0 ratings0% found this document useful (0 votes) 99 views51 pagesCs3591-Unit 3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
i
oye = 2
Unit IN Metwors k Layers ‘ j
Susitehing:“Reket: sivit chin Internet Pastore].
jtPvi, “1? Barns cy roar "Ph , PRP, RERP
CHP DHCP! , ‘
eet
3:1 Netsosk Layer:
‘al Netosos k Loyen 48 the sthisid Layen 9 the,
ost mode] T+ handles the service sequests dion
: Pronspost Rayer ond guxther goswousids the
Vier staguest to the. clato Blok Anges . te
worl, Layer Aorans tates the. Aogical tld r0%202
Pryzical chels1ed3es - x
Tr clatenreres the stout dior the Scouse
Be dsbration -crck also “nounaiyes the totic
Pais kuch ad awitthing: novtnayand contol,
anguesti on oy plate. packeb .
a E The. rman stole gpthe petwos lk, Aesye s
pote the packet fiom Serchiney host Ap tra
Bost 2
1 Network Layer Aenvices
© | Maun’ teats 4 “Bhe. nedwooe k Payer, 1g
e packets dorm the. Bounce. host! te rhe,
on host. Metwoxk Jayer Bewvices
‘Oouentedch “Semwices « f
oe
Sa WG Benvice ,
thes, 28.0. Swlotionshi P between al! Peokets
belongings tb De MPEMAGE « Before “all Alogi,
tuo] Connecti,
AA vo restage, £9) be, sent, a VI
Should be. etup cto whine the “path Nor the
DOLAGHams . Pee ya larat Bekup, the
Mataghams con all dollous #he. Borne path,
: am this type, not oral We the peickat
Leortoin the. Source: vrsch. chiatinatcon a es,
He roust ee wonteln ee Aabel.
wee packets
= Vistuol Cixi
5 a packet. ub ‘aut | a
the Lavel 15 thes. Packet Tp this thse, the
Seok: cucsion 4a based on the Value
a es
tO Sic
| SN
“iu Le SEE e eb Qsiented
sent, ©. Oe Re 7. daseck |
“s Seba 20h ah othe : :
+» clotos: transden | "
: Teardocon phase
Tn SUP pi nase, ‘the. EchHOR WEY xe, .
Locldnesses Tay ina bodice us|
Wm Teak dable Cntyies dow the |
Senvia: ee apmgckion osuiendd@
shosidlouss phase, the. “ounce: anck clastinatis,,
re the, sous Tip dalite, the, L034 poral’
Arranges Cece ie ise sited
om I Tirsterrset, ake! (OP) 4 On
[Bet Bet! Y suules, jor, poating ook
' late, So thet they on
i ea veve ch Oeedue, wet Shs
Braversin the. internet 4
vsti. Broalln fueces Kall A pee kek
on “GB veittoched tpeadhy paciet
949 OF ON helps” routers Ab Send
sught Place.
Berman, protocol ,. ielget prstecol
Vesssion 4 (Pv) 43 eee ble. fox petck etizing |
OF oe veunel, clebivea of me Packet ur the
ea tga if
RAS.,
eee
TF yakiRcadtion —WP AP Packet ue ps
fi ie a, the Brenan Pogmented
use isston Ol the.
porkain Barre siaicie Os ati oe
dent 4 osuigina| iP pac leat thes belay to
y Hiags 2 AS puguine o. by the netuset Ie
|gsource’, +f IP Packet +8 too Lange te hendle,
ppne geo Hells if they won be. Grogan ad
loot not -
p Foagroert offset -
y the Fragment ip the dug nal IP Pac
¥ Time to hive -
4 1a Bent Loith Some
This offset tells the. eocack pester
ket
> wavoid ‘looping sin the yetuaw k
2
even packs TT Value set,
crepe)
bh tells the networls bow man stoudens, This
yon «cxwss . At each hop, dts Value ds vole csermérted
by one. vorod UOhe > the Value seaches ZO, the
packet 438 cuiscerrclec :
|
Wo Prtocol _ Tells the netwos Is Layer vat the
dlastination post, 22 wobich protocol this packet beloras
dp, je the mock devel protocol | Protocol nurcbes
4 Tep 13 6 and upP eT
| 7 Heacles checksum This fetd 48 used to keep
thecksum Value 2 eptioe heackes porich 43 then
aned to checl< id the. pacleet a noceived ean gee -
Iv Bounen Addness - 32 cpetciness 3 treserden & the
| Poctcet ,
\v Destination A
ot the packet:
v Options - This +8 plier field, wobich is ndod
| the Value Sf IHL As ppodilen thon 5.
ahic
pee jot
dilsess 32 pit wrciclous’ 94 the. seceive,ast Adelsessira, Mode :
; in —“
Thie rooele. 18 0 nice F| the pxevtous tice
\e the packet sent 4B neither listined to 0
host 0% all the bast on the 4egroent. In this
ch et, The olesti ration adders contains A Apecta|
delses. sobich Atasl Lith AQl-x.x.X and can be
Biertaided by rome an one host
* ao pot
Bs Senves B
ah Sug
Chiené
—Seaven ©
DB Seven Sends packats 40bich ove entertarnedl
rae than one sever . Every retools has
LIP cdclocess AeZervect dor the netroowk number
yusents the etuocrk ond one. [IP addoy
on the bevoadcast cioldaess, obich sepsesend,
boil Lr thet metworle |
\Pvy sea AiwiAUchiial McldKessing Scheme An
_usbich 43 82 bit in Length 43 voldvicled iit,i be MS
Wiha of bi 48 da.ternsined by 2. said ec
(posi Lior Dy that 44 the Value Bt a bt
sition 6 42 QT(6-1) that 42 6 that js 32
tal Value 2 the octet 1h detenoined buy
“up the. pesi tonal value ot biG. The velue. o
Joop AB RATS = 122), Some. examples rave shag,
= y -Adduess Classes :
ae eT
Taternet psotocol tak g contain §
1a} classes S| Jp col clsusses to be waxed Agidenty
gous, Aituctions F8 Pes the Paguisarnent S|
spetwoork . Broodly » the IPvi, ald ser3" ny
jiviced ‘inte dive Kia g8 08 4 IP cack vcesiog
ee by athe. divest
at oatet sufrred Pow a the lyfe mcs
cae Paes oe foot “depict dotteel
ub cet
A LB
Pool ooo
62vy 3
TelossB Adtaness
Ap IP aclolsess tobich loelorgs te class B hag the
fe teoo bits ‘wn the fisst octet Set 4 Id ie
{0000000 — tolilti |
ize -— (91
vClass B IP Acldswy2 ex range fom 28-0.x. 7
191-255-x-x The elgoutt subnet roasts gov class R 28
i}
255-255- XX.
lass B has 16384 (at) Netwos I¢ aol clseesseg
and b853y (24-2) Host acldsesseg
Klass, B IP acldlsess fosmat +48
ID IVI. NIV. HHH BB
> class ¢ Addness »
The. frat octet 2 lass co 1 Picelelre ss haz,
ab gout 2 bit set to Ile that 4:
tloococoe —lollil|
192 - 223
Class ¢ |Padduesses, mange diom 142-0-0-x
to 283-256-255 -% - The. selefeustt Aubnet nog Ic
fon class G 3 QEB. 26EH-255°X
Class c, Kqived LOU! 52 (2?") Netw0% le
waddbiesses wane 254 (28-25 Hest aclsusseg .
Class CIP cidebrwess qorreat Le!
VONNANV © VIVNIVNN IN 1 - NNVWNWN iv HH OHH 4doN
a .
feless 9 D Addnes ‘
vey ofisat fous bi ot the, dist octet
Ltr class Dd \P cleus es OH, Bb ABO, ivi...
O ee Site
‘locooo —\1 01114
oa ee 284
Class D pas IPadalewss sarge dior,
Qar4-0:b.0 to 234 -QS5-ASS- ISS: Llass >
LAR puservedl farm rout cast og. Dip routticast:,
lect 1a not élestined dos LN parti caclon, a J
thet 48 uoby there, 18 mone ete ect act
host cddvess dors the (Paddestancd wes:
D cloes Not have. oa Agree roasle .
1 VA WIV 9
> Class E Addness ;
xs 1p closs 42 fasenve d ps OG peuvent)
Purposes only dos Btucly: iP cdl ster Bo th,
[elass Hanges dos 40.0-0: 6 te age. asc. aca 2
Lite. Clags Dp, this toss tio 1k “not? EGA ppe df
oi th any Aubnet rast. « ost
Cl,
ZB: Subnettio qi
: Each \Pudlass ag equipped Loltts Geir,
Jeult dubnet reask which ‘boun cli that! p
Less to have poagioced Bursber sf nebwor lo,
urek prfinceal murnben 4 host Per netic le.
Chas sul IP erclelnes.sy ic lees not proviele
Ons, (cue having, hess nuraber % Hosts
/ Per Netto k 08 Mon netoosls per IP Chess .Bubed- b, Bing Subnetling » one. Shed
1P pelelxe ss cor be ued th have, Smalley
osks t0hich provicle. béllz netroosk manage -
capabi bties
When an en nebwork 13 clivicled ist.
i
networks, to neaintaln Aecusu' ty, then that
TO dlivcole. wa netsh. £506 Avo pacts %
Binesd to choose one bit gov each Aubnet dom
wos ID port: NIDENTS12-D
Riise a2 102080 O
Range =
ke ba oon
C. de TU
zi a:
we alee eee | these, OK tive Subnet s .
2 le dao Pluss CIP Bddness, thew ose Aubits io
pee Ix. tok poset anck @bit inthe, host id pert”
aoe don. vo netvoos K phoutd, be clon
thot At eloer not edde f the nettoos k198: § 200000000 tO (13-712 ON ITT Gcpe ct
eps the fisst bit ohich 48 Chosen Zr0 Sow
Subvet lol past. This the sarge & Bubnet | +,
193-1-2-0 to 193-1-2°127
oa Subnet th gf Aubnet | 1B 3193-12-06
Dowct Broudeast (ol 282199127127
Total nunber sf host 2126 Cout g rg
2 1d’s ose. Led fos se rol f Dviect bvockay
ha) Subnet mask + 255, 255-288.)2g
atos Aubnet 2: The fiat brt chesen dso the
host Idk Pat ig one. and |the. Hange coll! he
dtom 193-1-2- 10000000 | to 1973+ 1 D-II Beg
ane Prong. a Subnet 2;
[Uae heo 12S tol (9 gah 2S
Subnet 1d: 193-1-2-128
‘Divect bacecd east 1D 1198-1. 2:255
Total uroben pi bost, +.)26
it Subnet roagk 2265 1255-+255-199
Fioally Ay ey the Subnetling the
total Dumber 3 usable. peo preclute of
Dscom 264 to 252- :
To iviole fa network inte dou A)
pant Aye. neeck Ao choose two bits fom the
host (cl Pe ee each subnet yen ky oe 10, iNM GQ network unty ught (24) pasty Yeu
B Se. oes. bile dom the. host il pamt—
2 Aubret 1€ 000, coi, O10, Ol,
J00, Il, 110,
sara
Ty the Aotal Nunshex, a Subnet in x ne a
t 4 keooy
ages the Hota, numbes, Lusalle hosts clon Cbg
x pe ; ;
RK Mt
Harople By
Consicls, we have ice big Biogle netwos !¢
having 1P address 200-120 we toant to oo Aubnetting
anol livia this netwos k inte dubne’ .
coro the given etoile belongs do less ¢.
aa be PO |
ae A ee
_—_
t ebit Host (D
us Bevo biti form the Host (1D past
“host pant sera8
oe eee tee then it sop
i jSt gu
oe ee” bite = olythen tt :
Qrd Subr
4 0 JR bosstoweck bit = 10, then. 46
ro 3
ot sited ets a! | then it
| Poclelseas 5) A four dubnet HD : -
ey Coen Q2.00000000 = 2o0-!-2-
+ 200-}+ 2-0l000000 = 2c He a
+ 200-1-2- lOO00000 = LO0-1+.2-)2
+ Q00-1+2- I 0ce00 = aoo- I:
200. 1:20 ba
Ba hon 2o0- Valo g
ie
200. 1-2..6 4
| we yoo at 214g
—>fon oes a '
hie “Radbiess = 260 -1°2+6
we Total IPecletsess = 2° by
Ocal nunsber of hes A by 2 = 262)
° Rage. S| IP addsess = 200-1-2- 000000
QO00-|- 2- COV
| Be C ee Bc, eae OA ame el
wee tech bacooel cast cclolaess’i
ack Subnet
- [Powilre ssa Q00- 1-2-6 Y
Total \Poddness = ab= by
1 tal no: nes G1) 42". 62
oo: 1*2- 01006000 te 200-1. 2-0) 1/111)
0
y
ange =:
te; Boo, 122-64. te, B00. Ile 7
as Durect brwedcart actexess = 200-1 a 127
Linoit dh lbxoackcast adders = 2R6-256-255, 255
asl Subnet
(a WPeclelress - S doo. 12-128
“Total |Pauclelness eho LG,
Tota! mo: e} host = 64-2=62
+ Range = 200. 1-2- TONER: ta donk: f2stounint)
je Soo. 1-2-128 te Qoo-1-2-14]
« inuct broadcast adclsess = Q00-|-2- 19y
Minit ed booadeast adden =ass- 255.255 265
fox lth Subnet
eo 1Padtlress = oo. lk 2192
+ Total 1Pacdlness = gbe by
8 Tota) no: of host = 6y-2=62
Range = 200-1'2- 1009000, oo. I-2-11NNNN1
ie. 200. 1-2-192 © fo0.1.2:2 55
‘ Bton cheast cia =R00-18:255
> ted, mae Oolobness =. —\q be 2 n
es - Bome, odvantagus ¥ Pug over (ite
entionedt belowo”
‘Heoclen Sornaat: }vp tras 0. 1ees heackes
1p cobich Options ae Bepanated Lions the.
| beccless arel wnsexted beween aa base, io
Linch sappen Lawyer clata
|3° agen [Pvg 43 oe ge clea
| wei “new rotation: ee bees Ape,
Jesating 6 byte dlelsessea . Th
eet: 9 fou hecactecnoa |
ae Bike tig2}
ket 48 Corposed Ho vmandatosy
} Jodlowe by the. payloact .
“The. payloack cons ist £{ two paw optiona |
5 headers nc clata dione von upper layer
age heaces Occupier Yo bytes, whewag
nsion headers tnd, clata fom the. uppey,
h contain 2p Lo 65, 635 bytes 2} Infos mation
‘ye hobytet upto 65 535 bjles
“ayioad
cue on ata, Pkt
caclesis CopHora|)| Fao upper!
Boose beads»
Fam [Paes] Aosicbel_|
[Payload aL Nite] Hop ueoit
Soursee akobnes§
| Bestinsation acdness |
Extension haaclets |
ion, This Ubitahelch elafines the. Vuaion Durobes,
the \P
tha Let peuosurty fie wlefines the.
pouiosu ty 4 the. packet ‘
Biel Othe Bie Lebel us 2. S byte (aubt) fit
dsec fox Lonniol the tow & lata
(Be. rbyte. Pasloack dangth diecld
path 2 the IP clato gran Se huscking
Ana2 oe
| Qo
{Pig Ho ot
Bot us used when Some. af the Aystenns
@ the IPVy anck the. Sender wart tp Ade \PUy
te. oreceives: cloes pot urclissurtanal MPVS -
+ The. eades; ep anobct B&hould be- totally
anged though header tsans lection - “Ta Recule,
PRU os ested Loan IRV, heads,
IPvi, Host
Headey, Trans lat on
Translation procedure
the |PVb meapped cicleloess te 15 [PUL
ss Actracting the. sught roost Sabi
wacond the Value of IVE Pouoseity field
the Aas pe. x Beswice. field Ja \PVy +o be Zero
lat; the. checksum fos |PVy ancl inBesrt in
a
1, the. pve flow abe. |
exit the. Conmpati ble. eter 810 heaclaxs to
ns cand insert thorn din the (PV hecctes
ate the length 4 IPVuy hecroten cnet inses x
2. consuesponching qielol
uonnpu the. total Jength ef the, [PU
ie poning ted
JQo
» Static mapping Teans wating 0 tabb
proctates 10s teal gdclows, raith 2 physicn|
Bi Tbis table 2 ttox0d Lo each oachine on
pole. Each machine thet knows Pees eeorrph
Adsiess SS ROE eS reathine, but not tt
geld esses can fools jt up in the table
This bag dome Lirsitations hetause physical
a4 fran Ge, so the. Bui
THeDAIgE. dorroat asc: :
Hasclusase Type : Specifies the. type of bax:
used dos the Local nekuoosile Loran sraltt
the ARP message. Ethemnet ua the. Corareon.
“Ty Pe panck the Value. ethemet 43 |. 1
& this dielcl in Deytes.
Protocol £ype: Each proto col ti assigned
Mumnkes czech 2 this, gilda. 1Pvy 8 2ol Slo
Hosiooxa Addne ss Langth . fs Maegth im bytes
Wr pasdevore. cme c> oclolnbay © ee M
acolnessesuire 6 bytes Lerags.. sb
Pocotocol Aolelneds Length’: lange ie legtes
1 [Boaies | ooldlie ss Se dees uo Adds
Lace 1 byt Long : j BSA
Operation: Specifies the See at the ARP
PRP nequist and 2. ARG
.od
9 prctocol oodlolowess Oe pastor! pololowsg,
aclebress) Of the clues. Sending the resicge
Co
Harcocse, Adolress- aah Mec adders
2. Interde h ee ee? ‘abcd sa Keyrorock
guests | ‘i 7 ie
Prato Ackdlness . The. prsete col acleloees,
Pv4 addr ess,) 2 the. iotenclecl sucet ves
4 copulation
An ARP Packet Ag eneapsuteted lout (4
At Oo slate, Mink dare. For ecarnple, £0 439 we
Ip PRP packet Lt encapsutabed io wan, ekbennet—
Benes Tre. type: qield treeicate? that the ato
assed by the \Prarne 12 OO BRP Packet
ARP request /xep
rigpe 0x0806
4
Bere ev Sever steps Unvalved > Coy BRD
|Paddness s| the, target .
ks ARP dp each ss PRP paguast Cog ,
fo the. dene physical vrolelbuss, the.
wel the. target WPuciclole es That |
1p oolelrass, 2° ]
i gickel s Glee 01% OSD,
Bencler ows the.
physical crolchess
enh.at
* The Sender as cbost and wast 40 Sencl or
e pata es host on another netwosk. Th
se. the host Looks vat th noutegy tulle -arcl
e. IP rclalies § 2 The next hoP Lrouten) toy
C 4ination. 4 jt doe, not pave. a HOUEIN,
pit Avoks dos the IR ocldlsess gf the. eacure
The IP aclclress 9 the sorilen be corres (Opes
ical ocldsess that rest be. reapped 0 oo physica |
A ess A
+ Pe Render 19.0. Souter thet ras seceived
\ aqriorm clesti neck don oO. bast 0? ancthes natant,
Checks its 2cuting table nck dinds the tPaddoy
Bpext nouter Te IPaddsess 2{ the nect moutey
ecornes, the. Logical addins tat toust sea nor Pack:
Kp o physical Areas .
Cosel ; Te. Dendes 18:0. dodben that hes sce ved
vor dabegaaro dustined er akost ie Same. netrwwootk
Tre. cloatineetion \Paddress a the clatograrn
Seco nnes, the. Logical wcllnexs thet rouse heme pred
DO prysical wadldae ss. |
RRP (Reverse Acldlness Resolution ‘tocol )
es Ti 43, a protorel by woblch sr physica |
rne in & Local Ua nektoosk can segues
wi ity [Pods ess qrom vo, Cale wom Beaver
RRaokutiva Buste col tere) table. o¥ cache.
A retwosic ocliaiietiatemceats: Q
Recal esa netwosks Aoteony doce Hag
fa rath (rnerteliss 15 Coney
c #
a|
Phardurse waoldresy . “Ty leave, beth bre,
protocol cvcleliess orcl Lhe, largest prot co
Pus blarsic, Ante. Ht clown’ Know itthen
¢ device.
—
FTE Aounce bawadecuts. the. ARP (ure
fae On the local netiuos le
Local Devices Process PPR P neguost roca ge,
The Message. AS Se ceived by each cuca of
Local networ le ancl processed Devices thet
rot Aondiguse d to ect? 2 RORP Sevens
m the merge
bswecleart Roep Proyusst rbaig *
Ree P Aves, Aprorates RRP suply Musage
Aral Cleisits. on the. netwuvk, that 48 setups
do oct Yan RorP Seaver Pusporcs th tho
bstood.cast orn the, Bounce. lars’ ca, . Tt genenailag
ein Rak P peply Aaing OM Opcods, Vetus, Hy
> Rerep Aevey senda RPRP de
mG MetBage :
We RRP Lene sends the RARP 500
ps
@ duricast Lp the clerics d
Aaaking, LB be
ree Desies. Pp
1S anal: Percessea’ RRS
pep Me deage =
The ousice, cheer,
Poorerses tthe se ply
er) Cony ned tthe
€ Protoo)
jess bupplied by the. RRP Aeswen TEC 44 possi be
4 AVE PAY Puts Panel
aque, 4 Livro OF WPL We Ko, ‘gerecl ary
| mebwos le. Re Bounce clevicr call Bppicaky
fast 4 phy on dk Olddeosole the oth. 4
——“Acme (ietemmet Corso} Messacye
| athat- harcles lrtory
eM 22 neeialy Die
ot clata 414 seeaching
Penely MIArnen
A by, 1P PackiB |
Bee. lonp 28 the. pacote co
other orstiol wressage -
slateare! ne. ‘uphetbes, OF
ntencled clea tinction’ TAL
ae emcapautate,
isl (Types:
AY len? woesdages dell 20 the dollowing
ve Covert geposting
Q. Query
Econ seaportiog rpeshayes
t 0 9 seocile On A hast roe enuouw
ws 20 IP Packet Bs aan
OTe. qutny roetsages, al GiB 6,
cs Pee eee
wou Ware 0% ey netwosk manager 4
ou ox anothenhost ie spit es
Aaport problems
Sten Loken 17
gait sega b “eheapiclated inte
id ane Pathe’ se tea headen23
P fede: Aye the toda Gadd ab bis! Te
Prourda the informasion the rntstoge Ape
3. Checlaunn -Thig Ibhie sel 1 Laed to letect
C1094 An the [CMP eneasages, nf dyaboarnd
Th i
pee
Ingosm ectlon 49, the Hen i
MeBha ge. woith oes Peja slates [9 thee.
Li. Pecos ainict braginol/olataiyh caro
fon be wed dr thiognostt e
metching the. i
Packet eo |
3-13 Exon nap. De
Temp be not lei las at By.
pepoxs then . lop heals dive, dps chor
ol. Destin ection, Mn xecehables® 41° e
(2. Aoust ce, quench’ So vie 0 os sh
4 ri es posal ‘ |
5. Peclise étiory , | |
|
ie Dasthoast Ap tieathable a
_ PiiBe. 1eH® -allstina Hon Ue |
MESSaye, 13 Sent by - ee Moulin 1m, | eaponse. ec.
pocket” LOobich et £apnot fete Helle becduse tf,
Aut on By Mnreuchable OF eh deny
oa.
Anavailab|e , Kc ioue\! i. oats ea a
wit of the. suceivech IP clube A |
ee {Pheadan plus divs © Eby
2 ae eeBe
—f—
é de. field 2 Te cole. fit 1% Wedl by the, li ffoant
a fornocila Ts inckcole Apecitic exon
fae.
Fost olestinag
On unseachable the. code. fuel Is;
(os Net Ain Saachable
© | = Host 4p xeachebla
D= Prectoco) un seach er bly
B= Rxt unsuachable
Kea Froanoen tection neccled errcl DE 3ef-
6 = £owree. Xouke dette ch.
A
ounce Muench
ee
IeMP Sousrcs. quench ‘Messages tp post
3 stlon th the Oruginal Bousics. A) Source
ch. ora. AB Ox nog Use on the. Source. Lo
$6 puseent: sete E&Y Clete gains heart’ Sion
(types |. code 0 |
Checkkur
| Unused CAll os)
asit p{ ithe. seeceive ch IP cleter gen ie
heactin Plus the disst Chytes ge clatacceunda
; Fa; Sounce. Qutrch orrat-
Rcervedl IP catagrann incluching
ig APR eet haste leds giamdeta,
eccencled message dotmat
. Bh tid an hans it
0 erably Aime. ekcoedonr .4 Paseiroeti Problena:, \ Kana 3} BM
, The panamdin problem muasage
ect the Ocheet 4 the pease Alatdlgran,
peaden pobere, the. otwm woo oletectedl _
Paxt oP the, Pecalved (Pclabeuqtann intluds
the fast ‘Bbijtes
ae. ae Foblera tig, cfotnat
Cod Dg he Pe didel | \
ee
42.0 COhen the
ao dived trcicatis the eso
|5 Reductions, ah Gin 4
Fae aa flee
[Paclolress’ Phdeal s0ccles)
ing Pus the finst @heifer 4 ola gam Oo
gh steicaa > +t: co Bp eo
Coda cael : 3
| OS Redline ct Nolevtetgnden’ det the redioout
ry, ae Reoltre ct Ldlestergprorn’ dow the. hose
Oe diee ct Alakogpoms gor the ar a
As a. tek ebook» * ee r
Bz Roldect chectogranns der ta 4
or Bewileal Bsh need tl: aS
}
| Cole pst
shy Quensy, : 3 :
| fem ay roe she es typ:
t Echo segues tunel Seaplyy
Q Time stamp Sequast end reply 3 it
3. Adlolness = THASK Pequsst Conch Hal :
JO). Rout Solicitation ond eelventiernerst2b
) Pequost ond Arple, } Bi, :
ge echo dequert ancl echo Ply MHEBSAG—s
» be, Luseck to daberroine, Ly £heHta 43) dormrounicedes,
the. IP Lvel. cho vequext
; : Echo ot
| Type: @ ow fea © | Checksum! |
identi ea Sequene nurnke,
Opdonal cata 4
Send bythe request message: Pebbechd by therteny mq.
» Fig Foseead 4 ig wequati¢! Ho plig Meade
: fay
| ns t are
ree p Reg ea errel Reply
used to tobowtate the, dtound trip
52 betwern Tecate cnych selestination roachine
13, Request| Sete es
ty? Reply jor i "
Checksuno
] Segue ncanumbey
a tirnestarmp (32 bit)
Recel ve tine Stamp C32 bit) |
j
» Prenaralt inept eee
Mast st end sept
dvess [las < paguait and “ey al
Ta
“The. delness reek kk Peaquast 3 geal hey
ming, uobet Ib veeldrens Ta 8
a edurctk . Tee. ecloledas raat puaply sre
a ee 2 ahost to dre, i»Hig: Rolin Lolicitatt on Message Br rnet
| Rus 8, the Sep! that Corres ‘back frome the
previous sogueat- Lifelme iad Shows the_
ee: Beene 3 that the entsues cove
| consiclesced tp be vabriol . vue
ate Routan odlven tise rent a ae —
|
ks: 8 ‘DHEP oil Vatslegustion “hee I
He “Dynamic Hest, fon kausicton Protec!
US ou DekLoosk reanagenreht as Ased t5
Yeh parnically LB3'gn van IP Loldlness Xo citi
connected tp the nekwork a wo Mento
[Benvén vas chitecturu.
: ‘ lAlben new clewcees Dppeas ‘onthe nebe:!
jtHoek Secuive mpigua Prcldrescés- The. PA Ad03'70 5
ors re assigned, by the. pekoos k _ deli sitters
eranually 0” Bet Ge Houserses, tober. the
ee et wor Is baz Tdulkpte irs
(cen Gt ate. aoa =
5 the DuCP. prot nial ie3s
© on dusidential network, routes 4 DHcP
that ue DHCP to wssign IPs ack Bend
so rforroati on ‘
B\
=| Cormpomects ef DHCP Lewer :
von, eledicated fora pules on sroute that neanciges
os! oo Infor east on ‘ndtuding IP
Ere. Pe ia ocke infaseoat on
P puller gent A DHCP pclae vogent a3 abort
oo Soths: that Aencls meguexti neh pep ie,
a the. Local Pvc P Lbs arcl a sercete
P AexVen - |
fault gators eclolsiasa » A Ayfeatt yateroay alse
ny OS the eway coldness, 13) the noela that
aonatton betve2n jbeed nekworks o¥
the. astennet
dsess » Aa. Pradlelxess poek Be ME
L\% tha es vailable, fe alloc ebiory,
4 ubret 1: sraatk > Babnet noaske coe the. heegnersh
“Praddoess [Po pddbierses asx busied £50
Freda ks bo dlifjountiock between notoors «
pest bet Ths, D subnet nraak ato: dhost
ae DHcP has Numerous ae
2 called options. Forme, an rea ie
s Ancluel D> 4, | :
Cuocilin ‘gg ay |
‘Dns: Aewen, option)* option 33 Cétabie noute option’)
+ opti on 5! (| Pacldowcs Aoase. open )
elaase. [ire The tease tre. lefinas the
wu'ook, clusxing Which the client can Wide
the |Praddiess that Cet assigned Xp ie
8.8.2 DUCP Handshalee ~
——
The vclient Sends cut a Diep
inet moesseage. £0 Volant Ry DAE
The. DHEP Seaver’ seaponds woith an
avaliable [Pacetyess 4 Options
DreP
Braves
s the IP
Ne Seaver ecko
initiation
Sequeste ancl co roplelta
3. &- 3 static Vs es Dee jae
pes. iti Dyan, Duce & clierst Meloam
Mines oon thea |? aolcress ‘canine fae
but’ jastead: Leases Lt! dor a “podod shee
Hae Hiroe # plarnea. woith, o elycansic.”
Prdlcliess 48 powered ALP 2 ite Wurst Conprrunica
os fhe. DUCP Avwer to Leoue LARothar IP
ME ANG BT eins cade 5
Ss
a ae q.\ess "clavieoss hosel, vearpet _ chiert
' Knot aoe, paige rd Se ) ip wadlna3 03,
‘coer set eornece ‘fo, tes heteoortl. «the. othenhbandl, statis oluscea Auch ch
b dervers Orch Zusitches crv, assigned
anent€ |Poolclresser .
+y DHEP uses arc, functions :
—
Used fe clislri bute | Pacielnesses 20'thi 0
etwosk . |
ent IP Lorfiliet .
Lipalates IP aeteless voutonmatically
ppost IP aclolxess Reuse
i
the following jpuy, vevoldlseasses qtor> hirary
a ty vclatted—decirral notation
0000001 CCOAD!) COCOLO!! wilolts
J 160000] jO0COO!! Ood!lol! (UUUrit |
ange. the. doltosing [Pvy roldxearea 479
Hed-—clecimnal notation Ao binany noteon |
Of) 111-5 6-45-78 i
1
the clase &{ each rdlolress
2000000! COODIO!! OODO/O!| monty
00000! 10000011 Ooorioll Miity
$For example 11100000, the number of 1s gives us 2? subnets, In this example there are 8
subnets,
2. How many host per subnet ?
Number of host per subnet = 2’ 2
Where y is the number of unmasked bits or the Os (zeros)
For example 11100000, the number of Os gives us 2° — 2 hosts. In this example there are
30 hosts per subnet. Your need to subtract 2 for subnet address and the broadcast address.
3. What are the valid subnets?
For valid subnet = 256 — Subnet mask = Block size. An example would be 256 — 224 =
32. The block size of a 224 mask is always 32.
Start counting at zero in block of 32 until you reach the subnet mask value and these are
your subnets. 0, 32, 64, 96, 128, 160, 192, 224.
4. What is the broadcast address for each subnet ?
Our subnets are 0, 32, 64, 96, 128, 160, 192, 224, the broadcast address is always the
number right before the next subnet. For example, the subnet 0 ha a broadcast address of 31
because next subnet is 32. The subnet 32 has a broadcast address of 63 because next subnet is 64.
3: ‘What are the valid hosts ?
Valid hosts are the numbers between the subnets, omitting the all Os and all Is. For
example, if 32 is the subnet number and 63 is the broadcast address, then 32 to 63 is the valid
host range. It is always between the subnet address and the broadcast address.
Example 3.3.2° What is the sub-network address if the destination address is 200.45.34.56 and
the subnet mask is 255.255.240.0?
Solution: Using AND operation, we can find sub-network address,
L. Convert the given destination address into binary format:
200.45.34.56 =>11001000 0010110100100010 00111000
2. Convert the given subnet mask address into binary format:
255.255.240.0 =>1 1111111 1111111111110000 00000000
3 Do the AND operation using destination address and subnet mask address,
200.45.34.56 =>11001000 0010110100100010 00111000
255,255.240.0 => 11111111 1111111111110000 00000000
11001000 0010110100100000 00000000.
Subnet work address is 200.45.32.0
Example 3.3.2 For a network address 192.168.10.0 and subnet mask 255.255.255.224 then
calculate:
i) Number of subnet and number of host
ii) Valid subnetSolution: Given network address 192.168.10.0 is class C address. Subnet mask address is
255.255.255.224. Here three bits is browse for subnet.
i) Number of subnet and number of host
255.255.255.224 convert into binary =>11111111 1LLL1111 11111111 11100000
Number or subnet = 2" = 2? = 8
So there are 8 subnet.
Number of host per subnet = 2% - 2 = 25.2 =30
ii) Valid subnets
For valid subnet = 256 - Subnet mask = Block size. An example would be 256 - 224 = 32. The
block size of a 224 mask is always 32.
Start counting at zero in block of 32 until you reach the subnet mask value and these are your
subnets. 0, 32, 64, 96,128,160,192, 224.
Example 3.3,3Find the sub-network address for the fallowing;
Sr. No. IP address Mask
a) 140.11.36.22 255.255.255.0
b) 120.14.22.16 255.255.128.0
Solution
a) IP address Mask
140.11.36.22 255.255.255.0
The values of mask (ie. 255.255.255.0) is boundary level. So
WPaddress —140.11.36.22
Mask 255.255.255.0
* 140.1136.0 _
b) -‘[Paddress _140.11.36.22
Mask 255.255.128.0
Example 3.3.4Find the sub-network address for the fallowing:
Sr. No. IP address | Mask
a) 141.181,14.16 ‘ [255.255.2240
b) 200:34.22.156 255.255.255.240
[>is ee
Solution rT
a) a mi
141.181.14.16 IP address
255.255.224.0 Mask
141.181.0.0
Sub-network addressb)
200.34.22.156 IP address
255.255.255.240 Mask
200.34.22.144 Sub-network address
2)
125.35.12.57 IP address
255.255.0.0 Mask
“125.35.00 Sub-metwork address
(Le. 128) So for byte-3 value use bite-wise AND operators. It is shown below.
120.14.22.16 TP address
255.255.128.0 Mask
125.14.0.0 ‘Sub-network address
In the above example, the bite wise ANDing is done in between 22 and 128. It is as
follows. ¥
22 Binary representation 00010110
128 Binary representation 10000000
0 00000000
Thus the sub-network address for this is 120.14.0.0.
Example 3.3.5 Finde the class of the following address.
a) 1.22.200.10 b) 241.240,200.2 ¢) 227.368 d) 180.170.0.2
Solution: a) 1.22.200.10 Class A IP address
b) 241.240.200.2 Class E IP address
¢) 227.3.6.8 Class D IP address
4) 180.170.0.2 Class B IP address
Example 3.3.6Find the retid and Hositd for the following.
a) 19.34.21.5 b) 190.13.70.10 ©) 246.3.4.10 4) 201.2.4.2
Solution
a) netid => 19 Hostid => 13.70.10
b) netid => 190.13 Hostid => 70.10
c) No netid and No Hostid because 246.3.4.10 is the class E address.
d) netid =>201.2.4 Hostid =>2
Example 3.3.7: Consider sending a 3500 - byte datagram that has arrived at a router Rithat
needs to be sent over a link that has an MTU size of 1000 bytes to Ro. Then it has to traverse a
link with an MTU of 600 bytes. Let the identification number of the original datagram be 465,How many fragments are delivered at the destination ? Show the Parameters associated with each
of these fragments.
Solution: The maximum size of data field in each fragment = 680 (because there are 20 bytes IP
header), Thusthe number of required fragments) = [3500 - 20/680) - 5.11 ~ 6.
Each fragment will have Identification number 465. Each fragment except the last one
will be of size 700 bytes (including IP header). The last datagram will be of size 360 bytes
(including IP header). The offsets of the4 fragments will be 0, 85, 70, 255. Each or the first 3
fragments will have flag=; the last fragment will have flag=0.
Example 3.10
An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP
needs to distribute these addresses to three groups of customers as follows:
a) The first group has 64 customers; each needs 256 addresses.
b) The second group has 128 customers; each needs 128 addresses.
¢) The third group has 128 customers; each needs 64 addresses.
Design the sub blocks and find out how many addresses are still available after these allocations.
Solution
Figure 3.11 shows the situation.
Customer 001: 190,100.128.006
=Pisstomer 128: 190:100.150:192/28
Fig 3.11 An example of address allocation and distribution by an ISP
1, Group 1
For this group, each customer needs 256 addresses. This means that 8 (log2256) bits are needed
to define each host. The prefix length is then 32 - 8 =24. The addresses are
Ist Customer: 190.100.0.0/24 100.0.255/24 fi2nd Customer: 190.100.1.0/24190 190.100.1.255/24
64th Customer: 190.100.63.0/24 190. 100.63.255/24
Total =64 X 256 =16,384
2. Group2
For this group, each customer nceds 128 addresses, This means that 7 (10g2 128) bits are needed
to define each host. The prefix length is then 32 - 7=25, The addresses are
3. Group3
For this group, each customer needs 64 addresses. This means that 6 (log? 64) bits are needed to
each host. The prefix length is then 32 - 6 =26. The addresses are
Ist Customer: 190.100.128.0/26 190.100.128.63/26
2nd Customer: 190.100.128.64/26 190.100.128.127/26
128th Customer: 190.100.159.192/26 190.100.159.255/26
Total =128 X 64 =8192
Number of granted addresses to the ISP: 65,536
Number of allocated addresses by the ISP: 40,960
Number of available addresses: 24,576
Example 3.3.8Consider sending a 2400-byte datagram into link that has an MTU of 700 bytes.
Suppose the original datagram is stamped with the identification number 422. How many
ffagments are generated? What are the values in the various fields in the IP datagram(s)
generated related to fragmentation.
Solution: The maximum size of data field in each fragment = 680 (because there are 20 bytes IP
header).
Thus the number of required fragments = (2400 - 20) /680 =4
Each fragment will have Identification number 422. Each fragment except that last one to
be of size 700 bytes (including IP header.
The last datagram will be of size 360 bytes (including IP header).
The offsets of the 4 fragments will be 0, 85, 170, 255.
Each of the first 3 fragments will have flag = 1; last fragment will have flag =0.
Example 3.3.9 Suppose all the interfaces in each of three subnets are required to have the prefix
223.1.17/2A. Also suppose that subnet | is required to support at least 60 interfaces, Subnet 2 is to
support at least 90 interfaces and subnet 3 is to support at least 22 interfaces. Provide three
network addresses that satisfy these constraints,
Solution: The network address cannot be used for an interface (Network prefix + all zeros).
° The broadcast address cannot be used for an interface (Network prefix + all ones)
Subnet 2 (90 interfaces)
2°-2290Notice that we subtract 2 from the total number of available IP addresses because 2 IP
addresses are reserved for the network and broadcast addresses.
22 92°=7
‘Number of bits allocated to host part =n = 7
Number of bits allocated to network part = Pre filength = 32 -n=32-7=25
The network address of the first subnet is always the address of the given address space.
Network address of first subnet = 223.1.17.0/25 = 223.1.17/25
To obtain the broadcast address of a subnet, we keep to network part of the subnet’s network
address as it is, and convert all bits in its host part to Is.
Broadcast address of first subnet = 223.1.17.01111111 /25 = 223.1.1.7.127/25
Subnet 1 (60 interfaces)
2n -2260
Notice that we subtract 2 from the total number of available IP addresses because 2 IP
addresses are reserved for the network and broadcast addresses.
2" >60n=6
Number of bits allocated to host part = n = 6
Number of bits allocated to network part = Prefix length = 32 - n = 32 - 6 = 26 The
network address of any subnet (that is NOT the first subnet) is obtained by adding one to the
broadcast address of its preceding subnet.
Network address of second subnet = 223.1.17.128/26
Broadcast address of second subnet = 223.1.17.10111111/26 =223.1.17.191/26 Subnet 3
(12 interfaces) :
2-22 12
Notice that we subtract 2 from the total number of available IP addresses because 2 IP
addresses are reserved for the network and broadcast addresses.
22 14n=4
‘Number of bits allocated to host part =n=4
‘Number of bits allocated fo network part = Prefix length = 32 -n= 32-4=28
Network address of third subnet = 223.1 -17.192/28
i Cb f, Be OMc) 212.208.63.23 - Class C
d) 255.255.255.255 - Broadcast address.
What is the purpose of the Address Resolution Protocol ?(May 11)
ARP is a dynamic mapping method that finds a physical address for given a logical
address, i.e. mapping IP address to physical address.
3 Define an internetwork.
2
Ans:
Ans: A collection of interconnected networks is called an internetwork.
4 Define geographic routing.( May 10)
Ans: To decrease the size of the Touting table even further, it necessary to extend
hierarchical routing to include geographical routing. It divides the entire address Space into a
few large blocks.
5 What is multicasting routing 7( May 18)
Ans: Deliveryof information to a group of destinations simultaneously using themost
efficient strategy to deliver the messages over each link of the network only once.
6 What are the different kinds of multicast routing ?(May 11)
Ans: Different kinds of multicast routing are reverse
broadcasting.
7 Define subnetting.( Dec 15)
Ans: Subnetting is a technique that allows a network administrator to divide one physical
network into smaller logical networks and thus,
efficiency reasons.
8 What is multicast ? What is the motivation for developing multicast 2( May 11)
Ans: Multicasting means delivering the same packet simultaneously to a group of clients.
Motivation for developing multicast is that there are apy
more than one destination hosts.
9 What is the use of CIDR value in IP addressing ?
Ans: Class C address's concept becomes meaningless on these Toutes between domains;
technique is call Classless Inter-domain Routing or CIDR. A key concept is to all
multiple IP address in the way that allows summarization into a smaller number of routing
table.
10 Expand and define MTU.( May 12)
Ans: MTU :. Maximum Transmission Unit, MTU isa
packet size that can be sent over a network connection.
11. Compare the Ethernet address with IP address
Sr. No. | Ethernet Address
Flat, ie. switches look all the bits
always,
Assigned by ethemet hardware vendor
path multicasting and reverse path
control the flow of traffic for security or
plications that want to send a packet to
the
locate
networking term defines the biggest
IP Addresses
Hierarchical, ite., backbone routers
May just look higher order bits.
Statically or dynamically assigned by(Ethenet addresses are supposed to be | ISP or IT managers.
unique)
No geographical nor organizational | Geographical or organizational
association (Convenient for small
Networks)
For example: 8-0-20-b-de-3e
12. Define Routing? ( Dec 15)
Ans: Routing is the process of selecting paths in a network through which network trafrfic
is sent.
13. Find the class of each address
a) 00000001 00001011 OOOO1011 11101111
b) 14.23.1208
Ans. a) The first bit is 0. This is a class A address.
bd) The first byte is 14 (between 0 and 127). This is a class A address
14. What do you mean by unicast routing ?
association.
For example: 172.16.16.1 |
Ams: Unicast routing is a process of forwarding unicasted traffic from a source to
destination on an Internet.
1S. What are the salient features of IPv6 ?( Dec 12)
Ans: Salient features are :
a Efficient and hierarchical addressing and routing infrastructure
b. _IPv6 networks provide auto-configuration capabilities.
c Improved security features.
d. Better support for QoS.
e: Large address space.
5
Stateless and stateful address configuration.
i. Define source routing( Dec 13)
All the information about the network topology is required to switch a packet across
the network is provided by the source host. For switching that uses neithervirtual circuits nor
conventional datagrams is known as source routing.
17. What is the need of subnetting?(Dec 13)
Ans: Subnetting divides one large networkinto several smaller ones. Subnetting adds an
intermediate level of hierarchy in IP addressing.
7 Define BGP. (Dec 14,17)
‘Ans: Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed
fouting and reachability information between autonomous systems on the Internet,
What are the metrics used by routing protocols (May 15)
1, Traffic matrices
2. Distance matrices
Bs Adjacency matrices4, Service matrices
ot Performance matrices
Define VCI( Dec 16)
/ Ans: VCI is an acronym for virtual channel identifier. VCI is a 16-bit field in ATMcell
header that identities the cell's next destination as it travels through ATM network. VCI is
used in conjunction with Virtual Path Identifier (VPI).
21. What is fragmentation and reassembly (Dec 16)
Ans: IP fragmentation involves breaking a datagram into a number of pieces that can be
Teassembled later. Large datagram are fragmented (divided) i.e. one datagram becomes
several datagram of small sizes. This process is called fragmentation. At final destination the
datagrams are reassembled with the help of IP header bits.
22. Give the comparison of unicast, multicast and broadcast routing.(Dec 16)
Ans:
Sr.No. | Unicast Multicast Broadcast
ie Unicast is. a type of| The information is sent | The information is sent
communication where a| from ‘one or more | from one point to other
piece of information is | points to set of other points.
sent from one point to points.
another.
2. Only one sender and one | One or more sender and | One’ sender and several
receiver set of receiver Teceivers.
‘
How routers do differentiates the incoming unicast, multicast or broadcast
IPpackets ?(May 17)
Ans: The Ethernet network uses two hardware addresses which identify the source and
destination of each frame sent by the Ethemet. The MAC destination address (all 1 s) is used
to identify a broadcast packet (sent to all connected computers in a broadcastdomain) or a
multicast packet (Isb of 1" byte=1) (received by a selected group of computers).
Routers are operating at layer 3. Router use IP addresses to make forwarding decisions. Each
Port on a router is a member of a different network. When a router receives traffic from one
network, it uses the destination IP address to determine which port to forward.
( Differentiate between forwarding table and routing table. (Dec 17)
A Routing means finding a suitable path for a packet from sender to destination and
Forwarding is the process of sending the packet toward the destination based on | routing,
information.
What are the benefits of Gree Shortest Path First (OSPF) Protuee ? (May 18)
: Benefits
te Low traffic overhead
2: Support for complex address structures
3. Fast convergence. dees4. Good security. OSPF supports interface-based plain text and MDS5
authentication,
S., Area based topology. Large OSPF networks are organized as @ set of areas
linked by a backbone,
26. What is the network address in a class A subnet with the IP address of one of the
hosts as 25.34.12.56 and mask 255.255.0.0 ? (May 14)
Ans: 25.34.1256
255.255.0.0
25.34.0.0
Network address is 25.34.0.0
27, Expand ICMP and write the function.( May 16)
Ans: ICMP stands for internet control message control.
Functions of ICMP
1) Error reporting 2) Rechability testing 3) Congestion control 4) Route change notification
5) Performance measuring 6) Subnet addressing
28. When is ICMP redirect message used ?( May 17)
Ans: The ICMP Redirect message is used to notify a remote host to send data packets on an
alternative route. A host SHOULD NOT send an ICMP Redirect message, Redirects
SHOULD only be sent by gateways.
The ICMP “redirect” message indicates that the gateway to which the host sent the datagram
is no longer the best gateway to reach the net in question. The gateway willhave forwarded
the datagram, but the host should revise its routing table to have a different immediate
address for this net.
29. Why is IPv4 to IPV6 transition is required ? (May 17)
Ans: As publicly available IPv4 addresses have been exhausted. IPv4, the current internet
protocol version has crossed 30 years of time period. The expanding user base and increased
number of IP-enabled devices created a need for an upgraded version.
From mobile apps to non-traditional computing devices populating the Internet of Things,
businesses rely on ITs ability to deliver new services to both end users and customers. But
these services and the infrastructure used to support them require IP addresses and that means
an IPv6 migration. \
30. Highlight the characteristics of datagram networks. (Dec 17)
Ans: Characteristics of datagram networks are as follows ;
a. Host can send a packet anywhere at any time.
b Each packet is forwarded independently.
c. Link failure would not have any serious effect on communication if it is
Possibleto find an alternate route around the failure and update the forwarding
tableaccordingly.
31 Check whether the following IPV6 address notations are correct ? (Dec 18)a) + : OFS3:6382:AB00:67DB:BB27:7332.
b) —-7803:42F2:::88EC-D4BA:B7SD:11CD
Ans: a) — :: OF53:6382:AB00:67DB:BB27:7332 : Correct
b) —_7803:42F2:::88EC-D4BA:B75D:11CD : Incorrect because of two many (:)
Prepared by Verified by Approved by
You might also like
Networks IT Routing Summary Network, Switching, Routing, RIP, OSPF, BGP, MPLS, VPN, VRF (Belazi, Ahmed)
Networks IT Routing Summary Network, Switching, Routing, RIP, OSPF, BGP, MPLS, VPN, VRF (Belazi, Ahmed)
85 pages