20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Slides:



Advertisements
Similar presentations
Ch 20. Internet Protocol (IP) Internetworking PHY and data link layers operate locally.
Advertisements

Chapter 20 Network Layer: Internet Protocol
Internet Protocol/ Network Layer.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
U N I T - 3.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Internet Protocol/ Network Layer. 2 Position of IP in TCP/IP protocol suite.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Internet Protocol (IP)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 27 IPv6 Protocol.
1 K. Salah Module 5.2: Internet Protocol CO vs. CL protocols IP Features –Fragmentation –Routing IP Datagram Format IPv6.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
Process-to-Process Delivery:
1 Kyung Hee University Part 4 : Network Layer. 2 Kyung Hee University Role and Position of Network Layer o Network layer in the Internet model is responsible.
Module 10. Internet Protocol (IP) is the routed protocol of the Internet. IP addressing enables packets to be routed from source to destination using.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 4 Introduction to Network.
1 Kyung Hee University Chapter 7 Internet Protocol Version 4 (IPv4)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ECE 4110 – Internetwork Programming IP Protocol. 2 * From TCP/IP Protocol Suite, B. A. Forouzan, Prentice Hall Position of IP in TCP/IP Protocol Suite.
Network Layer: Internet Protocol.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
Communications Services Connection Oriented Service  A connection is established  Data is sent or received over this connection  Connection may be terminated.
Chapter 20 Network Layer: Internet Protocol
1 Kyung Hee University Chapter 8 Internet Protocol (IP)
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Chapter 8 Internet Protocol (IP)
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
1 Kyung Hee University Chapter 19 Network Layer: Logical Addressing.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Chapter Outline 27.1 Introduction 27.2 Packet Format
Internet Protocol Version4
Chapter 20 Network Layer: Internet Protocol
Internet Protocol Version4
Dr. John P. Abraham Professor UTPA
Network Layer: Logical Addressing
Chapter 20 Network Layer: Internet Protocol
Chapter 27 IPv6 Protocol TCP/IP Protocol Suite
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Chapter 27 IPv6 Protocol TCP/IP Protocol Suite
Dr. John P. Abraham Professor UTPA
Chapter 20. Network Layer: IP
Net 323 D: Networks Protocols
Chapter 7 Internet Protocol Version 4 (IPv4)
Internet Protocol (IP)
Data Communication and Computer Networks
NET 323D: Networks Protocols
Presentation transcript:

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

INTERNETWORKING In this section, we discuss internetworking, connecting networks together to make an internetwork or an internet. Need for Network Layer Internet as a Datagram Network Internet as a Connectionless Network Topics discussed in this section:

20.3 Figure 20.1 Links between two hosts

Internetworking Figure 20.1 Physical and Data-link layers are responsible for data delivery on the network from one node to the next. To solve the problem of delivery through several links the network layer was designed. Figure

20.5 Figure 20.2 Network layer in an internetwork

Internetworking Figure 20.3 shows the general idea of the functionality of the network layer at a source, at a router, and at a the destination. The network layer at the source is responsible for creating a packet from a data coming from another protocol. It is also responsible for checking its routing table to find the routing information. 20.6

Internetworking The network layer at the router is responsible for routing the packet. When a packet arrives, the router consults its routing table and finds the interface from which the packet must be sent. 20.7

Internetworking The network layer at the destination is responsible for address verification. It make sure that the destination address on the packet is the same as the address of the host. 20.8

20.9 Figure 20.3 Network layer at the source, router, and destination

20.10 Figure 20.3 Network layer at the source, router, and destination (continued)

Internet as a Datagram Network Packet-switching uses either the virtual circuit approach or the datagram approach. The Internet uses datagram approach to packet switching at the network layer. It uses the universal addresses defined in the network layer to route packets from the source to the destination

Internet as a Connectionless Network There are two services provided by network layer: Connection-oriented service Connectionless service 20.12

Internet as a Connectionless Network There are two services provided by network layer: Connection-oriented service Path first is established prior to send data Packets sent on the same path and in sequential order. used in virtual-circuit approach, such as Frame relay, and ATM 20.13

Internet as a Connectionless Network There are two services provided by network layer: Connectionless service Each packet is treated independently. Packets may or may not travel on the same path to the destination. used in datagram approach, The Internet has chosen this type of service at the network layer

IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics discussed in this section:

IPv4 IPv4 is the delivery mechanism used by TCP/IP protocols. IPv4 is unreliable and connectionless protocol. (best-effort delivery service). IPv4 provides no error control or flow control (no guarantee). Reliability can be achieved by pairing IPv4 with a reliable protocol such as TCP

20.17 Figure 20.4 Position of IPv4 in TCP/IP protocol suite

Datagram Packets in the IPv4 layer are called datagrams. A datagram is a variable-length packet consisting of two parts: header and data. The header contains information essential to routing and delivery

20.19 Figure 20.5 IPv4 datagram format

20.20 Figure 20.6 Service type or differentiated services

Service Type & Differentiated services TOS: ( ) bits Precedence is a 3-bits subfield (0 -7) defines the priority of a datagram in issues such as congestion. Precedence was part of version 4, but never used

20.22 Table 20.1 Types of service

20.23 Table 20.2 Default types of service

Service Type & Differentiated services DS: (6 + 2) bits 6 bits defines 64 services 20.24

20.25 The total length field defines the total length of the datagram including the header. Note

20.26 Figure 20.7 Encapsulation of a small datagram in an Ethernet frame

20.27 Figure 20.8 Protocol field and encapsulated data

20.28 Table 20.4 Protocol values

20.29 An IPv4 packet has arrived with the first 8 bits as shown: The receiver discards the packet. Why? Solution There is an error in this packet. The 4 leftmost bits (0100) show the version, which is correct. The next 4 bits (0010) show an invalid header length (2 × 4 = 8). The minimum number of bytes in the header must be 20. The packet has been corrupted in transmission. Example 20.1

20.30 In an IPv4 packet, the value of HLEN is 1000 in binary. How many bytes of options are being carried by this packet? Solution The HLEN value is 8, which means the total number of bytes in the header is 8 × 4, or 32 bytes. The first 20 bytes are the base header, the next 12 bytes are the options. Example 20.2

Fragmentation A datagram can travel through different networks. Each router decapsulates the IPv4 datagram from the frame it receives, processes it, and then encapsulates it in another frame. The format and size of the received and sent frame depend on the protocol used by the physical network. For example from LAN to WAN 20.31

20.32 Figure 20.9 Maximum transfer unit (MTU)

20.33 Table 20.5 MTUs for some networks

20.34 Figure Flags used in fragmentation

20.35 Figure Fragmentation example

20.36 Figure Detailed fragmentation example

20.37 A packet has arrived with an M bit value of 0. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? Solution If the M bit is 0, it means that there are no more fragments; the fragment is the last one. However, we cannot say if the original packet was fragmented or not. A non-fragmented packet is considered the last fragment. Example 20.5

20.38 A packet has arrived with an M bit value of 1. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? Solution If the M bit is 1, it means that there is at least one more fragment. This fragment can be the first one or a middle one, but not the last one. We don’t know if it is the first one or a middle one; we need more information (the value of the fragmentation offset). Example 20.6

20.39 A packet has arrived with an M bit value of 1 and a fragmentation offset value of 0. Is this the first fragment, the last fragment, or a middle fragment? Solution Because the M bit is 1, it is either the first fragment or a middle one. Because the offset value is 0, it is the first fragment. Example 20.7

20.40 A packet has arrived in which the offset value is 100. What is the number of the first byte? Do we know the number of the last byte? Solution To find the number of the first byte, we multiply the offset value by 8. This means that the first byte number is 800. We cannot determine the number of the last byte unless we know the length. Example 20.8

20.41 A packet has arrived in which the offset value is 100, the value of HLEN is 5, and the value of the total length field is 100. What are the numbers of the first byte and the last byte? Solution The first byte number is 100 × 8 = 800. The total length is 100 bytes, and the header length is 20 bytes (5 × 4), which means that there are 80 bytes in this datagram. If the first byte number is 800, the last byte number must be 879. Example 20.9

20.42 Figure shows an example of a checksum calculation for an IPv4 header without options. The header is divided into 16-bit sections. All the sections are added and the sum is complemented. The result is inserted in the checksum field. Example 20.10

20.43 Figure Taxonomy of options in IPv4

IPv6 The network layer protocol in the TCP/IP protocol suite is currently IPv4. Although IPv4 is well designed, data communication has evolved since the inception of IPv4 in the 1970s. IPv4 has some deficiencies that make it unsuitable for the fast-growing Internet. Advantages Packet Format Extension Headers Topics discussed in this section:

20.45 Figure IPv6 datagram header and payload

20.46 Figure Format of an IPv6 datagram

20.47 Table 20.6 Next header codes for IPv6

20.48 Table 20.7 Priorities for congestion-controlled traffic

20.49 Table 20.8 Priorities for noncongestion-controlled traffic

20.50 Table 20.9 Comparison between IPv4 and IPv6 packet headers

TRANSITION FROM IPv4 TO IPv6 Because of the huge number of systems on the Internet, the transition from IPv4 to IPv6 cannot happen suddenly. It takes a considerable amount of time before every system in the Internet can move from IPv4 to IPv6. The transition must be smooth to prevent any problems between IPv4 and IPv6 systems. Dual Stack Tunneling Header Translation Topics discussed in this section:

20.52 Figure Three transition strategies

20.53 Figure Dual stack

20.54 Figure Tunneling strategy

20.55 Figure Header translation strategy

20.56 Table Header translation