0% found this document useful (0 votes)
15 views25 pages

Unit-3 CN

The document discusses the differences between IPv4 and IPv6. It provides details on IPv4 including its 32-bit address format. It then covers IPv6 and provides its 128-bit address format. The document also lists several differences between IPv4 and IPv6 such as address length, configuration, security features, and representation.

Uploaded by

Db Bhadauria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views25 pages

Unit-3 CN

The document discusses the differences between IPv4 and IPv6. It provides details on IPv4 including its 32-bit address format. It then covers IPv6 and provides its 128-bit address format. The document also lists several differences between IPv4 and IPv6 such as address length, configuration, security features, and representation.

Uploaded by

Db Bhadauria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

COMPUTER shivamkumarsingh@axiscolleges.

in
NETWORKS Faculty ID: EMP333

Notes only for Axis Colleges Students


MCA– 2nd Year (AKTU)

UNIT-3
2023
Differences between IPv4 and IPv6
IPv4
IPv4 address consists of two things that are the network address and the host address. It stands
for Internet Protocol version four. It was introduced in 1981 by DARPA and was the first
deployed version in 1982 for production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation. It is
represented by 4 numbers separated by dots in the range of 0-255, which have to be converted
to 0 and 1, to be understood by Computers. For Example, An IPv4 Address can be written
as 189.123.123.90.
IPv4 Address Format
IPv4 Address Format is a 32-bit Address that comprises binary digits separated by a dot (.).

IPv6
IPv6 is based on IPv4 and stands for Internet Protocol version 6. It was first introduced in
December 1995 by Internet Engineering Task Force. IP version 6 is the new version of Internet
Protocol, which is way better than IP version 4 in terms of complexity and efficiency. IPv6 is
written as a group of 8 hexadecimal numbers separated by colon (:). It can be written as 128 bits
of 0s and 1s.
IPv6 Address Format
IPv6 Address Format is a 128-bit IP Address, which is written in a group of 8 hexadecimal
numbers separated by colon (:).
Difference Between IPv4 and IPv6
IPv4 IPv6

IPv4 has a 32-bit address length IPv6 has a 128-bit address length

It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration

In IPv4 end to end, connection integrity


In IPv6 end-to-end, connection integrity is Achievable
is Unachievable

The address space of IPv6 is quite large it can produce


It can generate 4.29×109 address space
3.4×1038 address space

The Security feature is dependent on


IPSEC is an inbuilt security feature in the IPv6 protocol
the application

Address representation of IPv4 is in


Address Representation of IPv6 is in hexadecimal
decimal

Subnetting in Computer Networks


In this tutorial, we will learn about Subnetting in Computer Networks Subject. First and foremost,
the most crucial concept we are going to learn today is that while studying the subject of computer
networks is subnetting. The most crucial idea known as Subnetting will help to lessen or disperse
the pressure that the networks' heavy load causes. Let's now quickly go through the idea of
subnetting for everyone.

Now, let us know the definition of Subnetting. But before going into the Subnetting concept let us
know the overview of the concept named Subnetting in Computer Networks.

Subnetting is a part of Network Layer. The duty of the network layer is to divide the received
message into separate components and activities. The Network layer can be called as the heart of
Computer Networks.
Basic idea of the Concept
Finding a network and delivering data to it was simpler when the IP (Internet Protocol) system was
initially implemented since there were fewer individuals online. Sending a data packet to the
desired machine in a network is getting more and more challenging these days due to the rise in
internet users. Network performance becomes a major issue once a network is large enough to
serve an enterprise.

In order to divide larger networks logically (firewalls, etc.) or physically (for example), an
organization can employ IP subnets (smaller broadcast domains, etc.). To put it another way,
routers base their routing choices on subnets. We shall learn more about these ideas in this post.

Introduction to Subnetting
Subnetting is a combination of two words i.e. Sub and Netting. Here Sub word means Substitute and
netting word means Network. The Substitute Network created for a function to happen is known as
Subnetting.

Here, Substitute Network does not mean a new network is created. A full piece of network is broken
into small pieces and each piece a different is assigned.

Purpose of Subnetting in Computer Networks


o Efficiency of the Network

By removing the need for extra routers, subnetting makes network traffic simpler. This makes sure
the data being transmitted can get to its destination as fast as possible, eliminating or avoiding any
potential diversions that may slow it down.

o Provides Network Security

By isolating or removing vulnerable network regions and making it harder for intruders to move
through a company's network, subnetting helps the network managers in reducing network-wide
risks.

o Internet Protocol (IP) Addressing Relocation

Each class has a finite amount of possible host allocations; for instance, networks with more than
254 devices require a Class B allocation. Assume that you are a network administrator. Now, you
have a task of allocating 150 hosts among three physical networks in three distinct cities for a Class
B or C network. If so, we must either ask for additional address blocks for each network or split the
single big network into small parts named subnets so that we could utilize a single address block
across a number of physical networks.
We will learn about this concept deeper in the upcoming topics.

o Reduction of Network Traffic

Placing all of the computers on the same subnet can assist minimize network traffic if a significant
amount of an organization's traffic is intended to be shared routinely among a number of devices.
Without a subnet, all computers and servers on the network would be able to see data packets from
every other machine.

o Network Speed Improvement

The main network is divided into smaller subnets through the process of subnetting, and the goal of
these smaller, linked networks is to split the large network into a collection of smaller, less-busy
networks. Subnets reduce the need for traffic to use unnecessary routes, which speeds up the
network.

o Division of IP Addresses

An IP address is split into its network address and host address via subnetting.

The split address may then be further divided into units using the subnet mask approach, and those
units can be assigned to different network devices.

Here, X refers to the Host ID. This is the only thing which gets changed in the Internet Protocol
Address

Now, we are going to learn how these subnets provide the different addresses to different devices
and also the process of subnetting in computer networks. So, by this example we would easily
understand the working of the Subnet.

We are going to learn how Subnets are formed for Internet Protocol version 4 (IPv4) Addressing.

The IPv4 Addressing has five different classes. They are:

o Class A Network
o Class B Network
o Class C Network
o Class D Network
o Class E Network
The total number of Internet Protocol Addresses (IP Address) gives the total number of Subnets that
can be formed by using a network.

o Class A has 24 Host ID Bits


o Class B has 16 Host ID Bits
o Class C has 8 Host ID Bits

The number of usable IP Addresses that can be created is

The total number of IP Addresses creatable = 2 The total number of


Host ID Bits - 2.

Class A Network can have 224 - 2


Class B Network can have 216 - 2
Class C Network can have 28 - 2
Class D and Class E do not contribute for IP Address
creation.
Class D is used for multicasting purpose
Class E is used for Address Range Calculator

They are saved for future purposes.

Class Total Number of Hosts that can Total Number of IP Addresses Total Number of IP Total Number
Network be accommodated Formula Substitution Addresses of IP
Addresses in
Words

Class A 224 224 - 2 1, 67, 77, 214 One Crore


Sixty Seven
Lakhs Seventy
Seven
Thousand Two
Hundred And
Thirty Four

Class B 216 216 - 2 65, 534 Sixty Five


Thousand Five
Hundred and
Thirty Four

Class C 28 28 - 2 254 Two Hundred


And Fifty Four

Subnetting
We have arrived at the subject at hand, Subnetting, thanks to the problem of IP address waste. By
taking bits from the Host ID section of the address, subnetting enables the creation of smaller
networks (sub networks; subnets) within of a larger network. With the help of those borrowed bits,
we can build more networks with a reduced overall size.

A Subnet is created from the bits taken from the Host ID.

To understand about this concept let take an example of a network this belongs to class C.

Our goal is to create to build a network. The capacity of each network must be Thirty (30) Devices.
We have three networks of type Class C Network based on IPv4 Addressing.

Each Class C Network can provide Two Hundred and Fifty Four (254) Internet Protocol Addresses.

The Capacity of each device which we require is very less than the Capacity which we require.

So, now we divide the four networks based on the requirement. Let us see how this division
happens.

We have four Class C Networks of imaginary Internet Protocol (IP) Addresses like:

1. Network 1 : 255.147.1.0
2. Network 2 : 255.147.2.0
3. Network 3 : 255.147.3.0
4. Network 4 : 255.147.4.0

We know that each network can produce 254 IP Addresses alone. This means four networks can
produce 254 * 4 = 1016 (Thousand and Sixteen ) Internet Protocol Addresses can be formed. But
what we require is only thirty Internet Protocol Addresses from each Network. This means we only
need hundred and Twenty (120) IP Addresses only.

This means 1016 - 120 = 896

Eight Hundred and Ninety-Six Addresses created are wasted. So, we need to use the Host ID bits
wisely.
So, by some calculation we will get to know that if we take 5 bits from each network we will be able
to get 30 IP Addresses from each Network.

The formula for number of IP Addresses is:

The total number of IP Addresses creatable = 2 The total number of Host ID Bits - 2.

So, now we will consider 5 Host ID Bits.

25 - 2 = 30 Internet Protocol Addresses from each Network.

So, by considering we can create 30 Usable IP Addresses from each Class C Network.

So, now we have 3 more Host ID Bits left over unused. We also have different ways in
using these remaining bits.

Other Ways are:


1. These remaining Host ID Bits can be used to increase the capacity of the IP Addresses to be
created in future, if required.
2. We can also create a new six subnets from each network using these three Host ID Bits.

First method is usually chosen because creation of two different subnets causes wastage of IP
Addresses. Let me explain this problem with the help of the above example.

Example:

The network belongs to Class C Network which has 8 Host ID Bits.


In the above first created Subnet we have only used 30 IP Addresses only.
In the newly created Subnet we have created only 6 IP Addresses only.
This means we have used the full potential of the Class C Network. We might have
used the whole 8 bits. But, this is considered as wastage of resources.
This is called wastage because we have now a capacity of 36 IP Addresses to be
created.
But, the actual capacity of the Class C is 254 IP Addresses.
This means 254 - 36 = 218 IP Addresses are wasted now because of this Host ID
Bits Division.
So, it is better to save the remaining Host ID Bits for future purpose rather than
dividing it for these kind of resource wasting purpose.
Working of Subnets in Computer Networks
Subnetting, as we all know, separates the network into small subnets. While each subnet permits
communication between the devices connected to it, subnets are connected together by routers.
The network technology being utilized and the connectivity requirements define the size of a
subnet. Each organization is responsible for selecting the number and size of the subnets it
produces, within the constraints of the address space available for its use.

o For the construction of the subnets, we usually check the MSB (Most Significant Bit) bits of
the host ID and if found wrong we make it right. In order to create two network subnets, we
fix one of the host's MSB (Most Significant Bit) bits in the table below. We are unable to alter
network bits since doing so would alter the entire network.

We need a subnet mask to identify a subnet, which is created by substituting the


number "1" for each Network ID bit and the amount of bits we reserve for Host ID to
create the subnet. A data packet from the internet is intended to be forwarded to the
specified subnet network using the subnet mask.

A part of an address should be used as the Subnet ID is also specified by the subnet mask. In order
to apply the subnet mask to the whole network address, a binary AND operation is utilized. When
performing an AND operation, it is assumed that the result will be "true" if both inputs are. If not,
"false" is presented. This is only possible when both bits are 1.

The Subnet ID results from this. The Subnet ID is used by routers to choose the best route among
the sub - networks.
o The two components that make up an IP address are the Network Prefix
(sometimes called the Network ID) and the Host ID. Depending on whether the
address is Class A, B, or C, either the Network Prefix or the Host ID must be
separated. A Class B IPv4 address, 172.16.37.5, is seen in the image below. The
Network Prefix is 172.16.0.0, and the Host ID is 37.5.

o We use permutations to the amount of bits set aside to form subnets if we wish
to produce subnets of varied length. Variable Length Subnet Masking is the
name of this subnetting (VLSM).
o After setting aside some bits to indicate the subnet, the broadcast address of a
subnet is computed by setting all the remaining bits of the host id to 1.The
message is sent to all network hosts using the broadcast address.

Advantages of Subnetting
o Subnetting is used to decrease the presence of Internet Protocol (IP) range.
o Subnets helps in stopping the devices or gadgets from occupying the whole
network, only allowing the hosts to control which kind of user can have access to
the important information. Simply, we can tell that network is safe just because
of the subnetting concept.
o Subnetting concept increases the performance of the total network by deleting
the repeated traffic causing errors.
o We can convert the whole big network into smaller networks by using the
concept of subnetting as discussed earlier.

Disadvantages of Subnetting
o If the number of subnets increases, then the number of routers must also
increase along with the subnet increase number. This happens because each
subnet has its own subnet mask, broadcast address and network address.
o As told earlier, if we create many subnets many IP Addresses are wasted because
of the wastage of Host ID Bits
o The cost of the entire network is increased by subnetting, which calls for the
acquisition of pricey internal routers, switches, hubs, and bridges, among other
things.
o The complexity of the network is increased through subnetting. The subnet
network must be managed by a skilled network administrator.

ARP, Reverse ARP(RARP), Inverse ARP


(InARP), Proxy ARP and Gratuitous ARP

1. Address Resolution Protocol (ARP) –

Address Resolution Protocol is a communication protocol used for discovering


physical address associated with given network address. Typically, ARP is a
network layer to data link layer mapping process, which is used to discover
MAC address for given Internet Protocol Address. In order to send the data to
destination, having IP address is necessary but not sufficient; we also need the
physical address of the destination machine. ARP is used to get the physical
address (MAC address) of destination machine.
Before sending the IP packet, the MAC address of destination must be known.
If not so, then sender broadcasts the ARP-discovery packet requesting the
MAC address of intended destination. Since ARP-discovery is broadcast,
every host inside that network will get this message but the packet will be
discarded by everyone except that intended receiver host whose IP is
associated. Now, this receiver will send a unicast packet with its MAC address
(ARP-reply) to the sender of ARP-discovery packet. After the original sender
receives the ARP-reply, it updates ARP-cache and start sending unicast
message to the destination.

2. Reverse Address Resolution Protocol (RARP) –

Reverse ARP is a networking protocol used by a client machine in a local area


network to request its Internet Protocol address (IPv4) from the gateway-
router’s ARP table. The network administrator creates a table in gateway-
router, which is used to map the MAC address to corresponding IP address.
When a new machine is setup or any machine which don’t have memory to
store IP address, needs an IP address for its own use. So the machine sends
a RARP broadcast packet which contains its own MAC address in both sender
and receiver hardware address field.
A special host configured inside the local area network, called as RARP-server
is responsible to reply for these kind of broadcast packets. Now the RARP
server attempt to find out the entry in IP to MAC address mapping table. If any
entry matches in table, RARP server send the response packet to the
requesting device along with IP address.
 LAN technologies like Ethernet, Ethernet II, Token Ring and Fiber
Distributed Data Interface (FDDI) support the Address Resolution Protocol.
 RARP is not being used in today’s networks. Because we have much
great featured protocols like BOOTP (Bootstrap Protocol) and DHCP(
Dynamic Host Configuration Protocol).

3. Inverse Address Resolution Protocol (InARP) –

Instead of using Layer-3 address (IP address) to find MAC address, Inverse
ARP uses MAC address to find IP address. As the name suggests, InARP is
just inverse of ARP. Reverse ARP has been replaced by BOOTP and later
DHCP but Inverse ARP is solely used for device configuration. Inverse ARP is
enabled by default in ATM(Asynchronous Transfer Mode) networks. InARP is
used to find Layer-3 address from Layer-2 address (DLCI in frame relay).
Inverse ARP dynamically maps local DLCIs to remote IP addresses when you
configure Frame Relay. When using inverse ARP, we know the DLCI of remote
router but don’t know its IP address. InARP sends a request to obtain that IP
address and map it to the Layer-2 frame-relay DLCI.
4. Proxy ARP –

Proxy ARP was implemented to enable devices which are separated into
network segments connected by a router in the same IP network or sub-
network to resolve IP address to MAC addresses. When devices are not in
same data link layer network but are in the same IP network, they try to
transmit data to each other as if they were on the local network.
5. Gratuitous ARP –

Gratuitous Address Resolution Protocol is used in advance network scenarios.


It is something performed by computer while booting up. When the computer
booted up (Network Interface Card is powered) for the first time, it
automatically broadcast its MAC address to the entire network. After
Gratuitous ARP MAC address of the computer is known to every switch and
allow DHCP servers to know where to send the IP address if requested.
Gratuitous ARP could mean both Gratuitous ARP request and Gratuitous ARP
reply, but not needed in all cases. Gratuitous ARP request is a packet where
source and destination IP are both set to IP of the machine issuing the packet
and the destination MAC is the broadcast address ff:ff:ff:ff:ff:ff ; no reply packet
will occur. Gratuitous ARP is ARP-Reply that was not prompted by an ARP-
Request. Gratuitous Address Resolution Protocol is useful to detect IP conflict.
Gratuitous ARP is also used to update ARP mapping table and Switch port
MAC address table.

What is ARP poisoning (ARP spoofing) –

ARP spoofing is a type of network attack in which the attacker sends the
falsified ARP request over the LAN (say to the default gateway), which results
connecting attacker’s MAC address to the legitimate server on that victim
network. Now, the attacker will start receiving the data which was intended for
that IP address. With the help of ARP Poisoning (or ARP Spoofing) attacker is
able to intercept data frames, modify traffic or even stop data in-transit.
ARP poisoning can act as the opening for other major attacks, such as Man in
the middle, denial of service, or session hijacking attacks. We will discuss
about ARP Spoofing later in depth.

Difference between BOOTP and RARP in


Computer Networking
Hello everyone. Today we are here for learning about differences between BOOTP and
RARP in Computer Networking. Before learning about the differences, we need know
about them. So, now let us learn about BOOTP (Bootstrap Protocol) and RARP
(Reverse Address Resolution Protocol) in separate and also in detail.

The BOOTP (Bootstrap Protocol) and RARP (Reverse Address Resolution Protocol) are
required because they mainly help us to connect to devices. They also help us to
communicate between two or more devices or workstations. Regardless of differences
in their working the reason why we use Network Protocols are they help us to
communicate with people who may be anywhere in the world. Thus, these protocols
play an important role in modern digital communications.

Important Abbreviations
1. RARP - - - - > Reverse Address Resolution Protocol
2. BOOTP - - - - > Bootstrap Protocol
3. MAC - - - - > Medium Access Control
4. IP - - - - > Internet Protocol
5. DHCP - - - - > Dynamic Host Configuration Protocol
6. NIC - - - - > Network Interface Card
7. UDP - - - - > User Datagram Protocol
8. LAN - - - - > Large Area Network
9. TCP / IP - - - - > Transmission Control Protocol / Internet Protocol
10. IPv4 - - - - > Internet Protocol version 4
11. BIOS - - - - > Basic Input / Output System

Now let us learn about RARP (Reverse Address Resolution Protocol)

RARP (Reverse Address Resolution Protocol)


RARP is also known as Reverse Address Resolution Protocol. This protocol is used in
Computer Networking. This is used by an employee who is using a computer owned
by the client. They are using it request or get the Internet Protocol (IP) Address from
cache or gateway server Address Resolution Protocol Table. RARP is used to find
logical address of a machine which only has its own physical address. This logical
address is differs from one machine to other machine. These logical addresses are
never same and they never depend on machine hardware parts. The Internet Protocol
(IP) Address is known from the file configuration present on a disk file.

This protocol is used to transmit data between two server-side sites. The client does
not necessary need to be aware of the identity of the server before making a request.
Administrators must configure each server individually for Medium Access Control
(MAC) addresses. RARP (Reverse Address Resolution Protocol) is very useful for
providing IP addresses.

The RARP client application requests an IP (Internet Protocol) address from the RARP
(Reverse Address Resolution Protocol) server on the router when a replacement
machine is set up since the machine may or may not have an associated disc that may
permanently retain the IP Address. In the event that a router table entry has been
configured, the RARP (Reverse Address Resolution Protocol) server will send the
machine's IP address.

The device can learn its physical address, which is specific to the area (by reading its
NIC (Network Interface Card , for instance). The RARP (Reverse Address Resolution
Protocol) protocol may then be used to obtain the logical address using the physical
address. On the local network, a RARP request is generated and broadcast.

An additional device on the local network that is aware of every IP address will reply
with a RARP (Reverse Address Resolution Protocol) answer. A RARP (Reverse Address
Resolution Protocol) client software must be running on the requesting system; the
RARP server software must be running on the replying system.
Broadcasting occurs at the data connection layer, which is a severe flaw with RARP.
The Physical broadcast addresses do not cross network borders, as is the case with
Ethernet.

History of RARP (Reverse Address Resolution Protocol)


The Reverse Address Resolution Protocol was initialized in the year 1984. This Reverse
Address Resolution Protocol is the protocol which is used to give the Internet Protocol
(IP) Address to the server or desktop or computer etc. These server or desktop or
computer etc can all be simply called as workstations.

So, the simple diskless workstations are also the platform for the primary workstations
from the company named Sun Microsystems.

Working of RARP (Reverse Address Resolution Protocol)


The Reverse Address Resolution Protocol is used to transfer data between two sources
or two client servers on the Network Access Layer. The sources have two different
addresses. They are Internet Protocol (IP) Address and Media Access Control (MAC)
Address.

The MAC address is then pre-programmed into the hardware once the IP address has
been assigned by software.

The RARP server, which responds to RARP (Reverse Address Resolution Protocol)
requests, can be any standard computer that is connected to the network. However, it
must record all MAC (Media Access Control) addresses and the Internet Protocol (IP)
addresses that correspond to them. The network can only reply to RARP (Reverse
Address Resolution Protocol) queries from these RARP (Reverse Address Resolution
Protocol) servers. It is necessary to send the data packet through relatively low-cost
network tiers. This means that each participant receives the package at the same time.

Advantages of RARP (Reverse Address Resolution Protocol)


The Advantages are:

1. RARP (Reverse Address Resolution Protocol) is avails oneself for changing


Ethernet Address to a simple Internet Protocol (IP) Address.
2. It is useful for Large Area Networks (LAN) derived technologies.
Disadvantages of RARP (Reverse Address Resolution Protocol)
The Disadvantages are

1. RARP (Reverse Address Resolution Protocol) server should always be situated at


the same physical network
2. RARP (Reverse Address Resolution Protocol) cannot configure the Computer of a
very modern network.
3. The computer uses a very fundamental network layer to transmit the RARP
(Reverse Address Resolution Protocol) A router cannot transmit the packet
because the computer sends the RARP (Reverse Address Resolution Protocol)
request on the network's most fundamental layer.
4. The RARP (Reverse Address Resolution Protocol) is unable to control the sub
netting process since no subnet masks are transmitted. If the network includes
more than one subnet, each subnet must have access to a RARP server
5. It doesn't fully use the potential of an Ethernet-style network.

These are reasons why The RARP (Reverse Address Resolution Protocol) is not widely
used now. The RARP (Reverse Address Resolution Protocol) has been replaced. It is
replaced by Bootstrap Protocol (BOOTP) and Dynamic Host Configuration Protocol
(DHCP).

Now, let us know why RARP (Reverse Address Resolution Protocol) is obsolete

Why is RARP (Reverse Address Resolution Protocol) is obsolete


?
Here, obsolete means no longer useful. We already know that the RARP (Reverse
Address Resolution Protocol) has been replaced. It was replaced by Bootstrap Protocol
(BOOTP) and Dynamic Host Configuration Protocol (DHCP). Let us know in detail why
was it replaced.

Actually RARP (Reverse Address Resolution Protocol) is widely used on Ethernet


services. They were also extensively used in Token Rings Large Area Networks. RARP
(Reverse Address Resolution Protocol) is created for sending or providing Internet
Protocol (IP) Address for other devices.
As RARP (Reverse Address Resolution Protocol) was created to solely deliver Internet
Protocol (IP) address information to devices that are either not statically allocated an
Internet Protocol (IP) address or lack the internal storage space to keep one locally, it
only provides a minimal service. From a Large Area Network (LAN) access standpoint,
Bootstrap Protocol and Dynamic Host Configuration Protocol have essentially
replaced RARP. Both protocols are more feature-rich and scale well on contemporary
Large Area Networks (LANs) with several IP subnets.

However, RARP has returned to the workplace thanks to server and data center
virtualization. For example, a crucial feature utilized for high-availability in the virtual
machine is the capability to immediately shift a virtual server from one physical host
to another, either inside the same physical data center or in another data center (VM).

BOOTP (Bootstrap Protocol)


BOOTP is also known as Bootstrap Protocol. This Protocol is used in Computer
Networking. Bootstrap Protocol (BOOTP) is a protocol. This protocol works on the
basis of internet. So, this is the reason why it is called as an Internet Protocol (IP). This
is used for allowing the network user to receive an Internet Protocol (IP) Address. The
network user immediately configures the received Internet Protocol (IP) Address. This
lets the Booting of an Operating System to happen without external involvement or
user collusion.

The BOOTP (Bootstrap Protocol) requires a server to be executed. This server will be
taken care by an Network Admin. This server is used for allowing the network user to
receive an Internet Protocol (IP) Address. The network user immediately configures the
received Internet Protocol (IP) Address. This lets the Booting of an Operating System
to happen without external involvement or user collusion.

History of BOOTP (Bootstrap Protocol)


The BOOTP (Bootstrap Protocol) was actually introduced in 1985 because of Request
for Comments 951 (also known as RFC 951) to replace Reverse Address Resolution
Protocol (RARP). This Protocol requires servers to be present on the every server
Internet Protocol (IP) Address. By using BOOTP (Bootstrap Protocol) , a central BOOTP
(Bootstrap Protocol) server can exist for many sub nets.

Today, BOOTP (Bootstrap Protocol) is carried out via User Datagram Protocol (UDP),
which forms the basis for Dynamic Host Configuration Protocol (DHCP). Dynamic Host
Configuration Protocol (DHCP) servers handle client requests.
Features of BOOTP (Bootstrap Protocol)
1. BOOTP (Bootstrap Protocol) is a dynamic protocol.
2. BOOTP (Bootstrap Protocol) is also known as a basic protocol
3. BOOTP (Bootstrap Protocol) job is to create an unique Internet Protocol (IP)
address for recognition and corroboration as soon as it is connected to the
network. The BOOTP (Bootstrap Protocol) is very helpful as it speeds up the data
transfer and connection requests.
4. BOOTP (Bootstrap Protocol) is an unique Internet Protocol (IP) algorithm. This
algorithm helps in providing and creating new Internet Protocol (IP) Addresses
and they are completely different and they also have no link between the
previous created Internet Protocol (IP) Addresses. The Internet Protocol (IP)
Addresses are created very fast in a fraction of second.
5. This algorithm also helps to reduce the time required which is required for
connection for source server and the client server.
6. Now, the main and important processes like downloading and changing the
already present values or codes are done. Even the small processes are also
updated so that they would never cause problems in the near future.
7. The BOOTP (Bootstrap Protocol) connection requires Internet Protocol (IP)
Address are required for the client server and the source server and they require
a gateway address for get going of successful connection. In BOOTP (Bootstrap
Protocol) Network the client and the source server use the same Large Area
Network (LAN) , and the routers must support BOOTP (Bootstrap Protocol) So ,
for that routers are always kept under same networks
8. A great example of a TCP / IP (Transmission Control Protocol / Internet Protocol)
based network is the BOOTP (Bootstrap Protocol) network. To quickly respond to
each request a computer on the network makes to the server, BOOTP (Bootstrap
Protocol) utilizes its own IP address.

Working of BOOTP (Bootstrap Protocol)


The BOOTP (Bootstrap Protocol) works in this manner:

1. Actually new network participant will not have an Internet Protocol (IP) Address.
Then, the Network Admin who is the administrator of BOOTP (Bootstrap
Protocol) gives access to the new network participant to host server. Now, the
new network participant get a distinct or idiosyncratic Internet Protocol (IP)
Address via IPv4 (Internet Protocol version 4) protocol.
2. The client or the new network participant installs the new BOOTP (Bootstrap
Protocol) using TCP / IP (Transmission Control Protocol / Internet Protocol)
mode. This mode arbitration on the user workstation to ensure affinity with all
the network protocols when connected to the certain network.
3. An appropriate unicast address is then included in a message that is sent by the
BOOTP network administrator. The master server then forwards this unicast
address to the BOOTP client.

Uses of BOOTP (Bootstrap Protocol)


The uses are:

1. BOOTP (Bootstrap Protocol) is required for system check purpose. The System is
checked for a network when the computer is turned on
2. The motherboard and network management are able to efficiently organize the
data transfer on the device as soon as it lights up since each computer on the
network maintains track of its BIOS (Basic Input / Output System) cycle.
3. BOOTP (Bootstrap Protocol) is highly used for the support of usage of
motherboards and mangers which work on Network. So, because of this
protocol no other means storage is required other than cloud network.
4. In order to send and receive requests and the networking server's suitable
responses, a client and a server communicate using BOOTP (Bootstrap Protocol).
5. BOOTP is typically used in a diskless environment and requires no media
because all data is kept in the network cloud for effective utilization.

Disadvantages of BOOTP (Bootstrap Protocol)


The disadvantages are

1. They do not have the concept of temporary Internet Protocol (IP) Addressing.
2. BOOTP (Bootstrap Protocol) can also have irresolvable errors because of its
configuration. This is because their configuration is manual.
3. BOOTP (Bootstrap Protocol) does not support DHCP (Dynamic Host
Configuration Protocol)
4. BOOTP (Bootstrap Protocol) cannot function for mobile phones and movable
machines.

Difference between BOOTP and RARP in computer


networking
Serial RARP BOOTP
Number

1.) RARP full form is Reverse Address Resolution Protocol BOOTP full form is Bootstrap
Protocol

2.) This is used by an employee who is using a computer owned by the client. This protocol works on the basis
They are using it request or get the Internet Protocol (IP) Address from of internet. So, this is the reason
cache or gateway server Address Resolution Protocol Table why it is called as an Internet
Protocol (IP). This is used for
allowing the network user to
receive an Internet Protocol (IP)
Address.

3.) The Reverse Address Resolution Protocol was initialized in the year 1984. The BOOTP (Bootstrap Protocol)
This Reverse Address Resolution Protocol is the protocol which is used to was actually introduced in 1985
give the Internet Protocol (IP) Address to the server or desktop or because of Request for
computer etc Comments 951 (also known as
RFC 951) to replace Reverse
Address Resolution Protocol
(RARP).

4.) It is one of the first version introduced for the purpose of Internet Protocol It is introduced as the anomalies
(IP) in RARP (Reverse Address
Resolution Protocol ) were
causing damage to the works.

5.) It uses dynamically discovered routers It uses statically discovered


routers

6.) They are very risky because they are very unstable in nature. They are very secure because
they are very stable in nature

7.) BOOTP is not obsolete because BOOTP and DHCP replaces RARP as it is RARP is very obsolete
very obsolete.
8. The Reverse Address Resolution Protocol is used to transfer data between A great example of a TCP / IP
two sources or two client servers on the Network Access Layer. The (Transmission Control Protocol /
sources have two different addresses. They are Internet Protocol (IP) Internet Protocol) based network
Address and Media Access Control (MAC) Address. is the BOOTP (Bootstrap
The MAC address is then pre-programmed into the hardware once the IP Protocol) network. To quickly
address has been assigned by software. respond to each request a
computer on the network makes
to the server, BOOTP (Bootstrap
Protocol) utilizes its own IP
address.

9. Today, RARP is not in usage. So, they are replaced by BOOTP , DHCP , IPv4 Today, BOOTP (Bootstrap
Protocols. Protocol) is carried out via User
Datagram Protocol (UDP), which
forms the basis for Dynamic Host
Configuration Protocol (DHCP).
Dynamic Host Configuration
Protocol (DHCP) servers handle
client requests

Differences between Intradomain and


Interdomain Routing
In this section, we shall discuss how Intra-domain Routing is different from Inter-domain
Routing. Intra domain is any protocol in which Routing algorithm works only within domains on
the other hand Inter domain is any protocol in which Routing algorithm works within and
between domains. Let us see the differences between Intradomain and Interdomain:

S.No Intradomain Routing Interdomain Routing

Routing algorithm works only within Routing algorithm works within and between
1. domains. domains.

It need to know only about other routers It need to know only about other routers
2. within their domain. within and between their domain.

Protocols used in intradomain routing are Protocols used in interdomain routing are
3. known as Interior-gateway protocols. known as Exterior-gateway protocols.

In this Routing, routing takes place within In this Routing, routing takes place between
4. an autonomous network. the autonomous networks.

Intradomain routing protocols ignores the Interdomain routing protocol assumes that the
5. internet outside the AS(autonomous internet contains the collection of
system). interconnected AS(autonomous systems).

Some Popular Protocols of this routing are Popular Protocols of this routing is BGP(Border
RIP(routing information protocol) and Gateway Protocol) used to connect two or
6. OSPF(open shortest path first). more AS(autonomous system).

You might also like