Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 86

INTERNET

PROTOCOL
-BY
SUBBA REDDY YERUVA
JASWANTH REDDY
 NETWORK PROTOCOLS
 INTERNET PROTOCOLS
 PURPOSE OF IP
 IP SERVICES

AGENDA 


IP ADDRESS
IPV4 VS IPV6
 IPV6 HEADER
 IP DATAGRAM
 DATAGRAM ELEMENTS
 IP CLASSES
NETWORK PROTOCOLS

OSI model is a generic model that is based upon


functionalities of each layer. TCP/IP model is a protocol-
oriented standard.

OSI model distinguishes the three concepts, namely, services,


interfaces, and protocols. TCP/IP does not have a clear
distinction between these three.

OSI model gives guidelines on how communication needs to


be done, while TCP/IP protocols layout standards on which
the Internet was developed. So, TCP/IP is a more practical
model.
INTERNET PROTOCOL
The Internet Protocol (IP) is a protocol, or set of rules,
for routing and addressing packets of data so that they
can travel across networks and arrive at the correct
destination.

Data traversing the Internet is divided into smaller


pieces, called packets.

IP information is attached to each packet, and this


information helps routers to send packets to the right
place.
 The internet protocol defines the basic unit of
data transfer (IP Datagram)
 IP software performs the routing function
 IP includes a set of rules that process the idea of
unreliable packet delivery.
PURPOSE OF IP  How hosts and routers should process
packets
 How & when error messages should be
generated
 The conditions under which packets can
be discarded
FEATURES OF IP
• Connectionless protocol and best effort
based.
• Simplicity
-It is simpler and easy to remember
-Require less memory
• Familiarity
-Millions of devices are already knowing
it.
-Existing infrastructure already support it.
 Delivery service of IP is minimal.
 IP provides an unreliable connectionless best
effort service.
a)Unreliable: IP doesn’t try to recover lost
IP SERVICES packets.
b)Connectionless: Each packet is handled
independently.
c)Best effort: IP doesn’t make guarantees on the
service (No through output, No delay guarantee)
It supports the following services
One-to-one (unicast)
One-to-all(broadcast)

IP SERVICES One-to-several(multicast)
 An IP address is a unique identifier assigned to a device or domain
that connects to the Internet.
 Each IP address is a series of characters, such as '192.168.1.1'.
Via DNS resolvers, which translate human-readable domain names
into IP addresses, users can access websites without memorizing this
complex series of characters.
 Each IP packet will contain both the IP address of the device or

IP ADDRESS domain sending the packet and the IP address of the intended
recipient, much like how both the destination address and the return
address are included on a piece of mail.
TYPES OF ADDRESS

STATIC ADDRESS:
 A static IP address is simply an address that doesn't change.
 Once your device is assigned a static IP address, that number
typically stays the same until the device is decommissioned or
your network architecture changes.
 StaticIP addresses are assigned by Internet Service Providers
(ISPs). Your ISP may or may not allocate you a static IP address
(Nichols, 2019)
DYNAMIC ADDRESS:
 DynamicIP addresses are subject to change, sometimes at a
moment's notice. Dynamic addresses are assigned, as needed,
by Dynamic Host Configuration Protocol (DHCP) servers
 Dynamic IP addresses are the most common type of internet
protocol addresses
 Dynamic IP addresses are only active for a certain amount of
time, after which they expire. The computer will either
automatically request a new lease, or the computer may
receive a new IP address.
IPV4
vs
IPV6
IPV4 AND IPV6 BIT SIZES
IPV6
HEADER
IP DATAGRAM
DATAGRAM ELEMENTS

 Version: The first IP header field is a 4-bit version indicator. In IPv4, the value of its four bits is set to
0100, which indicates 4 in binary. However, if the router does not support the specified version, this
packet will be dropped.
 Internet Header Length: Internet header length, shortly known as IHL, is 4 bits in size. It is also called
HELEN (Header Length). This IP component is used to show how many 32-bit words are present in the
header.
 Type of Service: Type of Service is also called Differentiated Services Code Point or DSCP. This field
is provided features related to the quality of service for data streaming or VoIP calls. The first 3 bits are
the priority bits. It is also used for specifying how you can handle Datagram.
 Total length: The total length is measured in bytes. The minimum size of an IP datagram is 20 bytes and
the maximum, it can be 65535 bytes . HELEN and Total length can be used to calculate the dimension
of the payload. All hosts are required to be able to read 576-byte datagrams. However, if a datagram is
too large for the hosts in the network, the fragmentation method is widely used.
 Identification: Identification is a packet that is used to identify fragments of an IP datagram uniquely.
Some have recommended using this field for other things like adding information for packet tracing, etc.
 IP Flags: Flag is a three-bit field that helps you to control and identify fragments. The following can be
their possible configuration:
Bit 0: is reserved and must be set to zero
Bit 1: means do not fragment
Bit 2: means more fragments.
 Fragment Offset: Fragment Offset represents the number of Data Bytes ahead of the fragment in the
specific Datagram. It is specified in terms of the number of 8 bytes, which has a maximum value of
65,528 bytes.
 Time to live: It is an 8-bit field that indicates the maximum time the Datagram will be live in the
internet system. The time duration is measured in seconds, and when the value of TTL is zero, the
Datagram will be erased. Every time a datagram is processed its TTL value is decreased by one second.
TTL are used so that datagrams are not delivered and discarded automatically. The value of TTL can be
0 to 255.
 Protocol: This IPv4 header is reserved to denote that internet protocol is used in the latter portion of the
Datagram. For Example, 6 number digit is mostly used to indicate TCP, and 17 is used to denote the
UDP protocol.
 Header Checksum: The next component is a 16 bits header checksum field, which is used to check the
header for any errors. The IP header is compared to the value of its checksum. When the header
checksum is not matching, then the packet will be discarded.
 Source Address: The source address is a 32-bit address of the source used for the IPv4 packet.
 Destination address: The destination address is also 32 bit in size stores the address of the receiver.
 IP Options: It is an optional field of IPv4 header used when the value of IHL (Internet Header Length)
is set to greater than 5. It contains values and settings related with security, record route and time stamp,
etc. You can see that list of options component ends with an End of Options or EOL in most cases.
 Data: This field stores the data from the protocol layer, which has handed over the data to the IP layer.
IP
CLASSES
MAXIMUM TRANSMISSION UNIT(MTU)

 The MTU is the maximum payload length for a


particular transmission media. 
 Maximum size of IP datagram is 65535, but the data
link layer protocol generally imposes a limit that is
much smaller.
 The limit of maximum IP datagram size, imposed by
the data link protocol is called maximum
transmission unit(MTU)
FRAGMENTATION

 packets that are initially transmitted over a network supporting one MTU
may need be routed across networks (such as a WAN or VPN tunnel)
with a smaller MTU.
 In these cases, if the packet size exceeds the lower MTU the data in the
packet must be fragmented (if possible). 
 This means it is broken into pieces carried within new packets
(fragments) that are equal to or smaller than the lower MTU.
 This is called fragmentation and the data in these fragments is then
typically reassembled when they reach their destination.
ADVANTAGES
 There are no extra fees connected with IP
 Competitive edge over other alike businesses
 IP helps in enhancing the company’s value
 IP aidsin marketing the company’s products and
services
 Obtaining finance becomes easy
 Greater export opportunities
DISADVANTAGES OF IP

 Additional costs
 Pirating
 Reduced quality
WIRESHARK LAB
Select the first UDP segment sent by your computer via the
traceroute command to gaia.cs.umass.edu. (Hint: this is 44th
packet in the trace file in the ip-wireshark-trace1-1.pcapng file in
footnote 2). Expand the Internet Protocol part of the packet in
the packet details window. What is the IP address of your
computer?
Source IP Address: 192.168.86.61
What is the value in the time-to-live (TTL) field in this
IPv4 datagram’s header?
What is the value in the upper layer protocol field in this
IPv4 datagram’s header?
How many bytes are in the IP header?
How many bytes are in the payload of the IP datagram? Explain
how you determined the number of payload bytes.
Has this IP datagram been fragmented?
Explain how you determined whether or not
the datagram has been fragmented.
As fragment bits are equal to ‘0’, the data is
not fragmented.
Which fields in the IP datagram always change from one
datagram to the next within this series of UDP segments
sent by your computer destined to 128.119.245.12, via
traceroute? Why?
Change 1

Change 2
Change 1

Change 2
Which fields in this sequence of IP datagrams (containing
UDP segments) stay constant? Why?
Describe the pattern you see in the values in the
Identification field of the IP datagrams being sent by your
computer.
What is the upper layer protocol specified in the IP
datagrams returned from the routers?
Are the values in the Identification fields (across the
sequence of all of ICMP packets from all of the routers)
similar in behavior to your answer to question 9 above?
Are the values of the TTL fields similar, across all of
ICMP packets from all of the routers?
Find the first IP datagram containing the first part of the
segment sent to 128.119.245.12 sent by your computer via the
traceroute command to gaia.cs.umass.edu, after you specified that
the traceroute packet length should be 3000. Has that segment
been fragmented across more than one IP datagram?
Answer:
Yes, the segment has been fragmented
across more than one IP datagram.
Frame 179 is fragmented as fragment bit
is set to 1
Frame 180 is fragmented as fragment bit
is set to 1
Frame 183 is fragmented as fragment
bit is set to 1
What information in the IP header indicates
that this datagram been fragmented?
The fragment bit =1 which shows
the datagram is fragmented
What information in the IP header for this packet
indicates whether this is the first fragment versus a latter
fragment?
Offset bit=0 which means no latter fragment
How many bytes are there in is this IP datagram
(header plus payload)?
Now inspect the datagram containing the second
fragment of the fragmented UDP segment. What
information in the IP header indicates that this is not the
first datagram fragment?
First datagram fragmented bit offset=0
Second datagram fragmented bit
offset=1480
What fields change in the IP header between the first and
second fragment?
Change 1

Change 2
Change 1

Change 2
Now find the IP datagram containing the third
fragment of the original UDP segment. What
information in the IP header indicates that this is the
last fragment of that segment?
More fragments bit = Not set, which
shows it is the last fragment.
What is the IPv6 address of the computer making the
DNS AAAA request? This is the source address of the
20th packet in the trace. Give the IPv6 source address
for this datagram in the exact same form as displayed
in the Wireshark window
What is the IPv6 destination address for this
datagram? Give this IPv6 address in the exact same
form as displayed in the Wireshark window.
What is the value of the flow label for this datagram?
How much payload data is carried in this datagram?
What is the upper layer protocol to which this datagram’s
payload will be delivered at the destination?
How many IPv6 addresses are returned in
the response to this AAAA request?
1 defines that one response is
returned.
What is the first of the IPv6 addresses returned
by the DNS for youtube.com (in the ip-wireshark-
trace2-1.pcapng trace file, this is also the
address that is numerically the smallest)? Give
this IPv6 address in the exact same shorthand
form as displayed in the Wireshark window.

You might also like