This document provides an overview of topics in the network layer, including IPv4, IPv6, routing algorithms, and routing protocols. It describes the basics of IPv4 addressing and how IPv6 was developed to address limitations in IPv4, notably its limited 32-bit address space. It also outlines link state and distance vector routing algorithms, and examines specific routing protocols like RIP, OSPF, and BGP. The key topics covered provide essential information on the fundamental concepts and components that make up network layer operations.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
IPv6 was developed by IETF to address issues with IPv4 such as address exhaustion and simplify auto-configuration. IPv6 uses 128-bit addresses compared to 32-bit in IPv4, providing vastly more unique addresses. It also includes improvements like more efficient routing, integrated security, and auto-configuration protocols to simplify address assignment for nodes on a link.
IPv6 was developed to address the limitations of IPv4, such as its limited 32-bit address space that is nearly exhausted. IPv6 features a 128-bit address space providing vastly more addresses. It allows for automatic configuration of addresses, simpler header format, and built-in security features. IPv6 addresses are represented through eight groups of four hexadecimal digits separated by colons. The address space is hierarchically allocated into global unicast, unique local, link-local, multicast, and unspecified addresses.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
The document provides an overview of IT network design and installation topics covered in a MaxWiFi training course, including network models, IP addressing, NAT, routing, DHCP, VLANs, wireless networking, and Cisco device configuration.
The document discusses DHCP, NAT, and forwarding of IP packets. It begins by explaining DHCP and how DHCP servers dynamically assign IP addresses and network configuration parameters to devices on a network. It then covers network address translation, how NAT allows private IP addresses to be mapped to public IP addresses. The document concludes by discussing how routers forward IP packets based on the destination address, and methods for routing tables and longest prefix matching to determine the appropriate path for packet forwarding.
The document discusses IPv6 and the transition from IPv4 to IPv6. It provides details about:
- The author who manages the IIT Kanpur campus network and internet services.
- Reasons for adopting IPv6 like shortage of IPv4 addresses and new features in IPv6.
- Elements of IPv6 including the 128-bit address format, address types and scopes, stateless and stateful address autoconfiguration, routing, and neighbor discovery.
- Transition mechanisms from IPv4 to IPv6 like dual stack, tunnels, and translation.
- Current status of IPv6 deployment and recommended steps for migration including checking IPv6 compliance and planning IPv6 addressing.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
IPv6 was developed by IETF to address issues with IPv4 such as address exhaustion and simplify auto-configuration. IPv6 uses 128-bit addresses compared to 32-bit in IPv4, providing vastly more unique addresses. It also includes improvements like more efficient routing, integrated security, and auto-configuration protocols to simplify address assignment for nodes on a link.
IPv6 was developed to address the limitations of IPv4, such as its limited 32-bit address space that is nearly exhausted. IPv6 features a 128-bit address space providing vastly more addresses. It allows for automatic configuration of addresses, simpler header format, and built-in security features. IPv6 addresses are represented through eight groups of four hexadecimal digits separated by colons. The address space is hierarchically allocated into global unicast, unique local, link-local, multicast, and unspecified addresses.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
The document provides an overview of IT network design and installation topics covered in a MaxWiFi training course, including network models, IP addressing, NAT, routing, DHCP, VLANs, wireless networking, and Cisco device configuration.
The document discusses DHCP, NAT, and forwarding of IP packets. It begins by explaining DHCP and how DHCP servers dynamically assign IP addresses and network configuration parameters to devices on a network. It then covers network address translation, how NAT allows private IP addresses to be mapped to public IP addresses. The document concludes by discussing how routers forward IP packets based on the destination address, and methods for routing tables and longest prefix matching to determine the appropriate path for packet forwarding.
The document discusses IPv6 and the transition from IPv4 to IPv6. It provides details about:
- The author who manages the IIT Kanpur campus network and internet services.
- Reasons for adopting IPv6 like shortage of IPv4 addresses and new features in IPv6.
- Elements of IPv6 including the 128-bit address format, address types and scopes, stateless and stateful address autoconfiguration, routing, and neighbor discovery.
- Transition mechanisms from IPv4 to IPv6 like dual stack, tunnels, and translation.
- Current status of IPv6 deployment and recommended steps for migration including checking IPv6 compliance and planning IPv6 addressing.
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
The document provides the questions and answers to the CCNA 1 v5.0 ITN Practice Final Exam. It includes 33 multiple choice questions covering topics such as wireless connectivity recommendations, host configuration settings, IPv4 and IPv6 headers, IP addressing, OSI model layers, router functions, network devices, and wireless network security settings.
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
Basics of multicasting and its implementation on ethernet networksReliance Comm
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
Basic Introduction to Technology (networking).pdftthind
The document provides an overview of networking concepts and components. It begins with basic definitions of networks and networking. It then describes common networking devices like hubs, switches, routers, and network cards. It covers networking cables, IPv4 addressing, routing protocols like RIP and EIGRP, redistribution between protocols, ACLs, NAT, VPN tunnels, and Frame Relay. It concludes with an example implementation of a VPN tunnel between two routers.
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
An administrator is attempting to configure a message-of-the-day banner on a router but is unable to get it to display correctly for Telnet users. The problem is that the banner message contains the delimiting character (V) that is being used to enclose the message. Removing the delimiting character from the message should fix the issue.
The document summarizes the OSI network layer and TCP/IP model Internet layer. It describes how layer 3, the network layer, is responsible for routing packets from source to destination by adding addressing and routing. It focuses on IP version 4, the most common network layer protocol, explaining its packet header fields and how routers use IP addresses and routing tables to forward packets between networks. It also discusses techniques for dividing networks, such as hierarchical addressing and static versus dynamic routing protocols.
The document provides an agenda and overview of key topics related to networking essentials including the network layer, IPv4 and IPv6 packets and addresses, and network address translation (NAT). Specifically, it discusses network layer characteristics such as addressing, encapsulation, routing and de-encapsulation. It also examines IPv4 packet headers, fragmentation, and maximum transmission units. IPv6 is introduced as improving on IPv4 by providing increased address space and simplified packet handling. Network address translation is defined as a method for mapping an IP address space to overcome IPv4 address depletion.
This document provides an overview of the network layer, including:
1. It describes the network layer functions of forwarding, routing, encapsulation, and de-encapsulation.
2. It explains the basic components and functions inside a router, including input/output ports, switching, queuing, and packet scheduling.
3. It covers the Internet Protocol (IP) including IPv4 and IPv6 formats, addressing, fragmentation, and network address translation (NAT).
The document discusses a lecture on link-state routing protocols, specifically OSPF. It introduces OSPF, describing its advantages over distance vector routing protocols like RIP. The lecture covers OSPF concepts like neighbor establishment, the SPF algorithm, and building the OSPF routing table.
This document provides an overview of the TCP/IP model created by the Department of Defense (DoD) and compares it to the OSI reference model. The DoD model consists of four layers - Process/Application, Host-to-Host, Internet, and Network Access - which correspond to a condensed version of the seven-layer OSI model. The document describes the functions of each layer and some of the key protocols that operate at each layer, such as TCP, IP, ARP, and Ethernet. It also covers topics like IP addressing, private vs public addresses, broadcast vs unicast traffic, and network access technologies.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
The document discusses internetworking and how to build an internet from the ground up. It describes how different networking technologies are interconnected through protocols like TCP/IP which allow communication across heterogeneous networks by smoothing out differences. Layered models and protocols are explained, including how packets are routed from one network to another through gateways and fragmented if needed to traverse networks with different maximum transmission units.
The document provides an overview of TCP/IP protocol suite and IP addressing. It describes the layers of the TCP/IP model including application, transport, internet and network access layers. It also discusses obtaining IP addresses through static and dynamic methods like DHCP, RARP, BOOTP and ARP. IPv4 and IPv6 addressing are also summarized.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
The document discusses several Internet protocols:
- IP prepares packets for transmission across the Internet and provides unreliable packet delivery. IPv6 was created to address issues with IPv4 like exhaustion of addresses.
- ARP resolves IP addresses to hardware addresses on local networks and maintains address mappings in caches.
- ICMP provides error reporting and network monitoring functions to support IP.
- TCP provides reliable data transmission and UDP provides simple transmission of datagrams.
This course describes the basic networking elements and how they are used in practice. The course covers:
The evolution and principles of networking;
The basic notions used in this domain;
Types of equipment;
Description and general information of basic networking protocols.
The practical examples provide configuration commands, packet captures and a real feel of how to build a simple network
The course attendees will be encouraged to show their understanding by answering questions and debating the issues and solutions that they might have encountered when working with networks.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Multiplexer takes several inputs and gives a single output, while demultiplexer takes a single input and gives several outputs. They both follow combinational logic and work on different operational principles - multiplexer is many-to-one, while demultiplexer is one-to-many. Multiplexing and demultiplexing at the transport layer allow data from multiple applications to be transmitted simultaneously over a network from source to destination, where it is directed to the appropriate application.
Ethics refers to formal systems that guide behavior and determine what is good and bad through the study of morality. Morality refers to the norms and principles that determine what behaviors are right and wrong. As ethics outlines theories of right and wrong, morality translates these theories into actions. The document then provides examples of how the ethical theories of utilitarianism, deontology, and virtue ethics translate into moral actions.
This document discusses various topics related to memory management in computer systems:
1. It defines deadlock and describes the four necessary conditions for deadlock to occur.
2. It explains different approaches for deadlock prevention, detection, avoidance and recovery.
3. It describes swapping as a memory management technique where processes can be moved between main and secondary memory.
4. It discusses contiguous memory allocation and fixed-size and variable-size partitioning schemes for allocating memory to processes.
More Related Content
Similar to Gohil-Network layer & Address Resolution Protocol.pptx
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
The document provides the questions and answers to the CCNA 1 v5.0 ITN Practice Final Exam. It includes 33 multiple choice questions covering topics such as wireless connectivity recommendations, host configuration settings, IPv4 and IPv6 headers, IP addressing, OSI model layers, router functions, network devices, and wireless network security settings.
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
Basics of multicasting and its implementation on ethernet networksReliance Comm
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
Basic Introduction to Technology (networking).pdftthind
The document provides an overview of networking concepts and components. It begins with basic definitions of networks and networking. It then describes common networking devices like hubs, switches, routers, and network cards. It covers networking cables, IPv4 addressing, routing protocols like RIP and EIGRP, redistribution between protocols, ACLs, NAT, VPN tunnels, and Frame Relay. It concludes with an example implementation of a VPN tunnel between two routers.
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
An administrator is attempting to configure a message-of-the-day banner on a router but is unable to get it to display correctly for Telnet users. The problem is that the banner message contains the delimiting character (V) that is being used to enclose the message. Removing the delimiting character from the message should fix the issue.
The document summarizes the OSI network layer and TCP/IP model Internet layer. It describes how layer 3, the network layer, is responsible for routing packets from source to destination by adding addressing and routing. It focuses on IP version 4, the most common network layer protocol, explaining its packet header fields and how routers use IP addresses and routing tables to forward packets between networks. It also discusses techniques for dividing networks, such as hierarchical addressing and static versus dynamic routing protocols.
The document provides an agenda and overview of key topics related to networking essentials including the network layer, IPv4 and IPv6 packets and addresses, and network address translation (NAT). Specifically, it discusses network layer characteristics such as addressing, encapsulation, routing and de-encapsulation. It also examines IPv4 packet headers, fragmentation, and maximum transmission units. IPv6 is introduced as improving on IPv4 by providing increased address space and simplified packet handling. Network address translation is defined as a method for mapping an IP address space to overcome IPv4 address depletion.
This document provides an overview of the network layer, including:
1. It describes the network layer functions of forwarding, routing, encapsulation, and de-encapsulation.
2. It explains the basic components and functions inside a router, including input/output ports, switching, queuing, and packet scheduling.
3. It covers the Internet Protocol (IP) including IPv4 and IPv6 formats, addressing, fragmentation, and network address translation (NAT).
The document discusses a lecture on link-state routing protocols, specifically OSPF. It introduces OSPF, describing its advantages over distance vector routing protocols like RIP. The lecture covers OSPF concepts like neighbor establishment, the SPF algorithm, and building the OSPF routing table.
This document provides an overview of the TCP/IP model created by the Department of Defense (DoD) and compares it to the OSI reference model. The DoD model consists of four layers - Process/Application, Host-to-Host, Internet, and Network Access - which correspond to a condensed version of the seven-layer OSI model. The document describes the functions of each layer and some of the key protocols that operate at each layer, such as TCP, IP, ARP, and Ethernet. It also covers topics like IP addressing, private vs public addresses, broadcast vs unicast traffic, and network access technologies.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
The document discusses internetworking and how to build an internet from the ground up. It describes how different networking technologies are interconnected through protocols like TCP/IP which allow communication across heterogeneous networks by smoothing out differences. Layered models and protocols are explained, including how packets are routed from one network to another through gateways and fragmented if needed to traverse networks with different maximum transmission units.
The document provides an overview of TCP/IP protocol suite and IP addressing. It describes the layers of the TCP/IP model including application, transport, internet and network access layers. It also discusses obtaining IP addresses through static and dynamic methods like DHCP, RARP, BOOTP and ARP. IPv4 and IPv6 addressing are also summarized.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
The document discusses several Internet protocols:
- IP prepares packets for transmission across the Internet and provides unreliable packet delivery. IPv6 was created to address issues with IPv4 like exhaustion of addresses.
- ARP resolves IP addresses to hardware addresses on local networks and maintains address mappings in caches.
- ICMP provides error reporting and network monitoring functions to support IP.
- TCP provides reliable data transmission and UDP provides simple transmission of datagrams.
This course describes the basic networking elements and how they are used in practice. The course covers:
The evolution and principles of networking;
The basic notions used in this domain;
Types of equipment;
Description and general information of basic networking protocols.
The practical examples provide configuration commands, packet captures and a real feel of how to build a simple network
The course attendees will be encouraged to show their understanding by answering questions and debating the issues and solutions that they might have encountered when working with networks.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Multiplexer takes several inputs and gives a single output, while demultiplexer takes a single input and gives several outputs. They both follow combinational logic and work on different operational principles - multiplexer is many-to-one, while demultiplexer is one-to-many. Multiplexing and demultiplexing at the transport layer allow data from multiple applications to be transmitted simultaneously over a network from source to destination, where it is directed to the appropriate application.
Similar to Gohil-Network layer & Address Resolution Protocol.pptx (20)
Ethics refers to formal systems that guide behavior and determine what is good and bad through the study of morality. Morality refers to the norms and principles that determine what behaviors are right and wrong. As ethics outlines theories of right and wrong, morality translates these theories into actions. The document then provides examples of how the ethical theories of utilitarianism, deontology, and virtue ethics translate into moral actions.
This document discusses various topics related to memory management in computer systems:
1. It defines deadlock and describes the four necessary conditions for deadlock to occur.
2. It explains different approaches for deadlock prevention, detection, avoidance and recovery.
3. It describes swapping as a memory management technique where processes can be moved between main and secondary memory.
4. It discusses contiguous memory allocation and fixed-size and variable-size partitioning schemes for allocating memory to processes.
The female reproductive system consists of internal and external organs that work together for reproduction. The internal organs include the vagina, uterus, ovaries, fallopian tubes, and cervix. The uterus houses and nourishes the developing fetus. The ovaries produce eggs and hormones. The external organs are the vulva and clitoris. Diseases that can affect these organs include ovarian cysts, cervical cancer, endometriosis, and Bartholin's cyst. Symptoms and treatments vary depending on the specific organ and disease. The document provides detailed diagrams and explanations of each organ in the female reproductive system.
The physical layer is responsible for sending computer bits from one device to another along a network. It performs functions like defining bits, determining data rate, ensuring synchronization between sending and receiving devices, and determining the transmission mode and interface. The document discusses different types of physical media used at this layer, including copper cabling like UTP, fiber optic cabling, and wireless media. Copper is used for Ethernet and telephone connections due to its ability to transfer data. Fiber optic cable is used for long-distance, high-performance networking. Wireless media allows for transmission without wires.
This document outlines a presentation on personal protective equipment (PPE) in general industry. It discusses the hierarchy of controls as they relate to PPE, identifies common types of PPE like head, eye, face, respiratory, hand, foot, and hearing protection. It also explains employer and employee responsibilities regarding PPE use, selection, and training. The objectives are to describe PPE controls within the hazard control hierarchy, identify PPE types, and explain PPE requirements.
The document discusses several topics related to environmental sustainability and laws in the Philippines. It begins by defining environmental sustainability and discussing threats to maintaining valued environmental qualities. It then explains the concepts of environmental ethics and different environmental worldviews, specifically the Western and deep ecology perspectives. Finally, it outlines several important Philippine environmental laws, including the Clean Water Act which aims to protect water bodies from pollution and require wastewater treatment.
Vital statistics.pptx Vital statistics, the records of birth and death, are a...Sapna Thakur
These vital statistics are invaluable for planning, monitoring and evaluating various programs related to primary health care, family planning, maternal and child health, education etc.
TEST BANK For Bontrager's Textbook of Radiographic Positioning and Related An...Donc Test
TEST BANK For Bontrager's Textbook of Radiographic Positioning and Related Anatomy 9th Edition & 10th Edition Lampignano Verified Chapter's 1 - 20 Complete.pdf
TEST BANK For Bontrager's Textbook of Radiographic Positioning and Related Anatomy 9th Edition & 10th Edition Lampignano Verified Chapter's 1 - 20 Complete.pdf
TEST BANK For Bontrager's Textbook of Radiographic Positioning and Related Anatomy 9th Edition & 10th Edition Lampignano Verified Chapter's 1 - 20 Complete.pdf
TEST BANK For Bontrager's Textbook of Radiographic Positioning and Related Anatomy 9th Edition & 10th Edition Lampignano Verified Chapter's 1 - 20 Complete.pdf
Cancer treatment has advanced significantly over the years, offering patients various options tailored to their specific type of cancer and stage of disease. Understanding the different types of cancer treatments can help patients make informed decisions about their care. In this ppt, we have listed most common forms of cancer treatment available today.
Bashundhara Toiletries Logo Guideline 2024khabri85
It outlines the basic identity elements such as symbol, logotype, colors, and typefaces. It provides examples of applying the identity to materials like letterhead, business cards, reports, folders, and websites.
Chandigarh *Call "Girls 🫶Number --((7988336991))🤳🏻-- by Chandigarh🫦 cALL gIRL 🫦
If you are in search of a 7988336991 Call Girls In Chandigarh you can opt for an in-call or out-call service. These services are available for all sorts of needs For instance, if you coming up, you can choose a lady for an in-call or out-of-call service. In call girls are usually available 24 hours a day and will be available for your personal needs.
4. BASICS OF IPV4
4
IPv4 is the first network protocol to interconnect different
networks regardless of the medium used.
Globally unique addressing scheme
Any two nodes can communicate directly
5. IPV4 ADDRESSING
5
Every node is identified by a four byte address
Networks are divided by subnet classes each class has
a fixed number of network bits
Communication between nodes on different networks is
established by routers
7. IPV6 HISTORY
7
Late 1980s:
⚫ Exponential growth of the Internet
Late 1990:
⚫ CLNS proposed as IP replacement
1991-1992:
⚫ Running out of “class-B” network numbers
⚫ Explosive growth of the “default-free” routing table
⚫ Eventual exhaustion of 32-bit address space
Two efforts – short-term vs. long-term
⚫ More at “The Long and Windy ROAD”
8. BASICS
8
General perception is that “IPv6 has not yet taken hold”
IPv4 Address run-out is not “headline news” yet
More discussions and run-out plans proposed Private
sector requires a business case to “migrate”
No easy Return on Investment (RoI) computation. But
reality is very different from perception! Something
needs to be done to sustain the Internet growth
IPv6 or NAT or both or something else?
9. LARGE ADDRESS SPACE
today (5.5 /8s)
9
Internet population:
~630 million users end of 2002 – 10% of world pop.
~1320 million users end of 2007 – 20% of world
pop. Future? (World pop. ~9B in 2050)
US uses 81 /8s – this is 3.9 IPv4 addresses per
person
Repeat this the world over:
6 billion population could require 23.4 billion IPv4
addresses (6 times larger than the IPv4 address pool)
Emerging Internet economies need address space:
China uses more than 94 million IPv4 addresses
10. NETWORK ADDRESS TRANSLATION
⚫ Service provision inhibited
10
Private address space and Network address
translation (NAT) could be used instead of IPv6
But NAT has many serious issues:
⚫ Breaks the end-to-end model of IP
⚫ Layered NAT devices
⚫ Mandates that the network keeps the state of the
connections
⚫ How to scale NAT performance for large networks?
⚫ Makes fast rerouting difficult
11. PROTOCOLS AND STANDARDS
Expanded address space:
⚫ Address length quadrupled to 16 bytes
Header Format Simplification:
⚫ Fixed length, optional headers are daisy-chained
⚫ IPv6 header is twice as long (40 bytes) as IPv4 header
without options (20 bytes)
No checksum at the IP network layer
No hop-by-hop segmentation
⚫ Path MTU discovery
64 bits aligned
Authentication and Privacy Capabilities
⚫ IPsec is mandated
No more broadcast 11
13. LARGE ADDRESS SPACE
13
IPv4:
⚫ 32 bits
⚫ = 4,294,967,296 possible addressable devices
IPv6:
⚫ 128 bits: 4 times the size in bits
⚫ = 3.4 x 1038 possible adressable devises
⚫ =340,282,366,920,938,463,463,374,607,431,768,211,45
6
⚫ ∼ 5 x 1028 addresses per person on the planet
14. IP ADDRESS REPRESENTATION
16 bit fields in case insensitive colon hexadecimal
representation
2031:0000:130F:0000:0000:09C0:876A:130B
Leading zeros in a field are optional:
⚫ 2031:0:130F:0:0:9C0:876A:130B
Successive fields of 0 represented as ::, but only
once in an address:
⚫ 2031:0:130F::9C0:876A:130B
⚫ 2031::130F::9C0:876A:130B
is ok
is NOT
ok
⚫ 0:0:0:0:0:0:0:1 → ::1
⚫ 0:0:0:0:0:0:0:0 → ::
(loopback address)
(unspecified address) 14
15. IPV6 GLOBAL UNICAST ADDRESSES
IPv6 Global Unicast addresses are:
Addresses for generic use of IPv6
Hierarchical structure intended to simplify aggregation
15
16. MULTICAST ADDRESSES
16
Broadcasts in IPv4:
⚫ Interrupts all devices on the LAN even if the intent of the
request was for a subset
⚫ Can completely swamp the network (“broadcast storm”)
Broadcasts in IPv6:
⚫ Are not used and replaced by multicast
Multicast:
⚫ Enables the efficient use of the network
⚫ Multicast address range is much larger
19. CONTINUE
19
A host with IP address 130.23.43.20 and physical
address 0xB23455102210 has a packet to send to
another host with IP address 130.23.43.25 and
physical address 0xA46EF45983AB. The two hosts
are on the same Ethernet network. Show the ARP
request and reply packets encapsulated in Ethernet
frames.
27. MOBILE IP
27
Mobile IP is a standard that allows users to move
from one network to another without loosing
connectivity.
Mobile devices have IP addresses that are
associated with one network and moving to another
network means changing IP address.
Using the mobile IP system will allow users to
achieve this and at the same time make the
underlying process transparent for a user.
28. BASIC IP ADDRESS
28
All computers that are connected to the Internet
need to have a valid IP address.
This address is usually assigned by an Internet
Service Provider (ISP) which in turn has bought a
block of addresses from the Internet Cooperation
for Assigned Names and Numbers (ICANN).
Most companies never interact with the ICANN
directly. In order for a company to receive valid IP
addresses they contact a local ISP.
Even local ISP:s do not interact with ICANN but in
turn they contact larger ISP:s and only they contact
ICANN.
29. NEED FOR IP MOBILE
Imagine what would happen with your message if
you were to move your computer (and IP address)
to another network then your own.
The routers would examine the address and
forward it according to the previously described
manner.
When the message reaches the router, that you
were directly connected to before you moved, it
would not be able to forward the message to you
since you have moved.
There is no way for a router to know how to reach
you and therefore the message will never arrive to
you. 29
30. OBTAINING AN IP ADDRESS USING DHCP
One of the methods involves using the Dynamic Host
Configuration Protocol (DHCP) server at the foreign
network. DHCP is the protocol that dynamically assigns
IP-addresses to connected computers on the network.
The DHCP server chooses one of the available
addresses and either permanently or temporary assigns
it to the computer on the network.
When the mobile host arrives at the foreign network he
first needs to discover a DHCP server to obtain an IP
address.
Discovering the server is easy since it advertises its
presence every 20 seconds, but it is also possible for
the host to broadcast a question if there are any DHCP
servers. 30
32. LINK STATE ROUTING ALGORITHM
32
Use a routing protocol to collect the whole network
topology
Obtain destination reachability information as well
as link weights/states
Compute shortest paths using Dijkstra’s algorithm
from a node to all other nodes
Construct routing tables that show the destination
addresses and the next hop addresses
Note that while Dijkstra’s algorithm gives you end-
to-end routes, the routing tables may only store the
next hop address.
33. DISTANCE VECTOR TECHNOLOGY
33
Routes are advertised as vectors of distance and
direction
Distance is defined in terms of a metric (hop
count...)
Direction is the next-hop router or exit interface
34. CONTINUE
34
The router does not have the knowledge of the
entire path to the destination network, but it knows:
⚫ The direction or interface in which packets should be
forwarded
⚫ The distance or how far it is to the destination network
38. RIP - ROUTING INFORMATION PROTOCOL
38
A simple intra domain protocol
Straightforward implementation of Distance Vector
Routing
Each router advertises its minimum distances to
destinations every 30 seconds (or whenever its
routing table changes)
RIP always uses the hop-count as link metric.
Maximum hop count is 15, with “16” equal to “¥”.
Routes timeout after 3 minutes if they are not
updated. Route metric is set to ¥ (16) and marked
for deletion
40. ROUTING WITH RIP
This is the operation of RIP in routed. Dedicated port for RIP
is UDP port 520.
Initialization:
⚫ Broadcast a request packet (command = 1, metric=16;
address family=0, metric=16) on the interfaces requesting
current routing tables from routers.
Request received:
⚫ Routers that receive above request send their entire
routing table.
Response received:
⚫ Update the routing table (see distance vector algorithm).
Regular routing updates:
⚫ Every 30 seconds, send all or part of the routing tables to
every neighbor.
Triggered Updates:
40
41. OSPF
OSPF = Open Shortest Path First
RFC 1247 from 1991
Alternative solution to RIP as interior gateway
protocol
OSPF is a link state protocol, i.e., each node has
complete topology information
OSPF messages are sent directly in IP (and not as
payload of UDP packets)
Hellos and Link State Advertisements (LSAs)
⚫ To get the topology of the network
Shortest-path algorithm,
⚫ e.g., Dijkstra’s to precompute routing tables. 41
42. FEATURES OF OSPF
42
Provides authentication of routing messages
Enables load balancing by allowing traffic to be split
evenly across routes with equal cost
Supports sub netting
Supports multicasting
43. BGP
43
BGP = Border Gateway Protocol
Currently in version 4
Note: In the context of BGP, a gateway is nothing
else but an IP router that connects autonomous
systems.
Inter domain routing protocol for routing between
autonomous systems
Uses TCP to send routing messages
BGP is a distance vector protocol, but unlike in RIP,
routing messages in BGP contain complete routes.
Network administrators can specify routing policies
44. CONTINUE
BGP’s goal is to find any path (not an optimal one).
Since the
internals of the AS are never revealed, finding an
optimal path
is not feasible.
⚫ For each autonomous system (AS), BGP distinguishes:
⚫ local traffic = traffic with source or destination in AS
⚫ transit traffic = traffic that passes through the AS
⚫ Stub AS = has connection to only one AS, only
carry local traffic
⚫ Multi homed AS = has connection to >1 AS, but does
not carry transit traffic
⚫ Transit AS = has connection to >1 AS and carries
transit traffic
44
46. CONCLUSION
46
We explain the network layer concept and different
sub topic of network layer. IPv6 provides sample of
address space and is designed to expand today’s
Internet services.
Feature-rich IPv6 enabled Internet version 2 may
deliver more than expected.
Link state routing algorithm are described.
Different types of routing protocol also we seen.