Unit 2 Network Layer
Unit 2 Network Layer
1.0 INTRODUCTION
As you know, the network layer is one of the important layers of OSI model. It is
responsible for different tasks of networking, but mainly its role is to determine
addresses and finding a route between a source and destination node or between two
intermediate devices. It establishes and maintains a logical connection between these
two nodes, either a connectionless or a connection oriented communication. The basic
purpose of the network layer is to provide a network to network communication
capability in contrast to machine to machine common provided by data line layer. The
network layer controls the operation of the subnet. A key design issue is determining
how packets are routed from source to destination. Routes can be determined based on
static tables that are “wired into” the network and rarely changed. If too many packets
are present in the subnet at the same time, they will get in one another’s way forming
bottlenecks. The controlling such congestion also belongs to the network layer. The
quality of service also depends on network layer issue.
In this unit, we will study the fundamental Issues of network layer. These issues are
designing interface between the host and the network, the routing methods, congestion
control methods and Internetworking issues. In this unit we will study how routing is
done at network layer using adaptive and non adaptive algorithm. We will also discuss
the Network addressing. Further, some Error reporting protocols ICMP and IGMP on
network layer will be discussed.
1.1 OBJECTIVES
After going through this unit, you should be able to:
• Know the basic issues of network layer
• Understand the different switching methods used at network layer
• Know the routing mechanisms
5
Network, Transport • Understand the congestion control methods
and Application
Layer • Differentiate between adaptive and non adaptive algorithm
• Know process of Error reporting protocols at network layer
1.2 SWITCHING
As you have studied earlier in block 1, unit 3, that Switching is used to determine the
path to be used for forwarding the information to the receiver. You also know that the
Switching methods are mainly divided into Circuit, Message and Packet switching. In
this section, we will explore the other switching mechanism like virtual circuit and
datagram.
6
Network Layer
It is that part of the network layer responsible for deciding which output line an
incoming packet should be transmitted on.
2. Simplicity: The routing should be done in a simple manner so that the over
head is as low as possible.
2. Non-adaptive algorithms
Adaptive algorithms use such dynamic information as current topology, load delay
etc to select routes.
Non adaptive algorithms, routes never changes once initial routes have been
selected. Also, called static routing.
7
Network, Transport
and Application Adaptive Routing Algorithm (Dynamic Routing)
Layer
It changes their routing decision to reflect changes in the topology and in traffic as
well. These get their routing information from adjacent routers or from all routers.
Routing decision may be changed when network topology and/or traffic load changes.
The optimization parameters are the distance, number of hops and estimated transit
time.
1. Isolated: Each router makes its routing decisions using only the local
information it has on hand. Specifically, routers do not even exchange
information with their neighbors.
Isolated: In this method, the node decides the routing without seeking information
from other node. The disadvantage is that the packet may be sent through a congested
route resulting in a delay.
Some of the examples of this type of algorithm for routing are :
• Hot Potato Routing: Form of routing in which the nodes of a network have no
buffer to store packets in before they are moved on to their final predetermined
destination.
• In normal routing situation, when multiple packets contend for a single outgoing
channel, packets that are not buffered are dropped to avoid congestion.
• Backward Learning: In this method the routing tables at each node gets
modified by information from the incoming packets. Backward learning routing
algorithm used for routing traffic that makes decisions by assume that a can
optimally reach B through C.
Centralized Routing
Advantage: Only one node is required to keep the information.
Disadvantage: If the central node goes down the entire network is down, i.e. single
point of failure.
Distributed: It receives information from its neighboring nodes and then takes the
decision about which way to send the packet.
Optimality Principle
Optimality principle is a general statement about optimal routes regardless of network
topology or traffic.
8
With reference to Figure 2 above, Optimality principle states that if router I is on the Network Layer
optimal path from router ‘I’ to router ‘K’ then the optimal path from ‘J’ to ‘K’ also
falls along the same route.
To prove the above statement we can say, if there was a better way from J to K, then
you could use that with the path from I to J for a better path from I to K, so your
starting point (the path from I to K was optimal) is contradicted.
Disadvantages:
1. Duplicacy
9
Network, Transport 2. Infinite looping.
and Application
Layer 3. Flow-Based Routing: This algorithm considers two strategies in account to
decide the route.
a) Topology.
b) Load for routing
Previous static algorithm only considers topology in account not the load
for routing. The basic idea behind the analysis is that for a given line, if
capacity and average flow is known, it is possible to compute the mean
packet delay on that line from queuing theory. The routing problem then
reduces to finding the routing algorithm that produces the minimum
average delay for the subnet.
For this technique, certain information must be known in advance.
c) Topology
d) Traffic Matrix Fij
e) Line capacity matrix Cij
1
Now T = µc − λ
Intradomain Interdomain
10
1. Distance vector routing Network Layer
In distance vector routing, each router maintains a routing table indexed by, and
containing one entry for each router in the subnet. This entry contains two parts
a) The preferred outgoing line to use for that destination.
b) An estimate of the time as distance to that destination.
The router is assumed to know the distance to each of its neighbors.
For example, consider a subnet as given below in figure 4.
A C
B
C D
1 2 3
For example : as shown in the figure 5, ‘A’ claims to have 3 msec delay to B 8 msec
delay to ‘C’ and so on. Similarly ‘B’ claims to have 2 msec delay to A, 4 msec delay
to ‘C’ and so on.
Now (4) column shows how router ‘C’ decides his new route to router ‘E’. There are
three ways
a) If ‘C’ follows line ‘A’ then delay is CE = CA ® AE = 5 + 1 = 6 msec.
11
Network, Transport c) If ‘C’ follows line ‘B’ then delay is CE = CB ® BE = 6 + 11 = 17 msec.
and Application
Layer d) If ‘C’ follows line ‘D’ then delay is CD ® DE ® 8 + 12 = 20 msec.
Min delay time is via neighbor route ‘A’ so from C to E line is chosen ‘A’ in
column (4)
The same calculations is performed for all destination, with the new routing
table as (4)
The problem is, that router B doesn't know that C has router B as successor in
his routing table on the route to A.
12
2. Hierarchical Routing: As networks grow in size, the router routing tables Network Layer
grow proportionally. Not only the router memory consumed but also the more
CPU time is needed to scan them and more bandwidth is needed.
The problem can be solved to some extent by using Hierarchical routing. In this
routers are divided into regions as depicted in figure 8, with each router
knowing all the details how to route packets to destination within it own region,
but nothing about the internal structure of other regions.
1A 1A
1B 1B 1 1B 1B 1
1C 1C 1 1C 1C 1
2A 1B 2 2 1B 2
2B 1B 3 3 1C 2
2C 1B 3 4 1C 3
2D 1B 4 5 16 4
3A 1C 3
3B 1C 2
4A 1C 2
4B 1C 4
4C 1C 4
5A 1C 4
5B 1C 5
5C 1B 5
5D 1C 6
5E 1C 5
13
Network, Transport The full routing table as shown above for 1A has 17 entries but when routing is
and Application done hierarchically there are only 7 entries (e entries for local routers 4 entries
Layer for regions which are considered as single router. All the traffic for region 2
goes by 1B-2A line but rest of traffic goes by 1C-3B line.
In this process send “Hello”, packet on each point-to-point line. After receiving
the hello packet Destination, node replies with its address.
2. Measure the cost (delay) to each neighbor.
The information tables are creating having all details of neighboring nodes.
4. Send this packet to all other routers.
Use selective flooding. Sequence numbers prevent duplicate packets from being
propagated. Lower sequence numbers are rejected as obsolete
5. Compute the shortest path to every other router.
Dijkstra’s Shortest Path algorithm is used to determine the shortest path to each
destination.
When a router using a Link State protocol, such an OSPF (Open Shortest Path
First) knows about a change on the network, it will broadcast this change
instantly, there for flooding the network with this information. The information
routers require to build their databases is provided in the form of Link State
advertisement packets (LSAP). Routers do not advertise their entire routing
tables; instead each router advertises only its information regarding
immediately adjacent routers.
14
• Link state has big memory requirements Network Layer
• In link state announcements cannot be “filtered”. All items in the database must
be sent to neighbors
Even though Link State protocols work more efficiently, problem can arise.
Usually problems occur cause of changes in the network topology (links go up-
down), and all routers don't get updated immediately cause they might be on
different line speeds, there for, routers connected via a fast link will receive
these changes faster than the others on a slower link.
Different techniques have been developed to deal with these problem and these are:
5. Traffic is bursty.
15
Network, Transport
and Application
Layer
a) Open loop: In open loop solution the good designs are being developed to solve
the problem so that congestion does not occur at first place once the system is
setup and running, no mid pores connection is made. In open loop control, tools
are included to decide when to accept new traffic, when to discard packets and
which ones. And making scheduling decisions at various points in the network.
The decisions are offline decision is not based on current state of network close
loop solution.
The concept of feedback loop is used in closed loop solution. This approach has
three parts, when apply to the congestion control.
i) Monitor the system to detect when and where congestion occurs.
ii) Pass the information to places where the action can be taken.
iii) Adjust system operation to correct the problem.
2. To increase capacity
Traffic shaping is about regulating the average rate (and burstiness) of data
transmission.
16
water is bucket and zero when the bucket is empty. Also once the bucket is full, any Network Layer
additional water entering it spills over the sides and is lost.
Leaky bucket algorithm can be understood as “The leaky bucket consists of finite
queue when a packet arrives, if there is room on the queue it is appended to the queue,
otherwise it is discarded. At every clock tick, one packet is transmitted”.
17
Network, Transport Advantage
and Application
Layer This algorithm smoothens the bursts and greatly reduces the chances of congestion.
Disadvantages
1. When the queue is full, packets are discarded.
Token Bucket Algorithm: The leaky bucket algorithm has a rigid output pattern at
the average rate, no matter how bursty the traffic is.
In many applications, it is better to allow the output to speed up somewhat when large
bursts arrive so a more flexible algorithm is needed, preferably one that never losses
data one such algorithm is token bus algorithm.
In token bucket algorithm, the leaky bucket holds ‘tokens’ generated by a clock at the
rate of one token every DT sec.
Host Host
Computer Computer
One token is
added to the
bucket every ∆ t
The Bucket
Holds Tokens
Networks Networks
(a) (b)
The token bucket algorithm provides a different kind of traffic shaping than the leaky
bucket algorithm. Bust of up to n. packets can be sent at once, allowing some
burstiness in the output stream and giving faster response to sodden bursts of input.
A token bucket algorithm throws away tokens when the bucket fills up but never
discards packets.
18
Table 1: Token Bucket V/S Leaky Bucket Network Layer
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
4. In which type of switching, do all the datagrams of a message follow the same
channel of a path
a) Circuit switching
b) Datagram packet switching
c) Virtual circuit packet switching
d) Message switching
……………………………………………………………………………………
……………………………………………………………………………………
19
Network, Transport 5. Which type of switching uses the entire capacity of a dedicated link
and Application
Layer a) Circuit switching
b) Datagram packet switching
c) Virtual circuit packet switching
d) Message switching
……………………………………………………………………………………
……………………………………………………………………………………
1. Version 4(IPv4)
2. Version 5(Ipv5)
3. Version 6(Ipv6)
IP addressing
The identifier used in the IP layer of the TCP/IP protocol suite to identify each device
connected to the Internet is called the Internet address or IP address.
OR
An IP address (Ipv4) is a 32-bit address that uniquely and universally defines the
connection of a host or a router to the Internet.
1. There is the binary notation which uses the base two number system to
represent numbers.
2. There is the decimal notation which uses the base ten number system to
represent numbers.
3. There is the hexadecimal notation which uses the base sixteen number system to
represent numbers.
Do you know?
An IP address is a 32-bit(4-bytes) address.
Example 1
Assume, IGNOU’s IP address is 142.190.23.180. This IP address consists of four
bytes. The first byte has the value of 142. The second byte has the value of 190. The
third byte has the value of 23, and the fourth byte has the value of 18.
Do you know?
IP addresses are unique.
20
IP addresses are unique in the sense that each address defines one, and only one, Network Layer
connection to the Internet. Two devices on the Internet can never have the same
address.
Do you know?
The address space of IPv4 is 232 or 4,294,967,296.
Notations of IP addresses
Example 1
Change the following IP addresses from binary notation to dotted-decimal notation.
Solution
We replace each group of 8 bits with its equivalent decimal number and add dots for
separation:
a) 129.11.11.239
b) 193.131.27.255
c) 231.219.139.111
d) 249.155.251.15
Example 2
Change the following IP addresses from dotted-decimal notation to binary notation.
a) 111.56.45.78
b) 221.34.7.82
c) 241.8.56.12
d) 75.45.34.78
Solution
We replace each decimal number with its binary equivalent:
a) 01101111 00111000 00101101 01001110
b) 11011101 00100010 00000111 01010010
c) 11110001 00001000 00111000 00001100
d) 01001011 00101101 00100010 01001110
Example 3
Find the error, if any, in the following IP addresses:
a) 111.56.045.78
b) 221.34.7.8.20
c) 75.45.301.14
d) 11100010.23.14.67
21
Network, Transport
and Application
Layer
Solution
a) There are no leading zeroes in dotted-decimal notation (045).
b) We may not have more than four numbers in an IP address.
c) In dotted-decimal notation, each number is less than or equal to 255; 301 is
outside this range.
d) A mixture of binary notation and dotted-decimal notation is not allowed.
Example 4
Change the following IP addresses from binary notation to hexadecimal notation.
Classless Inter-Domain a) 10000001 00001011 00001011 11101111
Routing allocates address b) 11000001 10000011 00011011 11111111
space to Internet service
providers and end users on
Solution
any address bit boundary,
instead of on 8-bit We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B).
segments. CIDR notation Note that hexadecimal notation normally has no added spaces or dots; however, 0X
is a syntax of specifying IP (or 0x) is added at the beginning or the subscript 16 at the end to show that the
addresses and their number is in hexadecimal.
associated routing prefix.
It appends to the address a a) 0X810B0BEF or 810B0BEF16
slash character and the
b) 0XC1831BFF or C1831BFF16
decimal number of leading
bits of the routing prefix,
e.g., 192.0.2.0/24 for IPv4 1.5.1 Classful Addressing
IP addresses, when started a few decades ago, used the concept of classes. This
architecture is called classful addressing. In the mid-1990s, a new architecture, called
classless addressing, was introduced and will eventually supersede the original
architecture. However, part of the Internet is still using classful addressing, but the
migration is very fast.
22
Figure 14: Address Spaces of IPv4 classes Network Layer
The way you recognize which class an IP address belongs to is by analyzing the first
byte. If the number in the first byte is between 0-127, then the IP address is in the
Class A range as shown in figure 15. If it is between 128-191 it is in Class B. If it is
between 192-223 it is in the Class C range. If it is between 224-239 it is in the Class D
range, and if it is between 240-255, then it belongs to Class E.
According to the figure 16, we can device a mechanism as given figure 17 for finding
the address class in binary notation like:
If first left most bit is 0 then it is class A
If first bit is 1 and second bit is 0 then it is class B
If first two bits are 1 and third bit is 0 then it is class C
If first three bits are 1 and fourth bit is 0 then it is class D
If all the four bits are 1 then it is class E
23
Network, Transport Figure 17: Finding the address class in binary notation
and Application
Layer
Example 5
How can we prove that we have 2,147,483,648 addresses in class A?
Solution
In class A, only 1 bit defines the class. The remaining 31 bits are available for the
address. With 31 bits, we can have 231 or 2,147,483,648 addresses.
Example 6
Find the class of each address:
a) 00000001 00001011 00001011 11101111
b) 11000001 10000011 00011011 11111111
c) 10100111 11011011 10001011 01101111
d) 11110011 10011011 11111011 00001111
Solution
a) The first bit is 0. This is a class A address.
b) The first 2 bits are 1; the third bit is 0. This is a class C address.
c) The first bit is 1; the second bit is 0. This is a class B address.
d) The first 4 bits are 1s. This is a class E address
Example 7
Find the class of each address:
a) 227.12.14.87
b) 193.14.56.22
c) 14.23.120.8
d) 252.5.15.111
e) 134.11.78.56
Solution
a) The first byte is 227 (between 224 and 239); the class is D.
b) The first byte is 193 (between 192 and 223); the class is C.
c) The first byte is 14 (between 0 and 127); the class is A.
d) The first byte is 252 (between 240 and 255); the class is E.
e) The first byte is 134 (between 128 and 191); the class is B.
Example 8
In Example 5 we showed that class A has 231 (2,147,483,648) addresses. How can
we prove this same fact using dotted-decimal notation?
Solution
The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show
that the difference between these two numbers is 2,147,483,648. This is a good
exercise because it shows us how to define the range of addresses between two
addresses. We notice that we are dealing with base 256 numbers here. Each byte in
the notation has a weight. The weights are as follows
2563, 2562, 2561, 2560
Now to find the integer value of each number, we multiply each byte by its weight:
24
Last address: 127 × 2563 + 255 × 2562 + Network Layer
Do you know?
Class D addresses are used for multicasting; there is only one block in this class and
Class E addresses are reserved for future purposes; most of the block is wasted.
In classful addressing the netid and hostid are easily distinguishable by looking at the
IP address. First you have to determine which class the IP address belongs to and from
there you can tell which part is the netid and which part is the hostid. If it is in Class
A, then the first byte represents the netid and the last three represent the hostid, and so
on.
That is why a new addressing scheme was devised. It is called classless addressing
because it doesn't use the classes which were used in classful addressing.
Do you know?
Millions of class A and class B addresses and are wasted in class full addressing
Do you know?
The number of addresses in class C is smaller than the needs of most organizations.
Example 9
25
Network, Transport Given the network address 17.0.0.0, find the class, the block, and the range of the
and Application addresses.
Layer
Solution
The class is A because the first byte is between 0 and 127. The block has a netid of
17. The addresses range from 17.0.0.0 to 17.255.255.255.
Example 10
Given the network address 132.21.0.0, find the class, the block, and the range of the
addresses.
Solution
The class is B because the first byte is between 128 and 191. The block has a netid of
132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
Example 11
Given the network address 220.34.76.0, find the class, the block, and the range of the
addresses.
Solution
class is C because the first byte is between 192 and 223. The block has a netid of
220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
26
Network Layer
1.6 FRAGMENTATION
Each network imposes some maximum size on its packets. A problem appears when a
large packet wants to travel through a network whose maximum packet size is too
small. One solution is to make sure the problem does not occur in the first place. In
other words, the internet should use a routing algorithm that avoids sending packets
through networks that cannot handle them. However, this solution is no solution at all.
What happens if the original source packet is too large to be handled by the
destination network? The routing algorithm can hardly bypass the destination.
Basically, the only solution to the problem is to allow gateways to break up packets
into fragments, sending each fragment as a separate internet packet. However,
converting a large object into small fragments is considerably easier than the reverse
process.
Two opposing strategies exist for recombining the fragments back into the original
packet.
1. Transparent Fragmentation
2. Non Transparent Fragmentation
Transparent Fragmentation
The first strategy is to make fragmentation caused by a “small-packet” network
transparent to any subsequent networks through which the packet must pass on its
way to the ultimate destination. This option is shown in Figure 19 (a). In this
approach, the small-packet network has gateways that interface to other networks.
When an oversized packet arrives at a gateway, the gateway breaks it up into
fragments. Each fragment is addressed to the same exit gateway, where the pieces are
recombined. In this way, passage through the small-packet network has been made
transparent. Subsequent networks are not even aware that fragmentation has occurred.
Do you know?
ATM networks have special hardware to provide transparent fragmentation of packets
into cells and then reassembly of cells into packets. In the ATM world, fragmentation
is called segmentation
2. All packets must exit via the same gateway. By not allowing some fragments to
follow one route to the ultimate destination and other fragments a disjoint route.
some performance may be lost.
27
Network, Transport 3. A last problem is the overhead required to repeatedly reassemble and then re-
and Application fragment a large packet passing through a series of small packet networks.
Layer
Tips
ATM requires transparent fragmentation.
Non Transparent fragmentation also has some problems. For example, it requires
every host to be able to do reassembly. Yet another problem is that when the large
packet is fragmented the total overhead increases, because each fragment must have a
header.
An advantage of this method is that multiple exit gateways can now be used and
higher performance can be achieved
When a packet is fragmented, the fragments must be numbered in such a way that the
original data stream can be reconstructed. One way of numbering the fragments is to
use a tree. If packet 0 must be split up, the pieces are called 0.0, 0.1, 0.2 etc. If these
fragments themselves must be fragmented later on, the pieces are numbered 0.0.0,
0.0.1, 0.0.2, ….0.1.2 etc. If enough fields have been reserved in the header for the
worst case and no duplicates generated anywhere, this scheme is sufficient to ensure
that all the pieces can be correctly reassembled at the destination, no matter what
order they arrive in.
However, if even one network loses or discards packets, end-to-end retransmissions
are needed, with unfortunate effects for the numbering system. Suppose that a 1024-
bit packet is initially fragmented into four equal-sized fragments, 0.0, 0.1, 0.2 and
0.3. Fragment 0.1 is lost, but the other parts arrive at the destination. Eventually, the
source times out and retransmits the original packet again. Only this time the route
taken passes through a network with a 512-bit limit, so two fragments are generated.
When the new fragment 0.1 arrives at the destination, the receiver will think that all
four pieces are now accounted for a reconstruct the packet incorrectly.
28
• when a datagram cannot reach its destination, Network Layer
• when the gateway does not have the buffering capacity to forward a datagram,
• When the gateway can direct the host to send traffic on a shorter route.
Do you know?
ICMP is considered an integral part of IP as shown in figure 20.
The Internet Protocol (IP) is not designed to be absolutely reliable. The purpose of
these control messages is to provide feedback about problems in the communication
environment, not to make IP reliable. There are still no guarantees that a datagram
will be delivered or a control message will be returned. Some datagrams may still be
undelivered without any report of their loss. The higher level protocols that use IP
must implement their own reliability procedures if reliable communication is required.
The ICMP messages typically report errors in the processing of datagrams. To avoid
the infinite regress of messages about messages etc., no ICMP messages are sent
about ICMP messages.
TIPS
ICMP provides error reporting, flow control and first-hop gateway redirection.
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Type Code ICMP header checksum
Data
4. Data. It is of variable length. It contains the data specific to the message type
indicated by the Type and Code fields
29
Network, Transport Types of ICMP messages
and Application
Layer Each ICMP message contains three fields that define its purpose and provide a
checksum. They are
• TYPE,
• CODE, and
• CHECKSUM fields (described above).
The TYPE field identifies the ICMP message, the CODE field provides further
information about the associated TYPE field, and the CHECKSUM provides a
method for determining the integrity of the message.
Tips
ICMP message are sent as packet so these are also called ICMP packet
Tips
ICMP messages are identified by "type" numbers
Tips
30
Internet Group Management Protocol (IGMP) is the protocol used to support Network Layer
multicasting.
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Type Code IGMP Checksum
Identifier
Group Address
Access Key
The fields can be described as follows
31
Network, Transport 2. Code. It is of 8 bits. In a Create Group Request message, this field indicates if
and Application the new host group is to be public or private. In all other Request messages, this
Layer field is set to zero.
In a Reply message, the Code field specifies the outcome of the request.
6. Access Key. This field is of 64 bits. In a Create Group Request message, the
access key field contains zero. In all other Request messages, the access key
field contains the access key assigned to the host group identified in the Group
Address field (zero for public groups). In a Create Group Reply message, the
access key field contains either a non-zero 64-bit number (if the request for a
private group is granted) or zero. In all other Reply messages, the access key
field contains the same access key as in the corresponding Request.
Do you know?
IGMP is defined in RFC 1112.
1.8 SUMMARY
In this unit, we studied various design issues of network layer. Network layer provides
best route from source to destination using adaptive routing algorithm like distance
vector routing and link state routing. A serous drawback of distance vector routing is
count to infinity problem. It is also responsible for congestion control using leaky
bucket and token leaky bucket algorithm. The four main protocols that operates on
network layer are ARP, RARP, ICMP, IGMP. Network layer mainly works on IP
address. IP addresses are 32bits.IP addresses have been divided into five classes
namely A,B,C,D,E.ICMP and .ICMP and IGMP are error reporting protocols.ARP
and RARP are used for address translation.
32
2. Computer Networks, A. S. Tanenbaum 4th Edition, Practice Hall of India, New Network Layer
Delhi. 2003.
3. Douglas E. Comer, Internetworking with TCP/IP Vol.1: Principles, Protocols, and
Architecture (4th Edition).
6. www. wikipedia.org
1.10 SOLUTION/ANSWERS
33