0% found this document useful (0 votes)
35 views93 pages

Chapter 4

Chapter four discusses network layer addressing and routing, focusing on IP addressing, including IPv4 and IPv6 formats, as well as the concepts of network, loopback, and broadcast addresses. It explains classful and classless addressing, detailing the five classes of IP addresses (A, B, C, D, E) and their respective subnetting methods. The chapter also covers the importance of subnet masks in distinguishing network and host portions of IP addresses and introduces Classless Inter-Domain Routing (CIDR) for more efficient address allocation.

Uploaded by

jamsibro140
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views93 pages

Chapter 4

Chapter four discusses network layer addressing and routing, focusing on IP addressing, including IPv4 and IPv6 formats, as well as the concepts of network, loopback, and broadcast addresses. It explains classful and classless addressing, detailing the five classes of IP addresses (A, B, C, D, E) and their respective subnetting methods. The chapter also covers the importance of subnet masks in distinguishing network and host portions of IP addresses and introduces Classless Inter-Domain Routing (CIDR) for more efficient address allocation.

Uploaded by

jamsibro140
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 93

Chapter four

Network Layer Addressing and Routing

IP addressing

To understand better, we need to understand some terms needed to


define IP address classes.
Network Address
Loopback Address
Broadcast Address
Subnet Mask Address
Network Address:
The network address in the IP address (IPv4) blocks is the first address
used to identify the network.
In other words, the host part of the IP address always contains 0 (zero)
bits in the Network address.
cont.

• Let us take an example of IP address 90.0.0.0 with default


Subnet Mask of 255.0.0.0, whose first octet is the network
part, and the remaining three octets are the host part.
• Here, the host part is 0 (zero), which means, the network
address in the blocks of IP addresses from 90.0.0.0 to
90.255.255.255.
Cont.
Loopback Address
• The loopback IP address is used by the operating system to
create a virtual network interface, where the computer
communicates with itself.
• This process is used to troubleshoot and diagnostics the
connection with the servers running on the local machine.
• In other words, it will let the system send the message to
itself to verify whether TCP/IP stack is installed correctly
or not.
• The Loopback Address is also known as localhost.
• The default loopback IP address is 127.0.0.1 (in IPv4).
However, the range can be extended to 127.255.255.255.
Broadcast Address:
• The Broadcast address work is used to communicate with
all the devices in the local network.
• It is also used by the host to request an IP address from
DHCP (Dynamic Host Configuration Protocol).
• The Broadcast address is the last IP address in the blocks of
IP addresses in a network.
cont.

IP V4 and IPV6
• An IPv6 address is a 128-bit binary value, which can be
displayed as 32 hexadecimal digits. Colons isolate entries
in a sequence of 16-bit Hexadecimal fields.
• Hexadecimal Colon Notation of IPv6
FDEC:BA98:7654:3210:ADBF:BBFF:2922:FFFF
• An IPv4 address is a 32- bit binary value, which can be
displayed as four decimal digits.
• Dotted-Decimal Notation of IPv4
128.11.3.31
cont.

IPv4 ADDRESSES:
• An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for
example, a computer or a router) to the Internet
Address Space:
• A protocol such as IPv4 that defines addresses has an
address space. An address space is the total number of
addresses used by the protocol.
• If a protocol uses N bits to define an address, the address
space is 2N because each bit can have two different values
(0 or 1) and N bits can have 2N values
cont.

• IPv4 uses 32-bit addresses, which means that the address


space is 232 or 4,294,967,296 (more than 4 billion).
• Internet Protocol hierarchy contains several classes of IP
Addresses to be used efficiently in various situations as per
the requirement of hosts per network.
• Broadly, the IPv4 Addressing system is divided into five
classes of IP Addresses.
cont.

• All the five classes are identified by the first octet of IP


Address.
• The first octet referred here is the left most of all. The
octets numbered as follows depicting dotted decimal and
binary notation of IP Address.
• Subnet mask is used to distinguish the network portion
from host portion in an IP address.
• An IP address and a subnet mask both collectively provide
a numeric identity to an interface.
• Both addresses are always used together. Without subnet
mask, an IP address is an ambiguous address and without
IP address a subnet mask is just a number.
• Both addresses are 32 bits in length. These bits are divided
in four parts. Each part is known as octet and contains 8
bits. Octets are separated by periods and written in a
sequence.
• The number of networks and the number of hosts per class
can be derived by this formula.

• When calculating hosts' IP addresses, 2 IP addresses are


decreased because they cannot be assigned to hosts, i.e. the
first IP of a network is network number and the last IP is
reserved for Broadcast IP.
Hierarchical Addressing Scheme
• IPv4 uses hierarchical addressing scheme. An IP address,
which is 32-bits in length, is divided into two or three parts
as depicted.

• A single IP address can contain information about the


network and its sub-network and ultimately the host.
• This scheme enables the IP Address to be hierarchical
where a network can have many sub-networks which in
turn can have many hosts.
Subnet Mask
• The 32-bit IP address contains information about the host
and its network.
• It is very necessary to distinguish both.
• For this, routers use Subnet Mask, which is as long as the
size of the network address in the IP address.
• Subnet Mask is also 32 bits long. If the IP address in binary
is ANDed with its Subnet Mask, the result yields the
Network address.
• For example, say the IP Address is 192.168.1.152 and the
Subnet Mask is 255.255.255.0 then
.
Cont.
• This way the Subnet Mask helps extract the Network ID
and the Host from an IP Address.
• It can be identified now that 192.168.1.0 is the Network
number and 192.168.1.152 is the host on that network.
Binary Representation
• The positional value method is the simplest form of
converting binary from decimal value.
• IP address is 32 bit value which is divided into 4 octets.
• A binary octet contains 8 bits and the value of each bit can
be determined by the position of bit value '1' in the octet.
• Positional value of bits is determined by 2 raised to power
(position – 1), that is the value of a bit 1 at position 6 is
2^(6-1) that is 2^5 that is 32.
• The total value of the octet is determined by adding up the
positional value of bits.
• The value of 11000000 is 128+64 = 192. Some examples
are shown in the table below.
.
.
Classful and classless Addressing

• Classful addressing: In classful addressing, the address


space is divided into five classes: A, B, C, D, and E. Each
class occupies some part of the addres
• We can find the class of an address when given the address
in binary notation or dotted-decimal notation.
• If the address is given in binary notation, the first few bits
can immediately tell us the class of the address.
• If the address is given in decimal-dotted notation, the first
byte defines the class. Both methods are shown in below.
cont.

.
cont.
Classes and Blocks
• One problem with classful addressing is that each class is
divided into a fixed number of blocks with each block
having a fixed size.
• In classful addressing, a large part of the available
addresses were wasted
• Address Depletion The flaws in classful addressing scheme
combined with the fast growth of the Internet led to the
near depletion of the available addresses.
• Yet the number of devices on the Internet is much less than
the 232 address space.
• We have run out of class A and B addresses, and a class C
block is too small for most midsize organizations.
• One solution that has alleviated the problem is the idea of
classless addressing.
• Classful addressing, which is almost obsolete, is replaced
with classless addressing.
• Classless Addressing To overcome address depletion and give
more organizations access to the Internet, classless addressing was
designed and implemented.
• In this scheme, there are no classes, but the addresses are still
granted in blocks.
• Address Blocks In classless addressing, when an entity, small or
large, needs to be connected to the Internet, it is granted a block
(range) of addresses.
• The size of the block (the number of addresses) varies based on
the nature and size of the entity.
• For example, a household may be given only two addresses; a
large organization may be given thousands of addresses. An ISP,
as the Internet service provider, may be given thousands or
hundreds of thousands based on the number of customers it may
• Restriction To simplify the handling of addresses, the
Internet authorities impose three restrictions on classless
address blocks:
• 1. The addresses in a block must be contiguous, one after
another.
• 2. The number of addresses in a block must be a power of 2
(1, 2, 4, 8, ... ).
• 3. The first address must be evenly divisible by the number
of addresses.
• Example : a block of 16 addresses granted to a small
organization.
• The addresses are contiguous. The number of addresses is a
power of 2 (16 = 2 )
4
Private IP address:
Class A Address
• The first bit of the first octet is always set to 0 (zero). Thus
the first octet ranges from 1 – 127, i.e.
• Class A addresses only include IP starting from 1.x.x.x to
126.x.x.x only. The IP range 127.x.x.x is reserved for
loopback IP addresses.
• The default subnet mask for Class A IP address is 255.0.0.0
which implies that Class A addressing can have 126
networks (27-2) and 16777214 hosts (224-2).
• Class A IP address format is thus:
0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B Address
• An IP address which belongs to class B has the first two
bits in the first octet set to 10, i.e.
• Class B IP Addresses range from 128.0.x.x to 191.255.x.x.
The default subnet mask for Class B is 255.255.x.x.
• Class B has 16384 (214) Network addresses and 65534 (216-
2) Host addresses.
• Class B IP address format is:
10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
• The first octet of Class C IP address has its first 3 bits set to
110, that is

• Class C IP addresses range from 192.0.0.x to


223.255.255.x. The default subnet mask for Class C is
255.255.255.x.
• Class C gives 2097152 (221) Network addresses and 254
(28-2) Host addresses.
• Class C IP address format is:
110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address
• Very first four bits of the first octet in Class D IP addresses
are set to 1110, giving a range of −

• Class D has IP address range from 224.0.0.0 to


239.255.255.255.
• Class D is reserved for Multicasting.
• In multicasting data is not destined for a particular host,
that is why there is no need to extract host address from the
IP address, and Class D does not have any subnet mask.
Class D Address
• Very first four bits of the first octet in Class D IP addresses
are set to 1110, giving a range of −

• Class D has IP address range from 224.0.0.0 to


239.255.255.255.
• Class D is reserved for Multicasting.
• In multicasting data is not destined for a particular host,
that is why there is no need to extract host address from the
IP address, and Class D does not have any subnet mask.
Class E Address
• This IP Class is reserved for experimental purposes.
• IP addresses in this class ranges from 240.0.0.0 to
255.255.255.254. Like Class D, this class too is not
equipped with any subnet mask.
Class E Address
• This IP Class is reserved for experimental purposes.
• IP addresses in this class ranges from 240.0.0.0 to
255.255.255.254. Like Class D, this class too is not
equipped with any subnet mask.
• Each IP class is equipped with its own default
subnet mask which bounds that IP class to have
prefixed number of Networks and prefixed number
of Hosts per network.
• Classful IP addressing does not provide any
flexibility of having less number of Hosts per
Network or more Networks per IP Class.
Subnetting

Classless Inter Domain Routing


• CIDR or Classless Inter Domain Routing
provides the flexibility of borrowing bits of Host
part of the IP address and using them as Network in
Network, called Subnet.
• By using Subnetting, one single Class A IP address
can be used to have smaller sub-networks which
provides better network management capabilities.
Class A Subnets
• In Class A, only the first octet is used as Network
identifier and rest of three octets are used to be
assigned to Hosts (i.e. 16777214 Hosts per
Network).
• To make more subnet in Class A, bits from Host
part are borrowed and the subnet mask is changed
accordingly.
• For example, if one MSB (Most Significant Bit) is
borrowed from host bits of second octet and added
to Network address, it creates two Subnets (2 1=2)
with (223-2) 8388606 Hosts per Subnet.
• The Subnet mask is changed accordingly to reflect
Subnetting. Given below is a list of all possible
combination of Class A subnets.
• In case of Subnetting too, the very first and last IP
address of every subnet is used for Subnet Number
and Subnet Broadcast IP address respectively.
• Because these two IP addresses cannot be assigned
to hosts, sub-netting cannot be implemented by
using more than 30 bits as Network Bits, which
provides less than two hosts per subnet.
Class B Subnets
• By default, using Classful Networking, 14 bits are
used as Network bits providing (2 14) 16384
Networks and (216-2) 65534 Hosts.
• Class B IP Addresses can be submitted the same
way as Class A addresses, by borrowing bits from
Host bits.
• Below is given all possible combination of Class B
subnetting:
Class C Subnets
Class C IP addresses are normally assigned to a very
small size network because it can only have 254 hosts
in a network.
Given below is a list of all possible combination of
subnetted Class B IP address:
• Internet Service Providers may face a situation
where they need to allocate IP subnets of different
sizes as per the requirement of customer.
• One customer may ask Class C subnet of 3 IP
addresses and another may ask for 10 IPs.
• For an ISP, it is not feasible to divide the IP
addresses into fixed size subnets; rather he may
want to subnet the subnets in such a way which
results in minimum wastage of IP addresses.
• For example, an administrator have 192.168.1.0/24
network. The suffix /24 (pronounced as "slash 24")
tells the number of bits used for network address.
• In this example, the administrator has three
different departments with different number of
hosts.
• Sales department has 100 computers, Purchase
department has 50 computers, Accounts has 25
computers and Management has 5 computers. In
CIDR, the subnets are of fixed size.
• Using the same methodology the administrator
cannot fulfill all the requirements of the network.
• The following procedure shows how VLSM can be
used in order to allocate department-wise IP
addresses as mentioned in the example.
Step - 1
Make a list of Subnets possible.
Step - 2
• Sort the requirements of IPs in descending order
(Highest to Lowest).
1. Sales 100
2. Purchase 50
3. Accounts 25
4. Management 5
Step - 3
• Allocate the highest range of IPs to the highest
requirement, so let's assign 192.168.1.0 /25
(255.255.255.128) to the Sales department.
• This IP subnet with Network number 192.168.1.0
has 126 valid Host IP addresses which satisfy the
requirement of the Sales department.
• The subnet mask used for this subnet has 10000000
as the last octet.
Step - 4
• Allocate the next highest range, so let's assign
192.168.1.128 /26 (255.255.255.192) to the
Purchase department.
• This IP subnet with Network number
192.168.1.128 has 62 valid Host IP Addresses
which can be easily assigned to all the PCs of the
Purchase department.
• The subnet mask used has 11000000 in the last
octet.
Step - 5
• Allocate the next highest range, i.e. Accounts.
• The requirement of 25 IPs can be fulfilled with
192.168.1.192 /27 (255.255.255.224) IP subnet,
which contains 30 valid host IPs.
• The network number of Accounts department will
be 192.168.1.192. The last octet of subnet mask is
11100000.
Step - 6
• Allocate the next highest range to Management.
The Management department contains only 5
computers.
• The subnet 192.168.1.224 /29 with the Mask
255.255.255.248 has exactly 6 valid host IP
addresses.
• So this can be assigned to Management. The last
octet of the subnet mask will contain 11111000.
192.168.1.134/25
This is a class C address (first byte 192 is in 192 -
223)
Net ID: 192.168.1
Usable Host IP range: 192.168.1.129 - 192.168.1.254
First valid Host: 192.168.1.129
Last valid Host: 192.168.1.254
Subnet mask: 255.255.2555.128
Broadcast address: 192.168.1.255
Private and Public IP addresses

• There are a few reserved IPv4 address spaces which cannot


be used on the internet. These addresses serve special
purpose and cannot be routed outside the Local Area
Network.
Private IP Addresses
• Every class of IP, (A, B & C) has some addresses reserved
as Private IP addresses.
• These IPs can be used within a network, campus, company
and are private to it.
• These addresses cannot be routed on the Internet, so
packets containing these private addresses are dropped by
the Routers.
Cont.

• Private IP Address and Public IP Address are used to


uniquely identify a machine on the internet.
• Private IP address is used with a local network and public
IP address is used outside the network.
• Public IP address is provided by ISP, Internet Service
Provider.
• In order to communicate with the outside world, these IP
addresses must have to be translated to some public IP
addresses using NAT process, or Web Proxy server can be
used.
Cont.
Cont.
Network address Translation(NAT)

Network Address Translation (NAT):


• To access Internet, one public IP address is needed but as
you use private IP address in our private network,
translation of private IP address to a public IP address is
required.
• NAT is a process in which one or more local IP address is
translated into one or more Global IP address and vice
versa in order to provide Internet access to the local hosts.
• It also does the translation of port numbers i.e. masks the
port number of the host with another port number, in the
packet that will be routed to destination.
Cont.

Types of NAT
There are 3 ways to configure NAT
• Static NAT
• Dynamic NAT
• Port Address Translation (PAT)
Cont.

• Dynamic NAT – In this type of NAT, an unregistered IP


address is translated into a registered (Public) IP address
from a pool of public IP address.
• If the IP address of pool are not free, then the packet will
be dropped as only fixed number of private IP address
can be translated to public addresses.
• Suppose, if there is pool of 2 public IP addresses then
only 2 private IP addresses can be translated at a given
time.
• If 3rd private IP address wants to access Internet then
the packet will be dropped therefore many private IP
addresses are mapped to a pool of public IP addresses.
Cont.

• Static NAT – In this, a single unregistered (Private) IP


address is mapped with a legally registered (Public) IP
address i.e one-to-one mapping between local and global
address.
• This is generally used for Web hosting. These are not
used in organizations as there are many devices who will
need Internet access and to provide Internet access,
public IP address is needed.
• Suppose, if there are 3000 devices who needs access to
Internet, the organization have to buy 3000 public
addresses that will be very costly.
Cont.

• NAT is used when the number of users who wants to


access the Internet are fixed. This is also very costly as
the organization have to buy many global IP addresses to
make a pool.
• Port Address Translation (PAT) – This is also known
as NAT overload.
• In this, many local (private) IP addresses can be
translated to single registered IP address .
• Port numbers are used to distinguish the traffic i.e.,
which traffic belongs to which IP address.
• This is most frequently used as it is cost effective as
thousands of users can be connected to the Internet by
using only one real global (public) IP address.
Cont.

Advantages of using NAT


• It helps in hiding the real IP address of your internal
network from the public network and will act as a
firewall.
• It allows multiple numbers of private addresses to access
one internet connection.
• Hence, it saves our money from buying multiple internet
connections for multiple devices. We will be able to use
the same internet for all our devices.
Cont.

Disadvantages of using NAT


• Translation results in switching path delays.
• Certain applications will not function while NAT is
enabled.
Address Mapping

• delivery of a packet to a host or a router requires two


levels of addressing: logical and physical.
• We need to be able to map a logical address to its
corresponding physical address and vice versa.

• Address Resolution Protocol (ARP) :is a procedure for


mapping a dynamic IP address to a permanent physical
machine address in a local area network (LAN).
Cont.

• The physical machine address is also known as a media


access control (MAC) address.
• The job of ARP is essentially to translate 32-bit addresses
to 48-bit addresses.
• This is necessary because IP addresses in IP version 4
(IPv4) are 32 bits, but MAC addresses are 48 bits.
• ARP works between Layers 2 and 3 of the Open Systems
Interconnection model (OSI model).
• The MAC address exists on Layer 2 of the OSI model, the
data link layer.
• The IP address exists on Layer 3, the network layer.
Cont.
Cont.
ICMP

• The ICMP represents Internet Control Message Protocol.


It is a network layer protocol.
• It can be used for error handling in the network layer, and
it is generally used on network devices, including routers.
• IP Protocol is a best-effect delivery service that delivers a
datagram from its original source to its final destination. It
has two deficiencies:
 Lack of Error Control
 Lack of assistance mechanisms
Cont.

• ICMP has been created to compensate for these


deficiencies. It is a partner to the IP protocol.

• ICMP is a network layer protocol. But, its messages are


not passed directly to the data link layer.
• Instead, the messages are first encapsulated inside the IP
datagrams before going to the lower layer.
Cont.

ICMP Message Format


• AN ICMP message includes an 8-byte header and a
variable size data format.
Cont.

• Type: It is an 8-bit field. It represents the ICMP message


type. The values area from 0 to 127 are described for
ICMPv6, and the values from 128 to 255 are the data
messages.
• Code: It is an 8-bit field that represents the subtype of the
ICMP message.
• Checksum: It is a 16-bit field to recognize whether the
error exists in the message or not.
Cont.

Error Reporting
• The error-reporting message defines that the router
encounters a problem when it processes an IP packet, then
it reports a message.
• Error messages are continually transmitted to the original
source because the only data possible in the datagram
around the route is the source and destination IP
addresses.
• The error reporting messages are generally classified into
the following types:
Cont.
IGMP

• The Internet Group Management Protocol (IGMP) is a


protocol that allows several devices to share one IP
address so they can all receive the same data.
• IGMP is a network layer protocol used to set up
multicasting on networks that use the Internet Protocol
version 4 (IPv4).
• Specifically, IGMP allows devices to join a multicasting
group
Cont.

Types of IGMP messages


• The main motive behind IGMP (Internet Group
Management Protocol) is to allow hosts in a subnet to
communicate to local multicast routers about their
intention to receive traffic addressed to a multicast group.
• There are different types of messages used to
communicate between a multicast router and a multicast
client.
Cont.

IGMP General Membership Query (MQ) messages :


• General Membership Query (MQ) messages are sent by
local multicast routers to its connected subnets to identify
the multicast groups which the multicast clients in the
network are interested to subscribe.
• General Membership Query (MQ) messages are sent by
multicast router to the computers on its subnet at link-
local All systems multicast address 224.0.0.1.
Cont.

IGMP Group-specific Multicast Query (MQ) messages :


• Group-specific Multicast Query (MQ) messages are sent
to a specific multicast group address as the destination
IPv4 address. Group-specific Multicast Query (MQ)
messages are used to determine the members of a
particular multicast group.
IGMP Group-and-source-specific Multicast Query (MQ)
messages :
• Group-and-source-specific Multicast Query (MQ)
messages are used by the multicast routers to find any
computer is interested to receive messages from a
multicast group with specific source list.
Cont.

IGMP Membership Report messages :


• IGMP Membership Report messages are sent by
multicast clients inside the subnet to the router to inform
the intention to join a multicast group or in response to a
Membership Query (MQ) message sent by the router.
IGMP Leave Group (LG) messages :
• Leave Group (LG) messages are sent by multicast clients
to local multicast routers to inform that they are no longer
interested in traffic from a particular group.
Routing, Switching and Forwarding

• In general, forwarding refers to a device sending a


datagram to the next device in the path to the destination.
• switching refers to moving a datagram from one interface
to another within a device
• routing refers to the process a layer-3 device uses to
decide on what to do with a layer-3 packet.
Cont.

Unicast routing:
• Most of the traffic on the internet and intranets known as
unicast data or unicast traffic is sent with
specified destination. Routing unicast data over the
internet is called unicast routing.
• It is the simplest form of routing because the destination is
already known.
• Hence the router just has to
look up the routing table and forward the packet to next
hop.
Cont.

c
Cont.

Broadcast routing
• By default, the broadcast packets are not routed and
forwarded by the routers on any network. Routers create
broadcast domains. But it can be configured to forward
broadcasts in some special cases. A broadcast message is
destined to all network devices.
Broadcast routing can be done in two ways (algorithm):
• A router creates a data packet and then sends it to each
host one by one. In this case, the router creates multiple
copies of single data packet with different destination
addresses
• All packets are sent as unicast but because they are sent to
all, it simulates as if router is broadcasting.
Cont.

• This method consumes lots of bandwidth and router must


destination address of each node.
• Secondly, when router receives a packet that is to be
broadcasted, it simply floods those packets out of all
interfaces. All routers are configured in the same way.
Cont.

Multicast Routing
• Multicast routing is special case of broadcast routing with
significance difference and challenges.
• In broadcast routing, packets are sent to all nodes even if
they do not want it. But in Multicast routing, the data is
sent to only nodes which wants to receive the packets.
Routing algorithm

• In order to transfer the packets from source to the


destination, the network layer must determine the best
route through which packets can be transmitted.
• Whether the network layer provides datagram service or
virtual circuit service, the main job of the network layer is
to provide the best route. The routing protocol provides
this job.
• The routing protocol is a routing algorithm that provides
the best path from the source to the destination. The best
path is the path that has the "least-cost path" from source
to the destination.
• Routing is the process of forwarding the packets from
source to the destination but the best route to send the
packets is determined by the routing algorithm.
Cont.

The Routing algorithm is divided into two categories:


Cont.

Adaptive Routing algorithm


• An adaptive routing algorithm is also known as dynamic
routing algorithm.
• This algorithm makes the routing decisions based on the
topology and network traffic.
• The main parameters related to this algorithm are hop
count, distance and estimated transit time.

An adaptive routing algorithm can be classified into three


parts:

• Link state algorithm is referred to as a centralized


algorithm since it is aware of the cost of each link in the
network.
Cont.

Centralized algorithm:
• It is also known as global routing algorithm as it computes
the least-cost path between source and destination by
using complete and global knowledge about the network.
• This algorithm takes the connectivity between the nodes
and link cost as input, and this information is obtained
before actually performing any calculation.
Isolation algorithm:
• It is an algorithm that obtains the routing information by
using local information rather than gathering information
from other nodes.
Cont.

Distributed algorithm:
• It is also known as decentralized algorithm as it computes
the least-cost path between source and destination in an
iterative and distributed manner.
• In the decentralized algorithm, no node has the
knowledge about the cost of all the network links.
Cont.

Non-Adaptive Routing algorithm


• Non Adaptive routing algorithm is also known as a static
routing algorithm.
• When booting up the network, the routing information
stores to the routers.
• Non Adaptive routing algorithms do not take the routing
decision based on the network topology or network traffic.
Cont.

The Non-Adaptive Routing algorithm is of two types:


• Flooding: In case of flooding, every incoming packet is
sent to all the outgoing links except the one from it has
been reached. The disadvantage of flooding is that node
may contain several copies of a particular packet.

• Random walks: In case of random walks, a packet sent


by the node to one of its neighbors randomly. An
advantage of using random walks is that it uses the
alternative routes very efficiently.
Cont.

Differences b/w Adaptive and Non-Adaptive Routing


Algorithm
Basis Of Comparison Adaptive Routing algorithm Non-Adaptive Routing algorithm

Adaptive Routing algorithm is an algorithm The Non-Adaptive Routing algorithm is an


Define that constructs the routing table based on the algorithm that constructs the static table to
network conditions. determine which node to send the packet.

Adaptive routing algorithm is used by dynamic The Non-Adaptive Routing algorithm is used by
Usage
routing. static routing.

Routing decisions are made based on topology


Routing decision Routing decisions are the static tables.
and network traffic.

The types of adaptive routing algorithm, are


The types of Non Adaptive routing algorithm
Categorization Centralized, isolation and distributed
are flooding and random walks.
algorithm.

Adaptive Routing algorithms are more


Complexity Non-Adaptive Routing algorithms are simple.
complex.
Cont.

Thank you

You might also like