Unit 4 Acn Advance Computer Network
Unit 4 Acn Advance Computer Network
Unit 4 Acn Advance Computer Network
Address Space
An address space is the total number of addresses used by the protocol. If a protocol uses N
bits to
define an address, the address space is
2N because each bit can have two different values and N bits can have 2N values.
IPv4 uses 32-bit address , which means that the address space is 2^32
Differentiate between IPv4 and IPv6 on the basis of length and security
IPV4 IPV6
IPv4 is a numeric address that consists of 4 fields IPv6 is an alphanumeric address that consists of
which are separated by dot (.). 8 fields, which are separated by colon.
IPv4 does not provide any mandatory security IPv6 provides, integrated Internet Protocol
measures, and it depends on the application Security {IPSec} over different levels of the
being used. network architecture.
IPv4 has a limited number of IP addresses. IPv6 has a large number of IP addresses.
IPv4 headers range from 20 to 60 bytes IPv6 headers are fixed at 40 bytes.
Fragmentation is handled by both sender and Fragmentation is handled only by the sender in
forwarding routers in IPv4. IPv6.
Simplified Header Format: Makes data processing faster and more efficient.
Improved Mobile Device Support: IPv6 connects mobile devices more smoothly.
It divides the address space into five classes (A, B, C, D, and E) based on the leading bits of
the address.
This system was used before the introduction of CIDR (Classless Inter-Domain Routing)
and is now largely obsolete(outdated), but it remains important for understanding the
evolution of IP addressing.
IPv4 addresses are 32-bit numbers, typically represented in dotted decimal notation (e.g.,
192.168.1.1).
In classful addressing, the address space is divided into fixed-length blocks, each block
assigned to a specific class.
Medium-sized
Class B 128-191 10 First 16 bits Last 16 bits
networks
Small networks
Class C 191-223 110 First 24 bits Last 8 bits with fewer
hosts
Multicast
Class D 224-239 1110 N/A N/A
groups
Experimental or
Class E 240-255 1111 N/A N/A Future
purposes
NAT maintains a table to keep track of IP address and port number translations.
For external access to internal services, NAT requires additional configuration like port
forwarding.
NAT can complicate certain protocols and applications (e.g., VoIP) that embed IP
information in data payloads.
NAT is less common with IPv6 due to its larger address space but may still be used in
specific scenarios.
There are two categories of ICMP messages: error-reporting and query messages.
The error-reporting messages report problems that a router or a host (destination) may
encounter when it processes an IP packet.
The query messages, which occur in pairs, help a host or a network manager get specific
information from a router or another host.
The checksum for ICMP is calculated using both the header and the data fields of the ICMP
message.
There are several tools that can be used in the Internet for debugging. We can find if a host or
router is alive and running. Two of these tools are ping and traceroute.
Header Format:
An ICMP message has an 8-byte header and a variable-size data section. Although the general
format of the header is different for each message type, the first 4 bytes are common to all.
As Figure shows,
The first field, ICMP type, defines the type of the message.
The code field specifies the reason for the particular message type.
The last common field is the checksum field for checking errors.
The data section in error messages carries information for finding the original packet that
had the error.
In query messages, the data section carries extra information based on the type of the
query
12 Parameter Problem
etc
Components of mobile IP :
It is a router located on the network where the mobile node originally connects (its home
network)
It manages the mobile node's IP address and updates its location (current network).
Sends data packets to the mobile node even if it's not on its home network.
It is a router on the network where the mobile node is temporarily connected (visited network).
it uses the mobile node’s current care-of address to receive and forward packets from the
home agent to the mobile node.
It can act as the default gateway and offer additional services, like security, on the visited
network.
The mobile node broadcasts or multicasts to discover available Home and Foreign Agents.
Foreign Agents (and optionally Home Agents) respond with advertisements containing their
addresses.
Selection: The mobile node selects a Foreign Agent or directly configures its care-of
address.
2. Registration:
The mobile node sends a registration request to the Home Agent, possibly via the Foreign
Agent, including its care-of address.
The Home Agent authenticates the registration request to ensure it's from the legitimate
mobile node.
The Home Agent updates its records and replies to the mobile node with the status of the
registration.
3. Tunneling:
The Home Agent encapsulates packets destined for the mobile node in a tunnel.
Encapsulated packets are forwarded to the mobile node’s care-of address through the
tunnel.
At the care-of address, the packet is decapsulated and delivered to the mobile node.
For the IPV4 addresses given below, calculate subnet mask, broadcast
address
and number of hosts possible.
(i) 10.0.199.237/22
(ii) 192.168.14.87/26