PT 1 Acn QB
PT 1 Acn QB
PT 1 Acn QB
Pg-1
ACN-QB-2022-23-PT-1....
ACN Questions of 2, 4, 6 marks:
Hexadecimal Notation
Version
Which version of the protocol the datagram belongs to.
The current version number is 4.
Next version: 6
IHL (Header length)
The number of 32-bit words in the header
Because this is 4 bits, the max header length is 15 words (i.e. 60 bytes)
The header is at least 20 bytes, but options may make it bigger
Type of Service
Contains a 3-bit precedence field (that is ignored today), 4 service bits, and 1 unused bit.
The four service bits can be:
o 1000 - minimize delay
o 0100 - maximize throughput
o 0010 - maximize reliability
o 0001 - minimize monetary cost
This is a "hint" of what characteristics of the physical layer to use
The Type of Service is not supported in most. Implementations. However, some
implementations have extra fields in the routing table to indicate delay, throughput, reliability,
and monitory cost.
Total Length
Siddhi Mehta 94
Pg-4
total length of the datagram in bytes.
we know where the data starts by the header length
we know the size of the data by computing "total length - header length"
Identification
Uniquely identifies the datagram.
Usually incremented by 1 each time a datagram is sent.
All fragments of a datagram contain the same identification value.
This allows the destination host to determine which fragment belongs to which datagram.
Flags and Fragmentation Offset
Used for fragmentation
DF means do not fragment. It is a request to routers not to fragment the datagram since the
destination is incapable of putting the pieces back together.
MF means more fragments to follow. All fragments except the last one have this bit set. It is
needed to know if all fragments of a datagram have arrived.
Fragment offset
Number of fragments
Time to Live
Upper limit of routers
usually set to 32 or 64.
decremented by each router that processes the datagram,
router discards the datagram when TTL reaches 0.
Protocol
Tells IP where to send the datagram up to.
6 means TCP
17 means UDP
Header checksum
Only covers the header, not the data
Version
Which version of the protocol the datagram belongs to.
The current version number is 4.
Next version: 6
IHL (Header length)
The number of 32-bit words in the header
Because this is 4 bits, the max header length is 15 words (i.e. 60 bytes)
The header is at least 20 bytes, but options may make it bigger
Type of Service
Contains a 3-bit precedence field (that is ignored today), 4 service bits, and 1 unused bit.
The four service bits can be:
o 1000 - minimize delay
o 0100 - maximize throughput
o 0010 - maximize reliability
o 0001 - minimize monetary cost
Siddhi Mehta 94
Pg-8
This is a "hint" of what characteristics of the physical layer to use
The Type of Service is not supported in most. Implementations. However, some
implementations have extra fields in the routing table to indicate delay, throughput, reliability,
and monitory cost.
Total Length
total length of the datagram in bytes.
we know where the data starts by the header length
we know the size of the data by computing "total length - header length"
Identification
Uniquely identifies the datagram.
Usually incremented by 1 each time a datagram is sent.
All fragments of a datagram contain the same identification value.
This allows the destination host to determine which fragment belongs to which datagram.
Flags and Fragmentation Offset
Used for fragmentation
DF means do not fragment. It is a request to routers not to fragment the datagram since the
destination is incapable of putting the pieces back together.
MF means more fragments to follow. All fragments except the last one have this bit set. It is
needed to know if all fragments of a datagram have arrived.
Fragment offset
Number of fragments
Time to Live
Upper limit of routers
usually set to 32 or 64.
decremented by each router that processes the datagram,
router discards the datagram when TTL reaches 0.
Protocol
Tells IP where to send the datagram up to.
6 means TCP
17 means UDP
Header checksum
Only covers the header, not the data
This field is left out of IPv6 which relies on the transport layer for verification.
Siddhi Mehta 94
Pg-9
Source IP address
The sender
Destination IP address
the final destination
Options
Optional data.
Some examples include having the router put in a IP address of router and a time stamp so the
final destination knows how long it took to get to each hop.
The source and destination in the IP header are the original source and the final destination! The
physical layer addresses pass the datagram from router to router. So, while the physical layer
addresses change from router to router, the source and destination IP addresses in the IP datagram
remain constant!
The checksum
How to compute a checksum?
o Put a 0 in the checksum field.
o Add each 16-bit value together.
o Add in any carry
o Inverse the bits and put that in the checksum field.
To check the checksum:
o Add each 16-bit value together (including the checksum).
o Add in carry.
o Inverse the bits.
o The result must be 0.
Remember, only the bits in the header are calculated in the IP checksum.
Note: all other fields of the IP header are identical to the first packet (except the checksum)
Contains a 3-bit precedence field (that is ignored today), 4 service bits, and 1 unused bit.
The four service bits can be:
o 1000 - minimize delay
o 0100 - maximize throughput
Siddhi Mehta 94
Pg-10
8. Enlist OSI Layer-wise protocols
ANSWERS:
✔ a fixed part- The fixed part is 20 bytes long and was discussed in the previous section. ✔ a
variable part-The variable part comprises the options, which can be a maximum of 40 bytes.
Options,
✔ Although options are not a required part of the IP header, option processing is required of the IP
software.
✔ This means that all implementations must be able to handle options if they are present in
the header.
Siddhi Mehta 94
Pg-11
Format
The format of an option is composed of:
∙ A 1-byte type field,
∙ A 1-byte length field, and
∙ A variable-sized value field.
The three fields are often referred to as Type-Length-Value or TLV.
Type
The type field is 8 bits long and contains three subfields: copy, class, and number.
Copy. This 1-bit subfield controls the presence of the option in fragmentation When its value is 0, it
means that the option must be copied only to the first fragment. If its value is 1, it means the option
must be copied to all fragments.
Class. This 2-bit subfield defines the general purpose of the option. When its value is 00, it means
that the option is used for datagram control. When its value is 10, it means that the option is used for
debugging and management. The other two possible values (01 and 11) have not yet been defined.
Number. This 5-bit subfield defines the type of option. Although 5 bits can define up to 32 different
types, currently only 6 types are in use. These will be discussed in a later section.
Length
The length field defines the total length of the option including the type field and the length field
itself. This field is not present in all of the option types.
Value
The value field contains the data that specific options require. Like the length field, this field is also
not present in all option types.
Option Types
Siddhi Mehta 94
Pg-12
There are only six options are currently being used. Two of these are1-byte options, and they do not
require the length or the data fields. Four of them are multiple-byte options; they require the length
and the data fields.
A strict-source-route option is
Used by the source to predetermine a route for the datagram as it travels through the Internet.
Dictation of a route by the source can be useful for several purposes.
The sender can choose a route with a specific type of service, such as minimum delay or
throughput.
Alternatively, it may choose a route that is safer or more reliable for the sender’s purpose. For
example, a sender can choose a route so that its datagram does not travel through a
competitor’s network.
If a datagram specifies a strict source route, all of the routers defined in the option must be
visited by the datagram. A router must not be visited if its IP address is not listed in the
datagram.
If the datagram visits a router that is not on the list, the datagram is discarded and an error
message is issued.
If the datagram arrives at the destination and some of the entries were not visited, it will also
be discarded and an error message issued.
Regular users of the Internet, however, are not usually aware of the physical topology of the
Internet. Consequently, strict source routing is not the choice of most users.
Siddhi Mehta 94
Pg-14
It is similar to the record route option with the exception that all of the IP addresses are
entered by the sender.
When the datagram is traveling, each router that processes the datagram compares the value
of the pointer with the value of the length.
If the value of the pointer is greater than the value of the length, the datagram has visited all
of the predefined routers.
The datagram cannot travel anymore; it is discarded and an error message is created.
If the value of the pointer is not greater than the value of the length, the router compares the
destination IP address with its incoming IP address:
If they are equal, it processes the datagram, swaps the IP address pointed by the pointer with
the destination address, increments the pointer value by 4, and forwards the datagram.
If they are not equal, it discards the datagram and issues an error message. Figure 7.17 shows
the actions taken by each router as a datagram-travels from source to destination.
Loose-Source-Route Option
A loose-source-route option is similar to the strict source route, but it is more relaxed.
Each router in the list must be visited, but the datagram can visit other routers as well.
Siddhi Mehta 94
Pg-15
12. Draw architecture of Mobile IP and explain its functioning
ANSWERS:
Mobile Hosts
When a host moves from one network to another, the IP addressing structure needs to be
modified.
Several solutions have been proposed.
We have shown the home and the foreign agents as routers, but we need to emphasize that their
specific function as an agent is performed in the application layer. In other words, they are both
routers and hosts.
Home Agent
The home agent is usually a router attached to the home network of the mobile host.
The home agent acts on behalf of the mobile host when a remote host sends a packet to the
mobile host.
The home agent receives the packet and sends it to the foreign agent.
Foreign Agent
The foreign agent is usually a router attached to the foreign network.
The foreign agent receives and delivers packets sent by the home agent to the mobile host.
The mobile host can also act as a foreign agent.
In other words, the mobile host and the foreign agent can be the same.
However, to do this, a mobile host must be able to receive a care-of address by itself, which
can be done through the use of DHCP.
In addition, the mobile host needs the necessary software to allow it to communicate with the
home agent and to have two addresses:
1. its home address and
2. its care-of address.
This dual addressing must be transparent to the application programs.
When the mobile host acts as a foreign agent, the care-of address is called a co- located care-
of address.
Siddhi Mehta 94
Pg-17
13. State different Agents involved in Mobile IP with their roles
ANSWERS:
AGENTS
To make the change of address transparent to the rest of the Internet requires a home Agent and a
Foreign Agent.
Figure shows the position of a home agent relative to the home network and a foreign agent relative to
the foreign network.
We have shown the home and the foreign agents as routers, but we need to emphasize that their
specific function as an agent is performed in the application layer. In other words, they are both
routers and hosts.
Home Agent
The home agent is usually a router attached to the home network of the mobile host.
The home agent acts on behalf of the mobile host when a remote host sends a packet to the
mobile host.
The home agent receives the packet and sends it to the foreign agent.
Foreign Agent
The foreign agent is usually a router attached to the foreign network.
The foreign agent receives and delivers packets sent by the home agent to the mobile host.
The mobile host can also act as a foreign agent.
In other words, the mobile host and the foreign agent can be the same.
However, to do this, a mobile host must be able to receive a care-of address by itself, which
can be done through the use of DHCP.
In addition, the mobile host needs the necessary software to allow it to communicate with the
home agent and to have two addresses:
3. its home address and
4. its care-of address.
This dual addressing must be transparent to the application programs.
When the mobile host acts as a foreign agent, the care-of address is called a co- located care-
of address.
Siddhi Mehta 94
Pg-18
14. States three phases of Mobile IP. Explain any one in short
ANSWERS:
THREE PHASES
To communicate with a remote host, a mobile host goes through three phases:
Agent Discovery:
During the agent discovery phase, the Home Agent and Foreign Agent advertise their services on the
network by using the ICMP.
Router Discovery Protocol (IRDP). The Mobile Node listens to these advertisements to determine if it
is connected to its home network or foreign network.
If a Mobile Node determines that it is connected to a foreign network, it acquires a care-of
address.
Two types of care-of addresses exist:
Care-of address acquired from a Foreign Agent Co-located care-of address
When the Mobile Node hears a Foreign Agent advertisement and detects that it has moved
outside of its home network, it begins registration.
Registration
The Mobile Node is configured with the IP address and mobility security association (which includes
the shared key) of its Home Agent. In addition, the Mobile Node is configured with either its home IP
address, or another user identifier, such as a Network Access Identifier.
Data Transfer. associated request is in its pending list as well as proper authentication of the Home
Agent. If the registration reply is not valid, the Mobile Node discards the reply. If a valid registration
reply specifies that the registration is accepted, the Mobile Node is confirmed that the mobility agents
are aware of its roaming. In the co-located care-of address case, it adds a tunnel to the Home Agent.
Subsequently, it sends all packets to the Foreign Agent.
a successful Mobile IP registration sets up the routing mechanism for transporting packets to and
from the Mobile Node as it roams.
Siddhi Mehta 94
Pg-19
15. State flags used in Fragmentation, explain fragmentation with simple example
ANSWERS:
Flags: This is a three-bit field.
The first bit is reserved (not used).
The second bit is called the do not fragment bit.
If its value is 1, the machine must not fragment the datagram. If it cannot pass the datagram through
any available physical network, it discards the datagram and sends an ICMP error message to the
source host.If its value is 0, the datagram can be fragmented if necessary.
The third bit is called the more fragment bit.
If its value is 1, it means the datagram is not the last fragment; there are more fragments after this one.
Remember that the value of the offset is measured in units of 8 bytes. This is done because the
length of the offset field is only 13 bits long and cannot represent a sequence of bytes greater than
8191.
This forces hosts or routers that fragment datagrams to choose the size of each fragment so that
the first byte number is divisible by 8.
The value of the identification field is the same in all fragments.
Notice the value of the flags field with the more bit set for all fragments except the last.
Also, the value of the offset field for each fragment is shown.
Siddhi Mehta 94
Pg-20
In this case the value of the offset field is always relative to the original datagram.
For example, in the figure, the second fragment is itself fragmented later to two fragments of 800
bytes and 600 bytes, but the offset shows the relative position of the fragments to the original data. It
is obvious that even if each fragment follows a different path and arrives out of order, the final
destination host can reassemble the original datagram from the fragments received (if none of them is
lost) using the following strategy:
a. The first fragment has an offset field value of zero.
b. Divide the length of the first fragment by 8. The second fragment has an offset value equal to that
result.
c. Divide the total length of the first and second fragment by 8. The third fragment has an offset
value equal to that result.
d. Continue the process. The last fragment has a more bit value of 0.
Siddhi Mehta 94
Pg-21
16. Give significance of ICMP Checksum. Give example of checksum calculation.
ANSWERS:
ICMP Checksum
Checksum Calculation
The sender follows these steps using one’s complement arithmetic:
1. The checksum field is set to zero.
2. The sum of all the 16-bit words (header and data) is calculated.
3. The sum is complemented to get the checksum.
4. The checksum is stored in the checksum field.
Checksum Testing
The receiver follows these steps using one’s complement arithmetic:
1. The sum of all words (header and data) is calculated.
2. The sum is complemented.
3. If the result obtained in step 2 is 16 0s, the message is accepted; otherwise, it is rejected.
17. Draw IPV6 Header format in detail.
ANSWERS:
It is used when the source needs to pass information to all routers visited by the datagram.
2) routing (source routing) header,
The source routing extension header combines the concepts of the strict source route and the loose
source route options of IPv4.
3) Destination options header,
The destination option is used when the source needs to pass information to the destination only.
Intermediate routers are not permitted access to this information. The format of the destination option
is the same as the hop-by-hop option (refer back to Figure 27.5). So far, only the Pad1 and PadN
options have been defined.
Siddhi Mehta 94
Pg-23
4) TCP header
5) fragmentation,
Dual-stack IP implementations provide complete IPv4 and IPv6 protocol stacks in the
operating system of a computer or network device on top of the common physical layer
implementation, such as Ethernet.
This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously.
The method is defined in RFC 4213.
A device with dual-stack implementation in the operating system has an IPv4 and IPv6
address, and can communicate with other nodes in the LAN or the Internet using either IPv4
or IPv6.
The Domain Name System (DNS) protocol is used by both IP protocols to resolve fully
qualified domain names (FQDN) and IP addresses, but dual stack requires that the resolving
DNS server can resolve both types of addresses.
Such a dual stack DNS server would hold IPv4 addresses in the A records, and IPv6 addresses
in the AAAA records.
Depending on the destination that is to be resolved, a DNS name server may return an IPv4 or
IPv6 IP address, or both.
A default address selection mechanism, or preferred protocol, needs to be configured either
on hosts or the DNS server.
The IETF(Internet Engineering Task Force) has published Happy Eyeballs called Fast
Fallback) is an algorithm published by the IETF which can make dual- stack applications
more responsive to users )to assist dual stack applications, so that they can connect using both
IPv4 and IPv6, but prefer an IPv6 connection if it is available.
dual-stack also needs to be implemented on all routers between the host and the service for
which the DNS server has returned a IPv6 address.
Dual-stack clients should only be configured to prefer IPv6, if the network is able to forward
IPv6 packets using the IPv6 versions of routing protocols.
When dual stack networks protocols are in place the application layer can be migrated to
IPv6.
While dual-stack is supported by major operating system and network device vendors, legacy
networking hardware and servers don't support IPv6.
Siddhi Mehta 94
Pg-30
26. Describe transition from IPV4 to IPV6
ANSWERS:
Complete transition from IPv4 to IPv6 might not be possible because IPv6 is not backward
compatible. This results in a situation where either a site is on IPv6 or it is not. It is unlike
implementation of other new technologies where the newer one is backward compatible so the older
system can still work with the newer version without any additional changes. To overcome this short-
coming, we have a few technologies that can be used to ensure slow and smooth transition from IPv4
to IPv6.
Three Transition from IPv4 to IPv6 strategies are
1. Dual Stack
2. Tunnelling
3. Header Translation
1. DUAL STACK
In this kind of strategy, a station has a dual stack of protocols run IPv4 and IPv6 simultaneously. To
determine which version to use when sending a packet to a destination, the source host queries the
DNS. If the DNS returns an IPv4 address, the source host sends an IPv4 packet. If the DNS returns an
IPv6 address, the source host sends an IPv6 packet.
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6 want to communicate with each other
and the packet must pass through a region that uses IPv4.
To pass through this region, the packet must have an IPv4 address. So the IPv6 packet is
encapsulated in an IPv4 packet when it enters the region.
To make it clear that the IPv4 packet is carrying an IPv6 packet as data the protocol value is set to
41.
Siddhi Mehta 94
Pg-31
3. Header Translation
In this case, the header format must be totally changed through header translation. The header of the
IPv6 packet is converted to an IPv4 header see figure.
28. Explain following strategies of transition with diagram 1)Dual Stack, 2) Tunnelling 3) Header
Translation
ANSWERS:
TRANSITION FROM IPv4 TO IPv6
Because of the huge number of systems on the Internet, the transition from IPv4 to IPv6 cannot
happen suddenly. It will take a considerable amount of time before every system in the Internet can
move from IPv4 to IPv6. The transition must be smooth to prevent any problems between IPv4 and
IPv6 systems.
Three strategies have been devised by the IETF to help the transition shown in fig:
Siddhi Mehta 94
Pg-32
Dual Stack
It is recommended that all hosts, before migrating completely to version 6, have a dual stack
of protocols.
In other words, a station must run IPv4 and IPv6 simultaneously until all the Internet uses
IPv6. The layout of a dual-stack configuration is :
To determine which version to use when sending a packet to a destination, the source host
queries the DNS.
If the DNS returns an IPv4 address, the source host sends an IPv4 packet.
If the DNS returns an IPv6 address, the source host sends an IPv6 packet.
Tunneling:
Is a strategy used when two computers using IPv6 want to communicate with each other and
the packet must pass through a region that uses IPv4.
To pass through this region, the packet must have an IPv4 address.
So the IPv6 packet is encapsulated in an IPv4 packet when it enters the region, and it leaves
its capsule when it exits the region.
It seems as if the IPv6 packet passes goes through a tunnel at one end and emerges at the
other end.
To make it clear that the IPv4 packet is carrying an IPv6 packet as data, the protocol value is
set to 41.
Header translation uses the mapped address to translate an IPv6 address to an IPv4 address.
The following lists some rules used in transforming an IPv6 packet header to an IPv4 packet
header.
The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32 bits.
The value of the IPv6 priority field is discarded.
The type of service field in IPv4 is set to zero.
The checksum for IPv4 is calculated and inserted in the corresponding field.
The IPv6 flow label is ignored.
Compatible extension headers are converted to options and inserted in the IPv4 header. Some
may have to be dropped.
The length of IPv4 header is calculated and inserted into the corresponding field.
The total length of the IPv4 packet is calculated and inserted in the corresponding field.
29. Give significance of Autoconfiguration and Re-numbering concepts and explain
ANSWERS:
AUTOCONFIGURATION
One of the interesting features of IPv6 addressing is the auto-configuration of hosts.
In IPv4, the host and routers are originally configured manually by the network manager.
Dynamic Host Configuration Protocol, DHCP, can be used to allocate an IPv4 address to a
host that joins the network.
In IPv6, DHCP protocol can still be used to allocate an IPv6 address to host, but a host can
also configure itself.
When a host in IPv6 joins a network, it can configure itself using the following process:
1. The host first creates a link local address for itself. This is by taking the 10-bit link Local prefix
(1111 1110 10), adding 54 zeros, and adding the 64-bit interface identifier, which any host knows
how to generate it from its interface card. The result is a 128-bit link local address.
2. The host then tests to see if this link local address is unique and not used by Other hosts. Since the
64-bit interface identifier is supposed to be unique, the link local address generated is unique with a
high probability. However, to be sure, the host sends a neighbor solicitation message and waits for
neighbor advertisement message. If any host in the subnet is using this link local address, the process
fails and the host cannot auto-configure itself; it needs to use other means such as DHCP protocol for
this purpose.
3. If the uniqueness of the link local address is passed, the host stores this address as its link-local
address (for private communication), but it still needs a global unicast address. The host then sends a
router solicitation message to a local router. If there is a router running on the network, the host
receives a router advertisement message that includes the global unicast prefix and the subnet prefix
that the host needs to add to its interface identifier to generate its global unicast address. If the router
Siddhi Mehta 94
Pg-34
cannot help the host with the configuration, it informs the host in the router advertisement message
(by setting a flag). The host then needs to use other means for configuration.
Example:
Assume a host with Ethernet address ( F5-A9-23-11-9B-E2) has joined the network. What would be
its global unicast address if the global unicast prefix of the organization is 3A21:1216:2165 and the
subnet identifier is A245:1232.
Solution
The host first creates its interface identifier as F7A9:23FF:FE11:9BE2
using the Ethernet address read from its card. The host then creates its link-local address as
FE80::F7A9:23FF:FE11:9BE2
Assuming that this address is unique, the host sends a router solicitation message and receives the
router advertisement message that announces the combination of global unicast prefix and the subnet
identifier as 3A21:1216:2165:A245:1232.
The host then appends its interface identifier to this prefix to find and store its global unicast address
as: 3A21:1216:2165:A245:1232:F7A9:23FF:FE11:9BE2
RENUMBERING:
To allow sites to change the service provider, renumbering of the address prefix ( ) was built
into IPv6 addressing.
Each site is given a prefix by the service provider to which it is connected.
If the site changes the provider, the address prefix needs to be changed.
A router to which the site is connected can advertise a new prefix and
let the site use the old prefix for a short time before disabling it.
In other words, during the transition period, a site has two prefixes.
The main problem in using the renumbering mechanism is the support of the DNS, which
needs to propagate the new addressing associated with a domain name.
A new protocol for DNS, called Next Generation DNS, is under study to provide support for
this mechanism.
Hello Message
OSPF uses the hello message to create neighbourhood relationships and to test the reach ability of
neighbours. This is the first step in link state routing. Before a router can flood all of the other routers
Siddhi Mehta 94
Pg-35
with information about its neighbours, it must first greet its neighbours. It must know if they are alive,
and it must know if they are reachable (see Figure 11.46).
33. Explain ICMP messages categories Query. Error reporting with is sub-categories in short
ANSWERS:
Error reporting
One of the main responsibilities of ICMP is to report errors. Although technology has produced
increasingly reliable transmission media, errors still exist and must be handled. IP is an unreliable
protocol. This means that error checking and error control are not a concern of IP. ICMP was
designed, in part, to compensate for this shortcoming. However, ICMP does not correct errors, it
simply reports them. Error correction is left to the higher-level protocols. Error messages are always
sent to the original source because the only information available in the datagram about the route is
the source and destination IP addresses. ICMP uses the source IP address to send the error message to
the source (originator) of the datagram.
Destination Unreachable
When a router cannot route a datagram or a host cannot deliver a datagram, the datagram is discarded
and the router or the host sends a destination-unreachable message back to the source host that
initiated the datagram.
Source Quench
The source-quench message in ICMP was designed to add a kind of flow control and congestion
control to the IP. When a router or host discards a datagram due to congestion, it sends a source-
quench message to the sender of the datagram. This message has two purposes. First, it informs the
source that the datagram has been discarded. Second, it warns the source that there is congestion
somewhere in the path and that the source should slow down (quench) the sending process.
Time Exceeded
The time-exceeded message is generated in two cases:
1. Whenever a router decrements a datagram with a time-to-live value to zero, it discards the
datagram and sends a time-exceeded message to the original source.
2. When the final destination does not receive all of the fragments in a set time, it discards the
received fragments and sends a time-exceeded message to the original source.
Parameter Problem
Siddhi Mehta 94
Pg-38
Any ambiguity in the header part of a datagram can create serious problems as the datagram travels
through the Internet. If a router or the destination host discovers an ambiguous or missing value in any
field of the datagram, it discards the datagram and sends a parameter-problem message back to the
source.
Redirection
Host A wants to send a datagram to host B. Router R2 is obviously the most efficient routing choice,
but host A did not choose router R2. The datagram goes to R1 instead. R1, after consulting its table,
finds that the packet should have gone to R2. It sends the packet to R2 and, at the same time, sends a
redirection message to host A. Host A’s routing table can now be updated.
Query Messages
In addition to error reporting, ICMP can also diagnose some network problems. This is accomplished
through the query messages. A group of five different pairs of messages have been designed for this
purpose, but three of these pairs are deprecated today, as we discuss later in the section. Only two
pairs are used today: echo request and replay and timestamp request and replay. In this type of ICMP
message, a node sends a message that is answered in a specific format by the destination node.
echo-request message
An echo-request message can be sent by a host or router. An echo-reply message is sent by the
host or router that receives an echo-request message.
Echo-request and echo-reply messages can be used by network managers to check the operation
of the IP protocol.
Echo-request and echo-reply messages can test the reachability of a host. This is usually done by
invoking the ping command.
Timestamp Request and Reply
Timestamp-request and timestamp-reply messages can be used to calculate the round-trip time
between a source and a destination machine even if their clocks are not synchronized.
Deprecated Messages
Three pairs of messages are declared obsolete by IETF:
1. Information request and replay messages are not used today because their duties are done by
Address Resolution Protocol (ARP)
2. Address mask request and reply messages are not used today because their duties are done by
Dynamic Host Configuration Protocol (DHCP)
3. Router solicitation and advertisement messages are not used today because them duties are done by
Dynamic Host Configuration Protocol (DHCP),
34. Describe any on in detail 1) Triangular Routing 2) Double crossing.
ANSWERS:
Double crossing occurs when a remote host communicates with a mobile host that has moved to the
same network (or site) as the remote host.
Siddhi Mehta 94
Pg-39
When the mobile host sends a packet to the remote host, there is no inefficiency; the
communication is local.
However, when the remote host sends a packet to the mobile host, the packet crosses the
Internet twice.
Since a computer usually communicates with other local computers (principle of locality), the
inefficiency from double crossing is significant.
Triangle routing:
the less severe case, occurs when the remote host communicates with a mobile host that is not
attached to the same network (or site) as the mobile host.
When the mobile host sends a packet to the remote host, there is no inefficiency.
However, when the remote host sends a packet to the mobile host, the packet goes from the
remote host to the home agent and then to the mobile host.
The packet travels the two sides of a triangle, instead of just one side
35. Enlist any 8 features of Open Shortest Path First (OSPF) routing
ANSWERS:
OSPF is an interior gateway protocol (IGP).
It runs within a single routing domain, such as an autonomous system (AS).
It uses a concept called areas, to optimize network traffic and simplify administration.
It uses Dijkstra's algorithm to compute the shortest route to each destination.
It runs over IP protocol but does not use a transport protocol (such as TCP or UDP) to
encapsulate its data.
It encapsulates its data directly in IP packets with protocol number 89.
It uses its own error detection and correction mechanism.
36. Explain Border Gateway Protocol (BGP) and state it's any two characteristics.
ANSWERS:
BGP (Border Gateway Protocol): BGP basics:
the Internet standard External Gateway Protocol (EGP).
BGP detects modifications to routing tables and selectively communicates those changes to other
routers over TCP/IP.
Siddhi Mehta 94
Pg-40
Internet providers commonly use BGP to join their networks together.
Larger business sometimes also use BGP to connect multiple internal networks.
Professionals consider BGP the most challenging of all routing protocols to master due to its
configuration complexity.
More recent than Distance vector and Link state routing.
Not only exchanges of info. About the existence of destination networks but also exchanges the
path on how to reach the destination.
Path info. Is used to determine the best paths and to prevent routing loops. Path vector table is
BGP-Border Gateway protocol
BGP provides each AS a means to:
1. Obtain subnet reachability information from neighboring ASs.
2. Propagate the reachability information to all routers internal to the AS.
3. Determine “good” routes to subnets based on reachability information and policy.
4. Allows a subnet to advertise its existence to rest of the Internet: “I am here”
5. Pairs of routers (BGP peers) exchange routing info over semi-permanent TCP connections: BGP
sessions
6. Note that BGP sessions do not correspond to physical links.
7. When AS2 advertises a prefix to AS1, AS2 is promising it will forward any datagrams destined to
that prefix towards the prefix.
AS2 can aggregate prefixes in its advertisement
Distributing reachability info:
With eBGP session between 3a and 1c, AS3 sends prefix reachability info to AS1.
1c can then use iBGP do distribute this new prefix reach info to all routers in AS1
1b can then re-advertise the new reach info to AS2 over the 1b-to-2a eBGP session
When router learns about a new prefix, it creates an entry for the prefix in its forwarding table.
37. Explain routing example with graph a routing tables for each node
ANSWERS:
39. Draw and explain RIP message format in detail/Explain types of Links used in OSPF
ANSWERS:
❑ Command. This 8-bit field specifies the type of message: request (1) or response (2).
❑ Version. This 8-bit field defines the version. In this book we use version 1, but at the end of this
section, we give some new features of version 2.
❑ Family. This 16-bit field defines the family of the protocol used. For TCP/IP the value is 2.
❑ Network address. The address field defines the address of the destination network. RIP has
allocated 14 bytes for this field to be applicable to any protocol. However, IP currently uses only 4
bytes. The rest of the address is filled with 0s.
❑ Distance. This 32-bit field defines the hop count (cost) from the advertising router to the
destination network.
Note that part of the message is repeated for each destination network. We refer to this as an entry.
Siddhi Mehta 94
Pg-43
40 Describe router solicitation and router advertisement
ANSWERS:
Siddhi Mehta 94
Pg-44
41. Explain Link Local steps using stateless autoconfiguration. 1) generation 2) uniqueness test 3)
Address Assignment 4) Router Contact 5) Router direction 6) Global address Configuration
ANSWERS:
1. Link-Local Address Generation:
The device generates a link-local address.
Recall that this is one of the two types of local-use IPv6 addresses.
Link-local addresses have ―1111 1110 10 for the first ten bits.
The generated address uses those ten bits followed by 54 zeroes and then the 64-bit interface
identifier.
This will be derived from the data link layer (MAC) address or it may be a ―token generated in
some other manner.
2. Link-Local Address Uniqueness Test:
The node tests to ensure that the address it generated isn't for some reason already in use on
the local network.
if the link-local address came from a MAC address, if it was based on a generated token.
It sends a Neighbour Solicitation message using the
Neighbour Discovery (ND) protocol. It listens for a Neighbour Advertisement in response, it
indicates that another device is already using its link-local address; if so, either a new address
must be generated, or auto-configuration fails and another method must be employed.
3. Link-Local Address Assignment:
Assuming the uniqueness test passes, the device assigns the link-local address to its IP
interface.
This address can be used for communication on the local network, but not on the wider
Internet (since link-local addresses are not routed).
4. Router Contact: The node next attempts to contact a local router for more information on
continuing the configuration.
This is done either by listening for Router Advertisement messages sent periodically by
routers, or by sending a specific Router Solicitation to ask a router for information on what to
do next.
This is in reference with IPv6 Neighbour Discovery protocol.
5. Router Direction:
The router provides direction to the node on how to proceed with the auto-configuration.
It may tell the node that on this network “stateful” auto-configuration is in use, and tell it the
address of a DHCP server to use.
Means it will tell the host how to determine its global Internet address.
6. Global Address Configuration:
Assuming that stateless auto-configuration is in use on the network,
the host will configure itself with its globally-unique Internet address.
This address is generally formed from a network prefix provided to the host by the router,
combined with the device's identifier as generated in the first step.
Siddhi Mehta 94
Pg-45
Numerous advantages over both manual and server-based configuration helpful in supporting
mobility of IP devices, as they can move to new networks and
Get a valid address without any knowledge of local servers or network prefixes.
It still allows management of IP addresses using the (IPv6-compatible) version of DHCP if that is
desired.
Routers on the local network will typically tell hosts which type of auto-configuration is
supported using special flags in ICMPv6 Router Advertisement messages.
IPv6 includes an interesting feature called stateless address auto-configuration, which allows a
host to actually determine its own IPv6 address from its layer two address by following a special
procedure.
In classful routing, VLSM (Variable Length While in classless routing, VLSM (Variable
1. Subnet Mask) is not supported. Length Subnet Mask) is supported.
In classful routing, hello messages are not While in classless routing, hello messages are
3. used. used.
4. Classful routing does not import subnet mask. Whereas it imports subnet mask.
In classful routing, CIDR (Classless Inter- While in classless routing, CIDR (Classless
7. Domain Routing) is not supported. Inter-Domain Routing) is supported.
In classful routing, subnets are not displayed While in classless routing, subnets are
8. in another major subnet. displayed in another major subnet.
In classful routing, fault can be detected While in classless routing, fault detection is
9. easily. little tough.
46. List and Explain RIP Times. 1)Periodic 2) Expiration 3) Garbage Collection
ANSWERS:
Different Timers in RIP are:
Periodic Timer: Randomly set to each router (25-35 sec)
Expiration Time: for validity of a route (180 sec)
Garbage collection: If a route becomes invalid and route is removed/ eliminated from
table(120 sec)