Network Addressing and Routing Protocols: A Comprehensive Overview

Verified

Added on  2025/05/08

|10
|1928
|375
AI Summary
Desklib offers solved assignments and past papers to help students succeed.
Document Page
Assignment 2
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
1.......................................................................................................................................................3
2.......................................................................................................................................................3
3.......................................................................................................................................................4
4.......................................................................................................................................................4
5.......................................................................................................................................................4
6.......................................................................................................................................................4
7.......................................................................................................................................................5
8.......................................................................................................................................................6
9.......................................................................................................................................................6
10.....................................................................................................................................................7
11.....................................................................................................................................................7
12.....................................................................................................................................................7
13.....................................................................................................................................................8
14.....................................................................................................................................................8
15.....................................................................................................................................................8
16.....................................................................................................................................................9
17.....................................................................................................................................................9
References......................................................................................................................................10
2
Document Page
1.
1. A classful terminology splits internet protocol logical data in network Id and host Id.
Like- Class A- Class A first octet contains network while the last three contains Host.
Class B- Here the first two octets contain network ID and the last three states contain Host
ID.
Class C- It contains the network ID in first three while last of the octet contains Host ID.
2. From the above example, it is clear that A, B, and C are being utilized to multicast while
class D is being used for research
3. Classful addressing limit the no. of the network that could be offered to a specific
network
4. Like of the classful addressing in IPV4 is RIP. RIP uses the classful (Richter et al, 2015).
Classless
1) It allows making utilize for the subnet mask’s variable length that is called as VLSM
2) Here a variety of subnet mask could be used in one single network.
3) Here no limiting boundary on the host or on the network.
4) It is also known as classless inter-domain means CIDR.
2.
For seventeen million users’ individual devices could be handles through if class A consists an
address of 24bit. A huge number of entity devices can only consist a little part of this no. of the
device means a huge number of address could not be used.
Let consider a small company who offer services to seventeen million of address but the domain
organization could only able to make use of small fraction.
3
Document Page
3.
As we know an internet protocol concludes two of the major components called network
addressing identity number and host addressing number. If in a network more subnet is being
required then the subnet could be split into several parts in the form of the subnet and the host.
Masking could be made use to fetch information of sub-network from the internet protocol and
mask. This operation is also known as the mask of the subnet and the purpose of calling it with
this name is it make utilize the IP’s network address as well as an operation that is performed
over the network mask. It is a 32bit no which can effectively break an IP into the network as well
as the host. If one can able to set network bit to 1 then a subnet mask and if the host could be
able to set to 0 then it is called Mask of the subnet. Here large numbers of address are available
but only two is reserved and not assigned to any of the hosts (Livadariu et al, 2015).
4.
It is one of the very first addresses within a bunch of the address. One can able to identify the
network related address by masking. Mask can allow to split and perform an operation using
AND along with any of the given address.
5.
Here a large set of block splits into several blocks and each block is being associated with the
small set of networks i.e. known as a subnet. Let discuss super netting. It is a bunch of
combination of several smaller sizes of blocks to map the large area. In the super-netting, a large
block is being assigned to the large size of the network which is called as supernet.
6.
Theoretically, there are 2^32 IPv4 addresses. This is quietly larger than IPv4 address. Means, the
total no. of IPv4 available is significantly lower than the actual theoretical no. Since some of the
addresses in a network are reserved for broadcasting, multicasting or other specific regions and
these could never associate to a host.
With the explosion of devices online, the available IPv4 addresses are just not enough. NAT was
designed as a temporary solution to circumvent this problem and support IPv4 address
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
reusability. NAT resulted in IPv4 addresses being divided into two broad categories: Public and
Private. The range of private IPv4 addresses can be used by anyone and are unregistered.
Now in this scenario when the host with logical mapping address tried to make communication
with the privately enabled network then on that time this make use of NAT. This is the way to
have a private address is being marked as public because the required server needed a uniquely
defined address.
Another benefit of using NAT is that allows protecting the private hosting network from the rest
of the world. Everyone, outside the private network, could only see the public address and
nothing beyond it.
7.
Connection-Oriented
These are the following operation that could be performed by the user on the connection-
oriented:
1. Establishment of connection
2. Sending of information
3. Releasing.
In this type of services communication actually, occurs before the establishment of actual
communication. Once the connection of services establishment is done a message is being sent
with the required information and after completion of that connection is being released.
The oriented type of service allows to establishing a more reliable connection than the
connectionless. Sending of information could also be possible while an error is being occurred
on the destination side.
Connection Less
This is some kind of delivery of postal service where the full destination portfolio is being
mentioned to reach to the destination. Here the packet of the message independently transmit
5
Document Page
from the source and reach to the destination. Like postal delivery service, where the message
data is being sent to the destination without ensuring for the destination actually occurred or not.
8.
Fragmentation is a phenomenon where the file splits into several pieces. This occurs naturally
while we make utilize of files, creating and partitioning into several files. For example, an OS
also require for the file system is not formalized clusters. This whole process is being possible
from hiding the user but this impact on background processing of the system. Result of this
process could slow down the entire system because the system makes the deep search for within
all disks.
9.
Implementation of internet protocol address version 6 becomes on the priority of the several
organizations when the organization faces a depleted issue with the internet protocol version
four. Switching on to the other version of internet protocol address is not quietly feasible. Let
discuss how to move from version 4 to version 6.
1. By running of both of the version on the same device allow to move from version four to
version6
2. Trafficking through version four to version 6
3. Conversion of version four traffic to make transport the information
Difference
1. Tunneling of version six manually is the most significant process to make configuration
in between the routers where both the version supported.
2. GRE is a specific rule, developed for tunneling of version six and which is configured
like the manual tunnel. It is self-sufficient for the communication in between a different
layer of network apart from the version six.
Translation
6
Document Page
1. Network address translation is one of the best methods to provide static or dynamic
configuration for translation from the older version to the newer version.
2. A limitation is also associated with the network address translation is it make contracts
with the functionality of ALG. Here both of the version is being configured and deployed
independently.
10.
This is a rule to map the MAC address that is received by the nearby networks address. Like in
version four of internet protocol this is the most common level nowadays. In the local area
connection, 48bit long address device has been attached. In this ARP convention physical
addressing is termed as MAC. A formulated table description is being developed called cache.
This is much capable to manage the inter-relation among MAC and respective logical address.
11.
This is a terminology which allows for address the error that could be raised in the network. Like
a router could be able to address an error message which could be raised either from source side
or from the destination side during the delivery of packets. Internet control message protocol
allows generating and transmitting a message to the receiver side using a gateway within the
network.
12.
A self-governing framework is a system or an accumulation of systems that are altogether
overseen and administered by a solitary element or association. An autonomous system is a
heterogeneous system normally represented by an enormous undertaking. An AS has a wide
range of subsystems with consolidated directing rationale and regular steering strategies. Each
subsystem is doled out a comprehensively novel sixteen digit identification number
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13.
Steering Information Protocol is a separation vector convention that utilizations jump consider its
essential measurement. Tear characterizes how switches should share data when moving traffic
among an interconnected gathering of the neighborhood. The information terminology is one
such traditional routing that considers the count of the hop like a metric. It deployed limit
techniques on the count of the hops which allow preventing from the creation of loop on routing.
In RIP, maximum of fifteen hops are only allowed.
14.
This routing information protocol message is utilized by a switch to ask for and get directing data
about an independent framework or to intermittently impart its learning to its neighbors. The tear
is a separation vector steering convention, utilizing UDP bundles for trading data through port
520. Tear utilizes a jump check to gauge the separation to a goal. The bounce tally from a switch
to a straightforwardly associated system is 0. The bounce tally from a switch to a legitimately
associated switch is.
15.
This type of information comes in the packet which transmits as soon as possible because there is
a router available for providing OSPF to create network flood for the passing of information to a
nearby address. This type of messages is circulated gradually in light of the fact that a system
utilizing RIP depends on the intermittent updates that happen at regular intervals to convey any
news starting with one switch then onto the next and to the following.
16.
The purpose of BGP is to make a routing. Actually, this is an inter-domain rule that makes utilize of
vector type of routing (Al-Musawi et al, 2016).
17.
If we consider the distance vector at first then it depends on two of the parameters namely
distance and other is metric of the destination of the packet in a network. Here the message
which is routed by the router for the nearby destination could only exchange. Thus, within a
8
Document Page
network router understand for learning behavior of message but it didn’t know what is the source
of learning.
If link state router considered within the network, then it considered that it understands for all
path by which the message could be received by destination using a router. Here the information
about the link-state is come in a massive amount in the entire domain to provide surety for each
and every router consider and acquire a copy link state repository.
9
Document Page
References
Richter, P., Allman, M., Bush, R. and Paxson, V., 2015. A primer on IPv4 scarcity. ACM
SIGCOMM Computer Communication Review, 45(2), pp.21-31.
Livadariu, I., Elmokashfi, A. and Dhamdhere, A., 2017. On IPv4 transfer markets: Analyzing
reported transfers and inferring transfers in the wild. Computer Communications, 111, pp.105-
119.
Al-Musawi, B., Branch, P. and Armitage, G., 2016. BGP anomaly detection techniques: A
survey. IEEE Communications Surveys & Tutorials, 19(1), pp.377-396.
10
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]