INTERNET PROTOCOL - Cyber security & Technology

Breaking

Follow by Email

Thursday, May 31, 2018

INTERNET PROTOCOL





INTERNET PROTOCOL

Internet protocol of  network layer contains addressing information and some control information that enables the packets to be routed.

IP has two primary responsibilities:-

1.   Providing connectionless , best effort delivery of datagrams through a internetwork. The term best effort delivery means that IP does not provides any error control or flow control. The term connectionless means that each datagram is handled independently, and each datagram can follow different route to the destination. This implies that datagrams sent by the same source to the same destination could arrive out of order.

2.   Providing fragmentation and reassembly of datagrams to support data links with different maximum transmission unit(MTU) sizes.

IPv4 packet format

·      Packets in the network later are called datagrams.

·      A datagram is a variable length packet consisting of two parts: header and data

·      The header is 20 to 60 bytes in length and contains information essential to routing and delivery.

·      The various fields in IP header are:

1.   Version: It is a 4-bit field that specifies the version of IP currently being used. Two different versions of protocols are IPV4 and IPV6.

2.   IP header lengh: This is 4-bit field indicates the datagram header length in 32 bit word. The header length is not constant in IP. It may vary from 20 to 60 bytes. When there are no options, the header length is 20 bytes, and the value of this field is 5. When the option filed is at its maximum size, the value of this field is 15.

3.   Services: This 8 bit field was previously called services type but is now called differentiated services.

The various bit in service type are:

·      A 3-bit precedence field that defines the priority of datagram in issues such as congestion. This 3-bit subfield ranges from 0(000 in binary) to 7 (111 in binary) as shown below.




D
T
R
C


Precedence

000-111



·      After 3-bit precedence there are four flag bits. These bits can be either 0 or 1 and only one of the bits can have value of 1 in each datagram. The various flag bits are:

D : Minimize delay

T : Maximize throughtout

R : Maximize reliability

C : Minimize cost

The various bits in differentiated services are:

·      The first 6 bits defined a codepoint and last two bits are not used.If the 3 rightmost bits are Os9 the 3 leftmost bits are interpreted the same as the precedence bits in the service type interpretation.

4.   Total lengh: This 16 bit field specifies the total length of  entire IP datagram including data and header in bytes. As there are 16 bits, the total length of IP datagram is limited to 65535 bytes.

5.   Identification: This 16 bit field is used in fragmentation. A datagram when passing through different networks may be divided into fragments to match the network frame size. Therefore, this field  contains as interger that identifies the current datagram. This field is used to help piece together datagram fragments.

6.   Flags: Consists of a 3 bit field of which the two low order bit DF, MF control fragmentation. DF stands for DON’T fragment. DF specifies whether the packet can be fragmented, MF stands for more fragments and specifies whether the packet is the last fragment in  a series of fragmented packets.

7.   Fragment offset: This 13 bit field indicates the position of the fragment`s data relative to the beginning of the data in the original datagram , which allows the destination IP process to properly reconstruct the original datagram.

8.   Protocol: It is 8 bit field indicates which upper layer protocol receives incoming packets after IP processing is complete.

9.   Header checksum: This 16 bit field contains a checksum that covers only the header and not the data.

10.                  Source IP address: These 32 bit field contains the IP address of source machine.

11.                  Destination IP address: This 32 bit field contains the IP address of destination machine.

12.                  Data: It contains upper layer information.

13.                  Options: This field allows IP to support various options such as security, routing , timing management and alignment.

No comments:

Post a Comment