Lecture #4 Thr
Lecture #4 Thr
Lecture #4 Thr
Networks
Instructor: Fatima Shahzadi
F.shahzadi@uet.edu.pk
Lecture #
04
Agenda
Network Layer
Layer-3
Functionalities
Devices which work on Network Layer mainly focus on routing. Routing may
include various tasks aimed to achieve a single goal. These can be:
• Queuing incoming and outgoing data and then forwarding them according
to quality of service constraints set for those packets.
• Security
• L3 VPN and tunnels can be used to provide end to end dedicated connectivity.
Internet protocol is widely respected and deployed Network Layer protocol which helps
to communicate end to end devices over the internet. It comes in two flavors. IPv4
which has ruled the world for decades but now is running out of address space. IPv6 is
created to replace IPv4 and hopefully mitigates limitations of IPv4 too
Network Addressing
Layer 3 network addressing is one of the major tasks of Network Layer. Network Addresses
are always logical i.e. these are software based addresses which can be changed by
appropriate configurations.
A network address always points to host / node / server or it can represent a whole network.
Network address is always configured on network interface card and is generally mapped by
system with the MAC address (hardware address or layer-2 address) of the machine for
Layer-2 communication.
1. IP
2. IPX
3. AppleTalk
Hosts in different subnet need a mechanism to locate each other. This task can be done by
DNS. DNS is a server which provides Layer-3 address of remote host mapped with its domain
name or FQDN (fully qualified domain name). When a host acquires the Layer-3 Address (IP
Address) of the remote host, it forwards all its packet to its gateway. A gateway is a router
equipped with all the information which leads to route packets to the destination host.
Routers take help of routing tables, which has the following information:
Routers upon receiving a forwarding request, forwards packet to its next hop (adjacent router)
towards the destination.
Internet Protocol Version 4
(IPv4)
IPv4 is 32-bit addressing scheme used as TCP/IP host addressing mechanism. IP addressing
enables every host on the TCP/IP network to be uniquely identifiable.
IPv4 provides hierarchical addressing scheme which enables it to divide the network into
sub-networks, each with well-defined number of hosts. IP addresses are divided into many
categories:
Class A - it uses first octet for network addresses and last three octets for host addressing
Class B - it uses first two octets for network addresses and last two for host addressing
Class C - it uses first three octets for network addresses and last one for host addressing
Class D - it provides flat IP addressing scheme in contrast to hierarchical structure for above
three.
IPv4 also has well-defined address spaces to be used as private addresses (not routable on
internet), and public addresses (provided by ISPs and are routable on internet).
Fragment Offset: Represents the number of Data Bytes ahead of the particular fragment in the
particular Datagram. Specified in terms of number of 8 bytes, which has the maximum value of
65,528 bytes
Time to live: Datagram’s lifetime (8 bits), It prevents the datagram to loop through the network
by restricting the number of Hops taken by a Packet before delivering to the Destination.
IPv4 Datagram Header
Protocol: Name of the protocol to which the data is to be passed
(8 bits)
Header Checksum: 16 bits header checksum for checking errors in the
datagram header
Source IP address: 32 bits IP address of the sender
Destination IP address: 32 bits IP address of the receiver
Option: Optional information such as source route, record route. Used by
the Network administrator to check whether a path is working or not.
Due to the presence of options, the size of the datagram header
can be of variable length (20 bytes to 60 bytes).
Classful Addressing
IP address is an address having information about how to reach a specific host, especially
outside the LAN. An IP address is a 32 bit unique address having an address space of 2 32.
Generally, there are two notations in which IP address is written, dotted decimal notation
and hexadecimal notation.
• Dotted Decimal Notation
• Hexadecimal Notation
Class A
Class B
Class C
Class D
Class E
Each of these classes has a valid range of IP addresses. Classes D and E are reserved for
multicast and experimental purposes respectively. The order of bits in the first octet
determine the classes of IP address.
IPv4 address is divided into two parts:
• Network ID
• Host ID
The class of IP address is used to determine the bits used for network ID and host ID and the
number of total networks and hosts possible in that particular class. Each ISP or network
administrator assigns IP address to each device that is connected to its network.
Classful Addressing
Note: IP addresses are globally managed by Internet Assigned Numbers Authority(IANA) and
regional Internet registries(RIR).
Note: While finding the total number of host IP addresses, 2 IP addresses are not counted
and are therefore, decreased from the total count because the first IP address of any
network is the network number and whereas the last IP address is reserved for broadcast IP.
Class A:
IP address belonging to class A are assigned to the networks that contain a large number of
hosts.
The network ID is 8 bits long.
The host ID is 24 bits long.
The higher order bit of the first octet in class A is always set to 0. The remaining 7 bits in first
octet are used to determine network ID. The 24 bits of host ID are used to determine the
host in any network. The default subnet mask for class A is 255.x.x.x. Therefore, class A has a
total of:
2^7-2= 126 network ID(Here 2 address is subracted because 0.0.0.0 and 127.x.y.z are special
address. )
2^24 – 2 = 16,777,214 host ID
IP addresses belonging to class A ranges from 1.x.x.x – 126.x.x.x
Class B:
IP address belonging to class B are assigned to the networks that ranges from medium-sized
to large-sized networks.
Host ID’s are used to identify a host within a network. The host ID are assigned based on the
following rules:
Hosts that are located on the same physical network are identified by the network ID, as all
host on the same physical network is assigned the same network ID. The network ID is
assigned based on the following rules:
The network ID cannot start with 127 because 127 belongs to class A address and is reserved
for internal loop-back functions.
All bits of network ID set to 1 are reserved for use as an IP broadcast address and therefore,
cannot be used.
All bits of network ID set to 0 are used to denote a specific host on the local network and are
not routed and therefore, aren’t used.
Summary of Classfull Addressing
Problems with Classful
Addressing:
The problem with this classful addressing method is that millions of class A address are
wasted, many of the class B address are wasted, whereas, number of addresses available in
class C is so small that it cannot cater the needs of organizations. Class D addresses are used
for multicast routing and are therefore available as a single block only. Class E addresses are
reserved.
Since there are these problems, Classful networking was replaced by Classless Inter-Domain
Routing (CIDR) in 1993.
Classless Addressing
Network Address and Mask
Network address – It identifies a network on internet. Using this, we can find range of
addresses in the network and total possible number of hosts in the network.
Mask – It is a 32-bit binary number that gives the network address in the address block when
AND operation is bitwise applied on the mask and any IP address of the block.
Dividing a large block of addresses into several contiguous sub-blocks and assigning these
sub-blocks to different smaller networks is called subnetting. It is a practice that is widely
used when classless addressing is done.
Classless Addressing
1. Number of subnets : Given bits for mask – No. of bits in default mask
2. Subnet address : AND result of subnet mask and the given IP address
3. Broadcast address : By putting the host bits as 1 and retaining the network bits as in the IP
address
5. First Host ID : Subnet address + 1 (adding one to the binary representation of the subnet
address)
Example : Given IP Address – 172.16.0.0/25, find the number of subnets and the number of
hosts per subnet. Also, for the first subnet block, find the subnet address, first host ID, last host
ID and broadcast address.
Solution : This is a class B address. So, no. of subnets = 2 raise to power (25-16) = 29 = 512.
No. of hosts per subnet = 2 raise to power(32-25) – 2 = 2 raise to power 7 – 2 = 128 – 2 = 126
Ex1: 192.168.1.65/28:
65/16 = 4.0625
Network ID: 4*16 = 64 (192.168.1.64)
Broadcast ID: 64+(16-1) = 79 (192.168.1.79)
First Host ID: 64 + 1 = 65 (192.168.1.65)
Last Host ID: 79 - 1 = 78 (192.168.1.78)
Ex2: 192.168.20.166/25
166/128 = 1.296875
Network ID: 1*128 = 128 (192.168.20.128)
Broadcast ID: 128+(128-1) = 255 (192.168.20.255)
First Host ID: 128 + 1 = 129 (192.168.20.129)
Last Host ID: 255 - 1 = 254 (192.168.20.254)
Ex3: 192.168.30.14/29:
14/8 = 1.75
Network ID: 1*8 = 8 (192.168.30.8)
Broadcast ID: 8+(8-1) = 15 (192.168.30.15)
First Host ID: 8 + 1 = 9 (192.168.30.9)
Last Host ID: 15 - 1 = 14 (192.168.30.14)
Ex4: 192.168.20.86/30:
86/4 = 21.5
Network ID: 21*4 = 84 (192.168.20.84)
Broadcast ID: 84+(4-1) = 87
(192.168.20.87) First Host ID: 84 + 1 = 85
(192.168.20.85) Last Host ID: 87 - 1 = 86
(192.168.20.86)
IPv4 Classful subnetting
Supernetting
Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into
multiple smaller subnetworks. In Supernetting, multiple networks are combined into a bigger
network termed as a Supernetwork or Supernet.
Supernetting is mainly used in Route Summarization, where routes to multiple networks with
similar network prefixes are combined into a single routing entry, with the routing entry
pointing to a Super network, encompassing all the networks. This in turn significantly
reduces the size of routing tables and also the size of routing updates exchanged by routing
protocols.
When multiple networks are combined to form a bigger network, it is termed as super-
netting
Super netting is used in route aggregation to reduce the size of routing tables and routing
table updates
There are some points which should be kept in mind while supernetting:
Contiguous: You can easily see that all network are contiguous all having size 256 hosts.
Range of first Network from 200.1.0.0 to 200.1.0.255. If you add 1 in last IP address of first
network that is 200.1.0.255 + 0.0.0.1, you will get the next network id that is 200.1.1.0.
Similarly, check that all network are contiguous.
Equal size of all network: As all networks are of class C, so all of the have a size of 256
which in turn equal to 2 raise to power 8.
First IP address exactly divisible by total size: When a binary number is divided by 2n then
last n bits are the remainder. Hence in order to prove that first IP address is exactly divisible
by while size of Supernet Network. You can check that if last n bits are 0 or not.
In given example first IP is 200.1.0.0 and whole size of supernet is (22 x 28=>22+8=>210).
If last 10 bits of first IP address are zero then IP will be divisible.
1. Last 10 bits of first IP address are zero (highlighted by green color). So 3rd condition is
also satisfied.
Therefore, you can join all these 4 networks and can make a Supernet. New Supernet Id will
be 200.1.0.0.
Supernetting
Advantages of Supernetting
1. Control and reduce network traffic
2. Helpful to solve the problem of lacking IP addresses
3. Minimizes the routing table
Disadvantages of Supernetting –
1. It cannot cover different area of network when
combined
2. All the networks should be in same class and all
IP should be contiguous
IPv4 Datagram Fragmentation and
Delays
Why IPv4 Datagram Fragmentation required?
Different Networks may have different maximum transmission unit (MTU), for example due
to differences in LAN technology. When one network wants to transmit datagrams to a
network with a smaller MTU, the routers on path may fragment and reassemble datagrams.
How is Fragmentation done?
When a packet is received at the router, destination address is examined and MTU is
determined. If size of the packet is bigger than the MTU, and the ‘Do not Fragment (DF)’ bit
is set to 0 in header, then the packet is fragmented into parts and sent one by one. The
maximum size of each fragment is the MTU minus the IP header size (Minimum 20 bytes and
Maximum 60 bytes).
Each fragment is converted to a packet and the following changes happen in the datagram
header:
The total length field is changed to the size of the fragment.
The More Fragment bit (MF bit) is set for all the fragment packets except the last one.
The fragment offset field is set, based on the number of fragment that is being set and the
MTU.
Header Checksum is re-calculated.
Example:
For a data packet of 4000 bytes and MTU of 1500 bytes, we have actual data of 3980 bytes
that is to be transmitted and 1480 bytes is the maximum data size that is permissible to be
sent. So, there would be 3 fragments:
For the first fragment, data size = 1480 bytes, offset = 0 and MF flag = 1
For the second fragment, data size = 1480 bytes, offset = 1480 and MF flag = 1
For the third fragment, data size = 1020 bytes, offset = 2960 and MF flag = 0
An important point to be noted here is that all fragments would be having same
identification number, thus indicating that all the fragments belong to the same parent data
packet.
Delays
Processing delay: Time taken by the routers to process the data packet header.
Queuing delay: Time taken by the data packet in routing queues.
Transmission delay: Time taken to load a data packet onto the transmission
channel
Dt = N/R,
N: Number of bits to be transmitted
R: Rate or transmission speed of the channel
Propagation delay – Time taken by the data packet to reach from source to
destination
Dp = D/S,
D: Distance between the source and the destination
S: is the speed of propagation
Fragmentation at Network Layer
Fragmentation is done by the network layer when the maximum size of datagram is greater
than maximum size of data that can be held a frame i.e., its Maximum Transmission Unit
(MTU). The network layer divides the datagram received from transport layer into fragments
so that data flow is not disrupted.
Since there are 16 bits for total length in IP header so,
maximum size of IP datagram = 216 – 1 = 65, 535 bytes.
Fragmentation at Network Layer
• It is done by network layer at the destination side and is usually done at routers.
• Source side does not require fragmentation due to wise (good) segmentation by transport
layer i.e. instead of doing segmentation at transport layer and fragmentation at network
layer, the transport layer looks at datagram data limit and frame data limit and does
segmentation in such a way that resulting data can easily fit in a frame without the need
of fragmentation.
• Receiver identifies the frame with the identification (16 bits) field in IP header. Each
fragment of a frame has same identification number.
• Receiver identifies sequence of frames using the fragment offset(13 bits) field in IP header
• An overhead at network layer is present due to extra header introduced due to
fragmentation.
• Fields in IP header for fragmentation –
Algorithm :
Destination should identify that datagram is fragmented from MF, Fragment offset field.
Destination should identify all fragments belonging to same datagram from Identification
field.
Identify the 1st fragment(offset = 0).
Identify subsequent fragment using header length, fragment offset.
Repeat until MF = 0.
Efficiency –
Efficiency (e) = useful/total = (Data without header)/(Data with header)
Throughput = e * B { where B is bottleneck bandwidth }
Example – An IP router with a Maximum Transmission Unit (MTU) of 200 bytes has received
an IP packet of size 520 bytes with an IP header of length 20 bytes. The values of the relevant
fields in the IP header.
Explanation – Since MTU is 200 bytes and 20 bytes is header size so, maximum length of
data = 180 bytes but it can be represented in fragment offset since not divisible by 8 so,
maximum length of data feasible = 176 bytes.
Number of fragments = (520/200) = 3.
Header length = 5 (since scaling factor is 4 therefore, 20/4 = 5)
Efficiency, e = (Data without header)/(Data with header) = 500/560 = 89.2 %
Internet Protocol Version 6
(IPv6)
Exhaustion of IPv4 addresses gave birth to a next generation Internet Protocol version 6. IPv6
addresses its nodes with 128-bit wide address providing plenty of address space for future to
be used on entire planet or beyond.
IPv6 has introduced Anycast addressing but has removed the concept of broadcasting. IPv6
enables devices to self-acquire an IPv6 address and communicate within that subnet. This
auto-configuration removes the dependability of Dynamic Host Configuration Protocol
(DHCP) servers. This way, even if the DHCP server on that subnet is down, the hosts can
communicate with each other.
IPv6 provides new feature of IPv6 mobility. Mobile IPv6 equipped machines can roam around
without the need of changing their IP addresses.
IPv6 is still in transition phase and is expected to replace IPv4 completely in coming years. At
present, there are few networks which are running on IPv6. There are some transition
mechanisms available for IPv6 enabled networks to speak and roam around different
networks easily on IPv4. These are:
Unicast Address: Unicast Address identifies a single network interface. A packet sent to
unicast address is delivered to the interface identified by that address.
Multicast Address: Multicast Address is used by multiple hosts, called as Group, acquires a
multicast destination address. These hosts need not be geographically together. If any packet
is sent to this multicast address, it will be distributed to all interfaces corresponding to that
multicast address.
Anycast Address: Anycast Address is assigned to a group of interfaces. Any packet sent to
anycast address will be delivered to only one member interface (mostly nearest host possible).
Provider Id : Depending on the number of service providers that operates under a region,
certain bits will be allocated to Provider Id field. This field need not be fixed. Let’s say if
Provider Id = 10 bits then Subscriber Id will be 56 – 10 = 46 bits.
Subscriber Id : After Provider Id is fixed, remaining part can be used by ISP as normal IP
address.
Intra Subscriber : This part can be modified as per need of organization that is using the
service.
Geography based Unicast
address :
Global routing prefix : Global routing prefix contains all the details of Latitude and Longitude.
As of now, it is not being used. In Geography based Unicast address routing will be based on
location.
Interface Id : In IPv6, instead of using Host Id, we use the term Interface Id.
Loopback –
IPv4 Compatible –
IPv4 mapped _
Payload Length (16-bits) : It is a 16-bit (unsigned integer) field, indicates total size of the
payload which tells routers about amount of information a particular packet contains in its
payload. Payload Length field includes extension headers(if any) and upper layer packet. In
case length of payload is greater than 65,535 bytes (payload up to 65,535 bytes can be
indicated with 16-bits), then the payload length field will be set to 0 and jumbo payload
option is used in the Hop-by-Hop options extension header.
Next Header (8-bits) : Next Header indicates type of extension header(if present)
immediately following the IPv6 header. Whereas In some cases it indicates the protocols
contained within upper-layer packet, such as TCP, UDP.
Hop Limit (8-bits) : Hop Limit field is same as TTL in IPv4 packets. It indicates the maximum
number of intermediate nodes IPv6 packet is allowed to travel. Its value gets decremented
by one, by each node that forwards the packet and packet is discarded if value decrements
to 0. This is used to discard the packets that are stuck in infinite loop because of some
routing error.
Source Address (128-bits) : Source Address is 128-bit IPv6 address of the original source of
the packet.
Destination Address (128-bits) : Destination Address field indicates the IPv6 address of the
final destination(in most cases). All the intermediate nodes can use this information in order
to correctly route the packet.
Extension Headers : In order to rectify the limitations of IPv4 Option Field, Extension Headers
are introduced in IPversion 6. The extension header mechanism is very important part of the
IPv6 architecture. Next Header field of IPv6 fixed header points to the first Extension Header
and this first extension header points to the second extension header and so on.
IPv6 packet may contain zero, one or more extension headers but these should be present in
their recommended order:
Rule : Hop-by-Hop option header(if present) should always be placed after IPv6 base header.
Conventions :
Any extension header can appear at most once except Destination Header because
Destination Header is present two times in above list itself.
If Destination Header is present before Routing Header then it will be examined by all
intermediate nodes specified in routing header.
If Destination Header is present just above Upper layer then it will be examined only by
Destination node.
Given order in which all extension header should be chained in IPv6 packet and working of
each extension header :
Difference Between IPv4 and
IPv6:
IPv4 IPv6
IPv4 has 32-bit address length IPv6 has 128-bit address length
It Supports Manual and DHCP address configuration It supports Auto and
_____________________________________________renumbering address configuration
In IPv4 end to end connection integrity is Unachievable In IPv6 end to end connection
________________________________________________integrity is Achievable
It can generate 4.29×109 address space Address space of IPv6 is 3.4×1038
Security feature is dependent on application IPSEC is inbuilt security feature in the IPv6
Address representation of IPv4 in decimal Address Representation of IPv6 is in
________________________________________hexadecimal
Fragmentation performed by Sender and forwarding routers fragmentation done by
_________________________________________ _____________sender
In IPv4 Packet flow identification is not available In IPv6 packetflow identification
________________________________are Available and uses flow label field in the header
In IPv4 checksum field is available In IPv6 checksum field is not available
It has broadcast Message Transmission Scheme In IPv6 multicast and any cast message
_______________________________________________transmission scheme is available
In IPv4 Encryption and Authentication
facility not provided In IPv6 Encryption and Authentication are
_________________________________________provided
Internet Control Message Protocol
(ICMP)
ICMP is network diagnostic and error reporting protocol. ICMP
belongs to IP protocol suite and uses IP as carrier protocol. After
constructing ICMP packet, it is encapsulated in IP packet. Because IP
itself is a best-effort non-reliable protocol, so is ICMP.
When the congestion router is far away from the source the ICMP will
send hop by hop source quench message so that every router will
reduce the speed of transmission.
Parameter problem :
Whenever packets come to the router then calculated header checksum should be equal to
recieved header checksum then only packet is accepted by the router.
There is no necessary condition that only router give the ICMP error
message some time destination host send ICMP error message when any
type of failure (link failure,hardware failure,port failure etc) happen in the
network.
Redirection message :
Redirect requests data packets be sent on an alternate route. The
message informs to a host to update its routing information (to send
packets on an alternate route).
Ex. If host tries to send data through a router R1 and R1 sends data on a router R2 and there
is a direct way from host to R2. Then R1 will send a redirect message to inform the host that
there is a best way to the destination directly through R2 available. The host then sends data
packets for the destination directly to R2.
The router R2 will send the original datagram to the intended destination.
But if datagram contains routing information then this message will not be sent even if a
better route is available as redirects should only be sent by gateways and should not be sent
by Internet hosts.
A router never forwards broadcast traffic by default. Multicast traffic uses special
treatment as it is most a video stream or audio with highest priority. Anycast is just similar
to unicast, except that the packets are delivered to the nearest destination when multiple
destinations are available.
Unicast routing
Most of the traffic on the internet and intranets known as unicast data or
unicast traffic is sent with specified destination. Routing unicast data
over the internet is called unicast routing. It is the simplest form of
routing because the destination is already known. Hence the router just
has to look up the routing table and forward the packet to next hop.
Broadcast routing
By default, the broadcast packets are not routed and forwarded by the routers on any
network. Routers create broadcast domains. But it can be configured to forward broadcasts
in some special cases. A broadcast message is destined to all network devices.
A router creates a data packet and then sends it to each host one by one. In this case, the
router creates multiple copies of single data packet with different destination addresses. All
packets are sent as unicast but because they are sent to all, it simulates as if router is
broadcasting.
This method consumes lots of bandwidth and router must destination address of each
node.
Secondly, when router receives a packet that is to be broadcasted, it simply floods those
packets out of all interfaces. All routers are configured in the same way.
This method is easy on router's CPU but may cause the problem of duplicate packets
received from peer routers.
Reverse path forwarding is a technique, in which router knows in advance about its
predecessor from where it should receive broadcast. This technique is used to detect and
discard duplicates.
Broadcast Routing
Multicast Routing
Multicast routing is special case of broadcast routing with
significance difference and challenges. In broadcast routing,
packets are sent to all nodes even if they do not want it.
But in Multicast routing, the data is sent to only nodes
which wants to receive the packets.
The router must know that there are nodes, which wish to
receive multicast packets (or stream) then only it should
forward. Multicast routing works spanning tree protocol to
avoid looping.
A router is always configured with some default route. A default route tells the router where
to forward a packet if there is no route found for specific destination. In case there are
multiple path existing to reach the same destination, router can make decision based on the
following information:
1. Hop Count
2. Bandwidth
3. Metric
4. Prefix-length
5. Delay
Routes can be statically configured or dynamically learnt. One route can be configured to be
preferred over others.
Routing Algorithms
Flooding
Flooding is simplest method packet forwarding. When a packet is received, the routers send
it to all the interfaces except the one on which it was received. This creates too much burden
on the network and lots of duplicate packets wandering in the network.
Time to Live (TTL) can be used to avoid infinite looping of packets. There exists another
approach for flooding, which is called Selective Flooding to reduce the overhead on the
network. In this method, the router does not flood out on all the interfaces, but selective
ones.
Shortest Path
Routing decision in networks, are mostly taken on the basis of cost between source and
destination. Hop count plays major role here. Shortest path is a technique which uses
various algorithms to decide a path with minimum number of hops.
1. Dijkstra's algorithm
When the data enters from one end of Tunnel, it is tagged. This tagged data is then
routed inside the intermediate or transit network to reach the other end of Tunnel.
When data exists the Tunnel its tag is removed and delivered to the other part of
the network.
Both ends seem as if they are directly connected and tagging makes data travel
through transit network without any modifications
Tunneling
Network Layer Protocol
ARP protocol
While communicating, a host needs Layer-2 (MAC) address of the destination machine which belongs to
the same broadcast domain or network. A MAC address is physically burnt into the Network Interface
Card (NIC) of a machine and it never changes.
On the other hand, IP address on the public domain is rarely changed. If the NIC is changed in case of
some fault, the MAC address also changes. This way, for Layer-2 communication to take place, a mapping
between the two is required.
ARP Mechanism
To know the MAC address of remote host on a broadcast domain, a computer wishing to initiate
communication sends out an ARP broadcast message asking, “Who has this IP address?” Because it is a
broadcast, all hosts on the network segment (broadcast domain) receive this packet and process it. ARP
packet contains the IP address of destination host, the sending host wishes to talk to. When a host
receives an ARP packet destined to it, it replies back with its own MAC address.
Once the host gets destination MAC address, it can communicate with remote host using Layer-2 link
protocol. This MAC to IP mapping is saved into ARP cache of both sending and receiving hosts. Next time,
if they require to communicate, they can directly refer to their respective ARP cache.
Reverse ARP is a mechanism where host knows the MAC address of remote host but requires to know IP
address to communicate
References
https://en.wikipedia.org/wiki/Classful_network
TechNet – Microsoft
Classful network – Wikipedia
Question
s?
??
?
?? ??
?? ? ??
? ?
? ?
?? ? ? ?
?
? ? ? ? ?
? ???
? ? ?? ?? ????
? ?? ? ?
? ??? ? ? ? ?
? ? ?
? ? ?
? ? ? ? ?