Professional Documents
Culture Documents
Scenario: Imagine you have a computer, and it knows its own IP address, like
159.31.17.24, but it's unsure about the corresponding network mask (like /24).
Action: Computer asks nearby router for the mask through an "Address Mask
Request."
Response: Router replies with the correct mask in an "Address Mask Reply."
2. Tunneling:
Imagine you and your friend both have new gadgets (IPv6), but there's a place
in between that only understands the old language (IPv4). To go through that
place, you put your cool new gadget inside an old box (IPv6 inside IPv4).
When your friend gets the box at the other end, they take out the cool new
gadget (IPv6) from the old box (IPv4). It's like your new gadget went through a
tunnel, and when it came out, everything was back to normal.
To make sure everyone knows what's happening, the box has a special label
(protocol value 41). This label says, "Hey, inside this old box, there's a fancy
new gadget."
3. Header Translation:
Now, let's say most people in your neighborhood are using the new language
(IPv6), but there's still that one friend who only understands the old language
(IPv4).
You want to send them a message in the new language (IPv6), but they won't
get it. So, you change the way you write the message to match the old style
(Header Translation - turning IPv6 header into IPv4 header).
Now, your friend can understand the message because it looks like the old
language, even though you're using the new language behind the scenes.
Qsn)write a short note on Mobile Ip
Mobile IP is a communication protocol (created by extending Internet Protocol,
IP) that allows the users to move from one network to another with the same
IP address. It ensures that the communication will continue without the user’s
sessions or connections being dropped.
Key Components:
1)Home Agent (HA): This is a router on the home network responsible for
tracking the mobile device's location. It maintains the current care-of address
(CoA), which is the temporary address assigned to the device in its current
location.
2)Foreign Agent (FA): When a mobile device moves to a new network, a
foreign agent on that network assists in the handover process. It registers the
device's care-of address with the home agent.
3)Mobile Node (MN): This is the mobile device itself, which may change its
point of attachment from one network to another.
4)Correspondent Node (CN): The endpoint with which the mobile node wants
to communicate.
working principle
#Registration: When the mobile device enters a new network, it registers its
care-of address with the foreign agent. The foreign agent then notifies the
home agent about the change.
#Tunneling: The home agent tunnels packets destined for the mobile device to
its care-of address through the foreign agent.
#Communication: The mobile device can now communicate with the
correspondent node using its care-of address. All data is tunneled back
through the home agent to maintain connectivity.
Advantages:
Continuous Connectivity: Mobile IP ensures that a device remains reachable
even when moving across different networks.
Transparent Handovers: Users can switch between networks without
interrupting ongoing communications.
Scalability: Mobile IP allows for the dynamic movement of devices without
requiring significant changes to the existing IP infrastructure.
DISTANCE VECTOR
Distance Vector Routing is a type of routing algorithm used in computer
networks to determine the best path for data packets to reach their
destination
1. Least-Cost Route:
In distance vector routing, the primary goal is to find the least-cost route
between any two nodes (network devices) within a network.
The "cost" typically refers to factors such as the number of hops, bandwidth, or
latency along a particular path.
5. Sharing Information:
The key idea in distance vector routing is the sharing of routing information
between neighboring nodes.
Nodes periodically share their vector tables with immediate neighbors to keep
everyone updated on the network topology.
6. Updating Process:
When a node receives a vector table from a neighbor, it updates its own table
based on the received information.
The update involves adding the cost between the receiving node and the
sender for each entry and modifying the next hop accordingly.
8. Instability Issues:
Distance vector routing protocols can suffer from instability, leading to routing
loops.
Strategies like "split horizon" and "poison reverse" are employed to mitigate
instability issues and avoid loops.
9. Handling Infinity:
To prevent infinite loops, a predefined value (often 16) is considered as
"infinity" in the distance vector algorithm.
PATH VECTOR
1. Conceptual Basis:
In Path Vector Routing, each autonomous system (AS) in a network has a
designated "speaker node" that represents the entire AS.
The speaker node maintains a routing table that contains information about
the paths to reach various destinations, both within its own AS and in other
ASs.
2. Initialization:
Initially, each speaker node only knows the reachability of nodes within its own
AS. It has limited information about the paths to other destinations.
3. Sharing Information:
Just like in distance vector routing, speaker nodes in an AS share their routing
tables with their immediate neighbors (other speaker nodes in neighboring
ASs).
Sharing occurs periodically or when there is a change in the routing table.
4. Updating Process:
hen a speaker node receives a routing table from a neighbor, it updates its own
table by incorporating the information received.
The update includes adding new destinations and updating the path
information.
5. Loop Prevention:
Path Vector Routing includes mechanisms to prevent routing loops. When a
router receives a message, it checks if its AS is in the path list to the
destination. If so, it avoids looping and ignores the message.
6. Policy Routing:
Policy routing is easily implementable in Path Vector Routing. A router can
examine the path information and make decisions based on its routing policies.
For example, a router may choose not to use a path that traverses certain ASs.
7. Optimum Path:
The concept of the optimum path in Path Vector Routing is subjective and
depends on the organization's criteria.
Different ASs may have multiple paths to a destination, and the choice of the
optimum path can be based on various criteria such as security, reliability, or
other organizational priorities.
LINK STATE
Link State Routing is a routing protocol used in computer networks, particularly
for intra-domain routing. It operates on the principle that each node within a
network possesses complete knowledge of the network's topology. This
understanding includes information about nodes, links, their connections,
type, cost, and condition. The protocol utilizes algorithms like Dijkstra's to
construct routing tables for efficient data transmission within the network.
1. Conceptual Basis :
Link State Routing relies on the idea that every node in the network has a
comprehensive understanding of the complete network topology.
This includes details about nodes, links, their types, costs, and conditions,
enabling the use of algorithms like Dijkstra's for routing.
2. Dynamic Topology :
The topology must be dynamic, representing the latest state of each node and
each link. This ensures that the network adapts to changes, such as a link going
down.
Each node contributes partial knowledge, knowing the state of its links. The
entire topology is compiled from the partial knowledge of each node.
3. Link State Packet (LSP) :
Nodes create Link State Packets (LSPs) to convey information about their links
and the state of the network.
LSPs include essential information such as node identity, the list of links, a
sequence number, and age.
4. Flooding :
After creating an LSP, nodes use flooding to efficiently distribute this
information to all other nodes in the network.
Flooding involves sending a copy of the LSP out of each interface. Nodes that
receive an LSP compare it with their existing copy, updating their information if
the new one is newer.
6. Dijkstra Algorithm :
The Dijkstra algorithm is employed to find the shortest path tree.
It involves dividing nodes into tentative and permanent sets, finding neighbors,
making them tentative, and eventually making some of them permanent based
on the cumulative cost criteria.
Area Division :
OSPF divides an autonomous system into areas for efficient routing.
Graphical Representation:
OSPF represents routers as square nodes and networks (designated routers) as
oval nodes in a graphical representation.
OSPF routers use Dijkstra's algorithm to calculate the shortest path tree.
Dijkstra's algorithm involves dividing nodes into tentative and permanent sets
and finding the shortest paths efficiently.
Hierarchical Design :
OSPF uses a hierarchical design with multiple areas, contributing to scalability.
Convergence :
OSPF achieves fast convergence by updating only the affected parts of the
network when there are changes.
Routing Information Protocol (RIP) Overview:
1. Distance Vector Routing:
RIP utilizes the distance vector routing algorithm for intradomain routing
within an autonomous system.
Routers exchange information about reachable networks, maintaining routing
tables with destination networks, hop counts, and next-hop routers.
2. Network Structure:
Operates within an autonomous system, consisting of routers and networks.
Networks are identified by addresses, and routers facilitate packet forwarding
between these networks.
3. Hop Count Metric:
Measures the distance between routers using hop count, indicating the
number of networks a packet traverses.
Maximum hop count is 16, beyond which a route is considered unreachable.
4. Routing Table Example:
Routing tables record entries for each network, specifying hop counts and
next-hop routers.
5. Network Connectivity:
Directly connected networks have a hop count of 0.
Routers forward packets to the next-hop router to reach more distant
networks.
6. Limitations:
RIP has limitations, including slow convergence and potential routing loops.
Mitigated using mechanisms like split horizon and hold-down timers.
7. Updates and Stability:
Periodic updates: Routers broadcast routing tables to neighbors at regular
intervals.
Triggered updates: Immediate responses to network changes for real-time
adaptation.