SlideShare une entreprise Scribd logo
1  sur  33
Topic       :   Basics of WAN &WAN Protocols


Sub-Topic   :   Packet Transfer Mechanism using
                Router and IP address
                                                  1
In the previous classes, you have learnt about

• IP Address

• Network prefix and host number

• Internet address

• Sub-netting and no sub-netting

• Default gateways
Objectives

 On completion of this period ,you would be able to know
 about

• Packet transfer mechanism using routers and IP
  addresses




                                                       3
Computer Network
                                                             ForNet Domain: A domain covered by single
                                                             monitoring and privacy policies.




                                                                     Forensic Server: Responsible for archiving synopses,
                                                                     query processing & routing, enforcing monitoring,
                                                                     security policies, for the domain.


SynApp: equipped routers or hosts. Primary
function is to create synopses of network
traffic. May have limited query processing and
storage component as well.




                Fig .1
                                                                                                                            4
Recap



• Let us remember the functions of a router and also IP
  address details in the following slides




                                                     5
Routers

• A router is a hardware component used to
  interconnect networks


                 Router



   LAN                     WAN



                Fig .2

                                             6
Routers
• A router has a network interface card for each
  network that it is connected to


• Networks can use different technologies


• Router forwards packets between networks


• Router’s job is to transform packets from one network
  to meet the standards of the second network



                                                      7
R




    Fig .3

             8
Internetwork

• An internetwork is composed of arbitrarily many
  networks interconnected by routers




                              Router
             Fig .4


                        9EC606A .64                 9
Internetwork

Ethernet 131.108.0.0              227.240.129.2



                                             Token Ring
                                            227.240.129.0


                              227.240.129.17
           131.108.99.5
                                                            Router

                                    78.0.0.17

                                                 WAN
                                                78.0.0.0

                   Fig .5


                             9EC606A .64                             10
Routers and IP Addressing

• What about routers - connected to two networks ?


• Router has multiple IP addresses - one for each
  interface as shown in the previous slide


• IP address depends on network address


• IP address specifies an interface, or network
  attachment point, not a computer


                                                     11
TCP/IP Addresses


• Addressing in TCP/IP is specified by the Internet
  Protocol (IP)

• Each host is assigned a 32-bit number


• This 32-bit number is called the IP address or
  Internet address




                                                 12
TCP/IP Addresses

• Each IP address is unique across entire Internet


• The format of IP addresses makes routing efficient


• Each IP address is divided into a prefix and a suffix


   • Prefix identifies network to which computer is
     attached
   • Suffix identifies computer within that network

                                                          13
Packet Transfer Mechanism Using Routers
             And IP Address

• The network layer monitors the delivery of the packet
  using physical networks



• In direct delivery source and destination of packet are
  located on same physical network



• In an indirect delivery, packet moves from router to
  router until it reaches its final destination
                           9EC606A .64                 14
Packet Transfer Mechanism Using Routers
              and IP Address


• When a packet is placed in its route to its destination it is
  known as forwarding



• It requires a router or a host to have a routing table



• There are many forwarding techniques


                          9EC606A .64                        15
Forwarding Techniques


• Next hop method

• Network / host – specific method

• Default method

• The path from source to destination is a function of

  routing protocols

                       9EC606A .64                 16
Examples of
                 Routing Protocols

• Routing Information Protocol




• Open shortest path first




• Intermediate system to Intermediate system


                         9EC606A .64           17
Examples of
                  Routing Protocols

• Packets from one network protocol are wrapped in a

  packet for another protocol

• It is called tunneling done by wrapper network protocol

• The routing protocols determine best path for the packet

  to travel

• They maintain routing tables that contain information

  about networks topology
                          9EC606A .64                       18
Examples of
                 Routing Protocols

• In the internet world, IP is used to transport packets

  through the internet

• It uses the information contained in the routing tables

  with routers

• The routing tables may contain several possible routes

• The routing algorithm calculates the least-cost path from

  source to destination
                          9EC606A .64                      19
Examples of
                   Routing Protocols

• Routers also maintain routing tables that contain
  destination address of a node or network
• It also has network interface associated with a particular
  router address
• A special type of route is called static route (fixed) that
  can be entered manually or through software in routing
  table
• The static route cannot be changed dynamically


                          9EC606A .64                      20
Examples of
                Routing Protocols


• Two general routing algorithms are used for computing

  metric   information.    i.e.    hops,   propagation   delay,

  bandwidth, time, channel utilization error rates etc




                          9EC606A .64                       21
Example of Routing Table

• Routing Table generated on a Unix system with IP
  address 187.96.25.2 [Local-Host Routing]
   Destination      Gateway        Flags   Interface
    Local host     Local host        UH     le O
  215.103.16.22   187.96.25.13      UGHD    le O
        7
  215.103.16.14   187.96.25.35      UGHD    le 1
        1
      Default     187.96.25.1       UG

   187.96.25.0    187.96.25.2        U      leO
                      9EC606A .64                  22
Example Routing Table                Contd…

    where

•    U = route is up & operational

•    G = packet must pass through at least one router

•    H = route to a specific host and not a network

•    D = route was created dynamically


                       9EC606A .64                      23
Example Routing Table                    Contd….


• The table’s first entry illustrated local host-routing

• It indicates that any packets meant for local network

  87.96.25.0

• It will be forwarded through gateway 187.96.25.2 (IP

  address of the host). Local host acts as router


                           9EC606A .64                     24
Example Routing Table                     Contd….
• The second entry in the table indicates that the packets

  are forwarded to another router

• The     Packets      whose         destination    address   is

  215.103.16.227       are      forwarded      to   the   router

  (187.96.25.13) through interface leO

• This router will have the information to where this packet

  is to be delivered
                             9EC606A .64                      25
Example Routing Table                 Contd….

• The third entry indicates the packets with destination

  address 215.103.16.141 are to forwarded to gateway




• The gateway whose address 187.96.25.35 accessible

  through le 1 interface



                           9EC606A .64                 26
Example Routing Table                 Contd….
• The Fourth entry entry of table is a default route




• When router receives a packet with unknown destination

  address




• The router forwards packet to default router

                        9EC606A .64                    27
Example Routing Table                Contd….

• If host system receives a packet with destination address

  212.133.65.3




• It forwards to router with destination address 187.96.25.1

  (since there is no entry in host’s routing table for

  212.133.65.3

                                                         28
Example Routing Table                Contd….

• Routers   exchange    routing   table   information   with

  neighbor routers periodically depending upon routing

  protocol used

• They do so in order to update the routing tables as one

  router may be connected to more than one router




                                                          29
Summary

In this class, you have learnt about

    • Packet transfer mechanism using routers


    • And IP addresses with routing options used




                                                   30
Quiz

1)   What is the length of the IP address

     a) 16-bit

     b) 32-bit

     c) 8-bit

     d) 64-bit


                                            31
Quiz

2)   A routing table specifies about

     a) various routes that can be used

     b) identifies the address

     c) it’s a table of IP addresses

     d) none of the above`




                                          32
Frequently Asked Questions

1)   Explain how packet transfer mechanism is done using

     routers & IP addresses

2)   What are the various forwarding techniques used ?

3)   Discuss with an example importance of a routing table

     along with its options



                                                         33

Contenu connexe

Tendances

line following robot
line following robotline following robot
line following robot
Rehnaz Razvi
 
Rail gate controller ppt
Rail gate controller pptRail gate controller ppt
Rail gate controller ppt
Sajal Das
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 
Fractal robots.ppt
Fractal robots.pptFractal robots.ppt
Fractal robots.ppt
chinkyshruz
 

Tendances (20)

finger door lock.ppt g.m.r.pptx
finger door lock.ppt g.m.r.pptxfinger door lock.ppt g.m.r.pptx
finger door lock.ppt g.m.r.pptx
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
IOT VIRTUAL DOCTOR ROBOT .pptx
IOT VIRTUAL DOCTOR ROBOT .pptxIOT VIRTUAL DOCTOR ROBOT .pptx
IOT VIRTUAL DOCTOR ROBOT .pptx
 
SMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOTSMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOT
 
HAND GESTURE CONTROLLED WHEEL CHAIR
HAND GESTURE CONTROLLED WHEEL CHAIRHAND GESTURE CONTROLLED WHEEL CHAIR
HAND GESTURE CONTROLLED WHEEL CHAIR
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
 
Traffic Prediction for Intelligent Transportation System using Machine Learning
Traffic Prediction for Intelligent Transportation System using Machine LearningTraffic Prediction for Intelligent Transportation System using Machine Learning
Traffic Prediction for Intelligent Transportation System using Machine Learning
 
line following robot
line following robotline following robot
line following robot
 
OBSTACLE AVOIDING CAR
OBSTACLE AVOIDING CAROBSTACLE AVOIDING CAR
OBSTACLE AVOIDING CAR
 
1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT
 
seminar report on night vision technology
seminar report on night vision technologyseminar report on night vision technology
seminar report on night vision technology
 
Rail gate controller ppt
Rail gate controller pptRail gate controller ppt
Rail gate controller ppt
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Speed checker on highway using 8051
Speed checker on highway using 8051Speed checker on highway using 8051
Speed checker on highway using 8051
 
Wireless charging abstract
Wireless charging abstractWireless charging abstract
Wireless charging abstract
 
Fractal robots.ppt
Fractal robots.pptFractal robots.ppt
Fractal robots.ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 

En vedette (10)

How packet data travel over network
How packet data travel over networkHow packet data travel over network
How packet data travel over network
 
Routing
RoutingRouting
Routing
 
How packet data travel from each network
How packet data travel from each networkHow packet data travel from each network
How packet data travel from each network
 
Roteamento de pacotes
Roteamento de pacotesRoteamento de pacotes
Roteamento de pacotes
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Aggression
AggressionAggression
Aggression
 
Teaching TCP/IP by Analogy
Teaching TCP/IP by AnalogyTeaching TCP/IP by Analogy
Teaching TCP/IP by Analogy
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Ipv4
Ipv4Ipv4
Ipv4
 

Similaire à Packet transfer mechanism using routers and IP addresses

Networking Chapter 8
Networking Chapter 8Networking Chapter 8
Networking Chapter 8
mlrbrown
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
Ashish Gupta
 

Similaire à Packet transfer mechanism using routers and IP addresses (20)

Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
 
B21DA0201_03.ppt
B21DA0201_03.pptB21DA0201_03.ppt
B21DA0201_03.ppt
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
Tcil_Concept of Routing_n_protocols.pptx
Tcil_Concept of Routing_n_protocols.pptxTcil_Concept of Routing_n_protocols.pptx
Tcil_Concept of Routing_n_protocols.pptx
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
Chapter07
Chapter07Chapter07
Chapter07
 
Networking Chapter 8
Networking Chapter 8Networking Chapter 8
Networking Chapter 8
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
 
Router&routing
Router&routingRouter&routing
Router&routing
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
6978047_2.ppt
6978047_2.ppt6978047_2.ppt
6978047_2.ppt
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
Routing
RoutingRouting
Routing
 
UNIT 2.pdf
UNIT 2.pdfUNIT 2.pdf
UNIT 2.pdf
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 

Plus de myrajendra (20)

Fundamentals
FundamentalsFundamentals
Fundamentals
 
Data type
Data typeData type
Data type
 
Hibernate example1
Hibernate example1Hibernate example1
Hibernate example1
 
Jdbc workflow
Jdbc workflowJdbc workflow
Jdbc workflow
 
2 jdbc drivers
2 jdbc drivers2 jdbc drivers
2 jdbc drivers
 
3 jdbc api
3 jdbc api3 jdbc api
3 jdbc api
 
4 jdbc step1
4 jdbc step14 jdbc step1
4 jdbc step1
 
Dao example
Dao exampleDao example
Dao example
 
Sessionex1
Sessionex1Sessionex1
Sessionex1
 
Internal
InternalInternal
Internal
 
3. elements
3. elements3. elements
3. elements
 
2. attributes
2. attributes2. attributes
2. attributes
 
1 introduction to html
1 introduction to html1 introduction to html
1 introduction to html
 
Headings
HeadingsHeadings
Headings
 
Forms
FormsForms
Forms
 
Css
CssCss
Css
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Starting jdbc
Starting jdbcStarting jdbc
Starting jdbc
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Packet transfer mechanism using routers and IP addresses

  • 1. Topic : Basics of WAN &WAN Protocols Sub-Topic : Packet Transfer Mechanism using Router and IP address 1
  • 2. In the previous classes, you have learnt about • IP Address • Network prefix and host number • Internet address • Sub-netting and no sub-netting • Default gateways
  • 3. Objectives On completion of this period ,you would be able to know about • Packet transfer mechanism using routers and IP addresses 3
  • 4. Computer Network ForNet Domain: A domain covered by single monitoring and privacy policies. Forensic Server: Responsible for archiving synopses, query processing & routing, enforcing monitoring, security policies, for the domain. SynApp: equipped routers or hosts. Primary function is to create synopses of network traffic. May have limited query processing and storage component as well. Fig .1 4
  • 5. Recap • Let us remember the functions of a router and also IP address details in the following slides 5
  • 6. Routers • A router is a hardware component used to interconnect networks Router LAN WAN Fig .2 6
  • 7. Routers • A router has a network interface card for each network that it is connected to • Networks can use different technologies • Router forwards packets between networks • Router’s job is to transform packets from one network to meet the standards of the second network 7
  • 8. R Fig .3 8
  • 9. Internetwork • An internetwork is composed of arbitrarily many networks interconnected by routers Router Fig .4 9EC606A .64 9
  • 10. Internetwork Ethernet 131.108.0.0 227.240.129.2 Token Ring 227.240.129.0 227.240.129.17 131.108.99.5 Router 78.0.0.17 WAN 78.0.0.0 Fig .5 9EC606A .64 10
  • 11. Routers and IP Addressing • What about routers - connected to two networks ? • Router has multiple IP addresses - one for each interface as shown in the previous slide • IP address depends on network address • IP address specifies an interface, or network attachment point, not a computer 11
  • 12. TCP/IP Addresses • Addressing in TCP/IP is specified by the Internet Protocol (IP) • Each host is assigned a 32-bit number • This 32-bit number is called the IP address or Internet address 12
  • 13. TCP/IP Addresses • Each IP address is unique across entire Internet • The format of IP addresses makes routing efficient • Each IP address is divided into a prefix and a suffix • Prefix identifies network to which computer is attached • Suffix identifies computer within that network 13
  • 14. Packet Transfer Mechanism Using Routers And IP Address • The network layer monitors the delivery of the packet using physical networks • In direct delivery source and destination of packet are located on same physical network • In an indirect delivery, packet moves from router to router until it reaches its final destination 9EC606A .64 14
  • 15. Packet Transfer Mechanism Using Routers and IP Address • When a packet is placed in its route to its destination it is known as forwarding • It requires a router or a host to have a routing table • There are many forwarding techniques 9EC606A .64 15
  • 16. Forwarding Techniques • Next hop method • Network / host – specific method • Default method • The path from source to destination is a function of routing protocols 9EC606A .64 16
  • 17. Examples of Routing Protocols • Routing Information Protocol • Open shortest path first • Intermediate system to Intermediate system 9EC606A .64 17
  • 18. Examples of Routing Protocols • Packets from one network protocol are wrapped in a packet for another protocol • It is called tunneling done by wrapper network protocol • The routing protocols determine best path for the packet to travel • They maintain routing tables that contain information about networks topology 9EC606A .64 18
  • 19. Examples of Routing Protocols • In the internet world, IP is used to transport packets through the internet • It uses the information contained in the routing tables with routers • The routing tables may contain several possible routes • The routing algorithm calculates the least-cost path from source to destination 9EC606A .64 19
  • 20. Examples of Routing Protocols • Routers also maintain routing tables that contain destination address of a node or network • It also has network interface associated with a particular router address • A special type of route is called static route (fixed) that can be entered manually or through software in routing table • The static route cannot be changed dynamically 9EC606A .64 20
  • 21. Examples of Routing Protocols • Two general routing algorithms are used for computing metric information. i.e. hops, propagation delay, bandwidth, time, channel utilization error rates etc 9EC606A .64 21
  • 22. Example of Routing Table • Routing Table generated on a Unix system with IP address 187.96.25.2 [Local-Host Routing] Destination Gateway Flags Interface Local host Local host UH le O 215.103.16.22 187.96.25.13 UGHD le O 7 215.103.16.14 187.96.25.35 UGHD le 1 1 Default 187.96.25.1 UG 187.96.25.0 187.96.25.2 U leO 9EC606A .64 22
  • 23. Example Routing Table Contd… where • U = route is up & operational • G = packet must pass through at least one router • H = route to a specific host and not a network • D = route was created dynamically 9EC606A .64 23
  • 24. Example Routing Table Contd…. • The table’s first entry illustrated local host-routing • It indicates that any packets meant for local network 87.96.25.0 • It will be forwarded through gateway 187.96.25.2 (IP address of the host). Local host acts as router 9EC606A .64 24
  • 25. Example Routing Table Contd…. • The second entry in the table indicates that the packets are forwarded to another router • The Packets whose destination address is 215.103.16.227 are forwarded to the router (187.96.25.13) through interface leO • This router will have the information to where this packet is to be delivered 9EC606A .64 25
  • 26. Example Routing Table Contd…. • The third entry indicates the packets with destination address 215.103.16.141 are to forwarded to gateway • The gateway whose address 187.96.25.35 accessible through le 1 interface 9EC606A .64 26
  • 27. Example Routing Table Contd…. • The Fourth entry entry of table is a default route • When router receives a packet with unknown destination address • The router forwards packet to default router 9EC606A .64 27
  • 28. Example Routing Table Contd…. • If host system receives a packet with destination address 212.133.65.3 • It forwards to router with destination address 187.96.25.1 (since there is no entry in host’s routing table for 212.133.65.3 28
  • 29. Example Routing Table Contd…. • Routers exchange routing table information with neighbor routers periodically depending upon routing protocol used • They do so in order to update the routing tables as one router may be connected to more than one router 29
  • 30. Summary In this class, you have learnt about • Packet transfer mechanism using routers • And IP addresses with routing options used 30
  • 31. Quiz 1) What is the length of the IP address a) 16-bit b) 32-bit c) 8-bit d) 64-bit 31
  • 32. Quiz 2) A routing table specifies about a) various routes that can be used b) identifies the address c) it’s a table of IP addresses d) none of the above` 32
  • 33. Frequently Asked Questions 1) Explain how packet transfer mechanism is done using routers & IP addresses 2) What are the various forwarding techniques used ? 3) Discuss with an example importance of a routing table along with its options 33