SlideShare una empresa de Scribd logo
1 de 37
Internet Protocol
Introduction
 Fundamental Internet communication service

 Format of packets

 Processing of packets by Routers

   Forwarding
   Delivery
Connectionless service
 End-to-end delivery service is connectionless

 Extension of LAN abstraction
    Universal addressing
    Data delivered in packets (frames), each with a header

 Combines collection of physical networks into single, virtual network.
Connectionless service
       Transport protocols use this connectionless service to
        provide:

          Connectionless data delivery (UDP)

    and

          Connection-oriented data delivery (TCP)
Virtual Packets

 Packets serve same purpose in internet as frames on LAN.

 Each has a header.

 Routers (formerly gateways) forward between physical networks.
Virtual Packets
 Packets have a uniform, hardware-independent format.
    Includes header and data.
    Can't use format from any particular hardware.

 Encapsulated in hardware frames for delivery across each physical network.
IP Datagram Format
 Formally, the unit of IP data delivery was called a Datagram.
 Includes header area and data area.
IP Datagram Size
 Datagrams can have different sizes:

   Header area usually fixed (20 octets) but can have options.

   Data area can contain between 1 octet and 65,535 octets (216 -
    1).

   Usually, data area is much larger than header.
Forwarding Datagrams
 Header contains all information needed to deliver
 datagram to the destination computer.
     Destination address
     Source address
     Identifier
     Other delivery information

 Router examines header of each datagram and forwards
 datagram along path to destination.
Routing Table
 For efficiency, information about forwarding is stored in a
 routing table.
   Initialized at system initialization.
   Must be updated as network topology changes.

 Contains list of destination networks and next hop for each
 destination.
Routing Table
Routing Tables & Address Masks
   In practice, additional information is kept in routing table.
   Destination stored as network address.
   Next hop stored as IP address of router.
   Address mask defines how many bits of address are in
    prefix.
     Prefix defines how much of address used to identify network.
     E.g., class A mask is 255.0.0.0.
     Used for subnetting.
Routing Tables & Address Masks
Address Masks
 To identify destination network, apply address mask to
 destination address and compare to network address in
 routing table.

 Can use Boolean and
 if ((Mask[i] & D) == Dest[i]) forward to NextHop[i].
Address Masks
Forwarding, Destination Address and Next-hop

 Destination address in IP datagram is always ultimate
  destination.
 Router looks up next-hop address and forwards datagram.
 Network interface layer takes two parameters:
   IP datagram
   Next-hop address
 Next-hop address never appears in IP datagram.
Best-Effort Delivery
 IP provides service equivalent to LAN.

 Does not guarantee to prevent:

     Duplicate datagrams
     Delayed or out-of-order delivery
     Corruption of data
     Datagram loss
Best-Effort Delivery

 Reliable delivery provided by Transport layer
 Network layer - IP - can detect and report errors without
 actually fixing them.
   Network layer focuses on datagram delivery.
   Application layer not is interested in differentiating among
    delivery problems at intermediate routers.
IP Datagram Header Format
IP Datagram Header Format
 VERS - version of IP (currently 4)

 H. LEN - header length (in units of 32 bits)

 SERVICE TYPE - sender's preference for low latency, high
 reliability (rarely used)

 TOTAL LENGTH - total octets in datagram

 IDENT, FLAGS, FRAGMENT OFFSET - used with
 fragmentation
IP Datagram Header Format
 TTL - time to live; decremented in each router; datagram
 discarded when TTL = 0

 TYPE - type of protocol carried in datagram;
 e.g., TCP, UDP.

 HEADER CHECKSUM - 1s complement of 1s complement
 sum.

 SOURCE, DEST ,IP ADDRESS - IP addresses of original
 source and ultimate destination.
IP Datagram Options
 Several options can be added to IP header:
    Record route
    Source route
    Time stamp
 Header with no options has H. LEN field value 5; data
  begins immediately after DESTINATION IP ADDRESS.
 Options added between DESTINATION IP ADDRESS and
  data in multiples of 32 bits.
 Header with 96 bits of options has H. LEN field value 8.
IP Encapsulation, Fragmentation and Reassembly
Encapsulation
 Network interface layer encapsulates IP datagram as data area in hardware frame.
    Hardware ignores IP datagram format
    Standards for encapsulation describe details.

 Standard defines data type for IP datagram, as well as others (e.g., ARP).

 Receiving protocol stack interprets data area based on frame type.
Encapsulation
Encapsulation across Multiple Hops
 Each router in the path from the source to the destination:
    Unencapsulates incoming datagram from frame.
    Processes datagram - determines next hop.
    Encapsulates datagram in outgoing frame.

 Datagram may be encapsulated in different hardware
 format at each hop.

 Datagram itself is (almost!) unchanged.
Encapsulation across Multiple Hops
MTU
 Every hardware technology specification includes the
 definition of the maximum size of the frame data area.

 Called the Maximum Transmission Unit (MTU).

 Any datagram encapsulated in a hardware frame must be
 smaller than the MTU for that hardware.
MTU and Heterogeneous Networks
 An internet may have networks with different
  MTUs.
 Suppose downstream network has smaller MTU
  than local network?
Fragmentation
 One technique - limits datagram size to smallest MTU of
 any network.

 IP uses fragmentation - datagrams can be split into pieces
 to fit in network with small MTU.

 Router detects datagram larger than network MTU.
    Splits into pieces.
    Each piece smaller than outbound network MTU.
Fragmentation
 Each fragment is an independent datagram
    Includes all header fields.
    Bit in header indicates datagram is a fragment.
    Other fields have information for reconstructing original
     datagram.
    FRAGMENT OFFSET gives original location of fragment.
 Router uses local MTU to compute size of each fragment.
 Puts part of data from original datagram in each fragment.
 Puts other information into header.
Fragmentation
Datagram Reassembly
 Reconstruction of original datagram is called
  Reassembly.
 Ultimate destination performs reassembly.
Datagram Reassembly
 Fragments may arrive out of order; header bit identifies
  fragment containing end of data from original
  datagram.
 Fragment 3 identified as last fragment.
Identifying a Datagram
&
Fragment Loss
Fragment Loss
 IP may drop fragment.
 What happens to original datagram?
    Destination drops entire original datagram.
 How does destination identify lost fragment?
    Sets timer with each fragment.
    If timer expires before all fragments arrive, fragment assumed
     lost.
    Datagram dropped.
 Source (application layer protocol) assumed to retransmit.
Fragmenting a Fragment

 Fragment may encounter subsequent network with even
 smaller MTU.

 Router fragments the fragment to fit.

 Resulting sub-fragments look just like original fragments
 (except for size).

 No need to reassemble hierarchically; sub-fragments
 include position in original datagram.

Más contenido relacionado

La actualidad más candente

Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsKathirKathiresan4
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Tutun Juhana
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Tutun Juhana
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Tutun Juhana
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Network layer
Network layerNetwork layer
Network layersbkbca
 
Transport layer
Transport layer   Transport layer
Transport layer AnusuaBasu
 
IPv6 header
IPv6 headerIPv6 header
IPv6 headerHeba_a
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Evolution of Routing Techniques
Evolution of  Routing TechniquesEvolution of  Routing Techniques
Evolution of Routing TechniquesTusharadri Sarkar
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorialsaryu2011
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 

La actualidad más candente (20)

Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Network layer
Network layerNetwork layer
Network layer
 
Transport layer
Transport layer   Transport layer
Transport layer
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Ipv6up
Ipv6upIpv6up
Ipv6up
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Evolution of Routing Techniques
Evolution of  Routing TechniquesEvolution of  Routing Techniques
Evolution of Routing Techniques
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
 
Routing
RoutingRouting
Routing
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 

Destacado

Microwave engineering david m.pozar
Microwave engineering david m.pozarMicrowave engineering david m.pozar
Microwave engineering david m.pozaraibad ahmed
 
Tel313 tipaagb
Tel313 tipaagbTel313 tipaagb
Tel313 tipaagbkhaller1
 
Working of wimax under jamming
Working of wimax under jammingWorking of wimax under jamming
Working of wimax under jammingaibad ahmed
 
Lmb162 abc manual-rev0.2
Lmb162 abc manual-rev0.2Lmb162 abc manual-rev0.2
Lmb162 abc manual-rev0.2aibad ahmed
 
Ways On How To Efficiently Perform Tricep Exercises
Ways On How To Efficiently Perform Tricep ExercisesWays On How To Efficiently Perform Tricep Exercises
Ways On How To Efficiently Perform Tricep Exercisesthepanama1976
 
SUPPLY CHAIN MANAGEMENT
SUPPLY CHAIN MANAGEMENTSUPPLY CHAIN MANAGEMENT
SUPPLY CHAIN MANAGEMENTAnchal Soni
 
Extraposition+ (lecture 16)
Extraposition+ (lecture 16)Extraposition+ (lecture 16)
Extraposition+ (lecture 16)nanankov
 
Pregnancy and human_development
Pregnancy and human_developmentPregnancy and human_development
Pregnancy and human_developmentjoanwalsh
 
Seente biotehnoloogiline kasutamine
Seente biotehnoloogiline kasutamineSeente biotehnoloogiline kasutamine
Seente biotehnoloogiline kasutamineGerliR
 
Bombas de-desplazamiento-positivo
Bombas de-desplazamiento-positivoBombas de-desplazamiento-positivo
Bombas de-desplazamiento-positivoLuis Gonzalez
 
Nirzari Trivedi CV
Nirzari Trivedi CVNirzari Trivedi CV
Nirzari Trivedi CVnirzari
 
Trade union Act 1926
Trade union Act 1926Trade union Act 1926
Trade union Act 1926Anchal Soni
 

Destacado (14)

Microwave engineering david m.pozar
Microwave engineering david m.pozarMicrowave engineering david m.pozar
Microwave engineering david m.pozar
 
Tel313 tipaagb
Tel313 tipaagbTel313 tipaagb
Tel313 tipaagb
 
Matlab guide
Matlab guideMatlab guide
Matlab guide
 
Working of wimax under jamming
Working of wimax under jammingWorking of wimax under jamming
Working of wimax under jamming
 
Lmb162 abc manual-rev0.2
Lmb162 abc manual-rev0.2Lmb162 abc manual-rev0.2
Lmb162 abc manual-rev0.2
 
Ways On How To Efficiently Perform Tricep Exercises
Ways On How To Efficiently Perform Tricep ExercisesWays On How To Efficiently Perform Tricep Exercises
Ways On How To Efficiently Perform Tricep Exercises
 
SUPPLY CHAIN MANAGEMENT
SUPPLY CHAIN MANAGEMENTSUPPLY CHAIN MANAGEMENT
SUPPLY CHAIN MANAGEMENT
 
Extraposition+ (lecture 16)
Extraposition+ (lecture 16)Extraposition+ (lecture 16)
Extraposition+ (lecture 16)
 
Talk nbu
Talk nbuTalk nbu
Talk nbu
 
Pregnancy and human_development
Pregnancy and human_developmentPregnancy and human_development
Pregnancy and human_development
 
Seente biotehnoloogiline kasutamine
Seente biotehnoloogiline kasutamineSeente biotehnoloogiline kasutamine
Seente biotehnoloogiline kasutamine
 
Bombas de-desplazamiento-positivo
Bombas de-desplazamiento-positivoBombas de-desplazamiento-positivo
Bombas de-desplazamiento-positivo
 
Nirzari Trivedi CV
Nirzari Trivedi CVNirzari Trivedi CV
Nirzari Trivedi CV
 
Trade union Act 1926
Trade union Act 1926Trade union Act 1926
Trade union Act 1926
 

Similar a Introduction to IP

474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptxThangamaniR3
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
Ip protocol
Ip protocolIp protocol
Ip protocolH K
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterVishal Vasudev
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdfEnumulaBhargava1
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)FabMinds
 

Similar a Introduction to IP (20)

474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Ip protocol
Ip protocolIp protocol
Ip protocol
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer And I Pv6
Network Layer And I Pv6Network Layer And I Pv6
Network Layer And I Pv6
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
 
Mod5
Mod5Mod5
Mod5
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
sandhiya
sandhiyasandhiya
sandhiya
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Tcp
TcpTcp
Tcp
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Último (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

Introduction to IP

  • 2. Introduction  Fundamental Internet communication service  Format of packets  Processing of packets by Routers  Forwarding  Delivery
  • 3. Connectionless service  End-to-end delivery service is connectionless  Extension of LAN abstraction  Universal addressing  Data delivered in packets (frames), each with a header  Combines collection of physical networks into single, virtual network.
  • 4. Connectionless service  Transport protocols use this connectionless service to provide:  Connectionless data delivery (UDP) and  Connection-oriented data delivery (TCP)
  • 5. Virtual Packets  Packets serve same purpose in internet as frames on LAN.  Each has a header.  Routers (formerly gateways) forward between physical networks.
  • 6. Virtual Packets  Packets have a uniform, hardware-independent format.  Includes header and data.  Can't use format from any particular hardware.  Encapsulated in hardware frames for delivery across each physical network.
  • 7. IP Datagram Format  Formally, the unit of IP data delivery was called a Datagram.  Includes header area and data area.
  • 8. IP Datagram Size  Datagrams can have different sizes:  Header area usually fixed (20 octets) but can have options.  Data area can contain between 1 octet and 65,535 octets (216 - 1).  Usually, data area is much larger than header.
  • 9. Forwarding Datagrams  Header contains all information needed to deliver datagram to the destination computer.  Destination address  Source address  Identifier  Other delivery information  Router examines header of each datagram and forwards datagram along path to destination.
  • 10. Routing Table  For efficiency, information about forwarding is stored in a routing table.  Initialized at system initialization.  Must be updated as network topology changes.  Contains list of destination networks and next hop for each destination.
  • 12. Routing Tables & Address Masks  In practice, additional information is kept in routing table.  Destination stored as network address.  Next hop stored as IP address of router.  Address mask defines how many bits of address are in prefix.  Prefix defines how much of address used to identify network.  E.g., class A mask is 255.0.0.0.  Used for subnetting.
  • 13. Routing Tables & Address Masks
  • 14. Address Masks  To identify destination network, apply address mask to destination address and compare to network address in routing table.  Can use Boolean and  if ((Mask[i] & D) == Dest[i]) forward to NextHop[i].
  • 16. Forwarding, Destination Address and Next-hop  Destination address in IP datagram is always ultimate destination.  Router looks up next-hop address and forwards datagram.  Network interface layer takes two parameters:  IP datagram  Next-hop address  Next-hop address never appears in IP datagram.
  • 17. Best-Effort Delivery  IP provides service equivalent to LAN.  Does not guarantee to prevent:  Duplicate datagrams  Delayed or out-of-order delivery  Corruption of data  Datagram loss
  • 18. Best-Effort Delivery  Reliable delivery provided by Transport layer  Network layer - IP - can detect and report errors without actually fixing them.  Network layer focuses on datagram delivery.  Application layer not is interested in differentiating among delivery problems at intermediate routers.
  • 20. IP Datagram Header Format  VERS - version of IP (currently 4)  H. LEN - header length (in units of 32 bits)  SERVICE TYPE - sender's preference for low latency, high reliability (rarely used)  TOTAL LENGTH - total octets in datagram  IDENT, FLAGS, FRAGMENT OFFSET - used with fragmentation
  • 21. IP Datagram Header Format  TTL - time to live; decremented in each router; datagram discarded when TTL = 0  TYPE - type of protocol carried in datagram; e.g., TCP, UDP.  HEADER CHECKSUM - 1s complement of 1s complement sum.  SOURCE, DEST ,IP ADDRESS - IP addresses of original source and ultimate destination.
  • 22. IP Datagram Options  Several options can be added to IP header:  Record route  Source route  Time stamp  Header with no options has H. LEN field value 5; data begins immediately after DESTINATION IP ADDRESS.  Options added between DESTINATION IP ADDRESS and data in multiples of 32 bits.  Header with 96 bits of options has H. LEN field value 8.
  • 24. Encapsulation  Network interface layer encapsulates IP datagram as data area in hardware frame.  Hardware ignores IP datagram format  Standards for encapsulation describe details.  Standard defines data type for IP datagram, as well as others (e.g., ARP).  Receiving protocol stack interprets data area based on frame type.
  • 26. Encapsulation across Multiple Hops  Each router in the path from the source to the destination:  Unencapsulates incoming datagram from frame.  Processes datagram - determines next hop.  Encapsulates datagram in outgoing frame.  Datagram may be encapsulated in different hardware format at each hop.   Datagram itself is (almost!) unchanged.
  • 28. MTU  Every hardware technology specification includes the definition of the maximum size of the frame data area.  Called the Maximum Transmission Unit (MTU).  Any datagram encapsulated in a hardware frame must be smaller than the MTU for that hardware.
  • 29. MTU and Heterogeneous Networks  An internet may have networks with different MTUs.  Suppose downstream network has smaller MTU than local network?
  • 30. Fragmentation  One technique - limits datagram size to smallest MTU of any network.  IP uses fragmentation - datagrams can be split into pieces to fit in network with small MTU.  Router detects datagram larger than network MTU.  Splits into pieces.  Each piece smaller than outbound network MTU.
  • 31. Fragmentation  Each fragment is an independent datagram  Includes all header fields.  Bit in header indicates datagram is a fragment.  Other fields have information for reconstructing original datagram.  FRAGMENT OFFSET gives original location of fragment.  Router uses local MTU to compute size of each fragment.  Puts part of data from original datagram in each fragment.  Puts other information into header.
  • 33. Datagram Reassembly  Reconstruction of original datagram is called Reassembly.  Ultimate destination performs reassembly.
  • 34. Datagram Reassembly  Fragments may arrive out of order; header bit identifies fragment containing end of data from original datagram.  Fragment 3 identified as last fragment.
  • 36. Fragment Loss  IP may drop fragment.  What happens to original datagram?  Destination drops entire original datagram.  How does destination identify lost fragment?  Sets timer with each fragment.  If timer expires before all fragments arrive, fragment assumed lost.  Datagram dropped.  Source (application layer protocol) assumed to retransmit.
  • 37. Fragmenting a Fragment  Fragment may encounter subsequent network with even smaller MTU.  Router fragments the fragment to fit.   Resulting sub-fragments look just like original fragments (except for size).   No need to reassemble hierarchically; sub-fragments include position in original datagram.