Networks2 PDF
Networks2 PDF
Networks2 PDF
IPV4 IPV6
IPv4 has 32-bit address length IPv6 has 128-bit address length
It Supports Manual and DHCP address
It supports Auto and renumbering address configuration
configuration
In IPv4 end to end connection integrity is
In IPv6 end to end connection integrity is Achievable
Unachievable
Address space of IPv6 is quite large it can produce 3.4×1038
It can generate 4.29×109 address space
address space
Security feature is dependent on application IPSEC is inbuilt security feature in the IPv6 protocol
Address representation of IPv4 in decimal Address Representation of IPv6 is in hexadecimal
Fragmentation performed by Sender and
In IPv6 fragmentation performed only by sender
forwarding routers
In IPv4 Packet flow identification is not In IPv6 packetflow identification are Available and uses flow
available label field in the header
In IPv4 checksumfield is available In IPv6 checksumfield is not available
It has broadcast Message Transmission In IPv6 multicast and any cast message transmission scheme is
Scheme available
In IPv4 Encryption and Authentication facility
In IPv6 Encryption and Authentication are provided
not provided
IPv4 has header of 20-60 bytes. IPv6 has header of 40 bytes fixed
TCP/IP OSI
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP has 5 layers. OSI has 7 layers.
TCP/IP is more reliable OSI is less reliable
TCP/IP does not have very strict boundaries. OSI has strict boundaries
TCP/IP follow a horizontal approach. OSI follows a vertical approach.
TCP/IP uses both session and presentation layer
OSI uses different session and presentation layers.
in the application layer itself.
TCP/IP developed protocols then model. OSI developed model then protocol.
Transport layer in TCP/IP does not provide In OSI model, transport layer provides assurance delivery of
assurance delivery of packets. packets.
TCP/IP model network layer only provides Connection less and connection oriented both services are
connection less services. provided by network layer in OSI model.
Protocols cannot be replaced easily in TCP/IP While in OSI model, Protocols are better covered and is easy
model. to replace with the change in technology.
------------------------------------------------------------------------------------------------------------------------
65/16 = 4.0625
Network ID: 4*16 = 64 (192.168.1.64)
Broadcast ID: 64+(16-1) = 79 (192.168.1.79)
First Host ID: 64 + 1 = 65 (192.168.1.65)
Last Host ID: 79 - 1 = 78 (192.168.1.78)
Ex2: 192.168.20.166/25:
166/128 = 1.296875
Network ID: 1*128 = 128 (192.168.20.128)
Broadcast ID: 128+(128-1) = 255 (192.168.20.255)
First Host ID: 128 + 1 = 129 (192.168.20.129)
Last Host ID: 255 - 1 = 254 (192.168.20.254)
200.1.0.0,
200.1.1.0,
200.1.2.0,
200.1.3.0
Build a bigger network which have a single Network Id.
Explanation – Before Supernetting routing table will be look like as:
NETWORK ID SUBNET MASK INTERFACE
200.1.0.0 255.255.255.0 A
200.1.1.0 255.255.255.0 B
200.1.2.0 255.255.255.0 C
200.1.3.0 255.255.255.0 D
First, lets check whether three condition are satisfied or not:
1. Contiguous: You can easily see that all network are contiguous all having size 256
hosts.
Range of first Network from 200.1.0.0 to 200.1.0.255. If you add 1 in last IP
address of first network that is 200.1.0.255 + 0.0.0.1, you will get the next network
id that is 200.1.1.0. Similarly, check that all network are contiguous.
2. Equal size of all network: As all networks are of class C, so all of the have a size
of 256 which in turn equal to 28.
3. First IP address exactly divisible by total size: When a binary number is
divided by 2n then last n bits are the remainder. Hence in order to prove that first
IP address is exactly divisible by while size of Supernet Network. You can check
that if last n v=bits are 0 or not.
In given example first IP is 200.1.0.0 and whole size of supernet is 4*28 = 210. If
last 10 bits of first IP address are zero then IP will be divisible.
Last 10 bits of first IP address are zero (highlighted by green color). So 3rd
condition is also satisfied.
Therefore, you can join all these 4 networks and can make a Supernet. New Supernet Id
will be 200.1.0.0.
Advantages of Supernetting –
1. Control and reduce network traffic
2. Helpful to solve the problem of lacking IP addresses
3. Minimizes the routing table
Disadvantages of Supernetting –
• It cannot cover different area of network when combined
• All the networks should be in same class and all IP should be contiguous
---------------------------------------------------------------------------------------------------------
MAC Address is a 12-digit hexadecimal number (6-Byte binary number), which is mostly
represented by Colon-Hexadecimal notation. First 6-digits (say 00:40:96) of MAC
Address identifies the manufacturer, called as OUI (Organizational Unique Identifier).
IEEE Registration Authority Committee assign these MAC prefixes to its registered
vendors.
Here are some OUI of well known manufacturers :
CC:46:D6 - Cisco
3C:5A:B4 - Google, Inc.
3C:D9:2B - Hewlett Packard
00:9A:CD - HUAWEI TECHNOLOGIES CO.,LTD
Adaptive Routing
•A router may select a new route for each packet (even packets belonging to the
same transmission) in response to changes in condition and topology of the
networks.
•Examples: Flooding, and Random Walk.
Routing Algorithms
Shortest Path Routing:
•Links between routers have a cost associated with them. In general, it could be a
function of distance, bandwidth, average traffic, communication cost, mean
queue length, measured delay, router processing speed, etc.
•The shortest path algorithm just finds the least expensive path through the
network, based on the cost function.
•Examples: Dijkstra's algorithm
Distance Vector Routing:
•In this routing scheme, each router periodically shares its knowledge about the
entire network with its neighbours.
•Each router has a table with information about the network. These tables are
updated by exchanging information with the immediate neighbours.
•It is also known as Belman-Ford or Ford-Fulkerson Algorithm.
•It is used in the original ARPANET, and in the Internet as RIP.
•Neighbouring nodes in the subnet exchange their tables periodically to update
each other on the state of the subnet (which makes this a dynamic algorithm). If
a neighbour claims to have a path to a node which is shorter than your path, you
start using that neighbour as the route to that node.
Link State Routing:
•The following sequence of steps can be executed in the Link State Routing.
•The basis of this advertising is a short packed called a Link State Packet (LSP).
•OSPF (Open shortest path first) and IS-IS are examples of Link state routing.
•Link State Packet(LSP) contains the following information:
1.The ID of the node that created the LSP;
2.A list of directly connected neighbours of that node, with the cost of
the link to each one;
3.A sequence number;
4.A time to live(TTL) for this packet.
•When a router floods the network with information about its neighbourhood, it is
said to be advertising.
1.Discover your neighbours
2.Measure delay to your neighbours
3.Bundle all the information about your neighbours together
4.Send this information to all other routers in the subnet
5.Compute the shortest path to every router with the information you
receive
6.Each router finds out its own shortest paths to the other routers by
using Dijkstra's algorithm.
Flooding Algorithm:
•It is a non-adaptive algorithm or static algorithm.
•When a router receives a packet, it sends a copy of the packet out on each line
(except the one on which it arrived).
•To prevent from looping forever, each router decrements a hop count contained
in the packet header.
•As soon as the hop count decrements to zero, the router discards the packet.
Flow-Based Routing Algorithm:
•It is a non-adaptive routing algorithm.
•It takes into account both the topology and the load in this routing algorithm;
•We can estimate the flow between all pairs of routers.
•From the known average amount of traffic and the average length of a packet,
you can compute the mean packet delays using queuing theory.
•Flow-based routing then seeks to find a routing table to minimize the average
packet delay through the subnet.
Given the line capacity and the flow, we can determine the delay. It needs to use the
formula for delay time T.
•Where, μ = Mean number of arrivals in packet/sec, 1/μ = The mean packet size
in the bits, and c = Line capacity (bits/s).
The Optimality Principal: This simple states that if router J is on the optimal path
form router I to router k, then the optimal path from J to K also falls along this same
path.