SlideShare a Scribd company logo
Internet Protocol Version 4 (IPv4)
Learning Outcome
• At the end of this lecture, students will be
able to,
– Explain the format of an IPv4 datagram.
– Describe Fragmentation and reassembly of
datagrams.
2
• Where IP is positioned in the TCP/IP
protocol suite?
3
Recall
Fig. 1. Network Layer
IGMP
IP
ARP
ICMP
Datagrams
4
• Datagram – packets in Internet i.e. Network Layer.
• Variable-length packet.
• Includes two parts-
– Header
– Data
• Header is 20 to 60 bytes in length which contains
information which is essential for routing and
delivery.
Internet Protocol(IP)
5
• Major protocol in TCP/IP Protocol suite.
• Works at Network Layer of OSI model and at Internet
Layer of TCP/IP model.
• Responsibility
– Identification of hosts based on their logical addresses
– Route data among them over the network
• Provides mechanism for identification of hosts by using an
IP addressing scheme.
Fig. 2. IP Datagram
DataHeader
20-60 bytes
20 - 65535 bytes
IP Header Format
6
Fig. 3. IP Header Format
VER
4 bits
HLEN
4 bits
Service type
8 bits
Total length
16 bits
Identification
16 bits
Flags
3 bits
Fragmentation offset
13 bits
Time to live
8 bits
Protocol
8 bits
Header checksum
16 bits
Source IP address
Destination IP address
Options + padding
(0 to 40 bytes)
0 3 4 7 8 15 16 31
7
IP Header Format
• VER(4 bits)
– Version number of internet protocol used.
• HLEN(4 bits)
– Length of the entire IP header.
• Service type(8 bits)
– Services code points which indicates type of service.
• Total length(16 bits)
– Length of entire IP packet including IP header and IP payload.
• Identification(16 bits)
– Used to identify the all the fragments of original IP packet.
– IP packet is fragmented during the transmission.
8
IP Header Format
• Flags(3 bits)
– If IP packet is too large then these flags tells if they can be
fragmented or not.
• Fragmentation offset(13 bits)
– Used to indicate the exact position of the fragment in the original
IP packet.
• Time to live(8 bits)
– Tells network that how many hops (routers) that packet can cross.
• Protocol(8 bits)
– Tells network layer at destination host that to which protocol this
packet belongs to i.e. next level protocol.(1-ICMP,6-TCP,17-UDP)
9
IP Header Format
• Header checksum(16 bits)
– Keeps the checksum value for entire header.
– Used to check if the received packet is error free or not.
• Source IP address(32 bits)
– Address of the sender of the packet.
• Destination IP address(32 bits)
– Address of the receiver of the packet.
• Options
– It may contains values for options such as Security, Record route,
Time stamp, etc.
10
• Datagram travel through different networks.
• Each network has its own MTU(Maximum Transfer Unit).
• If MTU is smaller than the received IP Packet size then
fragmentation is done by the router.
• Every router does the decapsulation of the IP datagram
from the frame it receives, process it, and again
encapsulate it into the another frame.
• The format and size of the received and sent frame
depends on the protocol used by the physical network
through which frame has just traveled or the frame is going
to travel respectively.
Fragmentation
11
4020
14,567 1 000
Bytes 0000-3999
Fragmentation Example
1420
14,567 1 000
Bytes 0000-1399
1420
14,567 1 175
Bytes 1400-2799
1220
14,567 0 350
Bytes 2800-3999
820
14,567 1 175
Bytes 1400-2199
620
14,567 1 275
Bytes 2200-2799
Original Datagram
Fragment 2.2
Fragment 2.1
Fragment 3
Fragment 2
Fragment 1
12
• Reconstruction of original datagram from multiple
fragments.
• Is done at the end nodes or destination only.
• Which reduces unnecessary work where large packets are
fragmented multiple times if reassembly is done at every
node.
• Need buffer for reassembly at receiver side.
• Fragments may arrive in any order. Some fragments may
never arrive then all fragments received with same
identification number are discarded.
Reassembly
References
• “Computer Networks” by Andrew S.
Tanenbaum 4th edition by Pearson.
13
Thank You
14

More Related Content

What's hot

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Token ring protocol
Token ring protocolToken ring protocol
Token ring protocol
priyabogra1
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
Ram Dutt Shukla
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
Gorantla Mohanavamsi
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
Tapan Khilar
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
Peter R. Egli
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
Heba_a
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
Tapan Khilar
 
Network switch
Network switchNetwork switch
Network switch
Tapan Khilar
 
Snmp
SnmpSnmp
Lan technologies
Lan technologiesLan technologies
Lan technologies
Manusha Dilan
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
ChAwais15
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
hazimalghalayini
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
Mukesh Chinta
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
IPv6 address
IPv6 addressIPv6 address
IPv6 address
Pina Parmar
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Jayesh Chauhan
 

What's hot (20)

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Token ring protocol
Token ring protocolToken ring protocol
Token ring protocol
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
 
Network switch
Network switchNetwork switch
Network switch
 
Snmp
SnmpSnmp
Snmp
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
IPv6 address
IPv6 addressIPv6 address
IPv6 address
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 

Similar to Internet Protocol Version 4

10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
Palanivel Kuppusamy
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
selvakumar_b1985
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
Programmer
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
Hitesh Mohapatra
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Ghaffar Khan
 
Unit-2_CN.pdf
Unit-2_CN.pdfUnit-2_CN.pdf
Unit-2_CN.pdf
MayankRaj687571
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
Meenakshi Paul
 
lecture08.ppt
lecture08.pptlecture08.ppt
lecture08.ppt
tumainjoseph
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
VINAYTANWAR18
 
Networking essentials lect2
Networking essentials lect2Networking essentials lect2
Networking essentials lect2
Roman Brovko
 
Ipspk1
Ipspk1Ipspk1
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
Ramakrishna Kongalla
 
Tcp ip
Tcp ipTcp ip
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
GreenSignal
 
Ipv4
Ipv4Ipv4
Tcpip
TcpipTcpip
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
IOSR Journals
 

Similar to Internet Protocol Version 4 (20)

10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Unit-2_CN.pdf
Unit-2_CN.pdfUnit-2_CN.pdf
Unit-2_CN.pdf
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
lecture08.ppt
lecture08.pptlecture08.ppt
lecture08.ppt
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 
Networking essentials lect2
Networking essentials lect2Networking essentials lect2
Networking essentials lect2
 
Ipspk1
Ipspk1Ipspk1
Ipspk1
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
Ipv4
Ipv4Ipv4
Ipv4
 
Tcpip
TcpipTcpip
Tcpip
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 

Recently uploaded

5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 

Recently uploaded (20)

5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 

Internet Protocol Version 4

  • 2. Learning Outcome • At the end of this lecture, students will be able to, – Explain the format of an IPv4 datagram. – Describe Fragmentation and reassembly of datagrams. 2
  • 3. • Where IP is positioned in the TCP/IP protocol suite? 3 Recall Fig. 1. Network Layer IGMP IP ARP ICMP
  • 4. Datagrams 4 • Datagram – packets in Internet i.e. Network Layer. • Variable-length packet. • Includes two parts- – Header – Data • Header is 20 to 60 bytes in length which contains information which is essential for routing and delivery.
  • 5. Internet Protocol(IP) 5 • Major protocol in TCP/IP Protocol suite. • Works at Network Layer of OSI model and at Internet Layer of TCP/IP model. • Responsibility – Identification of hosts based on their logical addresses – Route data among them over the network • Provides mechanism for identification of hosts by using an IP addressing scheme. Fig. 2. IP Datagram DataHeader 20-60 bytes 20 - 65535 bytes
  • 6. IP Header Format 6 Fig. 3. IP Header Format VER 4 bits HLEN 4 bits Service type 8 bits Total length 16 bits Identification 16 bits Flags 3 bits Fragmentation offset 13 bits Time to live 8 bits Protocol 8 bits Header checksum 16 bits Source IP address Destination IP address Options + padding (0 to 40 bytes) 0 3 4 7 8 15 16 31
  • 7. 7 IP Header Format • VER(4 bits) – Version number of internet protocol used. • HLEN(4 bits) – Length of the entire IP header. • Service type(8 bits) – Services code points which indicates type of service. • Total length(16 bits) – Length of entire IP packet including IP header and IP payload. • Identification(16 bits) – Used to identify the all the fragments of original IP packet. – IP packet is fragmented during the transmission.
  • 8. 8 IP Header Format • Flags(3 bits) – If IP packet is too large then these flags tells if they can be fragmented or not. • Fragmentation offset(13 bits) – Used to indicate the exact position of the fragment in the original IP packet. • Time to live(8 bits) – Tells network that how many hops (routers) that packet can cross. • Protocol(8 bits) – Tells network layer at destination host that to which protocol this packet belongs to i.e. next level protocol.(1-ICMP,6-TCP,17-UDP)
  • 9. 9 IP Header Format • Header checksum(16 bits) – Keeps the checksum value for entire header. – Used to check if the received packet is error free or not. • Source IP address(32 bits) – Address of the sender of the packet. • Destination IP address(32 bits) – Address of the receiver of the packet. • Options – It may contains values for options such as Security, Record route, Time stamp, etc.
  • 10. 10 • Datagram travel through different networks. • Each network has its own MTU(Maximum Transfer Unit). • If MTU is smaller than the received IP Packet size then fragmentation is done by the router. • Every router does the decapsulation of the IP datagram from the frame it receives, process it, and again encapsulate it into the another frame. • The format and size of the received and sent frame depends on the protocol used by the physical network through which frame has just traveled or the frame is going to travel respectively. Fragmentation
  • 11. 11 4020 14,567 1 000 Bytes 0000-3999 Fragmentation Example 1420 14,567 1 000 Bytes 0000-1399 1420 14,567 1 175 Bytes 1400-2799 1220 14,567 0 350 Bytes 2800-3999 820 14,567 1 175 Bytes 1400-2199 620 14,567 1 275 Bytes 2200-2799 Original Datagram Fragment 2.2 Fragment 2.1 Fragment 3 Fragment 2 Fragment 1
  • 12. 12 • Reconstruction of original datagram from multiple fragments. • Is done at the end nodes or destination only. • Which reduces unnecessary work where large packets are fragmented multiple times if reassembly is done at every node. • Need buffer for reassembly at receiver side. • Fragments may arrive in any order. Some fragments may never arrive then all fragments received with same identification number are discarded. Reassembly
  • 13. References • “Computer Networks” by Andrew S. Tanenbaum 4th edition by Pearson. 13