0% found this document useful (0 votes)
87 views12 pages

UNIT III Basic Internetworking (IP, CIDR, ARP, RARP, DHCP, ICMP)

The document provides an overview of computer networking concepts, focusing on the Internet, IP protocols, CIDR, ARP, RARP, DHCP, ICMP, and BGP. It explains how these protocols work together for data transmission, error reporting, and routing between networks. Additionally, it highlights real-world applications and differences between ICMP and BGP in network management.

Uploaded by

umairknp2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views12 pages

UNIT III Basic Internetworking (IP, CIDR, ARP, RARP, DHCP, ICMP)

The document provides an overview of computer networking concepts, focusing on the Internet, IP protocols, CIDR, ARP, RARP, DHCP, ICMP, and BGP. It explains how these protocols work together for data transmission, error reporting, and routing between networks. Additionally, it highlights real-world applications and differences between ICMP and BGP in network management.

Uploaded by

umairknp2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Computer Network

Basic Internet Working


What is Internet ?
Ans : The Internet is a global network of computers
that are connected together to share information and
resources.

How the Internet Works

1. IP
Full Form: Internet Protocol
Purpose:
IP is the main protocol used for sending data across
networks. It assigns addresses to devices and makes sure
packets of data find the right destination.
1
Computer Network

Types:
IPv4 (Internet Protocol version 4)
• 32-bit address
• Format: 192.168.0.1
• Around 4.3 billion addresses
IPv6 (Internet Protocol version 6)
• 128-bit address
• Format: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
• Almost unlimited addresses (3.4×10³⁸)
Structure of IPv4 Address:
• Divided into 4 octets: 192.168.1.1
• Each number is 8 bits → Total = 32 bits
• Divided into Network ID and Host ID
Routing Using IP:
1. Each packet contains source IP and destination IP.
2. Routers read destination IP to decide where to forward
the packet.
3. Packet hops through routers until it reaches the
destination.

2
Computer Network

Static vs Dynamic IP:


• Static IP: Manually assigned, never changes (e.g.,
server IP)
• Dynamic IP: Automatically assigned by DHCP
(Dynamic Host Configuration Protocol), can change
Example:
Think of IP address like a home address on a parcel.
Without the right address, your parcel won’t be delivered.

2. CIDR (Classless Inter-Domain


Routing)
Purpose:
CIDR replaced old "classful" IP addressing to allow flexible
allocation of IP addresses and reduce wastage.
CIDR Notation:
• Format: 192.168.1.0/24
◦ 192.168.1.0 → Network address
◦ /24 → Number of bits for the network address
Comparison with Classful Addressing:
Feature Classful CIDR

Fixed block sizes Yes (Class A, B, C) No (custom-sized blocks)

Wastage of IPs High Low

3
Computer Network

Subnetting with CIDR:


• Allows dividing a large network into smaller sub-
networks.
• Example: 192.168.0.0/16 can be split into
192.168.1.0/24, 192.168.2.0/24, etc.
Example:
CIDR is like using custom-sized plots for buildings instead
of fixed large plots, saving space.

3. ARP (Address Resolution Protocol)


Purpose:
Finds the MAC address of a device given its IP address.
How It Works:
1. Device A wants to send data to IP 192.168.1.5
2. A sends a broadcast ARP request: "Who has
192.168.1.5?"
3. Device with IP 192.168.1.5 replies with its MAC
address
4. A stores it in its ARP cache and sends the data
ARP Cache:
Temporary storage of IP-MAC mappings to speed up
communication

4
Computer Network

ARP Spoofing:
A hacker tricks devices by sending fake ARP replies to
redirect data → Common in Man-in-the-Middle attacks.
Example:
Asking your neighbor, “What’s the house number of Rohan?”
(You know his name/IP but need his exact house/MAC
address)

4. RARP (Reverse Address Resolution


Protocol)
Purpose:
Finds the IP address of a device when only its MAC
address is known.
How It Works:
• A device without an IP sends a RARP request to a RARP
server
• Server replies with the IP assigned to that MAC
Difference from ARP:
• ARP: IP → MAC
• RARP: MAC → IP

5
Computer Network

Why It's Rare Today:


• Replaced by DHCP, which is more flexible and
automatic

5. DHCP (Dynamic Host Configuration


Protocol)
Purpose:
Automatically assigns IP addresses, subnet masks, default
gateways, and DNS info to devices.
Default gateways: A default gateway is the router on your
network that your device sends data to when the destination
IP address is outside your local network.
DORA Process (4 Steps):
1. Discover – Client broadcasts request for an IP
2. Offer – DHCP server replies with an available IP
3. Request – Client requests to use the offered IP
4. Ack – Server confirms and leases the IP
DHCP Messages:
• Discover, Offer, Request, Acknowledge, NAK, Decline,
Release, Inform
DHCP Lease:
Temporary time period a client owns the IP before renewing
it
6
Computer Network

Advantages:
• Easy IP management
• No manual configuration
• Supports mobile devices
Example:
A hotel guest asking reception for a room → Reception finds
an available room, confirms, and gives it for a certain number
of days (lease time).

6. ICMP (Internet Control Message


Protocol)
Purpose:
Used for error reporting and diagnostics (not for
transferring data).
Common Use Cases:
• Ping: Sends echo request to check if a host is reachable.
• Traceroute: Tracks route packets take through routers.
Types of ICMP Messages:
• Echo Request/Reply
• Destination Unreachable
• Time Exceeded
• Redirect
7
Computer Network

ICMP Header Structure:


• Type (e.g., 0 for echo reply, 8 for echo request)
• Code
• Checksum
• Additional data (depends on type)
Example:
Like a courier guy calling to say “I couldn’t find this
address” or “The person is not home.” It helps track or fix
delivery issues (network errors).
How They Work Together
Imagine a new device connects to a network:
1. DHCP gives it an IP address.
2. It wants to send data to another device:
◦ It uses IP for routing.
◦ Uses ARP to find the destination MAC.
3. If there's a problem (e.g., unreachable host), ICMP
sends an error.
4. Network admins use CIDR to efficiently manage
IP address ranges.
5. In legacy systems, RARP helped get IPs when only
MACs were known.
8
Computer Network

**QUESTION : ( Important for exam )


Explain the ICMP and BGP protocol and its
applications in real World Scenarios ?
Answer : ICMP (Internet Control Message Protocol)
• ICMP is a support protocol used by network devices
such as routers and hosts.
• It is used to send error messages and operational
information.
• ICMP works with the IP protocol as part of the Internet
Protocol suite.
Key Functions of ICMP:
1. Error Reporting – Informs the sender when packets
cannot be delivered.
2. Network Diagnostics – Enables tools like ping and
traceroute.
3. Packet Control – Communicates issues like network
congestion or unreachable destinations.
Common ICMP Message Types:
Type Description
0 Echo Reply (used in ping)
3 Destination Unreachable
5 Redirect Message
8 Echo Request (used in ping)

9
Computer Network

11 Time Exceeded (used in traceroute)

How ICMP Works (Example: Ping):


1. A device sends an ICMP Echo Request to a target.
2. The target, if online, responds with an ICMP Echo
Reply.
3. If unreachable, an ICMP "Destination Unreachable"
message is sent back.
Real-World Applications:
• Ping: Tests whether another computer is reachable.
• Traceroute: Identifies the path packets take to reach a
destination.
• Network Troubleshooting: Helps diagnose
connectivity issues.
• Firewall Filtering: ICMP can be blocked to protect
against certain attacks.

BGP (Border Gateway Protocol)


What is BGP?
• BGP is the core routing protocol that directs traffic
between different autonomous systems (AS) on the
Internet.
10
Computer Network

• It is a path vector protocol and operates over TCP.


• BGP is classified as an inter-domain or inter-AS routing
protocol.
Key Features of BGP:
1. Inter-domain Routing – Manages routing between
large, separate networks.
2. Policy-Based Routing – Routes are chosen based on
administrator-defined policies.
3. Scalability – Can handle routing information for the
entire Internet.
How BGP Works:
1. Routers in one AS establish a BGP session with routers
in another AS.
2. They exchange route information including IP prefixes
they can reach.
3. Each router applies rules to determine the best route.
4. Routing tables are updated and used to forward data
accordingly.
BGP Route Selection Criteria (Simplified):
• Shortest AS path
• Highest local preference
• Lowest origin type
• Lowest MED (Multi Exit Discriminator)
11
Computer Network

Real-World Applications:
• Internet Backbone: BGP routes traffic across the
Internet.
• Traffic Engineering: Organizations control outbound
and inbound traffic paths.
• Load Balancing: Distributes network traffic across
multiple routes or ISPs.
• Cloud Routing: Cloud providers like AWS or Google
Cloud use BGP to connect users to the nearest or most
efficient data center.
• Security Monitoring: Misconfigured or malicious BGP
updates (BGP hijacks) can lead to traffic rerouting or
blackholing.
Comparison: ICMP vs BGP

Feature ICMP BGP

OSI Layer Network Layer (Control) Application Layer (Routing)

Diagnostics and error Routing between autonomous


Purpose
messages systems

Main Use
Ping, Traceroute Internet routing
Case
Protocol
Support Protocol Path Vector Routing Protocol
Type

Works With IP Protocol Routers and AS networks

12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy