Unit 3
Unit 3
2 Marks
1
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Transit AS
11. Compare circuit switching and virtual circuit based packet Switching, in respect of
queuing and forwarding delays. (MAY/JUNE 2013)
Circuit Switching
In circuit switching dedicated communication path is available between two stations.
It is easier to double the capacity of a packet switched network than a circuit network.
A circuit network is heavily dependent on the number of channel available.
Packet switching
More security
Bandwidth used to full potential
Devices of different speeds can communicate
Not affected by line failure(redirects signal)
12. Differentiate between connection less operation and connection oriented operation.
(MAY/JUNE 2013)
Connection-oriented communication includes the steps of setting up a call from one computer
to another, transmitting/receiving data, and then releasing the call, just like a voice phone call.
13. What are the different routing techniques available to manage routing table entries?
1. Next hop routing.
2. Network specific routing
3. Host specific routing
4. Default routing
2
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
S.no Intradomain Routing Interdomain Routing
3
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
(ii) Support for hierarchy within a single routing domain
(iii) Multiple same-cost paths and
(iv) Integrated support for unicast and multicast routing.
2. The three important keys are, The three important keys are,
->Knowledge about the whole network. ->Knowledge about the
->Routing only to neighbors neighborhood.
->Information sharing at regular intervals. ->Routing to all routers
->Information sharing when there is
a change.
30. A switch can process 2 million packets each second and each packet contains average of
64 bytes, then find out the throughput of the switch.
Solution:
Packet per second(pps)=2million packets=2x10^6
Throughput = pps x (bits per packet)
4
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
= 2 x 10^6 x 64 x 8
= 1024 x 10^6
= 1 Gbps
31. A 640-Gbps switch can handle a steady stream of 64-byte packets then what is pps rate?
Solution:
Packet per second (pps) rate =Through put
Bits per packet
= 640 x 10^9
64 x 8
= 10 x 10^9
8
= 1.25 x 10^9 pps
5
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
38. Mention the drawbacks of IPV4.
(i) Its provides a very limited number if host and network addresses. For example, if an
organization chooses class C only 256 IP addresses are available to it, it’s a very little number.
(ii) Since the IP address is 32 bits long, the space of the IP address will be exhausted soon. This
space growth won’t match with the user’s growth in the internet.
(iii) The IPv4 doesn’t provide real-time audio and video support, which is needed by the modern
internet applications.
42. Give the comparison of unicast, multicast and broadcast Routing. (Nov 2016)
1. One source and one One source and a group of One source and all
destination destinations. destinations.
2. Relationship is one-to-one Relationship is one-to-many Relationship is one-to-all
3. Both source and destination The source address is Both source and destination
addresses are unicast unicast address, but the addresses are broadcast
addresses destination address is a addresses
group address
4 In unicasting, the router In multicasting, the router In broadcasting, the router
forwards the received forwards the received packet forwards the received packet
packet through only one of through several of its through all its interfaces.
its interface interfaces.
6
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
43. Expand DVMRP.
Distance Vector Multicast Routing Protocol (DVMRP) is a multicast distance vector
routing uses the source-based least cost trees, but the router never actually makes a routing table.
47. Write down any two differences between circuit switching and packet switching
(Nov/Dec 2014)
Circuit switching
In circuit switching network dedicated channel has to be established before the call is
made between users
The channel is reserved between the users till the connection is active
Packet switching
In packet switching network unlike CS network, it is not required to establish the
connection initially
The connection/channel is available to use by many users.
49. What are the metrics used by routing protocols? (May 2015)
Router metrics can contain any number of values that help the router determine the best route
among multiple routes to a destination. A router metric typically based on information like path
length, bandwidth, load, hop count, path cost, delay, Maximum Transmission Unit (MTU),
reliability and communications cost.
16 Marks
1. Discuss in detail about Routing algorithms. (Or) Discuss RIP or distance vector algorithm
(May 2015) (Nov 2015) (May 2016)
ROUTING ALGORITHMS PROTOCOL
RIP-Routing Information Protocol
OSPF-Link State Routing
Introduction
Routing protocol is used to routing the information from source host to Destination host.
An intradomain routing protocol routes packets within a defined domain, such as for
routing e-mail or Web browsing within an institutional network.
Each point-to-point link connects an associated pair of routers and indicates the
corresponding cost of the connection.
8
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
A database is gathered from each router, including costs of paths in all separate
directions.
The most widely used intranetworking routing protocols are the two unicast routing
protocols RIP and OSPF.
RIP is one of the most widely used routing protocols in the Internet infrastructure but is
also appropriate for routing in smaller domains.
In RIP, routers exchange information about reachable networks and the number of hops
and associated costs required to reach a destination.
1. Apply the Bellman-Ford algorithm in a distributed fashion, including all hosts and
routers.
2. For each router, form an optimum vector of distance indicating the cost of routing and
other necessary parameters, using distance-vector routing.
3. If a cost of routing at any point changes, propagate (spread) the change periodically to the
neighboring routers and hosts of that point.
9
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
We can represent each node’s knowledge about the distance to all other nodes.
Initially, each node sets a cost of 1 to its directly connected neighbors and ∞ to all
other nodes.
Thus, A initially believes that it can reach B in one hop and that D is unreachable.
The routing table stored at A reflects this set of beliefs and includes the name of the
next hop that A would use to reach any reachable node.
Initially, then, A’s routing table would look like the below table.
The next step in distance-vector routing is that every node sends a message to its
directly connected neighbors containing its personal list of distances.
For example, node F tells node A that it can reach node G at a cost of 1; node A
also knows it can reach node F at a cost of 1.
So it adds these costs to get the cost of reaching G by means of F. This total cost of 2
is less than the current cost of infinity.
So node A records that it can reach G at a cost of 2 by going through F.
At this point, node A can update its routing table with costs and next hops for all
nodes in the network. The result is shown in the below Table.
10
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
In the absence of any topology changes, it only takes a few exchanges of information
between neighbors before each node has a complete routing table.
The process of getting consistent routing information to all the nodes is called
convergence.
The below table shows the final set of costs from each node to all other nodes when
routing has converged.
11
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
In large networks, a routing table exchanged between routers becomes very large and
difficult to maintain, which may lead to an even slower convergence.
Another major deficiency is the lack of support for variable-length subnet masks.
2. Discuss OSPF or link state routing (Nov/Dec 2014) or Shortest path algorithm (May 2015)
The Open Shortest Path First (OSPF) protocol is a better choice of intradomain routing
protocols, especially for TCP/IP applications.
OSPF is based on Dijikstra's algorithm, using a tree that describes the network topology
to define the shortest path from each router to each destination address.
Since it keeps track of all paths of a route, OSPF has more overhead than RIP, but
provides more stability and useful options.
12
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
1. Apply Dijikstra's algorithm in a distributed fashion for each host and router.
2. In each host or router, calculate the least-cost path, and propagate it to all nodes, using
link-state routing.
3. Periodically propagate any changes in routing cost to all routers and hosts.
4. Update the routing tables of routers and hosts.
Link-State Routing
Link-state routing is designed to resolve the RIP issue; each router sends routing
information to all routers, not only to the neighbors.
Each router receives all link costs from all routers; it is able to calculate the least-cost
path to each destination of the network.
The core (main) function of the link-state algorithm is flood routing, which requires no
network topology information.
Let's review the three important properties of flooding used in link-state routing.
Second, at least one copy of the packet arriving at the destination must hold the
minimum delay, since all routers in the network are tried.
Third, all nodes in the network are visited whether they are directly or indirectly
connected to the source node.
Every router using OSPF is aware of its local link-cost status and periodically sends
updates to all routers.
After receiving update packets, each router is responsible for informing its sending router
of receipt of the update.
OSPF can provide a flexible link-cost rule based of type of service (TOS).
The TOS information allows OSPF to select different routes for IP packets, based on the
value of the TOS field.
Reliable Flooding
13
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Reliable flooding is the process of making sure that all the nodes participating in the routing
protocol get a copy of the link-state information from all the other nodes. As the term flooding
suggests, the basic idea is for a node to send its link-state information out on all of its directly
connected links; each node that receives this information then forwards it out on all of its links.
This process continues until the information has reached all the nodes in the network.
More precisely, each node creates an update packet, also called a link- state packet (LSP),
which contains the following information:
In practice, each switch computes its routing table directly from the LSPs it has collected
using a realization of Dijkstra’s algorithm called the forward search algorithm. Specifically, each
switch maintains two lists, known as Tentative and Confirmed. Each of these lists contains a set
of entries of the form (Destination, Cost, NextHop). The algorithm works as follows:
This will become a lot easier to understand when we look at an example. Consider the network
depicted in Figure 3.33. Note that, unlike our previous example, this network has a range of
different edge costs. Table 3.14 traces the steps for building the routing table for node D. We
denote the two outputs of D by using the names of the nodes to which they connect, B and C.
Note the way the algorithm seems to head off on
14
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
15
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Load balancing—OSPF allows multiple routes to the same place to be assigned the same cost
and will cause traffic to be distributed evenly over those routes, thus making better use of
available network capacity.
There are several different types of OSPF messages, but all begin with the same header, as
shown in Figure 3.34. The Version field is currently set to 2, and the Type field may take the
values 1 through 5. The SourceAddr identifies the sender of the message, and the AreaId is a 32-
bit identifier
Type is one of the five types of packets for OSPF to choose from: hello, database
description, link-state request, link-state update, and link-state acknowledgment.
16
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Router ID specifies the packet's source router ID.
Area ID refers to the area that the source router belongs to.
The hello packet specified in the Type field is used to detect each router's active
neighbors. Each router periodically sends out hello packets to its neighbors to
discover its active neighboring routers.
The database description packets are used for database structure exchange
between two adjacent routers to synchronize their knowledge of network topology.
The link-state update packet transfers the link-state information to all neighboring
routers.
3. How the link cost can be calculated in routing algorithm (or) Discuss metrics in detail
The ARPANET was the testing ground for a number of different approaches to link-cost
calculation.
1. The original ARPANET routing metric measured the number of packets that were queued
waiting to be transmitted on each link, meaning that a link with 10 packets queued waiting to be
transmitted was assigned a larger cost weight than a link with 5 packets queued for
transmission.
Using queue length as a routing metric did not work well, however, since queue length is an
artificial measure of load
17
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Stated more precisely, the original ARPANET routing mechanism suffered from the fact that it
did not take either the bandwidth or the latency of the link into consideration.
2. A second version of the ARPANET routing algorithm, sometimes called the new routing
mechanism, took both link bandwidth and latency into consideration and used delay, rather
than just queue length, as a measure of load. This was done as follows.
First, each incoming packet was timestamped with its time of arrival at the router (ArrivalTime);
its departure time from the router (DepartTime) was also recorded. Second, when the link-level
ACK was received from the other side, the node computed the delay for that packet as
Delay = (DepartTime−ArrivalTime)+TransmissionTime+Latency
Although an improvement over the original mechanism, this approach also had a lot of problems.
Under light load, it worked reasonably well, since the two static factors of delay dominated the
cost.Under heavy load, however, a congested link would start to advertise a very high cost. This
caused all the traffic to move off that link, leaving it idle, so then it would advertise a low cost,
thereby attracting back all the traffic, and so on.
3. A third approach, called the “revised ARPANET routing metric,” addressed these problems. The
major changes were to compress the dynamic range of the metric considerably, to account for
the link type, and to smooth the variation of the metric with time.
The smoothing was achieved by several mechanisms. First, the delay measurement was
transformed to link utilization, and this number was averaged with the last reported utilization to
suppress sudden changes.
Second, there was a hard limit on how much the metric could change from one measurement
cycle to the next. By smoothing the changes in the cost, the likelihood that all nodes would
abandon a route at once is greatly reduced.
We end our discussion of routing metrics with a dose of reality. In the majority of real-world
network deployments at the time of writing, metrics change rarely if at all and only under the
control of a network administrator, not automatically as was described above.
4. How switches can be implemented or used in routing (or) Discuss the switch basics concepts
18
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Figure 3.37 shows a processor with three network interfaces used as a switch. The figure shows a
path that a packet might take from the time it arrives on interface 1 until it is output on interface
2.
We have assumed here that the processor has a mechanism to move data directly from an
interface to its main memory without having to be directly copied by the CPU, a technique called
direct memory access (DMA)
Once the packet is in memory, the CPU examines its header to determine which interface the
packet should be sent out on. It then uses DMA to move the packet out to the appropriate
interface.
Note that Figure 3.37 does not show the packet going to the CPU because the CPU inspects only
the header of the packet; it does not have to read every byte of data in the packet.
The main problem with using a general-purpose processor as a switch is that its performance is
limited by the fact that all packets must pass through a single point of contention:
In the example shown, each packet crosses the I/O bus twice and is written to and read from
main memory once. The upper bound on aggregate throughput of such a device is, thus, either
half the main memory bandwidth or half the I/O bus bandwidth, whichever is less.
Suppose, for example, that a processor can perform all the necessary processing to switch 2
million packets each second. This is sometimes called the packet per second (pps) rate. (This
number is representative of what is achievable on an inexpensive PC.) If the average packet is
short, say, 64 bytes, this would imply
19
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
that is, a throughput of about 1 Gbps—substantially below the range that users are demanding
from their networks today.
One of the salient features of this topology is that it consists of enduser sites (e.g., Stanford
University) that connect to service provider networks. In 1990, many providers served a limited
geographic region and were thus known as regional networks. The regional networkswere, in
turn,connected by a nationwide backbone. In 1990, this backbone was funded by the National
Science Foundation (NSF) and was therefore called the NSFNET backbone.
Notice in Figure 4.1 that each provider and end-user is likely to be an administratively
independent entity. This has some significant consequences on routing.
Routing Areas
As a first example of using hierarchy to scale up the routing system, we’ll examine how
link-state routing protocols (such as OSPF and IS-IS) can be used to partition a routing domain
into subdomains called areas
An area is a set of routers that are administratively configured to exchange link-state information
with each other. There is one special area—the backbone area, also known as area 0. An example
of a routing domain divided into areas is shown in Figure 4.2. Routers R1, R2, and R3 are
members of the backbone area. They are also members of at least one nonbackbone area; R1 is
actually a member of both area 1 and area 2. A router that is a member of both the backbone area
and a nonbackbone area is an area border router (ABR). Note that these are distinct from the
routers that are at the edge of an AS, which are referred to as AS border routers for clarity.
All the routers in the area send link-state advertisements to each other and thus develop a
complete, consistent map of the area. However, the link-state advertisements of routers that are
not area border routers do not leave the area in which they originated. This has the effect of
making the flooding and route calculation processes considerably more scalable. For example,
20
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
router R4 in area 3 will never see a link-state advertisement from router R8 in area 1. As a
consequence, it will know nothing about the detailed topology of areas other than its own.
6. Discuss in detail about Interdomain routing. Or Discuss in detail about BGP (Border Gateway
Protocol)
Interdomain Routing Protocols
Each domain consists of several networks and routers that can be accessed publicly.
Obviously, at router R1, finding the best path for a packet to go to which domain is a
challenge.
21
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The Border gateway protocol (BGP) is a preferred routing protocol for interdomain
communications and TCP/IP connections.
BGP allows routers to carry specific policies or constraints that they must meet.
With BGP, routers exchange more comprehensive information about routes to a certain
destination instead of simply costs and the best link.
In BGP, two contributing (casual) routers can exchange routing information even if they
are located in two different autonomous systems.
When an external destination is chosen, a router sends the information to all internal
neighbors.
All routers decide whether the new route is possible, and the new route is added to the
router's database.
Thus, the new update message is propagated. One of the most important techniques in
BGP is path-vector routing.
Path-Vector Routing
RIP and OSPF are not suitable for interdomain routing protocols.
22
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
o First, if different routers give different information to an assigned cost, it is
impossible to have stable and loop-free routes.
Each router sends its link cost to all other routers and then starts routing calculations. Two
issues can arise in link-state routing.
o First, different independent systems can use different costs and have different
limitations. The link-state protocol allows a router to make the topology, and its
metrics may be different for each independent system. In this case, it is
impossible to create a reliable routing algorithm.
o Second, when flood routing occurs, the use of an interdomain routing protocol
across the independent system can be unstable.
The path vector routing protocol, which provides information about how to reach a
network given a certain router and identifies which autonomous system (or domain)
should be visited.
The path vector routing protocol is different from the distance vector algorithm, in which
each path has information about cost and distance.
In the path vector routing protocol, these packages of information are not included, and
all visited autonomous systems and all components of domain A in the above figure
reaching the destination network are listed in each routing information package.
Thus, a router can be programmed to refuse the acceptance of a particular path if the
information about the path is not included in the package it receives
Details of BGP
BGP was created to find a solution to interdomain routing among autonomous (in-
dependent) systems. BGP has three functional components:
23
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Neighbor relationship
Neighbor maintenance
Network maintenance
The neighbor relationship refers to an agreement between two routers in two different
autonomous systems to exchange routing information on a regular basis.
A router may reject its participation in establishing a neighbor relationship for several
reasons, such as the rule of the domain, overload, or a temporary malfunctioning of
external links.
For this reason, two routers send keep-alive messages to each other. The last BGP
process is network maintenance.
Each router keeps the database of the subnetworks that it can reach and tries to get the
best route for that subnetwork.
BGP Packets
Open packet
Update packet
Keep-alive packet and
Notification packet
Open packet. This packet requests establishment of a relationship between two routers.
Keep-alive packet. Once a relationship between two routers is established, this packet
confirms its neighbor relationship frequently.
24
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Example network
An important job of BGP is to prevent the establishment of looping paths. For example, consider
the network illustrated in Figure 4.6. It differs from Figure 4.5 only in the addition of an extra
link between AS 2 and AS 3, but the effect now is that the graph of autonomous systems has a
loop in it. Suppose AS 1 learns that it can reach network 128.96 through AS 2, so it advertises
this fact to AS 3, who in turn advertises it back to AS 2.
In the absence of any loop prevention mechanism, AS 2 could now decide that AS 3 was
the preferred route for packets destined for 128.96. If AS 2 starts sending packets addressed to
128.96 to AS 3, AS 3 would send them to AS 1; AS 1 would send them back to AS 2; and they
would loop forever. This is prevented by carrying the complete AS path in the routing messages.
In this case, the advertisement for a path to 128.96 received by AS 2 from AS 3 would contain an
AS path of hAS 3, AS 1, AS 2, AS 4i. AS 2 sees itself in this path, and thus concludes that this is
not a useful path for it to use.
In order for this loop prevention technique to work, the AS numbers carried in BGP clearly need
to be unique. For example, AS 2 can only recognize itself in the AS path in the above example if
no other AS identifies itself in the same way. AS numbers have until recently been 16-bit
numbers, and they are assigned by a central authority to assure uniqueness. While 16 bits only
allows about 65,000 autonomous systems, which might not seem like a lot, we note that a stub
AS does not need a unique AS number, and this covers the overwhelming majority of
nonprovider networks
25
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
7. Discuss in detail the various aspects of IPv6 (or) Discuss IPv6 header format (May 2016)
Advantages of IPv6:
Larger address space
26
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
IPv6 has 128-bit address space, which is 4 times wider in bits in compared to IPv4’s 32-bit
address space.
So there is a huge increase in the address space.
Better header forma
IPv6 uses a better header format. In its header format the options are separated from the base
header.
The options are inserted when needed, between the base header and upper layer data.
The helps in speeding up the routing process.
New option
New options have been added in IPv6 to increase the functionality.
Possibility of extension
IPv6 has been designed in such a way that there is a possibility of extension of protocol if
required.
More security
IPv6 includes security in the basic specification.
It includes encryption of packets (ESP: Encapsulated Security Payload) and authentication of
the sender of packets (AH: Authentication Header).
Support to resource allocation
To implement better support for real time traffic (such as video conference), IPv6 includes
flow label in the specification.
With flow label mechanism, routers can recognize to which end-to-end flow the packets
belongs.
Plug and play
IPv6 includes plug and play in the standard specification.
It therefore must be easier for novice users to connect their machines to the network, it will
be done automatically.
IPv6 Addresses
An IPv6 addresses consists of 16 bytes (octets) i.e. it is 128 bits long as shown in the below
figure.
27
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Abbreviation:
The IPv6 address, even in hexadecimal format is very long. But in this address there are
many of the zero digits in it.
In such a case, we can abbreviate the address. The leading zeros of a section (four digits
between two colons) can be omitted.
Note that only the leading zeros can be dropped but the trailing zeros can not drop. This
is illustrated in the below figure.
Further abbreviation:
Further abbreviations are possible if there is consecutive section consisting of only zeros.
28
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
We can remove the zeros completely and replace them with double semicolon as shown
in the below figure.
It is important to note abbreviation is allowed only once per address. Also note that if
there are two runs of zero sections, then only one of them can be abbreviated.
CIDR Notation:
IPv6 protocol allows classless addressing and CIDR notation.
The below figure shows how to define a prefix of 60 bits using CIDR.
Categories of Address:
IPv6 defines three different types of addresses.
Unicast
A unicast address defines a single computer.
A packet sent to a unicast address is delivered to that specific computer.
Anycast
This is a type of address defines a group of computers with addresses which have the
same prefix.
A packet sent to an anycast address must be delivered to exactly one of the members of
the group which is the closest or the most easily accessible.
Multicast Addresses:
A multicast address defines a group of computers which may or may not share the same
prefix and may or may not be connected to the same physical network.
A packet sent to a multicast address must be delivered to each member of the set.
There are no broadcast addresses in IPv6, because multicast addresses can perform the
same function. The type of address is determined by the leading bits.
Multicast addresses all start with FF (1111 1111) and all other addresses are unicast
addresses.
Anycast addresses are assigned from the unicast address space and they do not differ
syntactically from unicast addresses.
29
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Anycast addressing is a rather new concept and there is little experience with the
widespread use of anycast addresses.
Therefore, some restrictions apply to anycast addressing in IPv6 until more experience is
gained.
An anycast address may not be used as the Source Address of an IPv6 packet and anycast
addresses may not be assigned to hosts but to routers only.
The base header is 40 byte length whereas the extension header and the data from upper
layer contain upto 65,535 bytes of information.
Base header
In the base header have eight fields. These fields are as follows:
1) Version (VER): It is a 4 bit field which defines the version of IP such as IPv4 or IPv6.
For IPv6 the value of this field is 6.
2) Priority: It is a 4 bit field which defines the priority of the packet which is important in
connection with the traffic congestion.
3) Flow label: It is a 24 bit (3 byte) field which is designed for providing special handling
for a particular flow of data.
4) Payload length: This is a 2 byte length field which is used to define the total length of
the IP datagram excluding the base header.
30
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
5) Next header: It is an 8 bit field which defines the header which follows the base header
in the datagram.
6) Hop limit: This is an 8 bit field which has the same purpose as TTL in IPv4.
7) Source address: It is a 16 byte (128) Internet address which identifies the original
source of datagram.
8) Destination address: This is a 16 byte (128) internet address which identifies the final
destination of datagram. But this field will contain the address of the next router if
source routing is being used.
8. Discuss how multicast addresses communication done in network (or) How addresses can be
separated in multicast communication
MULTICAST
To better support many-to-many and one-to-many communication, IP provides an IP-level
multicast analogous to the link-level multicast provided by multi-access networks like Ethernet.
Now that we are introducing the concept of multicast for IP
The basic IP multicast model is a many-to-many model based on multicast groups, where each
group has its own IP multicast address. The hosts that are members of a group receive copies of
any packets sent to that group’s multicast address.
A host can be in multiple groups, and it can join and leave groups freely by telling its local router
using a protocol Thus, while we think of unicast addresses as being associated with a node or an
interface, multicast addresses are associated with an abstract group, the membership of which
changes dynamically over time.
Further, the original IP multicast service model allows any host to send multicast traffic
to a group; it doesn’t have to be a member of the group, and there may be any number of such
senders to a given group.
Using IP multicast to send the identical packet to each member of the group, a host sends a
single copy of the packet addressed to the group’s multicast address.
IP’s original many-to-many multicast has been supplemented with support for a form of one-to-
many multicast. In this model of one-tomany multicast, called Source-Specific Multicast (SSM),
a receiving host specifies both a multicast group and a specific sending host.
The receiving host would then receive multicasts addressed to the specified group, but only if
they are from the specified sender. Many Internet multicast applications (e.g., radio broadcasts)
fit the SSM model. To contrast it with SSM, IP’s original many-to-many model is sometimes
referred to as Any Source Multicast (ASM).
31
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
A host signals its desire to join or leave a multicast group by communicating with its local router
using a special protocol for just that purpose. In IPv4, that protocol is the Internet Group
Management Protocol (IGMP); in IPv6, it is Multicast Listener Discovery (MLD).
Multicast Addresses
IP has a subrange of its address space reserved for multicast addresses. In IPv4, these
addresses are assigned in the class D address space, and IPv6 also has a portion of its address
space reserved for multicast group addresses. Some sub ranges of the multicast ranges are
reserved for intradomain multicast, so they can be reused independently by different domains.
There are thus 28 bits of possible multicast address in IPv4 when we ignore the prefix shared by
all multicast addresses.
When a host on an Ethernet joins an IP multicast group, it configures its Ethernet interface to
receive any packets with the corresponding Ethernet multicast address. Unfortunately, this
causes the receiving host to receive not only the multicast traffic it desired but also traffic sent to
any of the other 31 IP multicast groups that map to the same Ethernet address, if they are routed
to that Ethernet. Therefore, IP at the receiving host must examine the IP header of any multicast
packet to determine whether the packet really belongs to the desired group.
9. Discuss in detail about multicast routing techniques or Discuss DVMRP (Nov 2014 & 2015 &
2016)
Multicast routing is the process by which the multicast distribution trees are determined or, more
concretely, the process by which the multicast forwarding tables are built. As with unicast
routing, it is not enough that a multicast routing protocol “work”; it must also scale reasonably
well as the network grows, and it must accommodate the autonomy of different routing domains.
DVMRP
Distance-vector routing, can be extended to support multicast The resulting protocol is called
Distance Vector Multicast Routing Protocol, or DVMRP. DVMRP was the first multicast
routing protocol to see widespread use.
Recall that, in the distance-vector algorithm, each router maintains a table of (Destination, Cost,
NextHop) tuples, and exchanges a list of (Destination, Cost) pairs with its directly connected
neighbors
First, we create a broadcast mechanism that allows a packet to be forwarded to all the networks
on the internet.
Second, we need to refine this mechanism so that it prunes back networks that do not have
hosts that belong to the multicast group
32
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Given a unicast routing table, each router knows that the current shortest path to a given
destination goes through NextHop. Thus, whenever it receives a multicast packet from source S,
the router forwards the packet on all outgoing links (except the one on which the packet arrived)
if and only if the packet arrived over the link that is on the shortest path to S (i.e., the packet
came from the NextHop associated with S in the routing table). This strategy effectively floods
packets outward from S but does not loop packets back toward S.
There are two major shortcomings to this approach. The first is that it truly floods the network;
The second limitation is that a given packet will be forwarded over a LAN by each of the routers
connected to that LAN
The solution to this second limitation is to eliminate the duplicate broadcast packets that are
generated when more than one router is connected to a given LAN.
One way to do this is to designate one router as the parent router for each link, relative to the
source, where only the parent router is allowed to forward multicast packets from that source
over the LAN.
Notice that this refinement requires that each router keep, for each source, a bit for each of its
incident links indicating whether or not it is the parent for that source/link pair. Keep in mind
that in an internet setting, a source is a network, not a host, since an internet router is only
interested in forwarding packets between networks. The resulting mechanism is sometimes
called Reverse Path Broadcast (RPB) or Reverse Path Forwarding (RPF).
The path is reverse because we are considering the shortest path toward the source when
making our forwarding decisions, as compared to unicast routing, which looks for the shortest
path to a given destination. The RPB mechanism just described implements shortest-path
broadcast.
Protocol Independent Multicast, or PIM, was developed in response to the scaling problems of
earlier multicast routing protocols. In particular, it was recognized that the existing protocols did
not scale well in environments where a relatively small proportion of routers want to receive
traffic for a certain group.
PIM sparse mode (PIM-SM) has become the dominant multicast routing protocol and is the
focus of our discussion here.
In PIM-SM, routers explicitly join the multicast distribution tree using PIM protocol messages
known as Join messages.
PIM-SM assigns to each group a special router known as the rendezvous point (RP). In general, a
number of routers in a domain are configured to be candidate RPs, and PIM-SM defines a set of
procedures by which all the routers in a domain can agree on the router to use as the RP for a
given group.
33
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
A multicast forwarding tree is built as a result of routers sending Join messages to the RP. PIM-
SM allows two types of trees to be constructed: a shared tree, which may be used by all senders,
and a source-specific tree, which may be used only by a specific sending host
When a router sends a Join message toward the RP for a group G, it is sent using normal IP
unicast transmission. This is illustrated in Figure 4.14(a), inwhich router R4 is sending a Join to
the rendezvous point for some group. The initial Join message is “wildcarded”; that is, it applies
to all senders. A Join message clearly must pass through some sequence of routers before
reaching the RP (e.g., R2). Each router along the path looks at the Join and creates a forwarding
table entry for the shared tree, called a (*, G) entry (where * means “all senders”). To create the
forwarding table entry, The shared tree thus constructed is shown as a solid line from the RP to
R4 in Figure 4.14(a).
As more routers send Joins toward the RP, they cause new branches to be added to the tree, as
illustrated in Figure 4.14(b).Note that, in this case, the Join only needs to travel to R2, which can
add the new branch to the tree simply by adding a new outgoing interface to the forwarding table
entry created for this group. R2 need not forward the Join on to the RP. Note also that the end
result of this process is to build a tree whose root is the RP.
34
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
11. List the difference between IPv4 & IPv6 (May 2016)
IPv4 IPv6
The size of an address in IPv4 is 32 bits The size of an address in IPv6 is 128 bits
Address Shortages: Larger address space:
IPv4 supports 4.3×109 (4.3 billion) addresses, which IPv6 supports 3.4×1038 addresses, or
is inadequate to give one (or more if they possess 5×1028(50 octillion) for each of the roughly
more than one device) to every living person. 6.5 billion people alive today.33(*)
IPv4 header has 20 bytes IPv6 header is the double, it has 40 bytes
IPv4 header has many fields (13 fields) IPv6 header has fewer fields, it has 8 fields.
IPv4 is subdivided into classes <A-E>. IPv6 is classless.
network
ISP have IPv4 connectivity or have both IPv4 and Many ISP don't have IPv6 connectivity
IPv6
Non equal geographical distribution (>50% USA) No geographic limitation
RARP
RARP-RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine
in a local area network can request to learn its IP address from a gateway server's Address
Resolution Protocol (ARP) table or cache. A network administrator creates a table in a local area
network's gateway router that maps the physical machine (or Media Access Control - MAC
address) addresses to corresponding Internet Protocol addresses.
UNIVERSITY QUESTIONS
2 MARKS
1. Write down any two differences between circuit switching and packet switching. (Q.No
47)
2. Define BGP (Q.No 33)
16 MARKS
1. (i) Differentiate ARP and RARP (8) (Q.No 12)
(ii) Explain OSPF in detail (8) (Q.No 2)
16 MARKS
1. Explain the shortest path algorithm with suitable illustrations (16) (Q.No 2)
2. Explain the distance vector routing algorithm .Mention the limitations of the same (16) (Q.No
1)
2 MARKS
1. Define routing. (Q.NO 50)
16 MARKS
1. Describe distance vector routing (Q.NO 1)
2. Explain multicast routing in detail (Q.NO 9)
16 MARKS
1. With a neat diagram explain Distance vector routing protocol (Q.NO 1)
2. Explain about IPv6? Compare IPv4 and IPv6 (Q.NO 7 & 11)
2 MARKS
1. Define VCI. (Q.NO 7)
2. Give the comparison of unicast,multicast and broadcast routing. (Q.NO 42)
16 MARKS
1. Discuss in detail about open source shortest path routing with neat diagram (Q.NO 2)
2. Discuss in detail about any two multicast routing with neat sketches (Q.NO 9)
37
PREPARED BY: Mr. D. Ramkumar - A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
3. Define AS.
4. Define RIP (or) Express the purpose of RIP?
5. What do you meant by flooding? Or reliable flooding?
6. Elaborate OSPF & list its advantages
7. Compare distance vector routing with link state routing.
8. Define an area.
9. Define BGP.
10. Mention the names of two interdomain routing protocols.
11. What is EGP? Mention its drawbacks.
12. Write the functions of BGP.
13. List the advantages of IPv6 over IPv4. Or difference between IPv4 & IPv6
14. What is multicast?
15. Give the comparison of unicast, multicast and broadcast Routing.
16. Expand DVMRP.
17. Name the strategies used in multicast DVR protocol.
18. What do you meant by PIM?
19. Define the terms PIM-DM & PIM-SM.
20. Define an IGP.
21. Give the comparison between router and switch.
22. Define switches.
23. Give the types of routing table
24. Define metrics
25. Write down any two differences between circuit switching and packet switching.
26. How does a router differ from a bridge?
27. What are the metrics used by routing protocols?
28. Define routing
29. Define VCI
30. Give the comparison of unicast,multicast and broadcast routing
PART- B
39
PREPARED BY: Mr. D. Ramkumar - A.P-CSE