Unit 3
Unit 3
UNIT III
NETWORK LAYER
Switching : Packet Switching - Internet protocol - IPV4 – IP Addressing – Subnetting - IPV6,
ARP, RARP, ICMP, DHCP
3. NETWORK LAYER-INTRODUCTION
The network layer is responsible for the source-to-destination delivery of a
packet, possibly across multiple networks (links). Whereas the data link layer
oversees the delivery of the packet between two systems on the same
network (links), the network layer ensures that each packet gets from its
point of origin to its final destination.
If two systems are connected to the same link, there is usually no need for a
network layer. However, if the two systems are attached to different
networks (links) with connecting devices between the networks (links), there
is often a need for the network layer to accomplish source-to-destination
delivery.
systems. The network layer adds a header to the packet coming from the
upper
layer that, among other things, includes the logical addresses of the sender
and
or switches) route or switch the packets to their final destination. One of the
functions of the network layer is to provide this mechanism.
These methods, however, are impractical and wasteful when applied to very large
networks. The number and length of the links require too much infrastructure to be cost-
efficient, and the majority of those links would be idle most of the time.
A better solution is switching.
A switched network consists of a series of interlinked nodes, called switches.
Switches are devices capable of creating temporary connections between two or more
devices linked to the switch.
In a switched network, some of these nodes are connected to the end systems (computers
or telephones, for example). Others are used only for routing.
(for example, the “Hi” messages in our handshaking example) or can contain data, such as
an e-mail message, a JPEG image, or an MP3 audio file.
To send a message from a source end system to a destination end system, the source breaks
long messages into smaller chunks of data known as packets.
Between source and destination, each packet travels through communication links and
packet switches (for which there are two predominant types, routers and link-layer
switches).
Packets are transmitted over each communication link at a rate equal to the full transmission
rate of the link. So, if a source end system or a packet switch is sending a packet of L bits
over a link with transmission rate R bits/sec, then the time to transmit the packet is L /R
seconds.
3.2.1 Store-and-Forward Transmission
Most packet switches use store-and-forward transmission at the inputs to the links. Store-
and-forward transmission means that the packet switch must receive the entire packet before
it can begin to transmit the first bit of the packet onto the outbound link.
To explore store-and-forward transmission in more detail, consider a simple network
consisting of two end systems connected by a single router, as shown in Figure 3.3.
A router will typically have many incident links, since its job is to switch an incoming
packet onto an outgoing link; in this simple example, the router has the rather simple task of
transferring a packet from one (input) link to the only other attached link.
In this example, the source has three packets, each consisting of L bits, to send to the
destination. At the snapshot of time shown in Figure 3.3, the source has transmitted some of
packet 1, and the front of packet 1 has already arrived at the router. Because the router
employs store-and-forwarding, at this instant of time, the router cannot transmit the bits it
has received; instead it must first buffer (i.e., “store”) the packet’s bits.
Only after the router has received all of the packet’s bits can it begin to transmit (i.e.,
“forward”) the packet onto the outbound link.
To gain some insight into store-and-forward transmission, let’s now calculate the amount of
time that elapses from when the source begins to send the packet until the destination has
received the entire packet. (Here we will ignore propagation delay—the time it takes for the
bits to travel across the wire at near the speed of light.
The source begins to transmit at time 0; at time L/R seconds, the source has transmitted the
entire packet, and the entire packet has been received and stored at the router (since there is
no propagation delay).
At time L/R seconds, since the router has just received the entire packet, it can begin to
transmit the packet onto the outbound link towards the destination; at time 2L/R, the router
has transmitted the entire packet, and the entire packet has been received by the destination.
Thus, the total delay is 2L/R.
If the switch instead forwarded bits as soon as they arrive (without first receiving the entire
packet), then the total delay would be L/R since bits are not held up at the router. But,
routers need to receive, store, and process the entire packet before forwarding.
Now let’s calculate the amount of time that elapses from when the source begins to send the
first packet until the destination has received all three packets. As before, at time L/R, the
router begins to forward the first packet. But also at time L/R the source will begin to send
the second packet, since it has just finished sending the entire first packet.
Thus, at time 2L/R, the destination has received the first packet and the router has received
the second packet. Similarly, at time 3L/R, the destination has received the first two packets
and the router has received the third packet. Finally, at time 4L/R the destination has
received all three packets! Let’s now consider the general case of sending one packet from
source to destination over a path consisting of N links each of rate R (thus, there are N-1
routers between source and destination). Applying the same logic as above, we see that the
end-to-end delay is:
dend-to-end=NLR
3.2.2 Queuing Delays and Packet Loss
Each packet switch has multiple links attached to it. For each attached link, the packet
switch has an output buffer (also called an output queue), which stores packets that the
router is about to send into that link. The output buffers play a key role in packet switching.
If an arriving packet needs to be transmitted onto a link but finds the link busy with the
transmission of another packet, the arriving packet must wait in the output buffer. Thus, in
addition to the store-and-forward delays, packets suffer output buffer queuing delays. These
delays are variable and depend on the level of congestion in the network.
To make the IPv4 address more compact and easier to read, Internet addresses are usually
written in decimal form with a decimal point (dot) separating the bytes.
The following is the dotted~decimal notation of the above address: 117.149.29.2
Figure 3.5 shows an IPv4 address in both binary and dotted-decimal notation. Note that
because each byte (octet) is 8 bits, each number in dotted-decimal notation is a value ranging
from 0 to 255.
Fig 3.5 Dotted decimal notation and Binary notation in IPv4 Address
Classful Addressing
IPv4 addressing, at its inception, used the concept of classes. This architecture is called
classful addressing.In classful addressing, the address space is divided into five classes: A,
B, C, D, and E. Each class occupies some part of the address space.
We can find the class of an address when given the address in binary notation or dotted-
decimal notation. If the address is given in binary notation, the first few bits can immediately
tell us the class of the address. If the address is given in decimal-dotted notation, the first
byte defines the class. Both methods are shown in Figure 3.6
The netid is in color, the hostid is in white. Note that the concept does not apply to classes D
and E. In class A, one byte defines the netid and three bytes define the hostid.
In class B, two bytes define the netid and two bytes define the hostid. In class C, three bytes
define the netid and one byte defines the hostid.
Mask
Although the length of the netid and hostid (in bits) is predetermined in classful addressing,
we can also use a mask (also called the default mask), a 32-bit number made of contiguous
Is followed by contiguous as.
The masks for classes A, B, and C are shown in Table 3.7. The concept does not apply to
classes D and E.
IPv4.
An IPv6 address is 128 bits or 16 bytes (octets) long, four times the address length in
IPv4.
Representation:
A computer normally stores the address in binary, but it is clear that 128 bits cannot
easily be handled by humans.
Several notations have been proposed to represent IPv6 addresses when they are handled
by humans.
The following shows two of these notations:
Binary notation
Colon hexadecimal notation
Example:
Binary (128 bits) 1111111011110110 … 1111111100000000
Colon Hexadecimal FEF6:BA98:7654:3210:ADEF:BBFF:2922:FF00
This is appropriate during the transition period in which an IPv4 address is embedded in
an IPv6 address (as the rightmost 32 bits). We can use the colon hex notation for the
leftmost six sections and four-byte dotted-decimal notation instead of the rightmost two
sections.
CIDR Notation:
IPv6 uses hierarchical addressing. For this reason, IPv6 allows slash or CIDR notation. For
example, the following shows how we can define a prefix of 60 bits using CIDR.
Example: FDEC::BBFF:0:FFFF/60
3.9.1 Address Space:
The address space of IPv6 contains 2128 addresses.
This address space is 296 times the IPv4 address—definitely no address depletion—as
shown, the size of the space is
340, 282, 366, 920, 938, 463, 374, 607, 431, 768, 211, 456.
Three Address Types:
In IPv6, a destination address can belong to one of three categories:
Unicast address
Anycast address
Multicast address
1. Unicast Address:
A unicast address defines a single interface (computer or router). The packet sent to a
unicast address will be routed to the intended recipient.
2.Anycast Address:
An anycast address defines a group of computers that all share a single address.
A packet with an anycast address is delivered to only one member of the group, the most
reachable one.
3. Multicast Address:
A multicast address also defines a group of computers.
However, there is a difference between anycasting and multicasting.
In anycasting, only one copy of the packet is sent to one of the members of the group.
In multicasting each member of the group receives a copy.
3.9.2 Address Space Allocation:
Like the address space of IPv4, the address space of IPv6 is divided into several blocks of
varying size and each block is allocated for a special purpose. Most of the blocks are still
unassigned and have been set aside for future use. The following Table shows only the assigned
blocks. In this table, the last column shows the fraction each block occupies in the whole address
space.
message (by setting a flag). The host then needs to use other means for configuration.
3.9.4 Renumbering:
To allow sites to change the service provider, renumbering of the address prefix (n) was built
into IPv6 addressing. Each site is given a prefix by the service provider to which it is connected.
If the site changes the provider, the address prefix needs to be changed. A router to which the site
is connected can advertise a new prefix and let the site use the old prefix for a short time before
disabling it. In other words, during the transition period, a site has two prefixes. The main
problem in using the renumbering mechanism is the support of the DNS, which needs to
propagate the new addressing associated with a domain name. A new protocol for DNS, called
Next Generation DNS, is under study to provide support for this mechanism.
The change of the IPv6 address size requires the change in the IPv4 packet format. The designer
of IPv6 decided to implement remedies for other shortcomings now that a change is inevitable.
The following shows other changes implemented in the protocol in addition to changing address
size and format.
❑ Better header format: IPv6 uses a new header format in which options are separated from
the base header and inserted, when needed, between the base header and the data. This simplifies
and speeds up the routing process because most of the options do not need to be checked by
routers.
❑ New options: IPv6 has new options to allow for additional functionalities.
❑ Allowance for extension: IPv6 is designed to allow the extension of the protocol if required
by new technologies or applications.
❑ Support for resource allocation: In IPv6, the type-of-service field has been removed, but
two new fields, traffic class and flow label, have been added to enable the source to request
special handling of the packet. This mechanism can be used to support traffic such as real-time
audio and video.
❑ Support for more security: The encryption and authentication options in IPv6 provide
confidentiality and integrity of the packet.
3.10.1 Packet Format:
Each packet is composed of a base header followed by the payload. The base header occupies 40
bytes, whereas payload can be up to 65,535 bytes of information. The description of fields
follows.
meaning.
Fragmentation and Reassembly :
IPv6 datagrams can be fragmented only by the source, not by the routers; the reassembly
takes place at the destination.
The fragmentation of packets at routers is not allowed to speed up the processing of
packets in the router.
The fragmentation of a packet in a router needs a lot of processing.
The packet needs to be fragmented, all fields related to the fragmentation need to be
recalculated.
In IPv6, the source can check the size of the packet and make the decision to fragment
the packet or not.
3.10.2 Extension Header :
An IPv6 packet is made of a base header and some extension headers.
The length of the base header is fixed at 40 bytes.
To give more functionality to the IP datagram, the base header can be followed by up to
six extension headers.
Many of these headers are options in IPv4.
Six types of extension headers have been defined.
These are
Hop-by-hop option
Source routing
Fragmentation
Authentication
Encrypted security payload
Destination option
Hop-by-Hop Option:
The hop-by-hop option is used when the source needs to pass information to all routers visited
by the datagram. For example, perhaps routers must be informed about certain management,
debugging, or control functions. Or, if the length of the datagram is more than the usual 65,535
bytes, routers must have this information.
Destination Option:
The destination option is used when the source needs to pass information to the destination only.
Intermediate routers are not permitted access to this information. The format of the destination
option is the same as the hop-by-hop option.
Source Routing:
The source routing extension header combines the concepts of the strict source route and the
loose source route options of IPv4.
Fragmentation: The concept of fragmentation in IPv6 is the same as that in IPv4. However, the
place where fragmentation occurs differs. In IPv4, the source or a router is required to fragment
if the size of the datagram is larger than the MTU of the network over which the datagram
travels. In IPv6, only the original source can fragment. A source must use a Path MTU
Authentication: The authentication extension header has a dual purpose: it validates the
message sender and ensures the integrity of data. The former is needed so the receiver can be
sure that a message is from the genuine sender and not from an imposter. The latter is needed to
check that the data is not altered in transition by some hacker.
Encrypted Security Payload:
The encrypted security payload (ESP) is an extension that provides confidentiality and guards
against eavesdropping.
Comparison of Options between IPv4 and IPv6:
The following shows a quick comparison between the options used in IPv4 and the options used
in IPv6 (as extension headers).
The no-operation and end-of-option options in IPv4 are replaced by Pad1 and PadN
options in IPv6.
The record route option is not implemented in IPv6 because it was not used.
The timestamp option is not implemented because it was not used.
The source route option is called the source route extension header in IPv6.
The fragmentation fields in the base header section of IPv4 have moved to the
fragmentation extension header in IPv6.
The authentication extension header is new in IPv6.
The encrypted security payload extension header is new in IPv6.
ARP operation:
Anytime a host or a router needs to find the link-layer address of another host or router in
its network, it sends an ARP request packet.
The packet includes the link-layer and IP addresses of the sender and the IP address of
the receiver.
Because the sender does not know the link-layer address of the receiver, the query is
broadcast over the link using the link-layer broadcast address.
Every host or router on the network receives and processes the ARP request packet, but
only the intended recipient recognizes its IP address and sends back an ARP response
packet.
The response packet contains the recipient’s IP and link-layer addresses. The packet is
unicast directly to the node that sent the request packet.
In Figure a, the system on the left (A) has a packet that needs to be delivered to another
system (B) with IP address N2. System A needs to pass the packet to its data-link layer
for the actual delivery, but it does not know the physical address of the recipient. It uses
the services of ARP by asking the ARP protocol to send a broadcast ARP request packet
to ask for the physical address of a system with an IP address of N2. This packet is
received by every system on the physical network, but only system B will answer it. In
figure b System B sends an ARP reply packet that includes its physical address. Now
system A can send all the packets it has for this destination using the physical address it
received.
Caching:
Assume that system A has 10 datagrams to send to system B in one second.
a. Without using ARP, system A needs to send 10 broadcast frames. Each of the 18 other
systems need to receive the frames, decapsulate the frames, remove the datagram and
pass it to their network-layer to find out the datagrams do not belong to them.This means
processing and discarding 180 broadcast frames.
b. b. Using ARP, system A needs to send only one broadcast frame. Each of the 18 other
systems need to receive the frames, decapsulate the frames, remove the ARP message
and pass the message to their ARP protocol to find that the frame must be discarded. This
means processing and discarding only 18 (instead of 180) broadcast frames. After system
B responds with its own data-link address, system A can store the link-layer address in its
cache memory. The rest of the nine frames are only unicast. Since processing broadcast
frames is expensive (time consuming), the first method is preferable.
Packet Format:
The hardware type field defines the type of the link-layer protocol; Ethernet is given
the type 1.
The protocol type field defines the network-layer protocol: IPv4 protocol is
(0800)16.
The hardware length field defines the length of the hardware address.
The protocol length field defines the length of the protocol address.
The operation field specifies whether the packet is a request or reply.
The source hardware and source protocol addresses are variable-length fields
defining the link-layer and network-layer addresses of the sender.
The destination hardware address and destination protocol address fields define
the receiver link-layer and network-layer addresses.
An ARP packet is encapsulated directly into a data-link frame. The frame needs to
have a field to show that the payload belongs to the ARP and not to the network-layer
datagram.
4. Every host or router receives the frame. Because the frame contains a broadcast
destination address, all stations remove the message and pass it to ARP. All machines
except the one targeted drop the packet. The target machine recognizes its IP address.
5. The target machine replies with an ARP reply message that contains its physical
address. The message is unicast.
6. The sender receives the reply message. It now knows the physical address of the
target machine. 7. The IP datagram, which carries data for the target machine, is now
encapsulated in a frame and is unicast to the destination.
A TCP/IP protocol that allows a host to find its Internet address given its physical address
The Reverse Address Resolution Protocol (RARP) allows a host to discover its Internet
address when it knows only its physical address. It is used when a computer is connected to
a network for the first time or when a diskless computer is booted.
Reverse Address Resolution Protocol (RARP) finds the logical address for a machine that
knows only its physical address. Each host or router is assigned one or more logical (IP)
addresses, which are unique and independent of the physical (hardware) address of the
machine.
To create an IP datagram, a host or a router needs to know its own IP address or addresses.
The IP address of a machine is usually read from its configuration file stored on a disk file.
However, a diskless machine is usually booted from ROM, which has minimum booting
information.
The ROM is installed by the manufacturer. It cannot include the IP address because the IP
addresses on a network are assigned by the network administrator. The machine can get its
physical address (by reading its NIC, for example), which is unique locally.
It can then use the physical address to get the logical address by using the RARP protocol. A
RARP request is created and broadcast on the local network. Another machine on the local
network that knows all the IP addresses will respond with a RARP reply.
The requesting machine must be running a RARP client program; the responding machine
must be running a RARP server program. There is a serious problem with RARP:
Broadcasting is done at the data link layer.
The physical broadcast address, allis in the case of Ethernet, does not pass the boundaries of
a network. This means that if an administrator has several networks or several subnets, it
needs to assign a RARP server for each network or subnet. This is the reason that RARP is
almost obsolete. Two protocols, BOOTP(The Bootstrap Protocol) and DHCP (Dynamic
Host Configuration Protocol) are replacing RARP.
When a device needs an IP address, it broadcasts a RARP request packet containing its
MAC address in both the sender and receiver hardware address fields.
A special host known as a RARP server configured on the network receives the RARP
request packet. After that, it checks its table of MAC addresses and IP addresses.
If the RARP server finds a matching entry for the MAC address, it sends back an RARP
reply packet that includes both the MAC address and the corresponding IP address.
The device that initiated the RARP request packet receives the RARP reply packet. After
getting the reply, it then extracts the IP address from it. This IP address is then used for
communication on the network.
3.9 ICMP:
The ICMP represents Internet Control Message Protocol. It is a network layer protocol.
It can be used for error handling in the network layer, and it is generally used on network
devices, including routers. IP Protocol is a best-effect delivery service that delivers a
datagram from its original source to its final destination. It has two deficiencies
Lack of error control
Lack of Assistance Mechanisms
IP protocol also lacks a structure for host and management queries. A host needs to
resolve if a router or another host is alive, and sometimes a network manager needs
information from another host or router.
ICMP has been created to compensate for these deficiencies. It is a partner to the IP
protocol.
ICMP is a network layer protocol. But, its messages are not passed directly to the data
link layer. Instead, the messages are first encapsulated inside the IP datagrams before
going to the lower layer.
Type: It is an 8-bit field. It represents the ICMP message type. The values area from 0 to
127 are described for ICMPv6, and the values from 128 to 255 are the data messages.
Code: It is an 8-bit field that represents the subtype of the ICMP message.
Checksum: It is a 16-bit field to recognize whether the error exists in the message or not.
ICMP v4:
The Internet Control Message Protocol version 4 (ICMPv4) is an error-reporting or
error-correcting protocol. It is a companion to the IP protocol.
ICMP itself is a network-layer protocol. However, its messages are not passed directly to
location. DHCP is ideally suited to this situation, as there are many users
coming and going, and addresses are needed for only a limited amount of
time. The value of DHCP’s plug-and-play capability is clear, since it’s
unimaginable that a system administrator would be able to reconfigure
laptops at each location, and few students (except those taking a computer
networking class!) would have the expertise to configure their laptops
manually. DHCP is a client-server protocol. A client is typically a newly
arriving host wanting to obtain network configuration information,
including an IP address for itself. In the simplest case, each subnet (in the
addressing sense of Figure 4.20) will have a DHCP server. If no server is
present on the subnet, a DHCP relay agent (typically a router) that knows
the address of a DHCP server for that network is needed. Figure 4.23 shows
a DHCP server attached to subnet 223.1.2/24, with the router serving as the
relay agent for arriving clients attached to subnets 223.1.1/24 and
223.1.3/24. In our discussion below, we’ll assume that a DHCP server is
available on the subnet. For a newly arriving host, the DHCP protocol is a
four-step process, as shown in Figure 4.24 for the network setting shown in
Figure 4.23. In this figure, yiaddr (as in “your Internet address”) indicates
the address being allocated to the newly arriving client.
DHCP server discovery. The first task of a newly arriving host is to find a
DHCP server with which to interact. This is done using a DHCP discover
message, which a client sends within a UDP packet to port 67. The UDP
packet is encapsulated in an IP datagram. But to whom should this
datagram be sent? The host doesn’t even know the IP address of the
network to which it is attaching, much less the address of a DHCP server
for this network. Given this, the DHCP client creates an IP datagram
containing its DHCP discover message along with the broadcast destination
IP address of 255.255.255.255 and a “this host” source IP address of
0.0.0.0. The DHCP client passes the IP datagram to the link layer, which
then broadcasts this frame to all nodes attached to the subnet (we will
cover the details of link-layer broadcasting in Section 6.4). DHCP server
offer(s). A DHCP server receiving a DHCP discover message responds to
the client with a DHCP offer message that is broadcast to all nodes on the
subnet, again using the IP broadcast address of 255.255.255.255. (You
might want to think about why this server reply must also be broadcast).
Since several DHCP servers can be present on the subnet, the client may
find itself in the enviable position of being able to choose from among
several offers. Each server offer message contains the transaction ID of the
received discover message, the proposed IP address for the client, the
network mask, and an IP address lease time—the amount of time for which
the IP address will be valid. It is common for the server to set the lease time
to several hours or days [Droms 2002]. DHCP request. The newly arriving
client will choose from among one or more server offers and respond to its
selected offer with a DHCP request message, echoing back the
configuration parameters. DHCP ACK. The server responds to the DHCP
request message with a DHCP ACK message, confirming the requested
parameters.
Once the client receives the DHCP ACK, the interaction is complete and the
client can use the DHCPallocated IP address for the lease duration. Since a
client may want to use its address beyond the lease’s expiration, DHCP also
provides a mechanism that allows a client to renew its lease on an IP
address. From a mobility aspect, DHCP does have one very significant
shortcoming. Since a new IP address is obtained from DHCP each time a
node connects to a new subnet, a TCP connection to a remote application
cannot be maintained as a mobile node moves between subnets. In Chapter
6, we will examine mobile IP—an extension to the IP infrastructure that
allows a mobile node to use a single permanent address as it moves
between subnets. Additional details about DHCP can be found in [Droms
2002] and [dhc 2016]. An open source reference implementation of DHCP is
available from the Internet Systems Consortium [ISC 2016].
1. What are the network support layers and the user support layers? Network support
layers:
The network support layers are Physical layer, Data link layer and Network layer. These
deals with electrical specifications, physical connection, transport timing and reliability.
User support layers:
The user support layers are: Session layer, Presentation layer, Application layer. These allow
interoperability among unrelated software system.
2. With a neat diagram explain the relationship of IEEE Project to the OSI model?
Other layers Other layers
Network Network
Logical Link Control Data link
Media Access Control
Physical Physical
The IEEE has subdivided the data link layer into two sub layers:
Logical link control (LLC)
Medium access control (MAC)
LLC is non-architecture specific. The MAC sub layer contains a number of distinct modules,
each carries proprietary information specific to the LAN product being used.
3. Why IPv6 is preferred than IPv4?
Through IPv6 we can identify more networks or systems than IPv4.
4. Define ICMP.
ICMP uses the source IP address to send the error message to the source of the datagram.
ICMP always reports error messages to the original source.
5. Why we migrate from IPv4 to IPv6?
· Despite all short-term solutions, such as subnetting, classless addressing, and NAT,
address depletion is still a long-term problem in the Internet.
· The Internet must accommodate real-time audio and video transmission. This type of
transmission requires minimum delay strategies and reservation of resources not provided in the
IPv4 design.
· The Internet must accommodate encryption and authentication of data for some
applications. No encryption or authentication is provided by IPv4.
To overcome these deficiencies, IPv6 (Internetworking Protocol, version 6), also known as IPng
(Internetworking Protocol, next generation), was proposed and is now a standard.
6. What is the use of NAT?
NAT (Network Address Translation) is the process where a network device, usually a
firewall, assigns a public address to a computer inside a private network.
7. What are the responsibilities of network layer?
The network layer is responsible for the source-to-destination delivery of packet across
multiple network links. The specific responsibilities of network layer include the following:
Logical addressing.
Routing.
8. What is a virtual circuit?
A logical circuit made between the sending and receiving computers. The connection is
made after both computers do handshaking. After the connection, all packets follow the same
route and arrive in sequence.
9. What are data grams?
In datagram approach, each packet is treated independently from all others. Even when
one packet represents just a place of a multipacket transmission, the network treats it although it
existed alone. Packets in this technology are referred to as datagram.
10. What are the two types of implementation formats in virtual circuits?
Virtual circuit transmission is implemented in 2 formats.
Switched virtual circuit
Permanent virtual circuit.
11. What is meant by switched virtual circuit?
19. Write the keys for understanding the link state routing.
The three keys for understanding the algorithm are
• Knowledge about the neighborhood.
• Routing to all neighbors.
• Information sharing when there is a range.
20. How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case o f link state routing, cost
is a weighted value based on a variety of factors such as security levels, traffic or the state of the
link.
21. How the routers get the information about neighbor?
A router gets its information about its neighbors by periodically sending them a short
greeting packet. If the neighborhood responds to the greeting as expected, it is assumed to be
alive and functioning. If it does not, a change is assumed to have occurred and the sending router
then alerts the rest of the network in its next LSP.
22. What are the four internetworking devices?
The four internetworking devices are,
·Repeaters
·Bridges
·Routers
·Gateway
23. Define IP address.
IP address is the 3-bit number for representing a host or system in the network. One
portion of the IP address indicates a networking and the other represents the host in a network.
24. What is Token Bus?
Token Bus is a physical bus that operates as a logical ring using tokens. Here stations are
logically organized into a ring. A token is passed among stations. If a station wants to send data,
it must wait and capture the token. Like Ethernet, station communicates via a common bus.
25. What is token passing?
Stations may attempt to send data multiple times before a transmission makes it onto a
link. This redundancy may create delays of indeterminable length if the traffic is heavy. Token
ring resolves this uncertainty by requiring that stations take turns sending data. Each station may
transmit only during its turn and may send only one frame during each turn. The mechanism that
coordinates this rotation is called token passing.
26. Define Masking?
Masking is the process that extracts the address of the physical network from an IP
address.
27. What are the rules of boundary-level masking?
The rules of boundary-level masking
• The bytes in the IP address that corresponds to 255 in the mask will be repeated in the
subnetwork address
• The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the subnetwork
address
28. What are the rules of nonboundary-level masking?
The bytes in the IP address that corresponds to 255 in the mask will be repeated in the
subnetwork address
The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the
subnetwork address
For other bytes, use the bit-wise AND operator
29. Define Gateway.
A device used to connect two separate networks that we different communication protocols.
30. What is LSP?
In link state routing, a small packet containing routing information sent by a router to all other
router by a packet called link state packet.
2. Illustrate shortest path algorithm? Explain the same with suitable diagrams and examples
Arunachala College of Engineering for Women Page 37 of 38
CS3591 Computer Networks Unit 1
3. What is a RIP? Explain in detail about RIP and OSPF with diagrams. Can you
5. List the different Datagram approach? Also show the advantages of LSR over DVR. List
6. Explain the Distance Vector Routing Algorithm ? Mention the limitations of the same.
8. What would you recommend for the building and distribution of link state packets in link
9. 10. Discuss in detail the various aspects of IPV6 with relevant diagrams. (16)