SlideShare a Scribd company logo
20.1
Chapter 20
Network Layer:
Internet Protocol
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.2
20-1 INTERNETWORKING20-1 INTERNETWORKING
In this section, we discuss internetworking, connectingIn this section, we discuss internetworking, connecting
networks together to make an internetwork or annetworks together to make an internetwork or an
internet.internet.
Need for Network Layer
Internet as a Datagram Network
Internet as a Connectionless Network
Topics discussed in this section:Topics discussed in this section:
20.3
Figure 20.1 Links between two hosts
20.4
Figure 20.2 Network layer in an internetwork
20.5
Figure 20.3 Network layer at the source, router, and destination
20.6
Figure 20.3 Network layer at the source, router, and destination (continued)
20.7
Switching at the network layer in the
Internet uses the datagram approach to
packet switching.
Note
20.8
Communication at the network layer in
the Internet is connectionless.
Note
20.9
20-2 IPv420-2 IPv4
The Internet Protocol version 4 (The Internet Protocol version 4 (IPv4IPv4) is the delivery) is the delivery
mechanism used by the TCP/IP protocols.mechanism used by the TCP/IP protocols.
Datagram
Fragmentation
Checksum
Options
Topics discussed in this section:Topics discussed in this section:
20.10
Figure 20.4 Position of IPv4 in TCP/IP protocol suite
20.11
Figure 20.5 IPv4 datagram format
20.12
Figure 20.6 Service type or differentiated services
20.13
The precedence subfield was part of
version 4, but never used.
Note
20.14
Table 20.1 Types of service
20.15
Table 20.2 Default types of service
20.16
Table 20.3 Values for codepoints
20.17
The total length field defines the total
length of the datagram including the
header.
Note
20.18
Figure 20.7 Encapsulation of a small datagram in an Ethernet frame
20.19
Figure 20.8 Protocol field and encapsulated data
20.20
Table 20.4 Protocol values
20.21
An IPv4 packet has arrived with the first 8 bits as shown:
01000010
The receiver discards the packet. Why?
Solution
There is an error in this packet. The 4 leftmost bits (0100)
show the version, which is correct. The next 4 bits (0010)
show an invalid header length (2 × 4 = 8). The minimum
number of bytes in the header must be 20. The packet has
been corrupted in transmission.
Example 20.1
20.22
In an IPv4 packet, the value of HLEN is 1000 in binary.
How many bytes of options are being carried by this
packet?
Solution
The HLEN value is 8, which means the total number of
bytes in the header is 8 × 4, or 32 bytes. The first 20 bytes
are the base header, the next 12 bytes are the options.
Example 20.2
20.23
In an IPv4 packet, the value of HLEN is 5, and the value
of the total length field is 0x0028. How many bytes of
data are being carried by this packet?
Solution
The HLEN value is 5, which means the total number of
bytes in the header is 5 × 4, or 20 bytes (no options). The
total length is 40 bytes, which means the packet is
carrying 20 bytes of data (40 − 20).
Example 20.3
20.24
An IPv4 packet has arrived with the first few hexadecimal
digits as shown.
0x45000028000100000102 . . .
How many hops can this packet travel before being
dropped? The data belong to what upper-layer protocol?
Solution
To find the time-to-live field, we skip 8 bytes. The time-to-
live field is the ninth byte, which is 01. This means the
packet can travel only one hop. The protocol field is the
next byte (02), which means that the upper-layer protocol
is IGMP.
Example 20.4
20.25
Figure 20.9 Maximum transfer unit (MTU)
20.26
Table 20.5 MTUs for some networks
20.27
Figure 20.10 Flags used in fragmentation
20.28
Figure 20.11 Fragmentation example
20.29
Figure 20.12 Detailed fragmentation example
20.30
A packet has arrived with an M bit value of 0. Is this the
first fragment, the last fragment, or a middle fragment?
Do we know if the packet was fragmented?
Solution
If the M bit is 0, it means that there are no more
fragments; the fragment is the last one. However, we
cannot say if the original packet was fragmented or not. A
non-fragmented packet is considered the last fragment.
Example 20.5
20.31
A packet has arrived with an M bit value of 1. Is this the
first fragment, the last fragment, or a middle fragment?
Do we know if the packet was fragmented?
Solution
If the M bit is 1, it means that there is at least one more
fragment. This fragment can be the first one or a middle
one, but not the last one. We don’t know if it is the first
one or a middle one; we need more information (the
value of the fragmentation offset).
Example 20.6
20.32
A packet has arrived with an M bit value of 1 and a
fragmentation offset value of 0. Is this the first fragment,
the last fragment, or a middle fragment?
Solution
Because the M bit is 1, it is either the first fragment or a
middle one. Because the offset value is 0, it is the first
fragment.
Example 20.7
20.33
A packet has arrived in which the offset value is 100.
What is the number of the first byte? Do we know the
number of the last byte?
Solution
To find the number of the first byte, we multiply the offset
value by 8. This means that the first byte number is 800.
We cannot determine the number of the last byte unless
we know the length.
Example 20.8
20.34
A packet has arrived in which the offset value is 100, the
value of HLEN is 5, and the value of the total length field
is 100. What are the numbers of the first byte and the last
byte?
Solution
The first byte number is 100 × 8 = 800. The total length is
100 bytes, and the header length is 20 bytes (5 × 4), which
means that there are 80 bytes in this datagram. If the first
byte number is 800, the last byte number must be 879.
Example 20.9
20.35
Figure 20.13 shows an example of a checksum
calculation for an IPv4 header without options. The
header is divided into 16-bit sections. All the sections are
added and the sum is complemented. The result is
inserted in the checksum field.
Example 20.10
20.36
Figure 20.13 Example of checksum calculation in IPv4
20.37
Figure 20.14 Taxonomy of options in IPv4
20.38
20-3 IPv620-3 IPv6
The network layer protocol in the TCP/IP protocolThe network layer protocol in the TCP/IP protocol
suite is currently IPv4. Although IPv4 is well designed,suite is currently IPv4. Although IPv4 is well designed,
data communication has evolved since the inception ofdata communication has evolved since the inception of
IPv4 in the 1970s. IPv4 has some deficiencies thatIPv4 in the 1970s. IPv4 has some deficiencies that
make it unsuitable for the fast-growing Internet.make it unsuitable for the fast-growing Internet.
Advantages
Packet Format
Extension Headers
Topics discussed in this section:Topics discussed in this section:
20.39
Figure 20.15 IPv6 datagram header and payload
20.40
Figure 20.16 Format of an IPv6 datagram
20.41
Table 20.6 Next header codes for IPv6
20.42
Table 20.7 Priorities for congestion-controlled traffic
20.43
Table 20.8 Priorities for noncongestion-controlled traffic
20.44
Table 20.9 Comparison between IPv4 and IPv6 packet headers
20.45
Figure 20.17 Extension header types
20.46
Table 20.10 Comparison between IPv4 options and IPv6 extension headers
20.47
20-4 TRANSITION FROM IPv4 TO IPv620-4 TRANSITION FROM IPv4 TO IPv6
Because of the huge number of systems on theBecause of the huge number of systems on the
Internet, the transition from IPv4 to IPv6 cannotInternet, the transition from IPv4 to IPv6 cannot
happen suddenly. It takes a considerable amount ofhappen suddenly. It takes a considerable amount of
time before every system in the Internet can move fromtime before every system in the Internet can move from
IPv4 to IPv6. The transition must be smooth to preventIPv4 to IPv6. The transition must be smooth to prevent
any problems between IPv4 and IPv6 systems.any problems between IPv4 and IPv6 systems.
Dual Stack
Tunneling
Header Translation
Topics discussed in this section:Topics discussed in this section:
20.48
Figure 20.18 Three transition strategies
20.49
Figure 20.19 Dual stack
20.50
Figure 20.20 Tunneling strategy
20.51
Figure 20.21 Header translation strategy
20.52
Table 20.11 Header translation
10 April
 1
 2
 10
 16
 17
 18
 19
 25
 2620.53

More Related Content

PPT
Chapter 20
PPT
Chapter 20: Internet Protocol
PPT
Chapter 21
PPT
19 Network Layer_Logical_Addressing
PPTX
CN Unit 3
PPT
Chapter 19
PPT
Network Layer
Chapter 20
Chapter 20: Internet Protocol
Chapter 21
19 Network Layer_Logical_Addressing
CN Unit 3
Chapter 19
Network Layer

What's hot (20)

PDF
PDF
20CS2007 Computer Communication Networks
PPT
PPT
Chapter 22
PPT
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
PPT
Chapter 19: Logical Addressing
PDF
Ch19 network layer-logical add
PPTX
2 logical addressing
PDF
20CS2008 Computer Networks
PPT
4c Address Mapping, Error Reporting and Multicasting
PPTX
Logical addressing
PPT
13 Wired Lans_Ethernet
PPT
02 Network Models
DOCX
Classful and classless addressing
PPTX
IPv4 Addressing
PDF
Network Layer Numericals
PPT
network Addressing
PPT
Chapter6
20CS2007 Computer Communication Networks
Chapter 22
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
Chapter 19: Logical Addressing
Ch19 network layer-logical add
2 logical addressing
20CS2008 Computer Networks
4c Address Mapping, Error Reporting and Multicasting
Logical addressing
13 Wired Lans_Ethernet
02 Network Models
Classful and classless addressing
IPv4 Addressing
Network Layer Numericals
network Addressing
Chapter6
Ad

Similar to 20 Network Layer_Internet_Protocol (20)

PPT
Data communication and networking Network layer internet protocol . Ppt
PPT
4b internet protocol
PPT
PPT
ipv4 and ipv6 header presentation . subject Computer networks course code 306
PPT
Chap 08 ip
PPTX
IP datagram structure, ICMP,DHCP, NAT Introduction
PDF
C. N. II Lec.4.pdf h
PPT
Chap-05 classfull addrjjjjjjjjessing.ppt
PPT
1606660774-ip-addresses-classful-3.ppt
PPT
Computer Networks-5-A computer network is a set of computers sharing resource...
PPT
Explain the concepts of IP Addresses And Classes
PPTX
IPV4 and FRAGMENTATION in Computer Networks.pptx
PPT
Chap 12 tcp
PPT
Chap 12 tcp
DOCX
An IP datagram has arrived with the following information in the heade.docx
PPT
Chapter 13
PPTX
Internet protocol v6
Data communication and networking Network layer internet protocol . Ppt
4b internet protocol
ipv4 and ipv6 header presentation . subject Computer networks course code 306
Chap 08 ip
IP datagram structure, ICMP,DHCP, NAT Introduction
C. N. II Lec.4.pdf h
Chap-05 classfull addrjjjjjjjjessing.ppt
1606660774-ip-addresses-classful-3.ppt
Computer Networks-5-A computer network is a set of computers sharing resource...
Explain the concepts of IP Addresses And Classes
IPV4 and FRAGMENTATION in Computer Networks.pptx
Chap 12 tcp
Chap 12 tcp
An IP datagram has arrived with the following information in the heade.docx
Chapter 13
Internet protocol v6
Ad

More from Ahmar Hashmi (20)

PPT
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
PPT
31 Network Security
PPT
30 Cryptography
PPT
29 Multimedia
PPT
28 Network Management_SNMP
PPT
27 WWW and_HTTP
PPT
26 Remote Logging_Electronic_Mail_and_File_Transfer
PPT
25 DNS
PPT
24 Congestion Control_and_Quality_of_Service
PPT
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
PPT
22 Network Layer_Delivery_forwarding_and_Routing
PPT
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
PPT
17 SONET/SDH
PPT
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
PPT
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
PPT
14 Wireless LAN
PPT
12 Multiple Access
PPT
11 Data Link_Control
PPT
10 Error Detection_and_Correction
PPT
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
31 Network Security
30 Cryptography
29 Multimedia
28 Network Management_SNMP
27 WWW and_HTTP
26 Remote Logging_Electronic_Mail_and_File_Transfer
25 DNS
24 Congestion Control_and_Quality_of_Service
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
22 Network Layer_Delivery_forwarding_and_Routing
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
17 SONET/SDH
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
14 Wireless LAN
12 Multiple Access
11 Data Link_Control
10 Error Detection_and_Correction
09 Using Telephone_and_Cable_Networks_for_Data_Transmission

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Lesson notes of climatology university.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Institutional Correction lecture only . . .
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Basic Mud Logging Guide for educational purpose
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Lesson notes of climatology university.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial disease of the cardiovascular and lymphatic systems
O5-L3 Freight Transport Ops (International) V1.pdf
TR - Agricultural Crops Production NC III.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study
FourierSeries-QuestionsWithAnswers(Part-A).pdf
01-Introduction-to-Information-Management.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
GDM (1) (1).pptx small presentation for students
Institutional Correction lecture only . . .
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Renaissance Architecture: A Journey from Faith to Humanism
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Basic Mud Logging Guide for educational purpose

20 Network Layer_Internet_Protocol

  • 1. 20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 20.2 20-1 INTERNETWORKING20-1 INTERNETWORKING In this section, we discuss internetworking, connectingIn this section, we discuss internetworking, connecting networks together to make an internetwork or annetworks together to make an internetwork or an internet.internet. Need for Network Layer Internet as a Datagram Network Internet as a Connectionless Network Topics discussed in this section:Topics discussed in this section:
  • 3. 20.3 Figure 20.1 Links between two hosts
  • 4. 20.4 Figure 20.2 Network layer in an internetwork
  • 5. 20.5 Figure 20.3 Network layer at the source, router, and destination
  • 6. 20.6 Figure 20.3 Network layer at the source, router, and destination (continued)
  • 7. 20.7 Switching at the network layer in the Internet uses the datagram approach to packet switching. Note
  • 8. 20.8 Communication at the network layer in the Internet is connectionless. Note
  • 9. 20.9 20-2 IPv420-2 IPv4 The Internet Protocol version 4 (The Internet Protocol version 4 (IPv4IPv4) is the delivery) is the delivery mechanism used by the TCP/IP protocols.mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics discussed in this section:Topics discussed in this section:
  • 10. 20.10 Figure 20.4 Position of IPv4 in TCP/IP protocol suite
  • 11. 20.11 Figure 20.5 IPv4 datagram format
  • 12. 20.12 Figure 20.6 Service type or differentiated services
  • 13. 20.13 The precedence subfield was part of version 4, but never used. Note
  • 15. 20.15 Table 20.2 Default types of service
  • 16. 20.16 Table 20.3 Values for codepoints
  • 17. 20.17 The total length field defines the total length of the datagram including the header. Note
  • 18. 20.18 Figure 20.7 Encapsulation of a small datagram in an Ethernet frame
  • 19. 20.19 Figure 20.8 Protocol field and encapsulated data
  • 21. 20.21 An IPv4 packet has arrived with the first 8 bits as shown: 01000010 The receiver discards the packet. Why? Solution There is an error in this packet. The 4 leftmost bits (0100) show the version, which is correct. The next 4 bits (0010) show an invalid header length (2 × 4 = 8). The minimum number of bytes in the header must be 20. The packet has been corrupted in transmission. Example 20.1
  • 22. 20.22 In an IPv4 packet, the value of HLEN is 1000 in binary. How many bytes of options are being carried by this packet? Solution The HLEN value is 8, which means the total number of bytes in the header is 8 × 4, or 32 bytes. The first 20 bytes are the base header, the next 12 bytes are the options. Example 20.2
  • 23. 20.23 In an IPv4 packet, the value of HLEN is 5, and the value of the total length field is 0x0028. How many bytes of data are being carried by this packet? Solution The HLEN value is 5, which means the total number of bytes in the header is 5 × 4, or 20 bytes (no options). The total length is 40 bytes, which means the packet is carrying 20 bytes of data (40 − 20). Example 20.3
  • 24. 20.24 An IPv4 packet has arrived with the first few hexadecimal digits as shown. 0x45000028000100000102 . . . How many hops can this packet travel before being dropped? The data belong to what upper-layer protocol? Solution To find the time-to-live field, we skip 8 bytes. The time-to- live field is the ninth byte, which is 01. This means the packet can travel only one hop. The protocol field is the next byte (02), which means that the upper-layer protocol is IGMP. Example 20.4
  • 25. 20.25 Figure 20.9 Maximum transfer unit (MTU)
  • 26. 20.26 Table 20.5 MTUs for some networks
  • 27. 20.27 Figure 20.10 Flags used in fragmentation
  • 29. 20.29 Figure 20.12 Detailed fragmentation example
  • 30. 20.30 A packet has arrived with an M bit value of 0. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? Solution If the M bit is 0, it means that there are no more fragments; the fragment is the last one. However, we cannot say if the original packet was fragmented or not. A non-fragmented packet is considered the last fragment. Example 20.5
  • 31. 20.31 A packet has arrived with an M bit value of 1. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? Solution If the M bit is 1, it means that there is at least one more fragment. This fragment can be the first one or a middle one, but not the last one. We don’t know if it is the first one or a middle one; we need more information (the value of the fragmentation offset). Example 20.6
  • 32. 20.32 A packet has arrived with an M bit value of 1 and a fragmentation offset value of 0. Is this the first fragment, the last fragment, or a middle fragment? Solution Because the M bit is 1, it is either the first fragment or a middle one. Because the offset value is 0, it is the first fragment. Example 20.7
  • 33. 20.33 A packet has arrived in which the offset value is 100. What is the number of the first byte? Do we know the number of the last byte? Solution To find the number of the first byte, we multiply the offset value by 8. This means that the first byte number is 800. We cannot determine the number of the last byte unless we know the length. Example 20.8
  • 34. 20.34 A packet has arrived in which the offset value is 100, the value of HLEN is 5, and the value of the total length field is 100. What are the numbers of the first byte and the last byte? Solution The first byte number is 100 × 8 = 800. The total length is 100 bytes, and the header length is 20 bytes (5 × 4), which means that there are 80 bytes in this datagram. If the first byte number is 800, the last byte number must be 879. Example 20.9
  • 35. 20.35 Figure 20.13 shows an example of a checksum calculation for an IPv4 header without options. The header is divided into 16-bit sections. All the sections are added and the sum is complemented. The result is inserted in the checksum field. Example 20.10
  • 36. 20.36 Figure 20.13 Example of checksum calculation in IPv4
  • 37. 20.37 Figure 20.14 Taxonomy of options in IPv4
  • 38. 20.38 20-3 IPv620-3 IPv6 The network layer protocol in the TCP/IP protocolThe network layer protocol in the TCP/IP protocol suite is currently IPv4. Although IPv4 is well designed,suite is currently IPv4. Although IPv4 is well designed, data communication has evolved since the inception ofdata communication has evolved since the inception of IPv4 in the 1970s. IPv4 has some deficiencies thatIPv4 in the 1970s. IPv4 has some deficiencies that make it unsuitable for the fast-growing Internet.make it unsuitable for the fast-growing Internet. Advantages Packet Format Extension Headers Topics discussed in this section:Topics discussed in this section:
  • 39. 20.39 Figure 20.15 IPv6 datagram header and payload
  • 40. 20.40 Figure 20.16 Format of an IPv6 datagram
  • 41. 20.41 Table 20.6 Next header codes for IPv6
  • 42. 20.42 Table 20.7 Priorities for congestion-controlled traffic
  • 43. 20.43 Table 20.8 Priorities for noncongestion-controlled traffic
  • 44. 20.44 Table 20.9 Comparison between IPv4 and IPv6 packet headers
  • 46. 20.46 Table 20.10 Comparison between IPv4 options and IPv6 extension headers
  • 47. 20.47 20-4 TRANSITION FROM IPv4 TO IPv620-4 TRANSITION FROM IPv4 TO IPv6 Because of the huge number of systems on theBecause of the huge number of systems on the Internet, the transition from IPv4 to IPv6 cannotInternet, the transition from IPv4 to IPv6 cannot happen suddenly. It takes a considerable amount ofhappen suddenly. It takes a considerable amount of time before every system in the Internet can move fromtime before every system in the Internet can move from IPv4 to IPv6. The transition must be smooth to preventIPv4 to IPv6. The transition must be smooth to prevent any problems between IPv4 and IPv6 systems.any problems between IPv4 and IPv6 systems. Dual Stack Tunneling Header Translation Topics discussed in this section:Topics discussed in this section:
  • 48. 20.48 Figure 20.18 Three transition strategies
  • 51. 20.51 Figure 20.21 Header translation strategy
  • 53. 10 April  1  2  10  16  17  18  19  25  2620.53