CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Network Layer – IPv4 Dr. Sanjay P. Ahuja, Ph.D.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Network Layer Packet Forwarding IS250 Spring 2010
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Chapter 3 Review of Protocols And Packet Formats
ECE 526 – Network Processing Systems Design Packet Processing II: algorithms and data structures Chapter 5: D. E. Comer.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 18 Introduction to Networks and the Internet.
IP Routing, Format, Fragmentation Chapters 20-21, 23.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part XI Internetworking Part 2.4 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
Datagram Fragmentation, ICMP & IPv6
Network Layer Last Update Copyright Kenneth M. Chipps Ph.D.
Chapter 21: IP Encapsulation, Fragmentation & Reassembly
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
Dr. John P. Abraham Professor UTPA
Internet Protocol --- Connectionless Datagram Delivery Linda Wu (CMPT )
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 21 Internetworking Part 2 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
NET0183 Networks and Communications Lectures 15 and 16 Datagram Forwarding 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture powerpoints.
Internet Application Theory & Applications. Internet Application - Ibrahim Otieno SCI/ICT Building 2 nd Floor Rm.
Communications Services Connection Oriented Service  A connection is established  Data is sent or received over this connection  Connection may be terminated.
CS 4396 Computer Networks Lab
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Chapter 21 IP Encapsulation, Fragmentation, and Reassembly.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
EECB 423 V.1 1 Internetworking 2 Datagram Encapsulation Transmission Fragmentation and Reassembly.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
COMPUTER NETWORKS CS610 Lecture-30 Hammad Khalid Khan.
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
COMPUTER NETWORKS CS610 Lecture-32 Hammad Khalid Khan.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Chapter 5 Network and Transport Layers
Network Layer & IP Protocol.
IP - The Internet Protocol
Computer Networks and Internets, 5e By Douglas E. Comer
IP - The Internet Protocol
Internet Protocol (IP)
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
IP Encapsulation, Fragmentation, and Reassembly
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
IP - The Internet Protocol
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Network Fundamentals – Chapter 5
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
NET 323D: Networks Protocols
Review of Internet Protocols Network Layer
Presentation transcript:

CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly

Datagram Transmission and Frames The IP internet layer: constructs a datagram, determines the next hop, and hands the datagram to the network interface layer. The network interface layer: binds the next hop address to the hardware address, and prepares the datagram for transmission. But, the hardware frame doesn’t understand IP; how is the datagram transmitted?

Encapsulation The network interface layer encapsulates each IP datagram in the data area in the hardware frame The hardware ignores the IP datagram format. The standards for encapsulation describe the details. The standard defines the data type for an IP datagram, as well as others (e.g., ARP) The receiving protocol stack interprets the data area based on the frame type.

Encapsulation Across Multiple Hops Each router in the path from the source to the destination: unencapsulates incoming datagram from the frame; processes the datagram - determines next hop; and encapsulates the datagram in an outgoing frame. Datagram may be encapsulated in a different hardware format at each hop. The datagram itself is (almost!) unchanged.

Maximum Transmission Unit: MTU Every hardware technology specification includes the definition of the maximum size of a frame’s data area. This size is called the maximum transmission unit (MTU). Any datagram encapsulated in a hardware frame must be no larger than the MTU for that hardware.

MTU and Datagram Transmission IP datagrams can be larger than most hardware MTUs. For example IP: 2 16 – 1, or bytes Ethernet: 1500 bytes Token ring: 2048 or 4096 bytes The source can simply limit an IP datagram’s size to be no larger than the local MTU. Thus we must pass information about the local MTU up to TCP for TCP segments. But what about UDP datagrams? Aren’t these supposed to be treated as single “virtual frames?”

MTU and Heterogeneous Networks An internet may have networks with different MTUs. Suppose a “downstream” network has a smaller MTU than the local network. How is the hardware frame size handled in this case?

Fragmentation It is obvious that the larger frame cannot fit in the smaller frame. One technique to solve the problem is to limit a datagram’s size to the smallest MTU of any network in the internet. IP uses fragmentation - datagrams can be split into pieces to fit into a network with a smaller MTU than the current network. A router can detect that a datagram is larger than the next network’s MTU. It then splits the datagram into pieces, each of which is no larger than the outbound network’s MTU.

Fragmentation (Details) Each fragment is an independent datagram. It includes all IP datagram header fields. A bit in the header indicates the datagram is a fragment. Other fields have information for reconstructing original datagram. FRAGMENT OFFSET gives original location of fragment A router uses the local MTU to compute the size of each fragment. It puts part of the data from original datagram in each fragment. Additional information is placed in the header.

Datagram Reassembly Reconstruction of the original datagram is called reassembly. The ultimate destination performs reassembly. Fragments may arrive out of order; a header bit identifies the fragment containing the end of the data from the original datagram. In the example, fragment 3 would be identified as the last fragment.

Fragment Identification Inidivudal fragments must be associated with the original datagram. The IDENT field in each fragment matches the IDENT field in the original datagram. Fragments from different datagrams can arrive out of order and still be sorted out by : matching them using the IDENT field values; recognizing the last fragment from the bit set in its header; and recognizing when all fragments in an original datagram have been received.

Fragment Loss IP may drop a fragment (for many reasons). What happens to the original datagram in this case? A. The destination drops the entire original datagram. How does the destination identify a lost fragment? A timer is associated with each datagram. If the timer expires before all fragments arrive, one or more fragments are assumed lost, and … The entire datagram is dropped. The source (in the application layer protocol) is assumed to retransmit if necessary.

Fragmenting a Fragment A fragment may encounter a subsequent network with an even smaller MTU. The router fragments the fragment to fit that smaller MTU. The resulting “subfragments” look just like the original fragments, except for their sizes. There is no need to reassemble fragments hierarchically; “subfragments” include their position in original datagram in a header field.

Summary IP uses encapsulation to transmit datagrams in hardware frames. Network technologies have an MTU that limits the amount of data that a single frame can carry. IP uses fragmentation to carry datagrams larger than the network MTU.