Chapter 20Network Layer-Internet Protocol.ppt

上传人:rimleave225 文档编号:379666 上传时间:2018-10-09 格式:PPT 页数:52 大小:1.60MB
下载 相关 举报
Chapter 20Network Layer-Internet Protocol.ppt_第1页
第1页 / 共52页
Chapter 20Network Layer-Internet Protocol.ppt_第2页
第2页 / 共52页
Chapter 20Network Layer-Internet Protocol.ppt_第3页
第3页 / 共52页
Chapter 20Network Layer-Internet Protocol.ppt_第4页
第4页 / 共52页
Chapter 20Network Layer-Internet Protocol.ppt_第5页
第5页 / 共52页
亲,该文档总共52页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、20.1,Chapter 20Network Layer: Internet Protocol,Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.,20.2,20-1 INTERNETWORKING,In this section, we discuss internetworking, connecting networks together to make an internetwork or an internet.,Need for Network Laye

2、r Internet as a Datagram Network Internet as a Connectionless Network,Topics discussed in this section:,20.3,Figure 20.1 Links between two hosts,20.4,Figure 20.2 Network layer in an internetwork,20.5,Figure 20.3 Network layer at the source, router, and destination,20.6,Figure 20.3 Network layer at t

3、he source, router, and destination (continued),20.7,Switching at the network layer in the Internet uses the datagram approach to packet switching.,Note,20.8,Communication at the network layer in the Internet is connectionless.,Note,20.9,20-2 IPv4,The Internet Protocol version 4 (IPv4) is the deliver

4、y mechanism used by the TCP/IP protocols.,Datagram Fragmentation Checksum Options,Topics discussed in this section:,20.10,Figure 20.4 Position of IPv4 in TCP/IP protocol suite,20.11,Figure 20.5 IPv4 datagram format,20.12,Figure 20.6 Service type or differentiated services,20.13,The precedence subfie

5、ld was part of version 4, but never used.,Note,20.14,Table 20.1 Types of service,20.15,Table 20.2 Default types of service,20.16,Table 20.3 Values for codepoints,20.17,The total length field defines the total length of the datagram including the header.,Note,20.18,Figure 20.7 Encapsulation of a smal

6、l datagram in an Ethernet frame,20.19,Figure 20.8 Protocol field and encapsulated data,20.20,Table 20.4 Protocol values,20.21,An IPv4 packet has arrived with the first 8 bits as shown: 01000010 The receiver discards the packet. Why?,Solution There is an error in this packet. The 4 leftmost bits (010

7、0) show the version, which is correct. The next 4 bits (0010) show an invalid header length (2 4 = 8). The minimum number of bytes in the header must be 20. The packet has been corrupted in transmission.,Example 20.1,20.22,In an IPv4 packet, the value of HLEN is 1000 in binary. How many bytes of opt

8、ions are being carried by this packet?,Solution The HLEN value is 8, which means the total number of bytes in the header is 8 4, or 32 bytes. The first 20 bytes are the base header, the next 12 bytes are the options.,Example 20.2,20.23,In an IPv4 packet, the value of HLEN is 5, and the value of the

9、total length field is 0x0028. How many bytes of data are being carried by this packet?,Solution The HLEN value is 5, which means the total number of bytes in the header is 5 4, or 20 bytes (no options). The total length is 40 bytes, which means the packet is carrying 20 bytes of data (40 20).,Exampl

10、e 20.3,20.24,An IPv4 packet has arrived with the first few hexadecimal digits as shown. 0x45000028000100000102 . . . How many hops can this packet travel before being dropped? The data belong to what upper-layer protocol?,Solution To find the time-to-live field, we skip 8 bytes. The time-to-live fie

11、ld is the ninth byte, which is 01. This means the packet can travel only one hop. The protocol field is the next byte (02), which means that the upper-layer protocol is IGMP.,Example 20.4,20.25,Figure 20.9 Maximum transfer unit (MTU),20.26,Table 20.5 MTUs for some networks,20.27,Figure 20.10 Flags u

12、sed in fragmentation,20.28,Figure 20.11 Fragmentation example,20.29,Figure 20.12 Detailed fragmentation example,20.30,A packet has arrived with an M bit value of 0. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented?,Solution If the M bit is

13、0, it means that there are no more fragments; the fragment is the last one. However, we cannot say if the original packet was fragmented or not. A non-fragmented packet is considered the last fragment.,Example 20.5,20.31,A packet has arrived with an M bit value of 1. Is this the first fragment, the

14、last fragment, or a middle fragment? Do we know if the packet was fragmented?,Solution If the M bit is 1, it means that there is at least one more fragment. This fragment can be the first one or a middle one, but not the last one. We dont know if it is the first one or a middle one; we need more inf

15、ormation (the value of the fragmentation offset).,Example 20.6,20.32,A packet has arrived with an M bit value of 1 and a fragmentation offset value of 0. Is this the first fragment, the last fragment, or a middle fragment?,Solution Because the M bit is 1, it is either the first fragment or a middle

16、one. Because the offset value is 0, it is the first fragment.,Example 20.7,20.33,A packet has arrived in which the offset value is 100. What is the number of the first byte? Do we know the number of the last byte?,Solution To find the number of the first byte, we multiply the offset value by 8. This

17、 means that the first byte number is 800. We cannot determine the number of the last byte unless we know the length.,Example 20.8,20.34,A packet has arrived in which the offset value is 100, the value of HLEN is 5, and the value of the total length field is 100. What are the numbers of the first byt

18、e and the last byte?,Solution The first byte number is 100 8 = 800. The total length is 100 bytes, and the header length is 20 bytes (5 4), which means that there are 80 bytes in this datagram. If the first byte number is 800, the last byte number must be 879.,Example 20.9,20.35,Figure 20.13 shows a

19、n example of a checksum calculation for an IPv4 header without options. The header is divided into 16-bit sections. All the sections are added and the sum is complemented. The result is inserted in the checksum field.,Example 20.10,20.36,Figure 20.13 Example of checksum calculation in IPv4,20.37,Fig

20、ure 20.14 Taxonomy of options in IPv4,20.38,20-3 IPv6,The network layer protocol in the TCP/IP protocol suite is currently IPv4. Although IPv4 is well designed, data communication has evolved since the inception of IPv4 in the 1970s. IPv4 has some deficiencies that make it unsuitable for the fast-gr

21、owing Internet.,Advantages Packet Format Extension Headers,Topics discussed in this section:,20.39,Figure 20.15 IPv6 datagram header and payload,20.40,Figure 20.16 Format of an IPv6 datagram,20.41,Table 20.6 Next header codes for IPv6,20.42,Table 20.7 Priorities for congestion-controlled traffic,20.

22、43,Table 20.8 Priorities for noncongestion-controlled traffic,20.44,Table 20.9 Comparison between IPv4 and IPv6 packet headers,20.45,Figure 20.17 Extension header types,20.46,Table 20.10 Comparison between IPv4 options and IPv6 extension headers,20.47,20-4 TRANSITION FROM IPv4 TO IPv6,Because of the

23、 huge number of systems on the Internet, the transition from IPv4 to IPv6 cannot happen suddenly. It takes a considerable amount of time before every system in the Internet can move from IPv4 to IPv6. The transition must be smooth to prevent any problems between IPv4 and IPv6 systems.,Dual Stack Tunneling Header Translation,Topics discussed in this section:,20.48,Figure 20.18 Three transition strategies,20.49,Figure 20.19 Dual stack,20.50,Figure 20.20 Tunneling strategy,20.51,Figure 20.21 Header translation strategy,20.52,Table 20.11 Header translation,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教学课件 > 大学教育

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1