0% found this document useful (0 votes)
62 views19 pages

CSVTU Syllabus Unit 3 Routing Protocols (INTRODUCTION)

An Automated Teller Machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transaction , such as cash withdrawals , deposits , transfer funds , or obtaining account information , at any time and without the need for direct interaction with bank staff.

Uploaded by

Eshita Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views19 pages

CSVTU Syllabus Unit 3 Routing Protocols (INTRODUCTION)

An Automated Teller Machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transaction , such as cash withdrawals , deposits , transfer funds , or obtaining account information , at any time and without the need for direct interaction with bank staff.

Uploaded by

Eshita Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

CSVTU Syllabus

Unit 3 Routing Protocols (INTRODUCTION )


Compiled by
Dr. Jaspal Bagga

(Member  CSI, ISTE, IAENG, IE(I), INTERNET SOCIETY, CII)


Professor (Electronics and Telecommunication)
Head Of Department (Information Technology)
Shri Shankaracharya Technical Campus
Junwani, Bhilai, District-Durg, Chhattisgarh, India-490020.
Email: [email protected]
Outline
 Define types of casting
 Transport Layer Protocol used (TCP or UDP)
 Applications
 Understanding with Examples
Routing Protocols
The topics discussed in this section include:

UNICAST ,MULTICAST ,BROADCAST


A message can be unicast, multicast, or broadcast OR anycast
UNICAST

Unicast is a type of communication where data is sent from one computer to


another computer.
In Unicast type of communication, there is only one sender, and one receiver.

Example: 1) Browsing a website. (Webserver is the sender and your


computer is the receiver.)
2) Downloading a file from a FTP Server. (FTP Server is the sender and
your computer is the receiver)
In unicasting, the router forwards the received packet
UNICAST through only one of its interfaces.
UNICAST

Packet is sent from a single source to a specified destination.


Predominant form of transmission on LANs and within the Internet.

All LANs (e.g. Ethernet) and IP networks support the unicast


transfer mode
Standard unicast applications (e.g. HTTP, SMTP, FTP and
TELnet) which employ the TCP transport protocol.
Multicast
In multicasting, one/more senders and one/more recipients
participate in data transfer traffic.

Multicast lets server direct single copies of data streams that are
then simulated and routed to hosts that request it
IP multicast requires support of some other protocols like IGMP
(Internet Group Management Protocol), Multicast routing for its
working. Also in Classful IP addressing Class D is reserved for
multicast groups.
In multicasting, the router may forward the received
packet through several of its interfaces.
Applications
Unicast uses TCP (Transmission Control Protocol) for communications
while Multicast uses UDP (User Datagram Protocol).
TCP, as you remember, is an acknowledged protocol.
UDP is smaller, simpler, and more efficient, but if some of your receivers don't get one or
more messages, there is no way to know

Multicasting has many applications today such as


Access to distributed databases,
Information dissemination,
Teleconferencing, and
Distance learning.
Sending a message to a particular group of people on whatsapp
Sending an email to a particular group of people
Multicasting versus Multiple Unicasting

MULTICASTING : Starts with one


single packet from source that is
duplicated by routers .destination

MULTIPLE UNICASTING : Several


packets start from source. if there are
four destinations . Source send four
packets each with a different unicast
destination address
Does Netflix use multicast ???
Since multicast is so much more efficient than unicast, large companies like Netflix and Youtube
must be using this to stream videos right?

FIND THE ANSWER


Broadcast Routing
Broadcastingtransfer (one-to-all) techniques can be classified into twotypes :

 LIMITED BROADCAST  DIRECTED BROADCAST

It will append 255.255.255.255 (all the 32 bits of o Useful when a device in one network wants to transfer
IP address set to 1) called as Limited Broadcast packet stream to all the devices over the other network.
Address in the destination address of the o This is achieved by translating all the Host ID part bits of the
datagram (packet) header which is reserved for destination address to 1,referred as Direct Broadcast
information transfer to all the recipients from a Address in the datagram header for information transfer.
single client (sender) over the network.   Television networks for video and audio distribution.
 ARP
Limited broadcast address
Example-
 
Host A having IP Address 11.1.2.3 sending data to all other hosts residing in the same network.
Here,
Source Address = IP Address of host A = 11.1.2.3
Destination Address = 255.255.255.255
 
Directed Broadcast Address (DBA)
Example-
 
Host A having IP Address 11.1.2.3 sending data to all other hosts residing in the network having
IP Address 20.0.0.0
Here,
Source Address = IP Address of host A = 11.1.2.3
Destination Address = 20.255.255.255
IDENTIFY CA,CB, CC,CD,CE
IP ADDRESS NID DBA LBA

10.20.30.40 10.0.0.0 10.255.255.255 255.255.255.255

130.10.20.30 130.10.0.0 130.10.255.255 255.255.255.255

200.10.10.10 200.10.10.0 200.10.10.255 255.255.255.255

250.0.10.20 X X X
Special IP Addresses
Not all IP addresses can be used for hosts; in fact, there are some IP addresses that are assigned
by the Internet Assigned Numbers Authority (IANA) for special purposes.
EXERCISE
If Direct Broadcast Address of subnet is 201.15.16.31. Which of the following will be subnet
mask ?
(A) 255.255.255.240
(B) 255.255.255.192
(C) 255.255.255.198
(D) None Of the Above

You might also like