SlideShare a Scribd company logo
DCHP,NAT,FORWARDING
OF IP PACKETS
R.Pavithra -MSc(IT)
Department of CS& IT
Nadar saraswathi college of arts &
science
CONTENTS
Dynamic host configuration
protocol
Network address resolution
Forwarding of IP packets
DYNAMIC HOST CONFIGURATION
PROTOCOL
 The dynamic host
configuration protocol
is a network
management protocol
used on UDP/IP
networks whereby a
DHCP server
dynamically assigns an
IP address and other
network configuration
parameters to each
device on a network so
they can communicate
with other IP networks.
DHCP MESSAGE FORMAT:
DHCP Message format hops : Number of
Relay agents a request message traveled .xid :
Transaction ID, a random number chosen by
the client to identify an IP address allocation .
Secs : filed in by the client. The number of
seconds elapsed since the client began address
acquisition or renewal process.
DHCP OPERATION
 DHCP works in a
client/server mode and
operates like any other
client/server relationship .
when a PC connects
DHCP server. The server
assigns or lease an IP
address to that PC. Which
enables The PC ,connects
to the network with that
leased IP address until the
lease expire.
TWO WELL-KNOWN PORTS
 The DHCP employs a
connectionless service model,
using the user datagram
protocol(UDP) . It is implement
with two UDP port numbers for
its operations which are the
same as for the bootstrap
protocol (BOOTP). UDP port
number 67 is the destination
port of a server, and UDP port
number ^* is used by the client.
USING FTP
Software install-FTP/DHCP:
 A dhcpd.conf file on the FTP/DHCP server
tells the 2020 IMG where to go to retrieve the
system software and license file. Once
configured, the 2020 IMG boots from the
FTP/DHCP server and retrieves both the IP
address of software and the CTRL 0 interface
on the 2020 IMG and the location of the
system software and license files.
ERROR CONTROL
 IP address allocation
errors in DHCP:
 When a client attempts
obtain or verify an IP
address, you might see
problems logged to
syslog or in server
debugging mode
output. The following
list of common error
message indicates the
possible causes and
solutions.
 Cause:
A client is requesting a
specific IP address or seeking
to extend a lease on its current
IP address. The DHCP server
cannot find the DHCP network
table for that address
o Solution:
The DHCP network table
might have been deleted
mistakenly, you can recreate
the network table by adding
the network again using DHCP
manager or the dhcp configure
command.
TRANSITION STATES
 The DHCP has been
devised to provide static
and dynamic address
allocation. To provide
dynamic address
allocation, the DHCP
client acts as a state
machine that performs
transitions from one state
to another depending on
the messages it receives
or sends.
NETWORK ADDRESS RESOLUTION
 Network address
translation is a method of
remapping one IP address
space into another by
modifying network
address information in the
IP header of packets
while they are in transit
across a traffic routing
device.
ADDRESS TRANSLATION
 Network address translation (NAT) is a method
of remapping one IP address space into another
by modifying network address information in the
IP header of packets while they are in transit
across a traffic routing device. The technique
was originally used as a short cut to avoid the
need to readdress every host when a network
was moved. it has become and essential tool in
conserving global address space in the face of
IPV4 address exhaustion. One internet-routable
IP address of a NAT gateway can be used for an
entire private network.
TRANSLATION TABLE
 Translation table A table
of information stored
within a processor or
peripheral that is used to
convert encoded
information into another
form of encode with the
same meaning. A
translation table is used to
make the required
conversion.
USING IP ADDRESS
 Network address
translation (NAT)is a
process in which one or
more global Ip address
and vice versa in order to
provide internet access to
the local hosts.
USING POOL OF IP ADDRESS
 In the vision client, right-click the device and
choose inventory.
 In the inventory window, choose logical
inventory>context> IP Pools. A list of IP pools are
display in the content pane.
Field name Description
Table types Display the type of
table ,which is IP Pools.
USING BOTH IP ADDRESS AND PORT
ADDRESS
 The IP address is numerical label assigned to each device
connected to a computer network that uses the internet
protocol for communication. The port number is used to
direct the data to the correct location within this device .
FORWARDING IP PACKETS
 Packet forwarding is done when ulp receives a packet
that has a destination IP address that does not match any
of the IP addresses of the node. A node typically has
multiple addresses: one or more unicast address and at
least one broadcast or multicast address
FORWARDING BASED ON DESTINATION
 Forwarding based on
destination address and
label A connectionless
network(datagram
approach),a router
forwards a packet based
on the destination address
in the header of packet. A
connection-oriented
network(virtual-circuit
approach), a switch
forwards a packet based
on the label attached to
packet.
ADDRESS AGGREGATION
 It alleviates the
problem of increased
size of the table which
results in an increase
in the amount of time
needed to search the
table.
LONGEST MASK MATCHING
 Longest prefix
match(also called
maximum prefix
length match) refers
to an algorithm
used by routers in
internet protocol(
IP) networking to
select an entry from
a forwarding table.
HIERARCHICAL ROUTING
 Hierarchical routing is the
procedure of arranging
routers in a hierarchical
manner. A good example
would be to consider a
corporate internet. Most
corporate intranets consist
of a high speed backbone
network. Connected to
this backbone are routers
which are in turn
connected to a particular
workgroup.
GEOGRAPHICAL ROUTING
Geographic routing( also called georouting
or positions-based routing)at is a routing
principle that relies on geographic position
information. It is mainly proposed for
wireless networks and based on the idea
that the source sends a message to the
geographic location of the destination
instead of using the network address.
FORWARDING TABLE SEARCH
ALGORITHMS
 In Unix operating system there is a routing table
which contains a certain number of tuples. These
tuples are consist of network IP,subnet mask,
gateway IP and interface name. These details are
used to forward a packet to connect to the
outside of its network to connect to the internet.
so this article gives an idea of how the
system takes the decision when a packet is
needed to be forwarded.
CONTINUE……..
Input:201.2.2.2
output: 12.23.44.1 eth9
here, there is no network ip entry in the
which starts with”201”. In this case it choose
default path(0.0.0.0,0.0.0.0,12.0.0) still, it will
perform bitwise and operate each entry and
then chooses default path and gateway to
send packet outside. Default interface to
which system is directly continue.
FORWARDING BASED ON LABEL
 The packet forwarding process at each router is based on
the concept of label swapping. This concept is similar to
what occurs t each asynchronous transfer mode(ATM)
switch in a permanent virtual circuit(PVC) .each MPLS
packet carries a 4-byte encapsulation header that contains
a 20-bit,fixed-length label arrive
MULTI-PROTOCOL LABEL SWITCHING
 Multiprotocol label switching(MPLS) is not a new
technology. It’s been around for several years. Many of
you must be flow the data is transmitted in the network
familiar with how the data is transmitted in the network
from from one place to another in the form of network
packets. These packets contain the source IP address and
the destination IP address .A packet is passed through
several routers contain the routing table which provides
the next-hop information to the packet finally reaches its
destination. This is how the IP forwarding works.
A NEW HEADER
 When you use the
platform label
space, the MPLS
ingress node places
labels in shim
header between the
link –layer header
and the
palyload.the shim
header includes the
following bits.
ROUTERS AS PACKET SWITCHES
 Packet switching is a
concept in computer
networking about how
data is transmitted over
the write. Router is a
server box(like any other
computer) that does
packet switching. A
switch however sits in the
layer below routers and
filters packets belonging
to a particular LAN
segments.
T
H
A
N
K
Y
O
U

More Related Content

What's hot

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Icmp
IcmpIcmp
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
AKSHIT KOHLI
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
Keyur Vadodariya
 
Routing ppt
Routing pptRouting ppt
Routing ppt
ArpiSaxena1
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
Amit Kumar , Jaipur Engineers
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
RochakSrivastava3
 
Email and DNS
Email and DNSEmail and DNS
Email and DNS
Dhananjaysinh Jhala
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
rajshreemuthiah
 
Routing information protocol
Routing information protocolRouting information protocol
Routing information protocol
Saranya Parthasarathy
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
ICMP
ICMPICMP
Snmp
SnmpSnmp

What's hot (20)

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Icmp
IcmpIcmp
Icmp
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Icmp
IcmpIcmp
Icmp
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Icmp
IcmpIcmp
Icmp
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
Email and DNS
Email and DNSEmail and DNS
Email and DNS
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing information protocol
Routing information protocolRouting information protocol
Routing information protocol
 
Transport layer
Transport layer Transport layer
Transport layer
 
ICMP
ICMPICMP
ICMP
 
Snmp
SnmpSnmp
Snmp
 

Similar to DCHP,NAT,forwarding of ip packets

IP fundamentals
IP fundamentals IP fundamentals
IP fundamentals sumit singh
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
DHCP
DHCPDHCP
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Jeff Green
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
Mansi Kansara
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
ShehanMarasinghe1
 
Network Address Port Translation. Residential Network connections vi.pdf
Network Address Port Translation. Residential Network connections vi.pdfNetwork Address Port Translation. Residential Network connections vi.pdf
Network Address Port Translation. Residential Network connections vi.pdf
shalins6
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
As robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxAs robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docx
cargillfilberto
 
Network system.docx
Network system.docxNetwork system.docx
Network system.docx
ODINARARCH
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
manirajan12
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptx
Juvil2
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009Kinshook Chaturvedi
 
Iap final
Iap finalIap final
Iap final
GLIM Digital
 

Similar to DCHP,NAT,forwarding of ip packets (20)

IP fundamentals
IP fundamentals IP fundamentals
IP fundamentals
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
DHCP
DHCPDHCP
DHCP
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Network Address Port Translation. Residential Network connections vi.pdf
Network Address Port Translation. Residential Network connections vi.pdfNetwork Address Port Translation. Residential Network connections vi.pdf
Network Address Port Translation. Residential Network connections vi.pdf
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
As robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxAs robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docx
 
Network system.docx
Network system.docxNetwork system.docx
Network system.docx
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptx
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Hardware9
Hardware9Hardware9
Hardware9
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
 
Iap final
Iap finalIap final
Iap final
 

More from rajshreemuthiah

oracle
oracleoracle
quality
qualityquality
bigdata
bigdatabigdata
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
rajshreemuthiah
 
interface
interfaceinterface
interface
rajshreemuthiah
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
rajshreemuthiah
 
concurrency control
concurrency controlconcurrency control
concurrency control
rajshreemuthiah
 
Education
EducationEducation
Education
rajshreemuthiah
 
Formal verification
Formal verificationFormal verification
Formal verification
rajshreemuthiah
 
Transaction management
Transaction management Transaction management
Transaction management
rajshreemuthiah
 
Multi thread
Multi threadMulti thread
Multi thread
rajshreemuthiah
 
System testing
System testingSystem testing
System testing
rajshreemuthiah
 
software maintenance
software maintenancesoftware maintenance
software maintenance
rajshreemuthiah
 
exception handling
exception handlingexception handling
exception handling
rajshreemuthiah
 
e governance
e governancee governance
e governance
rajshreemuthiah
 
recovery management
recovery managementrecovery management
recovery management
rajshreemuthiah
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
rajshreemuthiah
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
rajshreemuthiah
 
os linux
os linuxos linux
os linux
rajshreemuthiah
 

More from rajshreemuthiah (20)

oracle
oracleoracle
oracle
 
quality
qualityquality
quality
 
bigdata
bigdatabigdata
bigdata
 
polymorphism
polymorphismpolymorphism
polymorphism
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
 
interface
interfaceinterface
interface
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
 
concurrency control
concurrency controlconcurrency control
concurrency control
 
Education
EducationEducation
Education
 
Formal verification
Formal verificationFormal verification
Formal verification
 
Transaction management
Transaction management Transaction management
Transaction management
 
Multi thread
Multi threadMulti thread
Multi thread
 
System testing
System testingSystem testing
System testing
 
software maintenance
software maintenancesoftware maintenance
software maintenance
 
exception handling
exception handlingexception handling
exception handling
 
e governance
e governancee governance
e governance
 
recovery management
recovery managementrecovery management
recovery management
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
 
os linux
os linuxos linux
os linux
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

DCHP,NAT,forwarding of ip packets

  • 1. DCHP,NAT,FORWARDING OF IP PACKETS R.Pavithra -MSc(IT) Department of CS& IT Nadar saraswathi college of arts & science
  • 2. CONTENTS Dynamic host configuration protocol Network address resolution Forwarding of IP packets
  • 3. DYNAMIC HOST CONFIGURATION PROTOCOL  The dynamic host configuration protocol is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.
  • 4. DHCP MESSAGE FORMAT: DHCP Message format hops : Number of Relay agents a request message traveled .xid : Transaction ID, a random number chosen by the client to identify an IP address allocation . Secs : filed in by the client. The number of seconds elapsed since the client began address acquisition or renewal process.
  • 5.
  • 6. DHCP OPERATION  DHCP works in a client/server mode and operates like any other client/server relationship . when a PC connects DHCP server. The server assigns or lease an IP address to that PC. Which enables The PC ,connects to the network with that leased IP address until the lease expire.
  • 7. TWO WELL-KNOWN PORTS  The DHCP employs a connectionless service model, using the user datagram protocol(UDP) . It is implement with two UDP port numbers for its operations which are the same as for the bootstrap protocol (BOOTP). UDP port number 67 is the destination port of a server, and UDP port number ^* is used by the client.
  • 8. USING FTP Software install-FTP/DHCP:  A dhcpd.conf file on the FTP/DHCP server tells the 2020 IMG where to go to retrieve the system software and license file. Once configured, the 2020 IMG boots from the FTP/DHCP server and retrieves both the IP address of software and the CTRL 0 interface on the 2020 IMG and the location of the system software and license files.
  • 9. ERROR CONTROL  IP address allocation errors in DHCP:  When a client attempts obtain or verify an IP address, you might see problems logged to syslog or in server debugging mode output. The following list of common error message indicates the possible causes and solutions.  Cause: A client is requesting a specific IP address or seeking to extend a lease on its current IP address. The DHCP server cannot find the DHCP network table for that address o Solution: The DHCP network table might have been deleted mistakenly, you can recreate the network table by adding the network again using DHCP manager or the dhcp configure command.
  • 10. TRANSITION STATES  The DHCP has been devised to provide static and dynamic address allocation. To provide dynamic address allocation, the DHCP client acts as a state machine that performs transitions from one state to another depending on the messages it receives or sends.
  • 11. NETWORK ADDRESS RESOLUTION  Network address translation is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
  • 12. ADDRESS TRANSLATION  Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. The technique was originally used as a short cut to avoid the need to readdress every host when a network was moved. it has become and essential tool in conserving global address space in the face of IPV4 address exhaustion. One internet-routable IP address of a NAT gateway can be used for an entire private network.
  • 13.
  • 14. TRANSLATION TABLE  Translation table A table of information stored within a processor or peripheral that is used to convert encoded information into another form of encode with the same meaning. A translation table is used to make the required conversion.
  • 15. USING IP ADDRESS  Network address translation (NAT)is a process in which one or more global Ip address and vice versa in order to provide internet access to the local hosts.
  • 16. USING POOL OF IP ADDRESS  In the vision client, right-click the device and choose inventory.  In the inventory window, choose logical inventory>context> IP Pools. A list of IP pools are display in the content pane. Field name Description Table types Display the type of table ,which is IP Pools.
  • 17. USING BOTH IP ADDRESS AND PORT ADDRESS  The IP address is numerical label assigned to each device connected to a computer network that uses the internet protocol for communication. The port number is used to direct the data to the correct location within this device .
  • 18. FORWARDING IP PACKETS  Packet forwarding is done when ulp receives a packet that has a destination IP address that does not match any of the IP addresses of the node. A node typically has multiple addresses: one or more unicast address and at least one broadcast or multicast address
  • 19. FORWARDING BASED ON DESTINATION  Forwarding based on destination address and label A connectionless network(datagram approach),a router forwards a packet based on the destination address in the header of packet. A connection-oriented network(virtual-circuit approach), a switch forwards a packet based on the label attached to packet.
  • 20. ADDRESS AGGREGATION  It alleviates the problem of increased size of the table which results in an increase in the amount of time needed to search the table.
  • 21. LONGEST MASK MATCHING  Longest prefix match(also called maximum prefix length match) refers to an algorithm used by routers in internet protocol( IP) networking to select an entry from a forwarding table.
  • 22. HIERARCHICAL ROUTING  Hierarchical routing is the procedure of arranging routers in a hierarchical manner. A good example would be to consider a corporate internet. Most corporate intranets consist of a high speed backbone network. Connected to this backbone are routers which are in turn connected to a particular workgroup.
  • 23. GEOGRAPHICAL ROUTING Geographic routing( also called georouting or positions-based routing)at is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address.
  • 24. FORWARDING TABLE SEARCH ALGORITHMS  In Unix operating system there is a routing table which contains a certain number of tuples. These tuples are consist of network IP,subnet mask, gateway IP and interface name. These details are used to forward a packet to connect to the outside of its network to connect to the internet. so this article gives an idea of how the system takes the decision when a packet is needed to be forwarded.
  • 25. CONTINUE…….. Input:201.2.2.2 output: 12.23.44.1 eth9 here, there is no network ip entry in the which starts with”201”. In this case it choose default path(0.0.0.0,0.0.0.0,12.0.0) still, it will perform bitwise and operate each entry and then chooses default path and gateway to send packet outside. Default interface to which system is directly continue.
  • 26. FORWARDING BASED ON LABEL  The packet forwarding process at each router is based on the concept of label swapping. This concept is similar to what occurs t each asynchronous transfer mode(ATM) switch in a permanent virtual circuit(PVC) .each MPLS packet carries a 4-byte encapsulation header that contains a 20-bit,fixed-length label arrive
  • 27. MULTI-PROTOCOL LABEL SWITCHING  Multiprotocol label switching(MPLS) is not a new technology. It’s been around for several years. Many of you must be flow the data is transmitted in the network familiar with how the data is transmitted in the network from from one place to another in the form of network packets. These packets contain the source IP address and the destination IP address .A packet is passed through several routers contain the routing table which provides the next-hop information to the packet finally reaches its destination. This is how the IP forwarding works.
  • 28. A NEW HEADER  When you use the platform label space, the MPLS ingress node places labels in shim header between the link –layer header and the palyload.the shim header includes the following bits.
  • 29. ROUTERS AS PACKET SWITCHES  Packet switching is a concept in computer networking about how data is transmitted over the write. Router is a server box(like any other computer) that does packet switching. A switch however sits in the layer below routers and filters packets belonging to a particular LAN segments.