© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.

Slides:



Advertisements
Similar presentations
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Network Layer Packet Forwarding IS250 Spring 2010
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 18 Introduction to Networks and the Internet.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
NET0183 Networks and Communications Lectures 19 and 20 Support Protocols: ARP and ICMP 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part XI Internetworking Part 2.4 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Network Layer Last Update Copyright Kenneth M. Chipps Ph.D.
Chapter 21: IP Encapsulation, Fragmentation & Reassembly
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 21 Internetworking Part 2 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Java EE Programming Internetworking. 2 Motivation for Internetworking LAN technologies provide high speed communication across short distances WAN technologies.
NET0183 Networks and Communications Lectures 15 and 16 Datagram Forwarding 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture powerpoints.
Internet Application Theory & Applications. Internet Application - Ibrahim Otieno SCI/ICT Building 2 nd Floor Rm.
Communications Services Connection Oriented Service  A connection is established  Data is sent or received over this connection  Connection may be terminated.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Chapter 21 IP Encapsulation, Fragmentation, and Reassembly.
1 IP Datagrams And Datagram Forwarding. 2 Motivation For IP Packets Because it can connect heterogeneous networks, a router cannot transmit a copy of.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
EECB 423 V.1 1 Internetworking 2 Datagram Encapsulation Transmission Fragmentation and Reassembly.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
INTERNET CONTROL MESSAGE PROTCOL. ICMP n allows router to send error or control messages to another router or host n provides communication between IP.
COMPUTER NETWORKS CS610 Lecture-30 Hammad Khalid Khan.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer & IP Protocol.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
IP - The Internet Protocol
Objective: ARP.
Computer Networks and Internets, 5e By Douglas E. Comer
Computer Networks and Internets, 5e By Douglas E. Comer
IP - The Internet Protocol
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
IP Encapsulation, Fragmentation, and Reassembly
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
IP - The Internet Protocol
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
NET 323D: Networks Protocols
Presentation transcript:

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas E. Comer Lecture PowerPoints By Lami Kaya,

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.2 Chapter 21 IP Encapsulation, Fragmentation, And Reassembly

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.3 Topics Covered 21.1 Introduction 21.2 Datagram Transmission And Frames 21.3 Encapsulation 21.4 Transmission Across An Internet 21.5 MTU, Datagram Size, And Encapsulation 21.6 Reassembly 21.7 Identifying A Datagram 21.8 Fragment Loss 21.9 Fragmenting A Fragment

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Introduction This chapter Concludes the discussion of IP by describing datagram transmission in detail Shows how a host or router sends a datagram across a physical NW Shows how routers handle the problem of sending large datagrams

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Datagram Transmission And Frames NW HW does not understand –datagram format or Internet addressing Each HW technology defines a frame format and a physical/HW addressing (HWA) scheme HW only accepts and delivers packets that –adhere to the specified frame format and use the specified HWA An internet can contain heterogeneous NW technology –the frame formats may differ

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Encapsulation How can a datagram be transmitted across a physical NW that does not understand the datagram format? –A technique known as “encapsulation” is used –IP encapsulation is similar to the encapsulation of ARP messages –When an IP datagram is encapsulated in a frame the entire datagram is placed in the data area of a frame How does a receiver know whether the data area in an incoming frame contains an IP datagram or other data? –The sender and receiver must agree on the value used in the frame type field

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.7

Transmission Across An Internet After the sender selects a next hop –the sender encapsulates the datagram in a frame –and it transmits the result across the physical NW to the next hop When the frame reaches the next hop –the receiving SW removes the IP datagram –and it discards the frame If the datagram must be forwarded across another NW Then a new frame is created Frame headers do not accumulate during a trip –When a datagram arrives in a NW frame The receiver extracts the datagram from the frame data area and discards the frame header

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.9

MTU, Datagram Size, And Encapsulation (1) Each HW technology specifies –the maximum amount of data that a frame can carry –the limit is known as a maximum transmission unit (MTU) A datagram must be smaller or equal to the NW MTU –Otherwise, it cannot be encapsulated for transmission In an internet that contains heterogeneous NWs –MTU restrictions can cause a problem Figure 21.3 illustrates a router that interconnects two NWs with MTU values of 1500 and 1000

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.11

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved MTU, Datagram Size, And Encapsulation (2) When a datagram > MTU –the router divides it into smaller pieces called fragments –and it sends each fragment independently A fragment has a similar format as other datagrams, but in the header –A bit in the FLAGS indicates whether a datagram is a fragment or a complete datagram –Other fields are assigned information that is used to reassemble –The FRAGMENT OFFSET field in the header of a fragment specifies where in the original datagram the fragment belongs A router uses the NW MTU and the datagram header size to calculate –the maximum amount of data that can be sent in each fragment –and the number of fragments that will be needed The router then –creates each fragment with a copy of the original header, –and then it modifies individual header fields.

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.13

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Reassembly The process of creating original datagram from fragments –called “reassembly” The fragment that carries the final piece of data has an additional bit set in the header –a receiver performing reassembly can tell whether all fragments have arrived successfully IP specifies that –the ultimate destination host should reassemble fragments Requiring the ultimate destination to reassemble fragments has two main advantages –1 st, it reduces the amount of state information in routers –2 nd, it allows routes to change dynamically

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.15

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Identifying A Datagram Recall that IP does not guarantee delivery –individual datagrams/fragments can be lost or arrive out-of-order How does IP SW reassemble fragments that arrive out of order? –Unique identification number in the IDENTIFICATION field When a router fragments the datagram –the identification number is placed into each fragment A receiver uses the identification number and IP source address in an incoming fragment –to determine the datagram to which the fragment belongs The FRAGMENT OFFSET field –tells a receiver how to order fragments within a given datagram

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Fragment Loss When one or more fragments from a datagram arrive, and some fragments are delayed or lost? –we must save the fragments in case missing fragments are only delayed A receiver cannot hold fragments an arbitrarily long time because fragments occupy space in the receiver's memory –To avoid exhausting memory IP specifies a maximum time to hold –When the first fragment arrives from a given datagram the receiver starts a timer –If all fragments of a datagram arrive before the timer expires the receiver cancels the timer and reassembles the datagram –If the timer expires before all fragments arrive the receiver discards those fragments that have arrived The result of IP's reassembly timer is all-or-nothing

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Fragmenting A Fragment What happens if a fragment eventually reaches another NW that has a smaller MTU? –Another router along the path divides into smaller fragments IP does not distinguish between original fragments and sub-fragments. –A receiver cannot know whether an incoming fragment was the result of one router fragmenting a datagram or multiple routers fragmenting fragments The advantage of making all fragments the same –is that a receiver can perform reassembly of the original datagram without first reassembling sub-fragments doing so saves CPU time and reduces the amount of information needed in the headers