SlideShare a Scribd company logo
21.1
Chapter 21
Network Layer:
Address Mapping,
Error Reporting,
and Multicasting
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
21.2
21-1 ADDRESS MAPPING21-1 ADDRESS MAPPING
The delivery of a packet to a host or a router requiresThe delivery of a packet to a host or a router requires
two levels of addressing:two levels of addressing: logicallogical andand physicalphysical. We need. We need
to be able to map a logical address to its correspondingto be able to map a logical address to its corresponding
physical address and vice versa. This can be done byphysical address and vice versa. This can be done by
using either static or dynamic mapping.using either static or dynamic mapping.
Mapping Logical to Physical Address
Mapping Physical to Logical Address
Topics discussed in this section:Topics discussed in this section:
21.3
Figure 21.1 ARP operation
21.4
Figure 21.2 ARP packet
21.5
Figure 21.3 Encapsulation of ARP packet
21.6
Figure 21.4 Four cases using ARP
21.7
An ARP request is broadcast;
an ARP reply is unicast.
Note
21.8
A host with IP address 130.23.43.20 and physical address
B2:34:55:10:22:10 has a packet to send to another host
with IP address 130.23.43.25 and physical address
A4:6E:F4:59:83:AB. The two hosts are on the same
Ethernet network. Show the ARP request and reply
packets encapsulated in Ethernet frames.
Solution
Figure 21.5 shows the ARP request and reply packets.
Note that the ARP data field in this case is 28 bytes, and
that the individual addresses do not fit in the 4-byte
boundary. That is why we do not show the regular 4-byte
boundaries for these addresses.
Example 21.1
21.9
Figure 21.5 Example 21.1, an ARP request and reply
21.10
Figure 21.6 Proxy ARP
21.11
Figure 21.7 BOOTP client and server on the same and different networks
21.12
DHCP provides static and dynamic
address allocation that can be
manual or automatic.
Note
21.13
21-2 ICMP21-2 ICMP
The IP protocol has no error-reporting or error-The IP protocol has no error-reporting or error-
correcting mechanism. The IP protocol also lacks acorrecting mechanism. The IP protocol also lacks a
mechanism for host and management queries. Themechanism for host and management queries. The
Internet Control Message Protocol (ICMP)Internet Control Message Protocol (ICMP) has beenhas been
designed to compensate for the above two deficiencies.designed to compensate for the above two deficiencies.
It is a companion to the IP protocol.It is a companion to the IP protocol.
Types of Messages
Message Format
Error Reporting and Query
Debugging Tools
Topics discussed in this section:Topics discussed in this section:
21.14
Figure 21.8 General format of ICMP messages
21.15
ICMP always reports error messages to
the original source.
Note
21.16
Figure 21.9 Error-reporting messages
21.17
Important points about ICMP error messages:
❏ No ICMP error message will be generated in
response to a datagram carrying an ICMP error
message.
❏ No ICMP error message will be generated for a
fragmented datagram that is not the first fragment.
❏ No ICMP error message will be generated for a
datagram having a multicast address.
❏ No ICMP error message will be generated for a
datagram having a special address such as
127.0.0.0 or 0.0.0.0.
Note
21.18
Figure 21.10 Contents of data field for the error messages
21.19
Figure 21.11 Redirection concept
21.20
Figure 21.12 Query messages
21.21
Figure 21.13 Encapsulation of ICMP query messages
21.22
Figure 21.14 shows an example of checksum calculation
for a simple echo-request message. We randomly chose
the identifier to be 1 and the sequence number to be 9.
The message is divided into 16-bit (2-byte) words. The
words are added and the sum is complemented. Now the
sender can put this value in the checksum field.
Example 21.2
21.23
Figure 21.14 Example of checksum calculation
21.24
We use the ping program to test the server fhda.edu. The
result is shown on the next slide. The ping program sends
messages with sequence numbers starting from 0. For
each probe it gives us the RTT time. The TTL (time to
live) field in the IP datagram that encapsulates an ICMP
message has been set to 62. At the beginning, ping defines
the number of data bytes as 56 and the total number of
bytes as 84. It is obvious that if we add 8 bytes of ICMP
header and 20 bytes of IP header to 56, the result is 84.
However, note that in each probe ping defines the
number of bytes as 64. This is the total number of bytes in
the ICMP packet (56 + 8).
Example 21.3
21.25
Example 21.3 (continued)
21.26
Figure 21.15 The traceroute program operation
21.27
We use the traceroute program to find the route from the
computer voyager.deanza.edu to the server fhda.edu. The
following shows the result:
Example 21.4
The unnumbered line after the command shows that the
destination is 153.18.8.1. The packet contains 38 bytes: 20
bytes of IP header, 8 bytes of UDP header, and 10 bytes of
application data. The application data are used by
traceroute to keep track of the packets.
21.28
The first line shows the first router visited. The router is
named Dcore.fhda.edu with IP address 153.18.31.254.
The first round-trip time was 0.995 ms, the second was
0.899 ms, and the third was 0.878 ms. The second line
shows the second router visited. The router is named
Dbackup.fhda.edu with IP address 153.18.251.4. The
three round-trip times are also shown. The third line
shows the destination host. We know that this is the
destination host because there are no more lines. The
destination host is the server fhda.edu, but it is named
tiptoe.fhda.edu with the IP address 153.18.8.1. The three
round-trip times are also shown.
Example 21.4 (continued)
21.29
In this example, we trace a longer route, the route to
xerox.com (see next slide). Here there are 17 hops
between source and destination. Note that some round-
trip times look unusual. It could be that a router was too
busy to process the packet immediately.
Example 21.5
21.30
Example 21.5 (continued)
21.31
21-3 IGMP21-3 IGMP
The IP protocol can be involved in two types ofThe IP protocol can be involved in two types of
communication: unicasting and multicasting. Thecommunication: unicasting and multicasting. The
Internet Group Management Protocol (IGMP) is oneInternet Group Management Protocol (IGMP) is one
of the necessary, but not sufficient, protocols that isof the necessary, but not sufficient, protocols that is
involved in multicasting. IGMP is a companion to theinvolved in multicasting. IGMP is a companion to the
IP protocol.IP protocol.
Group Management
IGMP Messages and IGMP Operation
Encapsulation
Netstat Utility
Topics discussed in this section:Topics discussed in this section:
21.32
Figure 21.16 IGMP message types
21.33
Figure 21.17 IGMP message format
21.34
Table 21.1 IGMP type field
21.35
Figure 21.18 IGMP operation
21.36
In IGMP, a membership report is sent
twice, one after the other.
Note
21.37
The general query message does not
define a particular group.
Note
21.38
Imagine there are three hosts in a network, as shown in
Figure 21.19. A query message was received at time 0; the
random delay time (in tenths of seconds) for each group
is shown next to the group address. Show the sequence of
report messages.
Example 21.6
Solution
The events occur in this sequence:
a. Time 12: The timer for 228.42.0.0 in host A expires,
and a membership report is sent, which is received by
the router and every host including host B which
cancels its timer for 228.42.0.0.
21.39
Example 21.6 (continued)
b. Time 30: The timer for 225.14.0.0 in host A expires, and
a membership report is sent which is received by the
router and every host including host C which cancels its
timer for 225.14.0.0.
c. Time 50: The timer for 238.71.0.0 in host B expires,
and a membership report is sent, which is received by
the router and every host.
d. Time 70: The timer for 230.43.0.0 in host C expires,
and a membership report is sent, which is received by
the router and every host including host A which
cancels its timer for 230.43.0.0.
21.40
Figure 21.19 Example 21.6
21.41
Figure 21.20 Encapsulation of IGMP packet
21.42
The IP packet that carries an IGMP
packet has a value of 1 in its TTL field.
Note
21.43
Table 21.2 Destination IP addresses
21.44
Figure 21.21 Mapping class D to Ethernet physical address
21.45
An Ethernet multicast physical address
is in the range
01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF.
Note
21.46
Change the multicast IP address 230.43.14.7 to an
Ethernet multicast physical address.
Solution
We can do this in two steps:
a. We write the rightmost 23 bits of the IP address in
hexadecimal. This can be done by changing the
rightmost 3 bytes to hexadecimal and then subtracting
8 from the leftmost digit if it is greater than or equal to
8. In our example, the result is 2B:0E:07.
Example 21.7
21.47
b. We add the result of part a to the starting Ethernet
multicast address, which is 01:00:5E:00:00:00. The
result is
Example 21.7 (continued)
21.48
Change the multicast IP address 238.212.24.9 to an
Ethernet multicast address.
Solution
a. The rightmost 3 bytes in hexadecimal is D4:18:09. We
need to subtract 8 from the leftmost digit, resulting in
54:18:09.
Example 21.8
b. We add the result of part a to the Ethernet multicast
starting address. The result is
21.49
Figure 21.22 Tunneling
21.50
We use netstat (see next slide) with three options: -n, -r,
and -a. The -n option gives the numeric versions of IP
addresses, the -r option gives the routing table, and the -a
option gives all addresses (unicast and multicast). Note
that we show only the fields relative to our discussion.
“Gateway” defines the router, “Iface” defines the
interface.
Note that the multicast address is shown in color. Any
packet with a multicast address from 224.0.0.0 to
239.255.255.255 is masked and delivered to the Ethernet
interface.
Example 21.9
21.51
Example 21.9 (continued)
21.52
21-4 ICMPv621-4 ICMPv6
We discussed IPv6 in Chapter 20. Another protocolWe discussed IPv6 in Chapter 20. Another protocol
that has been modified in version 6 of the TCP/IPthat has been modified in version 6 of the TCP/IP
protocol suite is ICMP (ICMPv6). This new versionprotocol suite is ICMP (ICMPv6). This new version
follows the same strategy and purposes of version 4.follows the same strategy and purposes of version 4.
Error Reporting
Query
Topics discussed in this section:Topics discussed in this section:
21.53
Figure 21.23 Comparison of network layers in version 4 and version 6
21.54
Table 21.3 Comparison of error-reporting messages in ICMPv4 and ICMPv6
21.55
Table 21.4 Comparison of query messages in ICMPv4 and ICMPv6

More Related Content

What's hot

23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
Ahmar Hashmi
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
Ahmar Hashmi
 
Ch19
Ch19Ch19
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
Ahmar Hashmi
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
Ahmar Hashmi
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
Ahmar Hashmi
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
Ahmar Hashmi
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
Ahmar Hashmi
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
Faisal Mehmood
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
Ahmar Hashmi
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 

What's hot (20)

23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
Ch19
Ch19Ch19
Ch19
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Ch13
Ch13Ch13
Ch13
 
Ch08
Ch08Ch08
Ch08
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Ch 19
Ch 19Ch 19
Ch 19
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch14
Ch14Ch14
Ch14
 
Ch18
Ch18Ch18
Ch18
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ch27
Ch27Ch27
Ch27
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 

Viewers also liked

Chapter 18
Chapter 18Chapter 18
Chapter 18
Faisal Mehmood
 
Frame Relay & X25
Frame Relay & X25Frame Relay & X25
Frame Relay & X25
CurVe Urango
 
FDDI, X.25 y Frame Relay
FDDI, X.25 y Frame RelayFDDI, X.25 y Frame Relay
FDDI, X.25 y Frame Relay
Adrian Castillo
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
Ahmar Hashmi
 
X.25
X.25X.25
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
Dharmesh Patel
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
Ramesh Kumari
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
Tharindu Darshana
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocolamigurumi21
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
Forouzan frame relay
Forouzan frame relayForouzan frame relay
Forouzan frame relay
Mahesh Kumar Chelimilla
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 

Viewers also liked (20)

Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Frame Relay & X25
Frame Relay & X25Frame Relay & X25
Frame Relay & X25
 
FDDI, X.25 y Frame Relay
FDDI, X.25 y Frame RelayFDDI, X.25 y Frame Relay
FDDI, X.25 y Frame Relay
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
Wan technology
Wan technologyWan technology
Wan technology
 
X.25
X.25X.25
X.25
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Forouzan frame relay
Forouzan frame relayForouzan frame relay
Forouzan frame relay
 
X.25
X.25X.25
X.25
 
Chapter 3 frame relay
Chapter 3   frame relayChapter 3   frame relay
Chapter 3 frame relay
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Frame relay
Frame relay Frame relay
Frame relay
 

Similar to 21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting

mapping address.ppt
mapping address.pptmapping address.ppt
mapping address.ppt
Param Eswaran
 
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.pptccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
smanjunarayana
 
Intro-network layer-chapter-18_forouzan.ppt
Intro-network layer-chapter-18_forouzan.pptIntro-network layer-chapter-18_forouzan.ppt
Intro-network layer-chapter-18_forouzan.ppt
ssuser991de0
 
Chapter_18 Introduction to Network Layer
Chapter_18 Introduction to Network LayerChapter_18 Introduction to Network Layer
Chapter_18 Introduction to Network Layer
ssusere481c4
 
icmp protocol.ppt
icmp protocol.ppticmp protocol.ppt
icmp protocol.ppt
Munnakumar518378
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Noctorous Jamal
 
ipv4
ipv4ipv4
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
IGMP.ppt
IGMP.pptIGMP.ppt
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
ZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
ZahouAmel1
 
Simulation of a Wireless Sub Network using QualNET
Simulation of a Wireless Sub Network using QualNETSimulation of a Wireless Sub Network using QualNET
Simulation of a Wireless Sub Network using QualNET
Daksh Raj Chopra
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
Noctorous Jamal
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
FahimJahangir1
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
AKSHIT KOHLI
 

Similar to 21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting (20)

mapping address.ppt
mapping address.pptmapping address.ppt
mapping address.ppt
 
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.pptccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
 
Intro-network layer-chapter-18_forouzan.ppt
Intro-network layer-chapter-18_forouzan.pptIntro-network layer-chapter-18_forouzan.ppt
Intro-network layer-chapter-18_forouzan.ppt
 
Chapter_18 Introduction to Network Layer
Chapter_18 Introduction to Network LayerChapter_18 Introduction to Network Layer
Chapter_18 Introduction to Network Layer
 
Ch22
Ch22Ch22
Ch22
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
Ch22
Ch22Ch22
Ch22
 
icmp protocol.ppt
icmp protocol.ppticmp protocol.ppt
icmp protocol.ppt
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
ipv4
ipv4ipv4
ipv4
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
 
IGMP.ppt
IGMP.pptIGMP.ppt
IGMP.ppt
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Simulation of a Wireless Sub Network using QualNET
Simulation of a Wireless Sub Network using QualNETSimulation of a Wireless Sub Network using QualNET
Simulation of a Wireless Sub Network using QualNET
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 

More from Ahmar Hashmi

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
Ahmar Hashmi
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
Ahmar Hashmi
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
Ahmar Hashmi
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
Ahmar Hashmi
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
Ahmar Hashmi
 
25 DNS
25 DNS25 DNS
25 DNS
Ahmar Hashmi
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
Ahmar Hashmi
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
Ahmar Hashmi
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
Ahmar Hashmi
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
Ahmar Hashmi
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
Ahmar Hashmi
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
Ahmar Hashmi
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
Ahmar Hashmi
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
Ahmar Hashmi
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
Ahmar Hashmi
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
Ahmar Hashmi
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
Ahmar Hashmi
 
03 Data and_Signals
03 Data and_Signals03 Data and_Signals
03 Data and_Signals
Ahmar Hashmi
 

More from Ahmar Hashmi (19)

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
25 DNS
25 DNS25 DNS
25 DNS
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
 
03 Data and_Signals
03 Data and_Signals03 Data and_Signals
03 Data and_Signals
 

Recently uploaded

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting

  • 1. 21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 21.2 21-1 ADDRESS MAPPING21-1 ADDRESS MAPPING The delivery of a packet to a host or a router requiresThe delivery of a packet to a host or a router requires two levels of addressing:two levels of addressing: logicallogical andand physicalphysical. We need. We need to be able to map a logical address to its correspondingto be able to map a logical address to its corresponding physical address and vice versa. This can be done byphysical address and vice versa. This can be done by using either static or dynamic mapping.using either static or dynamic mapping. Mapping Logical to Physical Address Mapping Physical to Logical Address Topics discussed in this section:Topics discussed in this section:
  • 6. 21.6 Figure 21.4 Four cases using ARP
  • 7. 21.7 An ARP request is broadcast; an ARP reply is unicast. Note
  • 8. 21.8 A host with IP address 130.23.43.20 and physical address B2:34:55:10:22:10 has a packet to send to another host with IP address 130.23.43.25 and physical address A4:6E:F4:59:83:AB. The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames. Solution Figure 21.5 shows the ARP request and reply packets. Note that the ARP data field in this case is 28 bytes, and that the individual addresses do not fit in the 4-byte boundary. That is why we do not show the regular 4-byte boundaries for these addresses. Example 21.1
  • 9. 21.9 Figure 21.5 Example 21.1, an ARP request and reply
  • 11. 21.11 Figure 21.7 BOOTP client and server on the same and different networks
  • 12. 21.12 DHCP provides static and dynamic address allocation that can be manual or automatic. Note
  • 13. 21.13 21-2 ICMP21-2 ICMP The IP protocol has no error-reporting or error-The IP protocol has no error-reporting or error- correcting mechanism. The IP protocol also lacks acorrecting mechanism. The IP protocol also lacks a mechanism for host and management queries. Themechanism for host and management queries. The Internet Control Message Protocol (ICMP)Internet Control Message Protocol (ICMP) has beenhas been designed to compensate for the above two deficiencies.designed to compensate for the above two deficiencies. It is a companion to the IP protocol.It is a companion to the IP protocol. Types of Messages Message Format Error Reporting and Query Debugging Tools Topics discussed in this section:Topics discussed in this section:
  • 14. 21.14 Figure 21.8 General format of ICMP messages
  • 15. 21.15 ICMP always reports error messages to the original source. Note
  • 17. 21.17 Important points about ICMP error messages: ❏ No ICMP error message will be generated in response to a datagram carrying an ICMP error message. ❏ No ICMP error message will be generated for a fragmented datagram that is not the first fragment. ❏ No ICMP error message will be generated for a datagram having a multicast address. ❏ No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. Note
  • 18. 21.18 Figure 21.10 Contents of data field for the error messages
  • 21. 21.21 Figure 21.13 Encapsulation of ICMP query messages
  • 22. 21.22 Figure 21.14 shows an example of checksum calculation for a simple echo-request message. We randomly chose the identifier to be 1 and the sequence number to be 9. The message is divided into 16-bit (2-byte) words. The words are added and the sum is complemented. Now the sender can put this value in the checksum field. Example 21.2
  • 23. 21.23 Figure 21.14 Example of checksum calculation
  • 24. 21.24 We use the ping program to test the server fhda.edu. The result is shown on the next slide. The ping program sends messages with sequence numbers starting from 0. For each probe it gives us the RTT time. The TTL (time to live) field in the IP datagram that encapsulates an ICMP message has been set to 62. At the beginning, ping defines the number of data bytes as 56 and the total number of bytes as 84. It is obvious that if we add 8 bytes of ICMP header and 20 bytes of IP header to 56, the result is 84. However, note that in each probe ping defines the number of bytes as 64. This is the total number of bytes in the ICMP packet (56 + 8). Example 21.3
  • 26. 21.26 Figure 21.15 The traceroute program operation
  • 27. 21.27 We use the traceroute program to find the route from the computer voyager.deanza.edu to the server fhda.edu. The following shows the result: Example 21.4 The unnumbered line after the command shows that the destination is 153.18.8.1. The packet contains 38 bytes: 20 bytes of IP header, 8 bytes of UDP header, and 10 bytes of application data. The application data are used by traceroute to keep track of the packets.
  • 28. 21.28 The first line shows the first router visited. The router is named Dcore.fhda.edu with IP address 153.18.31.254. The first round-trip time was 0.995 ms, the second was 0.899 ms, and the third was 0.878 ms. The second line shows the second router visited. The router is named Dbackup.fhda.edu with IP address 153.18.251.4. The three round-trip times are also shown. The third line shows the destination host. We know that this is the destination host because there are no more lines. The destination host is the server fhda.edu, but it is named tiptoe.fhda.edu with the IP address 153.18.8.1. The three round-trip times are also shown. Example 21.4 (continued)
  • 29. 21.29 In this example, we trace a longer route, the route to xerox.com (see next slide). Here there are 17 hops between source and destination. Note that some round- trip times look unusual. It could be that a router was too busy to process the packet immediately. Example 21.5
  • 31. 21.31 21-3 IGMP21-3 IGMP The IP protocol can be involved in two types ofThe IP protocol can be involved in two types of communication: unicasting and multicasting. Thecommunication: unicasting and multicasting. The Internet Group Management Protocol (IGMP) is oneInternet Group Management Protocol (IGMP) is one of the necessary, but not sufficient, protocols that isof the necessary, but not sufficient, protocols that is involved in multicasting. IGMP is a companion to theinvolved in multicasting. IGMP is a companion to the IP protocol.IP protocol. Group Management IGMP Messages and IGMP Operation Encapsulation Netstat Utility Topics discussed in this section:Topics discussed in this section:
  • 32. 21.32 Figure 21.16 IGMP message types
  • 33. 21.33 Figure 21.17 IGMP message format
  • 34. 21.34 Table 21.1 IGMP type field
  • 36. 21.36 In IGMP, a membership report is sent twice, one after the other. Note
  • 37. 21.37 The general query message does not define a particular group. Note
  • 38. 21.38 Imagine there are three hosts in a network, as shown in Figure 21.19. A query message was received at time 0; the random delay time (in tenths of seconds) for each group is shown next to the group address. Show the sequence of report messages. Example 21.6 Solution The events occur in this sequence: a. Time 12: The timer for 228.42.0.0 in host A expires, and a membership report is sent, which is received by the router and every host including host B which cancels its timer for 228.42.0.0.
  • 39. 21.39 Example 21.6 (continued) b. Time 30: The timer for 225.14.0.0 in host A expires, and a membership report is sent which is received by the router and every host including host C which cancels its timer for 225.14.0.0. c. Time 50: The timer for 238.71.0.0 in host B expires, and a membership report is sent, which is received by the router and every host. d. Time 70: The timer for 230.43.0.0 in host C expires, and a membership report is sent, which is received by the router and every host including host A which cancels its timer for 230.43.0.0.
  • 42. 21.42 The IP packet that carries an IGMP packet has a value of 1 in its TTL field. Note
  • 44. 21.44 Figure 21.21 Mapping class D to Ethernet physical address
  • 45. 21.45 An Ethernet multicast physical address is in the range 01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF. Note
  • 46. 21.46 Change the multicast IP address 230.43.14.7 to an Ethernet multicast physical address. Solution We can do this in two steps: a. We write the rightmost 23 bits of the IP address in hexadecimal. This can be done by changing the rightmost 3 bytes to hexadecimal and then subtracting 8 from the leftmost digit if it is greater than or equal to 8. In our example, the result is 2B:0E:07. Example 21.7
  • 47. 21.47 b. We add the result of part a to the starting Ethernet multicast address, which is 01:00:5E:00:00:00. The result is Example 21.7 (continued)
  • 48. 21.48 Change the multicast IP address 238.212.24.9 to an Ethernet multicast address. Solution a. The rightmost 3 bytes in hexadecimal is D4:18:09. We need to subtract 8 from the leftmost digit, resulting in 54:18:09. Example 21.8 b. We add the result of part a to the Ethernet multicast starting address. The result is
  • 50. 21.50 We use netstat (see next slide) with three options: -n, -r, and -a. The -n option gives the numeric versions of IP addresses, the -r option gives the routing table, and the -a option gives all addresses (unicast and multicast). Note that we show only the fields relative to our discussion. “Gateway” defines the router, “Iface” defines the interface. Note that the multicast address is shown in color. Any packet with a multicast address from 224.0.0.0 to 239.255.255.255 is masked and delivered to the Ethernet interface. Example 21.9
  • 52. 21.52 21-4 ICMPv621-4 ICMPv6 We discussed IPv6 in Chapter 20. Another protocolWe discussed IPv6 in Chapter 20. Another protocol that has been modified in version 6 of the TCP/IPthat has been modified in version 6 of the TCP/IP protocol suite is ICMP (ICMPv6). This new versionprotocol suite is ICMP (ICMPv6). This new version follows the same strategy and purposes of version 4.follows the same strategy and purposes of version 4. Error Reporting Query Topics discussed in this section:Topics discussed in this section:
  • 53. 21.53 Figure 21.23 Comparison of network layers in version 4 and version 6
  • 54. 21.54 Table 21.3 Comparison of error-reporting messages in ICMPv4 and ICMPv6
  • 55. 21.55 Table 21.4 Comparison of query messages in ICMPv4 and ICMPv6