Unit 3
Unit 3
1 Pallati Narsimhulu
Assistant Professor, Dept. of CSE
UNIT III
Network layer
Network layer design issues,
Routing algorithms,
Congestion control algorithms,
Quality of service,
Ipv4, ipv6,
Network layer protocols:
ARP,
RARP,
ICMP,
IGMP and
DHCP.
2
NETWORK LAYER DESIGN ISSUES &
ROUTING ALGORITHMS
Forwarding Techniques
Forwarding Process
Intra domain and Inter-domain Routing
Static and Dynamic Routing
Distance Vector Routing
Link State Routing
Path Vector Routing
RIPv1
RIPv2
OSPF
EIGRP
BGP 3
DELIVERY
The network layer supervises the handling of the packets
by the underlying physical networks.
We define this handling as the delivery of a packet.
4
DIRECT AND INDIRECT DELIVERY
5
FORWARDING
Forwarding means to place the packet in its route to its
destination. Forwarding requires a host or a router to
have a routing table.
When a host has a packet to send or when a router has
received a packet to be forwarded, it looks at this table
to find the route to the final destination.
Topics discussed in this section
Forwarding Techniques
Forwarding Process
Routing Table
6
ROUTE METHOD VERSUS NEXT-HOP
METHOD
7
HOST-SPECIFIC VERSUS NETWORK-SPECIFIC METHOD
8
DEFAULT METHOD
9
SIMPLIFIED FORWARDING MODULE IN CLASSLESS
ADDRESS
Note
10
MAKE A ROUTING TABLE FOR ROUTER R1, USING THE
CONFIGURATION BELOW
11
SHOW THE FORWARDING PROCESS IF A PACKET ARRIVES AT R1
IN SLIDE 11 WITH THE DESTINATION ADDRESS 180.70.65.140.
Solution
The router performs the following steps:
Solution
This time all masks are applied, one by one, to the
destination address, but no matching network address is
found.
When it reaches the end of the table, the module gives
the next-hop address 180.70.65.200 and interface
number m2 to ARP.
This is probably an outgoing package that needs to be
sent, via the default router, to someplace else in the
Internet.
14
ADDRESS AGGREGATION
15
As an example of hierarchical routing, let us consider figure in
slide 18.
A regional ISP is granted 16,384 addresses starting from
120.14.64.0.
The regional ISP has decided to divide this block into four sub-
blocks, each with 4096 addresses.
Three of these sub-blocks are assigned to three local ISPs; the
second sub-block is reserved for future use.
Note that the mask for each block is /20 because the original block
with mask /18 is divided into 4 blocks.
The first local ISP has divided its assigned sub-block into 8
smaller blocks and assigned each to a small ISP. Each small
ISP provides services to 128 households, each using four
addresses.
16
The second local ISP has divided its block into 4 blocks and
has assigned the addresses to four large organizations.
The third local ISP has divided its block into 16 blocks and
assigned each block to a small organization. Each small
organization has 256 addresses, and the mask is /24.
There is a sense of hierarchy in this configuration.
17
HIERARCHICAL ROUTING WITH ISPS
18
COMMON FIELDS IN A ROUTING TABLE
19
Example
One utility that can be used to find the contents of a routing table
for a host or router is netstat in UNIX or LINUX.
The next slide shows the list of the contents of a default server.
We have used two options, r and n.
The option r indicates that we are interested in the routing table,
and the option n indicates that we are looking for numeric
addresses.
Note that this is a routing table for a host, not a router.
Although we discussed the routing table for a router throughout this
chapter, a host also needs a routing table.
20
Example Contd…
21
CONFIGURATION OF THE SERVER FOR THE
PREVIOUSLY DISCUSSED EXAMPLE
22
UNICAST ROUTING PROTOCOLS
23
UNICAST ROUTING PROTOCOLS
Optimization
Intra- and Inter-domain routing
Distance Vector Routing and RIP
Link State Routing and OSPF
Path Vector Routing and BGP
24
AUTONOMOUS SYSTEMS
25
POPULAR ROUTING PROTOCOLS
26
DISTANCE VECTOR ROUTING TABLES
27
INITIALIZATION OF TABLES IN DISTANCE VECTOR ROUTING
28
NOTE
29
UPDATING IN DISTANCE VECTOR ROUTING
30
TWO-NODE INSTABILITY
31
THREE-NODE INSTABILITY
32
EXAMPLE OF A DOMAIN USING RIP
NOTE: The distance is defined as the number of links (networks) to reach the
destination. For this reason, the metric in RIP is called a hop count. Infinity is
defined as 16, which means that any route in an autonomous system using
RIP cannot have more than 15 hops.
33
CONCEPT OF LINK STATE ROUTING
34
LINK STATE KNOWLEDGE
35
DIJKSTRA ALGORITHM
36
EXAMPLE OF FORMATION OF SHORTEST
PATH TREE
37
AREAS IN AN AUTONOMOUS SYSTEM
38
TYPES OF LINKS
39
POINT-TO-POINT LINK
40
TRANSIENT LINK
41
STUB LINK
42
EXAMPLE OF AN AS AND ITS GRAPHICAL
REPRESENTATION IN OSPF
43
INITIAL ROUTING TABLES IN PATH VECTOR ROUTING
44
STABILIZED TABLES FOR THREE AUTONOMOUS SYSTEMS
45
INTERNAL AND EXTERNAL BGP SESSIONS
46
CONGESTION CONTROL AND
QUALITY OF SERVICE
DATA TRAFFIC
47
TRAFFIC DESCRIPTORS
48
THREE TRAFFIC PROFILES
49
CONGESTION
Congestion in a network may occur if the load on the
network —the number of packets sent to the network —is
greater than the capacity of the network —the number of
packets a network can handle.
Congestion control refers to the mechanisms and
techniques to control the congestion and keep the load
below the capacity.
50
CONGESTION CONTROL
INTRODUCTION
When too many packets are present in (a part of) the subnet, performance
degrades. This situation is called congestion.
As traffic increases too far, the routers are no longer able to cope and they
begin losing packets.
At very high traffic, performance collapses completely and almost no
packets are delivered.
Reasons of Congestion:
Slow Processors.
High stream of packets sent from one of the sender.
Insufficient memory.
High memory of Routers also add to congestion as becomes un manageable and
un accessible. (Nagle, 1987).
Low bandwidth lines.
52
Knowledge of congestion will cause the hosts to take
appropriate action to reduce the congestion.
For a scheme to work correctly, the time scale must be
adjusted carefully.
If every time two packets arrive in a row, a router shouts
STOP and every time a router is idle for 20 µsec, it yells GO,
the system will oscillate wildly and never converge.
Dividing all algorithms into
open loop or
closed loop
They further divide the open loop algorithms into ones that
act at the source versus ones that act at the destination.
53
The closed loop algorithms are also divided into two
subcategories:
(i) Explicit feedback and (ii) Implicit feedback.
In explicit feedback algorithms, packets are sent back from
the point of congestion to warn the source.
In implicit algorithms, the source deduces the existence of
congestion by making local observations, such as the time
needed for acknowledgements to come back.
The presence of congestion means that the load is
(temporarily) greater than the resources can handle.
Solution?
increase the resources or
decrease the load.
That is not always possible. So we have to apply some
54
congestion prevention policy.
QUEUES IN A ROUTER
55
PACKET DELAY AND THROUGHPUT AS
FUNCTIONS OF LOAD
56
CONGESTION CONTROL
Congestion control refers to techniques and mechanisms
that can either prevent congestion, before it happens, or
remove congestion, after it has happened.
In general, we can divide congestion control mechanisms
into two broad categories: open-loop congestion control
(prevention) and closed-loop congestion control
(removal).
Open-Loop Congestion Control
57
CONGESTION CONTROL CATEGORIES
58
WARNING BIT OR BACKPRESSURE:
60
CHOKE PACKETS
The router sends a choke packet back to the source host, giving it the
destination found on the path.
The original packet is tagged (a header bit is turned on) so that it will
not generate any more choke packets farther along the path and is then
forwarded in the usual way.
When the source host gets the choke packet, it is required to reduce the
traffic sent to the specified destination by X percent.
See next figure, flow starts reducing from step 5.
62
CONGESTION PREVENTION POLICIES
63
Systems are designed to minimize congestion in the first
place, rather than letting it happen and reacting after the fact.
1. Data Link Layer:
The retransmission policy is concerned with how fast a sender times
out and retransmits. A jumpy sender that times out quickly and
retransmits all outstanding packets using go back n will put a
heavier load on the system than will a leisurely sender that uses
selective repeat.
Out of order packets management depends upon buffering policy. If
receivers routinely discard all out-of-order packets, these packets
will have to be transmitted again later, creating extra load i.e prefer
selective repeat instead of GoBackN.
Acknowledgement packets generate extra traffic. Solution?
Piggyback.
Flow Control: Tight Flow and Loose Flow. Tight flow means
smaller windows protocols, reduces data rate, helps fight
64
congestion.
2. Network Layer:
Choice between using virtual circuits and using datagram's affects
congestion since many congestion control algorithms work only
with virtual-circuit subnets.
Packet queuing and service policy relates to whether routers have
one queue per input line, one queue per output line, or both.
round robin or priority based?
Discard policy is the rule telling which packet is dropped when
there is no space.
Routing policy we have already discussed a lot upon.
Packet lifetime management deals with how long a packet may
live before being discarded.
3. Transport Layer:
Same issues occur as in the data link layer
If the timeout interval is too short, extra packets will be sent
unnecessarily. If it is too long, congestion will be reduced but the 65
response time will suffer whenever a packet is lost.
TWO EXAMPLES
To better understand the concept of congestion control,
let us give two examples: one in TCP and the other in
Frame Relay.
Congestion Control in TCP
66
SLOW START, EXPONENTIAL INCREASE
67
Note
68
CONGESTION AVOIDANCE, ADDITIVE
INCREASE
69
Note
70
TCP CONGESTION POLICY SUMMARY
71
CONGESTION EXAMPLE
72
BACKWARD EXPLICIT CONGESTION NOTIFICATION (BECN)
Alert sent to the sender of Frame Relay traffic to indicate that congestion has been
detected; it is the sender’s responsibility to implement congestion voidance procedures.
73
FORWARD EXPLICIT CONGESTION NOTIFICATION (FECN)
75
QUALITY OF SERVICE
Quality of service (QoS) is an internetworking issue that
has been discussed more than defined.
We can informally define quality of service as something
a flow seeks to attain.
Flow Characteristics
Flow Classes
76
FLOW CHARACTERISTICS
77
TECHNIQUES TO IMPROVE QOS
Four common methods:
Scheduling,
Traffic shaping,
Resource reservation.
78
SCHEDULING
Scheduling
Priority Weighted
FIFO RED
Queue Fair Queue
79
FIFO QUEUE
80
PRIORITY QUEUING
81
WEIGHTED FAIR QUEUING
82
RANDOM EARLY DETECTION
It is the idea of discarding packets before all the buffer space is really
exhausted.
A popular algorithm for doing this is called RED (Random Early Detection)
(Floyd and Jacobson, 1993).
Response to lost packets is the source to slow down.
Lost packets are mostly due to buffer overruns rather than transmission errors.
The idea is that there is time for action to be taken before it is too late.
To determine when to start discarding? For this, routers maintain a running
average of their queue lengths.
When the average queue length on some line exceeds a threshold, the line is
said to be congested and action is taken.
How should the router tell the source about the problem?
One way is to send it a choke packet.
Other option? Just discard the selected packet and don’t report even.
Source will eventually notice lack of Ack and takes action. 83
Thus, slowing down instead of trying harder.
TRAFFIC SHAPING
Traffic Shaping
84
LEAKY BUCKET
The leaky bucket takes data and collects it up to a
maximum capacity.
Data in the bucket is only released from the bucket at a set
rate and size of packet.
When the bucket runs out of data, the leaking stops.
86
LEAKY BUCKET IMPLEMENTATION
89
RESOURCE RESERVATION AND
ADMISSION CONTROL
Buffer, CPU Time, Bandwidth are the resources that can
be reserved for particular flows for particular time to
maintain the QoS.
Mechanism used by routers to accept or reject flows
based on flow specifications is what we call Admission
Control.
90
IP ADDRESSING
91
INTRODUCTION TO TCP/IP ADDRESSES
172.18.0.1 172.16.0.1
172.18.0.2 172.16.0.2
HDR SA DA DATA
10.13.0.0 192.168.1.0
10.13.0.1 172.17.0.1 172.17.0.2 192.168.1.1
92
Internet Address
93
Internet Classes
94
IP Addresses in Decimal Notation
95
Class Ranges of Internet Addresses
96
IP ADDRESSING
32 bits
Dotted
Decimal Network Host
97
IP ADDRESSING
32 bits
Dotted
Decimal Network Host
64
32
16
8
4
2
1
128
32
16
64
8
4
2
1
128
64
32
32
16
128
16
8
4
2
1
64
8
4
2
1
128
98
IP ADDRESSING
32 bits
Dotted
Decimal Network Host
16
128
64
32
8
4
2
1
128
64
32
16
8
4
2
1
128
128
64
32
16
8
4
2
1
64
32
16
8
4
2
Example 1
Decimal 172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary
99
IP ADDRESS CLASSES
Class D: Multicast
Class E: Research
100
UNICAST, MULTICAST, AND RESERVED
ADDRESSES
101
CLASS A ADDRESSES
102
CLASS B ADDRESSES
First two octets are the network number and the last two octets
are the host number
16,382 possible blocks for assignment to organizations with a
maximum of 65,534 computers on each network
Designed for mid-size organizations that may have tens of
thousands of hosts or routers
Many addresses are wasted
103
CLASS C ADDRESSES
The first three octets are the network number and the last octet
is the host number
2,096,896 blocks for assignment to organizations
104
BLOCKS IN CLASS C
105
CLASS D AND CLASS E ADDRESSES
Class D – reserved for multicast addresses
Multicasting – transmission method which allows copies of a single
packet to be sent to a selected group of receivers
Class E – reserved for future use
106
NETWORK ADDRESS
107
ADDRESSING WITHOUT SUBNETS
…...
172.16.0.0
108
ADDRESSING WITH SUBNETS
172.16.3.0
172.16.4.0
172.16.1.0 172.16.2.0
Network 172.16.0.0
109
SUBNETTING
IP addressing is hierarchical
First reach a device through its network id (netid)
110
CONTD..
Sub-netting creates an intermediate level of hierarchy
IP datagram routing then involves three steps:
Delivery to the site,
Delivery to the sub-network, and
Delivery to the host
111
DECIMAL EQUIVALENTS OF BIT PATTERNS
128 64 32 16 8 4 2 1
1 0 0 0 0 0 0 0 = 128
1 1 0 0 0 0 0 0 = 192
1 1 1 0 0 0 0 0 = 224
1 1 1 1 0 0 0 0 = 240
1 1 1 1 1 0 0 0 = 248
1 1 1 1 1 1 0 0 = 252
1 1 1 1 1 1 1 0 = 254
1 1 1 1 1 1 1 1 = 255
112
CLASS C SUBNETS
Class C IP addresses are normally assigned to a very small size network because it can
only have 254 hosts in a network. Given below is a list of all possible combination of
subnetted Class B IP address
113
“C- CLASS ADDRESSING”
114
SUB-NETTING “C- CLASS ADDRESSING”
C- Class IP address
192 168 10 0 to 255
192 168 10 0
11000000 10101000 00001010 00000000
192 168 10 1
11000000 10101000 00001010 00000001
192 168 10 2
11000000 10101000 00001010 00000010
115
DEFAULT SUBNET MASK
Class A – 255.0.0.0
Class B – 255.255.0.0
Class C – 255.255.255.0
116
MASKING
117
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 35 11000000 10101000 00001010 00100011
Subnet Mask
255 255 255 0 11111111 11111111 11111111 00000000
118
DECIMAL EQUIVALENTS OF BIT PATTERNS
128 64 32 16 8 4 2 1
1 0 0 0 0 0 0 0 = 128
1 1 0 0 0 0 0 0 = 192
1 1 1 0 0 0 0 0 = 224
1 1 1 1 0 0 0 0 = 240
1 1 1 1 1 0 0 0 = 248
1 1 1 1 1 1 0 0 = 252
1 1 1 1 1 1 1 0 = 254
1 1 1 1 1 1 1 1 = 255
119
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 35 11000000 10101000 00001010 00100011
Subnet Mask
255 255 255 128 11111111 11111111 11111111 10000000
120
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 132 11000000 10101000 00001010 10000100
Subnet Mask
255 255 255 128 11111111 11111111 11111111 10000000
121
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 35 11000000 10101000 00001010 00100011
Subnet Mask
255 255 255 192
11111111 11111111 11111111 11000000
AND
operation 11000000 10101000 00001010 00000000
122
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 75 11000000 10101000 00001010 01001011
Subnet Mask
255 255 255 192 11111111 11111111 11111111 11000000
123
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 137 11000000 10101000 00001010 10001001
Subnet Mask
255 255 255 192 11111111 11111111 11111111 11000000
124
SUB-NETTING “C- CLASS ADDRESSING”
IP address
192 168 10 199 11000000 10101000 00001010 11000111
Subnet Mask
255 255 255 192 11111111 11111111 11111111 11000000
125
Subnet Mask
255 255 255 192
Subnet Mask
255 255 255 128 11111111 11111111 11111111 1 0000000
Solution
We replace each group of 8 bits with its equivalent decimal number (see
Appendix B) and add dots for separation.
128
Change the following IPv4 addresses from dotted-decimal notation to binary
notation.
Solution
We replace each decimal number with its binary equivalent (see Appendix B).
129
Find the error, if any, in the following IPv4 addresses.
Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal
notation is not allowed.
130
SUPERNETTING
Class C blocks have a maximum number of 256
addresses
Supernetting allows an organization to combine several
class C blocks to create a larger range of addresses
131
132
SUPERNETTING IN NETWORK LAYER
More specifically,
When multiple networks are combined to form a bigger
network, it is termed as super-netting
Super netting is used in route aggregation to reduce the size of
routing tables and routing table updates
There are some points which should be kept in mind while
supernetting:
All the Networks should be contiguous.
200.1.1.0,
200.1.2.0,
200.1.3.0
135
EXPLANATION – BEFORE SUPER-NETTING ROUTING
TABLE WILL BE LOOK LIKE AS:
200.1.0.0 255.255.255.0 A
200.1.1.0 255.255.255.0 B
200.1.2.0 255.255.255.0 C
200.1.3.0 255.255.255.0 D
136
FIRST, LETS CHECK WHETHER THREE CONDITION
ARE SATISFIED OR NOT:
Contiguous: You can easily see that all network are
contiguous all having size 256 hosts.
Range of first Network from 200.1.0.0 to 200.1.0.255. If
you add 1 in last IP address of first network that is
200.1.0.255 + 0.0.0.1, you will get the next network id
that is 200.1.1.0. Similarly, check that all network are
contiguous.
Equal size of all network: As all networks are of class
C, so all of the have a size of 256 which in turn equal to
28 .
137
First IP address exactly divisible by total size: When a binary
number is divided by 2n then last n bits are the remainder.
Hence in order to prove that first IP address is exactly divisible by
while size of Supernet Network.
You can check that if last n v=bits are 0 or not.In given example first
IP is 200.1.0.0 and whole size of supernet is 4*28 = 210.
If last 10 bits of first IP address are zero then IP will be divisible.
138
ADVANTAGES & DISADVANTAGES OF
SUPER-NETTING
Advantages of Supernetting –
Control and reduce network traffic
Disadvantages of Supernetting –
Itcannot cover different area of network when combined
All the networks should be in same class and all IP should be
contiguous
139
PROBLEMS & EXERCISES - 1
You have been allocated a class A network address
of 29.0.0.0. You need to create at least 20 networks and
each network will support a maximum of 160 hosts.
Would the following two subnet masks Work?
255.255.0.0 and or 255.255.255.0
140
PROBLEMS & EXERCISES - 2
You have been allocated a class B network address of
135.1.0.0 and and need to create 4 subnets each with
around 200 hosts what is the easiest mask to use to
satisfy the criteria?
141
PROBLEMS & EXERCISES - 3
You have been allocated a class C network address of
211.1.1.0 and are using the default subnet mask of
255.255.255.0 how may hosts can you have?
142
PROBLEMS & EXERCISES - 4
Subnet the Class C IP Address 195.1.1.0 So that you
have 10 subnets each with a maximum 12 hosts on each
subnet. List the Address on host 1 on subnet 0,1,2,3,10
143
PROBLEMS & EXERCISES - 5
Subnet the Class C IP Address 205.11.2.0 so that you
have 30 subnets.
What is the subnet mask for the maximum number of
hosts?
How many hosts can each subnet have?
144
PROBLEMS & EXERCISES - 6
Subnet the Class C IP Address 195.1.1.0 So that you
have at least 2 subnets each subnet must have room for
48 hosts .
What are the two possible subnet masks?
145
PROBLEMS & EXERCISES - 7
Given the subnet Mask 255.255.255.192 What is the host
address and subnet of the following IP address
197.1.2.67.
146
CLASSLESS ADDRESSING
147
Note
148
Finding the classes in binary and dotted-decimal notation
149
Find the class of each address.
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 14.23.120.8
d. 252.5.15.111
Solution
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C
address.
c. The first byte is 14; the class is A.
d. The first byte is 252; the class is E.
150
Number of blocks and block size in classful IPv4 addressing
151
Note
152
Default masks for classful addressing
153
Note
154
Note
155
IPv6 address in binary and hexadecimal colon notation
156
Abbreviated IPv6 addresses
157
Example
Solution
We first need to align the left side of the double colon to the left of the original
pattern and the right side of the double colon to the right of the original
pattern to find how many 0s we need to replace the double colon.
158
Type prefixes for IPv6 addresses
159
Type prefixes for IPv6 addresses (continued)
160
Prefixes for provider-based unicast address
161
Multicast address in IPv6
162
Reserved addresses in IPv6
163
Local addresses in IPv6
164
ARP - ADDRESS RESOLUTION
PROTOCOL
166
Position of ARP and RARP in TCP/IP protocol suite
167
ARP
ARP associates an IP address with its physical
address. On a typical physical network, such as
a LAN, each device on a link is identified by a
physical or station address that is usually
imprinted on the NIC.
168
ARP operation
169
ARP packet
170
Encapsulation of ARP packet
171
Four cases using ARP
Note:
173
Example 1
Solution
Slide 25 shows the ARP request and reply packets.
Note that the ARP data field in this case is 28 bytes,
and that the individual addresses do not fit in the 4-
byte boundary. That is why we do not show the
regular 4-byte boundaries for these addresses. Also
note that the IP addresses are shown in hexadecimal.
For information on binary or hexadecimal notation
see Appendix B.
176
Proxy ARP
177
RARP
RARP finds the logical address for a machine that only knows its physical
address.
Note:
178
RARP operation
179
RARP packet
180
Encapsulation of RARP packet
181
INTERNET CONTROL MESSAGE
PROTOCOL VERSION 4 (ICMPV4)
The IP protocol has no error-reporting or error correcting
mechanism.
What happens if something goes wrong?
182
ICMP
The position of ICMP in the TCP/IP suite
183
MESSAGES
ICMP messages are divided into two broad categories:
Error-reporting messages and Query messages.
The error-reporting messages report problems that a
router or a host (destination) may encounter when it
processes an IP packet.
The query messages, which occur in pairs, help a host or
a network manager get specific information from a
router or another host.
Also, hosts can discover and learn about routers on their
network and routers can help a node redirect its messages.
184
DISCUSSIONS
Message Format
Error Reporting Messages
Query Messages
Checksum
185
GENERAL FORMAT OF ICMP MESSAGES
Note
187
CONTENTS OF DATA FIELD FOR THE
ERROR MESSAGE
188
DESTINATION-UNREACHABLE FORMAT
Note
Note
The source must slow down the sending of datagrams until the
congestion is relieved.
190
Note
When the final destination does not receive all of the fragments
in a set time, it discards the received fragments and sends a
time-exceeded message to the original source.
191
TIME-EXCEEDED MESSAGE FORMAT
192
Note
Code 1 is used only by the destination host to show that not all
of
the fragments have arrived
within a set time.
193
PARAMETER-PROBLEM MESSAGE
FORMAT
Redirection concept
IP packet 1
RM
2
3 4
IP packet IP packet
194
Note
195
REDIRECTION MESSAGE FORMAT
Note
197
Echo-request and echo-reply message
198
Note
199
INTERNET GROUP MANAGEMENT PROTOCOL
Group management
IGMP is a protocol that manages group membership. The
IGMP protocol gives the multicast routers information about
the membership status of hosts (routers) connected to the
network. .
IGMP is a group management protocol. It helps a multicast
router create and update a list of loyal members related to each
router interface.
IGMP messages
IGMP has three types of messages:
The query,
The membership report, and
The leave report.
200
There are two types of query messages, general and special.
IGMP message types
201
IGMP message format & IGMP type field
202
IGMP OPERATION
A multicast router connected to a network has a list of
multicast addresses of the groups with at least one loyal
member in that network.
For each group, there is one router that has the duty of
distributing the multicast packets destined for that group.
Joininga Group
Leaving a Group
Monitoring Membership
203
Membership report
204
205
206
ENCAPSULATION
The IGMP message is encapsulated in an IP datagram,
which is itself encapsulated in a frame.
IP Layer
207
HOST CONFIGURATION: DHCP
Each computer that uses the TCP/IP protocol suite needs
to know its IP address.
If the computer uses classless addressing or is a member
of a subnet, it also needs to know its subnet mask.
Most computers today need two other pieces of
information:
The address of a default router to be able to communicate
with other networks and the address of a name server to be
able to use names instead of addresses as we will see in the
next chapter.
In other words, four pieces of information are normally
needed. 208
DHCP OPERATION
The DHCP client and server can either be on the same
network or on different networks.
Let us discuss each situation separately.
209
TOPICS DISCUSSION
Same Network
Different Networks
UDP Ports
Using TFTP
Error Control
Packet Format
210
CLIENT AND SERVER ON THE SAME
NETWORK
211
CLIENT AND SERVER ON TWO DIFFERENT
NETWORKS
212
USE OF UDP PORTS
213
DHCP PACKET FORMAT
214
FLAG FORMAT & OPTION FORMAT
215
216
CONFIGURATION
The DHCP has been devised to provide static and
dynamic address allocation.
Static Address Allocation
Dynamic Address Allocation
Transition States
Other Issues
Exchanging Messages
217
OPTION WITH TAG 53
218
DHCP CLIENT TRANSITION DIAGRAM
219
EXCHANGING MESSAGES
220