Subscribe by Email


Showing posts with label Routing. Show all posts
Showing posts with label Routing. Show all posts

Friday, September 20, 2013

Differentiate between transparent and nontransparent fragmentation?

A number of problems are encountered because of the size of the data packets. There is no ability in the data link layer by means of which it could handle these problems and so the bridges also don’t work here. 
The Ethernet also experiences a number of problems because of the following:
Ø  Different way in which the maximum packet size is defined.
Ø  Maximum packet size that can be handled by a router.
Ø  The maximum length slot that are used for transmission
Ø  Errors due to the packet length
Ø  Standards

The data packets can be fragmented in two ways namely:
  1. Transparent and
  2. Non – transparent
Both these ways can be followed based on a network by network basis. We can also say that no such end – to – end agreement exists based up on which it can be decided which process is to be used.

Transparent Fragmentation: 
- This type of fragmentation is followed when a packet is split in to smaller fragments by a router.
- These fragments are sent to the next router which does just the opposite i.e., it reassembles the fragments and combine them to form original packet. 
- Here, the next network does not come to know whether any fragmentation has taken place. 
- Transparency is maintained between the small packet networks when compared to the other subsequent networks.
- For example, transparent fragmentation is used by the ATM networks by means of some special hardware. 
- There are some issues with this type of fragmentation. 
- It puts some burden on the performance of the network since all the fragments have to be transmitted through the same gateway. 
- Also, sometimes the repeated fragmentation and reassembling has to be done for small packet network in series. 
- Whenever an over-sized packet reaches a router, it is broken up in to small fragments. 
- These fragments are transported to the next exit router. 
- The fragments are assembled by this exit router which then forwards them to the next router.
- Awareness regarding this fragmentation is not maintained for the subsequent networks. 
- For a single packet fragmentation is done many times before the destination is finally reached. 
- This of course consumes a lot of time because the repeated fragmentation and assembling has to be carried out. 
- Sometimes, it also presents the reason of corrupting the packet’s integrity.

Non-Transparent Fragmentation: 
- In this type, the packet is split in to fragments by one router. 
- But the difference is that these fragments are not reassembled until the fragments reach their destination. 
- They remain split till then. 
- Since in this type of fragmentation the fragments are assembled only at the destination host, the fragments can be routed independent of each other. 
- This type of fragmentation also experiences some problems such as header has to be carried by each of the fragments till they reach their destination. 
Numbering has to be done for all the fragments so that no problem is experienced in reconstructing the data stream.


Whichever type of fragmentation we use, one thing has to be made sure which is that later we should be able to form the original packets using the fragments. This insists on having some type of labeling for the fragments. 

Segmentation is another name for the fragmentation. A packet is injected in to the data link layer by the IP layer but it is not responsible for reliable transmission of the packets. Some maximum value on the size of the packets is imposed by each layer for their reasons. For a large packet that travels through the network for which the MTU is small, fragmentation is very much needed. 


Wednesday, September 18, 2013

What are the advantages and disadvantages of datagram approach?

- Today’s packet switching networks make use of a basic transfer unit commonly known as the datagram. 
- In such packet switched networks, the order of the data packets arrival, time of arrival and delivery comes with no guarantee. 
- The first packet switching network to use the datagrams was CYCLADES. 
Datagrams are known by different names at different levels of the OSI model. 
- For example, at layer 1 we call it Chip, at layer 2 it is called Frame or cell, data packet at layer 3 and data segment at layer 4. 
- The major characteristic of a datagram is that it is independent i.e., it does not rely on any other thing for the information required for exchange.
- The duration of a connection between any two points is not fixed such as in telephone conversations. 
- Virtual circuits are just the opposite of the datagrams. 
- Thus, a datagram can be called as a self containing entity. 
- It consists of information sufficient for routing it from the source to the destination without depending up on the exchanges made earlier. 
- Often, a comparison is drawn between the mail delivery service and the datagram service. 
- The user’s work is to just provide the address of the destination. 
- But he/she is not guaranteed the delivery of the datagram and if the datagram is successfully delivered, no confirmation is sent to the user. 
- The data gram are routed to some destination without help of a predetermined path. 
- The order in which the data has to be sent or received is given no consideration. 
- It is because of this that the datagrams belonging to a single group might travel over different routes before they reach their common destination. 

Advantages of Datagram Approach
  1. Datagrams can contain the full destination address rather than using some number.
  2. There is no set up phase required for the datagram circuits. This means that no resources are consumed.
  3. If it happens during a transmission that one router goes down, the datagrams that will suffer will include only those routers which would have been queued up in that specific router. The other datagrams will not suffer.
  4. If any fault or loss occurs on a communication line, the datagrams circuits are capable of compensating for it.
  5. Datagrams play an important role in the balancing of the traffic in the subnet. This is so because halfway the router can be changed.
Disadvantages of Datagram Approach

  1. Since the datagrams consist of the full destination address, they generate more overhead and thus lead to wastage of the bandwidth. This in turn makes using datagram approach quite costly.
  2. A complicated procedure has to be followed for datagram circuits for determining the destination of the packet.
  3. In a subnet using the datagram approach, it is very difficult to keep congestion problems at bay.
  4. The any-to-any communication is one of the key disadvantages of the datagram subnets. This means that if a system can communicate with any device, any of the devices can communicate with this system. This can lead to various security issues.
  5. Datagram subnets are prone to losing or re - sequencing the data packets during the transition. This puts a great burden on the end systems for monitoring, recovering, and reordering the packets as they were originally.
  6. Datagram subnets have less capability of dealing with congestion control as well as flow control. This happens because the direction of the incoming traffic is not specified. In the virtual circuit subnets, the flow of the packets is directed only along the virtual circuits thus making it comparatively easy for controlling it.
  7. The unpredictable nature of the flow of the traffic makes it difficult to design the datagram networks


Monday, September 16, 2013

What are the differences between inter-network routing and intra-network routing?

- The individual networks when combined together form the inter-network. 
Intermediate inter networking devices are used for making connections between them. 
- All these networking elements combine to work as single large unit. 
- The creation of the internetworking has been made possible because of the packet switching technology. 
- The router is the most common and important device used for performing inter-network routing and intranetwork routing.
- Routing across various networks in the inter network is termed as internetwork routing and routing within the same network is termed intranetwork routing. 

In this article we discuss about the differences between internetwork routing and intranetwork routing. 

- Just like inter-network, intranetwork also uses IP (internet protocol) technology for computing services and sharing information. 
- But what makes it different from internetworking is that it is limited to some organization whereas internetwork extends beyond all i.e., it is not limited.
- Or we can put it in other words: Internetwork is spread across organizations and Intranetwork lies within an organization. 
- In some cases, the term intranetwork might mean only the internal website of the organization, but in other cases it might be a larger part of the IT infrastructure of the organization. 
- Sometimes, it may span over a number of LANs (local area networks). 
- The intranetwork is driven by the goal of minimizing the time, effort and cost of the individual’s desktop in order to make it more competitive, cost efficient, timely as well as productive.
- An intranetwork is capable of hosting multiple websites that are private to organizations and may even constitute an important part of the collaboration and communication between the members of the organization. 
- Intranetwork also makes use of various well known protocols such as the FTP, SMTP and HTTP. 
- The intranets are often incorporated with the technologies for lending a modern interface to the systems that host the corporate data. 
- These systems are known as the legacy systems. 
- We can see intranetwork to be a private analog of the internetwork. 
- It means the internetwork has been simply extended to an organization for its private use. 
- Extranetworks are a modified version of the intranetworks.
- Here, the website might be accessed by the non-members i.e., the suppliers, customers or some other approved third parties and so on. 
- Intranetworks are well equipped with a special protocol called the AAA protocol. 
- The 3 As stand for authentication, authorization and accounting. 
- There are a number of organizations who are concerned about the security of their intranetworks. 
- They have deployed a firewall and a network gateway for controlling the access to their services. 
The intermediate systems when connect together form the internetwork whereas they may bound together a part of the internetwork which might be an intranetwork
- The intranetwork routing involves routing between two routers which lie in the same network whereas in internetwork routing, routing is done between routers which reside across different networks. 
- Intranetwork routing is quite easy when compared to the internetwork routing. 
- Protocols used in both the types of routing are different.
- Interior gateway protocol is responsible for routing in the intranetworks whereas the exterior gateway protocol takes the responsibility of routing across the internetwork. 
- Most common example of interior gateway protocol is the OSPF or the open shortest path first protocol. 
- And most common example of exterior gateway protocol is the border gateway protocol or BGP. 
- Also, the routing graphs for both the types are different. 
- In the intranetwork’s graph, all the routers are simply linked to one another in the same network. 
- There is less mess.
- On the other hand, the inter network’s graph is quite tedious. 
- This is so because routers of different networks have to be inter-linked with one another. 


Sunday, September 15, 2013

What is inter-network routing?

In this article we shall discuss about inter-network routing. Before moving to that there are certain terms with which you should be familiar:
Ø  End systems: The ISO (the international standards of organization) defines the end systems as the network elements that do not have the ability of forwarding the packets across the networks. Sometimes the term host is used to refer to the end systems.
Ø  Intermediate systems: These are the network elements that have the ability of forwarding the packets across the network. Most common examples are routers, switches, bridges and so on.
Ø  Network: It can be defined as a part of the inter-network infrastructure encompassing various elements including hubs, repeaters, bridges and so on. The networks are bounded by the intermediate systems.
Ø Router: This is one of the intermediate systems that is used for connecting various networks with each other. It might support one protocol (router) or many protocols (multi-protocol router). Its hardware part is optimized especially for performing routing. The software part is responsible for carrying out the routing and takes care of the routing tables.
Apart from these devices, there are 3 types of addresses involved in inter-network routing:
Ø  The inter-network address: The host address and the network address are combined together to form this address. This is used for unique identification of a host over the inter-network.
Ø The host address or host ID: This ID might be assigned by the administrator or might be simply the physical address of the host. It is used for the unique identification of the host on its network.
Ø  The network address or network ID: This is address of a network for identifying it in an inter-network.

All the data packets consist of a network layer header. This network layer header consists of the following when the packet is transmitted from one host to another:
ØThe address of the source inter-network: This address combines the address of the source host and the source network.
ØThe address of the destination inter-network: This address combines the address of the destination host and the destination network.
ØThe hop count: This usually begins at zero and is numerically incremented when the packet crosses a router. Or in the opposite case it might be assigned some maximum value which might be decremented on reaching a router. The purpose of using the hop count is to make sure that the packet does not keeps on circulating endlessly in the network.


- For inter-network routing, two things have to be known.
- Firstly, how do you reach other routers which lie in the same network and secondly, how do you reach other routers which lie in other networks? 
- The answer to the first question is easy as it is the common routing problem among two hosts residing over the same network. 
- This routing is handled by the interior gateway protocol and it is different for different networks since only local routing info is required. 
- In this case, the commonly used protocol is the open shortest path first or OSPF protocol. 
- The routing between two different networks is performed using the exterior gateway protocol. 
- This is actually the problem of inter-network routing. 
- Here, the commonly used protocol is the BGP or the border gateway protocol. 
- The graph for inter-network routing is quite different from the one that is used in the network routing. 
- This is so because the routers which lie in the same network can be thought of as being directly connected to one another for routing across inter-network. - All the networks in an inter-network function as though they are one large unit. 


Saturday, September 14, 2013

Explain Border Gateway Protocol (BGP)?

- BGP or Border gateway protocol is the set of rules that is implemented for making the routing decisions at the core of the internet. 
- It involves the use of the IP networks table or we can say prefixes which are used for designating the reach-ability of the network to the autonomous systems. 
- This protocol falls under the category of the path vector protocol or sometimes classified as a variant of the distance vector routing protocols. 
- The metrics of the IGP or the interior gateway protocol are not used by the border gateway protocol rather paths, rule sets or polices are used for making decisions for routing. 
- This is why the border gateway protocol is often called a reach-ability protocol rather than being termed as a routing protocol. 
- The BGP has ultimately replaced the EGP or the exterior gateway protocol. 
This is so because it allows the full decentralization of the routing process for making transition between the ARPANET model’s core and the decentralized system that consists of a NSFNET backbone and the regional networks associated with it. 
- The present version of the BGP that is being used is the version 4. 
- The earlier versions were discarded for being obsolete. 
- The major advantage is of the classless inter-domain routing and availability of a technique called the route aggregation for making reductions in the routing size. 
- The use of the BGP has made the whole routing system a decentralized system.
- BGP is used by most of the internet service providers for establishing a route between them. 
- This is done especially when the ISPs are multi-homed. 
- That’s why even though it is not used directly by the users; it is still one of the most important protocols in networking. 
- The BGP is used internally by a number of large private IP networks. 
- For example, it is used to combine many large open shortest path first or OSPF networks where these networks do not have the capability to scale to the size by themselves. 
- BGP is also used for multi-homing a network so as to provide a better redundancy. 
- This can be either to many ISPs or to a single ISP’s multi access points. 
Neighbors of the border gateway protocol are known as the peers. 
- They are created by manually configuring the two routers so as to establish a TCP session on the port. 
- Messages called the 19 byte keep alive messages are sent to the port periodically by the BGP speaker for maintaining the connection. 
- Among the various routing protocols, the most unique is BGP since it relies up on TCP for transporting. 
- When the protocol is implemented in the autonomous system among two peers, it is called IBGP or the internal border gateway protocol. 
- The protocol is termed as the EBGP or the external border gateway protocol when it runs between many autonomous systems.
- Border edge routers are the routers that are implemented on the boundary for exchanging information between various autonomous systems.
- BGP speakers have the capability for negotiating with the session’s option capabilities such as the multi-protocol extensions and a number of recovery modes. 
- The NLRI (network layer reach-ability information) can be prefixed by the BGP speaker if at the time of the creation itself, the multi-protocol extensions are negotiated. 
- The NLRI is advertised along with some address family prefix. 
The family consists of the following:
Ø  IPv4
Ø  IPv6
Ø  Multicast BGP
Ø  IPv4/ IPv6 virtual private networks

- These days the border gateway protocol is being commonly employed as the generalized signaling protocol whose purpose is to carry information via the routes that might not form the global internet’s part. 


Wednesday, September 11, 2013

What are multi-protocol routers?

- There are routers that have the capability to route a number of protocols at the same time. 
- These routers are popularly known as the multi-protocol routers. 
- There are situations in networking where combinations of various protocols such as the appletalk, IP, IPX etc. are used. 
- In such situations normal typical router cannot help. This is where we use the multi-protocol routers. 
- Using the multi-protocol routers, information can be shared between the networks. 
- The multi-protocol router maintains an individual routing table for each of the protocols.
- The multi-protocol routers have to be used carefully since they cause an increase in the number of routing tables that are present on the network. 
- Each protocol is advertised individually by the router. 

A multiprotocol router consists of the following information:
Ø  Routing information protocol (RIP)
Ø  Boot protocol relay agent (BOOTP)
Ø  RIP for IPX
- The multi-protocol routers use this routing information protocol for performing dynamic exchange of the routing info. 
- Routers using RIP protocol can dynamically exchange information with the other routers that use the same protocol. 
- The BOOTP agent is included so that the DHCP requests can be forwarded to their respective servers residing on other subnets. 
- It is because of this, a single DHCP server can process a number of IP subnets. 
- Multi-protocol routers do not require to be manually configured.
- The networking world these days relies totally up on the internet protocol. But there are certain situations where certain tasks can be performed more efficiently by the other protocols. 
- Most of the network protocols share many similarities rather than being different. 
- Therefore, if one protocol can be routed by a protocol efficient, then it is obvious that it can route the other one also efficiently. 
- If we route the non-IP protocols in a network, this implies that the same staff that takes care of the IP monitoring is administering the non-IP routing also. 
This reduces the need for more equipment and effort. 
- There are a number of non-IP protocols available using which a LAN can work more effectively. 
- Using a number of non-IP protocols, a network can be made very flexible and easier to meet the demands of its users. 
- All these points speak in the favor of multi-protocol routing in an abstract way. 
- But the non-IP protocols to be routed must be selected with care. 

Below we mention reasons why routing non – IP protocols can be avoided:

  1. It requires additional knowledge because you cannot master everything. For individual protocol an expert is required who in case of a failure can diagnose it and fix it.
  2. It puts extra load on the routers. For every protocol, the router would have to maintain a separate routing table. This calls for a dynamic routing protocol for the router itself. For all this, more memory is required along with high processing power.
  3. It increases the complexity. Multi-protocol router even though it seems to be simple, it is quite a complicated thing in terms of both hardware and software. Any problem in the implementation of the protocol can have a negative impact up on the stability of all the protocols.
  4. Difficulty in designing: There are separate rules for routing of each protocol, assignment of the addresses and so on. There are possibilities that there might be conflicts between these rules which means it is very difficult to design.
  5. It decreases stability. Scaling capacity of certain protocols is not as good as of the others. Some of the protocols are not suited to work in a WAN environment. 


Saturday, September 7, 2013

Explain the concept of inter-networking?

- The practice in which one computer network is connected with the other networks is called inter-networking. 
- The networks are connected with the help of gateways. 
- These gateways are used since they offer a common method for routing the data packets across the networks.
- The resulting system in which a number of networks are connected is called the inter-network or more commonly as the internet. 
- The terms “inter” and “networking” combine together to form the term “internet working”.  
- Internet is the best and the most popular example of the inter networking. 
Internet has formed as a result of many networks connected with the help of numerous technologies. 
- Many types of hardware technologies underlie the internet. 
- The internet protocol suite (IP suite) is the inter networking protocol standard responsible for unifying the diverse networks. 
- This protocol is more commonly known as the TCP/ IP. 
- Two computer local area networks (LANs) connected to one another by means of a router form the smallest internet but not the inter network. 
Inter networking is not formed by simply connecting two LANs together via a hub or a switch. 
- This is called expansion of the original local area network. 
Inter networking was started as a means for connecting the disparate networking technologies. 
- Eventually, it gained widespread popularity because of the development needs of connecting many local area networks together through some kind of WAN (wide area network). 
- “Catenet” was the original term that was used for the inter network. 
Inter network includes many types of other networks such as the PAN or personal area network. 
- Gateways were the network elements that were originally used for connecting various networks in predecessor of the internet called the ARPANET. 
Today, these connecting devices are more commonly known as the internet routers. 
- There is a type of interconnection between the various networks at the link layer of the networking model. 
- This layer is particularly known as the hardware centric layer and it lies below the TCP/ IP logical interfaces level. 

Two devices are mainly used in establishing this interconnection:
Ø  Network switches and
Ø  Network bridges
- Even now this cannot be called as inter networking rather, the system is just a single and large sub-network. 
- Further, for traversing these devices no inter networking protocol is required. 
However, it is possible to convert a single network in to an inter network. 
- This can be done by making various segments out of the network and also making logical divisions of the segment traffic using the routers. 
- The internet protocol suite has been particularly designed for providing a packet service. 
- This packet service offered by the IPS is quite unreliable. 
- The elements that maintain a network state and are intermediate in the network are avoided by the architecture. 
- The focus of the architecture is more on the end points of the active communication session.
- For a reliable transfer of the data, a proper transport layer protocol must be used by the applications. 
- One such protocol is the TCP (transmission control protocol) and it is capable of providing a reliable stream for communication. 
- Sometimes a simpler protocol such as the UDP (user datagram protocol) might be used by the applications. 
- The applications using this protocol carry out only those tasks for which reliable data delivery is not required or for which realtime is required. 

Examples of such tasks include voice chat or watching a video online etc. Inter networking uses two architectural models namely:

  1. OSI or the open system interconnection model: This model comes with 7 layer architecture that covers the hardware and the software interface.
  2. TCP/ IP model: The architecture of this model is somewhat loosely defined when compared with the OSI model. 


Saturday, August 24, 2013

Explain multicast routing?

- Multicast routing is also known as the IP multicast. 
- For sending the IP (internet protocol) data-grams to a group of receivers who are interested in receiving the data-grams, multicast routing is used.
- The data-grams are sent to all the receivers in just one transmission. 
Multicast routing has got a special use in the applications that require media streaming on private networks as well as internet. 
- Multicast routing is IP specific version. 
- A more general version is the multicast networking.
- Here, the multicast address blocks are especially reserved in IPv6 and IPv4. 
Broadcast addressing has been replaced by multicast addressing in IPv6. 
Broadcast addressing was used in IPv4. 
- RFC 1112 describes the multicast routing and in 1986 it was standardized. 

This technique is used for the following types of real – time communication over the IP infrastructure of the network:
Ø  Many – to – many
Ø  One – to – many

- It scales up to receiving population that is large enough and it does not require either knowledge regarding the receivers and the identity of the receivers. 
- Network infrastructure is used efficiently by the multicast efficiently and requires source sending packet to a large number of receivers only once. 
- The responsibility of the replication of the packet is of the nodes which are nothing but the routers and the network switches.
- The packet has to be replicated till it reaches the multiple receivers. 
- Also, it is important that the message is sent only once over the link.   
- UDP or the user data gram protocol is the mostly used protocol of low level. 
Even though if this protocol does not guarantees reliability i.e., the packets might get delivered or get lost. 
- There are other multicast protocols available that are reliable such as the PGM or the pragmatic general multicast. 

It has been developed for adding the following two things a top the IP multicast:
Ø  Retransmission and
Ø  Loss detection
The following 3 things are key elements of an IP multicast:
  1. Receiver driven tree creation
  2. Multicast distribution tree
  3. IP multicast group address
- The receivers and the sources use the last for sending as well as receiving the multicast messages. 
- The group address serves as the destination address of the data packets for the sources whereas it is used for informing the network whether or not the receivers want those packets.
- Receivers need a protocol for joining a group. 
- One most commonly used protocol for this purpose is the IGMP i.e., the internet group management protocol. 
- The multicast distribution trees are set up using this protocol. 
- Once a group has been joined by the receiver, the PIM (protocol independent multicast) protocol is used for constructing a multicast distribution tree for this group. 
- The multicast distribution trees set up with the help of this protocol are used for sending the multicast packets to the members of the multicast group. 

PIM can be implemented in any of the following variations:
  1. SM or sparse mode
  2. DM or dense mode
  3. SSM or source specified mode
  4. SDM or sparse – dense mode or bidirectional mode (bidir)

- Since 2006, the sparse mode is the most commonly used mode. 
- The last two variations are more scalable and simpler variations of PIM and are also popular. 
- An active source is not required for carrying out an IP multicast operation and knowing about the group’s receivers. 
- The receiver drives the construction of the IP multicast tree. 
- The network nodes which lie closer to receiver are responsible for initiating this construction.
- This multicast then scales to a receiver population that is large enough. 
- It is important for a multicast router to know which all multicast trees can be reached in the network. 
- Rather, it only requires knowledge of its downstream receivers. 
- This is how the multicast – addressed services can be scaled up. 


Facebook activity