SlideShare uma empresa Scribd logo
1 de 55
21.1
Chapter 21
Network Layer:
Address Mapping,
Error Reporting,
and Multicasting
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
21.2
21-1 ADDRESS MAPPING21-1 ADDRESS MAPPING
The delivery of a packet to a host or a router requiresThe delivery of a packet to a host or a router requires
two levels of addressing:two levels of addressing: logicallogical andand physicalphysical. We need. We need
to be able to map a logical address to its correspondingto be able to map a logical address to its corresponding
physical address and vice versa. This can be done byphysical address and vice versa. This can be done by
using either static or dynamic mapping.using either static or dynamic mapping.
Mapping Logical to Physical Address
Mapping Physical to Logical Address
Topics discussed in this section:Topics discussed in this section:
21.3
Figure 21.1 ARP operation
21.4
Figure 21.2 ARP packet
21.5
Figure 21.3 Encapsulation of ARP packet
21.6
Figure 21.4 Four cases using ARP
21.7
An ARP request is broadcast;
an ARP reply is unicast.
Note
21.8
A host with IP address 130.23.43.20 and physical address
B2:34:55:10:22:10 has a packet to send to another host
with IP address 130.23.43.25 and physical address
A4:6E:F4:59:83:AB. The two hosts are on the same
Ethernet network. Show the ARP request and reply
packets encapsulated in Ethernet frames.
Solution
Figure 21.5 shows the ARP request and reply packets.
Note that the ARP data field in this case is 28 bytes, and
that the individual addresses do not fit in the 4-byte
boundary. That is why we do not show the regular 4-byte
boundaries for these addresses.
Example 21.1
21.9
Figure 21.5 Example 21.1, an ARP request and reply
21.10
Figure 21.6 Proxy ARP
21.11
Figure 21.7 BOOTP client and server on the same and different networks
21.12
DHCP provides static and dynamic
address allocation that can be
manual or automatic.
Note
21.13
21-2 ICMP21-2 ICMP
The IP protocol has no error-reporting or error-The IP protocol has no error-reporting or error-
correcting mechanism. The IP protocol also lacks acorrecting mechanism. The IP protocol also lacks a
mechanism for host and management queries. Themechanism for host and management queries. The
Internet Control Message Protocol (ICMP)Internet Control Message Protocol (ICMP) has beenhas been
designed to compensate for the above two deficiencies.designed to compensate for the above two deficiencies.
It is a companion to the IP protocol.It is a companion to the IP protocol.
Types of Messages
Message Format
Error Reporting and Query
Debugging Tools
Topics discussed in this section:Topics discussed in this section:
21.14
Figure 21.8 General format of ICMP messages
21.15
ICMP always reports error messages to
the original source.
Note
21.16
Figure 21.9 Error-reporting messages
21.17
Important points about ICMP error messages:
❏ No ICMP error message will be generated in
response to a datagram carrying an ICMP error
message.
❏ No ICMP error message will be generated for a
fragmented datagram that is not the first fragment.
❏ No ICMP error message will be generated for a
datagram having a multicast address.
❏ No ICMP error message will be generated for a
datagram having a special address such as
127.0.0.0 or 0.0.0.0.
Note
21.18
Figure 21.10 Contents of data field for the error messages
21.19
Figure 21.11 Redirection concept
21.20
Figure 21.12 Query messages
21.21
Figure 21.13 Encapsulation of ICMP query messages
21.22
Figure 21.14 shows an example of checksum calculation
for a simple echo-request message. We randomly chose
the identifier to be 1 and the sequence number to be 9.
The message is divided into 16-bit (2-byte) words. The
words are added and the sum is complemented. Now the
sender can put this value in the checksum field.
Example 21.2
21.23
Figure 21.14 Example of checksum calculation
21.24
We use the ping program to test the server fhda.edu. The
result is shown on the next slide. The ping program sends
messages with sequence numbers starting from 0. For
each probe it gives us the RTT time. The TTL (time to
live) field in the IP datagram that encapsulates an ICMP
message has been set to 62. At the beginning, ping defines
the number of data bytes as 56 and the total number of
bytes as 84. It is obvious that if we add 8 bytes of ICMP
header and 20 bytes of IP header to 56, the result is 84.
However, note that in each probe ping defines the
number of bytes as 64. This is the total number of bytes in
the ICMP packet (56 + 8).
Example 21.3
21.25
Example 21.3 (continued)
21.26
Figure 21.15 The traceroute program operation
21.27
We use the traceroute program to find the route from the
computer voyager.deanza.edu to the server fhda.edu. The
following shows the result:
Example 21.4
The unnumbered line after the command shows that the
destination is 153.18.8.1. The packet contains 38 bytes: 20
bytes of IP header, 8 bytes of UDP header, and 10 bytes of
application data. The application data are used by
traceroute to keep track of the packets.
21.28
The first line shows the first router visited. The router is
named Dcore.fhda.edu with IP address 153.18.31.254.
The first round-trip time was 0.995 ms, the second was
0.899 ms, and the third was 0.878 ms. The second line
shows the second router visited. The router is named
Dbackup.fhda.edu with IP address 153.18.251.4. The
three round-trip times are also shown. The third line
shows the destination host. We know that this is the
destination host because there are no more lines. The
destination host is the server fhda.edu, but it is named
tiptoe.fhda.edu with the IP address 153.18.8.1. The three
round-trip times are also shown.
Example 21.4 (continued)
21.29
In this example, we trace a longer route, the route to
xerox.com (see next slide). Here there are 17 hops
between source and destination. Note that some round-
trip times look unusual. It could be that a router was too
busy to process the packet immediately.
Example 21.5
21.30
Example 21.5 (continued)
21.31
21-3 IGMP21-3 IGMP
The IP protocol can be involved in two types ofThe IP protocol can be involved in two types of
communication: unicasting and multicasting. Thecommunication: unicasting and multicasting. The
Internet Group Management Protocol (IGMP) is oneInternet Group Management Protocol (IGMP) is one
of the necessary, but not sufficient, protocols that isof the necessary, but not sufficient, protocols that is
involved in multicasting. IGMP is a companion to theinvolved in multicasting. IGMP is a companion to the
IP protocol.IP protocol.
Group Management
IGMP Messages and IGMP Operation
Encapsulation
Netstat Utility
Topics discussed in this section:Topics discussed in this section:
21.32
Figure 21.16 IGMP message types
21.33
Figure 21.17 IGMP message format
21.34
Table 21.1 IGMP type field
21.35
Figure 21.18 IGMP operation
21.36
In IGMP, a membership report is sent
twice, one after the other.
Note
21.37
The general query message does not
define a particular group.
Note
21.38
Imagine there are three hosts in a network, as shown in
Figure 21.19. A query message was received at time 0; the
random delay time (in tenths of seconds) for each group
is shown next to the group address. Show the sequence of
report messages.
Example 21.6
Solution
The events occur in this sequence:
a. Time 12: The timer for 228.42.0.0 in host A expires,
and a membership report is sent, which is received by
the router and every host including host B which
cancels its timer for 228.42.0.0.
21.39
Example 21.6 (continued)
b. Time 30: The timer for 225.14.0.0 in host A expires, and
a membership report is sent which is received by the
router and every host including host C which cancels its
timer for 225.14.0.0.
c. Time 50: The timer for 238.71.0.0 in host B expires,
and a membership report is sent, which is received by
the router and every host.
d. Time 70: The timer for 230.43.0.0 in host C expires,
and a membership report is sent, which is received by
the router and every host including host A which
cancels its timer for 230.43.0.0.
21.40
Figure 21.19 Example 21.6
21.41
Figure 21.20 Encapsulation of IGMP packet
21.42
The IP packet that carries an IGMP
packet has a value of 1 in its TTL field.
Note
21.43
Table 21.2 Destination IP addresses
21.44
Figure 21.21 Mapping class D to Ethernet physical address
21.45
An Ethernet multicast physical address
is in the range
01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF.
Note
21.46
Change the multicast IP address 230.43.14.7 to an
Ethernet multicast physical address.
Solution
We can do this in two steps:
a. We write the rightmost 23 bits of the IP address in
hexadecimal. This can be done by changing the
rightmost 3 bytes to hexadecimal and then subtracting
8 from the leftmost digit if it is greater than or equal to
8. In our example, the result is 2B:0E:07.
Example 21.7
21.47
b. We add the result of part a to the starting Ethernet
multicast address, which is 01:00:5E:00:00:00. The
result is
Example 21.7 (continued)
21.48
Change the multicast IP address 238.212.24.9 to an
Ethernet multicast address.
Solution
a. The rightmost 3 bytes in hexadecimal is D4:18:09. We
need to subtract 8 from the leftmost digit, resulting in
54:18:09.
Example 21.8
b. We add the result of part a to the Ethernet multicast
starting address. The result is
21.49
Figure 21.22 Tunneling
21.50
We use netstat (see next slide) with three options: -n, -r,
and -a. The -n option gives the numeric versions of IP
addresses, the -r option gives the routing table, and the -a
option gives all addresses (unicast and multicast). Note
that we show only the fields relative to our discussion.
“Gateway” defines the router, “Iface” defines the
interface.
Note that the multicast address is shown in color. Any
packet with a multicast address from 224.0.0.0 to
239.255.255.255 is masked and delivered to the Ethernet
interface.
Example 21.9
21.51
Example 21.9 (continued)
21.52
21-4 ICMPv621-4 ICMPv6
We discussed IPv6 in Chapter 20. Another protocolWe discussed IPv6 in Chapter 20. Another protocol
that has been modified in version 6 of the TCP/IPthat has been modified in version 6 of the TCP/IP
protocol suite is ICMP (ICMPv6). This new versionprotocol suite is ICMP (ICMPv6). This new version
follows the same strategy and purposes of version 4.follows the same strategy and purposes of version 4.
Error Reporting
Query
Topics discussed in this section:Topics discussed in this section:
21.53
Figure 21.23 Comparison of network layers in version 4 and version 6
21.54
Table 21.3 Comparison of error-reporting messages in ICMPv4 and ICMPv6
21.55
Table 21.4 Comparison of query messages in ICMPv4 and ICMPv6

Mais conteúdo relacionado

Mais procurados

Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Wayne Jones Jnr
 

Mais procurados (20)

23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
Ch19
Ch19Ch19
Ch19
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Ch13
Ch13Ch13
Ch13
 
Ch08
Ch08Ch08
Ch08
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Ch 19
Ch 19Ch 19
Ch 19
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch14
Ch14Ch14
Ch14
 
Ch18
Ch18Ch18
Ch18
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ch27
Ch27Ch27
Ch27
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 

Destaque

Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
amigurumi21
 
Frame relay
Frame relay Frame relay
Frame relay
balub4
 

Destaque (20)

Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Frame Relay & X25
Frame Relay & X25Frame Relay & X25
Frame Relay & X25
 
FDDI, X.25 y Frame Relay
FDDI, X.25 y Frame RelayFDDI, X.25 y Frame Relay
FDDI, X.25 y Frame Relay
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
Wan technology
Wan technologyWan technology
Wan technology
 
X.25
X.25X.25
X.25
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Forouzan frame relay
Forouzan frame relayForouzan frame relay
Forouzan frame relay
 
X.25
X.25X.25
X.25
 
Chapter 3 frame relay
Chapter 3   frame relayChapter 3   frame relay
Chapter 3 frame relay
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Frame relay
Frame relay Frame relay
Frame relay
 

Semelhante a 21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting

ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.pptccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
smanjunarayana
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
ZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
ZahouAmel1
 

Semelhante a 21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting (20)

mapping address.ppt
mapping address.pptmapping address.ppt
mapping address.ppt
 
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.pptccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
ccn-modummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmle 3.ppt
 
Intro-network layer-chapter-18_forouzan.ppt
Intro-network layer-chapter-18_forouzan.pptIntro-network layer-chapter-18_forouzan.ppt
Intro-network layer-chapter-18_forouzan.ppt
 
Chapter_18 Introduction to Network Layer
Chapter_18 Introduction to Network LayerChapter_18 Introduction to Network Layer
Chapter_18 Introduction to Network Layer
 
Ch22
Ch22Ch22
Ch22
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
Ch22
Ch22Ch22
Ch22
 
icmp protocol.ppt
icmp protocol.ppticmp protocol.ppt
icmp protocol.ppt
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
ipv4
ipv4ipv4
ipv4
 
IGMP.ppt
IGMP.pptIGMP.ppt
IGMP.ppt
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Simulation of a Wireless Sub Network using QualNET
Simulation of a Wireless Sub Network using QualNETSimulation of a Wireless Sub Network using QualNET
Simulation of a Wireless Sub Network using QualNET
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
Lecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfLecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdf
 

Mais de Ahmar Hashmi

Mais de Ahmar Hashmi (19)

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
25 DNS
25 DNS25 DNS
25 DNS
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
 
03 Data and_Signals
03 Data and_Signals03 Data and_Signals
03 Data and_Signals
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Último (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting

  • 1. 21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 21.2 21-1 ADDRESS MAPPING21-1 ADDRESS MAPPING The delivery of a packet to a host or a router requiresThe delivery of a packet to a host or a router requires two levels of addressing:two levels of addressing: logicallogical andand physicalphysical. We need. We need to be able to map a logical address to its correspondingto be able to map a logical address to its corresponding physical address and vice versa. This can be done byphysical address and vice versa. This can be done by using either static or dynamic mapping.using either static or dynamic mapping. Mapping Logical to Physical Address Mapping Physical to Logical Address Topics discussed in this section:Topics discussed in this section:
  • 6. 21.6 Figure 21.4 Four cases using ARP
  • 7. 21.7 An ARP request is broadcast; an ARP reply is unicast. Note
  • 8. 21.8 A host with IP address 130.23.43.20 and physical address B2:34:55:10:22:10 has a packet to send to another host with IP address 130.23.43.25 and physical address A4:6E:F4:59:83:AB. The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames. Solution Figure 21.5 shows the ARP request and reply packets. Note that the ARP data field in this case is 28 bytes, and that the individual addresses do not fit in the 4-byte boundary. That is why we do not show the regular 4-byte boundaries for these addresses. Example 21.1
  • 9. 21.9 Figure 21.5 Example 21.1, an ARP request and reply
  • 11. 21.11 Figure 21.7 BOOTP client and server on the same and different networks
  • 12. 21.12 DHCP provides static and dynamic address allocation that can be manual or automatic. Note
  • 13. 21.13 21-2 ICMP21-2 ICMP The IP protocol has no error-reporting or error-The IP protocol has no error-reporting or error- correcting mechanism. The IP protocol also lacks acorrecting mechanism. The IP protocol also lacks a mechanism for host and management queries. Themechanism for host and management queries. The Internet Control Message Protocol (ICMP)Internet Control Message Protocol (ICMP) has beenhas been designed to compensate for the above two deficiencies.designed to compensate for the above two deficiencies. It is a companion to the IP protocol.It is a companion to the IP protocol. Types of Messages Message Format Error Reporting and Query Debugging Tools Topics discussed in this section:Topics discussed in this section:
  • 14. 21.14 Figure 21.8 General format of ICMP messages
  • 15. 21.15 ICMP always reports error messages to the original source. Note
  • 17. 21.17 Important points about ICMP error messages: ❏ No ICMP error message will be generated in response to a datagram carrying an ICMP error message. ❏ No ICMP error message will be generated for a fragmented datagram that is not the first fragment. ❏ No ICMP error message will be generated for a datagram having a multicast address. ❏ No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. Note
  • 18. 21.18 Figure 21.10 Contents of data field for the error messages
  • 21. 21.21 Figure 21.13 Encapsulation of ICMP query messages
  • 22. 21.22 Figure 21.14 shows an example of checksum calculation for a simple echo-request message. We randomly chose the identifier to be 1 and the sequence number to be 9. The message is divided into 16-bit (2-byte) words. The words are added and the sum is complemented. Now the sender can put this value in the checksum field. Example 21.2
  • 23. 21.23 Figure 21.14 Example of checksum calculation
  • 24. 21.24 We use the ping program to test the server fhda.edu. The result is shown on the next slide. The ping program sends messages with sequence numbers starting from 0. For each probe it gives us the RTT time. The TTL (time to live) field in the IP datagram that encapsulates an ICMP message has been set to 62. At the beginning, ping defines the number of data bytes as 56 and the total number of bytes as 84. It is obvious that if we add 8 bytes of ICMP header and 20 bytes of IP header to 56, the result is 84. However, note that in each probe ping defines the number of bytes as 64. This is the total number of bytes in the ICMP packet (56 + 8). Example 21.3
  • 26. 21.26 Figure 21.15 The traceroute program operation
  • 27. 21.27 We use the traceroute program to find the route from the computer voyager.deanza.edu to the server fhda.edu. The following shows the result: Example 21.4 The unnumbered line after the command shows that the destination is 153.18.8.1. The packet contains 38 bytes: 20 bytes of IP header, 8 bytes of UDP header, and 10 bytes of application data. The application data are used by traceroute to keep track of the packets.
  • 28. 21.28 The first line shows the first router visited. The router is named Dcore.fhda.edu with IP address 153.18.31.254. The first round-trip time was 0.995 ms, the second was 0.899 ms, and the third was 0.878 ms. The second line shows the second router visited. The router is named Dbackup.fhda.edu with IP address 153.18.251.4. The three round-trip times are also shown. The third line shows the destination host. We know that this is the destination host because there are no more lines. The destination host is the server fhda.edu, but it is named tiptoe.fhda.edu with the IP address 153.18.8.1. The three round-trip times are also shown. Example 21.4 (continued)
  • 29. 21.29 In this example, we trace a longer route, the route to xerox.com (see next slide). Here there are 17 hops between source and destination. Note that some round- trip times look unusual. It could be that a router was too busy to process the packet immediately. Example 21.5
  • 31. 21.31 21-3 IGMP21-3 IGMP The IP protocol can be involved in two types ofThe IP protocol can be involved in two types of communication: unicasting and multicasting. Thecommunication: unicasting and multicasting. The Internet Group Management Protocol (IGMP) is oneInternet Group Management Protocol (IGMP) is one of the necessary, but not sufficient, protocols that isof the necessary, but not sufficient, protocols that is involved in multicasting. IGMP is a companion to theinvolved in multicasting. IGMP is a companion to the IP protocol.IP protocol. Group Management IGMP Messages and IGMP Operation Encapsulation Netstat Utility Topics discussed in this section:Topics discussed in this section:
  • 32. 21.32 Figure 21.16 IGMP message types
  • 33. 21.33 Figure 21.17 IGMP message format
  • 34. 21.34 Table 21.1 IGMP type field
  • 36. 21.36 In IGMP, a membership report is sent twice, one after the other. Note
  • 37. 21.37 The general query message does not define a particular group. Note
  • 38. 21.38 Imagine there are three hosts in a network, as shown in Figure 21.19. A query message was received at time 0; the random delay time (in tenths of seconds) for each group is shown next to the group address. Show the sequence of report messages. Example 21.6 Solution The events occur in this sequence: a. Time 12: The timer for 228.42.0.0 in host A expires, and a membership report is sent, which is received by the router and every host including host B which cancels its timer for 228.42.0.0.
  • 39. 21.39 Example 21.6 (continued) b. Time 30: The timer for 225.14.0.0 in host A expires, and a membership report is sent which is received by the router and every host including host C which cancels its timer for 225.14.0.0. c. Time 50: The timer for 238.71.0.0 in host B expires, and a membership report is sent, which is received by the router and every host. d. Time 70: The timer for 230.43.0.0 in host C expires, and a membership report is sent, which is received by the router and every host including host A which cancels its timer for 230.43.0.0.
  • 42. 21.42 The IP packet that carries an IGMP packet has a value of 1 in its TTL field. Note
  • 44. 21.44 Figure 21.21 Mapping class D to Ethernet physical address
  • 45. 21.45 An Ethernet multicast physical address is in the range 01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF. Note
  • 46. 21.46 Change the multicast IP address 230.43.14.7 to an Ethernet multicast physical address. Solution We can do this in two steps: a. We write the rightmost 23 bits of the IP address in hexadecimal. This can be done by changing the rightmost 3 bytes to hexadecimal and then subtracting 8 from the leftmost digit if it is greater than or equal to 8. In our example, the result is 2B:0E:07. Example 21.7
  • 47. 21.47 b. We add the result of part a to the starting Ethernet multicast address, which is 01:00:5E:00:00:00. The result is Example 21.7 (continued)
  • 48. 21.48 Change the multicast IP address 238.212.24.9 to an Ethernet multicast address. Solution a. The rightmost 3 bytes in hexadecimal is D4:18:09. We need to subtract 8 from the leftmost digit, resulting in 54:18:09. Example 21.8 b. We add the result of part a to the Ethernet multicast starting address. The result is
  • 50. 21.50 We use netstat (see next slide) with three options: -n, -r, and -a. The -n option gives the numeric versions of IP addresses, the -r option gives the routing table, and the -a option gives all addresses (unicast and multicast). Note that we show only the fields relative to our discussion. “Gateway” defines the router, “Iface” defines the interface. Note that the multicast address is shown in color. Any packet with a multicast address from 224.0.0.0 to 239.255.255.255 is masked and delivered to the Ethernet interface. Example 21.9
  • 52. 21.52 21-4 ICMPv621-4 ICMPv6 We discussed IPv6 in Chapter 20. Another protocolWe discussed IPv6 in Chapter 20. Another protocol that has been modified in version 6 of the TCP/IPthat has been modified in version 6 of the TCP/IP protocol suite is ICMP (ICMPv6). This new versionprotocol suite is ICMP (ICMPv6). This new version follows the same strategy and purposes of version 4.follows the same strategy and purposes of version 4. Error Reporting Query Topics discussed in this section:Topics discussed in this section:
  • 53. 21.53 Figure 21.23 Comparison of network layers in version 4 and version 6
  • 54. 21.54 Table 21.3 Comparison of error-reporting messages in ICMPv4 and ICMPv6
  • 55. 21.55 Table 21.4 Comparison of query messages in ICMPv4 and ICMPv6