Computer Network
Computer Network
Introduction
• A Computer network is a group of two or more
computer systems linked together
Shared File
Need and use of computer network
• Hardware sharing: Users can share devices such
as printers, scanners, CD-ROM drives, hard
drives etc.
Shared Printer
• Application sharing: Applications can be shared
over the network, and this allows to implement
client/server applications
Server
Client
Client
• User communication: Networks allow users to
communicate using e-mail, newsgroups, and
video conferencing etc.
Server
video conferencing
Network gaming: A lot of network games are
available, which allow multi-users to play from
different locations.
Server
Advantages of CN
• High Speed:- In Network files are transfer form one
computer to another with high speed.
• Reduce cost:- Computer network allow the user to
Share devices such as printers which saves money.
• Easy to backup:-Data is easy to backup as all the data
is stored on the file server.
• Easy to communicate:- users are easily
communicate each other using e-mail and video
conferencing.
• Internet Access Sharing: Small computer networks
allow multiple users to share a single Internet
connection.
Types of Computer Networks
Computer network is divided into three networks
1. Local area Networks (LAN).
2. Metropolitan Area Network (MAN).
3. Wide Area Networks(WAN).
Local area Networks (LAN)
• A local area network (LAN) is a
computer network in which all the networking
devices are interconnects in a limited area such
as a home, school, computer laboratory, or
office building.
• LANs are typically controlled and managed by a
single person or organization.
• Twisted pair cabling, and Wi-Fi are the two most
common technologies currently used to build
LANs.
• LAN Uses different networking devices like hub,
switch, router etc.
• LAN Uses different network topology such as
bus, star, ring mesh etc.
• LANs have a high data transfer rate(100mbps).
• LAN Covers 90 to 150 meters distance.
• One LAN can be connected to other LANs over
any distance via telephone lines and radio
waves.
Metropolitan Area Networks (MAN)
• Metropolitan Area Network, is a data network
that is designed for a town or city. In terms of
geographic breadth, MANs are larger than
local-area networks (LANs), but smaller than
wide-area networks (WANs).
• The larger city, the bigger the MAN, the smaller a metro city,
smaller the MAN.
• A MAN typically covers an area of between 5 and 50 km
diameter.
• A MAN is not generally owned by a single organization.
• MANs are extremely efficient and provide fast communication via
high-speed carriers, such as fiber optic cables.
• WAN (Wide Area Network) :-
• Wide Area Network, WAN is a collection of
computers and network resources that covers a
large geographic area, such as a state, country
and world .
• WANs often connect multiple smaller networks,
such as local area networks (LANs) or metro area
networks (MANs).
• Computers connected to a wide-area network
are often connected through public networks,
such as the telephone system. They can also be
connected through leased lines or satellites.
• The world's most popular WAN is the Internet.
• Business and government sector utilize WANs to
relay data among employees, clients, buyers,
and suppliers from various geographical
locations.
• WANs have a lower data transfer rate(10mbps-
20mbps).
• In WAN Low bandwidth available for
transmission.
Difference between LAN and WAN
LAN WAN
• LAN is a computer • WAN is a network that
network that connects covers a broad area
computers in small using private or public
areas. network transports.
• LAN offers high data • WAN has lower data
transfer rates transfer rates
• High bandwidth is • Low bandwidth
available for available for
transmission. transmission.
Difference between LAN and WAN
LAN WAN
• Layer 2 devices like • Layers 3 devices
switches, bridges. Layer Routers, Multi-layer
1 devices like hubs, Switches
repeaters. • WANs have more
• LANs tend to have problems due to the
fewer problems large amount of system
associated with them and data that is present.
Difference between LAN and WAN
LAN WAN
• LAN networks can be WAN are not owned up
owned up private any one organization
companies or people but exist under
that set it up at homes. collective or distributed
ownership.
• .
• Network Architecture
• Network architecture is the design of a communications network
.
• The network architecture provides a full picture
of the established network with detailed view of
all the resources accessible. It includes hardware
components used for communication, cabling
and device types, network layout and topologies.
• In computer network different types of network
architecture are available.
1. Peer to Peer.
2. Client-Server.
3. Hybrid.
4. Intranet
5. Internet
6. Extranet.
1. Peer to Peer architecture (P2P)
• In peer to peer architecture two or more computers are
connected and transfer the data without the need of a central
server.
• Each computer, has the same capabilities and responsibilities.
• It is a type of decentralized architecture in which individual nodes in
the network (called "peers") act as both server and client of resources.
• Advantages
• It is easy to install and configure.
• All the resources and contents are shared by all the peers
• P2P is more reliable because failure of one peer doesn’t affect the
functioning of other peers.
• There is no need for full-time System Administrator
The over-all cost of building and maintaining this type of network is
comparatively very less.
Disadvantages
• In this network, the whole system is decentralized thus it is
difficult to administer.
• Security in this system is very less viruses, spywares , trojans, etc
malwares can easily transmitted over this P-2-P architecture.
Data recovery or backup is very difficult. Each computer should
have its own back-up system.
Client –Server Architecture
• A network architecture in which each computer in the network
is either a client or a server.
(2) Proper Management : All the files are stored at the same place.
•
• Intranet network architecture
• Intranet as an organization's private, secured computer network
system that uses the same concepts, technologies and protocols
(standards) as The Internet, but operates on a Local Area
computer Network (LAN).
• An intranet is a corporate networked internal web site with other
features like internal e-mail, news group and chat facilities
• The intranet is formed in such a way that all the information,
applications and other resources the organization’s employees
need are accessible via the intranet.
• intranet provides access to information and other services
quickly and easily.
• In many organizations, intranets are protected from unauthorized
external access by means of a network gateway and firewall.
• Internet architecture
• In this architecture a network is connected to the internet.
• All the public information are accessible to the network.n
• In this architecture forms the wide area network.
• The Internet is a global system of interconnected computer networks
that use the standard Internet protocol suite (TCP/IP) to serve several
billion users worldwide.
• It is a network of networks that consists of millions of private, public,
academic, business, and government networks.
• The Internet carries an large range of information, resources and
services, such as the inter-linked hypertext documents of the
World Wide Web (WWW), the infrastructure to support email, and
peer-to-peer networks.
• Extranet architecture
• Hybrid
Different Network topologies are as follows
1. Bus topology
• Bus topology uses a common backbone cable to connect all
devices.
• A single backbone cable is a shared communication medium.
• All the devices attach to backbone cable with an interface
connector.
• A device wanting to communicate with another device on the
network sends a broadcast message onto the wire that all other
devices see, but only the intended recipient actually accepts and
processes the message.
• A terminator is added at ends of the central cable, to absorb the
signals.
Advantages
1. It is Easy to set up.
2. It is Simple network topology.
3. Less cable is required .
4. Less expensive
5. Failure of one node does not affect the rest of the bus network.
Disadvantages
6. If there is a problem with the cable, the entire network goes
down.
7. Low security (all computers on the bus can see all data
transmissions).
Disadvantages
4. Less efficient.
2. Expensive to purchase.
1. physical (layer 1)
2. data link (layer 2),
3. network (layer 3)
4. transport (layer 4)
5. session (layer 5)
6. presentation (layer 6),
7. and application (layer 7).
Application Layer
Session Layer
Transport Layer
Network Layer
Lower Layer
Data Link Layer
Physical Layer
• Physical Layer:- This layer carry the bit stream - electrical impulse, light
or radio signal through the network.
• It provides the hardware means of sending and receiving data on a
cable.
• Physical layer define the following
• Physical characteristics of interfaces and medium. The physical layer
defines the characteristics of the interface between the devices and
the transmission medium. It also defines the type of transmission
medium.
• Representation of bits:- The physical layer data consists of a stream of
bits (sequence of 0s or 1s) .To be transmitted, bits must encoded into
signals--electrical or optical.
• Data rate:-The physical layer define the transmission rate-the
number of bits sent each second.
• Synchronization of bits. The sender and receiver not only must use
the same bit rate but also must be synchronized at the bit level.
• Transmission mode:-The physical layer also defines the direction of
transmission between two devices: simplex, half-duplex, or full-
duplex .
• Topology:- Physical Layer define the topology.
Data Link Layer
• The data link layer transforms a raw transmission bits into a reliable
form.
• The data link layer is responsible for moving frames from one hop
(node) to the next.
• The Data link layer add the header to the packet coming from upper
layer that include the physical address of source and destination on
same network.
• Data Link Layer controls the errors.
• Responsibilities of data Link Layer
• Framing. The data link layer divides the stream of bits received from
the physical layer into manageable data units called frames.
• Physical addressing. If frames are to be distributed to different
systems on the network, the data link layer adds a header to the
frame to define the sender and/or receiver of the frame.
• Flow control. If the rate at which the data are absorbed by the
receiver is less than the rate at which data are produced in the
sender, the data link layer uses a flow control mechanism to avoid
overloading the receiver.
• Error control. The data link layer adds reliability to the physical layer
by adding mechanisms to detect and retransmit damaged or lost
frames.
• Access control. When two or more devices are connected to the
same link, data link layer protocols are necessary to determine
which device has control over the link at any given time.
Network Layer :
• The network layer is responsible for the source-to-destination
delivery of a packet, across multiple networks (links). Whereas the
data link layer transfer the packet between two systems on the
same network (links),
• If two systems are connected to the same link, there is usually no
need for a net-work layer. However, if the two systems are attached
to different networks (links) with connecting devices between the
networks (links), there is often a need for the network layer to
perform source-to-destination delivery.
• Other responsibilities of the network layer include the following:
control.
1. Dialog control:- The session layer allows two systems to enter into a
dialog. It allows the communication between two processes to take
place in either half- duplex (one way at a time) or full-duplex (two
ways at a time) mode.
Application Layer
Transport Layer
Internet layer
Network Layer
1. Network interface
• Responsible for sending and receiving TCP/IP packets on the
network medium such as coaxial cable, optical fiber, or twisted-pair
copper wire.
• The Transport Layer provides the means for the transport of data
segments across the Internet Layer.
• The Transport Layer is concerned with end-to-end (host-to-host)
communication.
• Transmission Control Protocol provides reliable,
connection-oriented transport of data between two endpoints
(sockets) on two computers that use Internet Protocol to
communicate.
• Application Layer
• Token Ring
9. HTTP:- This protocol used by the World Wide Web to define the
messages format .
Addresses
Physical Logical
Address Address Port Address Specific Address
Physical address:-
• The physical address, also known as the link address or MAC
address , is the address of a node as defined by its LAN or WAN.
• It is included in the frame used by the data link layer.
• It is the lowest-level address.
• The size of the physical address is a 6-byte (48-bit) physical address
that is imprinted on the network interface card (NIC).
Logical Addresses
• Logical addresses are necessary for universal communications that
are independent of underlying physical networks.
• Physical addresses are not sufficient in an internetwork environment
where different networks can have different address formats.
• A universal addressing system is needed in which each host can be
identified uniquely, regardless of the underlying physical network.
• A logical address in the Internets currently a 32-bit address that can
uniquely define a host connected to the Internet.
• No two publicly addressed and visible hosts on the Internet can have
the same IP address.
Port Addresses
• The IP address and the physical address are necessary for a quantity
of data to travel from a source to the destination host.
• Computers device can run multiple processes at the same time.
• Dotted-Decimal Notation
• To make the IPv4 address more compact and easier to read,
Internet addresses are usually written in decimal form with a
decimal point (dot) separating the bytes. The following is the dotted
decimal notation of the above address:
• 117.149.29.2
Classful Addressing
• In classful addressing, the address space is divided into five classes: A, B, C,
D,and E. Each class occupies some part of the address space.
• Classful addressing divides the entire IP address space (0.0.0.0 to
255.255.255.255) into 'classes', or special ranges of contiguous IP addresses
(no addresses missing between the first and last address in the range).
• Classful addressing makes it possible to determine the network portion of
the IP address by looking at the first four bits of the first octet in the
IP address. The first four bits are referred to as the 'most significant bits' of
the first octet and are used to determine what class of IP address is being
used.
• In Classful addressing IP addresses is divided into net id and host id.
Default Network: The special network 0.0.0.0 is generally used for routing.
Class A address
• In class A 1 Bit used for prefix 7 bits used for network id and 24 bits used
for host id.
• Class A provide the range of IP address from 1.0.0.1 to 126.255.255.254 .
• Class A addresses were designed for large organizations with a large
number of attached hosts .
• This type of allocation is generally given to very large networks such as
multi-national companies.
Disadvantages:- There are small no of networks with large no. of computers .
Class B:
In class B 2 Bit used for prefix 14 bits used for network id and 16 bits
used for host id.
1. Cost and Time Reduction :- VLANs can reduce the migration cost
of stations going from one group to another. Physical
reconfiguration takes time and is costly.
Guided Unguided
(Wired) Wireless
Free space
• Guided media, provide a specific path for the data signal from
one device to another.
• Guided media include twisted-pair cable, coaxial cable, and fiber
optic cable.
Twisted-Pair Cable
• A twisted pair consists of two conductors (normally copper),
each with its own plastic insulation, twisted together,
One of the wires is used to carry signals to the receiver, and the other
is used only as a ground reference. The receiver uses the difference
between the two.
• Twisted-pair cable is a type of cabling that is used for telephone
communications and most modern Ethernet networks.
• Twisted pair cable classified into UTP(Unshielded twisted pair)
and STP (Shielded twisted pair) Cable.
Unshielded twisted pair (UTP)
• UTP cables are found in many Ethernet networks and telephone
systems. It is suitable for both data and voice communication.
• For indoor telephone applications, UTP is often grouped into sets
of 25 pairs according to a standard 25-pair colour code
• The UTP cable is divided into smaller but identical bundles. Each
bundle consists of twisted pairs that have different twist rates.
• UTP cabling is often used in data networks for short and medium
length connections.
• It is relatively lower costs compared to optical fiber and
coaxial cable.
• UTP cable available in different category.
• Category 1:- It is used in the telephone system. Fine for the voice
communication but low speed data communication.
• Category 2 :- Suitable for voice and data transmission of up to 4
Mbps.
• Category 3 :- It can be used for data transmission of up to 10
Mbps.
• Category 4 :- It can be used for data transmission of up to 16 Mbps.
• Category 5 :- It can be used for data transmission of up to 100 Mbps.
Advantages:-
1. Less cost.
2. It is suitable for both data and voice communication.
3. It is flexible.
Disadvantages:-
4. Interference introduces due to cross-talk.
5. Not suitable audio - video information.
Shielded twisted pair
IBM has also produced a version of twisted-pair cable for its use
called shielded twisted-pair (STP).
STP cable has a metal foil covering that encases each pair of
insulated conductors.
Shielded Twisted pair cables are often shielded in attempt to
prevent electromagnetic interference. Because the shielding is
made of metal, it may also serve as a ground. However, usually a
shielded or a screened twisted pair cable has a special grounding
wire added called a drain wire. This shielding can be applied to
individual pairs, or to the collection of pairs. When shielding is
applied to the collection of pairs, this is referred to as screening.
Advantages :-
Disadvantages :-
Inner conductor
Outer conductor
• Coaxial cable, is an electrical cable with one inner conductor
Disadvantages
It is more expensive.
Optical fibre
Optical Fiber
An optical Fibre is a glass or plastic fibber that carries light
along its length.
Fibber optic networks operate at high speeds - up into the
gigabits
Carrying large amount of information.
1. Less expensive
4. Ease Of Installation
Wireless Network Medium
In wireless medium, the data are transmitted without the
cable.
Wireless channels are much more public, with a transmitter's
antenna radiating a signal that can be received by any
antenna sufficiently close.
Wireless channel has limited bandwidth.
Disadvantages
• Repeater can not be used for traffic filtered.
B
D
C
• A special type of network device called the hub.
• Communication protocols
• Architecture
Figure 1
Figure 1
The Advantages of Structured Cabling are:
• reduce maintenance costs : A structured approach in cabling also
helps reduce maintenance costs
• Support for multi-vendor equipment: A standard-based cable
system will support applications and hardware of different
vendors.
• Simplify moves/adds/changes: Structured cabling systems can
support any changes within the systems are less likely to down
the entire network
• Support for future applications: Structured cabling system
supports future applications like multimedia, video conferencing
etc with little or no upgrade plan.
• Fault Isolation: By dividing the entire infrastructure into simple
manageable blocks, it is easy to test and isolate the specific
points of fault and correct them with minimal disturbance to the
network.
Rack
• A computer network rack is a metal frame used to hold various
network devices such as servers, hard disk drives, modems and
other electronic equipment. Some may refer to a rack as "LAN or
network furniture" as resembles a shelving structure where
components can be attached vertically, stacked on top of one
another.
• Racks come in many different shapes and sizes, the standard
(traditional) size rack is 19-inches wide.
• Racks are usually made of aluminum or stainless steel. The
Electronics Industries Association (EIA) establishes standards for
cabinets and racks for the use of computers and other electronic
equipment.
• The rack refers specifically to the frame that provides a means
for mounting electronic equipment.
patch panel
• A patch panel allows multiple devices, usually of the similar
type, to be connected and managed in a more efficient manner.
• Computer networks, sound studios and stages, radio and
television stations, and a number of other systems use patch
panels to help manage the large number of connections needed
to wire up and interconnect all the components of their
electronic systems.
• In the picture to the right, is an example of what a patch panel
may look like.
• Computer networks make use of switches, which are essentially
patch panels, allowing eight, sixteen or more computers to be
connected to a single device, making it easier to manage the
network connectivity to each and between each computer. In
audio and video, an s-video patch panel can connect multiple
inputs and outputs for easier management.
• Specialized patch panels, like switching routers, can make
switching between one connected device to another as simple as
the press of a button, without any need to rewire the
connections.
crimping tool
• A crimping tool is a tool designed to crimp or connect a
connector to the end of a cable. For example, network cables and
phone cables are created using a crimping tool to connect the
RJ-45 and RJ-11 connectors to the end of the cable.
• This example shows a tool capable of crimping both RJ-11 and RJ-
45 connectors.
• punch down tool, is a small hand tool used by
telecommunication and network technicians.
• It is used for inserting wire into connectors .
• Most punch down tools are of the impact type,
consisting of a handle, an internal spring
mechanism, and a removable slotted blade.
• To use the punch down tool, a wire is pre-
positioned into a slotted post, and then the punch
down tool is pressed down on top of the wire
• Once the required pressure is reached, the
internal spring is triggered, and the blade pushes
the wire into the slot, cutting the insulation
• patch cord
• patch cord
• A patch cord (sometimes called a patch cable) is a length
of cable with connectors on the ends that is used to
connect an end device .
• One of the most common uses is connecting a laptop,
desktop or other end device to a wall outlet.
Functions of NOS
network links.
• packet.
termination.
• The Internet has chosen this type of service at the network layer
• The switch (packet switch) does not keep information about the
connection state.
• IP transports data in packets called datagrams, each of which is
transported separately.
• Datagrams can travel along different routes and can arrive out of
sequence or be duplicated.
• IP does not keep track of the routes and has no facility for
reordering data-grams once they arrive at their destination.
Unreliable IP service
• IPv4 is an unreliable and connectionless datagram protocol-a
best-effort delivery service.
• The term best-effort means that IPv4 provides no error control
or flow control
• IPv4 assumes the unreliability of the under-lying layers and does
its best to get a transmission through to its destination, but with
no guarantees.
• The network layer in the Internet is unreliable (best-effort
delivery), we need to implement reliability at the transport layer.
• To understand that error control at the data link layer does not
guarantee error control at the transport layer.
IP header Format
• A datagram is a variable-length packet consisting of two parts:
header and data
• The header is 20 to 60 bytes in length and contains information
essential to routing and delivery
• Version (VER). This 4-bit field defines the version of the IP
protocol. Currently the version is 4.
• Header length (HLEN). This 4-bit field defines the total length of
the datagram header in 4-byte words. This field is needed
because the length of the header is variable (between 20 and 60
bytes). When there are no options, the header length is 20 bytes,
and the value of this field is 5 (5 x 4 = 20). When the option field
is at its maximum size, the value of this field is 15 (15 x 4 = 60).
• Type of Service: 8 bits
• The first three bits of this field are known as precedence bits and are
ignored as of today. The next 4 bits represent type of service and the
last bit is left unused. The 4 bits that represent TOS are : minimize
delay, maximize throughput, maximize reliability and minimize cost.
Total length. This is a 16-bit field that defines the total length (header
plus data)of the IPv4 datagram in bytes.
To find the length of the data coming from the upper layer, subtract
the header length from the total length.
The header length can be found by multiplying the value in the HLEN
field by 4.Length of data =total length - header length
• Identification.
• This 16-bit field identifies a datagram originating from the source
• host.
• The combination of the identification and source IPv4 address
must uniquely define a datagram as it leaves the source host.
• To guarantee uniqueness, the IPv4 protocol uses a counter to
label the datagrams.
• Flags. Flags. This is a 3-bit field. The first bit is reserved. The
second bit is called the do not fragment bit. If its value is 1, If
• its value is 0, the datagram can be fragmented if necessary. The
third bit is called the more fragment bit. If its value is 1, it means
the datagram is not the last fragment; there are more fragments
after this one. If its value is 0, it means this is the last or only
fragment .
• Fragmentation offset. This 13-bit field shows the
relative position of this fragment with respect to
the whole datagram. It is the offset of the data in
the original datagram measured in units of 8
bytes.
0-1399 Fragmentation offset 0 (0/8=0)
byte
1400-
2799 Fragmentation offset 175 (1400/8)
4000 byte
byte
2800-
3999 Fragmentation offset 350 (2800/8 =350
byte
• Time to live. A datagram has a limited lifetime in its travel
through an internet.
• This field was originally designed to hold a timestamp, which was
decremented by
• each visited router. The datagram was discarded when the value
became zero.
• Receiver site:
IP Packet
IP Packet
Code Description
Group Address
• Type. This 8-bit field defines the type of message. Message type
may be
• General or special query
• Membership report
• Leave report
8 Byte
Three-Way Handshaking
• The connection establishment in TCP is called three-way
handshaking.
• The three steps in Three-Way Handshaking are as follows.
1. The client sends the first segment, a SYN segment, in which
only the SYN flag is set. This segment is for synchronization of
sequence numbers. This sequence number is called the initial
sequence number (ISN). Note that this segment does not
contain an acknowledgment number. It does not define the
window size.SYN segment is a control segment and carries no
data. When the data transfer starts, the ISN is incremented by
1.
2. The server sends the second segment, a SYN + ACK segment with
two flag bits set:SYN and ACK. This segment has a dual purpose.
First, it is a SYN segment for com-munication in the other
direction. The server uses this segment to initialize a sequence
number for numbering the bytes sent from the server to the
client. The server also acknowledges the receipt of the SYN
segment from the client by setting the ACK flag and displaying
the next sequence number it expects to receive from the client.
3. The client sends the third segment. This is just an ACK segment.
It acknowledges the receipt of the second segment with the ACK
flag and acknowledgment number field. Note that the sequence
number in this segment is the same as the one in the SYN
segment; the ACK segment does not consume any sequence
numbers.
UNIT-6
• SMTP is used for sending email, and It only works for outgoing
messages.
• Most servers these days actually us a slightly updated version of
the SMTP protocol called ESMTP (Extended Simple Mail Transfer
Protocol).
• remote login (rlogin)
• The process of logging on to a remote computer from a terminal
connected to a local computer.
• Remote Login When a user wants to access an application
program or utility located on a remote machine, he or she
performs remote login. Here the TELNET client and server
programs come into use. The user sends the keystrokes to the
terminal driver where the local operating system accepts the
characters but does not interpret them. The characters are sent
to the TELNET client, which transforms the characters to a
universal character set called Network Virtual Terminal (NVT)
characters and delivers them to the local TCP/IP.
• The commands or text, in NVT form, travel through the Internet
and arrive at the TCP/IP stack at the remote machine. Here the
characters are delivered to the operating system and passed to
the TELNET server.
SNMP (Simple Network Management Protocol )
• SNMP is a framework for managing devices in an internet using
the TCP/IP protocol.
• It provides a set of fundamental operations for monitoring and
maintaining an internet.
• SNMP uses the concept of manager and agent. That is, a
manager, usually a host, controls and monitors a set of agents,
usually routers or servers
• The protocol is designed at the application level so that it can
monitor devices made by different manufacturers and installed
on different physical networks.
• A management station, called a manager, is a host that runs the
SNMP client program. A managed station, called an agent, is a
router (or a host) that runs the SNMP server program.
Management is achieved through simple interaction between a
manager and an agent.
• SNMP defines the format of the packet to be sent from a
manager to an agent and vice versa.
Domain Name System (DNS)
• DNS is a client/server application program used to help other
application programs.
• DNS is used to map a host name in the application layer to an IP
address in the network layer.
3. Mixed Representation
• FDEC:14AB:2311:BBFE:AAAA:BBBB:130.24.24.18
Benefits Of IPv6
• More Efficient Routing.
• More Efficient Packet Processing
• Simplified Network Configuration.
• Support For New Services
• Provide better Security
ICMPv6
• ICMPv6 is a combination of three protocols ICMP, IGMP, and ARP.
1. Error messages.
2. Informational messages.
3. Neighbor-discovery messages
4. group-membership messages.
Unit -7
A 1
B
1
3
2
C
D
1
Initial State
A 1
B
1
3
2
C
D
1
A B C D
A 0 1 3 ?
B 1 0 1 2
C 3 1 0 1
D ? 2 1 0
State 2
A 1
B
1
3
2
C
D
1
A B C D
A 0 1 2 (vi B) 3(vi B)
B 1 0 1 2
C 2(vi B) 1 0 1
D 3 (vi B) 2 1 0
Link state routing protocol
• Link State protocols track the status and connection type of
each link and produces a calculated metric based on these
and other factors, including some set by the network
administrator.
• Link state protocols know whether a link is up or down and
how fast it is and calculates a cost.
• Link State protocols will take a path which has more hops,
but that uses a faster medium over a path using a slower
medium with fewer hops.
• Because of their awareness of media types and other
factors, link state protocols require more processing power
and memory
• Hardware broadcast address
• This is a special network address used for broadcasting messages
to the entire network.
• In this case there is just one sender, but the information is sent
to all connected receivers.
• Packets sent to the broadcast address, all one bits, are received
by all stations on a local area network. In hexadecimal the
broadcast address would beFF:FF:FF:FF:FF:FF. A broadcast frame
is flooded and is forwarded to and accepted by all other nodes in
a network.
• Broadcast transmission is supported on most LANs (e.g. Ethernet
), and may be used to send the same message to all computers
on the LAN (e.g. the address resolution protocol (arp) uses this to
send an address resolution query to all computers on a LAN).
• Network layer protocols (such as IPv4) also support a form of
broadcast that allows the same packet to be sent to every system
in a logical network (in IPv4 this consists of the IP network ID and
an all 1's host number).
• Hardware Multicast address
• Multicast addresses are used to define a group of hosts instead
of just one.
• A packet sent to a multicast address must be delivered to each
member of the group.
• Packets sent to a multicast address are received by all stations on
a LAN that have been configured to receive packets sent to that
address
• IGMP uses this address to manage the membership of the group.
4. Wireless Repeaters
• A wireless repeater connects to a router or access point. Often
called signal boosters or range expanders
• Software Requirement:-
1. Driver support software for Wireless card.
2. Driver support software for Wireless Access Point.
3. Driver support software for Wireless Router.
4. Operating System:- Windows XP, Windows 7 / Windows Vista
• Types of wireless networks
1. Wireless PAN:- Wireless personal area networks
(WPANs) interconnect devices within a relatively
small area, that is generally within a person's reach.
[ For example, Bluetooth network