0% found this document useful (0 votes)
15 views40 pages

CN - 1

Computer Networking lecture notes chapter 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views40 pages

CN - 1

Computer Networking lecture notes chapter 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

CN-II

UNIT –I
MULTISERVICE SERVERS

•A Multiservice server can


handle multiple clients or
services simultaneously.

•A database server might receive


requests from clients, but also
from other database servers
which want to keep information
in sync.
MULTISERVICE SERVERS
IMPLEMENTATION OF MULTISERVICE
OR SUPER SERVERS
Multiservice servers listen to several master
sockets.
There will be an individual thread (or process)
listening on each master socket, you can use
poll or select in the master thread.
When launching different programs that
handle the actual communication, you just do
fork immediately followed by execve() in the
child process.
execve() transform the calling process into a
new process.
When the multiple application protocols are
handled by one program, it makes more sense
to use threads.
SUPER SERVER CONFIGURATION
• Static configuration:
The configuration information is written in a configuration
file, read by the server each time when it starts.
If an administrator wants to add (or delete) a service, it will
change this file, stop the server, and launch it again.

• Dynamic configuration:
We have the same configuration file, but The server does
not need to be stopped and restarted Instead, the
administrator changes this file, and tells the server that the
file has been modified by sending a signal.
Once the server receives the signal, it re-reads the
configuration file and applies the changes.
UNIT-II

Next Generation IPv6


and ICMPv6
Types of IPv6 address
IPv6 address space allocation
IPv4 compatible address in IPv6

IPv4-compatible IPv6 addresses are IPv6 unicast addresses


that have zeros in the high-order 96 bits of the address,
and an IPv4 address in the low-order 32 bits.
Unspecified Address
• The unspecified address is 0:0:0:0:0:0:0:0 .
You can abbreviate the address with two
colons ( :: ). The unspecified address indicates
the absence of an address, and it can never be
assigned to a host.
Loop back address
• It is an internal address that routes back to
the local system. In IPv6, the loopback address
is 0:0:0:0:0:0:0:1 or ::1.
Unique local unicast block

Unique local addresses are also known as private IPv6


addresses or local IPv6 addresses.
ULA addresses can be used similarly to global unicast
addresses but are for private use and should not be routed in
the global Internet.
link local address

This block can be used as a private address in network.


This type of address has the block identifier 1111111010.
The next 54 bits are zero. The last 64 bits can be used to
define the interface for each computer.
Multicast address
• An IPv6 multicast address is an identifier for a
group of interfaces (typically on different
nodes). It is identified with a prefix of
11111111 or FF in hexadecimal notation. It
provides a way of sending packets to multiple
destinations.
Global unicast address in ipv6

This block in address space is used for unicast(one-to-one)


communication between two host in the internet. The IPv6 global
unicast address allocation uses the range of addresses that start
with binary value 001 (2000::/3). This means that leftmost 3 bits are
same for all addresses in this block (001).
Global unicast address in ipv6
• Global routing prefix:
• This is reserved block of IPv6 addresses which is a set of
addresses that only one company can use is called a global
routing prefix. Each organization that wants to connect to the
Internet, and use IPv6 global unicast addresses.
• These 48 bits are used to route the packet through the
internet to the organization site.
• First 3 bits are fixed (001), the rest of 45 bits can define upto
2^45 sites.
Global unicast address in ipv6
• Subnet Identifier:
• The next 16 bits defines a subnet in an organization. This
means that organization can have up to 2^16=6553 subnets.
• the subnet ID defines an administrative subnet of the network
and is up to 16 bits in length.
Global unicast address in ipv6

• Interface ID:
• The last 64 bits define the interface identifier. It is similar to
host id.
• An interface ID must be unique within the subnet.
• If the host is moved from one interface to another, its ip
addresses need to be changed.
IPv6 packet format
IPv6 base header format
IPv6 base header format
1)Version:
This field defines the version of the packet. In IPv6, the value of this field is
set to 6. The size of this field is 4 bits.

2)Traffic class:
• This field defines how the packet should be handled through the
intermediate devices. This field replaces the IPv4 type of service or
differentiated services field. The size of this field is 8 bits. Same as the IPv4,
the first 6 bits are defined as the DSCP(Differentiated Service Code
Point) field and the last 2 bits are defined as ECN.

• The DSCP field indicates the type or priority of the packet that the router
should follow when making the routing or forwarding decision. If a router
fails to forward a packet, it uses the ECN field of the packet to send
an Explicit Congestion Notification back to the original sender.
IPv6 base header format
3) Flow label:

• A flow is a sequence of packets that are exchanged between a


source and destination in a single session. A source can
exchange data in multiple sessions simultaneous. To identify the
sequence and session of the packet, the flow label field is used.
In addition to identifying the packet's sequence and session, this
field is also used to specify how the packet should be handled by
intermediate routers.
• The size of this field is 20 bits. For default router handling, the
value of this field is set to 0. Intermediate routers use the
packet's source address, a destination address, and flow label to
distinguish between different flows.
IPv6 base header format
4) Payload length:
• This field specifies the total length of the payload in bytes. 2
byte payload length field defines the length of IP datagram
excluding the base header.

5) Next header:
• This field indicates the type of the first extension header. It is 8
bit field and either one of the optional extension header used
by IP or the header of an encapsulated packet such as UDP or
TCP.
IPv6 base header format
IPv6 base header format
6) Hop limit:
• This field sets the lifetime of the packet. Every time a
router forwards a packet, it decrements the value of this
field by 1. If the value reaches zero, the packet is
discarded. The size of this field is 8 bits.
7) Source IP Address:
• This field specifies the IPv6 address of the sender of the
packet.
8) Destination IP Address:
• This field indicates the IPv6 address of the intended
recipient(s) of this packet.
IPv6 Extension header

The length of base header is fixed at 40 bytes. To give more


functionality to the IP datagram, the base header can be followed by
up to six extension headers.
Types of extension header
Types of extension header
1) Hop-by-Hop options header:
• This header is used when the source needs to pass information to
all routers visited by the datagram. If used, this header always
appears on the first position in the field.
• If length of datagram is more than usual 65535 bytes, router must
have information.
• There are 3 hop by hop options: Pad1, PadN and jumbo payload.
• Pad1 option is used when 1 byte is needed for alignment.
• PadN potion is used when 2 or more bytes are needed for
alignment.
• Jumbo payload option is used when for any reason a longer
payload is required. The jumbo payoad option must always start at
a multiple of 4 bytes plus2 from the beginning of the extension
headers.
Types of extension header
2) Routing header:
• The routing header is used to send the packet to the
destination through a specific route.
• This option allows the sender device to specify multiple
destination addresses in a list. The initial destination of the
packet is not the same as the final destination of the packet,
but rather the first address in the list contained in the
Routing header.
• When the destination node which address is set in the first
place of the list receives the packet, it resends the packet to
the next node which address is set in the second place of the
list. This process continues until the packet reaches its final
destination.
Types of extension header
3) Fragment header: fragmentation means breaking up of data
packet into smaller pieces in order to fit it through a network with
a smaller maximum transmission unit (MTU) than the initial packet
size.
Types of extension header

4) Destination Options Header:


• The Destination Options is used when source needs to pass
information to the destination only.
• Intermediate routers are not permitted access to this information.
Types of extension header
5) Authentication Header:
• This header validates the message sender ensure integrity of
data. The former is needed so the receiver can be sure that a
message is from genuine sender and not from an imposter.
• This header is used to calculate a cryptographic checksum on
some parts of the IPv6 base header, extension headers, and
payload.
• Cryptography is associated with the process of converting
ordinary plain text into unintelligible text and vice-versa. It is a
method of storing and transmitting data in a particular form so
that only those for whom it is intended can read and process it.
Types of extension header
6) Encapsulating Security Payload Header:
• This header indicates that the payload is encrypted. If the
payload is encrypted it also includes enough information for the
authorized destination node to decrypt it. If used, this header will
always be the last in the extension header.
• It provides confidentiality and guard against eavesdropping.
• The security parameters index field is 32 bit word that define the
types of encryption and decryption used. The other field contains
the encrypted data along with any extra parameters needed by
the algorithms.
Comparison between ipv4 and ipv6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy