Professional Documents
Culture Documents
CN Unit 3
CN Unit 3
• Distributed: It is distributed in that each node receives information from one or more
of its directly attached neighbors, performs calculation and then distributes the result
back to its neighbors.
• Iterative: It is iterative in that its process continues until no more information is
available to be exchanged between neighbors.
• Asynchronous: It does not require that all of its nodes operate in the lock step with
each other.
• The Distance vector algorithm is a dynamic algorithm.
• It is mainly used in ARPANET, and RIP.
• Each router maintains a distance table known as Vector.
• Knowledge about the whole network: Each router shares its knowledge through the
entire network. The Router sends its collected knowledge about the network to its
neighbours.
• Routing only to neighbours: The router sends its knowledge about the network to
only those routers which have direct links. The router sends whatever it has about the
network through the ports. The information is received by the router and uses the
information to update its own routing table.
• Information sharing at regular intervals: Within 30 seconds, the router sends the
information to the neighbouring routers.
Let dx(y) be the cost of the least-cost path from node x to node y. The least costs are related
by Bellman-Ford equation,
Where the minv is the equation taken for all x neighbours. After traveling from x to v, if we
consider the least-cost path from v to y, the path cost will be c(x,v)+dv(y). The least cost from
x to y is the minimum of c(x,v)+dv(y) taken over all neighbours.
2. Explain the Link state routing algorithm.
Link state routing is a technique in which each router shares the knowledge of its
neighbourhood with every other router in the internetwork.
Knowledge about the neighbourhood: Instead of sending its routing table, a router sends the
information about its neighbourhood only. A router broadcast its identities and cost of the
directly attached links to other routers.
Flooding: Each router sends the information to every other router on the internetwork except
its neighbours. This process is known as Flooding. Every router that receives the packet sends
the copies to all its neighbours. Finally, each and every router receives a copy of the same
information.
Information sharing: A router sends the information to every other router only when the
change occurs in the information.
Reliable Flooding
Route Calculation
Each node uses Dijkstra's algorithm on the graph to calculate the optimal routes to all nodes.
o The Link state routing algorithm is also known as Dijkstra's algorithm which is used to
find the shortest path from one node to every other node in the network.
o The Dijkstra's algorithm is an iterative, and it has the property that after k th iteration
of the algorithm, the least cost paths are well known for k destination nodes.
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
The Security feature is dependent on the application IPSEC is an inbuilt security feature in the IPv6 protocol
• User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the
Internet Protocol suite, referred to as UDP/IP suite.
• Unlike TCP, it is an unreliable and connectionless protocol. So, there is no need to
establish a connection before data transfer.
• The UDP helps to establish low-latency and loss-tolerating connections over the
network. The UDP enables process-to-process communication.
• Though Transmission Control Protocol (TCP) is the dominant transport layer protocol
used with most of the Internet services; provides assured delivery, reliability, and
much more but all these services cost us additional overhead and latency.
• Here, UDP comes into the picture. For real-time services like computer gaming, voice
or video communication, and live conferences; we need UDP. Since high
performance is needed, UDP permits packets to be dropped instead of processing
delayed packets.
•
Applications of UDP
• Used for simple request-response communication when the size of data is less and
hence there is lesser concern about flow and error control.
• It is a suitable protocol for multicasting as UDP supports packet switching.
• UDP is used for some routing update protocols like RIP(Routing Information
Protocol).
• Normally used for real-time applications which can not tolerate uneven delays
between sections of a received message.
Advantages of UDP
• Speed and Efficiency
• Simplicity
• Broadcast support
• Smaller packet size
Disadvantages of UDP
• No reliability
• No flow control
• Vulnerable to attacks
• Limited use cases
• TCP (Transmission Control Protocol) is one of the main protocols of the Internet
protocol suite.
• It lies between the Application and Network Layers which are used in providing
reliable delivery services.
• Transmission Control Protocol is a connection-oriented protocol for communications
that helps in the exchange of messages between different devices over a network.
• The Internet Protocol (IP), which establishes the technique for sending data
packets between computers, works with TCP.
• The position of TCP is at the transport layer of the OSI model. TCP also helps in
ensuring that information is transmitted accurately by establishing a virtual
connection between the sender and receiver.
•
Features of TCP/IP
• Segment Numbering System: TCP keeps track of the segments being
transmitted or received by assigning numbers to each and every single one of
them.
• Connection Oriented: It means sender and receiver are connected to each
other till the completion of the process.
• Full Duplex: In TCP data can be transmitted from receiver to the sender or vice
– versa at the same time.
• Flow Control: Flow control limits the rate at which a sender transfers data.
• Error Control: TCP implements an error control mechanism for reliable data
transfer.
• Congestion Control: TCP takes into account the level of congestion in the
network.
Advantages of TCP
• It is a reliable protocol.
• It provides an error-checking mechanism as well as one for recovery.
• It gives flow control.
• It makes sure that the data reaches the proper destination in the exact order
that it was sent.
• Open Protocol, not owned by any organization or individual.
Disadvantages of TCP
• TCP is made for Wide Area Networks, thus its size can become an issue for
small networks with low resources.
• TCP runs several layers so it can slow down the speed of the network.
• It is not generic in nature. Meaning, it cannot represent any protocol stack
other than the TCP/IP suite.
• No modifications since their development around 30 years ago.
• WWW stands for World Wide Web and is commonly known as the Web. The WWW
was started by CERN in 1989.
• WWW is defined as the collection of different websites around the world,
containing different information shared via local servers(or computers).
• Web pages are linked together using hyperlinks which are HTML-formatted and, also
referred to as hypertext, these are the fundamental units of the Internet and are
accessed through Hyper Text Transfer Protocol(HTTP).
• Such digital connections, or links, allow users to easily access desired information by
connecting relevant pieces of information.
• The benefit of hypertext is it allows you to pick a word or phrase from the text and
click on other sites that have more information about it.
Features of WWW
• WWW is open source.
• It is a distributed system spread across various websites.
• It is a Hypertext Information System.
• It is Cross-Platform.
• Uses Web Browsers to provide a single interface for many services.
• Dynamic, Interactive and Evolving.
Components of the Web:
• Uniform Resource Locator (URL): serves as a system for resources on the web.
• Hyper Text Transfer Protocol (HTTP): specifies communication of browser and
server.
• Hyper Text Markup Language (HTML): defines the structure, organisation and
content of a web page.
TELNET:
• TELNET stands for Teletype Network. It is a type of protocol that enables one
computer to connect to the local computer.
• The computer which starts the connection is known as the local computer.
• The computer which is being connected to i.e. which accepts the connection known
as the remote computer.
• During telnet operation, whatever is being performed on the remote computer will
be displayed by the local computer.
• Telnet operates on a client/server principle. The local computer uses a telnet client
program and the remote computers use a telnet server program.
Modes of Operation:
1. Default Mode: If no other modes are invoked then this mode is used. Echoing is
performed in this mode by the client.
2. Character Mode: Each character typed in this mode is sent by the client to the server.
3. Line Mode: Line editing like echoing, character erasing, etc. is done from the client side.
• IPv6 was developed by Internet Engineering Task Force (IETF) to deal with the
problem of IPv4 exhaustion.
• IPv6 is a 128-bits address having an address space of 2, which is way bigger than
IPv4.
• IPv6 use Hexa-Decimal format separated by colon (:) .
Addressing methods
1. Unicast Address
Unicast Address identifies a single network interface. A packet sent to a unicast address is
delivered to the interface identified by that address.
2. Multicast Address
Multicast Address is used by multiple hosts, called as groups, acquires a multicast
destination address. These hosts need not be geographically together.
3. Anycast Address
Anycast Address is assigned to a group of interfaces. Any packet sent to an anycast
address will be delivered to only one member interface (mostly nearest host possible).
EXAMPLE:
2345:0425:2CA1:0000:0000:0567:5673:23b5
As you can see above, our IPv6 address has 8 groups and each group is seperated by colons.
In each group, there are 4 digits. Each of these digits can be created with 4 bits. Total there
are 128 bits address.
IPv6 addresses are very login addresses, so sometimes we need to shorten these addresses.
To do this we use specific abbreviations in IPv6 World. In other words, there are
some abbreviations that are used with IPv6 address. These abbreviations are mentioned
below with related IPv6 examples
• DNS (Domain Name System) allows you to interact with devices on the Internet
without having to remember long strings of numbers.
• Each computer on the Internet has its own unique address, known as an IP address,
just like every home has a unique address for sending direct mail.
• 104.26.10.228 is an IP address consisting of four sets of numbers extending from 0
to 255 separated by a period.
• It’s not easy having to remember this complicated collection of numbers every time
you want to access a website, which is where DNS comes in
handy. geeksforgeeks.org can be remembered instead of 104.26.10.228.
• When you request a domain name, your computer first checks its local cache to
see if you have recently visited the address. If you haven’t, your computer will
send a request to your recursive DNS server.
• Your ISP will typically provide you with a recursive DNS server, but you can also
use your own.
• A local cache of recently discovered domain names is also kept on this server. If
a local result is discovered, it is returned to your computer, and your request is
completed.
• If the request cannot be met locally, a journey begins with the Internet’s root
DNS server to locate the appropriate response.