SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
1
Hitesh Mohapatra / Class Note / VSSUT, Burla, India
Internet Protocol
 The Internet Protocol (IP) is the method or protocol by which data is sent from one
computer to another on the Internet.
 Each computer (known as a host) on the Internet has at least one IP address that
uniquely identifies it from all other computers on the Internet.
 When you send or receive data (for example, an e-mail or a Web page), the message
gets divided into little chunks called packets. Each of these packets contains both the
sender's Internet address and the receiver's address.
 Any packet is sent first to a gateway computer that reads the destination address and
forwards the packet to an adjacent gateway that in turn reads the destination address
and so on so forth across the Internet until one gateway recognizes the packet as
belonging to a computer within destination’s immediate neighbourhood or domain.
That gateway then forwards the packet directly to the computer whose address is
specified (destination address).
 Because a message is divided into a number of packets, each packet can, if necessary,
be sent by a different route across the Internet. Packets can arrive in a different order
than the order they were sent in. The Internet Protocol just delivers them. It's up to
another protocol, the Transmission Control Protocol (TCP) to put them back in the
right order. It is a connection-oriented protocol that keeps track of the packet
sequence in a message.
 IP is a connectionless protocol, which means that there is no continuing connection
between the end points that are communicating. Each packet that travels through the
Internet is treated as an independent unit of data without any relation to any other unit
of data. In the Open Systems Interconnection (OSI) communication model, IP is
in layer 3, the Networking Layer.
 The most widely used version of IP today is Internet Protocol Version 4 (IPv4).
However, IP Version 6 (IPv6) is also beginning to be supported. IPv6 provides for
2
much longer addresses and therefore for the possibility of many more Internet users.
IPv6 includes the capabilities of IPv4 and any server that can support IPv6 packets
can also support IPv4 packets.
The IP Datagram Structure
 The format of data that can be recognized by IP is called an IP datagram.
 It consists of two components, namely, the header and data, which need to be
transmitted. The fields in the datagram, except the data, have specific roles to perform
in the transmission of data.
 Every field in the IP datagram has a fixed size except for the IP Options field, which
can be 20–60 bytes in length.
The header has a 20 bytes fixed part and a variable length optional part.
The IP datagram header format
Version
 Which version of the protocol the datagram belongs to.
 The current version number is 4.
 Next version: 6
3
IHL
 The number of 32-bit words in the header
 Because this is 4 bits, the max header length is 15 words (i.e. 60 bytes)
 The header is at least 20 bytes, but options may make it bigger
Type of Service
 Contains a 3-bit precedence field (that is ignored today), 4 service bits, and 1 unused
bit.
 The four service bits can be:
o 1000 - minimize delay
o 0100 - maximize throughput
o 0010 - maximize reliability
o 0001 - minimize monetary cost
 This is a "hint" of what characteristics of the physical layer to use
 The Type of Service is not supported in most implementations. However, some
implementations have extra fields in the routing table to indicate delay, throughput,
reliability, and monetary cost.
Total Length
 Total length of the datagram in bytes.
 we know where the data starts by the header length
 we know the size of the data by computing "total length - header length"
Identification
 Uniquely identifies the datagram.
 Usually incremented by 1 each time a datagram is sent.
 All fragments of a datagram contain the same identification value.
 This allows the destination host to determine which fragment belongs to which
datagram.
Flags and Fragmentation Offset
 Used for fragmentation
 DF means do not fragment. It is a request to routers not to fragment the datagram
since the destination is incapable of putting the pieces back together.
 MF means more fragments to follow. All fragments except the last one have this bit
set. It is needed to know if all fragments of a datagram have arrived.
Fragment offset
4
This field solves the problem of sequencing fragments by indicating to the recipient device
where in the overall message each particular fragment should be placed.
Time to Live
 decremented by each router that processes the datagram,
 Router discards the datagram when TTL reaches 0.
Protocol
 Tells IP where to send the datagram up to.
 6 means TCP
 17 means UDP
Header checksum
Inserted by the sender and updated whenever the packet header is modified by a router - Used
to detect processing errors introduced into the packet inside a router. Packets with an invalid
checksum are discarded.
Source IP address
The IP address of the original sender of the packet
Destination IP address
The IP address of the final destination of the packet
Options
 Optional data.
 Some examples include having the router put in a IP address of router and a time
stamp so the final destination knows how long it took to get to each hop.
The source and destination in the IP header is the original source and the final destination!
The physical layer addresses pass the datagram from router to router. So, while the physical
layer addresses change from router to router, the source and destination IP addresses in the IP
datagram remain constant.
IP Fragmentation
 IP must fragment packets if it is of large size.
 When an IP datagram is fragmented, each fragment is treated as a separate datagram.
o It is reassembled at the final destination, not at a router
o It does that because the router may have to fragment it again
5
 Each fragment has its own header.
 The identification number is copied into each fragment.
 One bit in the "flags" field says "more fragments are coming. If that bit is 0, then it
signifies this is the last fragment.
 The "fragment offset" field contains the offset of the data.
o Fragment offset is measured in units of 8 bytes (64 bits).
The entire flags field looks like this:
--------------------------
| bit 0 | bit 1 | bit 2 |
--------------------------
bit 0: not used
bit 1: if 1, it means "don't fragment".
If IP must fragment the packet and this bit is set, IP throws away the datagram.
bit 2: The fragment flag.
Example:
 Suppose we have a physical layer that can transmit a maximum of 660 bytes. And,
suppose IP wants to send 1460 bytes of data. So, the IP datagram is a total of 1480
bytes, including the 20 byte IP header:
---------------------------------------------
| 20-byte IP HEADER | 1460 bytes of data |
---------------------------------------------
 Here is what IP sends:
First packet:
Bytes: 20 640
---------------------------------------------
| IP header | first 640 bytes of data |
---------------------------------------------
 In that packet, "fragment flag" is 1, offset is 0.
Second packet:
Bytes: 20 640
---------------------------------------------
| IP header | second 640 bytes of data |
---------------------------------------------
6
 In that packet, "fragment flag" is 1, offset is 80. The offset is 80 because (80 * 8) is
640, so the offset of that data is 640 byes.
Third packet:
Bytes: 20 640
---------------------------------------------
| IP header | third 180 bytes of data |
---------------------------------------------
 In that packet, "fragment flag" is 0, offset is 160. The offset is 160 because (160 * 8)
is 1280, so the offset of that data is 1280 byes.
 IMPORTANT: The routers see 3 separate packets. The final destination reassembles
the packet before passing the packet to the upper layers.

More Related Content

PPTX
IPv4
Dhiraj Mishra
 
PPTX
sutherland- Hodgeman Polygon clipping
Arvind Kumar
 
PPTX
IP Address dan Subnetting.pptx
DediTriLaksono1
 
PPTX
Html ppt
santosh lamba
 
PPTX
Memory organization
AL- AMIN
 
PPTX
Mid point line Algorithm - Computer Graphics
Drishti Bhalla
 
PPTX
Address resolution protocol (ARP)
NetProtocol Xpert
 
PPTX
Présentation sur l'IA en Francais, traite de l'intelligence artificielle
JackMoris1
 
sutherland- Hodgeman Polygon clipping
Arvind Kumar
 
IP Address dan Subnetting.pptx
DediTriLaksono1
 
Html ppt
santosh lamba
 
Memory organization
AL- AMIN
 
Mid point line Algorithm - Computer Graphics
Drishti Bhalla
 
Address resolution protocol (ARP)
NetProtocol Xpert
 
Présentation sur l'IA en Francais, traite de l'intelligence artificielle
JackMoris1
 

What's hot (20)

PPTX
IPv4 Addressing
TheGodfather HA
 
PPTX
19 Network Layer Protocols
Meenakshi Paul
 
PPTX
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
PPTX
Transport layer protocol
N.Jagadish Kumar
 
PPTX
Switching
Abid Ali
 
PPTX
Routing algorithm
Bushra M
 
PPTX
wireless network IEEE 802.11
Shreejan Acharya
 
PPT
Congetion Control.pptx
Naveen Dubey
 
PPTX
Mobile transport layer .
junnubabu
 
PPTX
Transmission Control Protocol (TCP)
k33a
 
PPTX
Framing in data link layer
Ahtesham Ullah khan
 
PDF
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
PPTX
TCP protocol flow control
anuragjagetiya
 
PPTX
Mac protocols
juno susi
 
PPTX
Tcp header/IP Header/Authentication header
Faizan Shaikh
 
PPTX
Multi Layer Network
International Islamic University
 
PPTX
Check sum
Pooja Jaiswal
 
PPTX
Network address translation
Varsha Honde
 
PDF
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
PPTX
Congestion control
Aman Jaiswal
 
IPv4 Addressing
TheGodfather HA
 
19 Network Layer Protocols
Meenakshi Paul
 
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Transport layer protocol
N.Jagadish Kumar
 
Switching
Abid Ali
 
Routing algorithm
Bushra M
 
wireless network IEEE 802.11
Shreejan Acharya
 
Congetion Control.pptx
Naveen Dubey
 
Mobile transport layer .
junnubabu
 
Transmission Control Protocol (TCP)
k33a
 
Framing in data link layer
Ahtesham Ullah khan
 
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
TCP protocol flow control
anuragjagetiya
 
Mac protocols
juno susi
 
Tcp header/IP Header/Authentication header
Faizan Shaikh
 
Check sum
Pooja Jaiswal
 
Network address translation
Varsha Honde
 
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Congestion control
Aman Jaiswal
 
Ad

Similar to IP Datagram Structure (20)

PPT
Network Layer
Ghaffar Khan
 
DOCX
As the packet travels through the TCP.docx
laraibshaheen
 
PPTX
CN Unit 4.pptx related to ip network klk;k;hgkjkgkdk
AnupamaPatil27
 
PDF
Ip protocol
H K
 
PPT
Internet Protocol
Ghaffar Khan
 
PPT
Exploration network chapter_5_modified
rajesh531
 
PPT
IPV4 Frame Format
Aditya Rawat
 
PDF
I.p. protocol
Jitendra Shishangiya
 
DOCX
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
mayank's it solution pvt.ltd
 
PDF
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
PPTX
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
PPTX
Introduction to IP
aibad ahmed
 
DOC
IP Address
Sukhdeep Kaur
 
PPTX
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
abhinandpk2405
 
PDF
Report on ip addresses
Amandeep Kaur
 
PDF
TCPIP
sangusajjan
 
PPT
Ipspk1
supriya kurlekar
 
PPTX
Internet Protocol Version 4
Purushottam Kamble
 
PPSX
Internetworking - IP
selvakumar_b1985
 
PDF
C. N. II Lec.4.pdf h
abdnazar2003
 
Network Layer
Ghaffar Khan
 
As the packet travels through the TCP.docx
laraibshaheen
 
CN Unit 4.pptx related to ip network klk;k;hgkjkgkdk
AnupamaPatil27
 
Ip protocol
H K
 
Internet Protocol
Ghaffar Khan
 
Exploration network chapter_5_modified
rajesh531
 
IPV4 Frame Format
Aditya Rawat
 
I.p. protocol
Jitendra Shishangiya
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
mayank's it solution pvt.ltd
 
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
Introduction to IP
aibad ahmed
 
IP Address
Sukhdeep Kaur
 
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
abhinandpk2405
 
Report on ip addresses
Amandeep Kaur
 
Internet Protocol Version 4
Purushottam Kamble
 
Internetworking - IP
selvakumar_b1985
 
C. N. II Lec.4.pdf h
abdnazar2003
 
Ad

More from Hitesh Mohapatra (20)

PDF
Introduction to Edge and Fog Computing.pdf
Hitesh Mohapatra
 
PDF
Amazon Web Services (AWS) : Fundamentals
Hitesh Mohapatra
 
PDF
Resource Cluster and Multi-Device Broker.pdf
Hitesh Mohapatra
 
PDF
Failover System in Cloud Computing System
Hitesh Mohapatra
 
PDF
Resource Replication & Automated Scaling Listener
Hitesh Mohapatra
 
PDF
Storage Device & Usage Monitor in Cloud Computing.pdf
Hitesh Mohapatra
 
PDF
Networking in Cloud Computing Environment
Hitesh Mohapatra
 
PDF
Uniform-Cost Search Algorithm in the AI Environment
Hitesh Mohapatra
 
PDF
Logical Network Perimeter in Cloud Computing
Hitesh Mohapatra
 
PPT
Software Product Quality - Part 1 Presentation
Hitesh Mohapatra
 
PDF
Multitenancy in cloud computing architecture
Hitesh Mohapatra
 
PDF
Server Consolidation in Cloud Computing Environment
Hitesh Mohapatra
 
PDF
Web Services / Technology in Cloud Computing
Hitesh Mohapatra
 
PDF
Resource replication in cloud computing.
Hitesh Mohapatra
 
PDF
Software Measurement and Metrics (Quantified Attribute)
Hitesh Mohapatra
 
PDF
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
PDF
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
PDF
The life cycle of a virtual machine (VM) provisioning process
Hitesh Mohapatra
 
PDF
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
Hitesh Mohapatra
 
PDF
Traditional Data Center vs. Virtualization – Differences and Benefits
Hitesh Mohapatra
 
Introduction to Edge and Fog Computing.pdf
Hitesh Mohapatra
 
Amazon Web Services (AWS) : Fundamentals
Hitesh Mohapatra
 
Resource Cluster and Multi-Device Broker.pdf
Hitesh Mohapatra
 
Failover System in Cloud Computing System
Hitesh Mohapatra
 
Resource Replication & Automated Scaling Listener
Hitesh Mohapatra
 
Storage Device & Usage Monitor in Cloud Computing.pdf
Hitesh Mohapatra
 
Networking in Cloud Computing Environment
Hitesh Mohapatra
 
Uniform-Cost Search Algorithm in the AI Environment
Hitesh Mohapatra
 
Logical Network Perimeter in Cloud Computing
Hitesh Mohapatra
 
Software Product Quality - Part 1 Presentation
Hitesh Mohapatra
 
Multitenancy in cloud computing architecture
Hitesh Mohapatra
 
Server Consolidation in Cloud Computing Environment
Hitesh Mohapatra
 
Web Services / Technology in Cloud Computing
Hitesh Mohapatra
 
Resource replication in cloud computing.
Hitesh Mohapatra
 
Software Measurement and Metrics (Quantified Attribute)
Hitesh Mohapatra
 
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
The life cycle of a virtual machine (VM) provisioning process
Hitesh Mohapatra
 
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
Hitesh Mohapatra
 
Traditional Data Center vs. Virtualization – Differences and Benefits
Hitesh Mohapatra
 

Recently uploaded (20)

PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 

IP Datagram Structure

  • 1. 1 Hitesh Mohapatra / Class Note / VSSUT, Burla, India Internet Protocol  The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.  Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.  When you send or receive data (for example, an e-mail or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address.  Any packet is sent first to a gateway computer that reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so on so forth across the Internet until one gateway recognizes the packet as belonging to a computer within destination’s immediate neighbourhood or domain. That gateway then forwards the packet directly to the computer whose address is specified (destination address).  Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet. Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order. It is a connection-oriented protocol that keeps track of the packet sequence in a message.  IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data. In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer.  The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP Version 6 (IPv6) is also beginning to be supported. IPv6 provides for
  • 2. 2 much longer addresses and therefore for the possibility of many more Internet users. IPv6 includes the capabilities of IPv4 and any server that can support IPv6 packets can also support IPv4 packets. The IP Datagram Structure  The format of data that can be recognized by IP is called an IP datagram.  It consists of two components, namely, the header and data, which need to be transmitted. The fields in the datagram, except the data, have specific roles to perform in the transmission of data.  Every field in the IP datagram has a fixed size except for the IP Options field, which can be 20–60 bytes in length. The header has a 20 bytes fixed part and a variable length optional part. The IP datagram header format Version  Which version of the protocol the datagram belongs to.  The current version number is 4.  Next version: 6
  • 3. 3 IHL  The number of 32-bit words in the header  Because this is 4 bits, the max header length is 15 words (i.e. 60 bytes)  The header is at least 20 bytes, but options may make it bigger Type of Service  Contains a 3-bit precedence field (that is ignored today), 4 service bits, and 1 unused bit.  The four service bits can be: o 1000 - minimize delay o 0100 - maximize throughput o 0010 - maximize reliability o 0001 - minimize monetary cost  This is a "hint" of what characteristics of the physical layer to use  The Type of Service is not supported in most implementations. However, some implementations have extra fields in the routing table to indicate delay, throughput, reliability, and monetary cost. Total Length  Total length of the datagram in bytes.  we know where the data starts by the header length  we know the size of the data by computing "total length - header length" Identification  Uniquely identifies the datagram.  Usually incremented by 1 each time a datagram is sent.  All fragments of a datagram contain the same identification value.  This allows the destination host to determine which fragment belongs to which datagram. Flags and Fragmentation Offset  Used for fragmentation  DF means do not fragment. It is a request to routers not to fragment the datagram since the destination is incapable of putting the pieces back together.  MF means more fragments to follow. All fragments except the last one have this bit set. It is needed to know if all fragments of a datagram have arrived. Fragment offset
  • 4. 4 This field solves the problem of sequencing fragments by indicating to the recipient device where in the overall message each particular fragment should be placed. Time to Live  decremented by each router that processes the datagram,  Router discards the datagram when TTL reaches 0. Protocol  Tells IP where to send the datagram up to.  6 means TCP  17 means UDP Header checksum Inserted by the sender and updated whenever the packet header is modified by a router - Used to detect processing errors introduced into the packet inside a router. Packets with an invalid checksum are discarded. Source IP address The IP address of the original sender of the packet Destination IP address The IP address of the final destination of the packet Options  Optional data.  Some examples include having the router put in a IP address of router and a time stamp so the final destination knows how long it took to get to each hop. The source and destination in the IP header is the original source and the final destination! The physical layer addresses pass the datagram from router to router. So, while the physical layer addresses change from router to router, the source and destination IP addresses in the IP datagram remain constant. IP Fragmentation  IP must fragment packets if it is of large size.  When an IP datagram is fragmented, each fragment is treated as a separate datagram. o It is reassembled at the final destination, not at a router o It does that because the router may have to fragment it again
  • 5. 5  Each fragment has its own header.  The identification number is copied into each fragment.  One bit in the "flags" field says "more fragments are coming. If that bit is 0, then it signifies this is the last fragment.  The "fragment offset" field contains the offset of the data. o Fragment offset is measured in units of 8 bytes (64 bits). The entire flags field looks like this: -------------------------- | bit 0 | bit 1 | bit 2 | -------------------------- bit 0: not used bit 1: if 1, it means "don't fragment". If IP must fragment the packet and this bit is set, IP throws away the datagram. bit 2: The fragment flag. Example:  Suppose we have a physical layer that can transmit a maximum of 660 bytes. And, suppose IP wants to send 1460 bytes of data. So, the IP datagram is a total of 1480 bytes, including the 20 byte IP header: --------------------------------------------- | 20-byte IP HEADER | 1460 bytes of data | ---------------------------------------------  Here is what IP sends: First packet: Bytes: 20 640 --------------------------------------------- | IP header | first 640 bytes of data | ---------------------------------------------  In that packet, "fragment flag" is 1, offset is 0. Second packet: Bytes: 20 640 --------------------------------------------- | IP header | second 640 bytes of data | ---------------------------------------------
  • 6. 6  In that packet, "fragment flag" is 1, offset is 80. The offset is 80 because (80 * 8) is 640, so the offset of that data is 640 byes. Third packet: Bytes: 20 640 --------------------------------------------- | IP header | third 180 bytes of data | ---------------------------------------------  In that packet, "fragment flag" is 0, offset is 160. The offset is 160 because (160 * 8) is 1280, so the offset of that data is 1280 byes.  IMPORTANT: The routers see 3 separate packets. The final destination reassembles the packet before passing the packet to the upper layers.