Unit4 Computernetworks
Unit4 Computernetworks
Unicast routing and multicast routing are two different approaches to forwarding data packets
in a network. Here's an explanation of each:
1. Unicast Routing: Unicast routing is the most common form of routing in computer
networks. In unicast routing, a single packet is sent from a source to a single
destination host. Each packet traverses through the network, following a specific path
determined by routing protocols and routing tables.
The primary objective of unicast routing protocols is to find the best path between the source
and destination hosts. These protocols exchange routing information between routers,
allowing them to build and maintain routing tables that contain the best routes to various
destinations.
IPv4: RIP (Routing Information Protocol), OSPF (Open Shortest Path First), EIGRP
(Enhanced Interior Gateway Routing Protocol), and BGP (Border Gateway Protocol).
IPv6: RIPng (RIP next generation), OSPFv3, IS-IS (Intermediate System to
Intermediate System), and BGP.
Unicast routing is suitable for applications like web browsing, file transfers, and client-server
communication, where data needs to be delivered to a specific destination.
In multicast routing, a source sends a single copy of the data to a specific multicast group
address. Routers replicate the data and forward it to all interested receivers that have joined
the multicast group. This process is facilitated by multicast routing protocols, which manage
the distribution of multicast data across the network.
Multicast routing is particularly useful for applications that involve one-to-many or many-to-
many communication, such as video conferencing, live streaming, online gaming, and
software updates.
The main difference between unicast and multicast routing lies in their delivery mechanisms.
Unicast routing delivers data to a single destination, while multicast routing efficiently
distributes data to multiple recipients simultaneously. Multicast routing conserves network
resources by reducing redundant data transmissions, making it more efficient for group
communication scenarios.
It's important to note that multicast routing requires support from both the network
infrastructure (routers) and the end-hosts (applications), as it relies on specific multicast
protocols and group management mechanisms.
Routing is the process of determining the best path for data packets to travel from a source to
a destination across a computer network. Routers are responsible for forwarding packets
based on the information in their routing tables, which contain the available routes to
different network destinations.
Distance vector routing is a class of routing algorithms that calculate the best path to reach a
destination based on the distance (metric) and the vector (direction) of the path. In distance
vector routing, routers exchange distance vector information with their directly connected
neighbors periodically or when there is a change in the network topology.
1. Initialization: Each router starts with a routing table containing information about its
directly connected networks and the associated cost (metric) for reaching those
networks, typically set to a value of 0.
2. Routing Information Exchange: Routers periodically send their entire routing table to
their directly connected neighbors. This routing information includes the destination
network, the metric (cost) to reach that destination, and the next-hop router to forward
traffic towards that destination.
3. Routing Table Updates: Upon receiving routing information from its neighbors, a
router updates its routing table with the best routes to reach each destination network.
The best route is typically the one with the lowest cumulative cost or metric. To
determine the best route, the router performs the following steps: a. If the received
route has a smaller metric than the existing route in the routing table, the router
updates its routing table with the new, better route. b. If the received route has the
same metric as the existing route, the router may select the newer route or keep the
existing route, depending on the implementation. c. If the received route has a larger
metric than the existing route, the router ignores the new route.
4. Route Propagation: After updating its routing table, the router advertises its new
routing information to its neighbors, allowing the changes to propagate throughout the
network.
5. Convergence: The process of updating routing tables and propagating routing
information continues until all routers in the network have converged to a consistent
view of the network topology and the best routes to reach each destination.
Distance vector routing algorithms are relatively simple and efficient for small to medium-
sized networks. However, they can suffer from issues such as slow convergence, routing
loops, and limited scalability in large networks due to the periodic exchange of full routing
tables and the counting-to-infinity problem.
Examples of distance vector routing protocols include:
Routing Information Protocol (RIP): A widely used distance vector protocol in IPv4
networks, with a maximum hop count of 15 as the metric.
RIPng (RIP next generation): The distance vector routing protocol for IPv6 networks.
Interior Gateway Routing Protocol (IGRP): A proprietary distance vector protocol
developed by Cisco Systems.
While distance vector routing algorithms are still in use, link-state routing protocols like
Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS) are
more commonly used in modern large-scale networks due to their better scalability, faster
convergence, and more advanced features.
Routing is the process of determining the best path for data packets to travel from a source to
a destination across a computer network. Routers are responsible for forwarding packets
based on the information in their routing tables, which contain the available routes to
different network destinations.
Link-state routing is a routing algorithm that is widely used in modern computer networks.
Unlike distance vector routing, which focuses on the distance or metric to reach a destination,
link-state routing focuses on the state of the network links and the topology of the entire
network.
1. Network Discovery: Each router in the network discovers its directly connected
neighbors and the state of the links connecting them. This information includes the
link type, bandwidth, delay, and other relevant metrics.
2. Link-State Advertisement (LSA): Each router generates a Link-State Advertisement
(LSA) or Link-State Packet (LSP) that contains information about its directly
connected links and the state of those links. The router then floods this LSA to all
other routers in the network using a reliable flooding mechanism.
3. Link-State Database (LSDB): As routers receive LSAs from other routers, they store
this information in a local Link-State Database (LSDB). The LSDB contains a
complete map of the network topology, including all routers, links, and their states.
4. Shortest Path First (SPF) Calculation: Each router independently calculates the
shortest path to every other router in the network based on the information in its
LSDB. This calculation is performed using an algorithm like Dijkstra's algorithm or
the Shortest Path First (SPF) algorithm.
5. Routing Table Construction: After calculating the shortest paths, each router
constructs its routing table by identifying the next-hop router for each destination
network. The routing table maps destination networks to the appropriate outgoing
interface and next-hop router.
6. Convergence: Once all routers have calculated their routing tables based on the same
consistent LSDB, the network is considered converged, and data packets can be
forwarded along the shortest paths.
7. Topology Changes: When a link or router goes down or comes back up, the affected
routers generate new LSAs to reflect the change in topology. These LSAs are flooded
to all other routers, and the process of updating the LSDB, calculating the shortest
paths, and reconstructing the routing tables is repeated.
Link-state routing protocols offer several advantages over distance vector protocols,
including:
1. Faster convergence: Link-state routing protocols converge more quickly after network
changes due to their efficient flooding mechanism and the calculation of shortest
paths based on the complete network topology.
2. Scalability: Link-state routing protocols scale better in large networks because they
don't require periodic updates of the entire routing table, as in distance vector
protocols.
3. Loop-free routing: Link-state routing protocols inherently avoid routing loops because
they calculate the shortest paths based on the complete network topology.
Open Shortest Path First (OSPF): A widely used link-state routing protocol for IP
networks.
Intermediate System to Intermediate System (IS-IS): A link-state routing protocol
commonly used in service provider networks.
While link-state routing protocols offer advantages in terms of convergence time and
scalability, they also have higher computational and memory requirements compared to
distance vector protocols, as they need to maintain a complete topology database and perform
complex path calculations.
Inter-domain and intra-domain routing are two different concepts in computer networking
that refer to the routing of data packets within and between different administrative domains
or autonomous systems.
In intra-domain routing, the routing protocols are designed to exchange routing information
and calculate the best paths within the autonomous system. These protocols focus on factors
such as network topology, link costs, and other internal metrics to determine the most
efficient routes for packet delivery.
Open Shortest Path First (OSPF): A link-state routing protocol widely used in
enterprise and service provider networks.
Intermediate System to Intermediate System (IS-IS): Another link-state routing
protocol commonly used in service provider networks.
Enhanced Interior Gateway Routing Protocol (EIGRP): A proprietary distance vector
routing protocol developed by Cisco Systems for IP networks.
In inter-domain routing, the primary routing protocol used is the Border Gateway Protocol
(BGP). BGP is a path vector routing protocol that enables the exchange of reachability
information between autonomous systems and the propagation of routing policies. It allows
different networks to establish peering relationships and advertise their own networks and
routes to other networks.
Inter-domain routing is essential for enabling communication and data exchange across the
internet, as it ensures that packets can be routed between different networks and service
providers. BGP is the de facto standard for inter-domain routing on the internet, allowing
autonomous systems to exchange routing information and establish connectivity between
different administrative domains.
Both intra-domain and inter-domain routing are essential components of modern computer
networks, enabling efficient packet delivery within and across different administrative
domains, respectively.
Dijkstra's algorithm is a widely used algorithm for finding the shortest path between a source
node and all other nodes in a weighted graph. It is commonly employed in routing protocols,
such as link-state routing protocols like OSPF (Open Shortest Path First), to calculate the
shortest path between routers in a computer network.
1. Initialization:
o Assign a distance value of infinity (or a large enough value) to all nodes,
except for the source node, which is assigned a distance value of 0.
o Mark all nodes as unvisited.
o Create a set of visited nodes, initially empty.
2. Build the shortest path tree:
o Select the unvisited node with the smallest distance value (initially the source
node).
o Mark the selected node as visited and add it to the visited set.
o For each unvisited neighbor of the selected node, calculate the tentative
distance by summing the distance value of the selected node and the weight of
the edge connecting them. If the tentative distance is smaller than the current
distance value of the neighbor node, update the neighbor's distance value with
the tentative distance.
3. Repeat step 2 until all nodes have been visited or there are no more unvisited nodes
reachable from the source node.
4. After all nodes have been visited, the algorithm has determined the shortest paths
from the source node to all other nodes in the graph.
Suppose we want to find the shortest paths from node A to all other nodes.
Dijkstra's algorithm is widely used in rou ng protocols and other applica ons
that require finding the shortest paths in a network or graph, such as
naviga on systems, network op miza on, and computer science algorithms
The primary purpose of IGMP is to establish and maintain multicast group memberships
between hosts and their local multicast routers. It allows hosts to signal their interest in
joining or leaving specific multicast groups, and it helps routers to determine which multicast
traffic should be forwarded to which network segments.
IGMP operates at the network layer (layer 3) of the OSI model and is an integral part of the
IP multicast architecture. It works in conjunction with multicast routing protocols, such as
PIM (Protocol Independent Multicast), to build and maintain multicast distribution trees
across the network.
1. Initialization:
o Each router maintains a routing table that contains information about the
network destinations and the corresponding distances (hop counts) to reach
those destinations.
o Initially, the routing table only contains entries for directly connected
networks with a hop count of 0.
2. Routing Information Exchange:
o Routers periodically exchange their entire routing table with their directly
connected neighbors every 30 seconds by default.
o The routing information shared includes the destination network, the metric
(hop count), and the next-hop router for each route.
3. Route Selection:
o When a router receives routing information from its neighbors, it updates its
routing table with the best routes to each destination.
o The best route is determined by selecting the path with the smallest hop count
(metric).
o If multiple paths have the same hop count, RIP may use additional criteria,
such as load balancing or traffic distribution, to select the best route.
4. Route Propagation:
o After updating its routing table, the router propagates the new routing
information to its neighbors by sending its updated routing table.
o This process continues until all routers in the network have converged and
have consistent routing tables.
5. Convergence:
o RIP uses a technique called "split horizon" to prevent routing loops, where a
router does not advertise a route back to the neighbor from which it learned
that route.
o RIP also implements a "poison reverse" mechanism to eliminate routing loops
by advertising routes with an infinite metric (16 hops) to neighbors from
which it learned the route.
1. Maximum hop count: RIP uses a hop count as the metric, with a maximum of 15 hops
(16 is considered an infinite or unreachable route). This limits the size of networks
that can be supported by RIP.
2. Slow convergence: RIP updates routing tables periodically (every 30 seconds by
default), which can lead to slow convergence times in large or unstable networks.
3. Inefficient updates: RIP sends its entire routing table to all neighbors every update
cycle, even if only a small portion of the table has changed, which can be inefficient
for large networks.
4. Limited support for variable-length subnet masking (VLSM): RIP version 1 does not
support VLSM, which can lead to inefficient use of IP address space. RIP version 2
(RIPv2) supports VLSM but is not widely implemented.
Despite its limitations, RIP is still used in small to medium-sized networks due to its
simplicity and ease of configuration. However, for larger networks, more advanced routing
protocols like Open Shortest Path First (OSPF) or Intermediate System to Intermediate
System (IS-IS) are preferred due to their better scalability, faster convergence, and support
for more advanced features.
Path vector routing is a routing protocol used for inter-domain routing, which is the routing of
data packets between different autonomous systems or administrative domains on the
Internet. It is primarily used by the Border Gateway Protocol (BGP), which is the de facto
standard inter-domain routing protocol for the Internet.
In path vector routing, each router maintains a routing table that contains path information for
reaching different network destinations. This path information includes the destination
network prefix, the next-hop router, and the path vector, which is a sequence of autonomous
system (AS) numbers that the route has traversed.
1. Path Advertisements:
o Each autonomous system (AS) advertises its own network prefixes and the
paths to reach those prefixes to its neighboring ASes.
o The path advertisement includes the network prefix, the AS path (the sequence
of AS numbers the route has traversed), and other attributes like the origin
code and the next-hop IP address.
2. Path Selection:
o When a router receives path advertisements from its neighbors, it selects the
best path for each destination network prefix based on certain criteria and path
attributes.
o The path selection process involves evaluating various attributes, such as the
AS path length, local preference, origin code, and other policy-based rules
defined by the network administrator.
3. Path Updates and Propagation:
o After selecting the best path for a destination, the router adds its own AS
number to the AS path and propagates the updated path information to its
neighbors.
o Routers continually receive path updates from their neighbors, process them,
and propagate the best paths they have learned to their other neighbors.
4. Loop Prevention:
o To prevent routing loops, path vector routing protocols like BGP use the AS
path attribute.
o A router does not accept or propagate a path advertisement that contains its
own AS number in the AS path, as this would create a routing loop.
Path vector routing has several advantages over other routing protocols:
1. Slow Convergence: In the event of network changes or failures, path vector routing
protocols may take longer to converge, as they propagate path updates hop-by-hop
between autonomous systems.
2. Limited Topology Information: Path vector routing protocols do not maintain a
complete view of the network topology, which can limit their ability to find optimal
paths in certain scenarios.
Despite these limitations, path vector routing, and specifically BGP, is the foundation of
inter-domain routing on the Internet, enabling communication and data exchange between
different networks and service providers worldwide.
The Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to
exchange routing and reachability information among autonomous systems (AS) on the
Internet. It is the core routing protocol that enables the Internet to function as a decentralized
network of networks.
1. Path Vector Routing Protocol: BGP is a path vector routing protocol, which means
that it uses a sequence of autonomous system numbers (AS path) to describe the path
that a route has traversed. This allows BGP to prevent routing loops and implement
routing policies.
2. Inter-Autonomous System Routing: BGP is primarily used for routing between
different autonomous systems, enabling communication and data exchange among
networks operated by different organizations or Internet Service Providers (ISPs).
3. Policy-Based Routing: BGP allows network administrators to implement routing
policies based on various attributes, such as preferred paths, filtering routes, and
controlling traffic flow. This enables control over how traffic is routed and optimizes
network resources.
4. Path Selection Process: BGP uses a complex path selection process to determine the
best route among multiple available paths. This process considers various attributes,
such as the AS path length, origin code, multi-exit discriminator (MED), and local
preference.
5. Peering Sessions: BGP routers establish peering sessions with other BGP routers,
either within the same autonomous system (iBGP) or between different autonomous
systems (eBGP). These peering sessions are used to exchange routing information and
updates.
6. Route Propagation: BGP propagates routes and updates throughout the Internet by
advertising and withdrawing routes as network conditions change. Routers apply their
configured routing policies to determine which routes to accept, prefer, and advertise
to their peers.
7. Scalability: BGP is designed to be scalable, allowing the Internet to grow and
accommodate a large number of networks and routing entries. It uses various
techniques, such as route aggregation and filtering, to manage the size of routing
tables.
8. Reliability and Redundancy: BGP supports redundant connections and failover
mechanisms to ensure reliable routing and minimize the impact of network failures or
disruptions.
BGP plays a crucial role in the global Internet infrastructure, enabling the exchange of
routing information and facilitating communication between different networks worldwide. It
is a complex protocol that requires careful configuration and management to ensure proper
routing and adherence to network policies.
Despite its complexity, BGP's ability to implement routing policies, support scalability, and
provide reliable inter-domain routing has made it the de facto standard for routing on the
Internet.
Q. What is routing? What are the Types of routing? What are the characteristics of routing
algorithm.
Routing is the process of determining the best path for data packets to travel from a source to
a destination across a computer network. Routers are responsible for forwarding packets
based on the information in their routing tables, which contain the available routes to
different network destinations.
Types of Routing:
1. Static Routing: In static routing, the routing table is manually configured by the
network administrator. The routes are fixed and do not change unless the
administrator manually updates them. Static routing is suitable for small, simple
networks that rarely change.
2. Dynamic Routing: In dynamic routing, routers automatically learn and update their
routing tables based on routing protocols. These protocols exchange routing
information between routers, allowing them to adapt to network changes and find the
best paths dynamically. Dynamic routing is more suitable for large and complex
networks.
The two main types of dynamic routing protocols are:
a. Distance Vector Routing Protocols: Examples include Routing Information Protocol (RIP),
Interior Gateway Routing Protocol (IGRP), and Enhanced Interior Gateway Routing Protocol
(EIGRP).
b. Link-State Routing Protocols: Examples include Open Shortest Path First (OSPF) and
Intermediate System to Intermediate System (IS-IS).
Routing algorithms are the mathematical processes used by routing protocols to determine the
best paths for data packets to travel. The following are some characteristics that a good
routing algorithm should possess:
1. Correctness: The routing algorithm should accurately find the best path(s) between
the source and destination based on the chosen metric (e.g., hop count, bandwidth,
delay).
2. Convergence: The routing algorithm should converge quickly to a consistent set of
routes after network changes or failures, ensuring stable and efficient routing.
3. Robustness: The routing algorithm should be able to handle network failures, node
failures, and other exceptional situations without causing routing loops or network
instability.
4. Optimality: The routing algorithm should find the optimal path(s) based on the chosen
metric, ensuring efficient utilization of network resources.
5. Simplicity: The routing algorithm should be relatively simple to implement and
understand, reducing the complexity of network configuration and management.
6. Scalability: The routing algorithm should be able to scale well as the network grows
in size, handling a large number of nodes and routes without significant performance
degradation.
7. Flexibility: The routing algorithm should be flexible enough to accommodate
different network topologies, technologies, and routing policies.
8. Security: The routing algorithm should incorporate security measures to prevent
unauthorized access, malicious attacks, or the propagation of incorrect routing
information.
9. Load Balancing: The routing algorithm should support load balancing capabilities,
distributing traffic across multiple paths to optimize network performance and prevent
congestion.
These characteristics are important considerations when designing and implementing routing
algorithms and protocols, as they directly impact the efficiency, reliability, and scalability of
data routing in computer networks.
Intra-domain routing and inter-domain routing are two distinct concepts in computer
networking, and they differ in several ways. Here's a comparison between the two:
1. Network Scope:
o Intra-domain routing: It occurs within a single autonomous system (AS) or
administrative domain, such as a single organization's network or an Internet
Service Provider's (ISP) network.
o Inter-domain routing: It occurs between different autonomous systems or
administrative domains, enabling communication and data exchange across
the Internet or between different service provider networks.
2. Routing Protocols:
o Intra-domain routing: It typically uses interior gateway protocols (IGPs) such
as OSPF (Open Shortest Path First), IS-IS (Intermediate System to
Intermediate System), EIGRP (Enhanced Interior Gateway Routing Protocol),
or RIP (Routing Information Protocol).
o Inter-domain routing: It primarily uses the Border Gateway Protocol (BGP),
which is the de facto standard for inter-domain routing on the Internet.
3. Routing Metrics and Policies:
o Intra-domain routing: The routing protocols used in intra-domain routing
typically focus on metrics such as link costs, bandwidth, delay, and topology
information to determine the best paths within the autonomous system.
o Inter-domain routing: BGP, used for inter-domain routing, focuses on
exchanging reachability information and implementing routing policies based
on attributes like AS path length, local preference, and other policy-based
rules.
4. Routing Information:
o Intra-domain routing: Routers within an autonomous system share complete
topology information and maintain a detailed view of the network to calculate
the best paths.
o Inter-domain routing: BGP routers exchange only the necessary reachability
information and AS paths, without maintaining a complete topology view of
the entire Internet.
5. Scalability:
o Intra-domain routing: Intra-domain routing protocols are designed to scale
within a single administrative domain, typically handling fewer routes and
routers compared to inter-domain routing.
o Inter-domain routing: BGP and inter-domain routing are designed to scale
across the entire Internet, handling a vast number of routes and autonomous
systems.
6. Convergence Speed:
o Intra-domain routing: Intra-domain routing protocols generally converge faster
after network changes or failures, as they operate within a single
administrative domain with a limited number of routers.
o Inter-domain routing: BGP and inter-domain routing may take longer to
converge, as routing updates need to propagate hop-by-hop between
autonomous systems across the Internet.
7. Administrative Control:
o Intra-domain routing: Network administrators have complete control over the
routing protocols, policies, and configurations within their autonomous
system.
o Inter-domain routing: Network administrators can only control and configure
routing policies within their own autonomous system, while routing decisions
between different autonomous systems are based on peering agreements and
negotiated policies.
Both intra-domain and inter-domain routing are essential components of modern computer
networks, enabling efficient packet delivery within and across different administrative
domains, respectively. Intra-domain routing focuses on optimizing routing within a single
network, while inter-domain routing enables communication and data exchange between
different networks and service providers worldwide.
OSPF (Open Shortest Path First) is a widely-used interior gateway protocol (IGP) for routing
in IP networks. It is an open standard that is particularly suitable for enterprise networks,
where efficient and reliable routing is essential.
The primary purpose of OSPF is to allow routers within a single autonomous system (or
domain) to share routing information and dynamically determine the best paths for
forwarding data packets between different parts of the network.
1. Scalability: OSPF is designed to work well in large networks with numerous routers
and links. It can efficiently handle networks with thousands of nodes and segments.
2. Hierarchical design: OSPF allows dividing a large network into smaller areas or
regions, allowing for better organization and efficient routing within each area. This
hierarchical design improves scalability and reduces routing overhead.
3. Converge quickly: OSPF uses an advanced algorithm (Dijkstra's algorithm) to rapidly
converge and determine the shortest paths between nodes within a network or area.
4. Automatic failover: OSPF detects changes in the network topology and seamlessly
adapts, automatically failing over and rerouting traffic via alternate paths if a router or
link fails.
5. Load balancing: OSPF supports load balancing across multiple equal-cost paths,
distributing network traffic for improved efficiency and reliability.
6. Routing metrics: OSPF uses the bandwidth of the link as the routing metric to
calculate the best paths. It can be configured to use other metrics like delay or cost.
OSPF is designed to work within a single autonomous system, such as a large enterprise
network or service provider backbone. It operates at the network layer of the OSI model and
uses link-state routing technology to establish data paths.
OSPF has evolved over time, with enhancements like OSPF version 3 for IPv6 support and
specific features for mobile ad-hoc networks (MANET). It is widely used in modern
networking infrastructure and an essential protocol for data routing and facilitating
communication within network domains.
Q. Distance Vector Routing Algorithm, which plays a crucial role in determining optimal paths
for data packets within a computer network. Here’s a concise explanation:
1. Overview:
o The Distance Vector Routing Algorithm (also known as the Bellman-Ford
algorithm) calculates the shortest path for data packets in a network.
o Its historical significance and simplicity make it stand out among various routing
algorithms.
o Imagine it as the GPS of a network, ensuring efficient data packet delivery to their
destinations.
2. Key Characteristics:
o Iterative: The algorithm involves routers exchanging information about their
routing tables until they converge on the most efficient routes.
o Asynchronous: Nodes do not need to operate in lockstep with each other.
o Distributed: Each node shares information with its directly attached neighbors
and updates its routing table accordingly.
3. Working Principles:
o Each router maintains a distance table (also called a vector) containing
information about the cost to reach various destinations.
o The router shares its knowledge with neighboring routers.
o The router sends its information only to directly connected neighbors.
o Information is exchanged at regular intervals (typically within 30 seconds).
4. Bellman-Ford Equation:
o Let (d_x(y)) represent the cost of the least-cost path from node (x) to node (y).
o The equation relates the least costs: [ d_x(y) = \min_v {c(x,v) + d_v(y)} ]
Here, (v) represents neighbors of node (x).
After traveling from (x) to (v), the path cost from (v) to (y) is (c(x,v) +
d_v(y)).
The least cost from (x) to (y) is the minimum of these path costs over all
neighbors.
5. Distance Vector Exchange:
o Asynchronous process: Node (x) sends its distance vector to all neighbors.
o When (x) receives a new distance vector from a neighbor (v), it updates its own
distance vector using the Bellman-Ford equation.
o The updated table is then sent to all neighbors for further updates.
In summary, the Distance Vector Routing Algorithm dynamically adjusts routing tables based on
iterative exchanges, ensuring efficient data flow across the network
Direct Delivery
Occurs when the source and destination of a packet are on the same physical network.
No intermediary devices are involved.
Faster and simpler compared to indirect delivery.
Here's an analogy: Imagine you want to pass a note to your friend sitting in the same class.
You can directly hand it to them – this is direct delivery.
Indirect Delivery
Analogy time again: You want to send a letter to a friend across town. You put it in your
mailbox, and the mail carrier (router) collects it. The mail carrier consults a map (routing
table) to find the most efficient route to deliver the letter – this is indirect delivery.
1. Dual Stack Routers: These routers act as bridges, configured with both IPv4 and
IPv6 addresses. They can understand and communicate using either protocol,
allowing devices on both IPv4 and IPv6 networks to connect.
2. Tunneling: This technique encapsulates IPv6 packets within IPv4 packets for
transmission over networks that don't support IPv6 yet. It's like sending a message in
a bottle; the outer layer (IPv4) gets delivered across the non-IPv6 network, and the
recipient extracts the inner message (IPv6).
3. NAT Protocol Translation (NAT-PT): This method translates IPv4 addresses to
IPv6 addresses and vice versa, enabling communication between devices using
different protocols. It's like having a translator at the network level to bridge the
communication gap.
These strategies allow a gradual shift towards IPv6 while ensuring devices using both
protocols can still interact during the transition phase.