7 Network Layer Part IV Computer Networks Tutun Juhana

Slides:



Advertisements
Similar presentations
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Advertisements

Discussion Monday ( ). ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier header checksum time to live.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
U N I T - 3.
IPv4 - The Internet Protocol Version 4
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Internet Protocol (IP)
Network Layer Packet Forwarding IS250 Spring 2010
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
1 Internet Networking Spring 2005 Tutorial 2 IP Checksum, Fragmentation.
Oct 19, 2004CS573: Network Protocols and Standards1 IP: Datagram and Addressing Network Protocols and Standards Autumn
1 Internet Networking Spring 2002 Tutorial 2 IP Checksum, Fragmentation.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
1 Kyung Hee University Chapter 7 Internet Protocol Version 4 (IPv4)
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 5 Internet Protocol (IP) Basics.
Dr. John P. Abraham Professor UTPA
Internet Protocol --- Connectionless Datagram Delivery Linda Wu (CMPT )
ECE 4110 – Internetwork Programming IP Protocol. 2 * From TCP/IP Protocol Suite, B. A. Forouzan, Prentice Hall Position of IP in TCP/IP Protocol Suite.
The Internet Protocol Dr. Adil Yousif. 2  IP (Internet Protocol) is a Network Layer Protocol. Orientation.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
CS 4396 Computer Networks Lab
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
1 Kyung Hee University Chapter 8 Internet Protocol (IP)
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Chapter 8 Internet Protocol (IP)
Chapter 27 IPv6 Protocol.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Chapter 19 Network Layer Protocols
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
IP - The Internet Protocol
Internet Networking Spring 2002
Chapter 8: Internet Protocol (IP)
Chapter 7: The Infamous IP
8 Network Layer Part V Computer Networks Tutun Juhana
IP - The Internet Protocol
Internet Protocol Version4
Internet Protocol Version4
IP - The Internet Protocol
Chapter 7: The Infamous IP
Dr. John P. Abraham Professor UTPA
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
Chapter 20. Network Layer: IP
Net 323 D: Networks Protocols
IP - The Internet Protocol
Chapter 7 Internet Protocol Version 4 (IPv4)
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
Internet Protocol (IP)
IP datagram fields cont.
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
Fred Kuhns Applied Research Laboratory
NET 323D: Networks Protocols
Presentation transcript:

7 Network Layer Part IV Computer Networks Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung Computer Networks

Internet Protocol Version 4 (IPv4)

This is why we need Total Length field

FRAGMENTATION

Maximum Transfer Unit (MTU)

Maximum IP datagram length is 65,535 bytes We might have to divide the datagram to make it possible to pass through different physical networks  This is called fragmentation.

When a datagram is fragmented, each fragment has its own header with most of the fields repeated, but some changed A fragmented datagram may itself be fragmented if it encounters a network with an even smaller MTU (a datagram can be fragmented several times before it reaches the final destination) A datagram can be fragmented by the source host or any router in the path The reassembly of the datagram, however, is done only by the destination host

When a datagram is fragmented, required parts of the header must be copied by all fragments  The option field may or may not be copied The host or router that fragments a datagram must change the values of three fields: flags, fragmentation offset, and total length (The rest of the fields must be copied) The value of the checksum must be recalculated regardless of fragmentation.

Fields Related to Fragmentation Identification Flags Fragmentation offset

Identification 16 bit Identifies a datagram originating from the source host The combination of the identification and source IP address must uniquely define a datagram as it leaves the source host. When a datagram is fragmented, the value in the identification field is copied into all fragments  all fragments have the same identification number, which is also the same as the original datagram The identification number helps the destination in reassembling the datagram  all fragments having the same identification value should be assembled into one datagram

Flags D (Do not fragment) M (More fragments) not used D (Do not fragment) ‘1’ : machine must not fragment the datagram ‘0’ : datagram can be fragmented if necessary M (More fragments) ‘1’ : datagram is not the last datagram ‘0’ : This is the last or only fragment

Fragmentation offset This 13-bit field shows the relative position of this fragment with respect to the whole datagram. Measured in units of 8 bytes

the offset field is always relative to the original datagram identification The last fragment

Final destination host can reassemble the original datagram from the fragments received (if none of them is lost) using the following strategy: The first fragment has an offset field value of zero. Divide the length of the first fragment by 8. The second fragment has an offset value equal to that result. Divide the total length of the first and second fragment by 8. The third fragment has an offset value equal to that result. Continue the process. The last fragment has a more bit value of 0.

OPTIONS

Are not required for a datagram But all IP software implementations must be able to handle options if they are present in the header. Can be used for network testing and debugging.

Format type-length-value (TLV)

Option Types do not require the length or the data fields

No-Operation Option 1-byte option used as a filler between options

End-of-Option Option 1-byte option used for padding at the end of the option field. It can only be used as the last option Only one end-of-option option can be used  After this option, the receiver looks for the payload data  If more than 1 byte is needed to align the option field, some no-operation options must be used, followed by an end-of-option option

Record-Route Option is used to record the Internet routers that handle the datagram It can list up to nine router IP addresses Pointer field is an offset integer field containing the byte number of the first empty entry It points to the first available entry.

Strict-Source-Route Option used by the source to predetermine a route for the datagram as it travels through the Internet

Loose-Source-Route Option similar to the strict source route, but it is more relaxed Each router in the list must be visited, but the datagram can visit other routers as well.

Timestamp A timestamp option is used to record the time of datagram processing by a router The time is expressed in milliseconds from midnight, Universal Time.

Checksum

Checksum Calculation at the Sender The packet is divided into k sections, each of n bits. All sections are added together using one’s complement arithmetic. The final result is complemented to make the checksum.

Checksum in the IP Packet