1 network layer lecture 12 imran ahmed university of management & technology

13
1 Network Layer Network Layer Lecture 12 Lecture 12 Imran Ahmed Imran Ahmed University of Management & Technology University of Management & Technology

Upload: jemima-sherman

Post on 04-Jan-2016

217 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

1

Network LayerNetwork LayerLecture 12Lecture 12

Imran AhmedImran AhmedUniversity of Management & TechnologyUniversity of Management & Technology

Page 2: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

2

Agenda

• Introduction & Network layer functions

• Routing principles

• Hierarchical routing

• The Internet protocol (IP)

• Routing in the Internet

Page 3: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

3

BOOTP• Bootstrap protocol (BOOTP) is a client-server protocol

designed to provide the four types of information for a diskless computer or a computer that is booted for the first time.– Its IP address– Its subnet mask– The IP address of a router– The IP address of a name server

• This information is usually stored in a configuration file and accessed by a computer during bootstrap process.

• In case of diskless computer, the OS & the networking software could be stored in ROM.

• So, the above information cannot be stored in the ROM by the manufacturers.

• Do we need RARP in this case?

Page 4: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

4

DHCP• Dynamic Host Configuration Protocol (DHCP) is

a dynamic configuration protocol.• DHCP is compatible with BOOTP.• DHCP provides temporary IP addresses for a

limited period of time.• In the simplest case, each network will have a

DHCP server. If no server is present then a DHCP “relay agent” (typically a router) that knows the address of the DHCP server for that network is needed.

Page 5: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

5

DHCP Client-Server Scenario

Page 6: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

6

DHCP

• For new arriving host, the DHCP protocol is a four-step process:-

• DHCP server discovery

• DHCP server offers

• DHCP request

• DHCP ACK

Page 7: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

7

DHCP Client-Server Scenario

Page 8: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

8

Mapping IP Addresses to Hardware Addresses

• IP Addresses are not recognized by hardware.

• If we know the IP address of a host, how do we find out the hardware address ?

• The process of finding the hardware address of a host given the IP address is called

Address ResolutionAddress Resolution

Page 9: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

9

Reverse Address Resolution

• The process of finding out the IP address of a host given a hardware address is called

Reverse Address ResolutionReverse Address Resolution

Page 10: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

10

ARP

• The Address Resolution Protocol is used by a sending host when it knows the IP address of the destination but needs the Ethernet address.

• ARP is a broadcast protocol - every host on the network receives the request.

• Each host checks the request against it’s IP address - the right one responds.

Page 11: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

11

ARP (cont.)

• ARP does not need to be done every time an IP datagram is sent - hosts remember the hardware addresses of each other.

• Part of the ARP protocol specifies that the receiving host should also remember the IP and hardware addresses of the sending host.

Page 12: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

12

ARP

Page 13: 1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology

13

Services provided by IP

• Connectionless Delivery (each datagram is treated individually).

• Unreliable (delivery is not guaranteed).

• Fragmentation / Reassembly

• Routing.