pelelxe ss cor be ued th have, Smalley osks t0hich provicle. béllz netroosk manage - capabi bties When an en nebwork 13 clivicled ist. i networks, to neaintaln Aecusu' ty, then that TO dlivcole. wa netsh. £506 Avo pacts % Binesd to choose one bit gov each Aubnet dom wos ID port: NIDENTS12-D Riise a2 102080 O Range = ke ba oon C. de TU zi a: we alee eee | these, OK tive Subnet s . 2 le dao Pluss CIP Bddness, thew ose Aubits io pee Ix. tok poset anck @bit inthe, host id pert” aoe don. vo netvoos K phoutd, be clon thot At eloer not edde f the nettoos k 198: § 200000000 tO (13-712 ON ITT Gcpe ct eps the fisst bit ohich 48 Chosen Zr0 Sow Subvet lol past. This the sarge & Bubnet | +, 193-1-2-0 to 193-1-2°127 oa Subnet th gf Aubnet | 1B 3193-12-06 Dowct Broudeast (ol 282199127127 Total nunber sf host 2126 Cout g rg 2 1d’s ose. Led fos se rol f Dviect bvockay ha) Subnet mask + 255, 255-288.)2g atos Aubnet 2: The fiat brt chesen dso the host Idk Pat ig one. and |the. Hange coll! he dtom 193-1-2- 10000000 | to 1973+ 1 D-II Beg ane Prong. a Subnet 2; [Uae heo 12S tol (9 gah 2S Subnet 1d: 193-1-2-128 ‘Divect bacecd east 1D 1198-1. 2:255 Total uroben pi bost, +.)26 it Subnet roagk 2265 1255-+255-199 Fioally Ay ey the Subnetling the total Dumber 3 usable. peo preclute of Dscom 264 to 252- : To iviole fa network inte dou A) pant Aye. neeck Ao choose two bits fom the host (cl Pe ee each subnet yen ky oe 10, i NM GQ network unty ught (24) pasty Yeu B Se. oes. bile dom the. host il pamt— 2 Aubret 1€ 000, coi, O10, Ol, J00, Il, 110, sara Ty the Aotal Nunshex, a Subnet in x ne a t 4 keooy ages the Hota, numbes, Lusalle hosts clon Cbg x pe ; ; RK Mt Harople By Consicls, we have ice big Biogle netwos !¢ having 1P address 200-120 we toant to oo Aubnetting anol livia this netwos k inte dubne’ . coro the given etoile belongs do less ¢. aa be PO | ae A ee _—_ t ebit Host (D us Bevo biti form the Host (1D past “host pant sera 8 oe eee tee then it sop i jSt gu oe ee” bite = olythen tt : Qrd Subr 4 0 JR bosstoweck bit = 10, then. 46 ro 3 ot sited ets a! | then it | Poclelseas 5) A four dubnet HD : - ey Coen Q2.00000000 = 2o0-!-2- + 200-}+ 2-0l000000 = 2c He a + 200-1-2- lOO00000 = LO0-1+.2-)2 + Q00-1+2- I 0ce00 = aoo- I: 200. 1:20 ba Ba hon 2o0- Valo g ie 200. 1-2..6 4 | we yoo at 214g —>fon oes a ' hie “Radbiess = 260 -1°2+6 we Total IPecletsess = 2° by Ocal nunsber of hes A by 2 = 262) ° Rage. S| IP addsess = 200-1-2- 000000 QO00-|- 2- COV | Be C ee Bc, eae OA ame el wee tech bacooel cast cclolaess’ i ack Subnet - [Powilre ssa Q00- 1-2-6 Y Total \Poddness = ab= by 1 tal no: nes G1) 42". 62 oo: 1*2- 01006000 te 200-1. 2-0) 1/111) 0 y ange =: te; Boo, 122-64. te, B00. Ile 7 as Durect brwedcart actexess = 200-1 a 127 Linoit dh lbxoackcast adders = 2R6-256-255, 255 asl Subnet (a WPeclelress - S doo. 12-128 “Total |Pauclelness eho LG, Tota! mo: e} host = 64-2=62 + Range = 200. 1-2- TONER: ta donk: f2stounint) je Soo. 1-2-128 te Qoo-1-2-14] « inuct broadcast adclsess = Q00-|-2- 19y Minit ed booadeast adden =ass- 255.255 265 fox lth Subnet eo 1Padtlress = oo. lk 2192 + Total 1Pacdlness = gbe by 8 Tota) no: of host = 6y-2=62 Range = 200-1'2- 1009000, oo. I-2-11NNNN1 ie. 200. 1-2-192 © fo0.1.2:2 55 ‘ Bton cheast cia =R00-18:255 > ted, mae Oolobness =. — \q be 2 n es - Bome, odvantagus ¥ Pug over (ite entionedt belowo” ‘Heoclen Sornaat: }vp tras 0. 1ees heackes 1p cobich Options ae Bepanated Lions the. | beccless arel wnsexted beween aa base, io Linch sappen Lawyer clata |3° agen [Pvg 43 oe ge clea | wei “new rotation: ee bees Ape, Jesating 6 byte dlelsessea . Th eet: 9 fou hecactecnoa | ae Bike tig 2} ket 48 Corposed Ho vmandatosy } Jodlowe by the. payloact . “The. payloack cons ist £{ two paw optiona | 5 headers nc clata dione von upper layer age heaces Occupier Yo bytes, whewag nsion headers tnd, clata fom the. uppey, h contain 2p Lo 65, 635 bytes 2} Infos mation ‘ye hobytet upto 65 535 bjles “ayioad cue on ata, Pkt caclesis CopHora|)| Fao upper! Boose beads» Fam [Paes] Aosicbel_| [Payload aL Nite] Hop ueoit Soursee akobnes§ | Bestinsation acdness | Extension haaclets | ion, This Ubitahelch elafines the. Vuaion Durobes, the \P tha Let peuosurty fie wlefines the. pouiosu ty 4 the. packet ‘ Biel Othe Bie Lebel us 2. S byte (aubt) fit dsec fox Lonniol the tow & lata (Be. rbyte. Pasloack dangth diecld path 2 the IP clato gran Se huscking Ana 2 oe | Qo {Pig Ho ot Bot us used when Some. af the Aystenns @ the IPVy anck the. Sender wart tp Ade \PUy te. oreceives: cloes pot urclissurtanal MPVS - + The. eades; ep anobct B&hould be- totally anged though header tsans lection - “Ta Recule, PRU os ested Loan IRV, heads, IPvi, Host Headey, Trans lat on Translation procedure the |PVb meapped cicleloess te 15 [PUL ss Actracting the. sught roost Sabi wacond the Value of IVE Pouoseity field the Aas pe. x Beswice. field Ja \PVy +o be Zero lat; the. checksum fos |PVy ancl inBesrt in a 1, the. pve flow abe. | exit the. Conmpati ble. eter 810 heaclaxs to ns cand insert thorn din the (PV hecctes ate the length 4 IPVuy hecroten cnet inses x 2. consuesponching qielol uonnpu the. total Jength ef the, [PU ie poning ted J Qo » Static mapping Teans wating 0 tabb proctates 10s teal gdclows, raith 2 physicn| Bi Tbis table 2 ttox0d Lo each oachine on pole. Each machine thet knows Pees eeorrph Adsiess SS ROE eS reathine, but not tt geld esses can fools jt up in the table This bag dome Lirsitations hetause physical a4 fran Ge, so the. Bui THeDAIgE. dorroat asc: : Hasclusase Type : Specifies the. type of bax: used dos the Local nekuoosile Loran sraltt the ARP message. Ethemnet ua the. Corareon. “Ty Pe panck the Value. ethemet 43 |. 1 & this dielcl in Deytes. Protocol £ype: Each proto col ti assigned Mumnkes czech 2 this, gilda. 1Pvy 8 2ol Slo Hosiooxa Addne ss Langth . fs Maegth im bytes Wr pasdevore. cme c> oclolnbay © ee M acolnessesuire 6 bytes Lerags.. sb Pocotocol Aolelneds Length’: lange ie legtes 1 [Boaies | ooldlie ss Se dees uo Adds Lace 1 byt Long : j BSA Operation: Specifies the See at the ARP PRP nequist and 2. ARG . od 9 prctocol oodlolowess Oe pastor! pololowsg, aclebress) Of the clues. Sending the resicge Co Harcocse, Adolress- aah Mec adders 2. Interde h ee ee? ‘abcd sa Keyrorock guests | ‘i 7 ie Prato Ackdlness . The. prsete col acleloees, Pv4 addr ess,) 2 the. iotenclecl sucet ves 4 copulation An ARP Packet Ag eneapsuteted lout (4 At Oo slate, Mink dare. For ecarnple, £0 439 we Ip PRP packet Lt encapsutabed io wan, ekbennet— Benes Tre. type: qield treeicate? that the ato assed by the \Prarne 12 OO BRP Packet ARP request /xep rigpe 0x0806 4 Bere ev Sever steps Unvalved > Coy BRD |Paddness s| the, target . ks ARP dp each ss PRP paguast Cog , fo the. dene physical vrolelbuss, the. wel the. target WPuciclole es That | 1p oolelrass, 2° ] i gickel s Glee 01% OSD, Bencler ows the. physical crolchess enh. at * The Sender as cbost and wast 40 Sencl or e pata es host on another netwosk. Th se. the host Looks vat th noutegy tulle -arcl e. IP rclalies § 2 The next hoP Lrouten) toy C 4ination. 4 jt doe, not pave. a HOUEIN, pit Avoks dos the IR ocldlsess gf the. eacure The IP aclclress 9 the sorilen be corres (Opes ical ocldsess that rest be. reapped 0 oo physica | A ess A + Pe Render 19.0. Souter thet ras seceived \ aqriorm clesti neck don oO. bast 0? ancthes natant, Checks its 2cuting table nck dinds the tPaddoy Bpext nouter Te IPaddsess 2{ the nect moutey ecornes, the. Logical addins tat toust sea nor Pack: Kp o physical Areas . Cosel ; Te. Dendes 18:0. dodben that hes sce ved vor dabegaaro dustined er akost ie Same. netrwwootk Tre. cloatineetion \Paddress a the clatograrn Seco nnes, the. Logical wcllnexs thet rouse heme pred DO prysical wadldae ss. | RRP (Reverse Acldlness Resolution ‘tocol ) es Ti 43, a protorel by woblch sr physica | rne in & Local Ua nektoosk can segues wi ity [Pods ess qrom vo, Cale wom Beaver RRaokutiva Buste col tere) table. o¥ cache. A retwosic ocliaiietiatemceats: Q Recal esa netwosks Aoteony doce Hag fa rath (rnerteliss 15 Coney c # a | Phardurse waoldresy . “Ty leave, beth bre, protocol cvcleliess orcl Lhe, largest prot co Pus blarsic, Ante. Ht clown’ Know itthen ¢ device. — FTE Aounce bawadecuts. the. ARP (ure fae On the local netiuos le Local Devices Process PPR P neguost roca ge, The Message. AS Se ceived by each cuca of Local networ le ancl processed Devices thet rot Aondiguse d to ect? 2 RORP Sevens m the merge bswecleart Roep Proyusst rbaig * Ree P Aves, Aprorates RRP suply Musage Aral Cleisits. on the. netwuvk, that 48 setups do oct Yan RorP Seaver Pusporcs th tho bstood.cast orn the, Bounce. lars’ ca, . Tt genenailag ein Rak P peply Aaing OM Opcods, Vetus, Hy > Rerep Aevey senda RPRP de mG MetBage : We RRP Lene sends the RARP 500 ps @ duricast Lp the clerics d Aaaking, LB be ree Desies. Pp 1S anal: Percessea’ RRS pep Me deage = The ousice, cheer, Poorerses tthe se ply er) Cony ned tthe € Protoo) jess bupplied by the. RRP Aeswen TEC 44 possi be 4 AVE PAY Puts Panel aque, 4 Livro OF WPL We Ko, ‘gerecl ary | mebwos le. Re Bounce clevicr call Bppicaky fast 4 phy on dk Olddeosole the oth. 4 —— “Acme (ietemmet Corso} Messacye | athat- harcles lrtory eM 22 neeialy Die ot clata 414 seeaching Penely MIArnen A by, 1P PackiB | Bee. lonp 28 the. pacote co other orstiol wressage - slateare! ne. ‘uphetbes, OF ntencled clea tinction’ TAL ae emcapautate, isl (Types: AY len? woesdages dell 20 the dollowing ve Covert geposting Q. Query Econ seaportiog rpeshayes t 0 9 seocile On A hast roe enuouw ws 20 IP Packet Bs aan OTe. qutny roetsages, al GiB 6, cs Pee eee wou Ware 0% ey netwosk manager 4 ou ox anothenhost ie spit es Aaport problems Sten Loken 17 gait sega b “eheapiclated inte id ane Pathe’ se tea headen 23 P fede: Aye the toda Gadd ab bis! Te Prourda the informasion the rntstoge Ape 3. Checlaunn -Thig Ibhie sel 1 Laed to letect C1094 An the [CMP eneasages, nf dyaboarnd Th i pee Ingosm ectlon 49, the Hen i MeBha ge. woith oes Peja slates [9 thee. Li. Pecos ainict braginol/olataiyh caro fon be wed dr thiognostt e metching the. i Packet eo | 3-13 Exon nap. De Temp be not lei las at By. pepoxs then . lop heals dive, dps chor ol. Destin ection, Mn xecehables® 41° e (2. Aoust ce, quench’ So vie 0 os sh 4 ri es posal ‘ | 5. Peclise étiory , | | | ie Dasthoast Ap tieathable a _ PiiBe. 1eH® -allstina Hon Ue | MESSaye, 13 Sent by - ee Moulin 1m, | eaponse. ec. pocket” LOobich et £apnot fete Helle becduse tf, Aut on By Mnreuchable OF eh deny oa. Anavailab|e , Kc ioue\! i. oats ea a wit of the. suceivech IP clube A | ee {Pheadan plus divs © Eby 2 ae ee Be —f— é de. field 2 Te cole. fit 1% Wedl by the, li ffoant a fornocila Ts inckcole Apecitic exon fae. Fost olestinag On unseachable the. code. fuel Is; (os Net Ain Saachable © | = Host 4p xeachebla D= Prectoco) un seach er bly B= Rxt unsuachable Kea Froanoen tection neccled errcl DE 3ef- 6 = £owree. Xouke dette ch. A ounce Muench ee IeMP Sousrcs. quench ‘Messages tp post 3 stlon th the Oruginal Bousics. A) Source ch. ora. AB Ox nog Use on the. Source. Lo $6 puseent: sete E&Y Clete gains heart’ Sion (types |. code 0 | Checkkur | Unused CAll os) asit p{ ithe. seeceive ch IP cleter gen ie heactin Plus the disst Chytes ge clatacceunda ; Fa; Sounce. Qutrch orrat- Rcervedl IP catagrann incluching ig APR eet haste leds giamdeta, eccencled message dotmat . Bh tid an hans it 0 erably Aime. ekcoedonr . 4 Paseiroeti Problena:, \ Kana 3} BM , The panamdin problem muasage ect the Ocheet 4 the pease Alatdlgran, peaden pobere, the. otwm woo oletectedl _ Paxt oP the, Pecalved (Pclabeuqtann intluds the fast ‘Bbijtes ae. ae Foblera tig, cfotnat Cod Dg he Pe didel | \ ee 42.0 COhen the ao dived trcicatis the eso |5 Reductions, ah Gin 4 Fae aa flee [Paclolress’ Phdeal s0ccles) ing Pus the finst @heifer 4 ola gam Oo gh steicaa > +t: co Bp eo Coda cael : 3 | OS Redline ct Nolevtetgnden’ det the redioout ry, ae Reoltre ct Ldlestergprorn’ dow the. hose Oe diee ct Alakogpoms gor the ar a As a. tek ebook» * ee r Bz Roldect chectogranns der ta 4 or Bewileal Bsh need tl: aS } | Cole pst shy Quensy, : 3 : | fem ay roe she es typ: t Echo segues tunel Seaplyy Q Time stamp Sequast end reply 3 it 3. Adlolness = THASK Pequsst Conch Hal : JO). Rout Solicitation ond eelventiernerst 2b ) Pequost ond Arple, } Bi, : ge echo dequert ancl echo Ply MHEBSAG—s » be, Luseck to daberroine, Ly £heHta 43) dormrounicedes, the. IP Lvel. cho vequext ; : Echo ot | Type: @ ow fea © | Checksum! | identi ea Sequene nurnke, Opdonal cata 4 Send bythe request message: Pebbechd by therteny mq. » Fig Foseead 4 ig wequati¢! Ho plig Meade : fay | ns t are ree p Reg ea errel Reply used to tobowtate the, dtound trip 52 betwern Tecate cnych selestination roachine 13, Request| Sete es ty? Reply jor i " Checksuno ] Segue ncanumbey a tirnestarmp (32 bit) Recel ve tine Stamp C32 bit) | j » Prenaralt inept eee Mast st end sept dvess [las < paguait and “ey al Ta “The. delness reek kk Peaquast 3 geal hey ming, uobet Ib veeldrens Ta 8 a edurctk . Tee. ecloledas raat puaply sre a ee 2 ahost to dre, i» Hig: Rolin Lolicitatt on Message Br rnet | Rus 8, the Sep! that Corres ‘back frome the previous sogueat- Lifelme iad Shows the_ ee: Beene 3 that the entsues cove | consiclesced tp be vabriol . vue ate Routan odlven tise rent a ae — | ks: 8 ‘DHEP oil Vatslegustion “hee I He “Dynamic Hest, fon kausicton Protec! US ou DekLoosk reanagenreht as Ased t5 Yeh parnically LB3'gn van IP Loldlness Xo citi connected tp the nekwork a wo Mento [Benvén vas chitecturu. : ‘ lAlben new clewcees Dppeas ‘onthe nebe:! jtHoek Secuive mpigua Prcldrescés- The. PA Ad03'70 5 ors re assigned, by the. pekoos k _ deli sitters eranually 0” Bet Ge Houserses, tober. the ee et wor Is baz Tdulkpte irs (cen Gt ate. aoa = 5 the DuCP. prot nial ie 3s © on dusidential network, routes 4 DHcP that ue DHCP to wssign IPs ack Bend so rforroati on ‘ B\ =| Cormpomects ef DHCP Lewer : von, eledicated fora pules on sroute that neanciges os! oo Infor east on ‘ndtuding IP Ere. Pe ia ocke infaseoat on P puller gent A DHCP pclae vogent a3 abort oo Soths: that Aencls meguexti neh pep ie, a the. Local Pvc P Lbs arcl a sercete P AexVen - | fault gators eclolsiasa » A Ayfeatt yateroay alse ny OS the eway coldness, 13) the noela that aonatton betve2n jbeed nekworks o¥ the. astennet dsess » Aa. Pradlelxess poek Be ME L\% tha es vailable, fe alloc ebiory, 4 ubret 1: sraatk > Babnet noaske coe the. heegnersh “Praddoess [Po pddbierses asx busied £50 Freda ks bo dlifjountiock between notoors « pest bet Ths, D subnet nraak ato: dhost ae DHcP has Numerous ae 2 called options. Forme, an rea ie s Ancluel D> 4, | : Cuocilin ‘gg ay | ‘Dns: Aewen, option) * option 33 Cétabie noute option’) + opti on 5! (| Pacldowcs Aoase. open ) elaase. [ire The tease tre. lefinas the wu'ook, clusxing Which the client can Wide the |Praddiess that Cet assigned Xp ie 8.8.2 DUCP Handshalee ~ —— The vclient Sends cut a Diep inet moesseage. £0 Volant Ry DAE The. DHEP Seaver’ seaponds woith an avaliable [Pacetyess 4 Options DreP Braves s the IP Ne Seaver ecko initiation Sequeste ancl co roplelta 3. &- 3 static Vs es Dee jae pes. iti Dyan, Duce & clierst Meloam Mines oon thea |? aolcress ‘canine fae but’ jastead: Leases Lt! dor a “podod shee Hae Hiroe # plarnea. woith, o elycansic.” Prdlcliess 48 powered ALP 2 ite Wurst Conprrunica os fhe. DUCP Avwer to Leoue LARothar IP ME ANG BT eins cade 5 Ss a ae q.\ess "clavieoss hosel, vearpet _ chiert ' Knot aoe, paige rd Se ) ip wadlna3 03, ‘coer set eornece ‘fo, tes heteoortl. « the. othenhbandl, statis oluscea Auch ch b dervers Orch Zusitches crv, assigned anent€ |Poolclresser . +y DHEP uses arc, functions : — Used fe clislri bute | Pacielnesses 20'thi 0 etwosk . | ent IP Lorfiliet . Lipalates IP aeteless voutonmatically ppost IP aclolxess Reuse i the following jpuy, vevoldlseasses qtor> hirary a ty vclatted—decirral notation 0000001 CCOAD!) COCOLO!! wilolts J 160000] jO0COO!! Ood!lol! (UUUrit | ange. the. doltosing [Pvy roldxearea 479 Hed-—clecimnal notation Ao binany noteon | Of) 111-5 6-45-78 i 1 the clase &{ each rdlolress 2000000! COODIO!! OODO/O!| monty 00000! 10000011 Ooorioll Miity $ For example 11100000, the number of 1s gives us 2? subnets, In this example there are 8 subnets, 2. How many host per subnet ? Number of host per subnet = 2’ 2 Where y is the number of unmasked bits or the Os (zeros) For example 11100000, the number of Os gives us 2° — 2 hosts. In this example there are 30 hosts per subnet. Your need to subtract 2 for subnet address and the broadcast address. 3. What are the valid subnets? For valid subnet = 256 — Subnet mask = Block size. An example would be 256 — 224 = 32. The block size of a 224 mask is always 32. Start counting at zero in block of 32 until you reach the subnet mask value and these are your subnets. 0, 32, 64, 96, 128, 160, 192, 224. 4. What is the broadcast address for each subnet ? Our subnets are 0, 32, 64, 96, 128, 160, 192, 224, the broadcast address is always the number right before the next subnet. For example, the subnet 0 ha a broadcast address of 31 because next subnet is 32. The subnet 32 has a broadcast address of 63 because next subnet is 64. 3: ‘What are the valid hosts ? Valid hosts are the numbers between the subnets, omitting the all Os and all Is. For example, if 32 is the subnet number and 63 is the broadcast address, then 32 to 63 is the valid host range. It is always between the subnet address and the broadcast address. Example 3.3.2° What is the sub-network address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Solution: Using AND operation, we can find sub-network address, L. Convert the given destination address into binary format: 200.45.34.56 =>11001000 0010110100100010 00111000 2. Convert the given subnet mask address into binary format: 255.255.240.0 =>1 1111111 1111111111110000 00000000 3 Do the AND operation using destination address and subnet mask address, 200.45.34.56 =>11001000 0010110100100010 00111000 255,255.240.0 => 11111111 1111111111110000 00000000 11001000 0010110100100000 00000000. Subnet work address is 200.45.32.0 Example 3.3.2 For a network address 192.168.10.0 and subnet mask 255.255.255.224 then calculate: i) Number of subnet and number of host ii) Valid subnet Solution: Given network address 192.168.10.0 is class C address. Subnet mask address is 255.255.255.224. Here three bits is browse for subnet. i) Number of subnet and number of host 255.255.255.224 convert into binary =>11111111 1LLL1111 11111111 11100000 Number or subnet = 2" = 2? = 8 So there are 8 subnet. Number of host per subnet = 2% - 2 = 25.2 =30 ii) Valid subnets For valid subnet = 256 - Subnet mask = Block size. An example would be 256 - 224 = 32. The block size of a 224 mask is always 32. Start counting at zero in block of 32 until you reach the subnet mask value and these are your subnets. 0, 32, 64, 96,128,160,192, 224. Example 3.3,3Find the sub-network address for the fallowing; Sr. No. IP address Mask a) 140.11.36.22 255.255.255.0 b) 120.14.22.16 255.255.128.0 Solution a) IP address Mask 140.11.36.22 255.255.255.0 The values of mask (ie. 255.255.255.0) is boundary level. So WPaddress —140.11.36.22 Mask 255.255.255.0 * 140.1136.0 _ b) -‘[Paddress _140.11.36.22 Mask 255.255.128.0 Example 3.3.4Find the sub-network address for the fallowing: Sr. No. IP address | Mask a) 141.181,14.16 ‘ [255.255.2240 b) 200:34.22.156 255.255.255.240 [>is ee Solution rT a) a mi 141.181.14.16 IP address 255.255.224.0 Mask 141.181.0.0 Sub-network address b) 200.34.22.156 IP address 255.255.255.240 Mask 200.34.22.144 Sub-network address 2) 125.35.12.57 IP address 255.255.0.0 Mask “125.35.00 Sub-metwork address (Le. 128) So for byte-3 value use bite-wise AND operators. It is shown below. 120.14.22.16 TP address 255.255.128.0 Mask 125.14.0.0 ‘Sub-network address In the above example, the bite wise ANDing is done in between 22 and 128. It is as follows. ¥ 22 Binary representation 00010110 128 Binary representation 10000000 0 00000000 Thus the sub-network address for this is 120.14.0.0. Example 3.3.5 Finde the class of the following address. a) 1.22.200.10 b) 241.240,200.2 ¢) 227.368 d) 180.170.0.2 Solution: a) 1.22.200.10 Class A IP address b) 241.240.200.2 Class E IP address ¢) 227.3.6.8 Class D IP address 4) 180.170.0.2 Class B IP address Example 3.3.6Find the retid and Hositd for the following. a) 19.34.21.5 b) 190.13.70.10 ©) 246.3.4.10 4) 201.2.4.2 Solution a) netid => 19 Hostid => 13.70.10 b) netid => 190.13 Hostid => 70.10 c) No netid and No Hostid because 246.3.4.10 is the class E address. d) netid =>201.2.4 Hostid =>2 Example 3.3.7: Consider sending a 3500 - byte datagram that has arrived at a router Rithat needs to be sent over a link that has an MTU size of 1000 bytes to Ro. Then it has to traverse a link with an MTU of 600 bytes. Let the identification number of the original datagram be 465, How many fragments are delivered at the destination ? Show the Parameters associated with each of these fragments. Solution: The maximum size of data field in each fragment = 680 (because there are 20 bytes IP header), Thusthe number of required fragments) = [3500 - 20/680) - 5.11 ~ 6. Each fragment will have Identification number 465. Each fragment except the last one will be of size 700 bytes (including IP header). The last datagram will be of size 360 bytes (including IP header). The offsets of the4 fragments will be 0, 85, 70, 255. Each or the first 3 fragments will have flag=; the last fragment will have flag=0. Example 3.10 An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP needs to distribute these addresses to three groups of customers as follows: a) The first group has 64 customers; each needs 256 addresses. b) The second group has 128 customers; each needs 128 addresses. ¢) The third group has 128 customers; each needs 64 addresses. Design the sub blocks and find out how many addresses are still available after these allocations. Solution Figure 3.11 shows the situation. Customer 001: 190,100.128.006 =Pisstomer 128: 190:100.150:192/28 Fig 3.11 An example of address allocation and distribution by an ISP 1, Group 1 For this group, each customer needs 256 addresses. This means that 8 (log2256) bits are needed to define each host. The prefix length is then 32 - 8 =24. The addresses are Ist Customer: 190.100.0.0/24 100.0.255/24 fi 2nd Customer: 190.100.1.0/24190 190.100.1.255/24 64th Customer: 190.100.63.0/24 190. 100.63.255/24 Total =64 X 256 =16,384 2. Group2 For this group, each customer nceds 128 addresses, This means that 7 (10g2 128) bits are needed to define each host. The prefix length is then 32 - 7=25, The addresses are 3. Group3 For this group, each customer needs 64 addresses. This means that 6 (log? 64) bits are needed to each host. The prefix length is then 32 - 6 =26. The addresses are Ist Customer: 190.100.128.0/26 190.100.128.63/26 2nd Customer: 190.100.128.64/26 190.100.128.127/26 128th Customer: 190.100.159.192/26 190.100.159.255/26 Total =128 X 64 =8192 Number of granted addresses to the ISP: 65,536 Number of allocated addresses by the ISP: 40,960 Number of available addresses: 24,576 Example 3.3.8Consider sending a 2400-byte datagram into link that has an MTU of 700 bytes. Suppose the original datagram is stamped with the identification number 422. How many ffagments are generated? What are the values in the various fields in the IP datagram(s) generated related to fragmentation. Solution: The maximum size of data field in each fragment = 680 (because there are 20 bytes IP header). Thus the number of required fragments = (2400 - 20) /680 =4 Each fragment will have Identification number 422. Each fragment except that last one to be of size 700 bytes (including IP header. The last datagram will be of size 360 bytes (including IP header). The offsets of the 4 fragments will be 0, 85, 170, 255. Each of the first 3 fragments will have flag = 1; last fragment will have flag =0. Example 3.3.9 Suppose all the interfaces in each of three subnets are required to have the prefix 223.1.17/2A. Also suppose that subnet | is required to support at least 60 interfaces, Subnet 2 is to support at least 90 interfaces and subnet 3 is to support at least 22 interfaces. Provide three network addresses that satisfy these constraints, Solution: The network address cannot be used for an interface (Network prefix + all zeros). ° The broadcast address cannot be used for an interface (Network prefix + all ones) Subnet 2 (90 interfaces) 2°-2290 Notice that we subtract 2 from the total number of available IP addresses because 2 IP addresses are reserved for the network and broadcast addresses. 22 92°=7 ‘Number of bits allocated to host part =n = 7 Number of bits allocated to network part = Pre filength = 32 -n=32-7=25 The network address of the first subnet is always the address of the given address space. Network address of first subnet = 223.1.17.0/25 = 223.1.17/25 To obtain the broadcast address of a subnet, we keep to network part of the subnet’s network address as it is, and convert all bits in its host part to Is. Broadcast address of first subnet = 223.1.17.01111111 /25 = 223.1.1.7.127/25 Subnet 1 (60 interfaces) 2n -2260 Notice that we subtract 2 from the total number of available IP addresses because 2 IP addresses are reserved for the network and broadcast addresses. 2" >60n=6 Number of bits allocated to host part = n = 6 Number of bits allocated to network part = Prefix length = 32 - n = 32 - 6 = 26 The network address of any subnet (that is NOT the first subnet) is obtained by adding one to the broadcast address of its preceding subnet. Network address of second subnet = 223.1.17.128/26 Broadcast address of second subnet = 223.1.17.10111111/26 =223.1.17.191/26 Subnet 3 (12 interfaces) : 2-22 12 Notice that we subtract 2 from the total number of available IP addresses because 2 IP addresses are reserved for the network and broadcast addresses. 22 14n=4 ‘Number of bits allocated to host part =n=4 ‘Number of bits allocated fo network part = Prefix length = 32 -n= 32-4=28 Network address of third subnet = 223.1 -17.192/28 i Cb f, Be OM c) 212.208.63.23 - Class C d) 255.255.255.255 - Broadcast address. What is the purpose of the Address Resolution Protocol ?(May 11) ARP is a dynamic mapping method that finds a physical address for given a logical address, i.e. mapping IP address to physical address. 3 Define an internetwork. 2 Ans: Ans: A collection of interconnected networks is called an internetwork. 4 Define geographic routing.( May 10) Ans: To decrease the size of the Touting table even further, it necessary to extend hierarchical routing to include geographical routing. It divides the entire address Space into a few large blocks. 5 What is multicasting routing 7( May 18) Ans: Deliveryof information to a group of destinations simultaneously using themost efficient strategy to deliver the messages over each link of the network only once. 6 What are the different kinds of multicast routing ?(May 11) Ans: Different kinds of multicast routing are reverse broadcasting. 7 Define subnetting.( Dec 15) Ans: Subnetting is a technique that allows a network administrator to divide one physical network into smaller logical networks and thus, efficiency reasons. 8 What is multicast ? What is the motivation for developing multicast 2( May 11) Ans: Multicasting means delivering the same packet simultaneously to a group of clients. Motivation for developing multicast is that there are apy more than one destination hosts. 9 What is the use of CIDR value in IP addressing ? Ans: Class C address's concept becomes meaningless on these Toutes between domains; technique is call Classless Inter-domain Routing or CIDR. A key concept is to all multiple IP address in the way that allows summarization into a smaller number of routing table. 10 Expand and define MTU.( May 12) Ans: MTU :. Maximum Transmission Unit, MTU isa packet size that can be sent over a network connection. 11. Compare the Ethernet address with IP address Sr. No. | Ethernet Address Flat, ie. switches look all the bits always, Assigned by ethemet hardware vendor path multicasting and reverse path control the flow of traffic for security or plications that want to send a packet to the locate networking term defines the biggest IP Addresses Hierarchical, ite., backbone routers May just look higher order bits. Statically or dynamically assigned by (Ethenet addresses are supposed to be | ISP or IT managers. unique) No geographical nor organizational | Geographical or organizational association (Convenient for small Networks) For example: 8-0-20-b-de-3e 12. Define Routing? ( Dec 15) Ans: Routing is the process of selecting paths in a network through which network trafrfic is sent. 13. Find the class of each address a) 00000001 00001011 OOOO1011 11101111 b) 14.23.1208 Ans. a) The first bit is 0. This is a class A address. bd) The first byte is 14 (between 0 and 127). This is a class A address 14. What do you mean by unicast routing ? association. For example: 172.16.16.1 | Ams: Unicast routing is a process of forwarding unicasted traffic from a source to destination on an Internet. 1S. What are the salient features of IPv6 ?( Dec 12) Ans: Salient features are : a Efficient and hierarchical addressing and routing infrastructure b. _IPv6 networks provide auto-configuration capabilities. c Improved security features. d. Better support for QoS. e: Large address space. 5 Stateless and stateful address configuration. i. Define source routing( Dec 13) All the information about the network topology is required to switch a packet across the network is provided by the source host. For switching that uses neithervirtual circuits nor conventional datagrams is known as source routing. 17. What is the need of subnetting?(Dec 13) Ans: Subnetting divides one large networkinto several smaller ones. Subnetting adds an intermediate level of hierarchy in IP addressing. 7 Define BGP. (Dec 14,17) ‘Ans: Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed fouting and reachability information between autonomous systems on the Internet, What are the metrics used by routing protocols (May 15) 1, Traffic matrices 2. Distance matrices Bs Adjacency matrices 4, Service matrices ot Performance matrices Define VCI( Dec 16) / Ans: VCI is an acronym for virtual channel identifier. VCI is a 16-bit field in ATMcell header that identities the cell's next destination as it travels through ATM network. VCI is used in conjunction with Virtual Path Identifier (VPI). 21. What is fragmentation and reassembly (Dec 16) Ans: IP fragmentation involves breaking a datagram into a number of pieces that can be Teassembled later. Large datagram are fragmented (divided) i.e. one datagram becomes several datagram of small sizes. This process is called fragmentation. At final destination the datagrams are reassembled with the help of IP header bits. 22. Give the comparison of unicast, multicast and broadcast routing.(Dec 16) Ans: Sr.No. | Unicast Multicast Broadcast ie Unicast is. a type of| The information is sent | The information is sent communication where a| from ‘one or more | from one point to other piece of information is | points to set of other points. sent from one point to points. another. 2. Only one sender and one | One or more sender and | One’ sender and several receiver set of receiver Teceivers. ‘ How routers do differentiates the incoming unicast, multicast or broadcast IPpackets ?(May 17) Ans: The Ethernet network uses two hardware addresses which identify the source and destination of each frame sent by the Ethemet. The MAC destination address (all 1 s) is used to identify a broadcast packet (sent to all connected computers in a broadcastdomain) or a multicast packet (Isb of 1" byte=1) (received by a selected group of computers). Routers are operating at layer 3. Router use IP addresses to make forwarding decisions. Each Port on a router is a member of a different network. When a router receives traffic from one network, it uses the destination IP address to determine which port to forward. ( Differentiate between forwarding table and routing table. (Dec 17) A Routing means finding a suitable path for a packet from sender to destination and Forwarding is the process of sending the packet toward the destination based on | routing, information. What are the benefits of Gree Shortest Path First (OSPF) Protuee ? (May 18) : Benefits te Low traffic overhead 2: Support for complex address structures 3. Fast convergence. dees 4. Good security. OSPF supports interface-based plain text and MDS5 authentication, S., Area based topology. Large OSPF networks are organized as @ set of areas linked by a backbone, 26. What is the network address in a class A subnet with the IP address of one of the hosts as 25.34.12.56 and mask 255.255.0.0 ? (May 14) Ans: 25.34.1256 255.255.0.0 25.34.0.0 Network address is 25.34.0.0 27, Expand ICMP and write the function.( May 16) Ans: ICMP stands for internet control message control. Functions of ICMP 1) Error reporting 2) Rechability testing 3) Congestion control 4) Route change notification 5) Performance measuring 6) Subnet addressing 28. When is ICMP redirect message used ?( May 17) Ans: The ICMP Redirect message is used to notify a remote host to send data packets on an alternative route. A host SHOULD NOT send an ICMP Redirect message, Redirects SHOULD only be sent by gateways. The ICMP “redirect” message indicates that the gateway to which the host sent the datagram is no longer the best gateway to reach the net in question. The gateway willhave forwarded the datagram, but the host should revise its routing table to have a different immediate address for this net. 29. Why is IPv4 to IPV6 transition is required ? (May 17) Ans: As publicly available IPv4 addresses have been exhausted. IPv4, the current internet protocol version has crossed 30 years of time period. The expanding user base and increased number of IP-enabled devices created a need for an upgraded version. From mobile apps to non-traditional computing devices populating the Internet of Things, businesses rely on ITs ability to deliver new services to both end users and customers. But these services and the infrastructure used to support them require IP addresses and that means an IPv6 migration. \ 30. Highlight the characteristics of datagram networks. (Dec 17) Ans: Characteristics of datagram networks are as follows ; a. Host can send a packet anywhere at any time. b Each packet is forwarded independently. c. Link failure would not have any serious effect on communication if it is Possibleto find an alternate route around the failure and update the forwarding tableaccordingly. 31 Check whether the following IPV6 address notations are correct ? (Dec 18) a) + : OFS3:6382:AB00:67DB:BB27:7332. b) —-7803:42F2:::88EC-D4BA:B7SD:11CD Ans: a) — :: OF53:6382:AB00:67DB:BB27:7332 : Correct b) —_7803:42F2:::88EC-D4BA:B75D:11CD : Incorrect because of two many (:) Prepared by Verified by Approved by

You might also like