SlideShare a Scribd company logo
4

Tutun Juhana
Telecommunication Engineering

Network Layer (Part 4)

School of Electrical Engineering & Informatics
Institut Teknologi Bandung

Computer Networks
INTERNET PROTOCOL
VERSION 4 (IPV4)
3
This is why we need
Total Length field
4
5
6
7
FRAGMENTATION

8
Maximum Transfer Unit (MTU)

9
• Maximum IP datagram length is 65,535
bytes
• We might have to divide the datagram to
make it possible to pass through different
physical networks  This is called
fragmentation.

10
• When a datagram is fragmented, each fragment
has its own header with most of the fields
repeated, but some changed
• A fragmented datagram may itself be
fragmented if it encounters a network with an
even smaller MTU (a datagram can be
fragmented several times before it reaches the
final destination)
• A datagram can be fragmented by the source
host or any router in the path
• The reassembly of the datagram, however, is
11
done only by the destination host
• When a datagram is fragmented, required parts
of the header must be copied by all fragments 
The option field may or may not be copied
• The host or router that fragments a datagram
must change the values of three fields: flags,
fragmentation offset, and total length (The rest of
the fields must be copied)
• The value of the checksum must be recalculated
regardless of fragmentation.
12
Fields Related to Fragmentation
• Identification
• Flags
• Fragmentation offset

13
Identification
• 16 bit
• Identifies a datagram originating from the source host
• The combination of the identification and source IP
address must uniquely define a datagram as it leaves
the source host.
• When a datagram is fragmented, the value in the
identification field is copied into all fragments  all
fragments have the same identification number, which is
also the same as the original datagram
• The identification number helps the destination in
reassembling the datagram  all fragments having the
same identification value should be assembled into one
datagram
14
Flags
not used

• D (Do not fragment)
– ‘1’ : machine must not fragment the datagram
– ‘0’ : datagram can be fragmented if necessary

• M (More fragments)
– ‘1’ : datagram is not the last datagram
– ‘0’ : This is the last or only fragment
15
Fragmentation offset
• This 13-bit field shows the relative position of this
fragment with respect to the whole datagram.
• Measured in units of 8 bytes

16
the offset field is
always relative
to the original
datagram

identification

The last fragment

17
• Final destination host can reassemble the
original datagram from the fragments received (if
none of them is lost) using the following strategy:
a. The first fragment has an offset field value of zero.
b. Divide the length of the first fragment by 8. The
second fragment has an offset value equal to that
result.
c. Divide the total length of the first and second
fragment by 8. The third fragment has an offset
value equal to that result.
d. Continue the process. The last fragment has a more
bit value of 0.
18
OPTIONS

19
• Are not required for a datagram
– But all IP software implementations must be
able to handle options if they are present in
the header.

• Can be used for network testing and
debugging.

20
Format

type-length-value (TLV)

21
Option Types
do not require the length or the data fields

require the length or the data fields

22
No-Operation Option
• 1-byte option used as a filler between
options

23
End-of-Option Option
• 1-byte option used for padding at the end of the option
field.
• It can only be used as the last option Only one end-ofoption option can be used  After this option, the
receiver looks for the payload data  If more than 1 byte
is needed to align the option field, some no-operation
options must be used, followed by an end-of-option
option

24
Record-Route Option
• is used to record the Internet routers that handle
the datagram
• It can list up to nine router IP addresses

• Pointer field is an offset integer field containing the byte
number of the first empty entry It points to the first
available entry.
25
26
Strict-Source-Route Option
• used by the source to predetermine a
route for the datagram as it travels through
the Internet

27
28
Loose-Source-Route Option
• similar to the strict source route, but it is more
relaxed Each router in the list must be visited,
but the datagram can visit other routers as well.

29
Timestamp
• A timestamp option is used to record the time of
datagram processing by a router
• The time is expressed in milliseconds from midnight,
Universal Time.

30
31
32
CHECKSUM

33
Checksum Calculation at the Sender
• The packet is divided into k sections, each
of n bits.
• All sections are added together using
one’s complement arithmetic.
• The final result is complemented to make
the checksum.

34
35
Checksum in the IP Packet

36
37

More Related Content

PPTX
Et3003 sem2-1314-7 network layers iv (ipv4)
Tutun Juhana
 
PPTX
Et3003 sem2-1314-8 network layers v (icmpv4)
Tutun Juhana
 
PPTX
Et3003 sem2-1314-6 network layers iii (arp)
Tutun Juhana
 
PPTX
Et3003 sem2-1314-5 network layers ii (intro to routing)
Tutun Juhana
 
PPTX
sandhiya
DeepaR42
 
PPTX
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
PPTX
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
PDF
Network layer ip address assignment and routing
HamzahMohammed4
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Tutun Juhana
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Tutun Juhana
 
Et3003 sem2-1314-6 network layers iii (arp)
Tutun Juhana
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Tutun Juhana
 
sandhiya
DeepaR42
 
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
Network layer ip address assignment and routing
HamzahMohammed4
 

What's hot (19)

PPTX
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Tutun Juhana
 
PPT
Parallel algorithms
guest084d20
 
PPTX
Multiplexer and demultiplexer applications.ppsx 3
safia safreen
 
PPT
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 
PDF
Mux and demux done in cadence with pics
dinesh aitha
 
PPTX
Addressing mode of 80286 microprocessor
pal bhumit
 
PPT
Address translation-mechanism-of-80386 by aniket bhute
Aniket Bhute
 
PDF
Design and Implementation of Boolean Functions using Multiplexer and also usi...
IRJET Journal
 
PDF
Gn3311521155
IJERA Editor
 
PDF
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
vtunotesbysree
 
PPTX
Parallel algorithm in linear algebra
Harshana Madusanka Jayamaha
 
PPTX
INTEL 80386 MICROPROCESSOR
Annies Minu
 
PPT
80386 microprocessor
Jerin Sebastian
 
PPTX
Tsfpga
Pranoti Bachhav
 
PPT
Microprocessor 80386
yash sawarkar
 
PPT
Parallel algorithms
guest084d20
 
PPTX
Memory Segmentation of 8086
Nikhil Kumar
 
PPTX
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Tutun Juhana
 
Parallel algorithms
guest084d20
 
Multiplexer and demultiplexer applications.ppsx 3
safia safreen
 
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 
Mux and demux done in cadence with pics
dinesh aitha
 
Addressing mode of 80286 microprocessor
pal bhumit
 
Address translation-mechanism-of-80386 by aniket bhute
Aniket Bhute
 
Design and Implementation of Boolean Functions using Multiplexer and also usi...
IRJET Journal
 
Gn3311521155
IJERA Editor
 
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
vtunotesbysree
 
Parallel algorithm in linear algebra
Harshana Madusanka Jayamaha
 
INTEL 80386 MICROPROCESSOR
Annies Minu
 
80386 microprocessor
Jerin Sebastian
 
Microprocessor 80386
yash sawarkar
 
Parallel algorithms
guest084d20
 
Memory Segmentation of 8086
Nikhil Kumar
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Ad

Viewers also liked (18)

PPTX
Ch 20 UNICAST ROUTING SECTION 2
Hossam El-Deen Osama
 
PPT
Chp4
Sina Salehi
 
PPTX
Ch 18 intro to network layer - section 5
Hossam El-Deen Osama
 
PPTX
Ch 18 intro to network layer - section 2
Hossam El-Deen Osama
 
PPT
Computer network (Lecture 2)
Vishwajit Nandi
 
PPTX
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
PPTX
Ch 18 intro to network layer - section 4
Hossam El-Deen Osama
 
PPT
Computer network (Lecture 1)
Vishwajit Nandi
 
PPTX
Ch 18 intro to network layer - section 1
Hossam El-Deen Osama
 
PPT
2008118090324 hk
Vivek Singh
 
PPTX
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
PPT
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
PPT
Routing and OSPF
arpit
 
PPTX
Link state routing protocol
Aung Thu Rha Hein
 
PPT
Routing algorithm
farimoin
 
PPT
I Pv6 Addressing
Ram Dutt Shukla
 
PPT
Multicast Routing Protocols
Ram Dutt Shukla
 
Ch 20 UNICAST ROUTING SECTION 2
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 5
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 2
Hossam El-Deen Osama
 
Computer network (Lecture 2)
Vishwajit Nandi
 
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 4
Hossam El-Deen Osama
 
Computer network (Lecture 1)
Vishwajit Nandi
 
Ch 18 intro to network layer - section 1
Hossam El-Deen Osama
 
2008118090324 hk
Vivek Singh
 
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Routing and OSPF
arpit
 
Link state routing protocol
Aung Thu Rha Hein
 
Routing algorithm
farimoin
 
I Pv6 Addressing
Ram Dutt Shukla
 
Multicast Routing Protocols
Ram Dutt Shukla
 
Ad

Similar to Network Layer Part 4 (20)

PDF
networking IPv4.pdf
omgupta189586
 
PDF
Unit-2_CN.pdf
MayankRaj687571
 
PPTX
19 Network Layer Protocols
Meenakshi Paul
 
PPTX
IP datagram structure, ICMP,DHCP, NAT Introduction
NalinadeviKadiresan1
 
PPTX
Ip and icmp
Programmer
 
PPT
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 
PPTX
474-22-DatagramForwarding.pptx
ThangamaniR3
 
PPTX
Computer Network - Network Layer
Manoj Kumar
 
PPT
IPV4 Frame Format
Aditya Rawat
 
PDF
The Internet Protocol version 4 (IPv4)
Thesis Scientist Private Limited
 
PPT
Ipv4
asimnawaz54
 
PPTX
Computer networks transport layer
jamunaashok
 
PPTX
TCP and UDP comparison and itsi application.pptx
Mugabo4
 
PPTX
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
PDF
COMPUTER COMMUNICATION NETWORKS -IPv4
Krishna Nanda
 
PPT
Networking and data communication IP.ppt
stephen972973
 
PDF
Ip protocol
H K
 
PPT
Internet Protocol
Ghaffar Khan
 
PPTX
Internet Protocol Version 4
Purushottam Kamble
 
PPT
I pv4 format
Nitesh Singh
 
networking IPv4.pdf
omgupta189586
 
Unit-2_CN.pdf
MayankRaj687571
 
19 Network Layer Protocols
Meenakshi Paul
 
IP datagram structure, ICMP,DHCP, NAT Introduction
NalinadeviKadiresan1
 
Ip and icmp
Programmer
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 
474-22-DatagramForwarding.pptx
ThangamaniR3
 
Computer Network - Network Layer
Manoj Kumar
 
IPV4 Frame Format
Aditya Rawat
 
The Internet Protocol version 4 (IPv4)
Thesis Scientist Private Limited
 
Computer networks transport layer
jamunaashok
 
TCP and UDP comparison and itsi application.pptx
Mugabo4
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
COMPUTER COMMUNICATION NETWORKS -IPv4
Krishna Nanda
 
Networking and data communication IP.ppt
stephen972973
 
Ip protocol
H K
 
Internet Protocol
Ghaffar Khan
 
Internet Protocol Version 4
Purushottam Kamble
 
I pv4 format
Nitesh Singh
 

More from Tutun Juhana (20)

PPTX
What should you prepare for industry 4.0 era
Tutun Juhana
 
PPTX
Internet of Things Security
Tutun Juhana
 
PPTX
Et4045-3-attacks-2
Tutun Juhana
 
PPTX
ET4045-3-attacks-1
Tutun Juhana
 
PPTX
ET4045-2-cryptography-3
Tutun Juhana
 
PPTX
ET4045-2-cryptography-2
Tutun Juhana
 
PPTX
ET4045-2-cryptography-1-2014
Tutun Juhana
 
PPTX
ET4045-1-Introduction-2014
Tutun Juhana
 
PPTX
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
PPTX
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Tutun Juhana
 
PPTX
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Tutun Juhana
 
PPTX
Et3003 sem2-1314-10 vlans
Tutun Juhana
 
PPTX
ET3003-1 introduction (Semester II 2013-2014)
Tutun Juhana
 
PPTX
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
Tutun Juhana
 
PPTX
IPv6 Introduction
Tutun Juhana
 
PPTX
6 2 transport layer (tcp)
Tutun Juhana
 
PPTX
VLANs
Tutun Juhana
 
PPTX
Application Layer
Tutun Juhana
 
PPTX
Transport Layer (UDP)
Tutun Juhana
 
PPTX
Network layer Part 7
Tutun Juhana
 
What should you prepare for industry 4.0 era
Tutun Juhana
 
Internet of Things Security
Tutun Juhana
 
Et4045-3-attacks-2
Tutun Juhana
 
ET4045-3-attacks-1
Tutun Juhana
 
ET4045-2-cryptography-3
Tutun Juhana
 
ET4045-2-cryptography-2
Tutun Juhana
 
ET4045-2-cryptography-1-2014
Tutun Juhana
 
ET4045-1-Introduction-2014
Tutun Juhana
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Tutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
Tutun Juhana
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
Tutun Juhana
 
IPv6 Introduction
Tutun Juhana
 
6 2 transport layer (tcp)
Tutun Juhana
 
Application Layer
Tutun Juhana
 
Transport Layer (UDP)
Tutun Juhana
 
Network layer Part 7
Tutun Juhana
 

Recently uploaded (20)

DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Basics and rules of probability with real-life uses
ravatkaran694
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 

Network Layer Part 4

  • 1. 4 Tutun Juhana Telecommunication Engineering Network Layer (Part 4) School of Electrical Engineering & Informatics Institut Teknologi Bandung Computer Networks
  • 3. 3
  • 4. This is why we need Total Length field 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 10. • Maximum IP datagram length is 65,535 bytes • We might have to divide the datagram to make it possible to pass through different physical networks  This is called fragmentation. 10
  • 11. • When a datagram is fragmented, each fragment has its own header with most of the fields repeated, but some changed • A fragmented datagram may itself be fragmented if it encounters a network with an even smaller MTU (a datagram can be fragmented several times before it reaches the final destination) • A datagram can be fragmented by the source host or any router in the path • The reassembly of the datagram, however, is 11 done only by the destination host
  • 12. • When a datagram is fragmented, required parts of the header must be copied by all fragments  The option field may or may not be copied • The host or router that fragments a datagram must change the values of three fields: flags, fragmentation offset, and total length (The rest of the fields must be copied) • The value of the checksum must be recalculated regardless of fragmentation. 12
  • 13. Fields Related to Fragmentation • Identification • Flags • Fragmentation offset 13
  • 14. Identification • 16 bit • Identifies a datagram originating from the source host • The combination of the identification and source IP address must uniquely define a datagram as it leaves the source host. • When a datagram is fragmented, the value in the identification field is copied into all fragments  all fragments have the same identification number, which is also the same as the original datagram • The identification number helps the destination in reassembling the datagram  all fragments having the same identification value should be assembled into one datagram 14
  • 15. Flags not used • D (Do not fragment) – ‘1’ : machine must not fragment the datagram – ‘0’ : datagram can be fragmented if necessary • M (More fragments) – ‘1’ : datagram is not the last datagram – ‘0’ : This is the last or only fragment 15
  • 16. Fragmentation offset • This 13-bit field shows the relative position of this fragment with respect to the whole datagram. • Measured in units of 8 bytes 16
  • 17. the offset field is always relative to the original datagram identification The last fragment 17
  • 18. • Final destination host can reassemble the original datagram from the fragments received (if none of them is lost) using the following strategy: a. The first fragment has an offset field value of zero. b. Divide the length of the first fragment by 8. The second fragment has an offset value equal to that result. c. Divide the total length of the first and second fragment by 8. The third fragment has an offset value equal to that result. d. Continue the process. The last fragment has a more bit value of 0. 18
  • 20. • Are not required for a datagram – But all IP software implementations must be able to handle options if they are present in the header. • Can be used for network testing and debugging. 20
  • 22. Option Types do not require the length or the data fields require the length or the data fields 22
  • 23. No-Operation Option • 1-byte option used as a filler between options 23
  • 24. End-of-Option Option • 1-byte option used for padding at the end of the option field. • It can only be used as the last option Only one end-ofoption option can be used  After this option, the receiver looks for the payload data  If more than 1 byte is needed to align the option field, some no-operation options must be used, followed by an end-of-option option 24
  • 25. Record-Route Option • is used to record the Internet routers that handle the datagram • It can list up to nine router IP addresses • Pointer field is an offset integer field containing the byte number of the first empty entry It points to the first available entry. 25
  • 26. 26
  • 27. Strict-Source-Route Option • used by the source to predetermine a route for the datagram as it travels through the Internet 27
  • 28. 28
  • 29. Loose-Source-Route Option • similar to the strict source route, but it is more relaxed Each router in the list must be visited, but the datagram can visit other routers as well. 29
  • 30. Timestamp • A timestamp option is used to record the time of datagram processing by a router • The time is expressed in milliseconds from midnight, Universal Time. 30
  • 31. 31
  • 32. 32
  • 34. Checksum Calculation at the Sender • The packet is divided into k sections, each of n bits. • All sections are added together using one’s complement arithmetic. • The final result is complemented to make the checksum. 34
  • 35. 35
  • 36. Checksum in the IP Packet 36
  • 37. 37