SlideShare a Scribd company logo
1 of 16
Internet Protocol
Internetwork
- Logical network built out of a collection of physical
networks to provide some host to host packet delivery
service.
Router – the node that interconnects the network.
Router is also called as gateway.
Internet Protocol
• Key tool used to build scalable, heterogeneous internetworks.
• Also called as Kahn – Cerf protocol.
Service model,
o Provide host to host services.
o Two parts,
- Addressing Scheme – to identify all the hosts in the internetwork.
- Datagram Model – for data delivery
Internet Protocol
Internet Protocol
 Also called as best effort model.
Best effort model,
 It makes no guarantee for datagram delivery.
 If packets gets lost, corrupted, misdelivered or it fails to reach
intended destination, it does nothing.
 Unreliable service.
Internet Protocol
IPv4 Packet Format
Internet Protocol
• Version (4 bit) – Version - version of the Internet Protocol.
• HLen (4 bit) – Header Length – specifies the length of the header in 32 bit
words. (Normally it contains value 5 i.e., 5 words – 20 Bytes).
• TOS (8 bit) – Type of Service–defines type of service that allows packets to be
treated differently based on the application need. (i.e., priority to packets)
• Length (8 bit) –length of the datagram including the header in bytes.
(Maximum value is 65,525 bytes).
Internet Protocol
• Identifier, flag, offset – used in fragmentation.
• Flag:
- DF- do not fragment bit. If this bit is 1, we cannot fragment that packet.
- M – More fragment bit. This bit is one when more fragments to follow.
• TTL (8 bit) –Time to live–number of seconds that the packet would be
allowed to live (default value is 64)
Reserved DF LF or M
Internet Protocol
• Protocol (8 bit) –demultiplexing key for higher level layer protocols.
• TCP – 6
• UDP – 17
• Checksum (16 bit) – used to detect errors in header.
- Checksum is calculated by considering the entire header as a sequence of 16 bit
words, adding them and taking the ones compliment of the result
• SourceAddr, DestAddr (32 bit each)–IP address of the source and destination
host.
Internet Protocol – Fragmentation and
Reassembly
Fragmentation and Reassembly,
• In a heterogeneous collection of networks, each network has its own
capacity to receive a packet called Maximum Transmission Unit (MTU).
• MTU – largest IP datagram that it can carry in a frame.
• Ethernet can accept up to 1500 bytes long packet. For FDDI, it is 4500
bytes long and for PPP 512 bytes long.
• Fragmentation occurs in a router when it receives a datagram that it wants
to forward over a network which has MTU <IP datagram size
Internet Protocol – Fragmentation and
Reassembly
• Reassembly is done at the receiving host
• All the fragments carry the same identifier in the Ident field
• IP does not recover any missing fragments.
Internet Protocol – Fragmentation and
Reassembly
Two important points,
• Each fragment is itself a self-contained IP datagram that is transmitted over
a sequence of physical networks, independent of other fragments.
• Each IP datagram is re-encapsulated for each physical network over which
it travels.
(a) Unfragmented packet (b) fragmented
packets
Internet Protocol – Fragmentation and
Reassembly
In the above mentioned model, fragmentation is occurred in R2 (router 2).
• When the packet (1400 bytes of data) arrives at R2, which has an MTU of 532
bytes, so it has to be fragmented.
• 532 bytes MTU can hold 512 bytes of data + 20 bytes of IP header.
• IP header fields used in fragmentation,
• Flags,
Reserved DF LF or M
lf (last fragment) or M (More fragment) bit – set when more fragments to follow.
Internet Protocol – Fragmentation and
Reassembly
• Offset – used to identify the starting byte of the fragment.
- In first fragment it sets to 0.
- Offset field counts 8 bytes.
- In our example, offset field in the second fragment is 64 i.e., 512 / 8.
• Ident (Identifier) – used to identify the packet to which the fragments
are belongs to.

More Related Content

What's hot

Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01
Rimba Ari
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
saryu2011
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
rajesh531
 

What's hot (20)

IPv6 header
IPv6 headerIPv6 header
IPv6 header
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Ipv4
Ipv4Ipv4
Ipv4
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 

Viewers also liked

3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
kavish dani
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
bwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
bwire sedrick
 
WIDE AREA NETWORK
WIDE AREA NETWORKWIDE AREA NETWORK
WIDE AREA NETWORK
Nur Ana
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 

Viewers also liked (20)

Chapter3
Chapter3Chapter3
Chapter3
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
 
Lan wan
Lan wanLan wan
Lan wan
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
 
WIDE AREA NETWORK
WIDE AREA NETWORKWIDE AREA NETWORK
WIDE AREA NETWORK
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Isdn networking
Isdn networkingIsdn networking
Isdn networking
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Networking
NetworkingNetworking
Networking
 

Similar to Internetworking - IP

Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
Bassam Kanber
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
NYversity
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 

Similar to Internetworking - IP (20)

Internet Protocol Version 4
Internet Protocol Version 4Internet Protocol Version 4
Internet Protocol Version 4
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Ipspk1
Ipspk1Ipspk1
Ipspk1
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Networking essentials lect2
Networking essentials lect2Networking essentials lect2
Networking essentials lect2
 
Basic networking
Basic networkingBasic networking
Basic networking
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Tcp
TcpTcp
Tcp
 
Internetworking
InternetworkingInternetworking
Internetworking
 

More from selvakumar_b1985

More from selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 
DNS
DNS DNS
DNS
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Internetworking - IP

  • 2. Internetwork - Logical network built out of a collection of physical networks to provide some host to host packet delivery service. Router – the node that interconnects the network. Router is also called as gateway.
  • 3.
  • 4. Internet Protocol • Key tool used to build scalable, heterogeneous internetworks. • Also called as Kahn – Cerf protocol. Service model, o Provide host to host services. o Two parts, - Addressing Scheme – to identify all the hosts in the internetwork. - Datagram Model – for data delivery
  • 6. Internet Protocol  Also called as best effort model. Best effort model,  It makes no guarantee for datagram delivery.  If packets gets lost, corrupted, misdelivered or it fails to reach intended destination, it does nothing.  Unreliable service.
  • 8. Internet Protocol • Version (4 bit) – Version - version of the Internet Protocol. • HLen (4 bit) – Header Length – specifies the length of the header in 32 bit words. (Normally it contains value 5 i.e., 5 words – 20 Bytes). • TOS (8 bit) – Type of Service–defines type of service that allows packets to be treated differently based on the application need. (i.e., priority to packets) • Length (8 bit) –length of the datagram including the header in bytes. (Maximum value is 65,525 bytes).
  • 9. Internet Protocol • Identifier, flag, offset – used in fragmentation. • Flag: - DF- do not fragment bit. If this bit is 1, we cannot fragment that packet. - M – More fragment bit. This bit is one when more fragments to follow. • TTL (8 bit) –Time to live–number of seconds that the packet would be allowed to live (default value is 64) Reserved DF LF or M
  • 10. Internet Protocol • Protocol (8 bit) –demultiplexing key for higher level layer protocols. • TCP – 6 • UDP – 17 • Checksum (16 bit) – used to detect errors in header. - Checksum is calculated by considering the entire header as a sequence of 16 bit words, adding them and taking the ones compliment of the result • SourceAddr, DestAddr (32 bit each)–IP address of the source and destination host.
  • 11. Internet Protocol – Fragmentation and Reassembly Fragmentation and Reassembly, • In a heterogeneous collection of networks, each network has its own capacity to receive a packet called Maximum Transmission Unit (MTU). • MTU – largest IP datagram that it can carry in a frame. • Ethernet can accept up to 1500 bytes long packet. For FDDI, it is 4500 bytes long and for PPP 512 bytes long. • Fragmentation occurs in a router when it receives a datagram that it wants to forward over a network which has MTU <IP datagram size
  • 12. Internet Protocol – Fragmentation and Reassembly • Reassembly is done at the receiving host • All the fragments carry the same identifier in the Ident field • IP does not recover any missing fragments.
  • 13. Internet Protocol – Fragmentation and Reassembly Two important points, • Each fragment is itself a self-contained IP datagram that is transmitted over a sequence of physical networks, independent of other fragments. • Each IP datagram is re-encapsulated for each physical network over which it travels.
  • 14. (a) Unfragmented packet (b) fragmented packets
  • 15. Internet Protocol – Fragmentation and Reassembly In the above mentioned model, fragmentation is occurred in R2 (router 2). • When the packet (1400 bytes of data) arrives at R2, which has an MTU of 532 bytes, so it has to be fragmented. • 532 bytes MTU can hold 512 bytes of data + 20 bytes of IP header. • IP header fields used in fragmentation, • Flags, Reserved DF LF or M lf (last fragment) or M (More fragment) bit – set when more fragments to follow.
  • 16. Internet Protocol – Fragmentation and Reassembly • Offset – used to identify the starting byte of the fragment. - In first fragment it sets to 0. - Offset field counts 8 bytes. - In our example, offset field in the second fragment is 64 i.e., 512 / 8. • Ident (Identifier) – used to identify the packet to which the fragments are belongs to.