SlideShare a Scribd company logo
1 of 35
Download to read offline
7.1
Chapter 7
Network Layer:
IPAddress assignment &
Routing
• Computer Networks
• Al-Mustansiryah University
• Elec. Eng. Department College of Engineering
Fourth Year Class
IP Address assignment Methods:
• Manual Host Configuration
• RARP
• BOOTP
• DHCP
7.2
Manual Host Configuration
• Required elements:
– IP Address
– Subnet Mask
– Default Gateway
7.3
RARP
• RARP, or Reverse Address Resolution
Protocol.
• Like ARP, used to map MAC address to IP
addresses.
• Works in reverse - used by devices to find their
own IP address.
7.4
RARP request & reply
• Diskless workstations will send a RARP request,
which is a Layer-2 broadcast.
• Only a RARP server can respond to a RARP
request.
• RARP servers maintain a table of IP to MAC
address mappings for RARP clients.
• During the boot process, RARP clients call the
RARP server to obtain their IP configuration
information.
7.5
ARP/RARP Message Structure
7.6
7.7
Computer FE:ED:F9:23:44:EF needs to get its IP address for
internal operation
7.8
RARP: Request Generation
Computer FE:ED:F9:23:44:EF generates a RARP request.
7.9
Reply Generation
The RARP server creates a RARP reply message for the
requesting client
7.10
BOOTP
• Client sends a bootrequest packet - a Layer 3
broadcast (255.255.255.255)
• BOOTP server responds with a bootreply
packet containing client’s IP address and
gateway IP address.
7.11
BOOTP Message Structure
7.12
7.13
DHCP
• Like BOOTP:
– Client sends an IP broadcast datagram.
– DHCP server returns packet containing IP address
of client and gateway.
• Unlike BOOTP:
– Server can return additional information and
provide a complete IP configuration:
• Subnet mask
• Domain Name Server address
7.14
DHCP - Benefits
• Low maintenance
• Provides complete IP configuration
• Easy to renumber your network - just
change the address range covered by the
DHCP server
7.15
FORWARDING
Forwarding means to place the packet in its route to its
destination. Forwarding requires a host or a router to
have a routing table. When a host has a packet to send
or when a router has received a packet to be forwarded,
it looks at this table to find the route to the final
destination.
7.16
Routing Protocol & Routing Algorithm
A Routing Protocol is a combination of rules and
procedures that lets routers in an internet inform
each other of changes.
A Routing Algorithm is that part of network layer
software responsible for deciding which output
line and incoming packet should be transmitted
on.
7.17
Default routing
R1 is used to route packets to hosts
connected to N2.
However, R2 is used to as default to
route other packets to the rest of
Internet without listing all the
networks involved
Only one default routing is allowed
with network address 0.0.0.0
7.18
Make a routing table for router R1, using the
configuration in Figure below
Routing table for router R1 in Figure aboveSolution
m3
The table is sorted from the longest mask to the shortest mask.
Example .1
7.19
Configuration for routing example
Mask Dest. Next Hop I.
255.0.0.0 111.0.0.0 -- m0
255.255.255.224 193.14.5.160 - m2
255.255.255.224 193.14.5.192 - m1
255.255.255.255 194.17.21.16 111.20.18.14 m0
255.255.255.0 192.16.7.0 111.15.17.32 m0
255.255.255.0 194.17.21.0 111.20.18.14 m0
0.0.0.0 0.0.0.0 111.30.31.18 m0
Standard
delivery
Host-specific
Network-
specific
Default
Example .2
7.20
Make the routing table for router R1 in figure below
Subnet mask Destination Next Hop I.
255.255.255.0 200.8.4.0 ---- m2
255.255.255.0 80.4.5.0 201.4.10.3 m1
or 200.8.4.12 or m2
255.255.255.0 80.4.6.0 201.4.10.3 m1
or 200.4.8.12 or m2
0.0.0.0 0.0.0.0 m0
Solution
Example .3
7.21
Routing Protocol:
Interior Vs Exterior
7.22
Routing Architecture in the Internet
An AS is a group of networks and routers under the authority
of a single administrator.
7.23
A static routing table
contains information entered manually
Usually remained unchanged.
A dynamic routing table is updated
periodically or whenever necessarily
using one of the dynamic routing protocols
such as RIP, OSPF, or BGP.
Static versus Dynamic Routing
7.24
Routing Protocols: Interior vs Exterior
7.25
1)Routing Information Protocol (RIP)
a) RIP is based on distance vector routing
b) RIP treats all network equals; the cost of passing thru a network is
the same: one hop count per network.
c) Each router/node maintains a table of minimum number of hop-
count.
d) Path costs are based on number of hops.
7.26
Distance Vector Routing (DVR)
3 keys to understand how this algorithm works:
• Sharing knowledge about the entire AS. Each
router shares whatever it has.
• Sharing only with immediate neighbours.
• Sharing at regular intervals. e.g. every 30 sec.
7.27
Initialization of tables in distance vector routing (DVR)
7.28
Updating in distance vector routing example: C to A
A to A via C: ACA = AC+ CA = 2+2
A to B via C: ACB = AC + CB = 2+4
From C From A
A to D via C: ACD = AC + CD = 2+ inf.
A to C via C: ACC = AC + CC = 2+0
A to E via C: ACD = AC + CE = 2+4
7.29
Final Distance vector routing tables
7.30
2) Open Shortest Path First (OSPF)
a) OSPF uses link state routing to update the routing table in an area;
(OSPF divides an AS into different areas).
b) Unlike RIP, OSPF treats the entire network with different
philosophy; depending on the types, cost (metric) and condition of
each link: to define the ‘state’ of a link.
7.31
1. Start with the local node (router): the root of the tree.
2. Assign a cost of 0 to this node and make it the first permanent node.
3. Examine each neighbour node of the node that was the last
permanent node.
4. Assign a cumulative cost to each node and make it tentative.
5. Among the list of tentative nodes
a. Find the node with the smallest cumulative cost and make it permanent.
b. If a node can be reached from more than one direction
i. Select the direction with the shortest cumulative cost.
6. Repeat steps 3 to 5 until every node becomes permanent.
Shortest Path Search
Dijkstra’s Algorithm
7.32
Example of formation of shortest path tree
7.33
Shortest Path Search
The steps used in computing the shortest path from A to D.
The arrows indicate the working node – permanent label.
The cost can relates to
delay
Start search and
compare with
tentative label
Mark permanent
when shortest
node found
Once permanent
never changed
Tentative node can
always be search
and relabelled
Tentative label
change
7.34
3) BGP & Path Vector Routing (PVR)
a) Border Gateway Protocol (BGP) is an inter-domain or inter-
autonomous system routing protocol: routing between different ASs.
b) BGP uses path vector routing to update the routing table in an area.
c) DVR and LSR are not suitable candidates for inter-AS routing :
d) PVR defines the exact paths as an ordered list of ASs that a packet
should travel thru to reach the destination (besides having the
destination network and next router info.) in its routing table.
7.35

More Related Content

What's hot

Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding techniquerajib_
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Tutun Juhana
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 

What's hot (20)

Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Routing
RoutingRouting
Routing
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Ch22
Ch22Ch22
Ch22
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 

Similar to Network layer

All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxsazia7
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccnarobertoxe
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing LayerPawan Singh
 
ospf.ppt
ospf.pptospf.ppt
ospf.pptSolWeje
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Dân Chơi
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxJuvil2
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptRamya Nellutla
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxsayidkhalif
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 

Similar to Network layer (20)

OSPF.pdf
OSPF.pdfOSPF.pdf
OSPF.pdf
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Ch5
Ch5Ch5
Ch5
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing Layer
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptx
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].ppt
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 

Recently uploaded

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Network layer

  • 1. 7.1 Chapter 7 Network Layer: IPAddress assignment & Routing • Computer Networks • Al-Mustansiryah University • Elec. Eng. Department College of Engineering Fourth Year Class
  • 2. IP Address assignment Methods: • Manual Host Configuration • RARP • BOOTP • DHCP 7.2
  • 3. Manual Host Configuration • Required elements: – IP Address – Subnet Mask – Default Gateway 7.3
  • 4. RARP • RARP, or Reverse Address Resolution Protocol. • Like ARP, used to map MAC address to IP addresses. • Works in reverse - used by devices to find their own IP address. 7.4
  • 5. RARP request & reply • Diskless workstations will send a RARP request, which is a Layer-2 broadcast. • Only a RARP server can respond to a RARP request. • RARP servers maintain a table of IP to MAC address mappings for RARP clients. • During the boot process, RARP clients call the RARP server to obtain their IP configuration information. 7.5
  • 7. 7.7
  • 8. Computer FE:ED:F9:23:44:EF needs to get its IP address for internal operation 7.8
  • 9. RARP: Request Generation Computer FE:ED:F9:23:44:EF generates a RARP request. 7.9
  • 10. Reply Generation The RARP server creates a RARP reply message for the requesting client 7.10
  • 11. BOOTP • Client sends a bootrequest packet - a Layer 3 broadcast (255.255.255.255) • BOOTP server responds with a bootreply packet containing client’s IP address and gateway IP address. 7.11
  • 13. 7.13
  • 14. DHCP • Like BOOTP: – Client sends an IP broadcast datagram. – DHCP server returns packet containing IP address of client and gateway. • Unlike BOOTP: – Server can return additional information and provide a complete IP configuration: • Subnet mask • Domain Name Server address 7.14
  • 15. DHCP - Benefits • Low maintenance • Provides complete IP configuration • Easy to renumber your network - just change the address range covered by the DHCP server 7.15
  • 16. FORWARDING Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table. When a host has a packet to send or when a router has received a packet to be forwarded, it looks at this table to find the route to the final destination. 7.16
  • 17. Routing Protocol & Routing Algorithm A Routing Protocol is a combination of rules and procedures that lets routers in an internet inform each other of changes. A Routing Algorithm is that part of network layer software responsible for deciding which output line and incoming packet should be transmitted on. 7.17
  • 18. Default routing R1 is used to route packets to hosts connected to N2. However, R2 is used to as default to route other packets to the rest of Internet without listing all the networks involved Only one default routing is allowed with network address 0.0.0.0 7.18
  • 19. Make a routing table for router R1, using the configuration in Figure below Routing table for router R1 in Figure aboveSolution m3 The table is sorted from the longest mask to the shortest mask. Example .1 7.19
  • 20. Configuration for routing example Mask Dest. Next Hop I. 255.0.0.0 111.0.0.0 -- m0 255.255.255.224 193.14.5.160 - m2 255.255.255.224 193.14.5.192 - m1 255.255.255.255 194.17.21.16 111.20.18.14 m0 255.255.255.0 192.16.7.0 111.15.17.32 m0 255.255.255.0 194.17.21.0 111.20.18.14 m0 0.0.0.0 0.0.0.0 111.30.31.18 m0 Standard delivery Host-specific Network- specific Default Example .2 7.20
  • 21. Make the routing table for router R1 in figure below Subnet mask Destination Next Hop I. 255.255.255.0 200.8.4.0 ---- m2 255.255.255.0 80.4.5.0 201.4.10.3 m1 or 200.8.4.12 or m2 255.255.255.0 80.4.6.0 201.4.10.3 m1 or 200.4.8.12 or m2 0.0.0.0 0.0.0.0 m0 Solution Example .3 7.21
  • 23. Routing Architecture in the Internet An AS is a group of networks and routers under the authority of a single administrator. 7.23
  • 24. A static routing table contains information entered manually Usually remained unchanged. A dynamic routing table is updated periodically or whenever necessarily using one of the dynamic routing protocols such as RIP, OSPF, or BGP. Static versus Dynamic Routing 7.24
  • 25. Routing Protocols: Interior vs Exterior 7.25
  • 26. 1)Routing Information Protocol (RIP) a) RIP is based on distance vector routing b) RIP treats all network equals; the cost of passing thru a network is the same: one hop count per network. c) Each router/node maintains a table of minimum number of hop- count. d) Path costs are based on number of hops. 7.26
  • 27. Distance Vector Routing (DVR) 3 keys to understand how this algorithm works: • Sharing knowledge about the entire AS. Each router shares whatever it has. • Sharing only with immediate neighbours. • Sharing at regular intervals. e.g. every 30 sec. 7.27
  • 28. Initialization of tables in distance vector routing (DVR) 7.28
  • 29. Updating in distance vector routing example: C to A A to A via C: ACA = AC+ CA = 2+2 A to B via C: ACB = AC + CB = 2+4 From C From A A to D via C: ACD = AC + CD = 2+ inf. A to C via C: ACC = AC + CC = 2+0 A to E via C: ACD = AC + CE = 2+4 7.29
  • 30. Final Distance vector routing tables 7.30
  • 31. 2) Open Shortest Path First (OSPF) a) OSPF uses link state routing to update the routing table in an area; (OSPF divides an AS into different areas). b) Unlike RIP, OSPF treats the entire network with different philosophy; depending on the types, cost (metric) and condition of each link: to define the ‘state’ of a link. 7.31
  • 32. 1. Start with the local node (router): the root of the tree. 2. Assign a cost of 0 to this node and make it the first permanent node. 3. Examine each neighbour node of the node that was the last permanent node. 4. Assign a cumulative cost to each node and make it tentative. 5. Among the list of tentative nodes a. Find the node with the smallest cumulative cost and make it permanent. b. If a node can be reached from more than one direction i. Select the direction with the shortest cumulative cost. 6. Repeat steps 3 to 5 until every node becomes permanent. Shortest Path Search Dijkstra’s Algorithm 7.32
  • 33. Example of formation of shortest path tree 7.33
  • 34. Shortest Path Search The steps used in computing the shortest path from A to D. The arrows indicate the working node – permanent label. The cost can relates to delay Start search and compare with tentative label Mark permanent when shortest node found Once permanent never changed Tentative node can always be search and relabelled Tentative label change 7.34
  • 35. 3) BGP & Path Vector Routing (PVR) a) Border Gateway Protocol (BGP) is an inter-domain or inter- autonomous system routing protocol: routing between different ASs. b) BGP uses path vector routing to update the routing table in an area. c) DVR and LSR are not suitable candidates for inter-AS routing : d) PVR defines the exact paths as an ordered list of ASs that a packet should travel thru to reach the destination (besides having the destination network and next router info.) in its routing table. 7.35