Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.

Slides:



Advertisements
Similar presentations
Ch 20. Internet Protocol (IP) Internetworking PHY and data link layers operate locally.
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
U N I T - 3.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Internet Protocol/ Network Layer. 2 Position of IP in TCP/IP protocol suite.
IPv4 - The Internet Protocol Version 4
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Internet Protocol (IP)
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
1 Kyung Hee University Part 4 : Network Layer. 2 Kyung Hee University Role and Position of Network Layer o Network layer in the Internet model is responsible.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Dr. John P. Abraham Professor UTPA
Internet Protocol --- Connectionless Datagram Delivery Linda Wu (CMPT )
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ECE 4110 – Internetwork Programming IP Protocol. 2 * From TCP/IP Protocol Suite, B. A. Forouzan, Prentice Hall Position of IP in TCP/IP Protocol Suite.
Network Layer: Internet Protocol.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
Communications Services Connection Oriented Service  A connection is established  Data is sent or received over this connection  Connection may be terminated.
CS 4396 Computer Networks Lab
Chapter 20 Network Layer: Internet Protocol
Chapter 21 IP Encapsulation, Fragmentation, and Reassembly.
1 Kyung Hee University Chapter 8 Internet Protocol (IP)
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Chapter 8 Internet Protocol (IP)
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols
IP - The Internet Protocol
7 Network Layer Part IV Computer Networks Tutun Juhana
Chapter 7: The Infamous IP
Internet Protocol: Connectionless Datagram Delivery
IP - The Internet Protocol
Internet Protocol Version4
Internet Protocol (IP)
Chapter 20 Network Layer: Internet Protocol
Internet Protocol Version4
IP - The Internet Protocol
Chapter 7: The Infamous IP
Dr. John P. Abraham Professor UTPA
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
Chapter 20. Network Layer: IP
Net 323 D: Networks Protocols
IP - The Internet Protocol
Chapter 7 Internet Protocol Version 4 (IPv4)
Internet Protocol (IP)
Data Communication and Computer Networks
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
NET 323D: Networks Protocols
Presentation transcript:

Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed. Internet Protocol

IP Protocol IP is an unreliable and connectionless datagram protocol—a best-effort delivery service. The term best-effort means that IP packets can be corrupted, lost, arrive out of order, or delayed and may create congestion for the network.

IP Protocol

Datagram A packet in the IP layer is called a datagram. A variable-length packet consisting of two parts: Header - 20 to 60 bytes in length contains information essential to routing and delivery Data

IP Datagram

IP Format Version (VER) 4-bit field defines the version of the IP protocol. This field tells the IP software running in the processing machine that the datagram has the format of version 4. All fields must be interpreted as specified in the fourth version of the protocol. If the machine is using some other version of IP, the datagram is discarded rather than interpreted incorrectly.

IP Format Header length (HLEN) Differentiated Services (DS) 4-bit field defines the total length of the datagram header. Differentiated Services (DS) In the original design of IP header, this field was referred to as type of service (TOS), which defined how the datagram should be handled. Part of the field was used to define the precedence of the datagram; the rest defined the type of service (low delay, high throughput, and so on). IETF has changed the interpretation and name of this 8-bit field. Service type → differentiated services

Service Type or Differentiated Services

Service Type In this interpretation, the first 3 bits are called precedence bits. The next 4 bits are called TOS bits and the last bit is not used. Precedence – defined the priority of the datagram in issues such as congestion. TOS bits – a 4-bit subfield with each bit having a special meaning. A bit can be either 0 or 1. One and only one of the bits can have the value of 1 in each datagram.

Types of Service

Default types of service

Differentiated Services In this interpretation, the first 6 bits make up the codepoint subfield and the last two bits are not used. The codepoint subfield can be used in two different ways: When the 3 right-most bits are 0s, the 3 left-most bits are interpreted the same as the precedence bits in the service type interpretation. when the 3 right-most bits are not all 0s, the 6 bits define 64 services based on the priority assignment by the Internet or local authorities.

Values for Codepoints

Length of data= total length – header length A 16-bit field that defines the total length (H+D) of the IP datagram in bytes. To find the length of the data coming from the upper layer, subtract the header length from the total length. Length of data= total length – header length The header length can be found by multiplying the value in the HLEN field by four.

Encapsulation of a Small Datagram in an Ethernet Frame Why we need this field anyway?

IP Format (cont.) Identification, Flags, Fragmentation offset. This fields is used in fragmentation. Time to live Datagram has limited lifetime in its travel through an Internet. Protocol 8-bit field defines the higher-level protocol that uses the services of the IP layer.

Multiplexing

Protocols

IP Format (cont.) Checksum Source address. This 32-bit field defines the IP address of the source. This field must remain unchanged during the time the IP datagram travels from the source host to the destination host. Destination address. This 32-bit field defines the IP address of the destination. This field must remain unchanged during the time the IP datagram travels from the source host to the destination host.

Fragmentation A datagram can travel through different networks. Each router decapsulates the IP datagram from the frame it receives, processes it, and then encapsulates it in another frame. The format and size of a frame depend on the protocol used by the physical network. A datagram may have to be fragmented to fit the protocol regulations.

Maximum Transfer Unit Each data link layer protocol has its own frame format in most protocols. One of the fields defined in the format is the maximum size of the data field. The total size of the datagram must be less than this maximum size. The value of the MTU differs from one physical network protocol to another.

MTU

MTU for Some Networks

Fragmentation The IP protocol must be independent of the physical network. The designers decide to make the maximum length of the IP datagram equal to 65,535 bytes. For other physical networks, the datagram must be divided to pass through networks. A datagram can be fragmented by the source host or any router in the path.

Fragmentation When a datagram is fragmented, required parts of the header must be copied by all fragments. The host or router that fragments a datagram must change the values of three fields: Flags, fragmentation offset and total length. The rest of the field must be copied. The value of checksum must be recalculated regardless of fragmentation.

Fields Related to Fragmentation Identification 16-bit field defines a datagram originating from the source host. The combination of the identification and source IP address must be uniquely define a datagram as it leaves the source host. When a datagram is fragmented, the value in identification field is copied into all fragments. The identification number helps the destination in reassembling the datagram.

Flags A 3-bit field: The first bit is reserved. The second bit is called the do not fragment bit. If its value is 1, the machine must not fragment the datagram. If it cannot pass the datagram through any available physical network, it discards the datagram and sends an ICMP error message to the source host. The third bit is called the more fragment bit. If its value is 1, it means the datagram is not the last fragment; there are more fragments after this one.

Flags field

Fragmentation Offset 13-bit field shows the relative position of this fragment with respect to the whole datagram. It is used to specify where the fragment fits within the original IP datagram. It is the offset of the data in the original datagram measured in units of 8 bytes.