0% found this document useful (0 votes)
95 views

Network Protocols

ARP and RARP are protocols used to associate IP addresses with physical addresses. ARP is used to map IP addresses to MAC addresses on the same network, while RARP maps physical addresses to IP addresses. The ARP packet contains fields like hardware type, protocol type, sender/target addresses, and operation type. DHCP automates IP address assignment and allows for dynamic addressing. It reduces administration overhead and prevents address conflicts. IPv6 uses a 128-bit address compared to IPv4's 32-bit address and includes improvements like increased security, header simplification and better support for options.

Uploaded by

Wayne
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views

Network Protocols

ARP and RARP are protocols used to associate IP addresses with physical addresses. ARP is used to map IP addresses to MAC addresses on the same network, while RARP maps physical addresses to IP addresses. The ARP packet contains fields like hardware type, protocol type, sender/target addresses, and operation type. DHCP automates IP address assignment and allows for dynamic addressing. It reduces administration overhead and prevents address conflicts. IPv6 uses a 128-bit address compared to IPv4's 32-bit address and includes improvements like increased security, header simplification and better support for options.

Uploaded by

Wayne
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

ARP and RARP

ARP RARP
Position of ARP and RARP in
TCP/IP protocol suite
ARP
ARP
•ARP associates an IP address with its physical address.
On a typical physical network, such as a LAN, each device
on a link is identified by a physical or station address that
is usually imprinted on the NIC.
ARP Operation
An ARP request is broadcast;
an ARP reply is unicast.
ARP Packet
The fields are as follows:

Hardware Type
- This is a 16-bit field defining the type of the
network on which ARP is running.
Protocol Type
- This is a 16-bit field defining the protocol.
For example, the value of this field for the
IPv4 protocol is 080016
Contd...
Hardware Length
- This is an 8-bit field defining the length of
the physical address in bytes.
For example, for Ethernet the value is 6.
Protocol Length
- This is an 8-bit field defining the length of
the logical address in bytes.
For example, for the IPv4 protocol the value
is 4.
Contd...
Operation
- This is a 16-bit field defining the type of
packet.
Two packet types are defined.
ARP Request (1), ARP Reply (2)
Sender Hardware Address
- This is a variable length field defining the
physical address of the sender.
- For Ethernet this field is 6 bytes long.
Contd...
Sender Protocol Address
- This is a variable length field defining the
logical address of the sender.
- For IPv4 protocol, this field is 4 bytes long.
Target Hardware Address
- This is a variable length field defining the
physical address of the target.
- For Ethernet this field is 6 bytes long.
Contd...
Target Protocol Address
- This is a variable length field defining the
logical address of the target.
- For IPv4 protocol, this field is 4 bytes long.
P RARP
RARP finds the logical address for a machine that only
knows its physical address.
The RARP request packets are broadcast;
the RARP reply packets are unicast.
RARP Operation
RARP Packet
DHCP

◼ Dynamic Host Configuration


Protocol

◼ It is a method for assigning


Internet Protocol (IP) addresses
to individual computers in an
organization’s network

◼ DHCP lets a network


administrator supervise and
distribute IP addresses from a
central point and automatically
sends a new IP address when a
computer is plugged into a
different place in the network
Motivation for DHCP

◼ Configuration parameters for network


hosts
✓ IP address
✓ Router
✓ Subnet Mask
✓ Others..
Two types of IP Addresses

◼ DHCP is used to assign IP addresses to hosts or


workstations on the network
◼ Two types of IP addresses:
✓ Static
❖ Is a number that is assigned to a computer by an Internet
service provider (ISP) to be its permanent address on the
Internet
✓ Dynamic
❖ The temporary IP address is called a dynamic IP address
Need of DHCP
◼ Important when it comes to adding a machine to
a network
◼ When computer requests an address, the
administrator would have to manually configure
the machine
✓ Mistakes are easily made
✓ Causes difficulty for both administrator as well as
neighbors on the network
◼ DHCP solves all the hassle of manually adding a
machine to a network
Advantages of DHCP
◼ DHCP minimizes the administrative burden.

◼ By using DHCP there is no chance to conflict IP


address.
Disadvantages of DHCP

◼ When DHCP server is unavailable, client is unable to


access enterprises network
Contd…

• Make it possible for a host to roam without


changing its address.

• Allow the protocol to evolve in the future.

• Permit the old and new protocols to coexist for


years.
IPv6 Addresses
• An IPv6 address consists of 16 bytes (octets).
• It is 128-bit long.
• 128 bits = 16 bytes = 32 hex digits
• Example:
FDEC:BA987654:3210:ADBF:BBFF:2922:FFFF
IPv6 Features
a) Longer address space 16 bytes or 128 bits.
b) Simplification of the header. It contains only seven fields. This
change allows routers to process packets faster and thus improve
throughput and delay.
c) Better support for options. This change was essential with the new
header because fields that previously were required are now
optional. The way options are represented is different making it
simple for routers to skip over options not intended for them. This
feature speeds up packet processing time.
d) IPv6 represents a big advance in security. Authentication and
privacy are key features of the new IP.
e) More attention has been paid to quality of service.
The Main IPv6 Header

The IPv6 fixed header (required).


These fields are as follows:
Version: This 4-bit field define the version
number of the IP.
For IPv6, the value is 6.
Priority: The 4-bit priority field defines the
priority of the packet with respect to traffic
congestion.
Flow Label: The flow label is a 24-bit field that
is designed to provide special handling for a
particular flow of data.
Contd...
Payload length: The 16-bit payload length field
defines the length of the IP datagram
excluding the base header.

Next Header: The next header is an 8-bit field


defining the header that follows the base
header in the datagram.

Hop Limit: This 8-bit hop limit field serves the


same purpose as the TTL field in IPv4.
Contd...
Source Address: The source address field is a
128-bit Internet address that identifies the
original source of the datagram.

Destination Address: The destination address


field is s 128-bit Internet address that usually
identifies the final destination of the datagram.
Internet Control Message Protocol
• The operation of the Internet is monitored closely by the
routers.
• When something unexpected occurs the event is reported by the
ICMP which is also used to test the Internet.
• About a dozen types ICMP messages are defined.
• Destination unreachable:
• Message is used when the subnet or a router cannot
locate the destination or when a packet with the DF
bit cannot be delivered because a small packet
network stands in the way.
Internet Control Message Protocol
• Time Exceeded:
• Message is sent when a packet is dropped because its counter
has reached zero.
• This event is a symptom that packets are looping that there is
enormous congestion.
• Parameter Problem:
• Message indicates that an illegal has been detected in a
header field.
• Source Quench:
• Message was formerly used to throttle host that were sending
too many packets.
• When a host received this message it was expected to slow
down.
Internet Control Message Protocol
• Redirect:
• Message is used when a router notices that a packet
seems to be routed wrong.
• It is used by the router to tell the sending host
about the probable error.
• Echo and Echo reply:
• Message are used to see is a given destination is
reachable and alive.
• Upon receiving the ECHO message the destination
expected to send ECHO REPLY.
Tunneling
• The source and destination hosts are on the same type of
network but there is a different network in between.
• The solution to this problem is technique called tunneling.
• To send an IP packet to host 2 to host 1 constructs the packet
containing the IP address of host 2 insert it into an Ethernet
frame addressed to the Paris multiprotocol router and put it on
the Ethernet.
• When the multiprotocol router gets the frame it removes the IP
packet inserts it in the payload field of the WAN network layer
and addresses the latter to the WAN address of the London
multiprotocol router.
• When it gets there the London router removes the IP packet and
sends it to host 2 inside an Ethernet frame.
Tunneling

Tunneling a packet from Paris to London.

You might also like