0% found this document useful (0 votes)
23 views40 pages

Routing

Uploaded by

Sipu Choudhury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views40 pages

Routing

Uploaded by

Sipu Choudhury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Routing

•A Router is a process of selecting path along which the data can


be transferred from source to the destination. Routing is
performed by a special device known as a router.
•A Router works at the network layer in the OSI model and
internet layer in TCP/IP model
•A router is a networking device that forwards the packet based
on the information available in the packet header and forwarding
table.
•The routing algorithms are used for routing the packets. The
routing algorithm is nothing but a software responsible for
deciding the optimal path through which packet can be
transmitted.
•The routing protocols use the metric to determine the best
path for the packet delivery. The metric is the standard of
measurement such as hop count, bandwidth, delay, current
load on the path, etc. used by the routing algorithm to
determine the optimal path to the destination.
•The routing algorithm initializes and maintains the routing
table for the process of path determination.
Routing Metrics and Costs
• Routing metrics and costs are used for determining the best
route to the destination. The factors used by the protocols to
determine the shortest path, these factors are known as a
metric.
• Metrics are the network variables used to determine the best
route to the destination. For some protocols use the static
metrics means that their value cannot be changed and for
some other routing protocols use the dynamic metrics means
that their value can be assigned by the system administrator.
The most common metric values:
Hop count:
• Hop count is defined as a metric that specifies the number of
passes through internetworking devices such as a router, a
packet must travel in a route to move from source to the
destination.
• If the routing protocol considers the hop as a primary metric
value, then the path with the least hop count will be
considered as the best path to move from source to the
destination.
Delay:
• It is a time taken by the router to process, queue and transmit
a datagram to an interface.
• The protocols use this metric to determine the delay values
for all the links along the path end-to-end.
• The path having the lowest delay value will be considered as
the best path.
Bandwidth:
• The capacity of the link is known as a bandwidth of the
link. The bandwidth is measured in terms of bits per
second.
• The link that has a higher transfer rate like gigabit is
preferred over the link that has the lower capacity like 56
kb.
• The protocol will determine the bandwidth capacity for all
the links along the path, and the overall higher bandwidth
will be considered as the best route.
Load:
• Load refers to the degree to which the network resource
such as a router or network link is busy.
• A Load can be calculated in a variety of ways such as
CPU utilization, packets processed per second.
• If the traffic increases, then the load value will also be
increased. The load value changes with respect to the
change in the traffic.
Reliability:
• Reliability is a metric factor may be composed of a fixed
value.
• It depends on the network links, and its value is measured
dynamically. Some networks go down more often than
others. After network failure, some network links repaired
more easily than other network links.
• Any reliability factor can be considered for the assignment
of reliability ratings, which are generally numeric values
assigned by the system administrator.
Routing Information
Protocol (RIP)
Routing Information Protocol (RIP)
• Routing Information Protocol (RIP) is a dynamic routing
protocol that uses hop count as a routing metric to find the
best path between the source and the destination network.
• It is a distance-vector routing protocol that has an AD value
of 120 and works on the Network layer of the OSI model.
RIP uses port number 520.
Features of RIP
• Updates of the network are exchanged periodically.
• Updates (routing information) are always broadcast.
• Full routing tables are sent in updates.
• Routers always trust routing information received from
neighbor routers.
Hierarchical Routing
• When network size is growing, the number of routers in
the network will increase. Therefore, the size of routing
table increases, then routers cannot handle network traffic
as efficiently. To overcome this problem we are using
hierarchical routing.
• In hierarchical routing, the routers are divided into
regions.
• Each router has complete details about how to route
packets to destinations within its own region. But it does
not have any idea about the internal structure of other
regions.
• In hierarchical routing, routers are classified in groups
called regions. Each router has information about the
routers in its own region and it has no information about
routers in other regions. So, routers save one record in their
table for every other region.
• For huge networks, a two-level hierarchy may be
insufficient hence, it may be necessary to group the regions
into clusters, the clusters into zones, the zones into groups
and so on.
Multicast Routing

• Multicast routing is a networking method for efficient


distribution of one-to-many traffic.
• A multicast source, such as a live video conference, sends
traffic in one stream to a multicast group.
• The multicast group contains receivers such as computers,
devices, and IP phones.
• Multicast routing uses the Protocol-Independent Multicast
(PIM) protocol.
• There are different variants of this protocol. Your Firebox
supports PIM Sparse Mode (PIM-SM) which is used when
only a few devices subscribe to the multicast.
• These devices are multicast receivers. Receivers can be
located anywhere in the world, on any network, and
compose the multicast group logical group.
In this diagram, a server sends multicast traffic through a router and the Firebox.
The Firebox forwards the multicast traffic to the multicast group on the local network.
Common uses include these technologies:
•Voice over IP (VOIP)
•Video on demand (VOD)
•Video conferencing
•IP television (IPTV)
FTP
• FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used
for transmitting the files from one host to another.
• It is mainly used for transferring the web page files from their
creator to the computer that acts as a server for other
computers on the internet.
• It is also used for downloading the files to computer from
other servers.
Objectives of FTP
• It provides the sharing of files.
• It is used to encourage the use of remote computers.
• It transfers the data more reliably and efficiently.
Control Connection:
• The control connection uses very simple rules for
communication. Through control connection, we can
transfer a line of command or line of response at a
time.
• The control connection is made between the control
processes. The control connection remains connected
during the entire interactive FTP session.
Data Connection:
• The Data Connection uses very complex rules as data types
may vary. The data connection is made between data transfer
processes.
• The data connection opens when a command comes for
transferring the files and closes when the file is transferred.
FTP Clients
• FTP client is a program that implements a file transfer protocol
which allows you to transfer files between two hosts on the internet.
• It allows a user to connect to a remote host and upload or download
the files.
• It has a set of commands that we can use to connect to a host,
transfer the files between you and your host and close the
connection.
• The FTP program is also available as a built-in component in a Web
browser. This GUI based FTP client makes the file transfer very easy
and also does not require to remember the FTP commands.
Advantages of FTP:
• Speed: One of the biggest advantages of FTP is speed. The FTP is one of the
fastest way to transfer the files from one computer to another computer.
• Efficient: It is more efficient as we do not need to complete all the operations
to get the entire file.
• Security: To access the FTP server, we need to login with the username and
password. Therefore, we can say that FTP is more secure.
• Back & forth movement: FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send some information to all
the employees, and they all send information back on the same server.
Disadvantages of FTP:
• The standard requirement of the industry is that all the FTP transmissions
should be encrypted. However, not all the FTP providers are equal and not all
the providers offer encryption. So, we will have to look out for the FTP
providers that provides encryption.
• FTP serves two operations, i.e., to send and receive large files on a network.
However, the size limit of the file is 2GB that can be sent. It also doesn't allow
you to run simultaneous transfers to multiple receivers.
• Passwords and file contents are sent in clear text that allows unwanted
eavesdropping. So, it is quite possible that attackers can carry out the brute
force attack by trying to guess the FTP password.
• It is not compatible with every system.
TFTP (Trivial File Transfer Protocol)
• TFTP stands for Trivial File Transfer Protocol. TFTP is defined as a
protocol that is used to transfer a file from a client to a server and from
a server to a client.
• TFTP is majorly used when no complex interactions are required by
the client and server.
• The service of TFTP is provided by UDP (User Datagram Protocol)
and works on port number 69. TFTP does not provide security features
therefore it is not used in communications that take place over the
Internet. Therefore it is used only for the systems that are set up on the
local internet. TFTP requires less amount of memory.
TFTP Message Formats
There are four types of TFTP Message formats. They are as
follows
1. Read Request:
2. Write Request:
3. Data
4. Acknowledgement
Advantages of TFTP
• TFTP Protocol makes use of User Datagram Protocol (UDP).
• TFTP requires less amount of memory.
• TFTP is simple to implement.
• TFTP is supported by many network devices such as routers, firewalls,
and switches.
• TFTP has low overhead as compared to other protocols and therefore
can be used for low-bandwidth networks.
• TFTP can transfer small files such as boot files, and firmware images
more fastly.
Disadvantages of TFTP
• TFTP does not provide any security features
• TFTP does not provide any approach for error checking.
• TFTP can be used for limited functionalities only.
• TFTP servers do not allow the renaming and deletion of files.
Applications of TFTP
• TFTP is used to transfer files within clients and sever
connected in a network.
• TFTP is used to transfer the configuration files within the
network.
• TFTP is used to update the firmware on the devices
connected to the network
• TFTP is used in applications where no authentication is
required.
Domain Name System (DNS)
• Domain Name System (DNS) is a hostname for IP
address translation service.
• DNS is a distributed database implemented in a
hierarchy of name servers.
• It is an application layer protocol for message
exchange between clients and servers. It is required for
the functioning of the Internet.
Types of Domain
1.Generic domains:
.com(commercial), .edu(educational), .mil(military),
.org(nonprofit organization), .net(similar to commercial) all
these are generic domains.
2. Country domain: .in (India) .us .uk
HTML
• HTML stands for Hyper Text Markup Language, which is
the most widely used language on Web to develop web
pages.
• HTML was created by Berners-Lee in late 1991 but "HTML
2.0" was the first standard HTML specification which was
published in 1995. HTML 4.01 was a major version of
HTML and it was published in late 1999. Though HTML 4.01
version is widely used but currently we are having HTML-5
version which is an extension to HTML 4.01, and this version
was published in 2012.
World Wide Web
• WWW stands for World Wide Web. A technical definition of the
World Wide Web is : all the resources and users on the Internet that
are using the Hypertext Transfer Protocol (HTTP).
• A broader definition comes from the organization that Web
inventor Tim Berners-Lee helped found, the World Wide Web
Consortium (W3C).
• The World Wide Web is the universe of network-accessible
information, an embodiment of human knowledge.
• In simple terms, The World Wide Web is a way of exchanging
information between computers on the Internet, tying them together
into a vast collection of interactive multimedia resources.
HTTP
• The Hypertext Transfer Protocol (HTTP) is an application-
level protocol for distributed, collaborative, hypermedia
information systems.
• This is the foundation for data communication for the World
Wide Web (i.e. internet) since 1990. HTTP is a generic and
stateless protocol which can be used for other purposes as
well using extensions of its request methods, error codes, and
headers.
• HTTP is a TCP/IP based communication protocol, that is used
to deliver data (HTML files, image files, query results, etc.) on
the World Wide Web.
• The default port is TCP 80, but other ports can be used as well.
• It provides a standardized way for computers to communicate
with each other.
• HTTP specification specifies how clients' request data will be
constructed and sent to the server, and how the servers respond
to these requests.

You might also like