Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Email for communication Applicable in developing video streaming website ( data should be
streamed without buffer delay)
DNS (Domain Name System) that enables a computer to look up the IP address for any given website
TCP that figures out how to get the data from the source to the destination
How Internet works
• All the machines on the Internet—yours, mine, and everyone else's— are identified by an Internet
Protocol (IP) address.
• IP is a routable protocol. Routers are used to implement the protocol.
• TCP that figures out how to get the data from the source to the destination
• End to End devices in Internet are called Hosts. Hosts on different networks requires routers for message
routing.
• Each packet is routed towards the destination based on its source and destination address.
• At each node, the router decides, based on calculations involving network statistics and costs, to which
neighboring node it is more efficient to send the packet.
• In summary, TCP is the data. IP is the Internet location GPS
IPv4 packet structure
Flags : first bit set to zero. 2nd bit DF (don’t fragment) set to 1,3rd bit MF(More fragment) set to 1
Protocol: defines the protocol used in the data portion of the IP datagram. The Internet Assigned Numbers
Authority maintains a list of IP protocol numbers as directed by RFC 790.
Addressing : unicast ,broadcast and multicasting addressing. Use 32 bit address representation.
In which order are bytes of IP datagram are transmitted?
Transmission is row by row
Follow network byte order or Big endian ordering
IP ADDRESSING
www.google.com
DNS
N/W IP address N/W
Host
Host
NID HID
process
process
PORT NO :80
3
2
1
8bit 24bit
32bit
IP addressing
Number of networks =2
𝑛𝑒𝑡𝑤𝑜𝑟𝑘𝑏𝑖𝑡𝑠
Number of hosts = 2ℎ𝑜𝑠𝑡𝑏𝑖𝑡𝑠 -2
IP addressing
Class A Address :The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from
1 – 127, i.e.
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is
reserved for loopback IP addresses.
Class B Address : An IP address which belongs to class B has the first two bits in the first octet set
to 10, i.e.
Class C address : The first octet of Class C IP address has its first 3 bits set to 110, that is:
IP addressing
Class D Address: Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of:
Class D has IP address rage from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting
class E Address This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this
class ranges from 240.0.0.0 to 255.255.255.254.
11.0.0.0 21.0.0.0
IP Services
Unicasting
11.1.2.3 21.1.2.3
0 Source IP dest IP
Network Addresses
Address class Identification
Network and Host Identification
Network Addresses
Host Addresses
Default Subnet Masks
ANDing with Default Subnet masks
• Process of stealing bits from the HOST part of an IP address in order to divide the larger
network into smaller sub-networks called subnets
• We always reserve an IP address to identify the subnet and another one to identify the
broadcast address within the subnet
Having 5 bits available for defining subnets means that we can have up to 32 (2^5)
different subnets.
Subnetting a Class C Address Using the Binary Method
STEP 4: Calculate the Total Number of Subnets and Hosts Per Subnet
How to determine the number of subnets and the number of
hosts per subnet
B
Imagine a situation. Computers A, B, C, and Computers 1,2,3.
A
Computers A, B, and C know each other. 2
And Computers 1,2, and 3 know each other
3
But Computer C, and Computer 1 are special in that they
also know each other . C 1
Typically, ARP is a network layer to data link layer mapping process, which is used to
discover MAC address for given Internet Protocol Address.
Gateways are network protocol converters. Often the two networks that a gateway joins use
different base protocols.
A gateway can be implemented completely in software, hardware, or a combination of both.
network gateway by definition appears at the edge of a network, related capabilities such
as firewalls and proxy servers tend to be integrated with it.
A gateway is a node (router) in a computer network, a key stopping point for data on its way to or from
other networks.
Reverse ARP
Reverse ARP is a networking protocol used by a client machine in a local area network to
request its Internet Protocol address (IPv4) from the gateway-router’s ARP table.
The network administrator creates a table in gateway-router, which is used to map the MAC
address to corresponding IP address.
When a new machine is setup or any machine which don’t have memory to store IP
address, needs an IP address for its own use.
A special host configured inside the local area network, called as RARP-server is responsible
to reply for these kind of broadcast packets.
Now the RARP server attempt to find out the entry in IP to MAC address mapping table.
If any entry matches in table, RARP server send the response packet to the requesting device
along with IP address.
LAN technologies like Ethernet, Ethernet II, Token Ring and Fiber Distributed Data Interface
(FDDI) support the Address Resolution Protocol.
RARP is not being used in today’s networks. Because we have much great featured protocols
like BOOTP (Bootstrap Protocol) and DHCP( Dynamic Host Configuration Protocol).
IP addressing
broadcasting
directed
20.0.0.0
11.0.0.0
11.1.3.4
11.0.0.0
11.1.2.3 limited
IP fragmentation
A maximum transmission unit (MTU) is the largest size packet or frame, specified in octets (eight-bit bytes), that can be sent in a
packet- or frame-based network such as the Internet
router
Size of
IP >100
MTU=1000 DF=1 MTU=100
Router is
restricted
and so
discard the
packet
IP fragmentation
Note: The field is 13 bits wide, so the offset can be from 0 to 8191.
Fragments are specified in units of 8 bytes
source destination
Note: Max size of fragment =MTU-IP Header size (min 20 bytes to max 60 bytes)
• Avoid fragmentation
• Router provide feedback if too large.Discover the MTU that will fit
1
Communication over Internet using TCP/IP
Underlying infrastructure for communication over internet
ISP’s
BSNL.MTNL. ...Bharti Airtel. ...Hathway Cable. ...Tata Communications.
Subscribed users access the ISP network through a local phone number or dedicated line at one place
called Point of Presence
In real internet dozens of large ISP interconnect at NAP(Network Access Point).
The National Science Foundation (NSF) created the first high-speed backbone in 1987. Called NSFNET, it
was a T1 line that connected 170 smaller networks together and operated at 1.544 Mbps (million bits per
second)
In Windows, use tracert www.yahoo.com. From a Unix prompt, type traceroute www.yahoo.com.
Backbones are typically fiber optic trunk lines. The trunk line has multiple fiber optic cables combined
together to increase the capacity
Routing metrics
• Metrics are the network variables used in deciding what path is preferred for reaching
destination
• The most common metric values are hop, bandwidth, delay, reliability, load, and cost.
Hop
The hop count refers to the number of intermediate devices through which data must pass
between source and destination.
Disadvantage:
The upper path may contain a slower link, such as 56Kb dial-
up link
lower path may consist of more hops but faster links, such
as gigabit Ethernet.
Routing metrics
Bandwidth
Protocols that consider the capacity of a link use this metric. The lower path is longer (in terms of hops), but
preferred because the bandwidth capacity end to end is greater than the upper path.
Delay
Protocols that use this metric must determine
the delay values for all links along the path
end to end, considering the path with the
lowest (cumulative) delay to be a better route
Routing metrics
Reliability
Links experiencing more problems would be considered less reliable than others making them less desirable
paths—the higher the reliability the better the path.
The value is generally measured as a percentage of 255, with 255 being the most reliable and less than that is
considered as un reliable
Load
Load measures the amount of traffic occupying the
link over this time frame as a percentage of the
link‘s total capacity.
As traffic increases, this value increases. Values approaching 255 indicate congestion, while lower
values indicate moderate traffic loads. the lower the value, the less congested the path, the more
preferred
Cost
• Network administrators can affect the way routers make path decisions by setting arbitrary
metric values on links along the path end to end.
• These arbitrary values are typically single integers with lower values indicating better paths.
• costs are automatically assigned based on the bandwidth of a link
• Costs are static today, mostly because no one has ever figured out a way to do a stable
routing protocol with dynamic costs.
Network Routing(Dijkstra’s Algorithm )
Network Routing(Dijkstra’s Algorithm )
Network Routing(Dijkstra’s Algorithm )
D C
B 7
D 11 Applies disjkstras algorithm for routing table
updation
A 1 7
3
Converges faster when compared to DVR
1
Sequence number is assigned for a packet
For a limited period of time
Looping is transient
2
B
A seq
seq TTL
TTL A 2
B 2 7 11
D 1 C 3
DSR versus LSR
DVR LSR
BW is less BW is more
Local knowledge Global knowledge
Bellman ford algorithm Dijkstras algorithm
Less traffic More traffic
Periodic updates Periodic updates
Convergence is slow Convergence is fast
Count to infinity No count to infinity due to global
knowledge
Uses Routing information protocol Open shortest path first
Looping is persistent Looping is transcient
ICMP(Internet Control Message protocol)
• IP does not have a inbuilt mechanism for sending error and control messages. ICMP takes
initiative.
• used for reporting errors and management queries
• Source quench message :Receiving host detects that rate of sending packets (traffic rate) to it is too
fast it sends the source quench message to the source to slow the pace down so that no packet can be
lost.
• ICMP will take source IP from the discard
ed packet and informs to source by sending
source quench message.
Then source will reduce the speed of
transmission so that router will free for congestion.
ICMP(Internet Control Message protocol)
When the congestion router is far away from the source the
ICMP will send hop by hop source quench message so that
every router will reduce the speed of transmission.
Parameter problem
ICMP will take the source IP from the discarded packet and informs to
source by sending parameter problem message.
ICMP(Internet Control Message protocol)
• Destination un-reachable :
• Destination unreachable is generated by the host or its inbound gateway to inform the client that the
destination is unreachable for some reason.
There is no necessary condition that only router give the ICMP error message some time
destination host send ICMP error message when any type of failure (link failure,hardware
failure,port failure etc) happen in the network.
ICMP(Internet Control Message protocol)
The default gateway for Host H is configured to use router
R1. Host H sends a packet to router R1 to reach the
destination on Remote Branch office Host 10.1.1.1. Router
R1, after it consults its routing table, finds that the next-hop
to reach Host 10.1.1.1 is router R2
This informs the host that the best route to reach Host
10.1.1.1 is by way of router R2. Host H then forwards all the
subsequent packets destined for Host 10.1.1.1 to router R2.